100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C954 INFORMIATION-Technology Management Exam-Bank (200 Multiple Choice) Questions and Answers Latest Guide

Rating
-
Sold
-
Pages
61
Grade
A+
Uploaded on
26-10-2025
Written in
2025/2026

1 / 51 WGU C954 INFORMIATION-Technology Management Exam-Bank (200 Multiple Choice) Questions and Answers Latest Guide 1. Which data set consumes disk space equal to the change in the data since it was last captured? A. Static B. Snapshot C. Dynamic D. Big: B 2. A business wants to allow its employees to communicate online with each other in real time. What should the business use to achieve this? A. Word processor B. Instant messaging C. Spreadsheet D. Email: B 3. An organization wants to calculate its sales by region. Which type of software will serve this need? A. Personnel management B. Inventory management C. Customer relationship management (CRM) D. Human resources management (HRM): C 4. Which component functions as a computer's working memory? A. Central processing unit (CPU) B. Read-only memory (ROM) C. Random access memory (RAM) D. Solid state drive (SSD): C 5. What is a secondary storage medium? A. Read-only memory B. Cache2 / 51 C. Magnetic tape D. Random access memory: C 6. Which type of network should a company use if they want to connect a group of computers in an office building?3 / 51 A. LAN B. WAN C. PAN D. MAN: A 7. Which network topology uses a central hub to which all devices on the network are connected? A. Wireless B. Bus C. Star D. Hybrid: C 8. Which multiuser operating system originated at AT&T's Bell Laboratories? A. OS X B. Android C. Unix D. Linux: C 9. Which lifecycle stage of ITIL focuses on ensuring that a business's objec- tives align with those of the IT provider? A. Service strategy (SS) B. Service transition (ST) C. Service design (SD) D. Service operation (SO): A 10. Why was ITIL developed? A. As an assessment tool to be used globally in the IT industry B. As a consulting organization to support the IT industry globally C. As a global oversight committee for the IT industry D. As a guide to be used globally in the IT industry: D 11. Which two subcategories are found within the service strategy stages? Choose 2 answers. A. Demand management B. Knowledge management C. Access management D. Problem management E. Financial management: AE4 / 51 12. Which IT ethics policy protects a company by outlining the corporate guidelines or principles governing online communications? A. Social media B. Information privacy C. Email privacy D. Acceptable use: A 13. What is an example of a best practice in an ethical IT use policy? A. Perform non-repudiation B. Eliminate information management risks C. Train employees in compliance D. Create automatic updates of software patches: C 14. Which IT ethical policy is violated when an employee shares information with non-employees about an impending release of a new software applica- tion? A. Intellectual property protection B. Software pirating C. Privacy breach D. Digital rights management: A 15. Which IT ethics policy requires a user to agree to follow a policy that indicates requirements for corporate email use, information systems, and the Internet? A. Social media B. Data retention C. Working conditions D. Acceptable use: D 16. Which IT ethics policy provides guidance to employees about posting information regarding the organization on websites? A. Social media B. Conflict of interest C. Internet use D. Individual unit: A 17. Which sustainability concern is addressed by upcycling? A. Increased energy consumption5 / 51 B. Decreased energy consumption C. Increased reuse of electronic waste D. Decreased reuse of electronic waste: C 18. Which type of sustainable computing infrastructure makes an electrical system more reliable by adding the ability to remotely monitor, analyze, and control the transmission of power? A. Smart grid B. Virtualized C. Cloud D. Utility: A 19. What is an example of a sustainable IT practice? A. A company installs 500 GB, rather than 1 TB, hard disks on office comput- ers. B. A company uses a powerful computer as its backup server to make sure its business is sustainable if the main server fails. C. A company signs a contract with a virtualization service provider to host its disaster recovery. D. A company asks their employees to bring their laptops to work to enhance the company's computing power.: C 20. Which type of unified communications system is used to analyze product cycles and competitive intelligence? A. Systems analysis B. Sales analytics C. Supply chain management D. Customer analytics: B 21. What is a benefit attributed to the use of unified communications? A. Customers have direct access to logistics information. B. Vendors are encouraged to use electronic data interchange (EDI) as a control technique for reorder. C. Data is easier to organize and archive. D. Electronic messages can be sent and received using different forms of communication.: D 22. Which characteristic of a podcast enable it to be used as a marketing tool? A. Can resolve questions or problems immediately6 / 51 B. Can make visual presentation over the web. C. Can answer simple questions quickly and easily D. Can be used for discussing detailed product overviews.: D 23. A company needs to increase the productivity of workers managing a project. Which type of software is designed to target this problem? A. Groupware B. Email C. Word processing D. Data management: A 24. A company wants to implement a system that allows the company to send coupons to customers who shop on their website. Which type of software system should the company implement? A. Customer relationship management (CRM) B. Data warehousing management (DWM) C. Supply chain management (SCM) D. Content management (CM): A 25. A company wants to visualize their critical success factors to maximize opportunities. Which system should they use? A. Transaction processing (TPS) B. Customer relationship management (CRM) C. Analytical processing (APS) D. Executive information (EIS): D 26. A company's board of directors suggests it should boost productivity in its factories by monitoring factory equipment and signaling when preventive maintenance is required. Which type of software should the company buy to meet this goal? A. Data warehousing B. Supply chain management C. Enterprise resource planning D. Artificial intelligence: D7 / 51 27. A business needs a system that supports unstructured, longterm, non-routine decisions requiring judgment, evaluation, and insight. Which type of management information system (MIS) addresses this need? A. Online analytical processing system (OAPS) B. Decision support system (DSS) C. Transaction processing systems (TPS) D. Executive information system (EIS): D 28. Which system has the goal to integrate all of the organizational systems into one fully functioning, high-performance system capable of meeting all business needs and user requirements? A. Customer relationship management (CRM) B. Decision support system (DSS) C. Business intelligence (BI) D. Enterprise resource planning (ERP): D 29. Which component is key in enterprise resource planning (ERP) systems? A. Metrics dashboard B. Common data repository C. Virtual desktop D. Local area network (LAN): B 30. Which enterprise resource planning (ERP) tool is formed from multiple data marts to store data? A. Data platform B. Data analysis C. Database D. Data warehouse: D 31. Which management system software extends customer relationship man- agement (CRM) by providing web-based tools to streamline the human re- source department? A. Employee B. Supplier C. Vendor D. Partner: A8 / 51 32. A company starts using a customer relationship management (CRM) sys- tem and discovers that it has a data mining component that collects informa- tion about the company's current customers' buying patterns. Which department should be using this information? A. Sales department B. Back office C. Front office D. IT department: B 33. Which type of customer relationship management (CRM) system maintains customer information and identifies prospective customers for future sales using tools such as organizational charts, detailed customer notes, and supplemental sales information? A. Contact management B. Sales management C. Opportunity management D. Partner management: A 34. Which attribute of IT professionals and managers allows them to champion early adoption of new technologies and services? A. Having a broad perspective B. Using a system approach C. Thinking like a venture capitalist D. Being a change agent: D 35. Why does a chief information officer (CIO) need to be cautiously collabo- rative? A. The more people involved, the easier it is to lead. B. Involving many people in decision-making quickens the process. C. Relying too much on others is perceived as a weakness. D. Many employees cannot come to a decision.: C 36. An IT leader contributes to driving performance, growing revenue as a business partner, and envisioning the business future. Which term refers to the business future focus? A. Venture capitalist9 / 51 B. Business strategist C. Chief technology officer (CTO) D. Change agent: A 37. What is one effective way to get IT leaders to start thinking of their posi- tions as business roles instead of technological experts? A. Market their value B. Work as a team C. Specialize in one area D. Participate in rotational programs: D 38. What is the difference between research and development (R&D) and innovation? A. Innovation is the result of investment, and R&D comes naturally. B. R&D is the result of investment, and innovation comes naturally. C. Innovation creates knowledge, and R&D creates new business. D. R&D creates knowledge, and innovation creates new business.: D 39. Which business principle suggests looking out beyond 36 months to envision a business's future? A. Tearing down the walls B. Thinking like a venture capitalist C. Building a culture of innovation d. Navigating the technology landscape: B 40. How do global growth trends in information industries impact IT leaders? A. Demand for personnel globally will increase the need for bi-lingual man- agers. B. Downsizing, outsourcing, and layoffs will continue as organizations restruc- ture. C. Information will flow from back-office workers to higher management for analysis. D. More mid-level managers will be required, thus flattening the corporate structure.: B 41. Which trend will have the greatest impact on future business according to the World Future Society? A. Time as one of the most precious commodities B. Negative rate of population growth in western countries10 / 51 C. Domination of China and India in the information industries D. Increased tensions between countries on scarce resources: A 42. Which cybersecurity attack monitors data traveling over a network includ- ing passwords and sensitive information? A. Sniffing B. Phishing C. Spoofing D. Spyware: A 43. Which hacker weapons rely on altering data as it travels on the Internet? A. Packet tampering B. Elevation of privilege C. Spam blogs D. Malicious code: A 44. Which small electronic device changes user passwords automatically? A. Certificate B. Token C. Private Key D. Smart card: B 45. Which security approach requires a username and password? A. Single-factor B. Tri-factor C. Two-factor D. Multifactor: A 46. Which type of authentication is based on recognition of physical charac- teristics such as voice or handwriting? A. Two-factor B. Single-factor C. Biometric D.Token: C 47. What is a detailed plan for recovering information or a system in the event of a catastrophic event? A. Technological continuity B. Business continuity11 / 51 C. Disaster recovery D. Backup and recovery: C 48. As part of a disaster recovery plan, a company establishes a site that is a separate facility fully equipped facility where the company can move immediately after a disaster and resume business. Which type of site is this? A. Hot B. Ready C. Cold D.Warm: A 49. An organization wants to enhance daily operational decision making through the use of an operational support system. Which tool should be used to capture event information needed for processing newly updated information? A. Online analytical processing B. Decision support system C. Online transaction processing D. Executive information system: C 50. What do employees at the managerial level of an organization continually evaluate in order to hone the firm's abilities to identify, adapt to, and leverage change? A. Structured decisions B. Semistructured decisions C. Transaction reports D. Company operations: D 51. Which term describes the agreed-upon time between the purchase and delivery of a product? A. Inventory cycle time B. Customer order cycle time C. Inventory turnover D. Back order: B 52. What can a company use to build a product prototype for the purpose of testing user acceptance before beginning large-scale production?12 / 51 A. Sketch B. 3D printer C. Wireframe D.Virtual factory: B 53. What is used to represent key dates for activities that need to be accom- plished? A. Project milestone B. Operational feasibility C. Responsibility matrix D. Project deliverable: A 54. Which tool links a project to an organization's overall business goals? A. Project objectives B. Communication plan C. Scope statement D. Project deliverable: C 55. What would a project lead use to identify the project's critical path? A. PERT chart B. Responsibility matrix C. Communication plan D. Project milestones: A 56. Which SMART criterion is used to analyze a deliverable outcome? A. Measurable B. Tangible C. Realistic D. Specific: A 57. What is the primary distinction between nearshore and offshore outsourc- ing? A. Cost B. Distance C. Technical skill D. Language: B 58. What has in-house development been instrumental in creating?13 / 51 A. Quality labor force B. Globalization C. Industry growth D. Consulting companies: A 59. Which software development methodology requires stakeholders to pro- vide a comprehensive list of requirements? A. Rapid application development (RAD) B. Extreme programming C. Waterfall D. Scrum: C 60. Which software development methodology uses early prototypes to best align with stakeholders' expectations? A. Rapid application development (RAD) B. Waterfall C. Extreme programming D. Rational unified process (RUP): A 61. Which software development methodology uses sequential gates? A. Waterfall B. Prototyping C. Rational unified process (RUP) D. Rapid application development (RAD): C 62. Which phase of the systems development life cycle (SDLC) is occurring when an organization brings project pieces together and checks interoper- ability? A. Design B. Testing C. Analysis D. Planning: B 63. Which phase of the systems development life cycle (SDLC) involves pro- grammers transforming a product into a new system? A. Testing B. Design C. Development D. Implementation: C14 / 51 64. A project team is reviewing the project scope to ensure it maps with stakeholder expectations. Which gate of the rational unified process (RUP) is the team executing? A. Elaboration B. Inception C. Construction D.Transition: B 65. An organization is operating an in-house developed system. Which phase of the waterfall methodology is the organization executing? A. Implementation B. Maintenance C. Analysis D. Development: B 66. What should a business analyst use to depict activities of different users? A. Workflow modeling B. Paper prototyping C. Storyboarding D. Simulations: C 67. Which prototyping method demonstrates how a solution operates? A. Workflow modeling B. Simulation C. Paper prototyping D. Storyboarding: B 68. Which prototyping method is used to predict user acceptance prior to system development? A. Diagrams B. Role playing C. Workflow modeling D. Storyboards: B 69. A company has multiple locations and employs hundreds of people. Employees must be connected to the same network and have access to the15 / 51 same servers to complete day-to-day tasks. Which computer category would meet16 / 51 this company's needs? A. Desktop computer B. Minicomputer C. Mainframe computer D. Laptop: C 70. Which topology is part of the five most common network topologies? A. Line B. Moon C. Full D. Ring: D 71. What is a client-server network? A. An operating system that runs a network, steering information between computers and managing security and users B. A model for applications in which the bulk of the back-end processing takes place on a server, while the front-end processing is handled by the clients C. A large computer network that spans large geographic areas, such as a state, province, or country D. A computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server: B 72. What is a wide area network (WAN)? A. A large computer network that spans large geographic areas, such as a state, province, or country B. A computer network designed to connect a group of computers in proximity to each other, such as in an office building, a school, or a home C. A large computer network usually spanning a city D. A model for applications in which the bulk of the back-end processing takes place on a server while the front-end processing is handled by the clients: A 73. What is system software?17 / 51 A. Software that controls the application software and manages how the hardware devices work together B. Software used for specific information processing needs, including payroll, customer relationship management, project management, training, and many other needs C. Software that controls how the various technology tools work together with the application software D. Software that handles contact information, appointments, task lists, and email: C 74. What is the role of the CPU in a computer system? A. To interpret and execute program instructions B. To send information and receive it from one location to another C. To capture information and commands D.To store large volumes of data for long-term storage: A 75. What is the function of return on investment (ROI) as a financial analysis ratio? A. It identifies the rate at which the net present value of an investment equals zero. B. It indicates the earning power of a project. C. It estimates what the stream of money will be in the coming months or years. D. It determines the volume of business required to make a profit at the current prices.: B 76. What is wired equivalent privacy (WEP)? A. A wireless security protocol to protect Wi-Fi networks B.The inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a Wi-Fi signal C. An encryption algorithm designed to protect wireless transmission data D. A common standard for wireless networking: C18 / 51 77. Which characteristic applies to wireless local area networks (WLANs)? A. WLANs use radio signals to transmit and receive data over distances of a few hundred feet. B. WLANs generally cover a range of less than 10 meters. C.WLANs can be divided into two categories: cellular communication systems and satellite communication systems. D.WLANs have not been highly successful to date, mainly because they are not widely available in the United States.: A 78. What is data visualization? A. The science of fact-based decision-making B.The process of identifying rare or unexpected items or events in a data set that do not conform to other items in the data set C.The process of analyzing data to extract information not offered by the raw data alone D. A method of utilizing technologies to view data and transform information into a business perspective: D 79. One phase of the data mining process is data preparation. What is the role of this phase? A.To gain a clear view of the problem that must be solved and how it affects the company B.To analyze trends and patterns to assess the potential for solving the problem C.To gather and organize data in the correct formats and structures for analysis D.To analyze all current data along with identifying any data quality issues: C 80. What is big data?19 / 51 A. A mathematical formula placed in software that performs an analysis on a data set B. The common term for the representation of multidimensional information C. A technique for modeling and analyzing several variables when the focus is on the relationship between a dependent variable and one or more indepen- dent variables D. A collection of large, complex data sets, including structured and unstruc- tured data, that cannot be analyzed using traditional database methods and tools: D 81. What is a relational database management system? A. An agent that acts as a liaison between the MIS department and the business responsible for ensuring that policies and procedures are implemented across an organization B. A data model for organizing information that allows users to create, read, update, and delete data in a relational database C. A program that creates, reads, updates, and deletes data in a database while controlling access and security D. An agent responsible for creating the original website content unanswered: C 82. What is a management information system (MIS)? A. A business function that moves information about people, products, and processes across a company to facilitate decision-making and problemsolv- ing B. A reference to devices that connect directly to other devices C. A time when infinite quantities of facts are widely available to anyone who can use a computer D. A world in which interconnected, internet-enabled devices are able to collect and share data without human intervention: A20 / 51 83. What is business intelligence? A.The collection of data from various sources for the purpose of data process- ing B. A method that uses data about people's behaviors to understand their intent and predict future actions C. Information collected from multiple sources, such as suppliers, customers, competitors, partners, and industries, that is analyzed for patterns, trends, and relationships for strategic decision-making D.The science of fact-based decision-making: C 84. Which category of hardware is described as "equipment used to capture information and commands"? A. Primary storage B. Secondary storage C. Input devices D. Output devices: C 85. Which unique benefit does a hybrid enterprise resource planning (ERP) system offer organizations? A. Data is stored, managed, and processed over the internet instead of on a personal computer. B. An internal network is used for internal access and firewalls for remote users' access. C. Applications are delivered over the cloud using a pay-per-use revenue model. D.The on-premises application is used in a physical location, such as a headquarters, with cloud-based applications supporting business needs such as mobility and web-based functions.: D 86. Which activity occurs at the operational level of a common company structure? A. Managers perform self-evaluations and adjust their pay or salary and21 / 51 benefits appropriately. B. Employees evaluate company operations to hone the firm's ability to iden- tify, adapt to, and leverage change. C. Employees develop control and maintain core business activities required to run day-to-day operations. D. Managers develop overall business strategies, goals, and objectives as part of the company's strategic plan.: C 87. What is a decision support system (DSS)? A. A commercial application of artificial intelligence (AI) B. A category of artificial intelligence (AI) that attempts to emulate the way the human brain works C. A computerized advisory program that imitates the reasoning processes of professionals in solving difficult problems D. An information model that helps evaluate and choose between different courses of action: D 88. What is a neural network? A. A specialized decision support system (DDS) that supports senior-level executives within the organization B. A category of artificial intelligence (AI) that attempts to emulate the way the human brain works C. Software that will search several retailer websites and compare each retail- er's offerings, including price and availability D.The basic business system that serves the operational level in an organiza- tion: B 89. What is the function of customer relationship management (CRM)? A. It allows an organization to gain insights into customers' shopping and buying behaviors.22 / 51 B. It discovers optimal sales channels by selecting the right partners and identifying mutual customers. C. It provides web-based self-service tools that streamline and automate the human resources department. D. It focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects.: A 90. What is the definition of business-to-customer (B2C)? A. An e-business model that applies to any consumer that sells a product or service to a business over the internet B. An evaluation of variables that search engines use to determine where a URL appears on the list of search results C. A website model that generates revenue each time a website visitor is converted to a customer D. An e-business model that applies to businesses buying from and selling to each other over the internet: A 91. Which challenge do e-businesses commonly face? A. Retaining customer loyalty B. Communicating with the supply chain C. Offering a variety of payment options D. Ensuring consumer protection: D 92. What is a collaboration system? A. A tag- or keyword-based classification system determined by crowdsourc- ing B. A set of tools that support the work of teams or groups by facilitating the sharing and flow of information C. A set of tools that support the capture, organization, and dissemination of knowledge throughout an organization23 / 51 D. A set of routines, protocols, and tools for building software applications: B 93. What is the definition of Real Simple Syndication (RSS)? A. A form of collective intelligence referring to the wisdom of the crowd B. An application that allows users to share, organize, search, and manage bookmarks C. A web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format D. An online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style, or placement: C 94. What is an application programming interface (API)? A. A set of routines, protocols, and tools for building software applications B. A website that relies on user participation and user-contributed content C. A set of tools that support the work of teams or groups by facilitating the sharing and flow of information D.The generation of internet use characterized by a more mature, distinctive communications platform: A 95. What is the order of steps in the six-step decision-making process? A. Data collection, solution selection, problem identification, solution imple- mentation, solution generation, and solution testing B. Solution generation, data collection, solution implementation, solution se- lection, problem identification, and solution testing C. Problem identification, data collection, solution generation, solution test- ing, solution selection, and solution implementation D. Solution generation, problem identification, solution implementation, data collection, solution selection, and solution testing: C 96. Why would a project require an executive sponsor according to the Project Management Institute (PMI)?24 / 51 A. To communicate project information to stakeholders B. To provide financial resources for a project C.To define specifications for the product or output of the project and to manage scope D.To define all project roles and responsibilities: B 97. What is a program evaluation and review technique (PERT) chart? A. A graphical network model that depicts a project's tasks and the relation- ships between those tasks B. A simple bar chart that lists project tasks vertically against the project's time frame, listed horizontally C. A trigger that enables a project manager to close a project prior to comple- tion D.The longest stretch of dependent activities, measuring these activities from start to finish: A 98. Which factor is a primary reason for project failure? A. Lack of capital B. Faulty data C. The balance of the triple constraints D. Mishandled debt: C 99. What is agile methodology? A. A sequence of phases in which the output of each phase becomes the input for the next B. A methodology that aims for customer satisfaction through early and continual delivery of useful software components developed by an iterative process with a design point that uses the bare minimum requirements C. A methodology that emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process D. A set of policies, procedures, standards, processes, practices, tools, tech25 / 51 niques, and tasks that people apply to technical and management challenges unanswered: B 100. What is waterfall methodology? A. A methodology that emphasizes extensive user involvement in the rapid and evolutionary construction of working system prototypes to accelerate the systems development process B. A methodology that uses small teams to produce small pieces of deliverable software using sprints or 30-day intervals that achieve an appointed goal C. A methodology that aims for customer satisfaction through early and continual delivery of useful software components developed by an iterative process with a design point that uses the bare minimum requirements D. A sequence of phases in which the output of each phase becomes the input for the next: D 101. What is the systems development life cycle (SDLC)? A.The overall process for developing information systems, from planning and analysis through implementation and maintenance B. Software that supports general business processes and does not require any specific software customization to meet the organization's needs C.The set of detailed steps a system must perform along with the expected results of each step D. A set of best practices that helps an organization maximize the benefits of an information system while also establishing appropriate controls to ensure minimum errors: A 102. What is the definition of project scope? A. A list that prioritizes all the business requirements by order of importance to the company B. The need, justification, requirements, and current boundaries for a project26 / 51 C.The overall process for developing information systems, from planning and27 / 51 analysis through implementation and maintenance D. Information that highlights how to use a system and troubleshoot issues or problems: B 103. What is a value chain analysis? A.The process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed B. A task at the bottom of the value chain, including business processes that acquire raw materials and then manufacture, deliver, market, sell, and provide after-sales services C. A standardized set of activities that accomplish a specific task, such as processing a customer's order D. A business tool that views a firm as a series of business processes that add value to a product or service: D 104. What is the definition of Porter's three generic strategies? A. A business strategy involving methods that are neither organizationnor industry-specific and can be applied to any business, product, or service B. A standardized set of activities that accomplish a specific task, such as processing a customer's order C. A task at the bottom of the value chain, including business processes that acquire raw materials and manufacture, deliver, market, sell, and provide after-sales services D.The process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed: A 105. What is an assessment of the competitive forces within the environment in which a company operates to evaluate the potential for profitability in an industry? A. SWOT analysis28 / 51 B. Value chain analysis C. Porter's five forces model D. Competitive intelligence: C 