Deck 5: Organizational Structures That Support Strategic Initiatives

Full screen (f)
exit full mode
Question
Jeremy Bridges is an executive for Green Web Designs,where his primary role is to ensure the security of business systems and develop strategies to protect the company from online viruses and hackers.What is Jeremy's role within the company?

A) Chief Executive Officer (CEO).
B) Chief Security Officer (CSO).
C) Chief Procurement Officer (CPO).
D) Chief Technology Officer (CTO).
Use Space or
up arrow
down arrow
to flip the card.
Question
Which role within a company is responsible for overseeing all uses of MIS and ensuring that MIS strategy aligns with business goals and objectives?

A) Chief knowledge officer (CKO).
B) Chief privacy officer (CPO).
C) Chief information officer (CIO).
D) Chief security officer (CSO).
Question
Who is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses?

A) CIO
B) CPO
C) CTO
D) CSO
Question
Job titles,roles,and responsibilities do not differ from organization to organization.
Question
The old business axiom "time is money" needs to be updated to more accurately reflect the crucial interdependence between IT and business processes.What is the recommended new phrase?

A) Uptime is a good business process.
B) Downtime is a bad business process.
C) Uptime is money.
D) Downtime is impossible.
Question
Which issue concerns CIOs the most?

A) Security.
B) Budgeting.
C) Enhancing customer satisfaction.
D) Marketing.
Question
Broad functions of a CIO include all of the following except:

A) Ensuring the delivery of all IT projects, on time and within budget.
B) Ensuring that the strategic vision of IT is in line with the strategic vision of the organization.
C) Building and maintaining strong executive relationships.
D) Building and maintaining strong customer processes.
Question
It is the responsibility of the CIO to ensure effective communications between business and IT personnel.
Question
Which of the following is one of the four categories of costs associated with downtime?

A) Financial performance
B) Revenue
C) Damaged reputation
D) All of these
Question
What are the principles and standards that guide our behavior toward other people?

A) Intellectual property
B) Copyright
C) Pirated software
D) Ethics
Question
Ethics are the laws that guide our behavior toward other people.
Question
What is intangible creative work that is embodied in physical form?

A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
Question
What gives a person the legal right to use copyrighted material in certain situations?

A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
Question
According to Infonetics research,what is the leading cause of downtime?

A) Software failure followed by human error.
B) Tornadoes.
C) Power outage.
D) Sink overflow.
Question
What first-ever national appointment was made by President Barack Obama?

A) National Chief Security Officer
B) National Chief Privacy Officer
C) National Chief Technology Officer
D) All of these
Question
What is the legal protection affording an expression of an idea?

A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
Question
What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?

A) Ethics
B) Privacy
C) Copyright
D) Information security
Question
Which of the following activities does a CIO perform?

A) Oversees all uses of information technology.
B) Ensures the strategic alignment of IT with business goals.
C) Ensures the strategic alignment of IT with business objectives.
D) All of these.
Question
Who is responsible for ensuring the throughput,speed,accuracy,availability,and reliability of an organization's information technology?

A) CIO
B) CPO
C) CTO
D) CSO
Question
Trina Hauger works for Johnson Electric as a corporate lawyer,and part of her duties are to ensure the ethical and legal use of information within the company.Which of the following represents Trina's role at Johnson Electric?

A) Chief Knowledge Officer (CKO).
B) Chief Privacy Officer (CPO).
C) Chief Technology Officer (CTO).
D) Chief Information Officer (CIO).
Question
Discuss the reasons why privacy issues lose trust for businesses.
Question
List and describe the four common IT-related strategic positions.
Question
__________ is the right to be left alone when you want to be,to have control over your own personal possessions,and to not be observed without your consent.
Question
One of the main ingredients in trust is privacy.
Question
Software _________ is the unauthorized use,duplication,distribution,or sale of copyrighted software.
Question
The chief ___________ officer is responsible for collecting,maintaining,and distributing the organization's knowledge.
Question
________ software is manufactured to look like the real thing and sold as such.
Question
_________ are the principles and standards that guide our behavior toward other people.
Question
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
Question
Describe the relationship between ethics and privacy.
Question
Describe the gap between business personnel and IT personnel and what an organization can do to close this gap.
Question
Privacy is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.
Question
____________ security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
Question
Explain how HIPAA protects individuals' health records.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/34
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Organizational Structures That Support Strategic Initiatives
1
Jeremy Bridges is an executive for Green Web Designs,where his primary role is to ensure the security of business systems and develop strategies to protect the company from online viruses and hackers.What is Jeremy's role within the company?

A) Chief Executive Officer (CEO).
B) Chief Security Officer (CSO).
C) Chief Procurement Officer (CPO).
D) Chief Technology Officer (CTO).
B
Explanation: The chief security officer is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses.
2
Which role within a company is responsible for overseeing all uses of MIS and ensuring that MIS strategy aligns with business goals and objectives?

A) Chief knowledge officer (CKO).
B) Chief privacy officer (CPO).
C) Chief information officer (CIO).
D) Chief security officer (CSO).
C
Explanation: The chief information officer (CIO) is responsible for (1) overseeing all uses of MIS and (2) ensuring that MIS strategy aligns with business goals and objectives.
3
Who is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses?

A) CIO
B) CPO
C) CTO
D) CSO
D
Explanation: This is the definition of chief security officer (CSO).
4
Job titles,roles,and responsibilities do not differ from organization to organization.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
5
The old business axiom "time is money" needs to be updated to more accurately reflect the crucial interdependence between IT and business processes.What is the recommended new phrase?

A) Uptime is a good business process.
B) Downtime is a bad business process.
C) Uptime is money.
D) Downtime is impossible.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
6
Which issue concerns CIOs the most?

A) Security.
B) Budgeting.
C) Enhancing customer satisfaction.
D) Marketing.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
7
Broad functions of a CIO include all of the following except:

A) Ensuring the delivery of all IT projects, on time and within budget.
B) Ensuring that the strategic vision of IT is in line with the strategic vision of the organization.
C) Building and maintaining strong executive relationships.
D) Building and maintaining strong customer processes.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
8
It is the responsibility of the CIO to ensure effective communications between business and IT personnel.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is one of the four categories of costs associated with downtime?

A) Financial performance
B) Revenue
C) Damaged reputation
D) All of these
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
10
What are the principles and standards that guide our behavior toward other people?

A) Intellectual property
B) Copyright
C) Pirated software
D) Ethics
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
11
Ethics are the laws that guide our behavior toward other people.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
12
What is intangible creative work that is embodied in physical form?

A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
13
What gives a person the legal right to use copyrighted material in certain situations?

A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
14
According to Infonetics research,what is the leading cause of downtime?

A) Software failure followed by human error.
B) Tornadoes.
C) Power outage.
D) Sink overflow.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
15
What first-ever national appointment was made by President Barack Obama?

A) National Chief Security Officer
B) National Chief Privacy Officer
C) National Chief Technology Officer
D) All of these
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
16
What is the legal protection affording an expression of an idea?

A) Intellectual property
B) Copyright
C) Pirated software
D) Fair use doctrine
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
17
What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?

A) Ethics
B) Privacy
C) Copyright
D) Information security
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following activities does a CIO perform?

A) Oversees all uses of information technology.
B) Ensures the strategic alignment of IT with business goals.
C) Ensures the strategic alignment of IT with business objectives.
D) All of these.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
19
Who is responsible for ensuring the throughput,speed,accuracy,availability,and reliability of an organization's information technology?

A) CIO
B) CPO
C) CTO
D) CSO
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
20
Trina Hauger works for Johnson Electric as a corporate lawyer,and part of her duties are to ensure the ethical and legal use of information within the company.Which of the following represents Trina's role at Johnson Electric?

A) Chief Knowledge Officer (CKO).
B) Chief Privacy Officer (CPO).
C) Chief Technology Officer (CTO).
D) Chief Information Officer (CIO).
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
21
Discuss the reasons why privacy issues lose trust for businesses.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
22
List and describe the four common IT-related strategic positions.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
23
__________ is the right to be left alone when you want to be,to have control over your own personal possessions,and to not be observed without your consent.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
24
One of the main ingredients in trust is privacy.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
25
Software _________ is the unauthorized use,duplication,distribution,or sale of copyrighted software.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
26
The chief ___________ officer is responsible for collecting,maintaining,and distributing the organization's knowledge.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
27
________ software is manufactured to look like the real thing and sold as such.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
28
_________ are the principles and standards that guide our behavior toward other people.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
29
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
30
Describe the relationship between ethics and privacy.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
31
Describe the gap between business personnel and IT personnel and what an organization can do to close this gap.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
32
Privacy is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
33
____________ security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
34
Explain how HIPAA protects individuals' health records.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 34 flashcards in this deck.