Qs.Exam#1.Chapters.1-9

docx

School

University of Texas, Arlington *

*We aren’t endorsed by this school

Course

5331

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

10

Uploaded by MegaPheasantPerson617

Report
MANAGEMENT OF INFORMATION TECHNOLOGY (INSY 5375) Fall 2022 | Instructor: Atieno Amadi Exam#1 Student Name: _____________________ Student ID# ______________ Instructions: This Exam#1 consists of one fifty (50) multiple choice questions, based on the contents of Chapters 1 through 9 of the class text. The exam is graded on a 150-point scale, with each question worth 3 points. This is a face-to-face exam that has to be taken in the regular classroom. You will access the exam on Canvas under “Assignments”, and you will provide your answers on a SCANTRON. Bring your own (green) SCANTRON to the exam. The filled out SCANTRON has to be turned in to the instructor at the end of the exam. Be sure to place your full name and student identification number on the SCANTRON. Questions: 1. All of the following are mechanisms that can be created to ensure good IT governance EXCEPT: A. ____Policies B. ____Review boards C. ____Steering Committees D. ____Consultants E. ____IT Governance Council 2. This framework is called the ____________________ because it relates business strategy with IS strategy and organizational strategy. A. ____Porter’s Generic Framework B. ____Hypercompetition Model C. ____Information Technology Matrix D. ____IS Strategy Model E. ____Information Systems Strategy Triangle 3. Which is not a question that can be used to understand organizational design? A. ____Who holds the decision rights to critical decisions? B. ____What control systems (management and measurement systems) are in place? C. ____Where is the organization's headquarters located? D. ____What are the key business processes? E. ____What is the culture of the organization? Page 1 of 10
4. The plan an organization uses to provide information systems and services is called: A. ____Cost Leadership B. ____Differentiation C. ____Focus D. ____IS Strategy E. ____Business Diamond 5. Businesses today link their customers and suppliers through a single network that optimizes cost and opportunities for all. This is possible because of all of the following reasons EXCEPT: A. ____Standardized communication networks (like the Internet) B. ____The availability of SCM enterprise systems C. ____The inability to coordinate workflow across organizational boundaries D. ____The globalization of business E. ____The ubiquity of IT 6. Organizations use the enterprise system to drive the redesign of a business process (rather than the process driving the system implementation) for all of the following reasons EXCEPT: A. ____The organization is just starting out and has no defined processes. B. ____The business process itself is not seen as a competitive strategic advantage. C. ____There is little time or resources to deviate from best practices. D. ____The organization has highly specialized processes that are not seen as best practices. E. ____The needs of the business are met by the enterprise system. 7. ______ examines huge, disparate data sets to identify patterns, trends, correlations, and other information that leads to insights organizations can harness in support of better decision-making: A. ____Big Data Analytics B. ____Dark Data C. ____Decision Support Systems D. ____Expert Systems E. ____Trend Analysis 8. A firm releases a new technology only to have a competitor implement a similar technology with more features and value to the consumer. This would be which type of risk? A. ____Demonstrating bad timing B. ____Awakening a sleeping giant C. ____Mobile-based alternative removes advantages D. ____Running afoul of the law E. ____Implementing IS poorly Page 2 of 10
9. The “Managerial Levers” concept is useful for the following reasons: A. ____Management can find what “levers” to push to force people to do what they want. B. ____Management should not make a change unless they align multiple issues, such as tasks, measures, values, incentives, etc. C. ____System investments need to be financially highly leveraged. D. ____All of the above E. ____None of the above 10.A general manager should: A. ____Rely on IS personnel to make IS decisions B. ____Ignore how IS are used and managed C. ____Have a deep technical knowledge of IS D. ____Understand the use and consequences of technologies relevant to the business E. ____Not be expected to ask or understand technology related questions 11.Through the use of various technologies, a ski resort tracks the slopes each customer skis and the times he or she skis them. Skiers then have the ability to view this information online, and can choose to seamlessly share their accomplishments on Facebook. In addition, photographers positioned at the resort post pictures on Facebook for the skier. This ski resort has worked hard to develop a strong: A. ____IS Strategy B. ____Social business strategy C. ____Business strategy D. ____Organizational strategy E. ____Customer strategy 12.The general manager for a retail clothing outlet was recently cited as saying, “IT is the cornerstone of our company. All of our decisions are based on the sophisticated systems that we have deployed throughout our organization. IT drives our decisions.” What position should the manager hold regarding IT and its influence on decision making? A. ____IT should drive business decisions. B. ____Organizational goals should drive IT decisions. C. ____Organizational strategy should drive IS decision making. D. ____Business strategy should drive IS decision making E. ____All strategy should be driven by IT strategy. 13.These are decentralized, public ledgers that verify ownership in a way that cannot be tampered with, thereby building strong networks of trust between users, backed by this technology: A. ____Cryptocurrencies B. ____Artificial Intelligence C. ____Blockchain D. ____Machine Language E. ____Networks Page 3 of 10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