106. What is a SWOT analysis? A. A business tool that views a firm as a series of business processes that add value to a product or service B. An assessment of the competitive forces within the environment in which a company operates to evaluate the potential for profitability in an industry C. A business strategy involving methods that are neither organizationnor industry-specific and can be applied to any business, product, or service D. An evaluation of an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies: D 107. Which supply chain activity includes building relationships with suppli- ers to procure raw materials? A. Plan B. Source C. Make D. Deliver: B 108. What should managers ask when determining the cost of downtime? A.What counterattacks can be taken against causes of unplanned downtime? B. How many transactions can the company afford to lose without significantly harming business? C. How much downtime should be scheduled for each day, week, month, and year? D. How can downtime be used to improve business processes and productiv- ity?: B 109. Which description applies to black-hat hackers?29 / 51 A. They break into other people's computer systems and may look around or30 / 51 steal and destroy information. B.They work at the request of the system owners to find system vulnerabilities and plug the holes. C.They have philosophical and political reasons for breaking into systems and will often deface the website as a protest. D.They find hacking codes on the internet and point-and-click their way into systems to cause damage or spread viruses.: A 110. What is a virus? A. Software written with malicious intent to cause annoyance or damage B. Malicious software that spreads itself not only from file to file but also from computer to computer C. A special class of adware that collects user data and transmits it over the internet without the user's knowledge or permission D. A technology expert who breaks into computers and computer networks, either for profit or simply for the challenge: A 111. What is a worm? A. Malicious software that spreads itself not only from file to file but also from computer to computer B. A technology expert who breaks into computers and computer networks, either for profit or simply for the challenge C. A form of malicious software that infects a computer and blocks all access to the computer until given some form of payment D. Software written with malicious intent to cause annoyance or damage: A 112. What is ransomware? A. Malicious software that spreads itself not only from file to file but also from computer to computer31 / 51 B. Software that claims to serve a useful function, but its main purpose is to allow internet advertisers to display advertisements without the consent of the computer user C. A form of malicious software that infects a computer and blocks all access until given some form of payment D. A special class of adware that collects user data and transmits it over the internet without the user's knowledge or permission: C 113. What is adware? A. A special class of spyware that collects user data and transmits it over the internet without the user's knowledge or permission B. Malicious software that spreads itself not only from file to file but also from computer to computer C. Software written with malicious intent to cause annoyance or damage D. Software that claims to serve some useful function, but its main purpose is to allow internet advertisers to display advertisements without the consent of the computer user: D 114. What is spyware? A. A special class of adware that collects user data and transmits it over the internet without the user's knowledge or permission B. Malicious software that spreads itself not only from file to file but also from computer to computer C. A technology expert who breaks into computers and computer networks, either for profit or simply for the challenge D. A form of malicious software that infects a computer and blocks all access until given some form of payment: A 115. One agile management information system (MIS) infrastructure charac- teristic is accessibility. What does this mean in terms of a system?32 / 51 A. The system functions correctly and provides accurate information. B. The system is easy to learn, efficient, and satisfying to use. C.The system has varying levels defining what system users are allowed to access, view, or perform. D.The system is available to operate on different devices or software plat- forms.: C 116. What does it mean for a system to have portability? A. It is available to operate on different devices or software platforms. B. It can adapt to the increased demands of growth. C. It has varying levels defining what system users are allowed to access, view, or perform. D. It is operational during different time frames.: A 117. What is fault tolerance? A.The ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automatically takes over with no loss of service B. A system characteristic ensuring that all systems are functioning correctly and providing accurate information C. A measure of how quickly a system performs a certain process or transac- tion D. A time when a system is not operating or cannot be used: A 118. What is an information security plan? A. A trusted third party that validates user identities through digital certificates B. A data file that identifies individuals or organizations online and is compa- rable to a digital signature C. A security process that requires more than two means of authentication, such as what the user knows, what the user has, and what33 / 51 the user is34 / 51 D. A detailed description of how an organization will implement information security policies: D 119. Which term describes a phishing expedition in which the emails are carefully designed to target a particular person or organization? A. Privilege escalation B. Spear phishing C. Social engineering D. Identity theft: B 120. What is multifactor authentication? A. A security process that requires more than two means of authentication, such as what the user knows, what the user has, and what the user is B. A rule required to maintain information security C. A security process that requires the user to provide two means of authen- tication: what the user knows and what the user has D.The traditional security process, which requires a username and password- : A 121. Which characteristic of the agile management information system (MIS) allows organizations to meet business and environmental changes? A. Reliability B. Scalability C. Maintainability D. Accessibility: C 122. Which policy requires a user to agree in order to gain access to a com- pany's email and information systems and to the internet? A. Email privacy B. Acceptable use C. Workplace monitoring D. Information privacy: B 123. What is the definition of opt out?35 / 51 A. The ability of a company to identify, search, gather, seize, or export digital36 / 51 information in response to litigation, an audit, an investigation, or an information inquiry. B. A choice to deny permission to incoming emails C.The assurance that messages and information are available only to those who are authorized to view them D.The process of watching and responding to what is being said about a company, individual, product, or brand: B 124. What is the definition of workplace management information systems (MIS) monitoring? A.The standards governing the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself B.The act of tracking people's activities by such measures as the number of keystrokes, error rate, and the number of transactions processed C.The assurance that messages and information are available only to those who are authorized to view them D.The process of watching and responding to what is being said about a company, individual, product, or brand: B 125. How is information ethics defined? A.The assurance that messages and information are