ISDS EXAM 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

Positive perception, adoption, and institutionalization are the stages of the _____ phase of the Change Management Continuum Model. Select one: a. Contact b. Educate c. Commit d. Inform

B. Educate

Which of the following is a phase of the Change Management Continuum Model? Select one: a. Perception b. Initialization c. Adopt d. Inform

D- inform

Which of the following supports the flow of data among different organizations to achieve shared goals? Select one: a. Product life cycle management b. Interorganizational information system c. Enterprise resource planning system d. Customer relationship management

b. Interorganizational information system

Which of the following models is used to assess the nature of industry competition? Select one: a. McKinsey 7S model b. Pareto analysis c. Porter's Five Forces Model d. DuPont analysis

c. Porter's Five Forces Model

The scope of the project, the data captured, and the usability of new information technology systems are some of the decisions taken by: Select one: a. managers. b. software developers. c. software testers. d. network administrators

A Managers

John, a product manager, decides to adopt to a new strategy to improve the quality of products served Incorrect by his company. He also has the additional responsibility of convincing his team members to use the new strategy. In the context of innovation adopters, John is an example of a(n): a. early majority. b. late majority. c. laggard. d. early adopter.

Early Adopter

Which of the following is a component used by a cloud user in a cloud computing environment? Select one: a. A smartphone b. A storage device c. A web server d. An operating system

a. A smartphone

Which of the following phases of goalsbased strategic planning defines the mission, vision, values, objectives, and goals of an organization? Select one: a. Direction setting phase b. Situation analyzing phase c. Strategy defining phase d. Plan deploying phase

a. Direction setting phase

Which of the following is the effort made by an ordinarily prudent party to avoid harm to another party? Select one: a. Due diligence b. Business stake c. Outsourcing d. Internal control

a. Due diligence

Identify the industry that has the highest information technology spending. Select one: a. Finance b. Automobile c. Food d. Agriculture

a. Finance

Which of the following challenges is faced by organizations that are moving toward the cloud computing environment? Select one: a. Hidden costs b. Flexible user support c. Invisible system complexity d. Less than expected downtime

a. Hidden costs

strategic planning begins by identifying and analyzing key problems that face the Correct organization, setting strategies to address those problems, and identifying projects and initiatives that are consistent with those strategies. Select one: a. Issuesbased b. Organic c. Goalsbased d. Contingency

a. Issuesbased

Identify a project type that meets the requirements of a legal entity or regulatory agency. Select one: a. Mandatory b. Innovation c. Breakthrough d. Enhancement

a. Mandatory

Which of the following information technologies (IT) include information systems that improve the productivity of individual users in performing stand-alone tasks? Select one: a. Personal IT b. Enterprise IT c. Prototype IT d. Group IT

a. Personal IT

Which of the following is a goal of effective information technology (IT) governance? Select one: a. Risk management b. Strategic alignment c. Operations alignment d. Resource management

a. Risk management

A _____is used for the analysis of the internal assessment and external environment of the firm. Select one: a. SWOT matrix b. transpose matrix c. scalar matrix d. XOR matrix

a. SWOT matrix

Which of the following requires that all reports filed with the Securities and Exchange Commission Correct (SEC) include a statement signed by the chief executive officer and the chief financial officer attesting the accuracy of the information provided in the reports? Select one: a. Section 404 of the SarbanesOxley Act b. Smooth adoption of information technology c. Smooth introduction of information technology d. Diffusion of innovation Act

a. Section 404 of the SarbanesOxley Act

Which of the following scenarios best describes the compromise of confidential data regarding organizational plans, products, or services? a. Senior executive loses laptop containing critical data. b. Employees waste time at work visiting Web sites unrelated to their work. c. Fire destroys all the physical assets in an organization. d. Employees use corporate email to disseminate sexually explicit material.

a. Senior executive loses laptop containing critical data.

_____ benefits can be measured directly and assigned a monetary value. Select one: a. Tangible b. Conceptual c. Intangible d. Abstract

a. Tangible

Patrick, a senior manager, has decided to promote one of his team members as an associate mentor based on her skill and hard work. Which stage in the Plan-Do-Check-Act (PDCA) model corresponds to this scenario? Select one: a. The Do step b. The Check step c. The Act step d. The Plan step

a. The Do step

Which of the following specifies requirements to plan, establish, implement, operate, monitor, review, maintain, and continually improve a documented management system? Select one: a. The International Standards Organizational standard ISO 22301:2012 b. The International Standards Organizational standard ISO 22323:2010 c. The International Standards Organizational standard ISO 22313:2012 d. The International Standards Organizational standard ISO 22320:2011

a. The International Standards Organizational standard ISO 22301:2012

Identify a factor that determines the level of competition and longterm profitability of an industry. Select one: a. The threat of new competitors raises the level of competition. b. The degree of rivalry between competitors is low in industries with many equally sized competitors. c. The bargaining power of suppliers doesn't affect the industry's profitability. d. The threat of substitute products can increase the profitability of industry competitors.

a. The threat of new competitors raises the level of competition.

