Deck 5: Organizational Structures That Support Strategic Initiatives
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/34
Play
Full screen (f)
Deck 5: Organizational Structures That Support Strategic Initiatives
1
Jeremy Bridges is an executive for Green Web Designs,where his primary role is to ensure the security of business systems and develop strategies to protect the company from online viruses and hackers.What is Jeremy's role within the company?
A) Chief Executive Officer (CEO).
B) Chief Security Officer (CSO).
C) Chief Procurement Officer (CPO).
D) Chief Technology Officer (CTO).
A) Chief Executive Officer (CEO).
B) Chief Security Officer (CSO).
C) Chief Procurement Officer (CPO).
D) Chief Technology Officer (CTO).
B
Explanation: The chief security officer is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses.
Explanation: The chief security officer is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses.
2
Which role within a company is responsible for overseeing all uses of MIS and ensuring that MIS strategy aligns with business goals and objectives?
A) Chief knowledge officer (CKO).
B) Chief privacy officer (CPO).
C) Chief information officer (CIO).
D) Chief security officer (CSO).
A) Chief knowledge officer (CKO).
B) Chief privacy officer (CPO).
C) Chief information officer (CIO).
D) Chief security officer (CSO).
C
Explanation: The chief information officer (CIO) is responsible for (1) overseeing all uses of MIS and (2) ensuring that MIS strategy aligns with business goals and objectives.
Explanation: The chief information officer (CIO) is responsible for (1) overseeing all uses of MIS and (2) ensuring that MIS strategy aligns with business goals and objectives.
3
Who is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses?
A) CIO
B) CPO
C) CTO
D) CSO
A) CIO
B) CPO
C) CTO
D) CSO
D
Explanation: This is the definition of chief security officer (CSO).
Explanation: This is the definition of chief security officer (CSO).
4
Job titles,roles,and responsibilities do not differ from organization to organization.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
5
The old business axiom "time is money" needs to be updated to more accurately reflect the crucial interdependence between IT and business processes.What is the recommended new phrase?
A) Uptime is a good business process.
B) Downtime is a bad business process.
C) Uptime is money.
D) Downtime is impossible.
A) Uptime is a good business process.
B) Downtime is a bad business process.
C) Uptime is money.
D) Downtime is impossible.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
6
Which issue concerns CIOs the most?
A) Security.
B) Budgeting.
C) Enhancing customer satisfaction.
D) Marketing.
A) Security.
B) Budgeting.
C) Enhancing customer satisfaction.
D) Marketing.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
7
Broad functions of a CIO include all of the following except:
A) Ensuring the delivery of all IT projects, on time and within budget.
B) Ensuring that the strategic vision of IT is in line with the strategic vision of the organization.
C) Building and maintaining strong executive relationships.
D) Building and maintaining strong customer processes.
A) Ensuring the delivery of all IT projects, on time and within budget.
B) Ensuring that the strategic vision of IT is in line with the strategic vision of the organization.
C) Building and maintaining strong executive relationships.
D) Building and maintaining strong customer processes.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
8
It is the responsibility of the CIO to ensure effective communications between business and IT personnel.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is one of the four categories of costs associated with downtime?
A) Financial performance
B) Revenue
C) Damaged reputation
D) All of these
A) Financial performance
B) Revenue
C) Damaged reputation
D) All of these
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
10
What are the principles and standards that guide our behavior toward other people?
A) Intellectual property
B) Copyright
C) Pirated software
D) Ethics
A) Intellectual property
B) Copyright
C) Pirated software
D) Ethics
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
11
Ethics are the laws that guide our behavior toward other people.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
12
What is intangible creative work that is embodied in physical form?
A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
13
What gives a person the legal right to use copyrighted material in certain situations?
A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
14
According to Infonetics research,what is the leading cause of downtime?
A) Software failure followed by human error.
B) Tornadoes.
C) Power outage.
D) Sink overflow.
A) Software failure followed by human error.
B) Tornadoes.
C) Power outage.
D) Sink overflow.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
15
What first-ever national appointment was made by President Barack Obama?
A) National Chief Security Officer
B) National Chief Privacy Officer
C) National Chief Technology Officer
D) All of these
A) National Chief Security Officer
B) National Chief Privacy Officer
C) National Chief Technology Officer
D) All of these
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
16
What is the legal protection affording an expression of an idea?
A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
17
What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?
A) Ethics
B) Privacy
C) Copyright
D) Information security
A) Ethics
B) Privacy
C) Copyright
D) Information security
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following activities does a CIO perform?
A) Oversees all uses of information technology.
B) Ensures the strategic alignment of IT with business goals.
C) Ensures the strategic alignment of IT with business objectives.
D) All of these.
A) Oversees all uses of information technology.
B) Ensures the strategic alignment of IT with business goals.
C) Ensures the strategic alignment of IT with business objectives.
D) All of these.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
19
Who is responsible for ensuring the throughput,speed,accuracy,availability,and reliability of an organization's information technology?
A) CIO
B) CPO
C) CTO
D) CSO
A) CIO
B) CPO
C) CTO
D) CSO
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
20
Trina Hauger works for Johnson Electric as a corporate lawyer,and part of her duties are to ensure the ethical and legal use of information within the company.Which of the following represents Trina's role at Johnson Electric?
A) Chief Knowledge Officer (CKO).
B) Chief Privacy Officer (CPO).
C) Chief Technology Officer (CTO).
D) Chief Information Officer (CIO).
A) Chief Knowledge Officer (CKO).
B) Chief Privacy Officer (CPO).
C) Chief Technology Officer (CTO).
D) Chief Information Officer (CIO).
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
21
Discuss the reasons why privacy issues lose trust for businesses.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
22
List and describe the four common IT-related strategic positions.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
23
__________ is the right to be left alone when you want to be,to have control over your own personal possessions,and to not be observed without your consent.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
24
One of the main ingredients in trust is privacy.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
25
Software _________ is the unauthorized use,duplication,distribution,or sale of copyrighted software.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
26
The chief ___________ officer is responsible for collecting,maintaining,and distributing the organization's knowledge.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
27
________ software is manufactured to look like the real thing and sold as such.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
28
_________ are the principles and standards that guide our behavior toward other people.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
29
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
30
Describe the relationship between ethics and privacy.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
31
Describe the gap between business personnel and IT personnel and what an organization can do to close this gap.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
32
Privacy is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
33
____________ security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
34
Explain how HIPAA protects individuals' health records.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck