Business Driven Information Systems 4th Edition by Paige Baltzan - Test Bank

Business Driven Information Systems 4th Edition by Paige Baltzan - Test Bank   Instant Download - Complete Test Bank With Answers     Sample Questions Are Posted Below   Chapter 05 Organizational Structures That Support Strategic Initiatives   Multiple Choice Questions Which of the following activities does a CIO perform? A. Oversees all uses of information …

$19.99

Business Driven Information Systems 4th Edition by Paige Baltzan – Test Bank

 

Instant Download – Complete Test Bank With Answers

 

 

Sample Questions Are Posted Below

 

Chapter 05

Organizational Structures That Support Strategic Initiatives

 

Multiple Choice Questions

  1. Which of the following activities does a CIO perform?
    A. Oversees all uses of information technology
    B. Ensures the strategic alignment of IT with business goals
    C. Ensures the strategic alignment of IT with business objectives
    D. All of the above

 

  1. Broad functions of a CIO include all of the following, except:
    A. Ensuring the delivery of all IT projects, on time and within budget
    B. Ensuring that the strategic vision of IT is in line with the strategic vision of the organization
    C. Building and maintaining strong executive relationships
    D. Building and maintaining strong customer processes

 

  1. Which issue concerns CIOs the most?
    A. Security
    B. Budgeting
    C. Enhancing customer satisfaction
    D. Marketing

 

  1. Who is responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization’s information technology?
    A. CIO
    B. CPO
    C. CTO
    D. CSO

 

 

  1. Who is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses?
    A. CIO
    B. CPO
    C. CTO
    D. CSO

 

  1. What is intangible creative work that is embodied in physical form?
    A. Intellectual property
    B. Copyright
    C. Pirated software
    D. Fair use doctrine

 

  1. What gives, in certain situations, a person the legal right to use copyrighted material?
    A. Intellectual property
    B. Copyright
    C. Pirated software
    D. Fair use doctrine

 

  1. What is the legal protection afforded an expression of an idea?
    A. Intellectual property
    B. Copyright
    C. Pirated software
    D. Fair use doctrine

 

  1. What are the principles and standards that guide our behavior toward other people?
    A. Intellectual property
    B. Copyright
    C. Pirated software
    D. Ethics

 

 

  1. What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?
    A. Ethics
    B. Privacy
    C. Copyright
    D. Information security

 

  1. What first ever national appointment was made by President Barack Obama?
    A. National Chief Security Officer
    B. National Chief Privacy Officer
    C. National Chief Technology Officer
    D. All of the above

 

  1. The old business axiom “time is money” needs to be updated to more accurately reflect the crucial interdependence between IT and business processes. What is the recommended new phrase?
    A. Uptime is a good business process
    B. Downtime is a bad business process
    C. Uptime is money
    D. Downtime is impossible

 

  1. According to Infonetics research, what is the leading cause of downtime?
    A. Software failure followed by human error
    B. Tornadoes
    C. Power outage
    D. Sink overflow

 

  1. Which of the following is one of the four categories of costs associated with downtime?
    A. Financial performance
    B. Revenue
    C. Damaged reputation
    D. All of the above

 

 

 

True / False Questions

  1. Job titles, roles, and responsibilities do not differ from organization to organization.
    True    False

 

  1. It is the responsibility of the CIO to ensure effective communications between business and IT personnel.
    True    False

 

  1. Ethics are the laws that guide our behavior toward other people.
    True    False

 

  1. Privacy is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
    True    False

 

  1. One of the main ingredients in trust is privacy.
    True    False

 

 

Fill in the Blank Questions

  1. The chief ___________ officer is responsible for collecting, maintaining, and distributing the organization’s knowledge.
    ________________________________________

 

  1. _________ are the principles and standards that guide our behavior toward other people.
    ________________________________________

 

 

  1. __________ is the right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.
    ________________________________________

 

  1. _________ software is the unauthorized use, duplication, distribution, or sale of copyrighted software.
    ________________________________________

 

  1. ________ software is manufactured to look like the real thing and sold as such.
    ________________________________________

 

 

Essay Questions

  1. List and describe the four common IT-related strategic positions.

 

 

 

 

  1. Describe the gap between business personnel and IT personnel and what an organization can do to close this gap.

 

 

 

 

 

  1. Describe the relationship between ethics and privacy.

 

 

 

 

  1. Discuss the reasons why privacy issues lose trust for ebusinesses.

 

 

 

 

  1. Explain how HIPAA protects individual’s health records?

 

 

 

 

 

 

Chapter 05 Organizational Structures That Support Strategic Initiatives Answer Key
 

Multiple Choice Questions

  1. Which of the following activities does a CIO perform?
    A.Oversees all uses of information technology
    B. Ensures the strategic alignment of IT with business goals
    C. Ensures the strategic alignment of IT with business objectives
    D. All of the above

The CIO performs all of the above.

