Deck 5: Organizational Structures That Support Strategic Initiatives

ملء الشاشة (f)
exit full mode
سؤال
Jeremy Bridges is an executive for Green Web Designs,where his primary role is to ensure the security of business systems and develop strategies to protect the company from online viruses and hackers.What is Jeremy's role within the company?

A) Chief Executive Officer (CEO).
B) Chief Security Officer (CSO).
C) Chief Procurement Officer (CPO).
D) Chief Technology Officer (CTO).
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which role within a company is responsible for overseeing all uses of MIS and ensuring that MIS strategy aligns with business goals and objectives?

A) Chief knowledge officer (CKO).
B) Chief privacy officer (CPO).
C) Chief information officer (CIO).
D) Chief security officer (CSO).
سؤال
Who is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses?

A) CIO
B) CPO
C) CTO
D) CSO
سؤال
Job titles,roles,and responsibilities do not differ from organization to organization.
سؤال
The old business axiom "time is money" needs to be updated to more accurately reflect the crucial interdependence between IT and business processes.What is the recommended new phrase?

A) Uptime is a good business process.
B) Downtime is a bad business process.
C) Uptime is money.
D) Downtime is impossible.
سؤال
Which issue concerns CIOs the most?

A) Security.
B) Budgeting.
C) Enhancing customer satisfaction.
D) Marketing.
سؤال
Broad functions of a CIO include all of the following except:

A) Ensuring the delivery of all IT projects, on time and within budget.
B) Ensuring that the strategic vision of IT is in line with the strategic vision of the organization.
C) Building and maintaining strong executive relationships.
D) Building and maintaining strong customer processes.
سؤال
It is the responsibility of the CIO to ensure effective communications between business and IT personnel.
سؤال
Which of the following is one of the four categories of costs associated with downtime?

A) Financial performance
B) Revenue
C) Damaged reputation
D) All of these
سؤال
What are the principles and standards that guide our behavior toward other people?

A) Intellectual property
B) Copyright
C) Pirated software
D) Ethics
سؤال
Ethics are the laws that guide our behavior toward other people.
سؤال
What is intangible creative work that is embodied in physical form?

A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
سؤال
What gives a person the legal right to use copyrighted material in certain situations?

A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
سؤال
According to Infonetics research,what is the leading cause of downtime?

A) Software failure followed by human error.
B) Tornadoes.
C) Power outage.
D) Sink overflow.
سؤال
What first-ever national appointment was made by President Barack Obama?

A) National Chief Security Officer
B) National Chief Privacy Officer
C) National Chief Technology Officer
D) All of these
سؤال
What is the legal protection affording an expression of an idea?

A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
سؤال
What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?

A) Ethics
B) Privacy
C) Copyright
D) Information security
سؤال
Which of the following activities does a CIO perform?

A) Oversees all uses of information technology.
B) Ensures the strategic alignment of IT with business goals.
C) Ensures the strategic alignment of IT with business objectives.
D) All of these.
سؤال
Who is responsible for ensuring the throughput,speed,accuracy,availability,and reliability of an organization's information technology?

A) CIO
B) CPO
C) CTO
D) CSO
سؤال
Trina Hauger works for Johnson Electric as a corporate lawyer,and part of her duties are to ensure the ethical and legal use of information within the company.Which of the following represents Trina's role at Johnson Electric?

A) Chief Knowledge Officer (CKO).
B) Chief Privacy Officer (CPO).
C) Chief Technology Officer (CTO).
D) Chief Information Officer (CIO).
سؤال
Discuss the reasons why privacy issues lose trust for businesses.
سؤال
List and describe the four common IT-related strategic positions.
سؤال
__________ is the right to be left alone when you want to be,to have control over your own personal possessions,and to not be observed without your consent.
سؤال
One of the main ingredients in trust is privacy.
سؤال
Software _________ is the unauthorized use,duplication,distribution,or sale of copyrighted software.
سؤال
The chief ___________ officer is responsible for collecting,maintaining,and distributing the organization's knowledge.
سؤال
________ software is manufactured to look like the real thing and sold as such.
سؤال
_________ are the principles and standards that guide our behavior toward other people.
سؤال
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
سؤال
Describe the relationship between ethics and privacy.
سؤال
Describe the gap between business personnel and IT personnel and what an organization can do to close this gap.
سؤال
Privacy is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.
سؤال
____________ security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
سؤال
Explain how HIPAA protects individuals' health records.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/34
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Organizational Structures That Support Strategic Initiatives
1
Jeremy Bridges is an executive for Green Web Designs,where his primary role is to ensure the security of business systems and develop strategies to protect the company from online viruses and hackers.What is Jeremy's role within the company?

A) Chief Executive Officer (CEO).
B) Chief Security Officer (CSO).
C) Chief Procurement Officer (CPO).
D) Chief Technology Officer (CTO).
B
Explanation: The chief security officer is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses.
2
Which role within a company is responsible for overseeing all uses of MIS and ensuring that MIS strategy aligns with business goals and objectives?

A) Chief knowledge officer (CKO).
B) Chief privacy officer (CPO).
C) Chief information officer (CIO).
D) Chief security officer (CSO).
C
Explanation: The chief information officer (CIO) is responsible for (1) overseeing all uses of MIS and (2) ensuring that MIS strategy aligns with business goals and objectives.
3
Who is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses?

A) CIO
B) CPO
C) CTO
D) CSO
D
Explanation: This is the definition of chief security officer (CSO).
4
Job titles,roles,and responsibilities do not differ from organization to organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
5
The old business axiom "time is money" needs to be updated to more accurately reflect the crucial interdependence between IT and business processes.What is the recommended new phrase?

A) Uptime is a good business process.
B) Downtime is a bad business process.
C) Uptime is money.
D) Downtime is impossible.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which issue concerns CIOs the most?

A) Security.
B) Budgeting.
C) Enhancing customer satisfaction.
D) Marketing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
7
Broad functions of a CIO include all of the following except:

A) Ensuring the delivery of all IT projects, on time and within budget.
B) Ensuring that the strategic vision of IT is in line with the strategic vision of the organization.
C) Building and maintaining strong executive relationships.
D) Building and maintaining strong customer processes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
8
It is the responsibility of the CIO to ensure effective communications between business and IT personnel.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is one of the four categories of costs associated with downtime?

A) Financial performance
B) Revenue
C) Damaged reputation
D) All of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
10
What are the principles and standards that guide our behavior toward other people?

A) Intellectual property
B) Copyright
C) Pirated software
D) Ethics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
11
Ethics are the laws that guide our behavior toward other people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
12
What is intangible creative work that is embodied in physical form?

A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
13
What gives a person the legal right to use copyrighted material in certain situations?

A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
14
According to Infonetics research,what is the leading cause of downtime?

A) Software failure followed by human error.
B) Tornadoes.
C) Power outage.
D) Sink overflow.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
15
What first-ever national appointment was made by President Barack Obama?

A) National Chief Security Officer
B) National Chief Privacy Officer
C) National Chief Technology Officer
D) All of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
16
What is the legal protection affording an expression of an idea?

A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
17
What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?

A) Ethics
B) Privacy
C) Copyright
D) Information security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following activities does a CIO perform?

A) Oversees all uses of information technology.
B) Ensures the strategic alignment of IT with business goals.
C) Ensures the strategic alignment of IT with business objectives.
D) All of these.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
19
Who is responsible for ensuring the throughput,speed,accuracy,availability,and reliability of an organization's information technology?

A) CIO
B) CPO
C) CTO
D) CSO
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
20
Trina Hauger works for Johnson Electric as a corporate lawyer,and part of her duties are to ensure the ethical and legal use of information within the company.Which of the following represents Trina's role at Johnson Electric?

A) Chief Knowledge Officer (CKO).
B) Chief Privacy Officer (CPO).
C) Chief Technology Officer (CTO).
D) Chief Information Officer (CIO).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
21
Discuss the reasons why privacy issues lose trust for businesses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
22
List and describe the four common IT-related strategic positions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
23
__________ is the right to be left alone when you want to be,to have control over your own personal possessions,and to not be observed without your consent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
24
One of the main ingredients in trust is privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
25
Software _________ is the unauthorized use,duplication,distribution,or sale of copyrighted software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
26
The chief ___________ officer is responsible for collecting,maintaining,and distributing the organization's knowledge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
27
________ software is manufactured to look like the real thing and sold as such.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
28
_________ are the principles and standards that guide our behavior toward other people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
29
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
30
Describe the relationship between ethics and privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
31
Describe the gap between business personnel and IT personnel and what an organization can do to close this gap.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
32
Privacy is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
33
____________ security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
34
Explain how HIPAA protects individuals' health records.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 34 في هذه المجموعة.