available only to those who are authorized to view them B. A government's attempt to control internet traffic, thus preventing some material from being viewed by a country's citizens C.The standards governing the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself D.The process of watching and responding to what is being said about37 / 51 a company, individual, product, or brand: C38 / 51 126. What is an e-policy? A. A policy or procedure that addresses the ethical use of computers and internet usage in the business environment B. A set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy C. A collection of general principles to guide the proper use of the internet by employees of a business or organization D. A law that protects minors from accessing inappropriate material on the internet: A 127. What is an ethical computer use policy? A. A policy that contains general principles regarding information privacy B. A policy that outlines the corporate guidelines or principles governing online employee communications C. A policy that contains general principles to guide computer user behavior D. A collection of general principles to guide the proper use of the internet: C 128. What is one of the general functions of an internet use policy? A. Describing the internet services available to users B. Providing a tour of the possible internet uses C. Justifying the reason for implementing the policy D. Explaining the likelihood of denied access and the path to regain access: A 129. What is involved in strategic alignment according to the MIS Governance Institute? A. Instituting a formal framework that puts some rigor around how IT mea- sures, accepts, and manages uncertainty B. Ensuring the IT department delivers the promised benefits for every project or investment C. Putting structure around business achievement metrics39 / 51 D. Linking business and IT so they work well together: D 130. What is the definition of an enterprise architecture? A. A transfer of data across international boundaries over the telecommuni- cations networks of global information systems B.The legal right or general expectation of individuals, groups, or institutions to determine for themselves when and to what extent information about them is communicated to others C.The process of moving company employees outside the company's firewall D.The plan for how an organization will build, deploy, use, and share its data, processes, and management information systems (MIS) assets: D 131. What is one advantage of cloud computing? A. Accessibility B. Replicability C. Proximity D. Privacy: A 132. What is one of the four cloud computing environments? A. Storage cloud B. Hardware cloud C. System cloud D. Community cloud: D 133. What is one primary force driving enterprise resource planning (ERP) failures? A. Business intelligence and customer relationship management B. Software customization and costs C. E-logistics and e-procurement D. Production management and materials management: B 134. Which executives facilitate the digital conversation and build the digital center of excellence model? A. Chief data officers (CDOs)40 / 51 B. Chief information officers (CIOs)41 / 51 C. Chief technology officers (CTOs) D. Chief marketing officers (CMOs): B 135. Which result is an effect of the iceberg IT situation? A. Employees are kept from developing the end-to-end process knowledge that is vital to productivity and innovation. B. The company experiences excessive downtime. C. The IT team has a false sense of security. D. It lowers expectations for IT success.: A 136. What is one of the five attributes that Kim Stevenson believes a team needs in order to become effective IT leaders? A. Breadth B. Patience C. Data expertise D. Boldness: A 137. What is the order of the five steps to build urgency in IT? A. Providing leaders with adequate resources, putting leaders in the right position, establishing clear principles, giving leaders broad latitude, picking the right leaders B. Picking the right leaders, establishing clear principles, giving leaders broad latitude, providing leaders with adequate resources, putting leaders in the right position C. Providing leaders with adequate resources, giving leaders broad latitude, picking the right leaders, putting leaders in the right position, establishing clear principles D. Putting leaders in the right position, giving leaders broad latitude, picking the right leaders, providing leaders with adequate resources, establishing clear principles: D 138. What is the definition of a transformation process? A.The collection of decisions that focus on long-range planning such as plant size, location, and type of process to be used B. The set of decisions that focuses on producing goods and services as42 / 51 efficiently as possible within the strategic plan C.The management of systems or processes that convert or transform re- sources into goods and services D. A conversion of inputs to outputs: D 139. How is trend analysis used? A. A trend is plotted when numerical data are available to display changes over time and into the future. B. Events of the past are studied to anticipate the outcome of current devel- opments. C. A trend is examined to identify its nature, causes, speed of development, and potential impacts. D.Trends viewed as particularly important in a specific community, industry, or sector are carefully monitored, watched, and reported to key decision-mak- ers.: C 140. What is the definition of real-time adaptive security? A.The network security model necessary to accommodate the emergence of multiple perimeters and moving parts on the network and increasingly advanced threats targeting enterprises B. The printing of skin and organs C. A type of artificial intelligence that enables computers to both understand concepts in the environment and also to learn D.The process of building a solid object from a digital model layer by layer: A 141. Also called rapid prototyping methodology; emphasizes extensive user involvement in the rapid and evolutionary construction of a working prototype of a system to accelerate the system's development process.: Rapid Application Development (RAD) 142. provides a framework for breaking down the devel- opment of software into four or five phases.: Rational Unified Process (RUP) Methodology43 / 51 143. uses small teams to produce small pieces of deliverable software, using sprints or 30-day intervals to achieve an appointed goal.: Scrum Methodology 144. is a graphical network model that depicts a project's tasks and the relationship between those tasks.: Program Evaluation and Review Technique (PERT) Chart 145. What are these phases tied into? 1. Planning 2. Analysis 3. Design 4. Development 5.Testing 6. Implementation 7. Maintenance: The 7 phases of SDLC 146. is corporate plan that specifies which employees will participate in business recovery and their duties, as well as what hardware, software, and facilities will be used; includes a detailed process for recovering information or a system in the event of a catastrophic disaster and should be based on general conditions, not specific scenarios.: Disaster Recovery Plan (DRP) 147. details how a company recovers and restores critical business operations and systems after a disaster or extended disruption.: - Business Continuity Planning (BCP) 148. What is a change agent? A.The process of managing changes to the business requirements through- out the project. B. A person or event that is the catalyst for implementing major changes for a system to meet business changes. C. Involves establishing a high-level plan of the intended project and deter- mining project goals. D.The process of transferring information from a legacy system to a new system.: B 149. According to the learning resource, projects often fail because of many reasons.44 / 51 Which is NOT listed as part of that explanation? A. The cost of finding errors. B. Skipped SDLC phases. C. Unclear or missing business requirements. D.Technology not changing: D 150. What are ethics and why are they important to a company? A. Ethics are the legal standards by which all company's create their policies and can be enforced easily with legal system. B. A segment of business that create a specific business function. C. Contains general principles to guide user behavior. D. It prevents Black-hat hackers from breaking into other people's computer systems.: C 151. What is the business process modeling term that usually begins with a functional process representation of the process problem? A. Hybrid referencing B. As-Is Model C. To-Be Model D. Operational budgets: B 152. What is a smart grid? A. A collection of computers, often geographically dispersed, that are coordi- nated to solve a common problem B.The software that makes the benefits of cloud computing possible, such as multi-tenancy. C. A way to deliver electricity using two-way digital technology. D.The creation of a virtual (rather than actual) version of computing resources, such as an operating system, a server, a storage device, or network resources.: C45 / 51 153. You are looking to do outsourcing on a upcoming project, which one of the following is NOT part of the common reasons according to the learning resources? A. Rapid Growth B. Financial savings C. Core competencies D.Wide Area Networks and local resources: D 154. In what phase of the SDLC is user documentation created? A. The design phase B. The testing phase C. The implementation phase D.The planning phase: C 155. As an IT leader, you need to implement agile MIS infrastructure, including the hardware, software, and telecommunications equipment that, when com- bined, provides the underlying foundation to support the organization's goals. Which one does NOT describe agile MIS infrastructure? A. Costable B. Availability C. Accessibility D. Maintainability: A 156. As the new CIO of Target, you need to amass the rapid deployment of resources during the busy holiday systems and then turn them down when the rush is over. What cloud-based tool would you most likely be using? A. Rapid Elasticity B. Multi-tenancy C. Measured services. D. On demand self-service: A 157. Alternative business processes should be effective (deliver the intended results) and efficient (consume the least amount of resources for the intended value). What other one is mentioned in the learning resources?46 / 51 A. Measure Performance B. Create new processes. (multi tasking) C. They should also be adaptable or flexible and support change D. Establish measures (substain a specific length): C 158. According to the learning resources, there are two types of AI: strong and weak. What are two specific characteristics of strong AI? (Choose two) A. Functioning without complete or well-structured information. B. Make their own decisions based on reasoning and past sets of data. C. Works toward providing brain-like powers to AI machines D. Case-based reasoning: AC 159. CSFs (Critical Success Factors) and KPI relationships are crucial be- cause? A. KPIs only focus on Internal measurements which are most important to the business. B. KPIs measure the progress of CSFs with quantifiable measurements C. KPIs only have a one to one relationship with CSFs D. KPIs are only used in MSI projects: B 160. What is an example of "CIO theory of reciprocity" A. If we had a real-time inventory management system, we could increase revenue by $10 million. B.The CIO identifies that there is really no cost associated with IT, as it is tied to the businesses overall budget.47 / 51 C. We need 40 million dollars to complete a new project. D. Our projectcost the company 10 million.: A 161. There are four global MIS drivers. Which one is NOT one of them, according to the reading resources? A. Global collaborations B. Global products C. Global customers D. Local operations and resources: D 162. There are three primary areas associated with management information systems (MIS) uptime and supporting operations. Which one is the least likely described in the learning resource? A. A reference to devices that connect directly to other devices using a connection uptime plan B. To combat disasters a company can create a disaster recovery plan C. Many companies are turning to a more comprehensive and allencompass- ing emergency preparedness plan known as business continuity planning (BCP), D. One way to minimize the damage of a system crash is to have a backup and recovery strategy in place.: A 163. The MIS department can help organizations determine bottlenecks by identifying outdated and duplicate tasks and lower operational costs. According to the resource, what is the best way to introduce smoothly running business processes? A. Removing dirty data B. Creating multiple sources of data with spreadsheets, databases, and word processing files. C. Automation48 / 51 D. Extracting information from internal databases: C 164. You are a new IT leader and have been tasked with helping roll out new projects. This business stated that an alarmingly high number of software development projects in the past have come in late or over budget. What is one way you can ensure this does NOT happen following the SDLC? A. Begin testing in the first or second phase B. Begins with a business need, proceeds to an assessment of the functions. C. Maintain fewer features and functions than originally specified. D. Begin software development right away.: B 165. As an IT specialist, you need to implement a network. Which of the topologies is easy to install but subject to bottlenecks? A. Token ring B. Hybrid C. Star D. Bus: C 166. As an IT leader, you are partnering with operations management to help optimize the company's supply chain through new technologies. What is NOT one of the key areas that this optimization will focus on according to the learning resources? A. Logistics B. Procurement C. Materials management D. Customer handling: D 167. You are putting together a session where employees meet, sometimes for several days, to define or review the business requirements for the system. What is the formal name of this action called?49 / 51 A. design phase50 / 51 B. testing phase. C. Joint Application Development D. software engineering: C 168. Organizations are discovering a wave of other key business areas where it is beneficial to take advantage of building strong relationships through extending CRM. What is NOT one of those relationships, according to the learning resource? A. streamline human resources B. Focus on keeping suppliers satisfied C. Discover optimal sales channels D. Focus on distracting competitors: D 169. The leadership has tasked you with helping the company increase efficiencies in their business processes. You know the best way through new IT recommendations. According to the learning resource, which is not part of the business process model? A. Expose all processes in an uncontrolled manner. B. Focus attention on the process model interfaces. C. Encourage conciseness and accuracy in describing the process model. D. Expose process detail gradually and in a controlled manner.: A 170. To help with prototyping, your office wants to use 3D printing. According to the learning resource, what is NOT one of the benefits of 3D printing? A.Three-dimensional printing also promotes mass customization, small pro- duction batches, and reduction in inventory. B. 3D printing allow users to create products on demand from their desks. C.With the advances in 3D printing, the need to procure materials will become far more difficult because businesses can not simply print the parts and51 / 51 components required for the production process. D. 3D printing allow users to create prototypes.: C 171. As a new CIO, ERP implementations are a significant decision. Two of the primary forces driving ERP failure include software customization and ERP