 

AACSB: Use of Information Technology
Learning Outcome: 5.1
Level: Easy
Taxonomy: Knowledge & Understanding

  1. Broad functions of a CIO include all of the following, except:
    A.Ensuring the delivery of all IT projects, on time and within budget
    B. Ensuring that the strategic vision of IT is in line with the strategic vision of the organization
    C. Building and maintaining strong executive relationships
    D. Building and maintaining strong customer processes

The CIO performs the function of manager, leader, and communicator. The CIO typically does not communicate directly with customers.

 

AACSB: Use of Information Technology
Learning Outcome: 5.2
Level: Easy
Taxonomy: Knowledge & Understanding

 

  1. Which issue concerns CIOs the most?
    A.Security
    B. Budgeting
    C. Enhancing customer satisfaction
    D. Marketing

The CIO is most concerned with enhancing customer satisfaction according to the What Concerns CIOs the Most figure.

 

AACSB: Use of Information Technology
Learning Outcome: 5.1
Level: Medium
Taxonomy: Knowledge & Understanding

  1. Who is responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization’s information technology?
    A.CIO
    B. CPO
    C. CTO
    D. CSO

This is the definition of Chief Technology Officer (CTO).

 

AACSB: Use of Information Technology
Learning Outcome: 5.1
Level: Easy
Taxonomy: Knowledge & Understanding

  1. Who is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses?
    A.CIO
    B. CPO
    C. CTO
    D. CSO

This is the definition of Chief Security Officer (CSO).

 

AACSB: Use of Information Technology
Learning Outcome: 5.1
Level: Easy
Taxonomy: Knowledge & Understanding

 

  1. What is intangible creative work that is embodied in physical form?
    A.Intellectual property
    B. Copyright
    C. Pirated software
    D. Fair use doctrine

This is the definition of intellectual property.

 

AACSB: Use of Information Technology
Learning Outcome: 5.3
Level: Easy
Taxonomy: Knowledge & Understanding

  1. What gives, in certain situations, a person the legal right to use copyrighted material?
    A.Intellectual property
    B. Copyright
    C. Pirated software
    D. Fair use doctrine

This is the definition of fair use doctrine.

 

AACSB: Use of Information Technology
Learning Outcome: 5.3
Level: Easy
Taxonomy: Knowledge & Understanding

  1. What is the legal protection afforded an expression of an idea?
    A.Intellectual property
    B. Copyright
    C. Pirated software
    D. Fair use doctrine

This is the definition of copyright.

 

AACSB: Use of Information Technology
Learning Outcome: 5.3
Level: Easy
Taxonomy: Knowledge & Understanding

 

  1. What are the principles and standards that guide our behavior toward other people?
    A.Intellectual property
    B. Copyright
    C. Pirated software
    D. Ethics

This is the definition of ethics.

 

AACSB: Use of Information Technology
Learning Outcome: 5.3
Level: Easy
Taxonomy: Knowledge & Understanding

  1. What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?
    A.Ethics
    B. Privacy
    C. Copyright
    D. Information security

This is the definition of information security.

 

AACSB: Use of Information Technology
Learning Outcome: 5.3
Level: Easy
Taxonomy: Knowledge & Understanding

  1. What first ever national appointment was made by President Barack Obama?
    A.National Chief Security Officer
    B. National Chief Privacy Officer
    C. National Chief Technology Officer
    D. All of the above

President Barack Obama appointed the first ever National Chief Technology Officer.

 

AACSB: Use of Information Technology
Learning Outcome: 5.3
Level: Easy
Taxonomy: Knowledge & Understanding

 

  1. The old business axiom “time is money” needs to be updated to more accurately reflect the crucial interdependence between IT and business processes. What is the recommended new phrase?
    A.Uptime is a good business process
    B. Downtime is a bad business process
    C. Uptime is money
    D. Downtime is impossible

To reflect the times, the phrase should state “uptime is money”.

 

AACSB: Use of Information Technology
Learning Outcome: 5.3
Level: Easy
Taxonomy: Knowledge & Understanding

  1. According to Infonetics research, what is the leading cause of downtime?
    A.Software failure followed by human error
    B. Tornadoes
    C. Power outage
    D. Sink overflow

Software failure followed by human error is the leading cause of downtime.

 

AACSB: Use of Information Technology
Learning Outcome: 5.3
Level: Easy
Taxonomy: Knowledge & Understanding

  1. Which of the following is one of the four categories of costs associated with downtime?
    A.Financial performance
    B. Revenue
    C. Damaged reputation
    D. All of the above

Financial performance, revenue, and damaged reputation are all costs associated with downtime.

 

AACSB: Use of Information Technology
Learning Outcome: 5.3
Level: Easy
Taxonomy: Knowledge & Understanding

 

 

True / False Questions

  1. Job titles, roles, and responsibilities do not differ from organization to organization.
    FALSE

IT is a relatively new functional area and job titles, roles, and responsibilities often differ dramatically from organization to organization.

 

AACSB: Use of Information Technology
Learning Outcome: 5.1
Level: Easy
Taxonomy: Knowledge & Understanding

  1. It is the responsibility of the CIO to ensure effective communications between business and IT personnel.
    TRUE

Bridging the gap between IT and business personnel is the CIOs responsibility.

 

AACSB: Use of Information Technology
Learning Outcome: 5.2
Level: Easy
Taxonomy: Knowledge & Understanding

  1. Ethics are the laws that guide our behavior toward other people.
    FALSE

Ethics are the principles and standards, not necessarily laws, that guide our behavior toward other people.

 

AACSB: Use of Information Technology
Learning Outcome: 5.3
Level: Easy
Taxonomy: Knowledge & Understanding

 

  1. Privacy is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
    TRUE

This is the definition for privacy.

 

AACSB: Use of Information Technology
Learning Outcome: 5.3
Level: Easy
Taxonomy: Knowledge & Understanding

  1. One of the main ingredients in trust is privacy.
    TRUE

Privacy is one of the main ingredients in trust.

 

AACSB: Use of Information Technology
Learning Outcome: 5.3
Level: Easy
Taxonomy: Knowledge & Understanding

 

Fill in the Blank Questions

  1. The chief ___________ officer is responsible for collecting, maintaining, and distributing the organization’s knowledge.
    Knowledge

 

AACSB: Use of Information Technology
Learning Outcome: 5.1
Level: Easy
Taxonomy: Knowledge & Understanding

  1. _________ are the principles and standards that guide our behavior toward other people.
    Ethics

 

AACSB: Use of Information Technology
Learning Outcome: 5.3
Level: Easy
Taxonomy: Knowledge & Understanding

 

  1. __________ is the right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.
    Privacy

 

AACSB: Use of Information Technology
Learning Outcome: 5.3
Level: Easy
Taxonomy: Knowledge & Understanding

  1. _________ software is the unauthorized use, duplication, distribution, or sale of copyrighted software.
    Pirated

 

AACSB: Use of Information Technology
Learning Outcome: 5.3
Level: Easy
Taxonomy: Knowledge & Understanding

  1. ________ software is manufactured to look like the real thing and sold as such.
    Counterfeit

 

AACSB: Use of Information Technology
Learning Outcome: 5.3
Level: Easy
Taxonomy: Knowledge & Understanding

 

Essay Questions
 

  1. List and describe the four common IT-related strategic positions.

Chief Information Officer (CIO) oversees all uses of IT and ensures the strategic alignment of IT with business goals and objectives. Chief Technology Officer (CTO) is responsible for ensuring the throughput, speed, accuracy, availability, and reliability of IT. Chief Security Officer (CSO) is responsible for ensuring the security of IT system. Chief Privacy Officer (CPO) is responsible for ensuring the ethical and legal use of information.

 

AACSB: Reflective Thinking Skills
Learning Outcome: 5.1
Level: Easy
Taxonomy: Application and Analysis

  1. Describe the gap between business personnel and IT personnel and what an organization can do to close this gap.

Business personnel possess expertise in functional areas such as marketing, accounting, and sales. IT personnel have the technological expertise. This causes a communications gap between the two. IT personnel have their own vocabularies consisting of acronyms and technical terms. Business personnel have their own vocabularies based on their experience and expertise. For both sides to have effective communications, the business personnel must seek to achieve an increased level of understanding of IT, and the IT personnel must seek to achieve an increased level of understanding of the business.

 

AACSB: Reflective Thinking Skills
Learning Outcome: 5.2
Level: Easy
Taxonomy: Application and Analysis

  1. Describe the relationship between ethics and privacy.

Ethics are the principles and standards that guide our behavior toward other people. Privacy is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent. Privacy is an ethical issue.

 

AACSB: Reflective Thinking Skills
Learning Outcome: 5.3
Level: Easy
Taxonomy: Application and Analysis

 

  1. Discuss the reasons why privacy issues lose trust for ebusinesses.

Loss of personal privacy is a top concern for Americans in the 21st century. Among Internet users, 37 percent would be “a lot” more inclined to purchase a product on a website that had a privacy policy. Privacy/security is the #1 factor that would convert Internet researchers into Internet buyers.

 

AACSB: Reflective Thinking Skills
Learning Outcome: 5.3
Level: Medium
Taxonomy: Application and Analysis

  1. Explain how HIPAA protects individual’s health records?

HIPAA is the Health Insurance Portability and Accountability Act. HIPAA helps protect the privacy and security of personal health records by requiring all health care organizations to develop, implement, and maintain appropriate security measures when sending electronic health information.

 

AACSB: Reflective Thinking Skills
Learning Outcome: 5.3
Level: Hard
Taxonomy: Application and Analysis

Additional information

Add Review

Your email address will not be published. Required fields are marked *