Information Technology Management Test Questions - 1128 Verified Questions

Page 1


Information Technology Management Test Questions

Course Introduction

Information Technology Management is a course designed to provide students with a comprehensive understanding of how organizations strategically use information technology to achieve business objectives. Through the exploration of key concepts such as IT infrastructure, systems integration, data governance, digital transformation, and cybersecurity, students learn how IT can enhance operational efficiency, drive innovation, and support decision-making processes. The course combines theoretical frameworks with practical case studies, equipping students with the skills to manage technology resources, evaluate emerging technologies, and align IT initiatives with organizational goals in a dynamic business environment.

Recommended Textbook

Information Systems Today Managing in the Digital World 7th Edition by Joseph Valacich

Available Study Resources on Quizplus

11 Chapters

1128 Verified Questions

1128 Flashcards

Source URL: https://quizplus.com/study-set/2246

Page 2

Chapter 1: Managing in the Digital World

Available Study Resources on Quizplus for this Chatper

102 Verified Questions

102 Flashcards

Source URL: https://quizplus.com/quiz/44656

Sample Questions

Q1) Office automation systems such as Microsoft Office and the OpenOffice.org Productivity Suite provide word processing,spreadsheet,and other personal productivity tools,enabling knowledge workers to accomplish their tasks.

A)True

B)False

Answer: True

Q2) Which of the following is an economic change brought about by globalization enabled by information technology?

A) increase in the frequency of worldwide fads and phenomena

B) development of low-cost computing platforms

C) availability of low-cost communication systems

D) increase in the outsourcing of labor

E) decentralization of organizations

Answer: D

Q3) Vendors are required by law to respect the privacy of people who make Web purchases.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Gaining Competitive Advantage Through Information Systems

Available Study Resources on Quizplus for this Chatper

101 Verified Questions

101 Flashcards

Source URL: https://quizplus.com/quiz/44657

Sample Questions

Q1) Describe the differences between operational-level decision making and tactical-level decision making by managers in organizations.

Answer: At the operational level of a firm,the routine,day-to-day business processes and interactions with customers occur.Operational planning typically has a time frame of a few hours or days,and the managers at the operational level,such as foremen or supervisors,make day-to-day decisions that are highly structured and recurring. At the managerial level (or tactical level)of the organization,functional managers focus on monitoring and controlling operational-level activities and providing information to higher levels of the organization.Managers at this level,referred to as midlevel managers,focus on effectively utilizing and deploying organizational resources to achieve the strategic objectives of the organization.Managerial-level decision making is not nearly as structured or routine as operational-level decision making.Managerial-level decision making is referred to as semistructured decision making because solutions and problems are not clear-cut and often require judgment and expertise.

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Managing the Information Systems

Infrastructure and Services

Available Study Resources on Quizplus for this Chatper

99 Verified Questions

99 Flashcards

Source URL: https://quizplus.com/quiz/44658

Sample Questions

Q1) The protocol used by the Internet is called the ________.

A) Transmission Control Protocol (TCP)

B) Dynamic Host Configuration Protocol (DHCP)

C) Address Resolution Protocol (ARP)

D) Trivial File Transfer Protocol (TFTP)

E) TOC protocol

Answer: A

Q2) With respect to the general classes of computers,a ________ is very large and is used primarily as the main,central computing system for major corporations.

A) personal computer

B) supercomputer

C) server

D) mainframe computer

E) workstation

Answer: D

Q3) The name "Internet" is derived from the concept of wireless networking.

A)True

B)False

Answer: False

Page 5

To view all questions and flashcards with answers, click on the resource link above.

Chapter 4: Enabling Business-To-Consumer Electronic Commerce

Available Study Resources on Quizplus for this Chatper

101 Verified Questions

101 Flashcards

Source URL: https://quizplus.com/quiz/44659

Sample Questions

Q1) Which of the following characteristics of the Web deals with making the interaction with a Web site easier or more convenient?

A) representational delight

B) cost compliance

C) structural firmness

D) disintermediation capacity

E) functional convenience

Q2) When shoppers come into a store to evaluate the look and feel of a product,just to then purchase it online or at a competitor's store is known as ________.

A) showrooming

B) a rafter bid

C) freecycling

D) a forward auction

E) crowdsourcing

Q3) One drawback of pay-per-click models is the possibility of abuse by repeatedly clicking on a link to inflate revenue to the host or increase the costs for the advertiser.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Enhancing Organizational Communication and Collaboration Using Social Media

Available Study Resources on Quizplus for this Chatper

101 Verified Questions

101 Flashcards

Source URL: https://quizplus.com/quiz/44660

Sample Questions

Q1) Hashtags are used to add metadata to messages posted on social media applications,allowing users to search for content related to a certain topic.

A)True

B)False

Q2) Which of the following Web 2.0 applications has been classified by noted technology journalist Nicholas Carr as the "amateurization" of journalism?

A) blogs

B) discussion forums

C) message boards

D) instant messaging

E) chat rooms

Q3) Desktop videoconferencing has been enabled by the growing power of processors powering personal computers and faster Internet connections.

A)True

B)False

Q4) What are the key dimensions along which groupware and other collaboration tools are distinguished?

Q5) How is the concept of tagging related to social cataloging?