costs. According to the learning resource, which of the following would be consid- ered software customization and NOT an ERP cost? A. Customization to reports, documents, and forms B. Training all users and creating training manuals C.Testing that all functionality works correctly along with testing all integra- tions. D. Moving data from old system to new ERP system: A 172. In IT, you will make decisions that are routine choices, day to day, affecting operations decisions. What level of Granularity and what operational support systems would you use according to the learning resources? A. Fine, and OLAP (Online Analytical Processing) B. CRM and Artificial intelligence C. Course, and OLTP (Online Transaction Processing) D. Fine, and OLTP (Online Transaction Processing): D 173. You're trying to increase the use of AI in your business environment for decision-making systems. These are combinations and evaluations of the success (or failure) of the outcome. A. Expert Systems B. Virtual Reality52 / 51 C. Neural Network D. Genetic Algorithms: D 174. As a project manager for a large team, you are asked to use different prototyping methods. According to the learning resources, which is NOT considered a prototyping method? A. simulations B. construction prototyping C. storyboarding D. workflow modeling: B 175. You are the IT manager and need to ensure that all departments are following ethical Information Technology Use. Which is the most likely option that will enforce that? A. Organizations collect, buy, and use information by checking the validity and accuracy of the information. B. Individuals copy, use, and distribute software. C. Employees search organizational databases for sensitive corporate and personal information D. Individuals create and spread viruses that cause trouble for those using and maintaining IT systems.: A 176. Which agile methodology saves time and generates successful projects by continuously reviewing and revamping needed and unneeded require- ments, and customer satisfaction. A. Waterfall B. Extreme Programming C. Rational Unified Process D. Rapid Application Development: B 177. How does a router interface with packet-switching? A. It provides the technical foundation for the packets to go to public Internet as well as for large numbers of private networks.53 / 51 B. Is the operating system that runs a network, steering information between computers and managing security and users. C. Is a standard that specifies the format of a data packet as well as the rules to be followed during transmission. D. Is an intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination.: D 178. What is P more of a representative of as a business model? A. Business-to-Consumer (B2C) B. Consumer-to-Business (C2B) C. Consumer-to-Consumer (C2C) D. Business-to-Business (B2B): B 179. Companies store their information in relational databases, and managers and MIS professionals access these systems to answer operational ques- tions. According to the learning resource, what is the most likely tool that MIS professionals would use to retrieve this information? A. Macros B. Browser web searches C. query-by-example (QBE) tool D. structured query language (SQL): D 180. A critical path is? A. Identified as the longest stretch of dependent activities and measuring them from start to finish. B. A logical relationship that exists between project tasks. C. A graphic model that depicts tasks D. A simple bar chart that lists tasks.: A 181. If an organization were to have only one epolicy, that is the starting point and the umbrella for any other policies the organization might establish.54 / 51 A. Social media policy B. Acceptable use policy C. Ethical computer use policy D. Information privacy policy: C 182. As an IT director, you want to divide business intelligence into three categories: tactical, operational, and strategic. According to the learning resource, which is considered tactical? A. Achieve long-term organizational goals B. Conduct short-term analysis to achieve strategic goals C. Real time metrics D. Manage daily operations, integrate BI with operational systems: B 183. Many use Analytic CRM to personalize customer communications and decide which customers are worth pursuing. According to the learning resource, which of the following is NOT considered part of CRM personalized communication? A. Care about customers B. Find new profitable customers: C. Increase their competition's communication with customers. D. Discover the activities the firm performs the best: C 184. Using the knowledge and expertise of colleagues in a global economy is an example of what MIS drivers? A. Global Customers. B. Global Collaboration. C. Global Operations and Resources. D. Global Traits: B 185. As the IT Director, you need to implement an ERP. What is NOT considered a core component of ERP? A. Production and materials management55 / 51 B. Human resource56 / 51 C. Accounting and finance D. Customer Relationship Management: D 186. As a CIO according to the resource "Be the Business," in the chapter "Lead," the "What" CIO," business versus technology, what should the CIO have? A. Be the business' primary project sponsor B. Know your technologies and be able to step in to configure devices C. CIOs, more than any other executive, have to have an end-to-end view. D. Implement ITIL: C 187. SOA (Service Oriented Architecture) concepts ensure that MIS systems can adapt quickly, easily, and economically to support rapidly changing busi- ness needs. What is NOT part of the three components of SOA? A. Loose coupling B. Direct-constant communication C. Interoperability D. Services: B 188. Before jumping into how systems work, it is important to have a solid understanding of the basic production process for goods and services. What is the most likely description of productions of goods or services according to the learning resource? A. Is the process in which a business takes raw materials and processes them or converts them into a finished product for its goods or services B. Use a GNATT chart C. Is the process in which a business identifies customers D. It helps design and develop MIS solutions: A 189. As a project manager you know the SDLC (Systems Development Life Cycle) is critical.57 / 51 What is part of the planning process? A. Development B. Sign off C. High-level planning D. Low-level, detailed plans: C 190. You're evaluating the challenges of your Ebusiness. You think you have narrowed down the four challenges. Which one is NOT one of the challenges that E-business faces? A. Adhering to Taxation Rules B. Ensuring Consumer Protection C. Ensuring Company Protection D. Managing Consumer Trust: C 191. As a CIO according to the resource "Be the Business," in the chapter "Dimanteling the Iceberg," when discussing business versus technology, should the CIO have? A. Outsource B. CIOs need to have a significant and deep understanding of technology. C. Replace the CTO D. CIOs need to have a light understanding of technology.: B 192. According to the learning resources, Rapid Application Development (RAD) is

Show more Read less
Institution
Module











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Module

Document information

Uploaded on
October 26, 2025
Number of pages
61
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

£10.43
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
Splendid
5.0
(1)

Get to know the seller

Seller avatar
Splendid Brown University
Follow You need to be logged in order to follow users or courses
Sold
5
Member since
4 year
Number of followers
0
Documents
404
Last sold
2 weeks ago
A+ TAILORED MATERIALS

These notes are crafted from topnotch study sessions—clear, concise, and tailored for quick revision. I’ve cut out the noise and kept only the essentials that helped me ace my exams. If it’s here, it works. Best of luck!

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions