Deck 5: Organizational Structures That Support Strategic Initiatives

Full screen (f)
exit full mode
Question
Jeremy Bridges is an executive for Green Web Designs,where his primary role is to ensure the security of business systems and develop strategies to protect the company from online viruses and hackers.What is Jeremy's role within the company?

A) Chief Executive Officer (CEO).
B) Chief Security Officer (CSO).
C) Chief Procurement Officer (CPO).
D) Chief Technology Officer (CTO).
Use Space or
up arrow
down arrow
to flip the card.
Question
Job titles,roles,and responsibilities do not differ from organization to organization.
Question
Which issue concerns CIOs the most?

A) Security.
B) Budgeting.
C) Enhancing customer satisfaction.
D) Marketing.
Question
What is intangible creative work that is embodied in physical form?

A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
Question
What first-ever national appointment was made by President Barack Obama?

A) National Chief Security Officer
B) National Chief Privacy Officer
C) National Chief Technology Officer
D) All of these
Question
According to Infonetics research,what is the leading cause of downtime?

A) Software failure followed by human error.
B) Tornadoes.
C) Power outage.
D) Sink overflow.
Question
The old business axiom "time is money" needs to be updated to more accurately reflect the crucial interdependence between IT and business processes.What is the recommended new phrase?

A) Uptime is a good business process.
B) Downtime is a bad business process.
C) Uptime is money.
D) Downtime is impossible.
Question
What gives a person the legal right to use copyrighted material in certain situations?

A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
Question
Who is responsible for ensuring the throughput,speed,accuracy,availability,and reliability of an organization's information technology?

A) CIO
B) CPO
C) CTO
D) CSO
Question
Who is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses?

A) CIO
B) CPO
C) CTO
D) CSO
Question
Ethics are the laws that guide our behavior toward other people.
Question
Which of the following is one of the four categories of costs associated with downtime?

A) Financial performance
B) Revenue
C) Damaged reputation
D) All of these
Question
Trina Hauger works for Johnson Electric as a corporate lawyer,and part of her duties are to ensure the ethical and legal use of information within the company.Which of the following represents Trina's role at Johnson Electric?

A) Chief Knowledge Officer (CKO).
B) Chief Privacy Officer (CPO).
C) Chief Technology Officer (CTO).
D) Chief Information Officer (CIO).
Question
What are the principles and standards that guide our behavior toward other people?

A) Intellectual property
B) Copyright
C) Pirated software
D) Ethics
Question
It is the responsibility of the CIO to ensure effective communications between business and IT personnel.
Question
Which of the following activities does a CIO perform?

A) Oversees all uses of information technology.
B) Ensures the strategic alignment of IT with business goals.
C) Ensures the strategic alignment of IT with business objectives.
D) All of these.
Question
Broad functions of a CIO include all of the following except:

A) Ensuring the delivery of all IT projects, on time and within budget.
B) Ensuring that the strategic vision of IT is in line with the strategic vision of the organization.
C) Building and maintaining strong executive relationships.
D) Building and maintaining strong customer processes.
Question
Which role within a company is responsible for overseeing all uses of MIS and ensuring that MIS strategy aligns with business goals and objectives?

A) Chief knowledge officer (CKO).
B) Chief privacy officer (CPO).
C) Chief information officer (CIO).
D) Chief security officer (CSO).
Question
What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?

A) Ethics
B) Privacy
C) Copyright
D) Information security
Question
What is the legal protection afforded an expression of an idea?

A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
Question
Privacy is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.
Question
One of the main ingredients in trust is privacy.
Question
The chief ___________ officer is responsible for collecting,maintaining,and distributing the organization's knowledge.
Question
Discuss the reasons why privacy issues lose trust for ebusinesses.
Question
________ software is manufactured to look like the real thing and sold as such.
Question
Describe the relationship between ethics and privacy.
Question
Explain how HIPAA protects individuals' health records.
Question
_________ are the principles and standards that guide our behavior toward other people.
Question
__________ is the right to be left alone when you want to be,to have control over your own personal possessions,and to not be observed without your consent.
Question
Describe the gap between business personnel and IT personnel and what an organization can do to close this gap.
Question
List and describe the four common IT-related strategic positions.
Question
Software _________ is the unauthorized use,duplication,distribution,or sale of copyrighted software.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/32
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Organizational Structures That Support Strategic Initiatives
1
Jeremy Bridges is an executive for Green Web Designs,where his primary role is to ensure the security of business systems and develop strategies to protect the company from online viruses and hackers.What is Jeremy's role within the company?

A) Chief Executive Officer (CEO).
B) Chief Security Officer (CSO).
C) Chief Procurement Officer (CPO).
D) Chief Technology Officer (CTO).
B
Explanation: The Chief Security Officer is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses.
2
Job titles,roles,and responsibilities do not differ from organization to organization.
False
Explanation: IT is a relatively new functional area and job titles, roles, and responsibilities often differ dramatically from organization to organization.
3
Which issue concerns CIOs the most?

A) Security.
B) Budgeting.
C) Enhancing customer satisfaction.
D) Marketing.
C
Explanation: The CIO is most concerned with enhancing customer satisfaction, according to the What Concerns CIOs the Most figure.
4
What is intangible creative work that is embodied in physical form?

A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
5
What first-ever national appointment was made by President Barack Obama?

A) National Chief Security Officer
B) National Chief Privacy Officer
C) National Chief Technology Officer
D) All of these
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
6
According to Infonetics research,what is the leading cause of downtime?

A) Software failure followed by human error.
B) Tornadoes.
C) Power outage.
D) Sink overflow.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
7
The old business axiom "time is money" needs to be updated to more accurately reflect the crucial interdependence between IT and business processes.What is the recommended new phrase?

A) Uptime is a good business process.
B) Downtime is a bad business process.
C) Uptime is money.
D) Downtime is impossible.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
8
What gives a person the legal right to use copyrighted material in certain situations?

A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
9
Who is responsible for ensuring the throughput,speed,accuracy,availability,and reliability of an organization's information technology?

A) CIO
B) CPO
C) CTO
D) CSO
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
10
Who is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses?

A) CIO
B) CPO
C) CTO
D) CSO
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
11
Ethics are the laws that guide our behavior toward other people.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is one of the four categories of costs associated with downtime?

A) Financial performance
B) Revenue
C) Damaged reputation
D) All of these
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
13
Trina Hauger works for Johnson Electric as a corporate lawyer,and part of her duties are to ensure the ethical and legal use of information within the company.Which of the following represents Trina's role at Johnson Electric?

A) Chief Knowledge Officer (CKO).
B) Chief Privacy Officer (CPO).
C) Chief Technology Officer (CTO).
D) Chief Information Officer (CIO).
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
14
What are the principles and standards that guide our behavior toward other people?

A) Intellectual property
B) Copyright
C) Pirated software
D) Ethics
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
15
It is the responsibility of the CIO to ensure effective communications between business and IT personnel.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following activities does a CIO perform?

A) Oversees all uses of information technology.
B) Ensures the strategic alignment of IT with business goals.
C) Ensures the strategic alignment of IT with business objectives.
D) All of these.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
17
Broad functions of a CIO include all of the following except:

A) Ensuring the delivery of all IT projects, on time and within budget.
B) Ensuring that the strategic vision of IT is in line with the strategic vision of the organization.
C) Building and maintaining strong executive relationships.
D) Building and maintaining strong customer processes.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
18
Which role within a company is responsible for overseeing all uses of MIS and ensuring that MIS strategy aligns with business goals and objectives?

A) Chief knowledge officer (CKO).
B) Chief privacy officer (CPO).
C) Chief information officer (CIO).
D) Chief security officer (CSO).
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
19
What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?

A) Ethics
B) Privacy
C) Copyright
D) Information security
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
20
What is the legal protection afforded an expression of an idea?

A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
21
Privacy is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
22
One of the main ingredients in trust is privacy.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
23
The chief ___________ officer is responsible for collecting,maintaining,and distributing the organization's knowledge.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
24
Discuss the reasons why privacy issues lose trust for ebusinesses.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
25
________ software is manufactured to look like the real thing and sold as such.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
26
Describe the relationship between ethics and privacy.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
27
Explain how HIPAA protects individuals' health records.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
28
_________ are the principles and standards that guide our behavior toward other people.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
29
__________ is the right to be left alone when you want to be,to have control over your own personal possessions,and to not be observed without your consent.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
30
Describe the gap between business personnel and IT personnel and what an organization can do to close this gap.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
31
List and describe the four common IT-related strategic positions.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
32
Software _________ is the unauthorized use,duplication,distribution,or sale of copyrighted software.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 32 flashcards in this deck.