Deck 5: Organizational Structures That Support Strategic Initiatives
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/32
العب
ملء الشاشة (f)
Deck 5: Organizational Structures That Support Strategic Initiatives
1
Jeremy Bridges is an executive for Green Web Designs,where his primary role is to ensure the security of business systems and develop strategies to protect the company from online viruses and hackers.What is Jeremy's role within the company?
A) Chief Executive Officer (CEO).
B) Chief Security Officer (CSO).
C) Chief Procurement Officer (CPO).
D) Chief Technology Officer (CTO).
A) Chief Executive Officer (CEO).
B) Chief Security Officer (CSO).
C) Chief Procurement Officer (CPO).
D) Chief Technology Officer (CTO).
B
Explanation: The Chief Security Officer is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses.
Explanation: The Chief Security Officer is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses.
2
Job titles,roles,and responsibilities do not differ from organization to organization.
False
Explanation: IT is a relatively new functional area and job titles, roles, and responsibilities often differ dramatically from organization to organization.
Explanation: IT is a relatively new functional area and job titles, roles, and responsibilities often differ dramatically from organization to organization.
3
Which issue concerns CIOs the most?
A) Security.
B) Budgeting.
C) Enhancing customer satisfaction.
D) Marketing.
A) Security.
B) Budgeting.
C) Enhancing customer satisfaction.
D) Marketing.
C
Explanation: The CIO is most concerned with enhancing customer satisfaction, according to the What Concerns CIOs the Most figure.
Explanation: The CIO is most concerned with enhancing customer satisfaction, according to the What Concerns CIOs the Most figure.
4
What is intangible creative work that is embodied in physical form?
A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
5
What first-ever national appointment was made by President Barack Obama?
A) National Chief Security Officer
B) National Chief Privacy Officer
C) National Chief Technology Officer
D) All of these
A) National Chief Security Officer
B) National Chief Privacy Officer
C) National Chief Technology Officer
D) All of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
6
According to Infonetics research,what is the leading cause of downtime?
A) Software failure followed by human error.
B) Tornadoes.
C) Power outage.
D) Sink overflow.
A) Software failure followed by human error.
B) Tornadoes.
C) Power outage.
D) Sink overflow.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
7
The old business axiom "time is money" needs to be updated to more accurately reflect the crucial interdependence between IT and business processes.What is the recommended new phrase?
A) Uptime is a good business process.
B) Downtime is a bad business process.
C) Uptime is money.
D) Downtime is impossible.
A) Uptime is a good business process.
B) Downtime is a bad business process.
C) Uptime is money.
D) Downtime is impossible.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
8
What gives a person the legal right to use copyrighted material in certain situations?
A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
9
Who is responsible for ensuring the throughput,speed,accuracy,availability,and reliability of an organization's information technology?
A) CIO
B) CPO
C) CTO
D) CSO
A) CIO
B) CPO
C) CTO
D) CSO
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
10
Who is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses?
A) CIO
B) CPO
C) CTO
D) CSO
A) CIO
B) CPO
C) CTO
D) CSO
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
11
Ethics are the laws that guide our behavior toward other people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is one of the four categories of costs associated with downtime?
A) Financial performance
B) Revenue
C) Damaged reputation
D) All of these
A) Financial performance
B) Revenue
C) Damaged reputation
D) All of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
13
Trina Hauger works for Johnson Electric as a corporate lawyer,and part of her duties are to ensure the ethical and legal use of information within the company.Which of the following represents Trina's role at Johnson Electric?
A) Chief Knowledge Officer (CKO).
B) Chief Privacy Officer (CPO).
C) Chief Technology Officer (CTO).
D) Chief Information Officer (CIO).
A) Chief Knowledge Officer (CKO).
B) Chief Privacy Officer (CPO).
C) Chief Technology Officer (CTO).
D) Chief Information Officer (CIO).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
14
What are the principles and standards that guide our behavior toward other people?
A) Intellectual property
B) Copyright
C) Pirated software
D) Ethics
A) Intellectual property
B) Copyright
C) Pirated software
D) Ethics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
15
It is the responsibility of the CIO to ensure effective communications between business and IT personnel.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following activities does a CIO perform?
A) Oversees all uses of information technology.
B) Ensures the strategic alignment of IT with business goals.
C) Ensures the strategic alignment of IT with business objectives.
D) All of these.
A) Oversees all uses of information technology.
B) Ensures the strategic alignment of IT with business goals.
C) Ensures the strategic alignment of IT with business objectives.
D) All of these.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
17
Broad functions of a CIO include all of the following except:
A) Ensuring the delivery of all IT projects, on time and within budget.
B) Ensuring that the strategic vision of IT is in line with the strategic vision of the organization.
C) Building and maintaining strong executive relationships.
D) Building and maintaining strong customer processes.
A) Ensuring the delivery of all IT projects, on time and within budget.
B) Ensuring that the strategic vision of IT is in line with the strategic vision of the organization.
C) Building and maintaining strong executive relationships.
D) Building and maintaining strong customer processes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which role within a company is responsible for overseeing all uses of MIS and ensuring that MIS strategy aligns with business goals and objectives?
A) Chief knowledge officer (CKO).
B) Chief privacy officer (CPO).
C) Chief information officer (CIO).
D) Chief security officer (CSO).
A) Chief knowledge officer (CKO).
B) Chief privacy officer (CPO).
C) Chief information officer (CIO).
D) Chief security officer (CSO).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
19
What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?
A) Ethics
B) Privacy
C) Copyright
D) Information security
A) Ethics
B) Privacy
C) Copyright
D) Information security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
20
What is the legal protection afforded an expression of an idea?
A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
21
Privacy is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
22
One of the main ingredients in trust is privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
23
The chief ___________ officer is responsible for collecting,maintaining,and distributing the organization's knowledge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
24
Discuss the reasons why privacy issues lose trust for ebusinesses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
25
________ software is manufactured to look like the real thing and sold as such.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
26
Describe the relationship between ethics and privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
27
Explain how HIPAA protects individuals' health records.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
28
_________ are the principles and standards that guide our behavior toward other people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
29
__________ is the right to be left alone when you want to be,to have control over your own personal possessions,and to not be observed without your consent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
30
Describe the gap between business personnel and IT personnel and what an organization can do to close this gap.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
31
List and describe the four common IT-related strategic positions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
32
Software _________ is the unauthorized use,duplication,distribution,or sale of copyrighted software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck

