

IT Strategy and Management
Final Test Solutions
Course Introduction
IT Strategy and Management explores the alignment of information technology with organizational goals to drive business value and innovation. The course covers the development and implementation of IT strategies, governance models, technology leadership, and the management of IT resources. Students will learn how to assess technology needs, formulate IT policies, manage digital transformation initiatives, and evaluate technology investments. Emphasis is placed on strategic decision-making, enterprise architecture, IT risk management, and the challenges of leading IT in a dynamic business environment. Through case studies and practical examples, students gain the skills needed to bridge the gap between technology capabilities and organizational objectives.
Recommended Textbook
Information Technology for Management 11th Edition by Efraim Turban
Available Study Resources on Quizplus
14 Chapters
1723 Verified Questions
1723 Flashcards
Source URL: https://quizplus.com/study-set/2007

Page 2

Chapter 1: Disruptive IT Impacts Companies, competition, and
Careers
Available Study Resources on Quizplus for this Chatper
96 Verified Questions
96 Flashcards
Source URL: https://quizplus.com/quiz/39884
Sample Questions
Q1) What is the goal of business process reengineering (BPR)? Explain why simply applying IT to manual or outdated processes -- instead of reengineering those processes -- will not optimize them.
Answer: Methods and efforts to eliminate wasted steps within a process are referred to a business process reengineering (BPR).The goal of BPR is to eliminate the unnecessary non-value-added processes,then to simplify and automate the remaining processes to significantly reduce cycle time,labor,and costs.After unnecessary processes are identified and eliminated,the remaining ones are redesigned (or reengineered)in order to automate or streamline them.Simplifying processes naturally reduces the time needed to complete the process,which also cuts down on errors. Applying IT to a manual or outdated process will not optimize it because improving processes starts with determining whether or not they are still necessary.
Q2) Routine formal business processes are referred to as ________.
Answer: standard operating procedures,or SOPs
Q3) Big data analytics has increased the demand for data scientists.
A)True
B)False
Answer: True
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Information Systems, IT Architecture, Data
Governance, and Cloud Computing
Available Study Resources on Quizplus for this Chatper
168 Verified Questions
168 Flashcards
Source URL: https://quizplus.com/quiz/39885
Sample Questions
Q1) The enterprise architecture (EA)needs to start with ________.
A)Databases and data warehouse capabilities.
B)Current business processes.
C)The organization's strategic direction.
D)The IT budget.
Answer: C
Q2) ________ is the use of IT tools and methods to collect,process,consolidate,store,and secure data from sources that are often fragmented and inconsistent.
A)Information management
B)Data governance
C)IT strategy
D)IT development
Answer: A
Q3) In an organization,there may be a culture of distrust or political conflicts between the technology and business folks,which are resolved with data governance.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Data Management, Business Intelligence, and Data Analytics
Available Study Resources on Quizplus for this Chatper
123 Verified Questions
123 Flashcards
Source URL: https://quizplus.com/quiz/39886
Sample Questions
Q1) Social commentary and social media are mined for sentiment analysis or to understand consumer intent.
A)True
B)False
Answer: True
Q2) According to the 90/90 data-use principle,a majority of stored data,as high as 90 percent,is often accessed after 90 days.
A)True
B)False
Answer: False
Q3) Which of the following would not be a benefit of using ERM?
A)Enabling the company to access and use the content contained in documents.
B)Cutting labor costs by automating business processes.
C)Increasing costs associated with printing,storing,and searching for content
D)Reducing the time and effort required to locate information the business needs to support decision making.
Answer: C
Q4) A widely used platform for processing big data is Apache ________.
Answer: Hadoop
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Networks, Collaborative Technology, and the Internet of Things
Available Study Resources on Quizplus for this Chatper
135 Verified Questions
135 Flashcards
Source URL: https://quizplus.com/quiz/39887
Sample Questions
Q1) Amazon has enhanced its voice-automated Alexa with a new standard API called __________which increases the efficiency of the list feature.
A)Personal Lister
B)Voice Activator
C)List Skills
D)Catalog Expander
Q2) As technologies that make up the mobile infrastructure evolve,identifying strategic technologies and avoiding wasted investments require more ad hoc adoption of mobile devices and network infrastructure.
A)True
B)False
Q3) ___________ is an umbrella term that applies to location-aware technologies that allow devices to communicate securely with each other over short distances.
A)GPS technology
B)Location sensitive apps
C)Geo-location technology
D)Near-field communications
Q4) List and explain the four factors to consider when evaluating a mobile network?
