

![]()


This course explores the strategic role of information technology (IT) in modern business environments. Students will learn how IT systems are leveraged to support decision-making, improve organizational efficiency, and enable innovation across various industries. The curriculum covers fundamental concepts such as databases, enterprise systems, networking, cybersecurity, and the integration of emerging technologies like cloud computing and big data analytics. Through case studies and real-world applications, students will gain insights into the challenges and opportunities presented by digital transformation, and develop skills to assess, implement, and manage IT resources effectively to meet business objectives.
Recommended Textbook
Information Systems Today Managing in the Digital World 6th Edition by Joe Valacich
Available Study Resources on Quizplus
11 Chapters
1122 Verified Questions
1122 Flashcards
Source URL: https://quizplus.com/study-set/486 Page 2

Available Study Resources on Quizplus for this Chatper
102 Verified Questions
102 Flashcards
Source URL: https://quizplus.com/quiz/9005
Sample Questions
Q1) ________ is concerned with what information an individual should have to reveal to others in the workplace or through other transactions,such as online shopping.
A) Information accessibility
B) Information accuracy
C) Information privacy
D) Information asymmetry
E) Information piracy
Answer: C
Q2) According to the suggestions of the noted technology author Nicholas Carr,cloud computing can contribute to an increase in outsourcing.
A)True
B)False
Answer: False
Q3) Software refers to a group of two or more computer systems linked together with communications equipment.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above. Page 3

Available Study Resources on Quizplus for this Chatper
101 Verified Questions
101 Flashcards
Source URL: https://quizplus.com/quiz/9008
Sample Questions
Q1) According to ________,the number of transistors that could be squeezed onto a silicon chip would double every 18 months.
A) Metcalfe's law
B) Megan's law
C) Murphy's law
D) Moore's law
E) Ashby's law
Answer: D
Q2) At the ________ level of an organization,functional managers focus on monitoring and controlling operational-level activities and providing information to higher levels of the organization.
A) managerial
B) executive
C) strategic
D) superficial
E) illusive
Answer: A
To view all questions and flashcards with answers, click on the resource link above.
Page 4

Available Study Resources on Quizplus for this Chatper
99 Verified Questions
99 Flashcards
Source URL: https://quizplus.com/quiz/9009
Sample Questions
Q1) ________ is used to increase Web application performance.
A) Trusted computing
B) Distributed computing
C) Edge computing
D) IP convergence
E) Green computing
Answer: C
Q2) Which of the following statements is true about servers?
A) They are used to provide services to users within large organizations or to Web users.
B) They are primarily used as the main,central computing system for major corporations.
C) They are used primarily to assist in solving massive scientific problems.
D) They are optimized for visualization and rendering of three-dimensional models.
E) They are used for personal computing and small business computing.
Answer: A
To view all questions and flashcards with answers, click on the resource link above. Page 5

Available Study Resources on Quizplus for this Chatper
101 Verified Questions
101 Flashcards
Source URL: https://quizplus.com/quiz/9010
Sample Questions
Q1) Which of the following explains Web analytics?
A) conducting online marketing research to improve product quality
B) analyzing Web sites in order to find the best one in its category
C) tracking all online purchasers to try and increase their frequency of visit to a particular Web site
D) analyzing Web surfers' behavior in order to improve Web site performance
E) analyzing Web sites in order to find the best online business practices
Q2) Amazon.com is an example of a brick-and-mortar company.
A)True
B)False
Q3) The ________ stage of business-to-consumer electronic commerce allows customers to place orders and make payments.
A) e-integration
B) e-reintermediation
C) e-subscription
D) e-information
E) e-transaction
Q4) For Web sites to be successful,structural firmness is a must.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 6

Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/9011
Q1) Which of the following is a reason for the development of the semantic Web?
A) Web pages can be understood by people but not by computers.
B) Users are able to use any device in any network for any service.
C) Users give a lot of unnecessary personal information to social networking sites.
D) Widgets cannot be integrated into Web pages.
E) Users are skeptical while making purchases online due to the fear of getting cheated.
Q2) ________ are comprised of members from different geographic areas assembled as needed to collaborate on a certain project.
A) Work groups
B) Virtual teams
C) Non-core teams
D) Task forces
E) Command groups
Q3) Membership on virtual teams is fluid,with teams forming and disbanding as needed,with team size fluctuating as necessary,and with team members coming and going as they are needed.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 7

Available Study Resources on Quizplus for this Chatper
102 Verified Questions
102 Flashcards
Source URL: https://quizplus.com/quiz/9012
Sample Questions
Q1) Knowledge portals can be customized to meet the unique needs of their intended users.
A)True
B)False
Q2) ________ refers to the display of complex data relationships using a variety of graphical methods.
A) Normalization
B) Visualization
C) Clustering
D) Inferencing
E) Textual mining
Q3) Which of the following is a recording of a user's path through a Web site?
A) clustering
B) normalization
C) slicing and dicing
D) clickstream data
E) inferencing
Q4) Differentiate between clustering and classification processes in data mining.
Q5) Describe online analytical processing.
Q6) Distinguish explicit knowledge assets from tacit knowledge assets. Page 8
To view all questions and flashcards with answers, click on the resource link above.
Page 9

Available Study Resources on Quizplus for this Chatper
90 Verified Questions
90 Flashcards
Source URL: https://quizplus.com/quiz/9013
Sample Questions
Q1) The main objective of enterprise systems is to create competitive advantage by streamlining business activities within and outside a company.
A)True
B)False
Q2) Using service-oriented architecture,business processes are broken down into individual components that are designed to achieve the desired results for the service consumer.
A)True
B)False
Q3) ________ support the important internal activities of the organization for producing their products and services.
A) ERP focus components
B) ERP core components
C) ERP extended components
D) ERP base components
E) ERP covering components
Q4) Why do organizations need integrated enterprise systems?
Q5) Compare and contrast business process management and total quality management.
Q6) Write a short note on the make-to-stock and make-to-order process. Page 10
To view all questions and flashcards with answers, click on the resource link above. Page 11

Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/9014
Q1) ________ can be used just about anywhere a unique identification system might be needed,such as on clothing,pets,cars,keys,missiles,or manufactured parts.
A) HTML tags
B) RFID tags
C) Spintronics
D) XML tags
E) High capacity color barcodes
Q2) ________ tools help a company in the execution of the CRM strategy by improving the management of promotional campaigns.
A) Business intelligence
B) Sales force automation
C) Enterprise marketing management
D) Customer interaction center
E) Execution management
Q3) Although RFID tags contain more information than bar codes,they require time-consuming hand scanning.
A)True
B)False
Q4) List the ways in which collaborative CRM enhances communication.
Page 12
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/9015
Sample Questions
Q1) ________ testing involves testing of the capabilities of the system in the user environment with actual data.
A) Developmental
B) Beta
C) Evolutionary
D) Alpha
E) Comparative
Q2) The first phase of the systems development lifecycle is systems design.
A)True
B)False
Q3) System efficiency is the extent to which a system ________.
A) allows firms to reach their operational targets
B) allows people to plan tasks that are achievable
C) enables people to accomplish goals or tasks well
D) enables people to do things faster or at lower cost
E) allows employees to reduce the risks associated with tasks
Q4) What is the productivity paradox for technology investments? Explain the possible reasons for the productivity paradox.
Q5) What is an RFP? What areas does an RFP cover?
Q6) What are the different types of software maintenance?
Page 13
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
103 Verified Questions
103 Flashcards
Source URL: https://quizplus.com/quiz/9006
Q1) Albitrex Systems is an Asian software consulting firm which develops solutions for companies in the United States and Europe.The company is heavily dependent on the Internet for transporting data.The company wants to ensure that only authorized users access the data and that the data cannot be intercepted and compromised.Which of the following would be most helpful to the company in achieving this goal?
A) spam filtering
B) hot backing up
C) tunneling
D) open transmitting
E) cloud storage
Q2) Computer crime is defined as the act of using a computer to commit an illegal act.
A)True
B)False
Q3) What is unauthorized access? Provide a few examples of unauthorized access.
Q4) What are cookies? Do they pose a threat to users?
Q5) List the six commonly used methods in which technology is employed to safeguard information systems.
Q6) Compare and contrast computer viruses and a Trojan horse.
To view all questions and flashcards with answers, click on the resource link above. Page 14
Available Study Resources on Quizplus for this Chatper
124 Verified Questions
124 Flashcards
Source URL: https://quizplus.com/quiz/9007
Sample Questions
Q1) ________ are data streams transmitted using specific protocols that are available for immediate playback on the recipient's computer.
A) Direct connect
B) Parallel data rendering
C) Streaming media
D) Stream ciphers
E) Digital data
Q2) Which of the following is an input device used to enter information into computers?
A) microprocessor
B) keyboard
C) inkjet printer
D) e-paper
E) monitor
Q3) Distinguish between local area and wide area networks.
Q4) The only difference between Java and JavaScript is that JavaScript cannot perform the Java function of supplying interactive content to Web pages.
A)True
B)False

Page 15
To view all questions and flashcards with answers, click on the resource link above.