

Information Technology in Organizations Exam Preparation Guide
Course Introduction
This course explores the strategic role of information technology (IT) within modern organizations, examining how IT enables innovation, supports business processes, and drives competitive advantage. Students will gain insight into the alignment of IT and organizational goals, the management of IT resources, and the evaluation of technology investments. Key topics include information systems, digital transformation, cybersecurity, ethical considerations, and the impact of emerging technologies on organizational structures and cultures. Through case studies and real-world examples, students will develop the skills needed to effectively leverage IT in diverse organizational contexts.
Recommended Textbook
Technology In Action Complete 11th Edition by
Alan Evans
Available Study Resources on Quizplus
17 Chapters
1122 Verified Questions
1122 Flashcards
Source URL: https://quizplus.com/study-set/1390

Page 2

Chapter 1: Using Technology to Change the World
Available Study Resources on Quizplus for this Chatper
69 Verified Questions
69 Flashcards
Source URL: https://quizplus.com/quiz/27700
Sample Questions
Q1) ________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies.
A) Social networking
B) Crowdsourcing
C) Crisis-mapping
D) Affective computing
Answer: C
Q2) Purpose is the simple understanding that you are working for something larger than yourself.
A)True
B)False
Answer: True
Q3) Electronic junk mail is known as ________.
Answer: spam
Q4) The ________ is a collaboration of several museums that allows online visitors to explore over a thousand pieces of art.
Answer: Google Art Project
Q5) ________ applies computer systems and techniques to gather legal evidence.
Answer: Computer forensics
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Looking at Computers: Understanding the Parts
Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/27701
Sample Questions
Q1) All of the following are examples of nonvolatile storage EXCEPT ________.
A) hard disk drive
B) DVD
C) RAM
D) USB drive
Answer: C
Q2) Keyboards that display on screen when input of text is required are known as virtual keyboards.
A)True
B)False
Answer: True
Q3) RAM is a series of small cards plugged into slots on the ________.
Answer: motherboard circuit board
Q4) A(n) ________ is a computer that is designed to perform complex calculations very rapidly.
Answer: supercomputer
Q5) The width-to-height proportion of a monitor is known as the ________. Answer: aspect ratio
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Using the Internet: Making the Most of the Webs Resources
Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/27702
Sample Questions
Q1) All of the following are types of e-commerce business EXCEPT ________.
A) B2C
B) B2B
C) C2C
D) C2B
Answer: D
Q2) Tagging enables you to share your favorite websites with others.
A)True
B)False
Answer: True
Q3) Podcasts enable you to ________.
A) deliver audio/video files via RSS
B) post journal entries on the web
C) communicate with friends in real time
D) edit video files over the web
Answer: A
Q4) iphones and iPads use Flash to play videos.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Application Software: Programs That Let You
Work and Play
Available Study Resources on Quizplus for this Chatper
71 Verified Questions
71 Flashcards
Source URL: https://quizplus.com/quiz/27703
Sample Questions
Q1) Software that manages "back office" functions such as billing, production, inventory management, and human resources management is called ________ software.
A) accounting
B) enterprise resource planning
C) project management
D) customer relationship management
Q2) Which of the following is the most common audio compression format?
A) WAV
B) AU
C) MP3
D) WMA
Q3) Desktop publishing software enables you to create newsletters and annual reports.
A)True
B)False
Q4) Software such as Apple Pages that is used to create résumés, letters, and other documents is called ________ software.
Q5) A Microsoft Office________ guides you through the steps necessary to finish a complicated task.
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: System Software: the Operating System, Utility
Programs, and File Management
Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/27704
Sample Questions
Q1) All of the following are examples of network operating systems EXCEPT ________.
A) Windows 8
B) Linux
C) OS X
D) MS-DOS
Q2) PnP stands for ________.
Q3) Errors in computer software are called ________.
A) worms
B) beetles
C) bugs
D) spiders
Q4) The ________ contains an index to files that have been deleted or have been moved.
Q5) You can use System Restore to restore your system's settings back to a specific date when everything was working properly.
A)True
B)False
Q6) When a computer is booted, the ________ checks the computer's components.
Q7) MS-DOS first used a(n) ________ interface.
Q8) The fuel-injection system in car engine uses a(n) ________ operating system. Page 7
To view all questions and flashcards with answers, click on the resource link above.
Page 8

Chapter 6: Understanding and Assessing Hardware:
Evaluating Your System
Available Study Resources on Quizplus for this Chatper
71 Verified Questions
71 Flashcards
Source URL: https://quizplus.com/quiz/27705
Sample Questions
Q1) RAM is an example of ________ storage because when the power is turned off, RAM is cleared out.
Q2) The use of multiple cores on one CPU chip allows the execution of two or more sets of instructions at the same time.
A)True
B)False
Q3) The control unit is one component of the ________.
A) CPU
B) cache
C) front side bus
D) clock
Q4) Windows uses a memory-management technique known as ________ to monitor which applications you frequently use and preloads them into your system memory.
A) SuperGet
B) SuperFetch
C) SuperTake
D) SuperRetrieve
Q5) ________ improves disk writing performance because data is written across two drives.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 7: Networking: Connecting Computing Devices
Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/27706
Sample Questions
Q1) WEP is a stronger form of security than WPA.
A)True
B)False
Q2) WPA stands for ________.
Q3) SSID stands for ________.
Q4) A router acts like a traffic signal on a network.
A)True
B)False
Q5) Data are sent through a network in bundles called ________.
A) packages
B) pouches
C) packets
D) nodes
Q6) The most popular transmission media option for wired Ethernet networks is UTP cable.
A)True
B)False
Q7) Many cities in the United States now provide a(n) ________ area network to allow Internet access to residents and tourists.
To view all questions and flashcards with answers, click on the resource link above. Page 10
Q8) The capability of current devices to use earlier standards is known as ________.

Chapter 8: Digital Devices and Media: Managing a Digital Lifestyle
Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/27707
Sample Questions
Q1) A(n) ________ is a rule that squeezes the same audio and video information into less space.
Q2) The Form 1 3D printer founders used the crowdfunding site ________ to ask for $100,000 in pledges.
A) Jumpstart
B) Upstart
C) Crowdfunder
D) Kickstarter
Q3) A tablet uses a full traditional operating system.
A)True
B)False
Q4) A(n) ________ cable carries all audio and video information from devices to a connected TV.
A) HDMI
B) S component
C) Ethernet
D) RJ11
Q5) A specialized chip included in the cell phone that handles digital compression data is called the ________.
Q6) Digital camera resolution is measured in ________. Page 11
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 9: Securing Your System: Protecting Your Digital
Data and Devices
Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/27708
Sample Questions
Q1) The most financially damaging cybercrime affecting individuals is ________.
Q2) Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
A) engineering
B) theft
C) pretexting
D) pharming
Q3) CAPTCHA stands for ________.
A) Completely Amazing Public Turing Test to Tell Computers and Humans Apart
B) Completely Automated Private Turing Trial to Tell Computers and Humans Apart
C) Completely Automated Public Turing Test to Tell Computers and Humans Apart
D) Complete Automated Public Turing Trial to Tell Computers and Humans Apart
Q4) A ________ is a virus that is attached to documents such as Word or Excel files.
A) script virus
B) macro virus
C) polymorphic virus
D) Trojan horse
Q5) A(n) ________ virus is a series of commands that is executed without your knowledge.
Q6) A(n) ________ can help block unwanted, unsolicited e-mail. Page 13
To view all questions and flashcards with answers, click on the resource link above.
Page 14

Chapter 10: Behind the Scenes: Software Programming
Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/27709
Sample Questions
Q1) The keywords used in programming languages that use decisions to redirect the flow of a program are called ________.
A) pseudocode
B) control structures
C) flowcharts
D) operators
Q2) The final step of the system development life cycle (SDLC) is ________.
A) testing and installation
B) maintenance and evaluation
C) analysis
D) design
Q3) During the program debugging stage, the people who will use the program test the software.
A)True
B)False
Q4) The standard set of vocabulary for pseudocode is specific and detailed.
A)True
B)False
Q5) ________-generation languages use symbols and commands to tell the computer what to do.
To view all questions and flashcards with answers, click on the resource link above. Page 15
Chapter 11: Behind the Scenes: Databases and Information Systems
Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/27710
Sample Questions
Q1) The Siri personal assistant application on Apple's iPhone 5s is an example of a
A) natural language processing (NLP) system
B) decision support system (DSS)
C) management information system (MIS)
D) database management system (DBMS)
Q2) ________ is the process of ensuring that the data entered into a field meets specified guidelines.
Q3) In a database, another term for a table is a(n) ________.
Q4) Employees' last names would usually make an appropriate primary-key field. A)True
B)False
Q5) When creating a data warehouse, ________ is is the process that extracts data from source databases, reformats the data, and stores them in the warehouse.
Q6) In a relational database, when two tables have a common field, the link between the tables is known as a hyperlink.
A)True
B)False

Page 16
Q7) A group of related records is called a(n) ________.
To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Behind the Scenes: Networking and Security in the Business World
Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/27711
Sample Questions
Q1) MAC addresses and IP addresses are the same thing.
A)True
B)False
Q2) Most home networks use ________ cable, which is most susceptible to interference.
A) fiber-optic
B) unshielded twisted-pair
C) wi-fi
D) coaxial
Q3) A ring topology is also known as a(n) ________ topology.
Q4) A ________ is a group of two or more computers, or nodes, designed to share information and resources.
A) router
B) bus
C) bridge
D) network
Q5) A facial-recognition scanner is an example of a biometric authentication device.
A)True
B)False
Q6) A(n) ________ is made up of two or more LANs that are miles apart. Page 17
To view all questions and flashcards with answers, click on the resource link above.
Page 18

