UsingMisChapter11 - Exam Name TRUE/FALSE Write'T if the...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Exam Name___________________________________ TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 1) One of the major functions of the information systems department is to develop, operate, and maintain enterprise applications. 1) 2) In IS departments, the technology office investigates new information systems technologies and determines how the organization can benefit from them. 2) 3) In the IS department, the development group manages the computing infrastructure, including individual computers, computer centers, networks, and communications media. 3) 4) If the organization does not develop programs in-house, then the development group will include programmers, test engineers, technical writers, and other personnel. 4) 5) All IS departments include a development group, an operational group, and an outsourcing relations group. 5) 6) Information technology (IT) is simply technology. IT must be placed into the structure of an IS before an organization can use it. 6) 7) Information systems operate independently of the organization's competitive strategy. They have little effect on a company's goals and objectives. 7) 8) Information system infrastructure is not malleable as changing a network requires time and resources. 8) 9) The chief information officer is the representative for information system and information technology issues within the executive staff. 9) 10) When considering a merger, it is important that the company consider integration of information systems in the merged entities. 10) 11) It is the CIO's responsibility to establish and communicate priorities, while the responsibility for enforcement rests with others. 11) 12) Every organization must implement every good idea. The objective of everyone in the information system department must be to develop the most appropriate systems possible, without constraints on time and money. 12) 13) A steering committee is a group of senior managers from the major business functions that works with the CIO to set the information system (IS) priorities and decide among major IS projects and alternatives. 13) 14) The steering committee provides a forum for users to express their needs, frustrations, and other issues they have with the IS department. 14) 1 15) The steering committee serves an important communication function between department managers and users of IS systems. 15) 16) A highly controlled and centralized organization needs decentralized information systems. 16) 17) A decentralized organization with autonomous operating units requires decentralized information systems that facilitate autonomous activity. 17) 18) One of the tasks in managing the computing infrastructure is to create and maintain infrastructure for end-user computing. 18) 19) The IS department has to create, operate, and maintain the computers, software, and personnel in the data warehouse and all of the data marts. 19) 20) The IS department cannot afford to allow every computer user to have his or her own personal configuration. 20) 21) As users' computing needs vary according to the work they do, most IS departments have developed a number of different standard configurations. 21) 22) The IS department needs to work solely with the steering committee to ensure the standards are effective for most of the users. 22) 23) When the IS department provides the computing infrastructure to users, a system must exist to record user problems and monitor their resolution. 23) 24) Problems are prioritized on the basis of how easy they are for the IS department to solve. 24) 25) In addition to its other functions, the IS department also must manage the computing infrastructure staff. 25) 26) Green computing is environmentally conscious computing consisting of three major components: power management, visualization, and e-waste management. 26) 27) In addition to managing the computing infrastructure, the IS department also manages enterprise applications. 27) 28) When creating a new application, the IS department aligns its priorities with the department's strategy but not the organization's strategy. 28) 29) Maintenance, under the IS department, means to fix the system to do what it was supposed to do in the first place, as well as to adapt the system to changed requirements. 29) 30) Maintenance work for legacy systems is always conducted in-house. 30) 31) Companies need special maintenance activities to support legacy systems. 31) 2 32) A legacy information system is one that has outdated technologies and techniques but is still used by an organization. 32) 33) The IS department must have a means to track user issues and problems. Although such a tracking system is similar that provided for infrastructure management, the department usually uses different systems for these two functions. 33) 34) In large organizations, there is a single problem-tracking and resolution system for each enterprise application. 34) 35) To integrate disparate systems, companies usually outsource the development of enterprise application integration, a special-purpose IS. 35) 36) Sustaining-application developers work on existing applications. 36) 37) The term database administration describes a function that pertains to all of an organization's data assets. 37) 38) The term data administration describes a function that pertains to a particular database. 38) 39) Data standards describe the format, and other features of data items that are shared across the organization. 39) 40) A data dictionary contains an entry for each standard data item. 40) 41) Data administration is concerned with the creation and dissemination of data policies. These policies vary in scope and are created independently by the data administrator. 41) 42) Once created, data policies remain static throughout the lifetime of the organization; they rarely change for any reason. 42) 43) Outsourcing is the process of hiring another organization to perform a service. It is done to save costs, to gain expertise, and to free management time. 43) 44) Outsourcing saves direct management time, but not indirect management time. 44) 45) Once a company has chosen a vendor, further risk management is up to that vendor. 45) 46) Acquiring licensed software is a form of outsourcing. 46) 47) One of the advantages of outsourcing is that the company retains control of all technology and procedures used by the vendor. 47) 48) When a company outsources a system, it no longer has control over prioritizing fixes for software failures and problems. 48) 49) Users have a right to a secure computing environment; they should not have to worry about security. 49) 3 50) Users have a responsibility to follow security and backup procedures. 50) MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 51) Developing, operating, and maintaining the organization's computing infrastructure is a major function of the ________ department. A) manufacturing B) information systems C) human resources D) marketing 51) 52) Which of the following is NOT a function of the information systems department? A) protecting information assets B) conducting external audits C) managing outsourcing relationships D) maintaining computing infrastructure 52) 53) In organizations that operate significant non-accounting information systems, the chief information officer reports to the ________. A) chief financial officer B) director of information services C) chief technology officer D) chief executive officer 53) 54) If the primary information systems in an organization support only accounting and finance activities, the CIO should report to the ________. A) CFO B) network administrator C) CTO D) data administrator 54) 55) In the IS department, the ________ group manages the computing infrastructure, including individual computers, computer centers, networks, and communications media. This group includes system and network administrators. A) operations B) manufacturing C) development D) technology 55) 56) Which of the following is a function of the technology group in an organization's IS department? A) maintaining existing information systems B) creating new information systems C) managing the computing infrastructure D) investigating new IS technologies 56) 57) An important function of the ________ group in an IS department is to monitor the user experience and respond to user problems. A) technology B) operations C) outsourcing relations D) development 57) 58) Which of the following is true for the various groups in an IS department? A) The development group manages the process of creating new information systems. B) The development group monitors the user experience and responds to user problems. C) The operations group investigates new information systems technologies and determines how the organization can benefit from them. D) The technology group manages individual computers, computer centers, networks, and communications media. 58) 59) In the information system department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems. A) development B) operations C) manufacturing D) technology 59) 4 60) Which of the following is true for the function of maintaining information systems? A) Maintenance means fixing problems or adapting existing information systems. B) The maintenance process is undertaken by the technology group. C) Maintenance is performed by operations, as it involves fixing problems with existing software. D) Maintenance is only performed by the IS department if programs are developed in-house. 60) 61) If the organization does not develop programs in-house, then the development group of the information system department will include ________. A) technical writers B) system analysts C) programmers D) test engineers 61) 62) The purpose of the ________ group is to protect data and information assets by establishing data standards and data management practices and policies. A) data administration B) data warehousing C) data outsourcing D) data marts 62) 63) Developing test plans, designing and writing automated test scripts, and performing testing are the responsibilities of a ________. A) programmer B) PQA test engineer C) technical writer D) business analyst 63) 64) Which of the following is NOT a responsibility of a systems analyst? A) writing programs B) determining system requirements C) developing procedures D) designing job descriptions 64) 65) A ________ must work with users to determine system requirements and must also help determine system test plans. A) business analyst B) programmer C) system analyst D) technical writer 65) 66) The responsibilities of a ________ include advising the CIO, executive group, and project managers on emerging technologies. A) business analyst B) technical writer C) Chief technology officer (CTO) D) network administrator 66) 67) The responsibilities of a computer technician include ________. A) managing and protecting the database B) writing program documentation C) installing software and repairing computer networks D) advising the CIO on emerging technologies 67) 68) Which of the following is true for changes in IS infrastructure? A) IS applications are easily changed to meet requirements. B) Changing IS systems is expensive and time-consuming. C) Information systems change only when organizations merge. D) Once it is developed, it is not possible to change IS infrastructure. 68) 5 69) Which of the following is NOT true for information systems? A) Information systems change only when organizations merge. B) IS infrastructure is not malleable. C) IS must be aligned with the organization's competitive strategy. D) Integrating disparate information systems is time-consuming. 69) 70) The ________ is the representative for IS and IT issues within the executive staff, providing the IS perspective during discussions of problem solutions, proposals, and new initiatives. A) CTO B) CIO C) network administrator D) database administrator 70) 71) The ________ must ensure that priorities consistent with the overall organizational strategy are developed, communicate them to the IS department and enforce them. A) CIO B) database administrator C) network administrator D) CTO 71) 72) A(n) ________ is a group of senior managers from the major business functions that works with the CIO to set the IS priorities and decide among major IS projects and alternatives. A) executive forum B) steering committee C) IS department D) network board 72) 73) Which of the following is a function of the steering committee for an IS department? A) network maintenance B) adapting software C) setting IS priorities D) technology sales 73) 74) Which of the following statements is true for the structure of IS infrastructure? A) The information system for a highly controlled organization should facilitate autonomous activity. B) A centralized organization needs a decentralized information system. C) A centralized organization requires information systems that facilitate autonomous activity. D) A decentralized organization requires information systems that facilitate autonomous activity. 74) 75) Users' computing needs vary according to the work they do. In response, most IS departments ________. A) install the configuration suitable for software development personnel for all employees B) allow employees to choose their preferred configurations C) have developed a set of three or four different standard configurations D) have uniform configurations for all employees 75) 76) The IS department needs to work with the steering committee and ________ to ensure the standards are effective for most of the users. A) user groups B) CTO C) software developers D) CIO 76) 6 77) In a well-run IS department, when a user reports a problem the department assigns a tracking number and the problem enters a queue for service. Which of the following statements is true in this case? A) If a problem is not resolved even after an attempt, it reenters the queue at a lower priority. B) Lower-priority items in the queue are serviced first. C) Problems are prioritized on the basis of how critical they are to the user's work. D) Problems are prioritized depending on the available resources of the IS department. 77) 78) In a typical IS operations department, the network manager and the computer center manager will report to the ________. A) operations manager B) user support manager C) data warehouse manager D) technology manager 78) 79) Customer support personnel and the help desk will be managed by the ________. A) network manager B) computer center manager C) user support manager D) data warehouse manager 79) 80) Green computing is environmentally conscious computing consisting of three major components: power management, virtualization, and ________. A) product standards B) e-waste management C) technology upgradation D) personnel development 80) 81) In addition to managing the computing infrastructure, the ________ manages enterprise applications as well. A) network manager B) steering committee C) computer center manager D) IS department 81) 82) In organizations in which individuals and workgroups manage their own applications, with support from the IS department, enterprise applications include ________. A) only functional applications across the organization B) some functional applications and all cross-functional applications C) only cross-functional applications across the organization D) all functional as well as cross-functional applications 82) 83) The process of creating a new application begins when the IS department aligns its priorities with the ________. A) employees' needs B) suitability of technology C) organization's strategy D) enterprise applications 83) 84) A(n) ________ is a system that has outdated technologies and techniques but is still used, despite its age. A) network modification system B) data interpretation system C) legacy information system D) enterprise application 84) 85) EAI is used to enable the ________. A) integration of disparate systems C) outsourcing of services 85) B) installation of legacy systems D) alignment of organizational and IS goals 7 86) A computer programmer or developer works both as a ________ as well as a programmer. A) database administrator B) network administrator C) computer technician D) software designer 86) 87) Sustaining-application developers work on ________ applications. A) new B) obsolete C) existing 87) 88) ________ specialize in the testing of software. A) Product quality assurance engineers C) Technical writers D) emerging B) Computer technicians D) Database administrators 88) 89) ________ develop product installation instructions, help text, and other support documentation. A) Consultants B) User support representatives C) Technical writers D) Sustaining-application developers 89) 90) Data administration describes a function that pertains to ________. A) all of an organization's data assets B) a particular database C) the protection, but not the recovery, of data D) only a few of the organization's data assets 90) 91) Sometimes data standards include the ________, which is a department within the organization that is most concerned with that data item and that controls changes to the definition of that data item. A) data vendor B) repository C) legacy system D) data owner 91) 92) ________ describe(s) the name, official definition, usage, relationship to other data items, processing restrictions, version, security restrictions, format, and other features of data items that are shared across the organization. A) Data administration B) Data view C) Data dictionary D) Data standards 92) 93) A data ________ is a file or database that contains data definitions. A) repository B) dictionary C) standard 93) D) policy 94) A ________ contains an entry for each standard data item. A) data standard B) data dictionary C) data norm D) data application 94) 95) The ________ must maintain the data dictionary to keep it current. Obsolete entries must be removed, new items inserted, and changes recorded. A) data administrator B) database analyst C) data owner D) operations manager 95) 96) ________ also is concerned with the creation and dissemination of data policies. A) Data standards B) Data administration C) Database administration D) Data dictionary 96) 8 97) Outsourcing is the process of hiring another organization to perform a service. Outsourcing is undertaken in order to ________. A) cap an organization's financial exposure B) reduce an organization's control over functions C) increase costs for the outsourcing vendor D) double the organizational management time 97) 98) In the case of management time, outsourcing ________. A) saves both direct and indirect management time B) saves only costs C) saves indirect management time D) saves direct management time 98) 99) Outsourcing gathers all of the possible risks into the risk of choosing the right ________. A) vendor B) technological upgrades C) steering committee D) sales team 99) 100) ________ is a form of outsourcing. A) Changing a computer's configuration B) Acquiring licensed software C) Updating the data standards D) Upgrading an employee's system software 100) 101) Sites like Amazon.com provide ________ for product vendors and distributors who choose not to develop their own online presence. A) data visualization B) enterprise applications C) Web storefronts D) software licenses 101) 102) In 2005 Marriott International chose Hewitt Associates to handle its human resources needs for the next 7 years. This is an example of ________ outsourcing. A) application B) software C) system D) business function 102) 103) ________ is a form of hardware outsourcing. A) Outsourcing applications C) Cloud hosting 103) B) Acquiring licensed software D) Using Web-service hosting 104) When a company outsources a system, control over prioritizing fixes for software failures and problems belongs to the ________. A) operations manager B) development manager C) vendor D) CIO 104) 105) Which of the following is a negative consequence of outsourcing IS/IT functions? A) The vendor can benefit from economies of scale. B) Outsourcing can cap financial risk for an organization. C) The vendor can replace the CIO of the organization. D) Outsourcing reduces indirect management activity. 105) 9 106) Which of the following is a right for users of information systems? A) making hardware modifications when desired B) effective training according to their requirements C) installing programs and applications of their choice D) obtaining the configuration of their choice 106) 107) As an IS user, you have a right to a secure computing environment, this means that ________. A) you should protect the organization's computers and files B) you will never face a network problem C) you should inform the IS about any software upgrades D) the organization should protect your computer and its files 107) 108) Which of the following is generally a responsibility of users? A) upgrading data standards B) undertaking hardware modifications C) replacing legacy systems with improved ones D) following security and backup procedures 108) 109) Which of the following is true for users of information systems? A) They should install hardware and software themselves, without bothering the IS department. B) They must learn standard techniques and procedures for the applications they use. C) They have a responsibility to protect their computers from viruses by installing protection software. D) They must ensure the availability of reliable and secure Internet connections. 109) 110) Users should not bother IS personnel for trivial reasons, so they have a responsibility to ________. A) learn basic computer skills B) make the necessary hardware modifications C) install security programs by themselves D) protect their passwords and data 110) ESSAY. Write your answer in the space provided or on a separate sheet of paper. 111) List the major functions of an IS department. 112) List and explain the major IS/IT planning functions. 113) Is it necessary to align infrastructure design with organizational structure ? Explain your answer. 114) What tasks are necessary for managing computing infrastructure? 115) How are problems tracked and solutions monitored in a well-run IS department? 116) List and briefly explain the activities that are included in data administration. 117) What is a legacy information system? What are the differences between data standards and a data dictionary? 118) List the advantages of outsourcing and briefly explain any three of them. 10 119) List the risks of outsourcing and briefly explain any three of them. 120) List any four rights and any four responsibilities of users of information systems. 11 ...
View Full Document

This note was uploaded on 01/13/2012 for the course BCIS 3610 taught by Professor Sherry during the Spring '11 term at University of Texas.

Ask a homework question - tutors are online