Home / CSE / Management Information Systems :: Section 1

CSE :: Management Information Systems

  1. Which of the following is(are) true of the EDP auditors?

  2. A.
    they should have computer expertise
    B.
    they will be replaced by traditional auditors in the near future
    C.
    two of the above
    D.
    currently, there is a very high demand for them, particularly from firms that use personal computers
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  3. Controls of data communication deal with

  4. A.
    the communication channel
    B.
    the computer
    C.
    terminals
    D.
    All of the above
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  5. A lockbox service is used for

  6. A.
    depositing cash when bank is closed
    B.
    paying bank customer bills automatically
    C.
    storing papers in a bank vault
    D.
    depositing payments to bank customers
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  7. Critical path of the PERT chart is:

  8. A.
    path which takes the longest time to complete the project
    B.
    the shortest path
    C.
    both of the above
    D.
    path which takes the shortest time to complete the project
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  9. An EOQ formula is an example of a(n)

  10. A.
    optimizing model
    B.
    static model
    C.
    deterministic model
    D.
    All of the above
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  11. _____ are knowledge based system to which present rules are applied to solve a particular problem.

  12. A.
    ES
    B.
    AI
    C.
    KBS
    D.
    Base rule 0
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  13. The _____ is a business-oriented data-processing association which publishes a monthly journal, Data Management.

  14. A.
    DPMA
    B.
    CDP
    C.
    CISA
    D.
    ACM
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  15. The computer can potentially be used to monitor most of our actions, thus robbing us of _____

  16. A.
    tapping
    B.
    privacy
    C.
    back log
    D.
    security
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  17. A systems theory of organization sees the firm as a

  18. A.
    network of resource flows
    B.
    system transforming inputs into outputs
    C.
    physical system managed by a manager using a conceptual system
    D.
    All of the above
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  19. A financial modeling package for a PC is similar to a spreadsheet package, but it can handle larger data files than a spreadsheet, and it has a built-in _____ seeking function.

  20. A.
    aim
    B.
    target
    C.
    goal
    D.
    plan
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum