• Question 1
2 out
of 2 points
TJX’s
handling of its serious data breach is consistent with which one of the
following?
• Question 2
2 out
of 2 points
This
is a balanced approach to managing a company’s IT organization.
• Question 3
2 out
of 2 points
All
of the following are main processes of knowledge management EXCEPT:
• Question 4
2 out
of 2 points
This
project cycle plan chart looks very much like a bar chart and is easy for
management to read because of its visual nature.
• Question 5
2 out
of 2 points
IT
organizations implement powerful information systems like ERP and SCM that
provide centralized data repositories. In addition, IT organizations provide
business units with tools that individuals can use to report on and analyze
collected data. This IT governance approach is best described as: ________.
• Question 6
2 out
of 2 points
All
of the following are common elements of a BI system EXCEPT for:?
• Question 7
2 out
of 2 points
This
allows individuals to own their creativity and innovation in a way similar to
owning physical property.
• Question 8
0 out
of 2 points
To
maintain balance in a project with a fixed budget and a well-defined scope, a
project team will require flexibility ________.
• Question 9
2 out
of 2 points
What
principles, developed in 2000 by the US Department of Commerce (DOC) in
consultation with the European Commission, allow U.S. companies to be placed on
a list maintained by the DOC?
• Question 10
2 out
of 2 points
If
a company decides to make and develop IS, they are using this type of sourcing.
• Question 11
2 out
of 2 points
Which
normative theory of business ethics would TJX have displayed if it had informed
customers as soon as the breach was corrected and told other retailers how to
prevent future security breaches?
• Question 12
2 out
of 2 points
The
initial reason organizations outsourced IT was which one of the following?
• Question 13
2 out
of 2 points
Knowledge
that has been identified, captured, and leveraged to produce higher-value goods
or services or some other competitive advantage for the firm is called:
• Question 14
2 out
of 2 points
The
purchase of a good or service that was previously provided internally, or that
could be provided internally, is called:
• Question 15
2 out
of 2 points
This
method of IT funding is the most equitable, as the costs associated with IT are
based on use. However, it can be difficult and tedious to calculate the usage
costs.
• Question 16
2 out
of 2 points
What
is at the center of the project triangle?
• Question 17
2 out
of 2 points
In
the chapter, there is the statement, “Internet companies are in business for
the money and hence they really would prefer to keep their customers in the
dark about how their personal data is being used to generate profits”. Assuming
this statement is true, with which ethical theory would you say these Internet
companies are most aligned?
• Question 18
2 out
of 2 points
The
European Union Directive on Data Protection does all of the following EXCEPT:
• Question 19
2 out
of 2 points
________
of the 1960’s dictated a centralized approach to IT governance.
• Question 20
2 out
of 2 points
______________
organizations scatter IT components in different locations to address local
business needs.
• Question 21
2 out
of 2 points
________________
is the process of analyzing data warehouses for “gems”.
• Question 22
2 out
of 2 points
After
its PlayStation Network service was compromised, Sony realized that it needed to
establish better ____________ governance.
• Question 23
2 out
of 2 points
This
type of organization management is where IT controls most of its IT
infrastructure in one location.
• Question 24
2 out
of 2 points
Which
one of the following is NOT one of the four essential elements of any project?
• Question 25
2 out
of 2 points
All
of the following are frameworks for implementing Sarbanes-Oxley compliance
EXCEPT:
No comments:
Post a Comment