14.Porter’s value chain framework suggests that a competitive advantage can stem from: A. ____Lowering costs and adding value B. ____Reducing isolated costs C. ____Disregarding customer data D. ____Optimizing internal costs E. ____Improving customer service 15.IT has altered employees and the way they work by doing all of the following EXCEPT: A. ____Creating new types of jobs B. ____Greatly changing day-to-day tasks C. ____Supporting new ways to manage talent D. ____Needing more technically knowledgeable individuals E. ____Providing distinct lines between work and play 16._________________________is (are) an all-encompassing tool used for modeling, building, executing, and monitoring business processes that go across organizational boundaries (and often systems). A. ____Enterprise system B. ____Workflow diagrams C. ____SharePoint D. ____Business Process Management systems E. ____Integrated information systems 17.The major difference between an ERPII and ERP III system is which of the following features? A. ____Advances in software usability and flexibility B. ____Information is made immediately available to external stakeholders using social and collaborative tools C. ____Information is made available to all departments in the company D. ____Advanced quering and reporting capabilities E. ____Close integration with e-business technologies 18.The architecture that the large paper company Mohawk adopted enables the company to scale technology services up and down instantaneously according to its needs. The architecture is called: A. ____Centralized B. ____Decentralized C. ____Service-oriented D. ____Internet-based E. ____Mainframe 19.A manager must know enough about the IT architecture and IT infrastructure so that he or she can: A. ____Select the correct wireless provider. B. ____Make realistic use of IT and know what to expect from IT. C. ____Choose the appropriate IT infrastructure components. D. ____Limit future business options. E. ____Ensure a rigid IT structure. Page 4 of 10
20.Which of the following best describes cloud computing? A. ____Virtual desktop computing B. ____Lightweight software that takes up little storage space C. ____Computing services that can be accessed on demand across the Internet D. ____The World Wide Web E. ____Mobile-based social IT 21.The layers of enterprise architecture are: business, application, information, and: A. ____Enterprise software B. ____A centralized architecture C. ____IT systems D. ____Technology E. ____A framework 22.Which of the following provides a blueprint for translating a business strategy into a plan for IS? A. ____IS infrastructure B. ____IS architecture C. ____ERP systems D. ____Centralized architecture E. ____SOA 23.This is a digital currency in which transactions are verified and records maintained by a decentralized system using cryptography, rather than by a centralized authority: A. ____Cryptocurrency B. ____Blockchain C. ____Bitcoin D. ____Artificial Intelligence E. ____Machine Language 24.Which type of computer/IT architecture is limited to a central computer system? A. ____Mainframe B. ____Web-services C. ____Peer-to-peer D. ____Wireless E. ____Server-to-server 25.The archetype that is represented by a group of business executives that might or might not include the CIO is: A. ____IT monarchy B. ____Feudal C. ____Federal D. ____Business monarchy E. ____IT duopoly Page 5 of 10
26.Which of the following is the architecture where significant hardware, software, and possibly even data elements reside on the Internet? A. ____Internet-oriented architecture B. ____TCP/IP architecture C. ____Web or Cloud-based architecture D. ____Mobile architecture E. ____Centralized architecture 27.A small company in Des Moines wants to set up an IT infrastructure for its workforce. The company recently moved to an older building that has solid walls and ceilings. Furthermore, most of the staff likes the flexibility of moving around the open office space to perform work on their laptops. Which communication infrastructure makes most sense for this company? A. ____Mainframe B. ____Web-services C. ____Peer-to-peer D. ____Wireless E. ____Server-to-server 28. Many organizations and even consumers use what to control access to a network like the Internet, allowing only authorized traffic to pass? A. ____Encryption B. ____VPN C. ____Firewall D. ____Anonymizing tools E. ____Filtering 29.Who is responsible for decisions about security strategy? A. ____IT people B. ____Shared: IT leaders and business leaders C. ____Business leaders D. ____Consultants E. ____Team of consultants and IT people 30.Who is responsible for developing a cybersecurity culture? A. ____IT people B. ____IT leaders and business leaders share responsibility C. ____Business leaders D. ____Consultants E. ____Team of consultants and IT people 31.An “evil twin” in the context of computer security is: A. ____A virus-laden attachment that looks just like a sincere attachment B. ____A duplicate badge that allows a nasty person entry into a data center C. ____Someone who looks just like the Chief Information Officer, but steals data D. ____An operating system that is not genuine E. ____A counterfeit Wi-Fi connection in a hotel or coffee shop that appears to be genuine Page 6 of 10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