Which of the following cloud computing technologies separates a physical computing device into one or more devices, each of which can be easily used and managed to perform computing tasks? Select one: a. Virtualization b. Personalization c. Visualization d. Polymerization

a. Virtualization

The strategic planning process for an information technology organization and the factors that influence it depend on: Select one: a. how the organization is perceived by the rest of the organization. b. the leadership style and capabilities of the managers in charge of each unit. c. how the organization sets its strategies and objectives. d. the amount of autonomy granted to the lowerlevel units.

a. how the organization is perceived by the rest of the organization.

A(n) _____ is a statement of a compelling business need that an organization must meet to achieve Incorrect its vision and mission. Select one: a. objective b. logo c. tagline d. mission

a. objective

A _____ captures data from company transactions and other key events, and then updates the firm's records, which are maintained in electronic files or databases. Select one: a. transaction processing system (TPS) b. transaction broadcast system (TBS) c. transaction migration system (TMS) d. transaction secured system (TSS)

a. transaction processing system (TPS)

Identify a component of infrastructure as a service (IaaS) cloud computing. Select one: a. A smartphone b. A network device c. A database d. A laptop

b. A network device

Which of the following protects against identity theft of California residents? Select one: a. California Information Security Management Act b. California Senate Bill 1386 c. California Union Data Protection Directive d. California Secrecy Act

b. California Senate Bill 1386

City-mart, a supermarket chain, used to outsource its logistics service. Over a period of time, the company discovered an irregularity in the amount of products delivered and the payments collected for those products. It was found that the systems for payment acceptance and logistics were breached by a foreign agent in the firm, which led to the termination of the outsourcing contract by City-mart. Which of the following would be the most appropriate issue related to outsourcing in this scenario? Select one: a. Negative impact on customer relationships and satisfaction b. Data security and integrity issues c. Vertical integration d. Horizontal integration

b. Data security and integrity issues

Which of the following systems support the supply chain processes such as order processing, inventory management, and purchasing? Select one: a. Product life cycle management (PLM) b. Enterprise resource planning (ERP) c. Organizational information system (OIS d. Customer relationship management (CRM)

b. Enterprise resource planning (ERP)

Which act identifies the U.S. taxpayers who hold financial assets in non-U.S. financial institutions and offshore accounts? Select one: a. Basel II Tax Accord b. Foreign Account Tax Compliance Act c. Foreign Corrupt Practices Act d. U.S. Senate Bill Act

b. Foreign Account Tax Compliance Act

What approach should be followed by managers to ensure that information technology innovations pay off? Select one: a. Imperialistic b. Holistic c. Relativistic d. Linguistic

b. Holistic

Which of the following types of clouds is integrated through networking and is composed of both private and public clouds? Select one: a. Asymmetric cloud b. Hybrid cloud c. Symmetric cloud d. Grid cloud

b. Hybrid cloud

Which of the following frameworks provides information technology (IT) services based on a synthesis of the best ideas from international practitioners? a. Committee of Sponsoring Organizations (COSO) 2013 b. IT Infrastructure Library (ITIL) c. Control Objectives for Information and Related Technology (COBIT) d. International Standards Organization (ISO) 27002

b. IT Infrastructure Library (ITIL)

Which of the following is true about a core business process? Select one: a. It is easy for competitors to imitate the process. b. It requires an organization's workers to possess unique knowledge and skills. c. It decelerates a product's time to market. d. It has a direct impact on the organization's infrastructure.

b. It requires an organization's workers to possess unique knowledge and skills.

Which of the following project types implements changes to an existing system to enable operation in a different technology environment? Select one: a. Innovation b. Maintenance c. Innovation d. Enhancement

b. Maintenance

Hypermedia, podcasts, and Webcasts are the techniques used in: a. decision enabled systems. b. Online learning systems. c. product lifecycle systems. d. transaction processing systems.

b. Online learning systems.

