CSCI 321 Final Exam McNeese State University

Ace your homework & exams now with Quizwiz!

The chief knowledge officer is responsible for overseeing all uses of MIS and ensuring that MIS strategically aligns with business goals and objectives.

False

The chief technology officer (CTO) is responsible for ensuring the security of MIS systems and developing strategies and MIS safeguards against attacks from hackers and viruses.

False

The chief technology officer is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks from hackers and viruses.

False

The project managers are individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion.

False

What is a project manager?

A project manager is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure that the project is completed on time and on budget.

Nearshore outsourcing occurs when using organizations from developing countries to write code and develop systems. In offshore outsourcing, the country is geographically far away.

Offshore outsourcing occurs when using organizations from developing countries to write code and develop systems. In offshore outsourcing, the country is geographically far away.

Which of the following includes the roles and responsibilities of the chief knowledge officer (CKO)?

The CKO is responsible for collecting, maintaining, and distributing company knowledge.

Which of the following includes the roles and responsibilities of the chief privacy officer (CPO)?

The CPO is responsible for ensuring the ethical and legal use of information within a company.

Which of the following includes the roles and responsibilities of the chief technology officer (CTO)?

The CTO is responsible for ensuring the speed, accuracy, availability, and reliability of the MIS.

Jeremy Bridges is an executive for Green Web Designs, where his primary role is to ensure the security of business systems and develop strategies to protect the company from online viruses and hackers. What is Jeremy's role within the company?

The chief security officer is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses.

What is the primary responsibility of the CTO?

The chief technology officer is responsible for ensuring the speed, accuracy, availability, and reliability for MIS.

The chief security officer (CSO) is responsible for ensuring the security of MIS systems and developing strategies and MIS safeguards against attacks from hackers and viruses.

True

The chief security officer is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks from hackers and viruses.

True

The chief technology officer is responsible for ensuring the speed, accuracy, availability, and reliability for MIS.

True

The project stakeholders are individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion.

True

John Cleaver is the CEO of Tech World, a retail store that sells computers, monitors, cameras, televisions, and many other electronic products. John and his executive team are meeting to brainstorm new ideas on how to grow the business. One idea is to mimic a competitor product that is attempting to sell a new product in a different industry. After performing a Porter's Five Forces Model analysis, John determines that all of the forces are high in this new industry. What should John do?

When the five forces are all strong or high, it is a poor business strategy; when the forces are low, this is a great time to execute the business strategy.

Which of the following includes the roles and responsibilities of the chief security officer (CSO)?

ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses

Which of the following does a project manager perform?

expert in project planning and management tracks the plan to ensure all key project milestones are completed on time defines and develops the project plan

The chief privacy officer is responsible for ensuring the ethical and legal use of information within a company.

True

Cody Osterman holds an executive position at Trek Enterprises. His role is the newest senior executive position at the organization. He has advised the company on privacy procedures and processes, and has initiated a training program for employees about the privacy policy, customer confidentiality, and data security. Based on this description, what position does Cody hold at Trek Enterprises?

Based on this description, Cody is the chief privacy officer (CPO) at Trek Enterprises.

Eric Eberly holds an executive position at Parker Industries. He has designed and implemented a system to collect, maintain, and share information across the many departments of Parker Industries. He's also instilled an updating protocol requiring department heads to keep the system up-to-date. Based on this description, what position does Eric hold?

Based on this description, Eric is the chief knowledge officer (CKO) at Parker Industries.

Which of the following is not a broad function of a chief information officer?

Broad functions of a CIO include manager, leader, and communicator.

In-sourcing is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.

False

Nearshore outsourcing occurs when using organizations from developing countries to write code and develop systems. In offshore outsourcing, the country is geographically far away.

False

Offshore outsourcing occurs when engaging another company within the same country for services.

False

Onshore outsourcing occurs when contracting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country.

False

Greg works for Geneva Steel Corporation. Greg's duties include managing the overall processes for the company and transforming the steel resources into goods. Which department would Greg most likely work in?

Operations management manages the process of converting or transforming of resources into goods or services.

Sandy Fiero works as the chief knowledge officer for Bend Lumbar Company. She has been given the responsibility to create a product or service that will bring an added value to its customers to increase the company's revenue. Sandy determines that the best value she can add is by creating a service that offers free next-day shipping on any order over $50. Where in the value chain is Sandy adding value?

Outbound logistics distributes goods and services to customers.

Shawn McGill is on the executive board for ABC Pharmaceuticals. The company produces the top-selling cancer-fighting drug on the market. Due to its incredible success, ABC Pharmaceuticals has decided to increase the cost of the drug from $8 a pill to $15 a pill. Which force is ABC Pharmaceuticals using to increase its drug price?

Supplier power, one of Porter's five forces, measures the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services).

Which of the following includes the roles and responsibilities of the chief data officer (CDO)?

The CDO is responsible for determining the types of information the enterprise will capture, retain, analyze, and share.

Which of the following includes the roles and responsibilities of the chief information officer (CIO)?

The CIO is responsible for overseeing all uses of MIS and ensuring that MIS strategically aligns with business goals and objectives.

In-sourcing (in-house development) uses the professional expertise within an organization to develop and maintain its information technology systems. In-sourcing has been instrumental in creating a viable supply of IT professionals and in creating a better-quality workforce combining both technical and business skills.

True

In-sourcing has been instrumental in creating a viable supply of IT professionals and in creating a better-quality workforce combining both technical and business skills.

True

Many chief privacy officers (CPOs) are lawyers by training, enabling them to understand the often complex legal issues surrounding the use of information.

True

Nearshore outsourcing occurs when contracting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country.

True

Offshore outsourcing occurs when using organizations from developing countries to write code and develop systems. In offshore outsourcing, the country is geographically far away.

True

Onshore outsourcing occurs when engaging another company within the same country for services.

True

Outsourcing is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.

True

The chief information officer is responsible for overseeing all uses of MIS and ensuring that MIS strategically aligns with business goals and objectives.

True

The chief knowledge officer is responsible for collecting, maintaining, and distributing company knowledge.

True

The chief privacy officer (CPO) is responsible for ensuring the ethical and legal use of information within an organization.

True


Related study sets

Chapter 15 Understanding The Principles of Infection Control worksheets

View Set

Chapter 30: Basic Pediatric Nursing Care NCLEX QUESTIONS QUIZ 8

View Set

Strategic Emphasis and Performances

View Set

Section 13 - Describing the Incident Response Plan

View Set