Final Multiple Choice Questions Flashcards
Which phase of the systems development life cycle would indicate a feasible analysis? A. Analysis phase B. planning phase C. design phase D. implementation phase
B. Planning Phase
The IFAC suggested 10 core principles of effective information technology planning. Which of the following is not one of those 10 core principles? A. achievability B. reassessment C. accountability D. justifiable cost
D. justifiable cost
Projects are considered challenged if they are:
A. late, over budget, or do not have the required features and functions
B. canceled prior to completion
C. delivered, but never used
D. completed early
A. late, over budget, or do not have the required features
The triple constraint of project management does not include the constraint of A. Technical issues B. Time C. Cost D. Scope
A. technical issues
The PERT and Gantt charts primarily address the triple constraint of A. technical issues B. time C. cost D. scope
B. Time
The 100% rule suggests that before PERT chart is done, a project manager must:
A. make sure 100 % of the project is funded
B. make sure the project team is devoted, solely, or 100% , to this project
C. make sure 100% of the project tasks are defined
D. make sure that each person on the project team got 100% of their project management final exam
C. make sure 100% of the project tasks are defined
The critical path in a PERT chart represents:
A. sequence of tasks
B. the most important tasks of the whole project
C. the longest path of tasks needed for the project completion
D. the tasks that must be completed without errors
C. the longest path of tasks needed for the project completion
The technology acceptance model does not address: A. perceived usefulness B. perceived system quality C. perceived ease of use D. intention of use
D. perceived system quality
The Sarbanes-Oxley Act’s 404 reports require management and auditors to report on:
A. the financial condition of the firm
B. the quality of the project management planning
C. the academic background and experience of the company’s accounting leadership
D. the effectiveness of the internal controls of the company’s accounting information system
D. the effectiveness of the internal controls of the company’s accounting information system
In chapter 15, projects are defined as
A. a series of tasks performed in a defined sequence
B. turning raw talent into an NFL quality quarterback
C. turning blueprints from an architect into a completed building
D. merging two databases into one
A. a series of tasks performed in a defined sequence
Which of the following is a question that companies should answer when preparing the business case for an IT investment? A. how much will it cost? B. what are the risks? C. what are the alternatives? D. how will success be measures? E. all of the above
E
What is the first step in the economic justification process? A. identify potential solutions B. assess the value proposition C. assess business requirements D. estimate costs E. all of the above
D. assess business requirements
Which of the following is not an example of a complementary change necessary to allow an IT initiative to achieve its goals?
A. outsource the IT initiative
B. retrain employees
C. redefine job descriptions
D. provide incentives for employees to make the change successfully
E. none of the above
A. outsource the IT initiative
Which of the following is not an example of benefits of an IT investment?
A. increased revenues from access to new markets
B. decreased costs from automating manual tasks
C. Facilitating employee work-from-home arrangements
D. allowing compliance with new federal regulations
E. reducing the number of inventory count errors
C. facilitate employee work-from-home arrangements
Which of the following can be used to quantify benefits on an IT investment?
A. gathering expert opinions
B. benchmarking against competitor performance
C. comparing against the probability of future benefits if investment is foregone
D. conducting simulations
E. all of the above
E.
Which of the following are examples of direct costs of acquiring and implementing an IT investment?
A. hiring consultants to assess system requirements
B. personnel costs of the project team
C. training costs of employees who will use the system
D. cost of new computer hardware necessary to run the system
E. all of the above
E
Which of the following are not examples of operating costs for an IT investment?
A. costs of routine hardware replacements over time
B. cost of contract for help desk account
C. costs of disposal of electronics at end of life
D. costs of software license renewals
E. all of the above
E
Which of the following is not a category of IT initiative risk? A. alignment B. technological C. financial measurement D. solution E. all of the above
C. financial measurment
If an IT project costs $150,000 and returns net cash flows of $100,000 per year, what is the payback period? A. 1 year B. 1.5 years C. 2 years D. 2.5 years E. none of the above
B. 1.5 years
If an IT project costs $150,000 and returns net cash flows of $100,000 per year, what is the accounting rate of return? A. 33% B. 50% C. 67% D. 75% E. none of the above
C. 67%
Which of the following is not a balanced score perspective? A. learning and growth B. customer C. business process D. financial E. all of the above
E
Which of the following is not a type of business process in the balanced scorecard framework? A. operations management B. customer management C. innovation D. regulatory and social E. all of the above
E.
Which of the following best describes the purpose of a strategy map?
A. A graphical description of expected cause-and-effect linkages among balanced scorecard perspectives
B. a list of the company’s mission, vision, and values
C. a representation of the company’s strategic priorities
D. both A and B
E. Both A and C
D. both A and B
Which of the following does not describe a step in the balanced scorecard management process?
A. formulate the strategy
B. translate the strategy into strategic objectives
C. link objectives to operations
D. monitor performance and provide feedback
E. all of the above
E
Which of the following do not describe characteristics of enterprise IT?
A. enhance individual worker productivity
B.automate transaction processing
C. integrate processes
D. provide general customer service
E. monitor performance and support decision making
A. enhance individual work productivity
Which of the following would be an example of network IT? A. spreadsheets B. e-mail C. ERP systems D. CRM systems E. none of the above
B. e-mail
Which of the following is an example of function IT? A. spreadsheets B. e-mail C. ERP systems D. CRM systems E. none of the above
A. spreadsheets
Which of the following is not a role of IT in the balanced scorecard management process? A. strategy development support B. long-term budget forecasting C. transaction processing D. reporting E. all of the above
E.
A local are network (LAN) is best described as:
A. computer system that connects computers of all sizes, workstations, terminals and other devices within a limited proximity
B. system that allows computer users to meet and share ideas and information
C. electronic library
D. method to offer specialized software, hardware and data-handling techniques
A.
Which of the following network components is set up to serve as a security measure that prevents unauthorized traffic between different segments of the network? A. switch B. router C. firewall D. virtual local are networks (VLAN)
C. firewall
Unauthorized alteration of records in a database system would impair which of the following components of the CIA tripod? A. confidentiality B. integrity C. availability D. authorization
B. integrity
Which of the following is not a task performed by an operating system?
A. translate high-level languages to machine-level language
B. manage job scheduling and multiprogramming
C. support applications and facilitate their access to specified resources
D. provide controlled access to data and processes data
D. provide controlled access to data and processes data
Managers at a consumer products company purchased personal computer software from only recognized vendors and prohibited employees from installing non-authorized software on their personal computers by enforcing new end-user computing policy. To minimize the likelihood of computer viruses infecting any of its systems, the company should also:
A. restore infected systems with authorized versions
B. recompile infected programs from source code backups
C. institute program change control procedures
D. test all new software on a stand-alone personal computer
D. test all new software on a stand-alone personal computer
Unauthorized alteration of records in a database system can be prevented by employing: A. key verification B. computer matching C. regular review of audit trails D. database access controls
D. database access controls