Information Technology for Managers Pre-Test Questions - 1723 Verified Questions

Page 1


Information Technology for Managers Pre-Test Questions

Course Introduction

Information Technology for Managers provides an essential overview of how information systems and digital technologies drive modern organizations. Students will explore the critical role of IT in strategic decision-making, business process optimization, and competitive advantage. Through real-world case studies and hands-on applications, the course examines topics such as data management, networking, cybersecurity, IT project management, and emerging digital trends. Designed for future managers rather than IT specialists, this course empowers participants to understand, assess, and leverage information technology to improve organizational performance and support effective leadership in an increasingly digital business environment.

Recommended Textbook

Information Technology for Management 11th Edition by Efraim Turban

Available Study Resources on Quizplus

14 Chapters

1723 Verified Questions

1723 Flashcards

Source URL: https://quizplus.com/study-set/2007 Page 2

Chapter 1: Disruptive IT Impacts Companies, competition,

and Careers

Available Study Resources on Quizplus for this Chatper

96 Verified Questions

96 Flashcards

Source URL: https://quizplus.com/quiz/39884

Sample Questions

Q1) In order to be successful,BPM requires all of the following except ________.

A)buy-in from a broad cross section of the business

B)software to map processes that are performed manually

C)the right technology

D)highly effective change management processes

Answer: B

Q2) ________ means that IT capacity can be easily scaled up or down as needed,which essentially requires cloud computing.

A)agility

B)flexibility

C)responsiveness

D)IT consumerization

Answer: C

Q3) Workers with specialized technical knowledge and strong communications and business skills,as well as those with an MBA with a concentration in an IT area,will have the best prospects.

A)True

B)False

Answer: True

Page 3

To view all questions and flashcards with answers, click on the resource link above.

Chapter 2: Information Systems, IT Architecture, Data

Governance, and Cloud Computing

Available Study Resources on Quizplus for this Chatper

168 Verified Questions

168 Flashcards

Source URL: https://quizplus.com/quiz/39885

Sample Questions

Q1) Data from sales orders,payroll,accounting,financial,marketing,purchasing,inventory control,and so forth are processed by a combination of hardware and software called

Answer: Transaction Processing Systems (TPS)

Q2) ____________ is a technique that creates a virtualization layer and multiple virtual machines (VM)that run on a single physical machine.

Answer: Virtualization

Q3) Given the huge number of transactions,the data in databases are constantly in use and/or undergoing change.This characteristic of databases,referred to as ___________,makes it impossible to use them for complex decision making and problem-solving tasks.

A)Variability

B)Velocity

C)Volatility

D)Volume

Answer: C

Q4) The cloud computing ___________ consists of SaaS,PaaS,and IaaS.

Answer: stack

Page 4

To view all questions and flashcards with answers, click on the resource link above.

Chapter 3: Data Management, Business Intelligence, and Data Analytics

Available Study Resources on Quizplus for this Chatper

123 Verified Questions

123 Flashcards

Source URL: https://quizplus.com/quiz/39886

Sample Questions

Q1) According to the 90/90 data-use principle,a majority of stored data,as high as 90 percent,is often accessed after 90 days.

A)True

B)False

Answer: False

Q2) Data mining is important because any customer can become a brand advocate or adversary by freely expressing opinions and attitudes that reach millions of other customers on social media.

A)True

B)False

Answer: False

Q3) A limitation of Apache Hadoop is that it imposes conditions on the structure of the data it can process.

A)True

B)False

Answer: False

Q4) ______________ is a broad category that involves analyzing and interpreting words and concepts in context.

Answer: Text mining

Page 5

To view all questions and flashcards with answers, click on the resource link above.

Chapter 4: Networks, Collaborative Technology, and the Internet of Things

Available Study Resources on Quizplus for this Chatper

135 Verified Questions

135 Flashcards

Source URL: https://quizplus.com/quiz/39887

Sample Questions

Q1) Cloud based _________ apps such as Evernote and iMindmap Online can help groups with idea generation when members of the group are geographically dispersed or have conflicting schedules that prevent them from meeting face-to-face.

Q2) ____________ is older technology for transmitting signals that originated with telephone calls;and is inefficient for digital transmission.

A)Chunking

B)Circuit switching

C)Packet switching

D)IP Streaming

Q3) What are three business benefits of APIs?

Q4) Mobile device apps that enable users to pay for things or check-in to hotels or venues use _________ technology.

A)GPS

B)GIS

C)TCP/IP

D)NFC

Q5) Bandwidth is the capacity or throughput per ________ of a network.

Page 6

Q6) ________ networking standards include 802.11b,802.11a,and 802.11g.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Cybersecurity and Risk Management Technology

Available Study Resources on Quizplus for this Chatper

148 Verified Questions

148 Flashcards

Source URL: https://quizplus.com/quiz/39888

Sample Questions

Q1) The _________ is an exercise that determines the impact of losing the support or availability of a resource.

A)Business impact analysis (BIA)

B)Vulnerability audit

C)Asset valuation audit

D)Computing Cost/Benefit (CCB)audit

Q2) Describe spear phishing.How does spear phishing work?

Q3) In Cybersecurity terminology,a(n)_____________ is defined as the probability of a threat exploiting a vulnerability and the resulting cost.

Q4) One of the methods that could have prevented the Yahoo data breach is ____________,when a user is asked to enter information such as username and password,then a mobile app generates and sends a random number code for the user to enter before being granted access to his or her account.

A)Password Verification

B)Mobile Access Verification

C)Two Factor Authentication

D)Mobile Code Authentication

Q5) Explain internal fraud.Describe the most effective approach to preventing it.

Q6) Indicators of fraud are called __________.

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Search, Semantic, and Recommendation Technology

Available Study Resources on Quizplus for this Chatper

122 Verified Questions

122 Flashcards

Source URL: https://quizplus.com/quiz/39889

Sample Questions

Q1) ________ is how long a user stays on a page before returning to the SERP and is a measure of the page's ________.

A)Dwell time;popularity

B)Dwell time;site traffic

C)Metadata;popularity

D)Metadata;site traffic

Q2) To calculate CoCA for a PPC campaign,you divide the total budget of the campaign by the number of customers who clicked the backlink.

A)True

B)False

Q3) The most popular commercial search engines,Google and Bing,are based on ________ technology.

A)crawler

B)directory

C)meta-search

D)semantic

Q4) ________ search focuses on finding information in a particular content area,such as travel,finance,legal,and medical.

Page 8

To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Web 20 and Social Technology

Available Study Resources on Quizplus for this Chatper

111 Verified Questions

111 Flashcards

Source URL: https://quizplus.com/quiz/39890

Sample Questions

Q1) KLM Royal Dutch Airlines was forced to develop its use of Twitter and Facebook,in response to questions from travelers who were grounded by volcanic ash.This was the beginning of KLM's ________________.

A)Social networking service

B)Social customer service

C)Social bookmarking

D)Social media marketing

Q2) One of the most effective deterrents to social media privacy abuses is fear of backlash from abuses that become public and cause outrage.

A)True

B)False

Q3) Which is not a characteristic of Web 2.0?

A)User-controlled content

B)Dynamic pages,XML,and Java

C)Marketing goal: influence

D)Data: multiple sources,E.g. ,mashups

Q4) ________ are buttons or features on non-Facebook sites that interact with Facebook in some way.

Q5) WordPress is one of the leading platforms for ________.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Retail, e-Commerce, and Mobile Commerce Technology

Available Study Resources on Quizplus for this Chatper

145 Verified Questions

145 Flashcards

Source URL: https://quizplus.com/quiz/39891

Sample Questions

Q1) Mobile visual search (MVS)technology is emerging as an alternative to QR codes. A)True

B)False

Q2) Sending special offers to customers who have opted in to receive discounts via SMS text message or advertising a brand on a popular mobile game app like Angry Birds is an example of mobile marketing.

A)True

B)False

Q3) Customers can pay for products at Macy's using Google Wallet,a mobile payment app.At the register,customers simply tap their phones on a near field communications (NFC)device in order to transfer funds to Macy's.

A)True

B)False

Q4) Identify three business uses of QR codes.

Q5) One advantage of many mobile payment systems over traditional credit card systems is the ability to handle _________,or transactions involving relatively small sums of money.

To view all questions and flashcards with answers, click on the resource link above. Page 10

Q6) ________ exchanges serve one industry (e.g. ,automotive,chemical),along the entire supply chain.

Chapter 9: Functional Business Systems

Available Study Resources on Quizplus for this Chatper

151 Verified Questions

151 Flashcards

Source URL: https://quizplus.com/quiz/182629

Sample Questions

Q1) A standard operating procedure,or SOP,is a loosely defined and suggested procedure for completing a process or function,such as a quality control process or function.

A)True

B)False

Q2) Retaining high-performance people requires monitoring how people feel about the workplace,their compensation,value to the company,and chances for advancement-and maintaining workplace health and safety.

A)True

B)False

Q3) The objective of financial accounting is to report the value of a company.

A)True

B)False

Q4) __________ on LinkedIn is popular because it is more effective and efficient than traditional approaches.

A)Risk management

B)Distribution

C)Recruitment

D)Forecasting

Q5) A weakness in a(n)_______ is a major cause of fraud.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Enterprise Systems

Available Study Resources on Quizplus for this Chatper

124 Verified Questions

124 Flashcards

Source URL: https://quizplus.com/quiz/39893

Sample Questions

Q1) ________ customizes or adds features to a vendor's software or equipment and resells the enhanced product.

Q2) Putting IT department in charge of the CRM project instead of the business users is a CRM best practice.

A)True

B)False

Q3) Order fulfillment is a part of front-office operations,such as accounting,inventory management,and shipping.

A)True

B)False

Q4) ________ refers to private (company-owned)social media,software,platforms,or apps specially designed for use by business leaders and employees to fulfill the strategic mission

Q5) Automated data flows are essential to productivity improvements.

A)True

B)False

Q6) List two types of enterprise systems.Describe the functions performed or supported by these software systems.

Q7) ERP success depends on several key factors being met.List three key factors.

Page 12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Data Visualization and Geographic Information Systems

Available Study Resources on Quizplus for this Chatper

92 Verified Questions

92 Flashcards

Source URL: https://quizplus.com/quiz/39894

Sample Questions

Q1) The ability of GIS to track products along the supply chain offers opportunities in logistics and order fulfillment.

A)True

B)False

Q2) Explain three benefits of data mashup technology to an enterprise.

Q3) _____________ give visual snapshots of an organization's critical operational data or key performance indicators to spot problems,trends,outliers,opportunities,and patterns.

A)Enhanced spreadsheets

B)Business dashboards

C)Cloud based graphics

D)Enterprise graphics

Q4) An executive dashboard displays a company's ________,which are automatically updated in real time based on custom programming and connectivity with existing business systems.

Q5) ________ are a style of reporting that depicts KPIs,operational or strategic information with intuitive and interactive displays.

Page 13

Q6) GIS can create maps with multiple layers of _______.

Q7) Tag clouds represent the relative ________ of words and terms by their sizes.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: IT Strategy, Sourcing, and Strategic Technology Trends

Available Study Resources on Quizplus for this Chatper

130 Verified Questions

130 Flashcards

Source URL: https://quizplus.com/quiz/39895

Sample Questions

Q1) SLAs are designed to protect the service provider,not the customer,unless the customer takes an informed and active role in the provisions and parameters.

A)True

B)False

Q2) The Balanced Scorecard can be used to translate strategic plans and mission statements into a set of objectives and performance metrics that ____________.

A)Are subjective and objective

B)Can be quanti ed and measured.

C)Are financial and reported to the SEC.

D)Focus on cash flows and market share.

Q3) Which of the following is not one of the objectives of IT strategic plans?

A)Improve management's understanding of IT opportunities and limitations.

B)Clarify the level of investment required

C)Assess past performance

D)Identify capacity and human resource requirements

Q4) The risk of opportunistic __________ occurs when a client enters into a long-term contract with a vendor,but the vendor changes financial terms at some point or over-charges for unanticipated enhancements.

Page 14

To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: Systems Development and Project Management

Available Study Resources on Quizplus for this Chatper

112 Verified Questions

112 Flashcards

Source URL: https://quizplus.com/quiz/39896

Sample Questions

Q1) Integrated change control processes are always documented and saved in the event of project failure or lawsuits related to the failure.

A)True

B)False

Q2) A project is a well-planned sequential series of tasks to achieve a result;and have a defined beginning and end,a scope,resources,and a budget.

A)True

B)False

Q3) The DIA baggage-handling project represents practically every possible project management mistake.

A)True

B)False

Q4) Large IT projects,especially ones that involve infrastructure,are developed according to the __________ methodology using several tools.

Q5) During project analysis,IT projects should be examined holistically-that is,in combination to identify investment synergies.This approach is known as ________ management.

Page 15

Q6) __________ lets everyone know who is responsible for completion of tasks.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 14: IT Ethics, Privacy and Sustainability

Available Study Resources on Quizplus for this Chatper

66 Verified Questions

66 Flashcards

Source URL: https://quizplus.com/quiz/39897

Sample Questions

Q1) The Facebook paradox refers to this phenomenon where social users are concerned about privacy but their behaviors contradict these concerns to an extreme degree.

A)True

B)False

Q2) Recruiters learn a great deal of information,all of which they are allowed to use in their decision to interview,recommend,or hire someone from what job candidates post about themselves and through their check-ins and posts.

A)True

B)False

Q3) ________ is a claim made by an injured party against an employer who knew or should have known about an employee's background that indicates a dangerous or untrustworthy character.

A)Civil rights

B)Protected class

C)Genome

D)Negligent hiring

Q4) __________ is a term used in these laws to describe characteristics that cannot be targeted for discrimination and harassment.

To view all questions and flashcards with answers, click on the resource link above. Page 16

Turn static files into dynamic content formats.

Create a flipbook