_____ is an arrangement in which one company contracts with another organization to provide services that could be provided by company employees. Select one: a. Scaling b. Outsourcing c. Manufacturing d. Marketing

b. Outsourcing

Spivy Tech, a software firm, has decided to change one of its services to effectively meet its customer expectations. In the context of Information Technology Infrastructure Library (ITIL), identify the phase of the service life cycle that ensures that the changed services are designed effectively to meet customer expectations. Select one: a. Service operation b. Service design c. Service transition d. Service strategy

b. Service design

Which of the following strategies is based on analyzing the work to be done, including its associated current processes and the level of effectiveness and resources required? Select one: a. Outsourcing contract b. Smart sourcing c. Service-level agreement d. Outsourcing governance process

b. Smart sourcing

Which of the following software delivery approaches provides users remote access to software as a Web-based service? Select one: a. Platform as a service b. Software as a service c. Software deployment approach d. Application deployment approach

b. Software as a service

1. _____ is a process that helps managers identify desired outcomes and formulate feasible plans to achieve their objectives by using available resources and capabilities. Select one: a. Operational planning b. Strategic planning c. Functional planning d. Contingency planning

b. Strategic planning

Which of the following is true about intangible benefits? Select one: a. They can be measured directly. b. They cannot be measured directly. c. They are assigned a monetary value. d. They can be quantified in monetary terms.

b. They cannot be measured directly

Which of the following is a recommended approach for data backup? Select one: a. Allow employees to take copies of vital data home at the end of the work day. b. Use online databases to update and backup the data. c. Store the data in a building adjacent to the company. d. Store all the data in an external disk and place it in the server room.

b. Use online databases to update and backup the data.

he scope of a full _____ addresses the health and safety of all workers. Select one: a. business initiation plan b. business continuity plan c. business improvement plan d. business valuation plan

b. business continuity plan

The Change Management Continuum Model, the Unified Theory of Acceptance and Use of Correct Technology, and the Diffusion of Innovation Theory are the theories that can help: . Select one: a. to implement the section 404 of the SarbanesOxley Act b. in smooth introduction and adoption of information technology. c. in ensuring that information technology risks are mitigated. d. to identify appropriate information technology opportunities.

b. in smooth introduction and adoption of information technology.

When the people of an organization doing the work for another organization are located in another country, the arrangement is called _____. Select one: a. business unit sponsoring b. offshore outsourcing c. horizontal integration d. functional decomposition

b. offshore outsourcing

Bersk, a brewing company, entered into a three-year contract with Seins Inc. According to the contract, Seins Inc. will package and market the beverages produced by Bersk. This is an example of _____. Select one: a. conglomerating b. outsourcing c. amalgamating d. liquidating

b. outsourcing

A _____ communicates an organization's overarching aspirations to guide it through changing Correct objectives, goals, and strategies. a. SWOT matrix b. vision/mission statement c. core statement d. periodic matrix

b. vision/mission statement

Which of the following is considered a part of due diligence? Select one: a. Information security management b. Metrics and best practices of information technology (IT) related processes c. A written and tested business continuity plan d. The scope of the Plan-Do-Check-Act (PDCA) model

c. A written and tested business continuity plan

Which of the following organizations outsources its work? a. Zeta Inc. supplies raw materials to Clips&Hangers, a soap and detergent manufacturing organization. b. Lusach Dine entered into a two-year contract with Soy&Cream for procuring its dairy products. c. Ace Healthcare entered into a five-year contract with Masters Inc. to take care of Ace Healthcare's recruiting process and insurance policies. d. Lenc Inc. is a chain of stores that sells home appliances and is spread across the United States. Goods not available in one of its stores can be procured from its other stores.

c. Ace Healthcare entered into a five-year contract with Masters Inc. to take care of Ace Healthcare's recruiting process and insurance policies.

During which phase of goalsbased strategic planning, a multitude of data is gathered about internal processes and operations, including survey data from customers and suppliers and other objective assessments of an organization? Select one: a. Deploy plan phase b. Define strategies phase c. Analyze situation phase d. Set direction phase

c. Analyze situation phase

_____ is a software delivery approach in which an organization outsources the equipment used to support its data processing operations, including servers, storage devices, and networking components. Select one: a. Service portfolio management b. Software as a service c. Infrastructure as a service d. Enterprise application management

c. Infrastructure as a service

Which of the following is true of internal control? Select one: a. It verifies the taxpayers of a country for their income. b. It checks bank statements of the citizens for accuracy. c. It protects an organization's resources. d. It renews the health insurance of the taxpayers.

c. It protects an organization's resources.

Which of the following is considered a primary goal of effective information technology (IT) governance? Select one: a. Ensuring smooth induction of IT in an organization b. Complying with section 504 of the Sarbanes-Oxley Act c. Mitigating IT-related risks d. Identifying appropriate IT opportunities

c. Mitigating IT-related risks

_____ allows a service provider organization to own and manage the infrastructure (including computing, networking, and storage devices) with tenant organizations by accessing slices of shared hardware resources via the Internet. Select one: a. Voluntary liquidation b. Vertical market integration c. Public cloud computing d. Service portfolio

c. Public cloud computing

_____ are easy to understand, easy to track, and contribute real value to the organization. Select one: a. Taglines b. Mission statements c. SMART goals d. Core values

c. SMART goals

Serios is a software development firm in Canada. It creates an application to guide the development of Maglev trains in Mexico City and outsources the design and maintenance of the application to Ieinsta Inc. in Mexico City. The contract between the firms requires Ieinsta Inc. to use only the software provided by Serios. Ieinsta Inc. has to access the software remotely as a Web-based service. Identify the type of service provided by Serios in this scenario. Select one: a. Infrastructure as a service b. Platform as a service c. Software as a service d. Software deployment service

c. Software as a service

Who receives additional training in crowd control to help workers evacuate from a work area? Select one: a. Floor warden b. Manager c. Supervisor d. Administrative officer

c. Supervisor

Identify the goal of outsourcing governance procedures a. To create complex systems that run themselves, while keeping the system's complexity invisible to the end user in a public cloud environment b. To report on the fairness of the presentation of management's description of a service organization's system and the suitability of the design of the controls c. To ensure that the outsourcing initiative succeeds, even as personnel, business needs, and operating conditions change d. To provide data and resources on the upfront infrastructure costs of a firm and on projects that differentiate their core business process

c. To ensure that the outsourcing initiative succeeds, even as personnel, business needs, and operating conditions change

Which of the following is an excellent way to begin the first phase of strategic planning? Select one: a. To create a set of strategies that will garner committed supporters across the organization b. To track the progress of organization's goals and objectives c. To prepare a historical perspective that summarizes the organization's development d. To identify and analyze key issues faced by the organization

c. To prepare a historical perspective that summarizes the organization's development

Heinsert Inc. is a computer manufacturing firm. Its core business process is the production of efficient processors and storage disks. It outsources the manufacturing of its computer screen to a camera and lens manufacturing firm called Zetax, which is highly efficient and has world-class capabilities. Identify the most appropriate reason why Heinsert outsources its computer screen production. Select one: a. To increase the marketing expenses on its core operation b. To decelerate the products' time to market c. To upgrade its products' capabilities and services d. To increase the revenue of its products

c. To upgrade its products' capabilities and services

VisualDX provides instant access to concise disease information and high quality medical images. This is an example of: Select one: a. word processing system. b. inter organizational information system. c. decision support system. d. online learning system.

c. decision support system.

Data assets must be secured from unwanted intrusion, loss, and alteration. This is to a. ensure the smooth transfer of information technology. b. ensure the smooth induction of information technology. c. ensure the smooth mitigation of risks in information technology. d. ensure the smooth adoption of the systems information technology.

c. ensure the smooth mitigation of risks in information technology.

Customer relationship management (CRM) and product life cycle management (PLM) are common types of: Select one: a. group systems. b. resource planning systems. c. enterprise systems. d. personal systems.

c. enterprise systems.

___ may be daunting and perhaps risky, but the challenge of it grabs people in the gut and gets Correct their juices flowing and creates tremendous forward momentum. Such goals are achieved through a breakthrough in the organization's products or services. Select one: a. SMART (Specific, Measurable, Achievable, Relevant, Time constrained) goals b. Business efficiency goals c. Shortterm goals d. BHAGs (Big Hairy Audacious Goals)

d. BHAGs (Big Hairy Audacious Goals)

The _____ explains how a new idea or product gains acceptance and spreads through a specific population or subset of an organization. Select one: a. Change Management Consistent Model b. Change Management Continuum Model c. Unified Theory of Acceptance and Use of Technology d. Diffusion of Innovation Theory

d. Diffusion of Innovation Theory

Identify a project type that generates substantial new revenue or profits for the firm. Select one: a. Maintenance b. Breakthrough c. Enhancement d. Growth

d. Growth

he set of information technology (IT) hardware, software, and networks in an organization is called its _____. Select one: a. IT Hierarchy b. IT Board c. IT Organization d. IT Infrastructure

d. IT Infrastructure

Which of the following best describes the service transition phase of the Information Technology Infrastructure Library (ITIL)? a. It ensures that the new and/or changed services are designed effectively to meet customer expectations. b. It involves understanding who the IT customers are, the service offerings required to meet their needs, and the IT capabilities and resources required to develop and successfully execute these offerings. c. It provides a means for an IT organization to measure and improve the service levels, the technology, and the efficiency and effectiveness of processes used in the overall management of services. d. It involves following the design to build, test, and move into production the services that will meet customer expectations.

d. It involves following the design to build, test, and move into production the services that will meet customer expectations.

Which of the following is true of the Committee of Sponsoring Organizations (COSO) 2013 framework? Select one: a. It provides a catalog of security and privacy controls for federal information systems and organizations and a process for selecting controls to protect organizational operations. b. It provides a proven and practical framework for planning and delivering information technology-related services. c. It provides best practice recommendations on information security management for use by those responsible for initiating, implementing, or maintaining information security management systems. d. It provides guidance on enterprise risk management, internal control, and fraud deterrence.

d. It provides guidance on enterprise risk management, internal control, and fraud deterrence.

2. Identify a benefit of strategic planning. Select one: a. Provides control mechanisms to assure effective implementation of the actions at the middle or lower level of management b. Provides steps to increase the effective capacity of the operation to meet the requirements c. Provides developed steps to identify inefficiencies in the operation and production sector of an organization d. Provides a framework and a clearly defined direction to guide decision making at all levels throughout the organization

d. Provides a framework and a clearly defined direction to guide decision making at all levels throughout the organization

Which phase of the Information Technology Infrastructure Library (ITIL) involves understanding the service offerings required to meet the needs of the IT customers? Select one: a. Service operation b. Service design c. Service transition d. Service strategy

d. Service strategy

Which of the following best describes the role of an emergency response team in the disaster recovery team? a. They gather and analyze the data needed to make decisions and direct the work of the emergency response team and business recovery team. b. They recommend whether the disaster recovery plan needs to be put into effect or not. c. They assess the extent of the damage and decide if or when it may be safe to reenter the affected work area. d. They help save lives and contain the impact of the disaster

d. They help save lives and contain the impact of the disaster

Which of the following best describes the "AA" priority business function of a firm? a. This business function can be unavailable for several days in times of a major disaster without causing major problems. b. This business function is extremely critical to the operation of the firm and cannot be unavailable for more than a few minutes without causing severe problems. c. This business function, while significant, can be unavailable for up to a few days without causing severe problems. d. This business function is critical to the operation of the firm and cannot be unavailable for more than a few hours without causing severe problems.

d. This business function is critical to the operation of the firm and cannot be unavailable for more than a few hours without causing severe problems.

ScanX is a digital media organization. One of the organization's key business strategies is to launch online courses for high schools. The organization works to develop the platform for the online course on a time constraint. ScanX decides to outsource the launch of the product to clients in various nations so that it can meet the deadline. Which of the following would be the most appropriate reason for ScanX to outsource? Select one: a. To increase marketing expenses on the core operation b. To reduce the revenues and tax expenses c. To increase product deployment expenses d. To accelerate the product's time to market

d. To accelerate the product's time to market

Which of the following is an intent of the Bank Secrecy Act? a. To protect against identity theft by imposing disclosure requirements for businesses and government agencies that experience security breaches that might put the personal information of California residents at risk. b. To strengthen computer and network security within the U.S. federal government and affiliated parties by mandating yearly audits c. To create international standards that strengthen global capital and liquidity rules with the goal of promoting a more resilient banking sector d. To detect and prevent money laundering by requiring financial institutions to report certain transactions to government agencies.

d. To detect and prevent money laundering by requiring financial institutions to report certain transactions to government agencies.

The _____ of an organization makes long term decisions and has an ultimate responsibility for Incorrect strategic planning. 0 points out of 1 Select one: a. chief financial officer (CFO) b. chief technical officer (CTO) c. chief information officer (CIO) d. chief executive officer (CEO)

d. chief executive officer (CEO)

A _____ is a high-level, summary document that defines both the services and the performance and availability levels at which those services will be provided by a service provider to an organization. Select one: a. customer service agreement b. research and analysis service document c. product-level contract d. service-level agreement

d. service-level agreement

Usefulness, ease of use, management expectations, and facilitating conditions are the key factors of: Select one: a. the Diffusion of Innovation Theory. b. the Change Management Consistent Model. c. the Change Management Continuum Model. d. the Unified Theory of Acceptance and Use of Technology

d. the Unified Theory of Acceptance and Use of Technology


Conjuntos de estudio relacionados

Chapter 37 Transport in Plants - Connect Assignment Questions Dr. Mosley

View Set

ATI Fundamentals Practice Questions

View Set

Chapter 1: B. Recognizing Parts of Speech

View Set