planning is done on a short-term basis to implement and control day-to-day operations
1._______________ planning is done on a short-term basis to implement and control day-to-day operations. 1. Strategic 2. Operational 3. Tactical 4. Scenario 2.The _______________ component of the business/IT planning process involves developing strategic plans for managing or outsourcing a company's IT resources. 1. resource management 2. technology architecture 3. strategic development 4. All of the choices are correct. 3.A situation where previously regulated markets are opening is a _______________ trend that is shaping strategic business/IT planning. 1. technology 2. competitive imperatives 3. deregulation 4. customer sophistication/expectations 4._______________ planning involves the setting of objectives and the development of procedures, rules, schedules, and budgets. 1. Strategic 2. Operational 3. Tactical 4. All of the choices are correct. 5._______________ are the potential for new business markets or innovative breakthroughs that might expand present markets. 1. Weaknesses 2. Opportunities 3. Threats 4. Strengths
6.Which of the following is the final stage of an organizational transformation?
1. Business scope redefinition
2. Localized implementation
3. Business process redesign
4. Business network redesign
2. Localized implementation
3. Business process redesign
4. Business network redesign
7.According to the text case, the original Iridium organization failed because:
1. the company couldn't afford to keep the system updated.
2. Iridium focused on the wrong business.
3. the system was not operational before the company went through a merger.
4. satellite phones do not work indoors.
2. Iridium focused on the wrong business.
3. the system was not operational before the company went through a merger.
4. satellite phones do not work indoors.
8.Which of the following are activities performed during the controlling project management phase?
1. Establish reporting obligations
2. Identify and sequence activities
3. Commit resources to specific tasks
4. Meet with stakeholders
2. Identify and sequence activities
3. Commit resources to specific tasks
4. Meet with stakeholders
9.According to the text, certain changes in _______________ may dictate the need for change, regardless of the assessed feasibility of such change.
1. the business environment
2. product specifications
3. management structure
4. technical system requirements
2. product specifications
3. management structure
4. technical system requirements
10.Which of the following is related to human factors feasibility?
1. Customer acceptance
2. How well the proposed system will fit with the existing organizational structure
3. Increased profits
4. Hardware capability
2. How well the proposed system will fit with the existing organizational structure
3. Increased profits
4. Hardware capability
11.No matter what the project, all of the following elements are necessary except:
1. Prototypes
2. Process
3. Tools
4. Techniques
2. Process
3. Tools
4. Techniques
12.When a company needs to evaluate competing proposals for hardware or software acquisition:
1. Each evaluation factor is assigned an equal weight
2. Each evaluation factor is assigned a different number of points, depending on its importance to the company
3. The lowest bid is always the ultimate selection factor
4. Only three things matter: cost, performance, and support
2. Each evaluation factor is assigned a different number of points, depending on its importance to the company
3. The lowest bid is always the ultimate selection factor
4. Only three things matter: cost, performance, and support
13.Software packages that are _______________ aren't a good choice at any price.
1. slow
2. hard to use
3. poorly documented
4. All of the choices are correct.
2. hard to use
3. poorly documented
4. All of the choices are correct.
14.All of the following are activities performed during the executing project management phase except:
1. Commit resources to specific tasks
2. Add additional resources/personnel if necessary
3. Writing a detailed project plan
4. Initiate project work
2. Add additional resources/personnel if necessary
3. Writing a detailed project plan
4. Initiate project work
15.Software that is not copyrighted is called:
1. Shareware
2. Open source
3. Public domain
4. None of the choices are correct.
2. Open source
3. Public domain
4. None of the choices are correct.
16.Sending extremely critical, derogatory, and often vulgar e-mail messages is called _______________.
1. flaming
2. spamming
3. spoofing
4. spying
2. spamming
3. spoofing
4. spying
17.According to the text, backup files:
1. Are duplicate files of data or programs
2. Can be used to reconstruct the original files if they are destroyed
3. May be stored off-premises, sometimes in special storage vaults in remote locations
4. All of the choices are correct.
2. Can be used to reconstruct the original files if they are destroyed
3. May be stored off-premises, sometimes in special storage vaults in remote locations
4. All of the choices are correct.
18.A _______________ is software that can guess passwords.
1. logic bomb
2. password XXXXX
3. back door
4. sniffer
2. password XXXXX
3. back door
4. sniffer
19.According to the text, all of the following statements are included in the definition of computer crime except:
1. Unauthorized modification of software, data, or network resources
2. Unauthorized release of information
3. Unauthorized copying of software
4. Unauthorized distribution of public domain software
2. Unauthorized release of information
3. Unauthorized copying of software
4. Unauthorized distribution of public domain software
20.The stockholder theory maintains that:
1. Companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract
2. Managers are agents of the organization's owners, and their only ethical responsibility is to increase the profits of the business without violating the law orengaging in fraudulent practices
3. Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company
4. Managers are agents of the customer, and their only ethical responsibility is to increase the service of the business, without violating the law or engaging in fraudulent practices
2. Managers are agents of the organization's owners, and their only ethical responsibility is to increase the profits of the business without violating the law orengaging in fraudulent practices
3. Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company
4. Managers are agents of the customer, and their only ethical responsibility is to increase the service of the business, without violating the law or engaging in fraudulent practices
21.According to the text, information technology has caused ethical controversy in all of the following basic categories of ethical business issues, except:
1. Intellectual property rights
2. Whistle blowing
3. Customer and employee privacy
4. Workplace safety
2. Whistle blowing
3. Customer and employee privacy
4. Workplace safety
22.According to the text, COBIT is:
1. A methodology for determining the political structure of each country for IT operations
2. A popular methodology for developing complex global information systems
3. A popular IT governance approach that focuses on all aspects of the IT function throughout the organization
4. A method for evaluating the infrastructure capabilities for IT in the target country
2. A popular methodology for developing complex global information systems
3. A popular IT governance approach that focuses on all aspects of the IT function throughout the organization
4. A method for evaluating the infrastructure capabilities for IT in the target country
23.The chief information officer is a(n) _______________ level IT manager.
1. tactical
2. strategic
3. operational
4. departmental
2. strategic
3. operational
4. departmental
24.All of the following are among the top 10 factors in vendor selection except:
1. Commitment to quality
2. Price
3. End-user support
4. Cultural match
2. Price
3. End-user support
4. Cultural match
25.According to the text, if you are second-in-command to the CIO or chief technology officer and have years of applications development experience, your next promotion should be to:
1. COO
2. CEO
3. CIO
4. CTO
2. CEO
3. CIO
4. CTO
26.According to the text, many countries view the process of transborder data flows as violating their laws for all the reasons, except:
1. national sovereignty
2. privacy legislation
3. laws designed to protect the local IT industry from competition
4. anti-terrorist security precautions
2. privacy legislation
3. laws designed to protect the local IT industry from competition
4. anti-terrorist security precautions
27.All of the following would be associated with an international e-business strategy except:
1. Captive manufacturing
2. Global supply chain and logistics
3. Specific customers
4. Region specific
2. Global supply chain and logistics
3. Specific customers
4. Region specific
28.The _______________ has problem-solving skills and a degree in information systems, excellent interpersonal skills, good technical skills, and an ability to apply problem-solving and critical-thinking skills to the design of new systems.
1. Systems analyst
2. Practice manager
3. CIO
4. Team leader
2. Practice manager
3. CIO
4. Team leader
Comments
Post a Comment