MIS MC ch11.txt

Card Set Information

MIS MC ch11.txt
2012-04-25 15:00:36
UNT BCIS3610 test2 ch11

Review questions, multiple choice only, test 2, chapter 11
Show Answers:

  1. Developing, operating, and maintaining the organization's computing infrastructure is a major function of the ________ department. A) manufacturing B) information systems C) human resources D) marketing
  2. Which of the following is NOT a function of the information systems department? A) protecting information assets B) conducting external audits C) managing outsourcing relationships D) maintaining computing infrastructure
  3. In organizations that operate significant non-accounting information systems, the chief information officer reports to the ________. A) chief financial officer B) director of information services C) chief technology officer D) chief executive officer
  4. If the primary information systems in an organization support only accounting and finance activities, the CIO should report to the ________. A) CFO B) network administrator C) CTO D) data administrator
  5. In the IS department, the ________ group manages the computing infrastructure, including individual computers, computer centers, networks, and communications media. This group includes system and network administrators. A) operations B) manufacturing C) development D) technology
  6. Which of the following is a function of the technology group in an organization's IS department? A) maintaining existing information systems B) creating new information systems C) managing the computing infrastructure D) investigating new IS technologies
  7. An important function of the ________ group in an IS department is to monitor the user experience and respond to user problems. A) technology B) operations C) outsourcing relations D) development
  8. Which of the following is true for the various groups in an IS department? A) The development group manages the process of creating new information systems. B) The development group monitors the user experience and responds to user problems. C) The operations group investigates new information systems technologies and determines how the organization can benefit from them. D) The technology group manages individual computers, computer centers, networks, and communications media.
  9. In the information system department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems. A) development B) operations C) manufacturing D) technology
  10. Which of the following is true for the function of maintaining information systems? A) Maintenance means fixing problems or adapting existing information systems. B) The maintenance process is undertaken by the technology group. C) Maintenance is performed by operations, as it involves fixing problems with existing software. D) Maintenance is only performed by the IS department if programs are developed in-house.
  11. If the organization does not develop programs in-house, then the development group of the information system department will include ________. A) technical writers B) system analysts C) programmers D) test engineers
  12. The purpose of the ________ group is to protect data and information assets by establishing data standards and data management practices and policies. A) data administration B) data warehousing C) data outsourcing D) data marts
  13. Developing test plans, designing and writing automated test scripts, and performing testing are the responsibilities of a ________. A) programmer B) PQA test engineer C) technical writer D) business analyst
  14. Which of the following is NOT a responsibility of a systems analyst? A) writing programs B) determining system requirements C) developing procedures D) designing job descriptions
  15. A ________ must work with users to determine system requirements and must also help determine system test plans. A) business analyst B) programmer C) system analyst D) technical writer
  16. The responsibilities of a ________ include advising the CIO, executive group, and project managers on emerging technologies. A) business analyst B) technical writer C) Chief technology officer (CTO) D) network administrator
  17. The responsibilities of a computer technician include ________. A) managing and protecting the database B) writing program documentation C) installing software and repairing computer networks D) advising the CIO on emerging technologies
  18. Which of the following is true for changes in IS infrastructure? A) IS applications are easily changed to meet requirements. B) Changing IS systems is expensive and time-consuming. C) Information systems change only when organizations merge. D) Once it is developed, it is not possible to change IS infrastructure.
  19. Which of the following is NOT true for information systems? A) Information systems change only when organizations merge. B) IS infrastructure is not malleable. C) IS must be aligned with the organization's competitive strategy. D) Integrating disparate information systems is time-consuming.
  20. The ________ is the representative for IS and IT issues within the executive staff, providing the IS perspective during discussions of problem solutions, proposals, and new initiatives. A) CTO B) CIO C) network administrator D) database administrator
  21. The ________ must ensure that priorities consistent with the overall organizational strategy are developed, communicate them to the IS department and enforce them. A) CIO B) database administrator C) network administrator D) CTO
  22. A(n) ________ is a group of senior managers from the major business functions that works with the CIO to set the IS priorities and decide among major IS projects and alternatives. A) executive forum B) steering committee C) IS department D) network board
  23. Which of the following is a function of the steering committee for an IS department? A) network maintenance B) adapting software C) setting IS priorities D) technology sales
  24. Which of the following statements is true for the structure of IS infrastructure? A) The information system for a highly controlled organization should facilitate autonomous activity. B) A centralized organization needs a decentralized information system. C) A centralized organization requires information systems that facilitate autonomous activity. D) A decentralized organization requires information systems that facilitate autonomous activity.
  25. Users' computing needs vary according to the work they do. In response, most IS departments ________. A) install the configuration suitable for software development personnel for all employees B) allow employees to choose their preferred configurations C) have developed a set of three or four different standard configurations D) have uniform configurations for all employees
  26. The IS department needs to work with the steering committee and ________ to ensure the standards are effective for most of the users. A) user groups B) CTO C) software developers D) CIO
  27. In a well-run IS department, when a user reports a problem the department assigns a tracking number and the problem enters a queue for service. Which of the following statements is true in this case? A) If a problem is not resolved even after an attempt, it reenters the queue at a lower priority. B) Lower-priority items in the queue are serviced first. C) Problems are prioritized on the basis of how critical they are to the user's work. D) Problems are prioritized depending on the available resources of the IS department.
