Computer Science - Management Information Systems

16. 

In data transmission, the bit coding scheme used to represent a byte is typically:

A. EBCDIC
B. ASCII
C. SNA
D. Hexadecimal
E. None of the above

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

17. 

The physical system of the firm may be regarded as a flow of

A. manpower, machines, material, and money
B. information only
C. manpower, machines, material, money, and information
D. manpower, machines, material, money, and data
E. None of the above

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

18. 

Which of the following is not a basic configuration used in a data communication network?

A. computer/peripheral-device configuration
B. computer-to-computer commu┬Čnication
C. computer to front-end processor communication
D. communication through a data switch
E. None of the above

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

19. 

In the future, users of a computer system may identify themselves by entering a _____ and a fingerprint

A. hard print
B. soft print
C. voice print
D. digital
E. None of the above

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

20. 

Computing systems can provide strategic information by

A. making decision analysis possible
B. providing corporate models for long-range planning
C. causing managers to think
D. All of the above
E. None of the above

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.