Qs.Exam#1.Chapters.1-9
docx
keyboard_arrow_up
School
University of Texas, Arlington *
*We aren’t endorsed by this school
Course
5331
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
10
Uploaded by MegaPheasantPerson617
MANAGEMENT OF INFORMATION TECHNOLOGY (INSY 5375)
Fall 2022
|
Instructor:
Atieno Amadi
Exam#1
Student Name: _____________________ Student ID# ______________
Instructions:
This Exam#1 consists of one fifty (50) multiple choice questions, based on the contents
of Chapters 1 through 9 of the class text. The exam is graded on a 150-point scale,
with each question worth 3 points. This is a face-to-face exam that has to be taken in
the regular classroom. You will access the exam on Canvas under “Assignments”, and
you will provide your answers on a SCANTRON. Bring your own (green) SCANTRON
to the exam. The filled out SCANTRON has to be turned in to the instructor at the end
of the exam. Be sure to place your full name and student identification number on the
SCANTRON.
Questions:
1.
All of the following are mechanisms that can be created to ensure good IT governance
EXCEPT:
A. ____Policies
B.
____Review boards
C.
____Steering Committees
D. ____Consultants
E.
____IT Governance Council
2.
This framework is called the
____________________
because it relates business
strategy with IS strategy and organizational strategy.
A.
____Porter’s Generic Framework
B.
____Hypercompetition Model
C.
____Information Technology Matrix
D.
____IS Strategy Model
E.
____Information Systems Strategy Triangle
3.
Which is not a question that can be used to understand organizational design?
A.
____Who holds the decision rights to critical decisions?
B.
____What control systems (management and measurement systems) are in
place?
C.
____Where is the organization's headquarters located?
D.
____What are the key business processes?
E.
____What is the culture of the organization?
Page 1 of 10
4.
The plan an organization uses to provide information systems and services is called:
A.
____Cost Leadership
B. ____Differentiation
C. ____Focus
D.
____IS Strategy
E.
____Business Diamond
5.
Businesses today link their customers and suppliers through a single network that
optimizes cost and opportunities for all. This is possible because of all of the following
reasons EXCEPT:
A.
____Standardized communication networks (like the Internet)
B.
____The availability of SCM enterprise systems
C.
____The inability to coordinate workflow across organizational boundaries
D.
____The globalization of business
E.
____The ubiquity of IT
6.
Organizations use the enterprise system to drive the redesign of a business process
(rather than the process driving the system implementation) for all of the following
reasons EXCEPT:
A.
____The organization is just starting out and has no defined processes.
B.
____The business process itself is not seen as a competitive strategic
advantage.
C.
____There is little time or resources to deviate from best practices.
D.
____The organization has highly specialized processes that are not seen as best
practices.
E.
____The needs of the business are met by the enterprise system.
7.
______ examines huge, disparate data sets to identify patterns, trends, correlations,
and other information that leads to insights organizations can harness in support of
better decision-making:
A.
____Big Data Analytics
B.
____Dark Data
C.
____Decision Support Systems
D.
____Expert Systems
E.
____Trend Analysis
8.
A firm releases a new technology only to have a competitor implement a similar
technology with more features and value to the consumer. This would be which type of
risk?
A.
____Demonstrating bad timing
B.
____Awakening a sleeping giant
C.
____Mobile-based alternative removes advantages
D.
____Running afoul of the law
E.
____Implementing IS poorly
Page 2 of 10
9.
The “Managerial Levers” concept is useful for the following reasons:
A.
____Management can find what “levers” to push to force people to do what they
want.
B.
____Management should not make a change unless they align multiple issues,
such as tasks, measures, values, incentives, etc.
C.
____System investments need to be financially highly leveraged.
D.
____All of the above
E.
____None of the above
10.A general manager should:
A.
____Rely on IS personnel to make IS decisions
B.
____Ignore how IS are used and managed
C.
____Have a deep technical knowledge of IS
D.
