(PM) ISS - Weekly Quizzes Flashcards

1
Q

A unit increase of which antecedent of “shared understanding” results in higher increase in “shared understanding”?

a) IS strategic alignment
b) Shared language
c) CIO business knowledge
d) Experiential similarity

A

B) Shared Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bill Davies, Former CIO, was sacked due to his problem with management-level communication. He had little …..

a) IT competence
b) business competence
c) IT-business integration competence
d) leadership competence

A

B) Business competence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Knowledge of system development helps CIOs …

a) understand the potential benefits, dangers, and limitations of IT
b) assist developers in finding the right technology for system development
c) analyze and design systems
d) trace and correct faults in the current system.

A

A) Understand the potential benefits, dangers and limitations of IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which resource of Apple is VRAINN (in the North American market)?

a) Apple’s relationship with Corning, the company that manufactures unique glasses for iPhone screens.
b) Apple’s chief design officer, Jony Ive, who first conceptualized the overall design and aesthetic of Apple products.
c) Apple’s brand.
d) Apple stores all over the world.
e) Software engineers of iOS.

A

C) Apple’s brand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

John Cho, the security officer of IVK, is very valuable to the company. No one knows the IT vulnerabilities of IVK as much as John Cho. His manager allows him to come at will to the company and work from home when needed. IVK does so to make John Cho a/an …. resource.

a) Valuable
b) Rare
c) Appropriable
d) Inimitable
e) Non-substitutable
f) Non-mobile

A

F) Non-mobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which chargeback system is the easiest to administer as calculating cost of a service for a BU is easy?

a) unallocated cost
b) simple cost allocation
c) cost recovery- average cost pricing
d) cost recovery- flexible cost pricing

A

C) Cost recovery- average cost pricing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which one is an advantage of a chargeback system?

a) Cost recovery- Average cost pricing; recovering 100% of the cost
b) Cost recovery- Standard pricing; control the demand for scarce resources
c) Profit center-Fixed pricing; handling changes to the service requirement
d) Profit center-Market-based pricing; ascertaining price

A

A) Cost recovery- Average cost pricing; recovering 100% of the cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does “creating an IT budget committee including BU managers “ improve the effectiveness of chargeback systems in controlling IT cost and demand for IT resources? It improves …. which improves using chargeback information for controlling IT cost.

a) BU managers’ involvement in IT budgeting
b) IT cost variability for BUs
c) quality of billing information produced by IT
d) BU managers’ power to decide on the quantity and type of IT services they receive

A

A) BU Managers’ involvement in IT budgeting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the correct order of IT value creation?

a) Combination of IT and complementary non-IT resources -> Improve organizational performance -> Improve business process performance
b) Improve organizational performance -> Combination of IT and complementary non-IT resources -> Improve business process performance
c) Improve business process performance -> Combination of IT and complementary non-IT resources -> Improve Organizational performance
d) Combination of IT and complementary non-IT resources -> Improve business process performance -> Improve organizational performance

A

D) Combination of IT and complementary non-IT resources -> Improve business process performance -> Improve organizational performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Assume that IVK follows the value discipline of operational excellence. Which business process performance measure do you suggest to Jim Barton to use to show the value of IT?

a) Customer satisfaction
b) Transaction cost
c) Discount effect calculation
d) Time-to-market for a product

A

B) Transaction Effect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reducing the cost of designing new products/services fits which value discipline better?

a) Customer intimacy
b) Operational excellence
c) Product leadership
d) None

A

C) Product leadership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which one is WRONG about Agile Project Management (PM)?

a) Agile PM iteratively delivers working products.
b) Agile PM is suitable for high exploratory projects.
c) An Agile approach can easily adjusts itself for changes in requirements.
d) Agile PM considers users knowledgeable about possible IT solutions.

A

D) Agile PM considers users knowledgeable about possible IT sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which one is a method used for identifying tasks whose delay means an overall project delay?

a) CMMI
b) Gant chart
c) Critical Path Method (CPM)
d) Agile PM

A

C) Critical Path Method (CPM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which business risk of spaghetti systems is low?

a) Service outage
b) Inadequate business controls
c) No support for real-time market response
d) Vulnerability to budget cuts

A

D) Vulnerability to budgets costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which internal factor can diminish the value of IT?

a) not having the complementary non-IT resources,
b) poor trading partner resources and business processes,
c) high competitiveness and heavy regulations in the industry,
d) economic downturn and low IT literacy in the country,
e) All correct

A

A) Not having the complementary non-IT resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which power base bestows a person’s compliance using logic and convincing power?

a) Informational power
b) Expert power
c) Coercive power
d) Referent power

A

A) Informational Power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which step of de-escalation process requires a scapegoat?

a) Problem Recognition
b) Re-examination of Prior Course of Action
c) Searching for Alternative Course of Action
d) Implementing an Exit Strategy

A

D) Implementing an Exit Strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Facebook bought Instagram. The two companies kept their brands and core services untouched. Users can upload the same post to both Facebook and Instagram using either of the applications. The two platforms also share users friend lists as well as lists of followers and following if users provide consent. Campaign advertisements of a customer of Instagram can be controlled in both Instagram and Facebook. What was Facebook’s IT integration strategy?

a) Consolidation
b) Combination
c) Transformation
d) Co-existence

A

D) Co-existance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which factor does NOT significantly influence the IT integration capability of an organization?

a) Strategic flexibility
b) IT compatibility
c) Modularity
d) Social integration

A

A) Strategic Flexibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which IT governance archetype is at the highest level of centralization?

a) Business monarchy
b) IT monarchy
c) IT Duopoly
d) Federal system
e) Feudal system
f) Anarchy

A

A) Business Monarchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In which IT governance archetype, business unit/line managers are in charge of the IT decision making?

a) Business monarchy
b) IT monarchy
c) IT Duopoly
d) Federal system
e) Feudal system
f) Anarchy

A

E) Feudal System

22
Q

“We should try to use cloud-based systems as much as possible” can be categorized under which type of IT decision

a) Business application needs
b) IT architecture
c) IT principle
d) IT investment prioritization

A

C) IT Principle

23
Q

“The Board elects an IT Security Audit Committee composed of outside directors, responsible for checking whether the security measures implemented by the IT department is enough.”

• Which ITG mechanism does the board use in this case?

a) Decision making structure
b) Communication
c) Formal process

A

A) Decision Making Structure

24
Q

Between April and June 2018, user traffic to the British Airways website was diverted to a fraudulent site, and personal details of around 500,000 customers were harvested by the attackers. UK’s Information Commissioner’s Office concluded that information was compromised by “poor security arrangements” at British Airways. Consequently, British Airways was fined £183.39 million ($230 million). Which type of IT risk is materialized here?

a) Availability risk
b) Access risk
c) Accuracy risk
d) Agility risk
e) None

A

B) Access Risk

25
Q

Bad weather forced ComAir to make more than 6,000 schedule changes between December 22 and 24 alone. Unbeknownst to anyone at ComAir, the scheduling system contained a critical field that could only count 32,767 changes in a month. At about 10 P.M. On Christmas Eve, a ComAir employee tried to enter the 32,768th change, and the system stopped dead. Technicians re-launched the system late on December 25. But, it was too late as 200,000 passengers were stranded in airports. ComAir lost $20 million in revenue, its brand equity, its CIO and president. Which type of IT risk is materialized in this case?

a) Availability risk
b) Access risk
c) Accuracy risk
d) Agility risk
e) None

A

A) Availability Risk

26
Q

Personally identifiable information of 77 million accounts on Sony PlayStation Network was exposed between April 17 and April 19, 2011. Consequently, Sony had to shut down PlayStation Network on April 20. Online gamers were not able to play their favorite games for over a month. Which type of IT risk is materialized in this case? (Multiple answers)

a) Availability risk
b) Access risk
c) Accuracy risk
d) Agility risk
e) None

A

A) Availability Risk

27
Q

How can an IT department respond to a DDOS attack?

a) Renaming the web application and databases
b) Upgrade the network technology
c) Remove suspicious files
d) Stop responding to the attacking IP addresses

A

D) Stop responding to the attacking IP addresses

28
Q

Which one is not a component of a disclosure decision about a data breach?

a) Who should be informed
b) Medium (call, write, conference call)
c) Who is in charge of customer awareness
d) What to do (shutdown and rebuild, or build a mirror)

A

D) What to do (shutdown and rebuild, or build a mirror)

29
Q

Claiming that the data breach occurred due to third-party negligence is an example of a ….. crisis customer contact strategy.

a) Defensive
b) Accommodative
c) Moderation
d) Image renewal

A

D) Defensive

30
Q

Which crisis customer contact strategy is NOT effective on stock market value of the company?

a) Defensive strategy during a natural disaster
b) Accommodative strategy
c) Moderation strategy
d) Image Renewal strategy

A

A) Defensive strategy during a natural disaster

31
Q

Which factor has a direct influence on Top Management Team (TMT)’s Trust in the CIO?

a) Informal meetings with the TMT
b) CIO’s position in the organization
c) Using shared language
d) Increasing TMT’s IT knowledge

A

C) Using Shared Language

32
Q

Which claim about factors influencing Top Management Team (TMT)’s Trust in the CIO is NOT empirically supported?

a) Frequent informal meetings with the TMT improves trust via building a shared language and shared cognition.
b) CIO being part of the TMT improves trust via increasing the interaction and knowledge exchange between CIO and TMT
c) Avoiding using IT jargon and using business terminology increases trust.
d) Increasing TMT’s IT knowledge improves trust via improving shared cognition of IT.

A

B) CIO being part of the TMT improves trust via increasing the interaction and knowledge exchange between CIO and TMT

33
Q

Which factor has a significant positive effect on persuading blockers to become allies?

a) Ingratiation
b) threats, frequent checking,
c) seeking the aid of others to persuade blockers
d) appeal to blocker’s loyalty and friendship

A

D) Appeal to blocker’s loyalty and friendship

34
Q

At which stage of the hype cycle, conservative companies start investing in the technology?

a) Innovation Trigger
b) Plateau of Productivity
c) Slope of Enlightenment
d) Trough of Disillusionment
e) Peak of Inflated Expectations

A

B) Plateau of Productivity

35
Q

Which factor has a more powerful influence on the productivity of an employee who is an information worker?

a) Retention
b) Information diversity
c) Social communication
d) Using social media

A

B) Information Diversity

36
Q

Which statement in an SLA is NOT foundational?

a) service recipient’s expectations at the end of the contract
b) the expectations from the various parties involved in the contract
c) service-level and quality targets
d) processes for implementing foreseeable contingencies

A

D) Processes for implementing foreseeable contigencies

37
Q

Which one is not a dimension of commitment in inter-organizational relationships?

a) a desire to continue a relationship
b) willingness to investment of capital and effort
c) a confidence in the stability of the relationship
d) achieving mutually-satisfying resolutions of conflicts

A

D) Achieving mutually-satisfying resolutions of conflict

38
Q

Anyone can use Amazon Web Service (AWS) for a fee. It is an example of a/an ….

a) Public Cloud
b) Shared Cloud
c) Dedicated Private Cloud
d) On-premise Private Cloud

A

A) Public Cloud

39
Q

As a client of Tilburg University, you are allowed to use the computers on campus for a fee included in your yearly tuition. You cannot install new software applications, but you can only use the applications already installed such as Visual Studio for programming or Microsoft Office. This is an example of:

a) SaaS
b) PaaS
c) IaaS

A

A) SaaS

40
Q

Which criteria is NOT about the customizability of an application to respond future requirements?

a) Open Architecture
b) Scalability
c) Robustness

A

A) Open Architecture

41
Q

Assume that Albert Hijn starts manufacturing chili sauce under its own new private brand (Alijn.) Which integration strategy is used in this case?

a) Forward integration
b) Backward integration
c) Horizontal integration
d) Virtual integration

A

B) Backward integration

42
Q

Apple stores all over the world have access to the data of customers account (a global customer view) and phones. The structure, decoration, and processes in an Apple store are designed to be similar all over the world. What is Apple stores’ operating model?

a) Diversification
b) Unification
c) Coordination
d) Replication

A

B

43
Q

How can we measure Ideated innovation capability of a company?

a) number of patents
b) number of new products and services
c) number of social media applications in a company
d) number of data analytic applications in a company

A

A) Number of patents

44
Q

“The Board elects an IT Security Audit Committee composed of outside directors, responsible for checking whether the security measures implemented by the IT department is enough.”

• Which ITG mechanism does the board use in this case?

a) Decision making structure
b) Communication
c) Formal process

A

A) Decision Making Structure

45
Q

The operating model of Coordination means the organization is interested in having …?

a) low integration, low standardization
b) low integration, high standardization
c) high integration, low standardization
d) high integration, high standardization

A

C) High integration, low standardization

46
Q

Who is responsible for the day-to-day administrative and operational functions of a business?

a) CIO
b) COO
c) CEO
d) CFO
e) CMO

A

B) COO

47
Q

Which one is not a business process?

a) Product development
b) Order fulfillment
c) Procurement
d) Organizational chart

A

D) Organizational Chart

48
Q

Learning management systems such as Canvas and course registration systems such as OSIRIS are …

a) Operational support systems
b) Market information systems
c) Strategic decision support systems
d) Inter-organizational systems

A

D) Operational Support Systems

49
Q

What strategy do Apple and Motorola follow in the mobile phone market?

a) Differentiation, Cost leadership
b) Cost leadership, Differentiation
c) Cost leadership, Cost leadership
d) Differentiation, Differentiation

A

D) Differentiation, Differentation

50
Q

“Apple’s competitors argue that they were the first to introduce this or that feature (e.g., connected watch, fingerprint sensor), or to invent it, but that doesn’t change the fact that Apple was often the one to commercialize it with the greatest degree of success.” What strategy does Apple follow? What are the main attributes of that strategy?

a) Analyzer, analysis & risk aversion
b) Prospector, aggressiveness & proactiveness
c) Analyzer, futurity & risk aversion
d) Prospector, futurity & risk aversion

A

A) Analyzer, analysis & risk aversion

51
Q

A document on …. can include a target application portfolio.

a) Business Strategy
b) IT Strategy
c) IS Strategy
d) Marketing Strategy

A

C) IS Strategy