MIS 480: Exam 2 Review Quiz Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Select all the characteristics below that are part of an Ideal IT-Business partnership.

- A blurred line between business and IT - Trust between the two groups - Mutual recognition of IT value

Select all the activities below that the focus group did not identify as IT's role in disruption

- Advise changes to the organization goals to incorporate a disruption - Select disruptive technologies to implement

Which of the following are overarching principles for governing shadow-IT? (check all that apply)

- All shadow-IT is subject to oversight - All shadow-IT must be identified

Select all the items below that benefits of shadow-IT.

- Brings customer requirements front and center - Solves the little stuff - Unlocks opportunities for a longer-term strategy

Select all the items below that are not part of the hierarchy of business needs of IT to deliver real business value.

- Business degree - Technical capability

Which of the following are reasons that shadow-IT reduces business value, according to IT-managers? (check all that apply)

- Duplicate data - Information silos

Select all the items below that are risks of shadow-IT.

- Inefficiencies in technology procurement - Hidden costs - Single point of knowledge

Which of the following are reasons for the growth of shadow-IT?

- Lower perceived cost - The consumerization of business applications - Due to pressures of digital transformation

Select all the methods below in which senior management enables a successful IT-business partnership.

- Modeling the expected behavior - Outlining the process to produce results - Setting the tone and direction

Select all the items below that are a source of organizational disruption.

- New delivery methods - New risks

Select all the items below that are not a source of organizational disruption.

- New governance framework - New Management - New structural changes

Select all the reasons below that cloud computing disruption has not benefitted the IT group within an organization.

- Simplifies application governance - Improves controls and standardization across the organization

Of the following generic roles, which is/are not assumed by IT?

- Strategy builder - Customer support

Which of the following are considered roadblocks to achieving an ideal future state in the face of disruption? (check all that apply)

- Technology - People, Processes, and Structures

Select all the characteristics below that tend to be part of IT-Business partnerships in reality.

- The business is often disengaged from IT work - Business assumptions of IT tend to cluster into patterns - The partnership varies by individual, process, and function at multiple levels

What are the characteristics that tend to be part of IT-Business partnerships in reality?

- The partnership varies by individual, process, and function at multiple levels - Business assumptions of IT tend to cluster into patterns - The business is often disengaged from IT work

Of the following, which describe the results of complex relationships, such as the one between IT and business? (check all that apply)

- Unclear accountabilities - Unclear expectations - Difficulty communicating

Which of the following are not reasons that make it difficult for an organization to catch up after a technology disruption? (check all that apply)

- governance - IT's Knowledge

Partnership

A long-term commitment towards shared goals

Business-IT partnership

A multifaceted interaction between people and processes

Roadblock to IT responding to Disruption: People

A new type of IT functions will call for new It capabilities and skills

In the future, (A) will evolve from enabling simple (B), to (C) remote interactions across a network, to (D) where APIs are facilitating and (E) the development of new (F), to ultimately becoming the actual (G) or services a company delivers.

APIs, Connectedness, supporting, platforms, accelerating, services, products

Workarounds

Adapting an existing work system to circumvent constraints imposed by the original system design

Problems arise when the ___________ espoused by IT conflict with those of the organization or a part of the organization.

Assumptions and values

Third Party Access

Authorizing access to a third party to connect to an organization's network to use a sanctioned service

Necessity

Being under pressure to transform and innovate quicker than IT responds

Roadblock to IT responding to Disruption: Process and Structures

Can inhibit what is possible to do and how people think of these possibilities

Some people suggest that democratization of IT is a natural evolution; therefore, Shadow-IT should be called ____________.

Citizen development

Leveraging Shadow IT: IT needs a new mandate

Closely link IT and BT together, treating them as one comprehensive set of capabilities

Bricolage

Constructing larger scale solutions that bypass formal systems using whatever technology is available

Provide choice within guidelines explanation:

Create an approved list of vendors and suppliers

Transform shadow-IT explanation:

Create citizen development programs that are fostered and managed by IT

Keeping agreements and acting with integrity, honesty, and openness are essential for maintaining _____________.

Credibility

Management of Politics and Conflict

Developing ways to effectively address conflict and to deliver creative solutions

Which of the following is not a result of moving into the API Economy

Differentiation is from the partners in an ecosystem.

Ease of Use

Downloading and configuring powerful systems without the assistance of IT

Decompose IT service offerings explanation:

Enable business users to leverage valuable IT services

Define clear accountabilities explanation:

Enable value and reduce risk

Assign IT resources explanation:

Ensure shadow IT-project work within IT guidelines, standards, and policies

Update policies and guidelines explanation:

Establish guide rails and touchpoints to manage and direct shadow-IT

An IT-business partnership can flourish without senior management participation.

FALSE

Being technically competent is sufficient to have credibility with the business.

FALSE

By operating IT like-a-business, the business's expectations of IT are met.

FALSE

IT's traditional risk-taking approach to technology works well in a disruptive environment.

FALSE

Much of Shadow-IT is for the rapid development of front-end software.

FALSE

Shadow-IT is a phenomenon from the early adoption of cloud-based solutions, and IT will evolve to regain control over all IT in an organization.

FALSE

Technology osmosing outwards from IT is an evolutionary phase in organizational change.

FALSE

The disruptor is best positioned to take advantage of the technological disruption; therefore, innovation must be a priority.

FALSE

Match each phrase below with a lettered blank in the following sentence: According to Christensen, a business can (A) in the face of (B) because it will ignore (C) and continue to (D) that made it (E) for too long.

Fail, technological change, innovations, follow the paths, successful

IT’s inability to relate to the business

Growing demand for IT services results in a greater decision-making gap

Insist on Business Participation

Helps IT think more broadly about the future

Leveraging Shadow IT: IT needs new skills

Hybrid career paths that combine business and IT capabilities

Inter-personal relationship

Internally within and across organizational units; externally with vendors, customers, suppliers

Develop New Capabilities

Need to understand better the end-customers and how to build and leverage ecosystems

Adjust Governance

None

Competitive pressure

None

Facilitation

None

Roadblock to IT responding to Disruption: Governance

None

Undisclosed

None

Which of the following definitions does not describe/apply to shadow-IT?

None of the other answers

Which of the following is not a definition/characteristic of an API?

None of the other answers

Which of the following is not a prediction made by the focus group about the future of IT?

None of the other answers

Which of the following is not an assumption that business often makes about IT?

None of the other answers

IT processes and Constraints

Perceiving IT as not responsible enough and lacking necessary tools and capabilities

Relationship

Primarily between individuals in the fulfillment of immediate needs

Sometimes, IT _______ are such a significant obstacle to change that organizations may just give up the effort.

Processes

Software-as-a-Service

Purchasing standard software from the cloud that promises them flexibility and productivity and the ability to facilitate user-driven innovation

Leveraging Shadow IT: IT needs to devote resources to BT

Requires the thoughtful and intentional transformation of both IT and BT functions

Make Innovation a Priority

Requires working at the intersection of what is possible with technology, desirable for customers, and viable in the marketplace

Educate all employees explanation:

Set expectations and understand the implications of using shadow-IT

Which of the following specialized skills will not be needed by IT to facilitate business technology?

Solution architect

__________ is central to dealing with disruption and can spell the difference between planned change and survival.

Speed of response

The first goal of managing disruption is to

Stay relevant

Match each word below with a lettered blank in the following sentence: A (A) IT-business (B) is one where realistic expectations are clearly articulated and communicated through both (C) and procedural interactions and where both (D) recognize that all facets of this (E) are important to the (F) delivery of IT (G).

Strong, Partnership, Individual, Groups, Relationship, Success, Value

Unintended Use

Succumbing to social pressure to use unapproved tools that others are using for communication or to share knowledge

Which of the following statements below does not describe the traditional business-IT partnership?

Supportive

A lack of trust is a consequence of a lack of clarity around expectations and accountabilities.

TRUE

It is estimated that one-third of successful attacks on enterprises will be on data located in shadow-IT resources.

TRUE

It is often difficult for an existing organization to catch up because of its embedded culture, processes, and systems designed for its current structure and activities.

TRUE

Shadow-IT can result in the loss of an enterprise strategic IT roadmap.

TRUE

Shadow-IT is a growing gap between the organization-sanctioned IT and what employees are using.

TRUE

The most effective way to build trust is through effective governance

TRUE

The telephone is an example of an initially non-disruptive technology that became disruptive after many years of evolving.

TRUE

Leveraging Shadow IT: Partner more effectively BT initiatives

Take advantage of the business's skills and specialized knowledge to create more innovative and relevant technology.

_________ is like experiments and proofs of concept that explore how to make sense of new technologies and ways of working.

Taking out learning options

Rising Expectations

Technically capable, digitally adept younger workers joining the business

Non-Technical Communication

The ability to use business language

Social Skills

The bonds that build trust and mutual understanding between diverse groups

Redesign Enterprise Architecture

The right function to drive efforts to identify and manage disruption

Professionalism

The unarticulated set of working behaviors, attitudes, and expectation that keeps teams of diverse individuals working towards the same goal

Embrace Disruption

The worst thing an IT leader can do is ignore disruption

_____________ is essential for both superior performance and for developing the collaborative relationships that lead to success.

Trust

Lower perceived cost and turnaround

Trusting an external provider because of perceiving IT as inefficient and ineffective

End-user Computing

Using enterprise-approved tools and systems to develop localized solutions that may go well beyond their originally intended purpose

Personal IT

Using personal technology developed for consumers for business purposes

Shadow-IT becomes Business Technology (BT) when rogue IT becomes __________.

Visible

Roadblock to IT responding to Desruption: Technology

existing legacy systems are often based on brittle infrastructure

Moving to new modes of ___________and ____________ is likely to have dramatic impacts on the structure and function of the IT organization of the future.

infrastructure; service delivery


संबंधित स्टडी सेट्स

NURS 321: Leadership Module 2.03

View Set