

Information Technology for Managers
Review Questions
Course Introduction
Information Technology for Managers provides an essential overview of key IT concepts, tools, and strategies that modern managers need to effectively lead organizations in the digital age. The course explores the role of information systems in supporting business operations, decision making, and competitive advantage. Topics include information system types, data management, cybersecurity, emerging technologies, IT project management, and aligning IT strategy with organizational goals. Designed for non-technical managers, the course emphasizes how to assess technology needs, evaluate IT solutions, and foster digital innovation within teams.
Recommended Textbook
Managing Information Technology 7th Edition by Carol V. Brown
Available Study Resources on Quizplus
15 Chapters
490 Verified Questions
490 Flashcards
Source URL: https://quizplus.com/study-set/516

Page 2

Chapter 1: Managing IT in a Digital World
Available Study Resources on Quizplus for this Chatper
20 Verified Questions
20 Flashcards
Source URL: https://quizplus.com/quiz/9654
Sample Questions
Q1) Managing the costs and vulnerabilities of the data centers and networks that provide access to business data and applications is the only major role of IT leaders.
A)True
B)False
Answer: False
Q2) A telecommuter is one who works from a location outside the company's regular offices and communicates via IT in order to do his or her work.
A)True
B)False
Answer: True
Q3) Information technology has been described as pervasive in today's world because:
A) Internet connectivity leads to increased privacy issues.
B) today's technology tools are increasingly more complex.
C) today's technology tools are becoming harder to use.
D) IT has become commonplace in the workplace and in many homes.
Answer: D
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Computer Systems
Available Study Resources on Quizplus for this Chatper
35 Verified Questions
35 Flashcards
Source URL: https://quizplus.com/quiz/9661
Sample Questions
Q1) Which of the following is an example of communications interface software that is used to transfer files from one computer system to another?
A) CICS
B) FTP
C) UML
D) Apache Answer: B
Q2) What is a commonly used rating of a computer's speed that is based on the number of instructions per second executed by the computer's control unit?
A) MFLOPS
B) MIPS
C) CPU
D) MPP
Answer: B
Q3) The CPU is made up of two components,the control unit and memory.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Telecommunications and Networking
Available Study Resources on Quizplus for this Chatper
36 Verified Questions
36 Flashcards
Source URL: https://quizplus.com/quiz/9662
Sample Questions
Q1) Early in the decade of the 2010s,two different technologies-WiMAX and LTE (Long Term Evolution)-are competing to become the dominant 4G network technology.
A)True
B)False
Answer: True
Q2) Which of the following networking hardware devices forwards all messages it receives to all devices that are connected to it,whether or not the messages need to go there?
A) gateway
B) hub
C) router
D) switch
Answer: B
Q3) Which type of technology relies on line-of-sight transmission?
A) Bluetooth
B) satellite
C) WiMAX
D) WiFi
Answer: B
To view all questions and flashcards with answers, click on the resource link above.
Page 5

Chapter 4: The Data Resource
Available Study Resources on Quizplus for this Chatper
34 Verified Questions
34 Flashcards
Source URL: https://quizplus.com/quiz/9663
Sample Questions
Q1) What organizational role or unit is responsible for functions such as maintaining metadata,reducing redundant data,and improving data quality across an organization?
A) data steward
B) database administrator
C) CIO
D) data administration
Q2) What organizational role or unit is responsible for the quality of the data in a particular subject database or departmental area?
A) data steward
B) database administrator
C) CIO
D) data administration
Q3) An application that distributes data to authorized users and manipulates data to create useful information from established data sources is called a:
A) data analysis and presentation application.
B) data capture application.
C) data transfer application.
D) disposable application.
To view all questions and flashcards with answers, click on the resource link above.
6

Chapter 5: Enterprise Systems
Available Study Resources on Quizplus for this Chatper
35 Verified Questions
35 Flashcards
Source URL: https://quizplus.com/quiz/9664
Sample Questions
Q1) What is a characteristic of a system with batch processing?
A) transactions are processed in real time
B) enables interactive decision support
C) processing costs are typically lower than for online processing
D) none of the above
Q2) According to the textbook,which of the following is not true when a firm is considering the implementation of an intranet?
A) If the basic infrastructure is already in place (e.g., Web browsers and Web server), implementation requires relatively little effort.
B) Little planning is required to design Web pages and contents.
C) The per-user costs are generally low.
D) Minimal user training is required.
Q3) Which one of the following answers consists of systems all of which have been defined in this textbook as enterprise systems?
A) expert system, data mining, neural networks
B) groupware, intranet, group support systems
C) data warehousing, data mining, business intelligence systems
D) intranet, customer relationship management, groupware
To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Managerial Support Systems
Available Study Resources on Quizplus for this Chatper
34 Verified Questions
34 Flashcards
Source URL: https://quizplus.com/quiz/9665
Sample Questions
Q1) Which of the following is not a major component of a DSS?
A) dialog management
B) inference engine
C) data management
D) model management
Q2) Mobile devices may use a type of GIS to:
A) find the fastest route to a location.
B) identify a store location.
C) find nearby restaurants.
D) all of the above
Q3) Questions that a GIS can directly answer include all of the following except:
A) What is adjacent to this feature?
B) Is this the best site for a new business?
C) How many features are within a certain distance of a site?
D) Which site is the nearest one?
Q4) Three major pieces of any expert system are:
A) user interface, knowledge base, and workspace.
B) expert system shell, knowledge acquisition system, and explanation system.
C) knowledge base, inference engine, and user interface.
D) expert system shell, inference engine, and knowledge acquisition system.
Page 8
To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: E-Business Systems
Available Study Resources on Quizplus for this Chatper
34 Verified Questions
34 Flashcards
Source URL: https://quizplus.com/quiz/9666
Sample Questions
Q1) The Internet has its roots in ARPANET,a network of U.S.government and selected research and development firms in the private sector that grew to include educational institutions and other nonprofit organizations.
A)True
B)False
Q2) Which of the following is an example of a "first mover" success not always being valid?
A) Google
B) eBay
C) Yahoo!
D) Staples
Q3) Which of the following is not an example of an online intermediary?
A) Dell
B) e-Bay
C) Facebook
D) Google
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Basic Systems Concepts and Tools
Available Study Resources on Quizplus for this Chatper
33 Verified Questions
33 Flashcards
Source URL: https://quizplus.com/quiz/9667
Sample Questions
Q1) Using a payroll system as an example,paychecks and W-2 forms are examples of which of the following system elements?
A) outputs
B) inputs
C) storage
D) memory
Q2) Which of the following elements usually includes subcomponents to filter,translate,store,and correct data that flows through it?
A) component
B) environment
C) storage
D) interface
Q3) Which of the following describes an early step in the implementation phase of the systems life cycle?
A) The system is detailed functionally, and then its physical design is specified.
B) Programs and computer files are designed.
C) Operational feasibility is conducted.
D) Data and procedures from the old system are converted.
To view all questions and flashcards with answers, click on the resource link above.
10

Chapter 9: Methodologies for Custom Software Development
Available Study Resources on Quizplus for this Chatper
37 Verified Questions
37 Flashcards
Source URL: https://quizplus.com/quiz/9668
Sample Questions
Q1) The agile method that emphasizes independent project teams,coordination and communication between and within teams with lots of team meetings,iterative and continuous monitoring of work,team ownership of the final product is called:
A) XML.
B) RAD.
C) Scrum.
D) JAD.
Q2) Which of the following is not a characteristic of eXtreme Programming (XP)?
A) it is a one type of so-called agile approaches to systems development
B) programmers write code in pairs and test their own code
C) both definition and construction tasks are accomplished together
D) it works best when developing large-scale, complex transaction processing systems
Q3) The parallel strategy of installing a new system is the riskiest method of installation because the old system is abandoned as soon as the new system is implemented.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Methodologies for Purchased Software
Packages
Available Study Resources on Quizplus for this Chatper
37 Verified Questions
37 Flashcards
Source URL: https://quizplus.com/quiz/9655
Sample Questions
Q1) Which is not a potential disadvantage of purchasing packaged systems?
A) costs more than if custom developed (in-house or contractor)
B) IS and business personnel's lack of detailed knowledge about how the package works
C) dependence on an external vendor
D) the potential for greater user resistance due to process changes to match the package
Q2) With a cost-reimbursement type of contract,the greatest risk is assumed by:
A) the purchasing company.
B) the vendor.
C) both the purchasing company and the vendor.
D) neither the purchasing company nor the vendor.
Q3) Which criterion should a firm consider when evaluating candidate software packages?
A) functional capabilities of the packaged system
B) technical requirements the software must satisfy
C) business characteristics of the vendor firm
D) all of the above
To view all questions and flashcards with answers, click on the resource link above.
Page 12

Chapter 11: IT Project Management
Available Study Resources on Quizplus for this Chatper
33 Verified Questions
33 Flashcards
Source URL: https://quizplus.com/quiz/9656
Sample Questions
Q1) Using the scheme proposed by Denis et al (2004)for prioritizing systems projects,which statement is true?
A) Absolute Must and Highly Desired/Business-Critical projects are typically funded in the year submitted.
B) Wanted projects with an ROI greater than 12 months are never funded.
C) Nice to Have projects are typically outsourced.
D) all of the above
Q2) Which of the following is not one of the three stages of the Lewin/Schein change model?
A) unfreezing stage
B) moving stage
C) refreezing stage
D) transitioning stage
Q3) The project champion is a business manager who has high credibility as an organizational spokesperson among the user community,and is successful at communicating the business vision and project benefits.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Planning Information Systems Resources
Available Study Resources on Quizplus for this Chatper
23 Verified Questions
23 Flashcards
Source URL: https://quizplus.com/quiz/9657
Sample Questions
Q1) The ________ contains a set of longer-term objectives (often three to five years)that represent measurable movement toward the information vision and IT architecture and a set of associated major initiatives that must be undertaken to achieve these objectives.
A) business strategic plan
B) operational IS plan
C) strategic IS plan
D) information resource assessment
Q2) In a value chain analysis,which is not a method of establishing a competitive advantage in an industry?
A) make products/services more desirable by offering unique features
B) establish stronger links with suppliers to obtain lower-cost, higher-quality materials
C) replicate other successful companies' IT architectures
D) inhibit the entry of competitors by raising the stakes for competing in the market
To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Leading the Information Systems Function
Available Study Resources on Quizplus for this Chatper
31 Verified Questions
31 Flashcards
Source URL: https://quizplus.com/quiz/9658
Sample Questions
Q1) When to abandon a legacy system,versus continuing to incur application maintenance costs,is a key application management issue.
A)True
B)False
Q2) "Best shore" outsourcing refers to:
A) using a vendor based on the East or West coast of the U.S.
B) using a vendor that is geographically closest to the client firm headquarters.
C) keeping all IS work in-house.
D) choosing the best geographic site where the client firm already has a presence.
Q3) Which of the following is a CMM maturity level focus area?
A) repeatable, necessary processes
B) defined, documented software engineering processes
C) optimized, continuous process improvement
D) creative, ad hoc processes
Q4) Many technology decisions involve trade-off decisions from a service delivery perspective.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above.
15

Chapter 14: Information Security
Available Study Resources on Quizplus for this Chatper
33 Verified Questions
33 Flashcards
Source URL: https://quizplus.com/quiz/9659
Sample Questions
Q1) Hackers can be differentiated from crackers by:
A) the types of targets they select.
B) the tools that they use.
C) their level of malicious intent.
D) whether they are internal or external to the target organization.
Q2) Which of the following must an organization's management do if HIPAA applies to its activities?
A) assign a person or persons to be responsible for HIPAA compliance
B) decide whether or not to comply with HIPAA
C) take out HIPAA compliance insurance
D) all of the above
Q3) Which of the following is a typical statement included in an organization's acceptable use policy?
A) The organization's computing resources (hardware, software, network services) are company property.
B) An employee does not have privacy rights to their usage of these computing resources.
C) Specific types of computing behavior are prohibited by federal or state laws.
D) all of the above.
To view all questions and flashcards with answers, click on the resource link above.
Page 16

Chapter 15: Social, Ethical, and Legal Issues
Available Study Resources on Quizplus for this Chatper
35 Verified Questions
35 Flashcards
Source URL: https://quizplus.com/quiz/9660
Sample Questions
Q1) According to the Federal Trade Commission,"someone appropriating your personal information without your knowledge to commit fraud or theft" is called:
A) an identity theft.
B) a credit information theft.
C) an intellectual property theft.
D) internet file sharing.
Q2) Which of the following regions has the lowest rate of software piracy?
A) North America
B) Western Europe
C) Asia/Pacific
D) Latin America
Q3) Advances in artificial intelligence can raise social and ethical issues because:
A) computers can sift through mountains of data better than humans.
B) computers can be programmed to replace human experts in the workplace.
C) the degree to which a robot acts ethically depends on how it is programmed.
D) all of the above
Q4) The U.S.has much stronger privacy laws and practices than Europe.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 17