Chapter 13: Behind the Scenes: How the Internet Works
Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/27712
Sample Questions
Q1) A(n) ________ is a small program that resides on a server, is downloaded to the client, and runs when needed without additional data transfers between the client and server.
Q2) Which of the following is an example of an instant messenger service?
A) LinkedIn
B) Monster
C) Yahoo Messenger
D) Flickr
Q3) The ________ IP addressing scheme uses 128-bit addressing.
Q4) Which of the following information is NOT contained in a packet?
A) The size (in bytes) of the packet
B) The address to which the packet is sent
C) The address from where the packet originates
D) The data that are transmitted
Q5) When using packet switching, packets are always sent over the same route.
A)True
B)False
Q6) MIME stands for ________.
Q7) ________ combines HTML, cascading style sheets, and JavaScript.
Q8) In http://example.gov, what is the second-level domain?
To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 14: Tif 1: the History of the Personal Computer
Available Study Resources on Quizplus for this Chatper
35 Verified Questions
35 Flashcards
Source URL: https://quizplus.com/quiz/27699
Sample Questions
Q1) Within a year of its introduction in 1981, the ________ computer dominated the personal computer market.
Q2) Computers that used integrated circuits are referred to as third-generation computers.
A)True
B)False
Q3) What was the first word processing application to be used on personal computers?
A) WordPerfect
B) WordStar
C) Microsoft Word
D) Quattro-Pro
Q4) The Z1 is thought to be the first computer to include features such as a control unit and separate memory functions.
A)True
B)False
Q5) The Tabulating Machine Company later changed its name to ________.
Q6) The CP/M, which stands for ________, was the first operating system designed for the Intel 8080 chip, the processor for PCs.
Q7) Steve Jobs and Steve Wozniak are the founders of ________.
To view all questions and flashcards with answers, click on the resource link above. Page 20

Chapter 15: Tif 2: Information Technology Ethics
Available Study Resources on Quizplus for this Chatper
34 Verified Questions
34 Flashcards
Source URL: https://quizplus.com/quiz/27698
Sample Questions
Q1) Cyberbullying is harassing, threatening, humiliating, embarrassing, or tormenting individuals by means of technology.
A)True
B)False
Q2) A person who does not conform to the approved standards of social or professional behavior ________.
A) violates social norms
B) practices situational ethics
C) follows rule utilitarianism
D) commits unethical behavior
Q3) Relativism holds that moral principles are dictated by cultural tastes and customs.
A)True
B)False
Q4) The proposed ________ Act seeks to prevent employers from demanding passwords to private sites from employees.
Q5) ________ is the right to be left alone as one pleases.
Q6) ________ is an ethical system in which individual happiness is not important, and the greater good should be considered.
To view all questions and flashcards with answers, click on the resource link above. Page 21

Chapter 16: Tif 3: Under the Hood
Available Study Resources on Quizplus for this Chatper
35 Verified Questions
35 Flashcards
Source URL: https://quizplus.com/quiz/27697
Sample Questions
Q1) A binary digit that represents a 0 or a 1 is called a(n) ________.
Q2) The collection of commands that a CPU executes is called the instruction set.
A)True
B)False
Q3) The Intel i7 Extreme Edition is a CPU that uses ________ processing.
Q4) Unicode is a system for representing ________.
A) integers
B) sounds
C) colors
D) characters
Q5) Level 1 cache is located farther away from the CPU than Level 3 cache.
A)True
B)False
Q6) The ASCII code is able to represent the alphabets of all modern and historic languages.
A)True
B)False
Q7) Mathematical operations and comparisons are performed in the ________.
Q9) ________ is the final step of the CPU machine cycle. Page 22
Q8) The hexadecimal number system is also known as the base-________ number system.
To view all questions and flashcards with answers, click on the resource link above.
Page 23

Chapter 17: Tif 4: Careers in It
Available Study Resources on Quizplus for this Chatper
36 Verified Questions
36 Flashcards
Source URL: https://quizplus.com/quiz/27696
Sample Questions
Q1) Which information technology job has the lowest predicted 10-year growth?
A) Computer programmer
B) Software developer
C) Computer support specialist
D) Computer and information research scientist
Q2) Game development jobs typically are divided into two paths: designers and ________.
Q3) The Institute of Electrical and Electronics Engineers (IEEE) is an organization that provides leadership and determines engineering standards for network computing devices and protocols.
A)True
B)False
Q4) When a U.S. company hires a company outside of the United States, it uses a technique called ________.
A) offshoring
B) offtracking
C) telecommuting
D) exporting
Q5) Network administrators are sometimes called network ________.
Q6) The percentage of women in the IT workforce is ________%.
To view all questions and flashcards with answers, click on the resource link above. Page 24