Page 6
To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Cybersecurity and Risk Management Technology
Available Study Resources on Quizplus for this Chatper
148 Verified Questions
148 Flashcards
Source URL: https://quizplus.com/quiz/39888
Sample Questions
Q1) Cybercrime surveys have reported each of the following trends or findings except
A)security incidents increased steadily despite implementation of security practices
B)current cybersecurity technologies and policies are simply not keeping pace with fast-evolving threats.
C)Many threats and challenges that organizations face today were unimaginable 10 years ago.
D)Older threats such as fraud and identity theft have decreased significantly.
Q2) _______ are software programs that users download and install to fix a vulnerability.
Q3) ____________ tactics are used by hackers and corporate spies to trick people into revealing login information or access codes.
Q4) In Cybersecurity terminology,a(n)__________ is defined as a weakness that threatens the confidentiality,integrity,or availability of an asset.
Q5) _____________detection identifies things like excessive hours worked,unusual transactions,copying of huge amounts of data and other unusual patterns of behavior,and uses them to alert IT managers to the possibility of internal fraud.
To view all questions and flashcards with answers, click on the resource link above. Page 7
Chapter 6: Search, Semantic, and Recommendation Technology
Available Study Resources on Quizplus for this Chatper
122 Verified Questions
122 Flashcards
Source URL: https://quizplus.com/quiz/39889
Sample Questions
Q1) What is intent of black hat SEO tactics? How does Google attempt to deter websites from using black hat SEO tactics? List 2 examples of black hat SEO tactics.
Q2) Semantic search engines are designed to locate information based on the nature and meaning of Web content,and not simply on keyword matches.
A)True
B)False
Q3) The goal of SEO practitioners is to help organizations increase traffic to their websites by all of the following except ________.
A)increasing visibility
B)improving ranking on SERPs
C)optimizing analytics
D)increasing conversions
Q4) The most popular commercial search engines,Google and Bing,are based on ________ technology.
A)crawler
B)directory
C)meta-search
D)semantic

Page 8
To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Web 20 and Social Technology
Available Study Resources on Quizplus for this Chatper
111 Verified Questions
111 Flashcards
Source URL: https://quizplus.com/quiz/39890
Sample Questions
Q1) Using Twitter to monitor public sentiment and influence public opinion have become critical skills for PR professionals working for business and nonprofit organizations.
A)True
B)False
Q2) Technologies that extend control of Web content beyond the creator are RSS and mashups.
A)True
B)False
Q3) ________ is a cloud storage service that makes it easy to access your documents from any of the devices you work on.
A)Wiki
B)Delicious
C)Diigo
D)Dropbox
Q4) VenueGen.com is a service that makes it possible for users to conduct meetings in a ________ world.
Q5) Many popular ________ are open source,which means that anyone can use them for free although there may be other terms and conditions placed on their use
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Retail, e-Commerce, and Mobile Commerce Technology
Available Study Resources on Quizplus for this Chatper
145 Verified Questions
145 Flashcards
Source URL: https://quizplus.com/quiz/39891
Sample Questions
Q1) While many retailers are frustrated by the phenomenon of shoppers using smartphones to comparison shop in their stores,Macy's "Backstage Pass Program" actually encourages users to access product information and promotional videos using SMS and ________.
Q2) Customers can pay for products at Macy's using Google Wallet,a mobile payment app.At the register,customers tap their mobile device on a(n)__________ device in order to transfer funds to Macy's.
A)ATM
B)EFT
C)NFC
D)PayPal
Q3) Online retailers face tough _________ problems when selling online because of the need to design systems to accept and process a huge volume of small orders,to physically pick items from warehouse shelves and put them into boxes,to be sure that the correct labels are applied,and to accept returns.
A)Transportation and service
B)Payment and logistics
C)Credit processing and delivery
D)Order fulfillment,logistics,and reverse logistics
Page 10
To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Functional Business Systems
Available Study Resources on Quizplus for this Chatper
151 Verified Questions
151 Flashcards
Source URL: https://quizplus.com/quiz/182629
Sample Questions
Q1) ________ is a document used to communicate the company's goals and the actions needed to achieve them.
A)Mission statement
B)Organizational chart
C)SOP
D)Strategic plan
Q2) Day-to-day operations are connected by data and processes that they share.
A)True
B)False
Q3) The leading internal control to prevent fraud at an organization is __________.For example,when handling a company's assets,the work of managers or employees must be subject to approval or authorization by another person.
Q4) Coordination of several complex processes,namely ordering,purchasing or procurement,inbound logistics and outbound logistics activities is called
A)HR
B)Online transaction processing
C)Data accuracy
D)Logistics management
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Enterprise Systems
Available Study Resources on Quizplus for this Chatper
124 Verified Questions
124 Flashcards
Source URL: https://quizplus.com/quiz/39893
Sample Questions
Q1) SharePoint enables coworkers to work simultaneously on a single document,save previous versions,and track updates.
A)True
B)False
Q2) Supply chains involve the flow of materials,data,and money.
A)True
B)False
Q3) An ERP interfaces with legacy applications through a(n)__________ layer.
Q4) 3D printing,which is also called ________,has produced spare parts,toys,jewelry,and food.
A)additive manufacturing
B)bioprinting
C)multi-dimensional bar coding
D)R&D production
Q5) ________ entails all the processes and information needed to move products from origin to destination efficiently.
Q6) Companies use information systems to manage the ___________,which starts with the acquisition of raw materials or the procurement of products and proceeds through manufacture,transport,and delivery-and the disposal or recycling of products.
Page 12
To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Data Visualization and Geographic Information Systems
Available Study Resources on Quizplus for this Chatper
92 Verified Questions
92 Flashcards
Source URL: https://quizplus.com/quiz/39894
Sample Questions
Q1) GIS can create maps with multiple layers of _______.
Q2) Dashboard design is a critical factor because business users need to be able to understand the significance of the dashboard information at a glance and have the capability to drill down to one or more levels of detail.
A)True
B)False
Q3) An application that integrates data from data stores,business systems,external data and real-time news feeds is referred to as a(n)____________.
A)Enterprise mashup
B)Enterprise visualization
C)Operational system
D)Business systems
Q4) Key components of dashboards are design,API,access,and ______________.
A)Functionality
B)Mobility
C)Performance metrics
D)Accessibility
Q5) Explain three benefits of data mashup technology to an enterprise.
Q6) Describe the functions and business value of GIS and geocoding.
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: IT Strategy, Sourcing, and Strategic Technology Trends
Available Study Resources on Quizplus for this Chatper
130 Verified Questions
130 Flashcards
Source URL: https://quizplus.com/quiz/39895
Sample Questions
Q1) Risks associated with outsourcing include shirking when the vendor develops a strategic application for a client and then uses it for other clients.
A)True
B)False
Q2) Offshoring of software development has become a common practice due to global markets,lower costs,and increased access to skilled labor.
A)True
B)False
Q3) In-house development,in which systems are developed or other IT work is done in-house,possibly with the help of consulting companies or ________.
Q4) ________ uses four metrics to measure performance-one financial metric and three nonfinancial metrics.
Q5) IT capabilities can be sourced,scaled on,and delivered on demand without physical location,labor,or capital restrictions.
A)True
B)False
Q6) What are the major reasons why organizations choose sourcing?
Page 14
To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: Systems Development and Project Management
Available Study Resources on Quizplus for this Chatper
112 Verified Questions
112 Flashcards
Source URL: https://quizplus.com/quiz/39896
Sample Questions
Q1) ________ are used to manage the project work effort,monitor results,and report meaningful status to project stakeholders.
A)Milestones
B)Project plan review
C)Statement of work
D)Work breakdown structure
Q2) Requirements analysis is critical to the success of the project.
A)True
B)False
Q3) ________ are multipurpose visualization tools that show the timeline of the project schedule;and are used for planning,scheduling,and at-a-glance status reports.
A)Baselines
B)Gantt charts
C)Statements of work
D)Critical paths
Q4) Identify and describe the triple constraint of project management.Why is it important to manage the triple constraint?
Q5) __________ lets everyone know who is responsible for completion of tasks.
To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: IT Ethics, Privacy and Sustainability
Available Study Resources on Quizplus for this Chatper
66 Verified Questions
66 Flashcards
Source URL: https://quizplus.com/quiz/39897
Sample Questions
Q1) Predicting people's behavior is big business-and increasingly illegal because of privacy and anti-money laundering laws.
A)True
B)False
Q2) According to The Climate Group's SMART 2020 Report,transforming the way people and businesses use IT could reduce annual human-generated global emissions by _______ percent by 2020.
A)15
B)5
C)25
D)75
Q3) The legal system is reactive and slower moving that IT-and may not be prepared for upcoming challenges.
A)True
B)False
Q4) Google's engineers realized the cars could be used for ________ which is also a hacking technique,an invasion of privacy,and an information security risk.
To view all questions and flashcards with answers, click on the resource link above. Page 16