MIS REVIEW MCQ - converted
MIS REVIEW MCQ - converted
Answer: B) To offer additional products or services to existing customers Chapter 9: Achieving Operational Excellence and Customer Intimacy
1. How do enterprise systems help businesses achieve operational excellence? • A) To determine a company's organizational structure
• B) To generate profits from e-commerce transactions
Which of the following is NOT supported by enterprise systems? • C) To improve product designs
• D) To reduce transaction costs
• A) Accounts Payable Answer: B) To generate profits from e-commerce transactions
• B) General Ledger
• C) Human Resources Management 44. Which of the following is an example of a B2C e-commerce business?
• D) Payroll
• A) A business purchasing raw materials from suppliers
Answer: C) Human Resources Management • B) A company selling office furniture to other businesses
• C) An online store selling products to individual consumers
• D) An auction site for peer-to-peer sales
Answer: C) An online store selling products to individual consumers
2. How do supply chain management systems coordinate planning, production,
and logistics with suppliers? 45. Which of the following is an example of a C2C e-commerce model?
• A) A company selling goods to individual customers 6. Which of the following laws requires companies to practice stringent electronic
• B) A customer selling items to other customers through a platform like eBay records management and adhere to strict standards for security, privacy, and
• C) A retailer purchasing products from a wholesaler control?
• D) A manufacturer selling products directly to businesses o A) HIPAA
Answer: B) A customer selling items to other customers through a platform like o B) GDPR
eBay o C) SOX (Sarbanes-Oxley Act)
o D) All of the above
46. What is a benefit of behavioral targeting in e-commerce? o Answer: D) All of the above
7. What is the purpose of electronic evidence?
• A) Reduced costs of website maintenance o A) To ensure user access control
• B) Personalized marketing messages based on user activity o B) To provide proof in legal proceedings
• C) Increased legal requirements for data usage o C) To increase system performance
• D) Limited customer engagement o D) To monitor network traffic
Answer: B) Personalized marketing messages based on user activity o Answer: B) To provide proof in legal proceedings
47. Which of the following describes the impact of social e-commerce? 8-3 What are the components of an organizational framework for security and
control?
• A) It limits business reach to traditional markets
• B) It allows businesses to leverage social networks to engage users and promote products 8. Which of the following is a type of general control for information systems?
• C) It decreases the value of customer feedback o A) Firewall protection
• D) It reduces the use of mobile commerce platforms o B) Employee training
Answer: B) It allows businesses to leverage social networks to engage users and o C) Backup and recovery procedures
promote products o D) Digital certificates
o Answer: C) Backup and recovery procedures
48. Which technology allows businesses to send electronic documents like invoices to 9. What is the purpose of risk assessment in an information systems security
each other in B2B e-commerce? framework?
o A) To improve system performance
• A) HTTP o B) To identify potential vulnerabilities and control weaknesses
• B) Electronic Data Interchange (EDI) o C) To provide legal evidence in case of a breach
• C) Ethernet o D) To define user roles and access levels
• D) Wi-Fi o Answer: B) To identify potential vulnerabilities and control weaknesses
Answer: B) Electronic Data Interchange (EDI) 10. What does an acceptable use policy (AUP) typically define?
o A) Password complexity requirements
49. Mobile commerce (m-commerce) refers to: o B) Rules for the legal use of information systems
o C) Backup procedures for sensitive data
• A) The use of mobile devices to conduct commercial transactions o D) The roles of users within an organization
• B) Businesses trading physical goods through traditional methods o Answer: B) Rules for the legal use of information systems
• C) The inability to conduct business transactions via the internet
• D) Limiting transactions to desktop computers 9-4 What are the most important tools and technologies for safeguarding
Answer: A) The use of mobile devices to conduct commercial transactions information resources?
50. What is one of the most common m-commerce applications? 11. Which of the following technologies helps to prevent unauthorized users from
accessing a private network when it is linked to the Internet?
• A) Remote server management o A) Intrusion detection system
• B) Location-based services o B) Firewall
• C) Physical point-of-sale transactions o C) Anti-malware software
10. Bluetooth (802.15) is a standard for which type of network? • D) Large-scale logistics planning
Answer: B) Location-based services
A) Personal Area Networks (PANs)
B) Local Area Networks (LANs) 51. Which of the following best describes mobile payment systems?
C) Metropolitan Area Networks (MANs)
D) Wide Area Networks (WANs) • A) They are used exclusively for large businesses
• B) They facilitate the payment of goods and services through mobile devices
Answer: A) Personal Area Networks (PANs) • C) They require a wired internet connection
• D) They are rarely used in m-commerce applications
CHAPTER 8 Answer: B) They facilitate the payment of goods and services through mobile
devices
8-1 Why are information systems vulnerable to destruction, error, and
abuse? 52. What is the first step in developing an e-commerce presence map?
A) Computers
B) Network interfaces
C) Routers CHAPTER 6
D) Network operating system software
MCQs on Problems of Managing Data Resources in a Traditional File
Answer: C) Routers Environment