____Understand the use and consequences of technologies relevant to the
business
E.
____Not be expected to ask or understand technology related questions
11.Through the use of various technologies, a ski resort tracks the slopes each customer
skis and the times he or she skis them.
Skiers then have the ability to view this
information online, and can choose to seamlessly share their accomplishments on
Facebook. In addition, photographers positioned at the resort post pictures on
Facebook for the skier. This ski resort has worked hard to develop a strong:
A.
____IS Strategy
B.
____Social business strategy
C.
____Business strategy
D.
____Organizational strategy
E.
____Customer strategy
12.The general manager for a retail clothing outlet was recently cited as saying, “IT is the
cornerstone of our company. All of our decisions are based on the sophisticated
systems that we have deployed throughout our organization. IT drives our decisions.”
What position should the manager hold regarding IT and its influence on decision
making?
A.
____IT should drive business decisions.
B.
____Organizational goals should drive IT decisions.
C.
____Organizational strategy should drive IS decision making.
D.
____Business strategy should drive IS decision making
E.
____All strategy should be driven by IT strategy.
13.These are decentralized, public ledgers that verify ownership in a way that cannot be
tampered with, thereby building strong networks of trust between users, backed by this
technology:
A. ____Cryptocurrencies
B.
____Artificial Intelligence
C. ____Blockchain
D.
____Machine Language
E. ____Networks
Page 3 of 10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
14.Porter’s value chain framework suggests that a competitive advantage can stem from:
A.
____Lowering costs and adding value
B.
____Reducing isolated costs
C.
____Disregarding customer data
D.
____Optimizing internal costs
E.
____Improving customer service
15.IT has altered employees and the way they work by doing all of the following EXCEPT:
A.
____Creating new types of jobs
B.
____Greatly changing day-to-day tasks
C.
____Supporting new ways to manage talent
D.
____Needing more technically knowledgeable individuals
E.
____Providing distinct lines between work and play
16._________________________is (are) an all-encompassing tool used for modeling,
building, executing, and monitoring business processes that go across organizational
boundaries (and often systems).
A.
____Enterprise system
B.
____Workflow diagrams
C. ____SharePoint
D.
____Business Process Management systems
E.
____Integrated information systems
17.The major difference between an ERPII and ERP III system is which of the following
features?
A.
____Advances in software usability and flexibility
B.
____Information is made immediately available to external stakeholders using
social and collaborative tools
C.
____Information is made available to all departments in the company
D.
____Advanced quering and reporting capabilities
E.
____Close integration with e-business technologies
18.The architecture that the large paper company Mohawk adopted enables the company
to scale technology services up and down instantaneously according to its needs. The
architecture is called:
A. ____Centralized
B. ____Decentralized
C. ____Service-oriented
D. ____Internet-based
E. ____Mainframe
19.A manager must know enough about the IT architecture and IT infrastructure so that he
or she can:
A.
____Select the correct wireless provider.
B.
____Make realistic use of IT and know what to expect from IT.
C.
____Choose the appropriate IT infrastructure components.
D.
____Limit future business options.
E.
____Ensure a rigid IT structure.
Page 4 of 10
20.Which of the following best describes cloud computing?
A.
____Virtual desktop computing
B.
____Lightweight software that takes up little storage space
C.
____Computing services that can be accessed on demand across the Internet
D.
____The World Wide Web
E.
____Mobile-based social IT
21.The layers of enterprise architecture are: business, application, information, and:
A.
____Enterprise software
B.
____A centralized architecture
C.
____IT systems
D. ____Technology
E.
____A framework
22.Which of the following provides a blueprint for translating a business strategy into a plan
for IS?
A.
____IS infrastructure
B.
____IS architecture
C.
____ERP systems
D.
____Centralized architecture
E. ____SOA
23.This is a digital currency in which transactions are verified and records maintained by a
decentralized system using cryptography, rather than by a centralized authority:
A. ____Cryptocurrency
B. ____Blockchain
C. ____Bitcoin
D.
____Artificial Intelligence
E.
____Machine Language
24.Which type of computer/IT architecture is limited to a central computer system?
A. ____Mainframe
B. ____Web-services
C. ____Peer-to-peer
D. ____Wireless
E. ____Server-to-server
25.The archetype that is represented by a group of business executives that might or might
not include the CIO is:
A.
____IT monarchy
B. ____Feudal
C. ____Federal
D.
____Business monarchy
E.
____IT duopoly
Page 5 of 10
26.Which of the following is the architecture where significant hardware, software, and
possibly even data elements reside on the Internet?
A.
____Internet-oriented architecture
B.
____TCP/IP architecture
C.
____Web or Cloud-based architecture
D.
____Mobile architecture
E.
____Centralized architecture
27.A small company in Des Moines wants to set up an IT infrastructure for its workforce.
The company recently moved to an older building that has solid walls and ceilings.
Furthermore, most of the staff likes the flexibility of moving around the open office space
to perform work on their laptops. Which communication infrastructure makes most
sense for this company?
A. ____Mainframe
B. ____Web-services
C. ____Peer-to-peer
D. ____Wireless
E. ____Server-to-server
28. Many organizations and even consumers use what to control access to a network like
the Internet, allowing only authorized traffic to pass?
A. ____Encryption
B. ____VPN
C. ____Firewall
D.
____Anonymizing tools
E. ____Filtering
29.Who is responsible for decisions about security strategy?
A.
____IT people
B.
____Shared: IT leaders and business leaders
C.
____Business leaders
D. ____Consultants
E.
____Team of consultants and IT people
30.Who is responsible for developing a cybersecurity culture?
A.
____IT people
B.
____IT leaders and business leaders share responsibility
C.
____Business leaders
D. ____Consultants
E.
____Team of consultants and IT people
31.An “evil twin” in the context of computer security is:
A.
____A virus-laden attachment that looks just like a sincere attachment
B.
____A duplicate badge that allows a nasty person entry into a data center
C.
____Someone who looks just like the Chief Information Officer, but steals data
D.
____An operating system that is not genuine
E.
____A counterfeit Wi-Fi connection in a hotel or coffee shop that appears to be
genuine
Page 6 of 10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
32.It usually takes ____ for someone in a firm to discover a security compromise in a
system, after the evidence shows up in logs or alerts
A.
____Several seconds
B.
____Several minutes
C.
____Several hours
D.
____Several days
E.
____Several months
33.Each of the following statements is true EXCEPT which one?
A.
____Blockchains can be private, public, or a hybrid that takes aspects from each
blockchain type
B.
____A public blockchain can be audited by any node
(i.e., computer)
on the
network,
C.
____A private blockchain can only be verified by those authorized to be on the
network
D.
____Private blockchains with tighter controls on who is involved in the process
have the authority to alter transactions if needed
E.
____Bitcoin is not considered a public blockchain
34.In the Anthem Blue Cross breach, where 80 million names, birthdays, social security
numbers, etc., were stolen, the hackers got in by:
A.
____Breaking into the building where they were stored
B.
____Obtaining passwords of five or more high-level employees
C.
____Making phone calls to insiders posing as IT people needing to log into their
accounts
D.
____Emailing each of the 80 million patients asking for their private information
E.
____Recovering patient records from a large recycling bin
35.According to the research by Peter Weill, a firm that boosts investments in infrastructure
is typical of those firms with a focus on (1) _______ and a firm that boosts investments
in transaction systems is typical of those firms with a focus on (2) ______
A.
____ (1) transactions (2) connections
B.
____ (1) savings (2) expansion
C.
____ (1) cost (2) ability
D.
____ (1) agility (2) cost
E.
____ (1) ability (2) agility
36.The responsibility of the IT organization is to:
A.
____Manage core business functions like selling, accounting and manufacturing.
B.
____Partner with business managers to ensure the right IS exists to support the
business strategy.
C.
____Set the business strategy.
D.
____Have sole responsibility for building information systems for the
organization.
E.
____Design business processes.
Page 7 of 10
37.Which method of IT funding is the most equitable, as the costs associated with IT are
based on use?
A. ____Allocation
B.
____Corporate budgeting
C. ____Usage
D. ____Distributed
E. ____Chargeback
38.Which financial calculation provides a percentage rate that measures the relationship
between the amount the business gets back from an investment and the amount
invested?
A. ____IRR
B. ____ROI
C. ____Payback
D. ____NPV
E. ____EVA
39.Which of the following plans is designed to counter a manmade or natural disaster that
could cripple an enterprise?
A.
____Business Continuity Plan
B.
____Disaster Recovery Plan
C.
____Business Disaster Plan
D.
____Disaster Business Case
E.
____Business-IT Maturity Model
40.Scorecards provide a summary of information gathered over a period of time. Another
common IT monitoring tool is the:
A. ____Baseline
B. ____Metrics
C. ____Portfolio
D. ____Dashboard
E. ____Monitor
41.A CIO must spend part of the day performing _____ tasks and some part of the day
working on operational tasks. Rarely can a CIO focus on just one task in any given day.
A. ____Administrative
B. ____Strategic
C. ____Database
D. ____Financial
E. ____Technology
42.Which dimension of the Balanced Scorecard answers the question “How do customers
see us?”
A.
____Customer Perspective
B.
____Innovating and Learning Perspective
C.
____Internal Business Perspective
D.
____Financial Perspective
E.
____Supplier Perspective
Page 8 of 10
43.Artificial intelligence (AI) is the simulation of human intelligence processes by machines,
especially computer systems. Each of the following is a specific application of AI
EXCEPT which one?
A.
____Expert Systems
B.
____Natural Language Processing
C. ____Databases
D.
____Speech Recognition
E.
____Machine Vision
44.In the early days of IT, the CIO would report to the ____ as IT was seen as a way to
control costs. As technology has become more strategic and able to deliver a
competitive advantage, CIOs now report directly to the ____.
A.
____CFO; CEO
B.
____CEO; CFO
C.
____CFO; COO
D.
____COO; CEO
E.
____CEO; CTO
45.Which dimension of the balanced scorecard answers the question “How do we look to
shareholders?”
A.
____Customer perspective
B.
____Innovating and learning perspective
C.
____Internal business perspective
D.
____Financial perspective
E.
____Supplier perspective
46.In which type of organization management does IT control most of its IT infrastructure in
one location?
A.
____Distributed IS organization
B.
____Decentralized IS organization
C. ____Federalism
D.
____Joint-Control IS organization
E.
____Centralized IS organization
47.The computer program that uses artificial intelligence (AI) technologies to simulate the
judgment and behavior of a human or an organization that has expertise and
experience in a particular field, is:
A.
Decision Support Systems
B.
Deep Learning
C.
Expert Systems
D.
Management Information Systems
E.
Natural Language Processing
Page 9 of 10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
48.Joe works for a company where the IT department charges him for the number of CRM
login accounts that are in his department. What type of IT funding model is his company
deploying?
A. ____Allocation
B.
____Corporate budgeting
C. ____Usage
D. ____TCO
E. ____Chargeback
49.________ of the 1980s allowed computing power to spread and gave rise to a
decentralized approach to IT governance.
A. ____Servers
B. ____Mainframes
C. ____Networks
D. ____PCs
E.
____The WWW
50.Denise works for a company where the IT department charges her department for
actual usage of a SharePoint server, determining how often users log in and how much
storage space her department consumes. What type of IT funding model is the
company deploying?
A.
____Allocation method
B.
____Corporate budget method
C.
____Usage method
D.
____Distributed method
E.
____Chargeback method
Page 10 of 10