  28. In a typical IS operations department, the network manager and the computer center manager will report to the ________. A) operations manager B) user support manager C) data warehouse manager D) technology manager
  29. Customer support personnel and the help desk will be managed by the ________. A) network manager B) computer center manager C) user support manager D) data warehouse manager
  30. Green computing is environmentally conscious computing consisting of three major components: power management, virtualization, and ________. A) product standards B) e-waste management C) technology upgradation D) personnel development
  31. In addition to managing the computing infrastructure, the ________ manages enterprise applications as well. A) network manager B) steering committee C) computer center manager D) IS department
  32. In organizations in which individuals and workgroups manage their own applications, with support from the IS department, enterprise applications include ________. A) only functional applications across the organization B) some functional applications and all cross-functional applications C) only cross-functional applications across the organization D) all functional as well as cross-functional applications
  33. The process of creating a new application begins when the IS department aligns its priorities with the ________. A) employees' needs B) suitability of technology C) organization's strategy D) enterprise applications
  34. A(n) ________ is a system that has outdated technologies and techniques but is still used, despite its age. A) network modification system B) data interpretation system C) legacy information system D) enterprise application
  35. EAI is used to enable the ________. A) integration of disparate systems B) installation of legacy systems C) outsourcing of services D) alignment of organizational and IS goals
  36. A computer programmer or developer works both as a ________ as well as a programmer. A) database administrator B) network administrator C) computer technician D) software designer
  37. Sustaining-application developers work on ________ applications. A) new B) obsolete C) existing D) emerging
  38. ________ specialize in the testing of software. A) Product quality assurance engineers B) Computer technicians C) Technical writers D) Database administrators
  39. ________ develop product installation instructions, help text, and other support documentation. A) Consultants B) User support representatives C) Technical writers D) Sustaining-application developers
  40. Data administration describes a function that pertains to ________. A) all of an organization's data assets B) a particular database C) the protection, but not the recovery, of data D) only a few of the organization's data assets
  41. Sometimes data standards include the ________, which is a department within the organization that is most concerned with that data item and that controls changes to the definition of that data item. A) data vendor B) repository C) legacy system D) data owner
  42. ________ describe(s) the name, official definition, usage, relationship to other data items, processing restrictions, version, security restrictions, format, and other features of data items that are shared across the organization. A) Data administration B) Data view C) Data dictionary D) Data standards
  43. A data ________ is a file or database that contains data definitions. A) repository B) dictionary C) standard D) policy
  44. A ________ contains an entry for each standard data item. A) data standard B) data dictionary C) data norm D) data application
  45. The ________ must maintain the data dictionary to keep it current. Obsolete entries must be removed, new items inserted, and changes recorded. A) data administrator B) database analyst C) data owner D) operations manager
  46. ________ also is concerned with the creation and dissemination of data policies. A) Data standards B) Data administration C) Database administration D) Data dictionary
  47. Outsourcing is the process of hiring another organization to perform a service. Outsourcing is undertaken in order to ________. A) cap an organization's financial exposure B) reduce an organization's control over functions C) increase costs for the outsourcing vendor D) double the organizational management time
  48. In the case of management time, outsourcing ________. A) saves both direct and indirect management time B) saves only costs C) saves indirect management time D) saves direct management time
  49. Outsourcing gathers all of the possible risks into the risk of choosing the right ________. A) vendor B) technological upgrades C) steering committee D) sales team
  50. ________ is a form of outsourcing. A) Changing a computer's configuration B) Acquiring licensed software C) Updating the data standards D) Upgrading an employee's system software
  51. Sites like Amazon.com provide ________ for product vendors and distributors who choose not to develop their own online presence. A) data visualization B) enterprise applications C) Web storefronts D) software licenses
  52. In 2005 Marriott International chose Hewitt Associates to handle its human resources needs for the next 7 years. This is an example of ________ outsourcing. A) application B) software C) system D) business function
  53. ________ is a form of hardware outsourcing. A) Outsourcing applications B) Acquiring licensed software C) Cloud hosting D) Using Web-service hosting
  54. When a company outsources a system, control over prioritizing fixes for software failures and problems belongs to the ________. A) operations manager B) development manager C) vendor D) CIO
  55. Which of the following is a negative consequence of outsourcing IS/IT functions? A) The vendor can benefit from economies of scale. B) Outsourcing can cap financial risk for an organization. C) The vendor can replace the CIO of the organization. D) Outsourcing reduces indirect management activity.
  56. Which of the following is a right for users of information systems? A) making hardware modifications when desired B) effective training according to their requirements C) installing programs and applications of their choice D) obtaining the configuration of their choice
  57. As an IS user, you have a right to a secure computing environment, this means that ________. A) you should protect the organization's computers and files B) you will never face a network problem C) you should inform the IS about any software upgrades D) the organization should protect your computer and its files
  58. Which of the following is generally a responsibility of users? A) upgrading data standards B) undertaking hardware modifications C) replacing legacy systems with improved ones D) following security and backup procedures
  59. Which of the following is true for users of information systems? A) They should install hardware and software themselves, without bothering the IS department. B) They must learn standard techniques and procedures for the applications they use. C) They have a responsibility to protect their computers from viruses by installing protection software. D) They must ensure the availability of reliable and secure Internet connections.
  60. Users should not bother IS personnel for trivial reasons, so they have a responsibility to ________. A) learn basic computer skills B) make the necessary hardware modifications C) install security programs by themselves D) protect their passwords and data