32.It usually takes ____ for someone in a firm to discover a security compromise in a system, after the evidence shows up in logs or alerts A. ____Several seconds B. ____Several minutes C. ____Several hours D. ____Several days E. ____Several months 33.Each of the following statements is true EXCEPT which one? A. ____Blockchains can be private, public, or a hybrid that takes aspects from each blockchain type B. ____A public blockchain can be audited by any node (i.e., computer) on the network, C. ____A private blockchain can only be verified by those authorized to be on the network D. ____Private blockchains with tighter controls on who is involved in the process have the authority to alter transactions if needed E. ____Bitcoin is not considered a public blockchain 34.In the Anthem Blue Cross breach, where 80 million names, birthdays, social security numbers, etc., were stolen, the hackers got in by: A. ____Breaking into the building where they were stored B. ____Obtaining passwords of five or more high-level employees C. ____Making phone calls to insiders posing as IT people needing to log into their accounts D. ____Emailing each of the 80 million patients asking for their private information E. ____Recovering patient records from a large recycling bin 35.According to the research by Peter Weill, a firm that boosts investments in infrastructure is typical of those firms with a focus on (1) _______ and a firm that boosts investments in transaction systems is typical of those firms with a focus on (2) ______ A. ____ (1) transactions (2) connections B. ____ (1) savings (2) expansion C. ____ (1) cost (2) ability D. ____ (1) agility (2) cost E. ____ (1) ability (2) agility 36.The responsibility of the IT organization is to: A. ____Manage core business functions like selling, accounting and manufacturing. B. ____Partner with business managers to ensure the right IS exists to support the business strategy. C. ____Set the business strategy. D. ____Have sole responsibility for building information systems for the organization. E. ____Design business processes. Page 7 of 10
37.Which method of IT funding is the most equitable, as the costs associated with IT are based on use? A. ____Allocation B. ____Corporate budgeting C. ____Usage D. ____Distributed E. ____Chargeback 38.Which financial calculation provides a percentage rate that measures the relationship between the amount the business gets back from an investment and the amount invested? A. ____IRR B. ____ROI C. ____Payback D. ____NPV E. ____EVA 39.Which of the following plans is designed to counter a manmade or natural disaster that could cripple an enterprise? A. ____Business Continuity Plan B. ____Disaster Recovery Plan C. ____Business Disaster Plan D. ____Disaster Business Case E. ____Business-IT Maturity Model 40.Scorecards provide a summary of information gathered over a period of time. Another common IT monitoring tool is the: A. ____Baseline B. ____Metrics C. ____Portfolio D. ____Dashboard E. ____Monitor 41.A CIO must spend part of the day performing _____ tasks and some part of the day working on operational tasks. Rarely can a CIO focus on just one task in any given day. A. ____Administrative B. ____Strategic C. ____Database D. ____Financial E. ____Technology 42.Which dimension of the Balanced Scorecard answers the question “How do customers see us?” A. ____Customer Perspective B. ____Innovating and Learning Perspective C. ____Internal Business Perspective D. ____Financial Perspective E. ____Supplier Perspective Page 8 of 10
43.Artificial intelligence (AI) is the simulation of human intelligence processes by machines, especially computer systems. Each of the following is a specific application of AI EXCEPT which one? A. ____Expert Systems B. ____Natural Language Processing C. ____Databases D. ____Speech Recognition E. ____Machine Vision 44.In the early days of IT, the CIO would report to the ____ as IT was seen as a way to control costs. As technology has become more strategic and able to deliver a competitive advantage, CIOs now report directly to the ____. A. ____CFO; CEO B. ____CEO; CFO C. ____CFO; COO D. ____COO; CEO E. ____CEO; CTO 45.Which dimension of the balanced scorecard answers the question “How do we look to shareholders?” A. ____Customer perspective B. ____Innovating and learning perspective C. ____Internal business perspective D. ____Financial perspective E. ____Supplier perspective 46.In which type of organization management does IT control most of its IT infrastructure in one location? A. ____Distributed IS organization B. ____Decentralized IS organization C. ____Federalism D. ____Joint-Control IS organization E. ____Centralized IS organization 47.The computer program that uses artificial intelligence (AI) technologies to simulate the judgment and behavior of a human or an organization that has expertise and experience in a particular field, is: A. Decision Support Systems B. Deep Learning C. Expert Systems D. Management Information Systems E. Natural Language Processing Page 9 of 10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
48.Joe works for a company where the IT department charges him for the number of CRM login accounts that are in his department. What type of IT funding model is his company deploying? A. ____Allocation B. ____Corporate budgeting C. ____Usage D. ____TCO E. ____Chargeback 49.________ of the 1980s allowed computing power to spread and gave rise to a decentralized approach to IT governance. A. ____Servers B. ____Mainframes C. ____Networks D. ____PCs E. ____The WWW 50.Denise works for a company where the IT department charges her department for actual usage of a SharePoint server, determining how often users log in and how much storage space her department consumes. What type of IT funding model is the company deploying? A. ____Allocation method B. ____Corporate budget method C. ____Usage method D. ____Distributed method E. ____Chargeback method Page 10 of 10