Page 7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Enhancing Business Intelligence Using Information Systems

Available Study Resources on Quizplus for this Chatper

102 Verified Questions

102 Flashcards

Source URL: https://quizplus.com/quiz/44661

Sample Questions

Q1) Knowledge portals can be customized to meet the unique needs of their intended users.

A)True

B)False

Q2) Which of the following is a risk associated with a database approach?

A) enforcement of standards

B) program-data independence

C) organizational conflict

D) minimal data redundancy

E) reduced program maintenance

Q3) Social network analysis is a technique that attempts to ________.

A) analyze large data warehouses to detect changes deemed important by a user

B) analyze why a key indicator is not at an appropriate level or why an exception occurred

C) discover hidden predictive relationships in the data

D) allow hypothetical changes to the data associated with a problem and observe how these changes influence the results

E) find experts in particular subject areas

Q4) Compare and contrast expert systems and neural networks.

Q5) Distinguish explicit knowledge assets from tacit knowledge assets.

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Enhancing Business Processes Using Enterprise

Information Systems

Available Study Resources on Quizplus for this Chatper

98 Verified Questions

98 Flashcards

Source URL: https://quizplus.com/quiz/44662

Sample Questions

Q1) In the procure-to-pay process,the negotiation of price and terms is followed by

A) settling the payment

B) creating the customer record

C) issuing the purchase order

D) receiving the goods

E) receiving the invoice

Q2) According to business process management,identify the next step taken by management after identifying the ways in which the information systems can be used.

A) identifying the critical processes that are to be redesigned

B) understanding and measuring the existing processes as a baseline for future improvements

C) reducing costs and shortening the time it takes to get products to market

D) designing and implementing a prototype of the new process

E) developing a vision for the organization that specifies the business objectives

Q3) The make-to-order process uses the pull-based approach.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Strengthening Business-To-Business

Relationships Via Supply Chain and Customer Relationship Management

Available Study Resources on Quizplus for this Chatper

100 Verified Questions

100 Flashcards

Source URL: https://quizplus.com/quiz/44663

Sample Questions

Q1) ________ involves the development of various resource plans to support the efficient and effective production of goods and services.

A) Requirement planning

B) Supply chain analytics

C) Requirement execution

D) Supply chain networking

E) Supply chain planning

Q2) Briefly describe the information flow element of a supply chain.

Q3) The efficiency of a supply chain management (SCM)system is independent of the data entered into it.

A)True

B)False

Q4) ________ is the extent to which a company's supply chain is focusing on minimizing procurement,production,and transportation costs.

A) Supply chain analytics

B) Supply chain effectiveness

C) Supply network collaboration

D) Supply chain efficiency

E) Supply chain visibility

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Developing and Acquiring Information Systems

Available Study Resources on Quizplus for this Chatper

100 Verified Questions

100 Flashcards

Source URL: https://quizplus.com/quiz/44664

Sample Questions

Q1) Analysts interview people informed about the operation and issues of the current or proposed system.

A)True

B)False

Q2) Which of the following is true of patch management?

A) It helps in testing the correctness of individual modules and the integration of multiple modules of a system.

B) It helps in the process of transforming the system design into a working computer system.

C) It helps in performing corrective or preventive maintenance for a system.

D) It helps in decommissioning the current system and installing the new system in the organization.

E) It helps to develop system documentation that details the inner workings of the system to ease future maintenance.

Q3) When making the case for an information systems (IS)investment,it is undesirable to translate all potential benefits into monetary terms.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above.

11

Chapter 10: Securing Information Systems

Available Study Resources on Quizplus for this Chatper

103 Verified Questions

103 Flashcards

Source URL: https://quizplus.com/quiz/44665

Sample Questions

Q1) Compare and contrast computer viruses and a Trojan horse.

Q2) Which of the following laws makes it mandatory for organizations to demonstrate that there are controls in place to prevent misuse and detect any potential problems?

A) Sarbanes-Oxley Act

B) Trade Expansion Act of 1962

C) Electronic Communications Privacy Act of 1986

D) Central Intelligence Agency Act

E) U.S.A. Patriot Act

Q3) While adding information to the employee information database,Neil's computer crashed,and the entire database was erased.Which of the following types of viruses caused Neil's computer to crash?

A) spyware

B) worms

C) adware

D) logic bombs

E) encryption

Q4) What are cookies? Do they pose a threat to users?

Q5) List the commonly used methods in which technology is employed to safeguard information systems.

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Appendix: Technology Briefing: Foundations of Information Systems Infrastructure

Available Study Resources on Quizplus for this Chatper

121 Verified Questions

121 Flashcards

Source URL: https://quizplus.com/quiz/44655

Sample Questions

Q1) Microwave signals can be disrupted over longer distances by environmental conditions such as high winds and heavy rain.

A)True

B)False

Q2) ________ codes are represented as a series of ones and zeros and are used to relay data and instructions to and from the central processing unit (CPU)of a computer.

A) Binary

B) Morse

C) Source

D) Block

E) Object

Q3) A ________ allows the use of Ethernet connections to connect to broadband modems,home networks,or work networks.

A) transceiver

B) multiport repeater

C) cable router

D) network interface card

E) modular connector

Q4) Describe the primary storage used in computer systems.

To view all questions and flashcards with answers, click on the resource link above. Page 13

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook