6. The level of Organizational IT capacity planning maturity, at which "fire-fighting" is eliminated is: A. Level 1 B. Level 2 C. Level 3 D. Level 4 E. Level 5 7. The Ansoff Product/Market Matrix lists the Diversification strategy under: A. Present market, Present product B. Present market, New product C. New market, New Product D. New Market, Present Product 8. The Act prohibits the government from collect5ing information secretly? A. Privacy Act of 1974 B. Privacy Protection Act of 1980 C. Computer Security Act of 1987 D. Federal Internet Privacy Protection Act of 1997 E. None of These

Fundamentals of Information Systems
9th Edition
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Ralph Stair, George Reynolds
Chapter1: An Introduction To Information Systems In Organizations
Section: Chapter Questions
Problem 2.1CTQ
icon
Related questions
Question
6. The level of Organizational IT capacity planning maturity, at which "fire-fighting" is eliminated is:
A. Level 1
B. Level 2
C. Level 3
D. Level 4
E. Level 5
7. The Ansoff Product/Market Matrix lists the Diversification strategy under:
A. Present market, Present product
B. Present market, New product
C. New market, New Product
D. New Market, Present Product
8. The
Act prohibits the government from collect5ing information secretly?
A. Privacy Act of 1974
B. Privacy Protection Act of 1980
C. Computer Security Act of 1987
D. Federal Internet Privacy Protection Act of 1997
E. None of These
9. The Application Prioritization Matrix lists applications with High Business Impact and Low Ease of
Execution as:
A. Must Haves
B. Quick Wins
C. Money Pits
D. Low hanging fruit
10. The most popular (most often cited) element in a company's business continuity plan is
A. Business Process Recovery
B. Technology Recovery
C. Crisis Management
D. Data Recovery
E. Facilities
11 Which of the following is a secondary activity in a firm's Value Chain,
A. Inbound Logistics
B. Procurement
C. Outbound Logistics
D. Marketing and Sales
E. Operations
Transcribed Image Text:6. The level of Organizational IT capacity planning maturity, at which "fire-fighting" is eliminated is: A. Level 1 B. Level 2 C. Level 3 D. Level 4 E. Level 5 7. The Ansoff Product/Market Matrix lists the Diversification strategy under: A. Present market, Present product B. Present market, New product C. New market, New Product D. New Market, Present Product 8. The Act prohibits the government from collect5ing information secretly? A. Privacy Act of 1974 B. Privacy Protection Act of 1980 C. Computer Security Act of 1987 D. Federal Internet Privacy Protection Act of 1997 E. None of These 9. The Application Prioritization Matrix lists applications with High Business Impact and Low Ease of Execution as: A. Must Haves B. Quick Wins C. Money Pits D. Low hanging fruit 10. The most popular (most often cited) element in a company's business continuity plan is A. Business Process Recovery B. Technology Recovery C. Crisis Management D. Data Recovery E. Facilities 11 Which of the following is a secondary activity in a firm's Value Chain, A. Inbound Logistics B. Procurement C. Outbound Logistics D. Marketing and Sales E. Operations
12. The application portfolio matrix identifies those information systems as Turnaround where.
A. Impact is High and Dependence is High
B. Impact is Low and Dependence is Low
C. Impact is Low and Dependence is High
D. Impact is High and Dependence is Low
13. Factors that can trigger unethical Employee Behavior include:
A. Poor Leadership
B. Little or no Recognition of Achievement
C. Personal financial worries
D. Insufficient Resources
E. All of the above
14 Each the following is considered a benefit of a ralized organizational structure except:
A. expertise is shared among all organizations within the firm.
B. there is increased communication between business units.
C. there are clear career paths and training programs.
D. there is back up because of the redundancy of skills within the work unit.
E. None of the above
15. The COBIT Framework has 6 objectives that include:
A. Planning and Organization
B. Acquisition and implementation
C. Delivery and Support
D. Monitoring
E. All of the above
16 Enterprise Resource Planning systems such as SAP best describe which category of the Application
Portfolio Matrix?
a. Turnaround applications
b. Factory applications
c. Strategic applications
d. Support applications
e. Custom Applications
Transcribed Image Text:12. The application portfolio matrix identifies those information systems as Turnaround where. A. Impact is High and Dependence is High B. Impact is Low and Dependence is Low C. Impact is Low and Dependence is High D. Impact is High and Dependence is Low 13. Factors that can trigger unethical Employee Behavior include: A. Poor Leadership B. Little or no Recognition of Achievement C. Personal financial worries D. Insufficient Resources E. All of the above 14 Each the following is considered a benefit of a ralized organizational structure except: A. expertise is shared among all organizations within the firm. B. there is increased communication between business units. C. there are clear career paths and training programs. D. there is back up because of the redundancy of skills within the work unit. E. None of the above 15. The COBIT Framework has 6 objectives that include: A. Planning and Organization B. Acquisition and implementation C. Delivery and Support D. Monitoring E. All of the above 16 Enterprise Resource Planning systems such as SAP best describe which category of the Application Portfolio Matrix? a. Turnaround applications b. Factory applications c. Strategic applications d. Support applications e. Custom Applications
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Development strategies
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781337097536
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Principles of Information Systems (MindTap Course…
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781285867168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781305082168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning