6. The level of Organizational IT capacity planning maturity, at which "fire-fighting" is eliminated is: A. Level 1 B. Level 2 C. Level 3 D. Level 4 E. Level 5 7. The Ansoff Product/Market Matrix lists the Diversification strategy under: A. Present market, Present product B. Present market, New product C. New market, New Product D. New Market, Present Product 8. The Act prohibits the government from collect5ing information secretly? A. Privacy Act of 1974 B. Privacy Protection Act of 1980 C. Computer Security Act of 1987 D. Federal Internet Privacy Protection Act of 1997 E. None of These

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
6. The level of Organizational IT capacity planning maturity, at which "fire-fighting" is eliminated is:
A. Level 1
B. Level 2
C. Level 3
D. Level 4
E. Level 5
7. The Ansoff Product/Market Matrix lists the Diversification strategy under:
A. Present market, Present product
B. Present market, New product
C. New market, New Product
D. New Market, Present Product
8. The
Act prohibits the government from collect5ing information secretly?
A. Privacy Act of 1974
B. Privacy Protection Act of 1980
C. Computer Security Act of 1987
D. Federal Internet Privacy Protection Act of 1997
E. None of These
9. The Application Prioritization Matrix lists applications with High Business Impact and Low Ease of
Execution as:
A. Must Haves
B. Quick Wins
C. Money Pits
D. Low hanging fruit
10. The most popular (most often cited) element in a company's business continuity plan is
A. Business Process Recovery
B. Technology Recovery
C. Crisis Management
D. Data Recovery
E. Facilities
11 Which of the following is a secondary activity in a firm's Value Chain,
A. Inbound Logistics
B. Procurement
C. Outbound Logistics
D. Marketing and Sales
E. Operations
Transcribed Image Text:6. The level of Organizational IT capacity planning maturity, at which "fire-fighting" is eliminated is: A. Level 1 B. Level 2 C. Level 3 D. Level 4 E. Level 5 7. The Ansoff Product/Market Matrix lists the Diversification strategy under: A. Present market, Present product B. Present market, New product C. New market, New Product D. New Market, Present Product 8. The Act prohibits the government from collect5ing information secretly? A. Privacy Act of 1974 B. Privacy Protection Act of 1980 C. Computer Security Act of 1987 D. Federal Internet Privacy Protection Act of 1997 E. None of These 9. The Application Prioritization Matrix lists applications with High Business Impact and Low Ease of Execution as: A. Must Haves B. Quick Wins C. Money Pits D. Low hanging fruit 10. The most popular (most often cited) element in a company's business continuity plan is A. Business Process Recovery B. Technology Recovery C. Crisis Management D. Data Recovery E. Facilities 11 Which of the following is a secondary activity in a firm's Value Chain, A. Inbound Logistics B. Procurement C. Outbound Logistics D. Marketing and Sales E. Operations
12. The application portfolio matrix identifies those information systems as Turnaround where.
A. Impact is High and Dependence is High
B. Impact is Low and Dependence is Low
C. Impact is Low and Dependence is High
D. Impact is High and Dependence is Low
13. Factors that can trigger unethical Employee Behavior include:
A. Poor Leadership
B. Little or no Recognition of Achievement
C. Personal financial worries
D. Insufficient Resources
E. All of the above
14 Each the following is considered a benefit of a ralized organizational structure except:
A. expertise is shared among all organizations within the firm.
B. there is increased communication between business units.
C. there are clear career paths and training programs.
D. there is back up because of the redundancy of skills within the work unit.
E. None of the above
15. The COBIT Framework has 6 objectives that include:
A. Planning and Organization
B. Acquisition and implementation
C. Delivery and Support
D. Monitoring
E. All of the above
16 Enterprise Resource Planning systems such as SAP best describe which category of the Application
Portfolio Matrix?
a. Turnaround applications
b. Factory applications
c. Strategic applications
d. Support applications
e. Custom Applications
Transcribed Image Text:12. The application portfolio matrix identifies those information systems as Turnaround where. A. Impact is High and Dependence is High B. Impact is Low and Dependence is Low C. Impact is Low and Dependence is High D. Impact is High and Dependence is Low 13. Factors that can trigger unethical Employee Behavior include: A. Poor Leadership B. Little or no Recognition of Achievement C. Personal financial worries D. Insufficient Resources E. All of the above 14 Each the following is considered a benefit of a ralized organizational structure except: A. expertise is shared among all organizations within the firm. B. there is increased communication between business units. C. there are clear career paths and training programs. D. there is back up because of the redundancy of skills within the work unit. E. None of the above 15. The COBIT Framework has 6 objectives that include: A. Planning and Organization B. Acquisition and implementation C. Delivery and Support D. Monitoring E. All of the above 16 Enterprise Resource Planning systems such as SAP best describe which category of the Application Portfolio Matrix? a. Turnaround applications b. Factory applications c. Strategic applications d. Support applications e. Custom Applications
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Development strategies
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education