Question 1 (2 points)
In today's hypercompetitive business environment, firms that have strong project management skills have a higher likelihood of success because they are able to:
Question 1 Options:
1) Spend money wisely.
2) Adapt processes and systems and therefore innovate faster than their competitors.
3) Optimize business processes.
4) Change and adapt in a slow yet methodical manner, reducing risk.
5) Utilize social and mobile platforms
Question 2 (2 points)
2. To maintain balance in a project with a fixed budget and a well-defined scope, a project team will require flexibility ________.
Question 2 options:
1) with the deadline.
2) in spending.
3) with project quality.
4) with assumed risks.
5) in achieving the goals of the business case.
Question 3 (2 points)
Scope may be divided into product scope and __________ scope.
Question 3 options:
1) project
2) cost
3) time
4) time
5) sequence
Question 4 (2 points)
The project triangle includes 3 sides - time, scope and ________.
Question 4 options :-
1) cost
2) product
3) event
4) quality
5) requirements
Question 5 (2 points)
This project cycle plan tends to be used for projects that have direct relationships between time and resources.
Question 5 options:-
1) PERT
2) Gantt
3) CPM
4) NPV
5) Flowchart
Question 6 (2 points)
An organization may convert from an old system to a new system by choosing to run both the old and new systems at the same time until the new system is fully accepted. This is known as __________.
Question 6 options:
1) Cutover
2) Parallel conversion
3) Direct cutover
4) Agile development
5) SDLC
Question 7 (2 points)
Which one of the following is NOT one of the four essential elements of any project?
Question 7 options:
1) Common project vocabulary
2) Project team
3) System evaluation
4) Project cycle plan
5) Project management
Question 8 (2 points)
Which one of the following software products is NOT an open source software release?
Question 8 options:
1) PERL
2) Open Office
3) Linux
4) Mozilla
5) Microsoft Office
Question 9 (2 points)
This development methodology is more traditional and more structured than other approaches.
Question 9 options:
1) Agile programming
2) Prototyping
3) Open source deployment
4) Software development life cycle (SDLC)
5) Critical path method (CPM)
Question 10 (2 points)
To reduce risk, a project should have which one of the following qualities.
Question 10 options:
1) High complexity
2) High clarity
3) Big in size
4) Large in budget
5) Lots of programmers
Question 11 (2 points)
A successful project begins with a ____________ that articulates the purpose and details of the project, benefits and costs, stakeholders, and required resources.
Question 11 options:
1) project plan
2) Gantt chart
3) business case
4) dashboard
5) strategy
Question 12 (2 points)
If someone wants a system cheaply, quickly, and with a large scope, we can conclude:
Question 12 options:
1) That desire represents the three sides of the Project Triangle
2) This is normally not possible: you can usually only achieve two of those three objectives at a time.
3) Management might be providing an impossible goal.
4) All of the above
5) None of the above
Question 13 (2 points)
All of the following are indications that the project is successful EXCEPT:
Question 13 options:
1) Customers receive a significant benefit from the project.
2) The project meets its return on investment goal.
3) The project meets the established time and budget criteria.
4) The project prepares the organization for future success and growth.
5) The project profits are high and last for a very short time period.
Question 14 (2 points)
Knowledge management is the process that generates, captures, codifies and __________ knowledge across an organization in order to achieve a competitive advantage.
Question 14 options:
1) Analyzes
2) Transfers
3) Applies
4) Limits
5) Saves
Question 15 (2 points)
Business analytics fuel ________ decision making.
Question 15 options:
1) social
2) fact-based
3) profit-driven
4) intuition-based
5) top-down
Question 16 (2 points)
An organization's only sustainable competitive advantage lies in:
Question 16 options:
1) The data warehouse.
2) The creation of unrealistic expectations.
3) The employees' knowledge and how they apply that knowledge to business problems.
4) The use of business intelligence.
5) The business processes
Question 17 (2 points)
Knowledge that has been identified, captured, and leveraged to produce higher-value goods or services or some other competitive advantage for the firm is called:
Question 17 options:
1) Information
2) Intellectual capital
3) Competitive advantage data
4) Business intelligence
5) System data
Question 18 (2 points)
________________ is hard to explain, hard to transfer, and highly personal to the source.
Question 18 options:
1) Data
2) Tacit knowledge
3) Implicit knowledge
4) Explicit knowledge
5) Information
Question 19 (2 points)
These are collections of data designed to support management decision making, and sometimes serve as repositories of organizational knowledge.
Question 19 options:
1) Data-marts
2) Data containers
3) Data warehouses
4) Data storage centers
5) RAID
Question 20 (2 points)
IT is traditionally focused on _________________________.
Question 20 options:
1) data
2) tacit knowledge
3) implicit knowledge
4) explicit knowledge
5) information
Question 21 (2 points)
All of the following are examples of socialization EXCEPT for:
Question 21 options:
1) Sharing war stories
2) Apprenticeships
3) Conferences
4) Non-structured activities, like an office party or lunch discussion
5) Project management
Question 22 (2 points)
By utilizing business analytics, a company can learn which one of the following?
Question 22 options:
1) Which products are moving slowly versus which products are moving quickly
2) Which products have been sold in the past 3 months
3) Who is likely to buy the product in a given period of time
4) Where each product sits (warehouse, store or factory location)
5) The suppliers who contributed to the manufacturing of the product
Question 23 (2 points)
This company approach is one in which facts are gathered and analyzed as the first step in decision making.
Question 23 options:
1) Information-driven management
2) Hierarchical structure
3) Network structure
4) Evidence-based management
5) Social analytics
Question 24 (2 points)
TJX's handling of its serious data breach is consistent with which one of the following?
Question 24 options:
1) Stakeholder theory
2) Stockholder theory
3) Social normative
4) Social contract theory
5) Corporate social responsibility
Question 25 (2 points)
This is the term used to describe ethical dilemmas that arise with the development and application of IT.
Question 25 options:
1) Stockholder theory
2) PAPA principles
3) Information ethics
4) Normative theories
5) IT dilemmas
Question 26 (2 points)
Green computing is often associated with supporting the triple bottom line known as:
Question 26 options:
1) Economic, environmental and social
2) Stockholder, stakeholder and society
3) People, Privacy and Property
4) Google, Facebook and Microsoft
5) Data, information and knowledge
Question 27 (2 points)
"Who owns information?" and "What are the just and fair prices for its exchange?" are part of this ethical issue:
Question 27 options:
1) Privacy
2) Accuracy
3) Ownership
4) Property
5) Accessibility
Question 28 (2 points)
Questions like "Who is responsible for the reliability of information?" and "Who will be accountable for errors in the information?" are part of this ethical issue.
Question 28 options:
1) Privacy
2) Accuracy
3) Authenticity
4) Perfection
5) Purpose
Question 29 (2 points)
In today's digital word, individuals can control their privacy through choice, ______ , and correction.
Question 29 options:
1) Protection
2) Consent
3) Property
4) Communication
5) Consideration
Question 30 (2 points)
A company should examine this area of the control of information if it wants to determine what data it has the right to monitor and capture from its employees.
Question 30 options:
1) Privacy
2) Accuracy
3) Accessibility
4) Perfection
5) Property
Question 31 (2 points)
Today's managers must ensure that information about their employees and customers is only available to those who have a right to see it and use it, an issue referred to as:
Question 31 options:
1) Screening
2) Accuracy
3) Accessibility
4) Perfection
5) Property
Question 32 (2 points)
A manager who primarily focuses on the shareholders of the corporation rather than all of the vested parties in the businesses operations and activities is practicing which theory of normative business ethics?
Question 32 options:
1) Stakeholder theory
2) Investor theory
3) Stockholder theory
4) Shareholder theory
5) Social contract theory
Question 33 (2 points)
Saved
This theory of normative business ethics seeks to create value for people in a manner that is just and nondiscriminatory.
Question 33 options:
1) Stakeholder theory
2) Investor theory
3) Social contract theory
4) Shareholder theory
5) Stockholder theory
Question 34 (2 points)
Information privacy guidelines should come from what level in a company?
Question 34 options:
1) CEO and top-level executives
2) Middle management
3) Employees
4) Federal regulations
5) State laws
Question 35 (2 points)
This act of 1996 is designed to safeguard the electronic exchange of patient records in the health care industry.
Question 35 options:
1) SOX
2) HIPAA
3) IETF
4) COBIT
5) PAPA
Question 36 (2 points)
The European Union relies on a government data protection agency and specific privacy protection standards outlined in the ___________.
Question 36 options:
1) Safe Harbor Framework
2) PAPA Principles
3) Directive on Data Protection
4) HIPPA
5) SOX Act
Question 37 (2 points)
An Internet web site that wishes to abide by fair privacy practices will do all of the following EXCEPT:
Question 37 options:
1) Allow the consumer the choice to participate in the site or not
2) Post policies about how personal information gathered from consumers will be used
3) Afford the consumer the opportunity to view and contest the accuracy of the data collected
4) Secure collected consumer information
5) All of the above
Question 38 (2 points)
Target found out a teenager was pregnant by (1) ________ and revealed that fact to her dad by (2) _______
Question 38 options:
1) (1) Overhearing the teen in the store; (2) Calling her dad
2) (1) Her purchases of diapers; (2) sending an official letter to the dad
3) (1) Her purchases of unscented soap, cotton balls and vitamins; (2) mailing her some ads for diapers and maternity clothe
4) (1) Her sudden elation when visiting the children's department; (2) sending a video of her tears of happiness in that department
5) None of the above
Question 39 (2 points)
The question "What information does a person or an organization have a right or a privilege to obtain?" is part of this ethical issue.
Question 39 options:
1) Privacy
2) Accuracy
3) Accessibility
4) Perfection
5) Property
Question 40 (2 points)
What principles, developed in 2000 by the US Department of Commerce (DOC) in consultation with the European Commission, allow U.S. companies to be placed on a list maintained by the DOC?
Question 40 options:
1) Safe Harbor framework
2) Approved Business framework
3) PAPA framework
4) Property Harbor framework
5) Safe Business framework
Question 41 (20 points)
What is the difference between tacit and explicit knowledge? From your own experience, describe an example of each. How might an organization manage tacit knowledge?
Tacit knowledge is personal, context specific, and hard to formalize and communicate. Many times, a person does not know even know that he has some specific tacit knowledge. It consists of experiences, beliefs, and skills. It is carried in mind and difficult to be transferred to others. Tacit knowledge is entirely subjective and is often acquired through physically practicing a skill or activity (Pearlson et. al., 2019). For example, ability to swim, throw a baseball, or ride a bicycle is are tacit knowledge as this knowledge cannot be taught or transferred through written words or by speaking.
On the other hand, explicit knowledge is gained with the help of written documents such as books, financial reports, and encyclopedia. Explicit knowledge is objective, theoretical, and can be easily codified for storing or transmission in a formal, systematic method using grammar, syntax, and the printed word (Pearlson et. al., 2019). For example, a mathematical formula, or calculation of financial ratio are explicit knowledge.
An organization can manage tacit knowledge by converting it to explicit knowledge, and then apply methods of managing explicit knowledge on it. An organization can manage tacit knowledge explicitly, by getting each individual to make their tacit knowledge explicit, and then store that knowledge. The process of knowledge conversion to convert tacit knowledge to explicit knowledge is called Externalization. Externalization refers to articulating and thereby capturing tacit knowledge through use of metaphors, analogies, and models. Once tacit knowledge is converted to explicit knowledge it is codified. Knowledge codification is the representation of knowledge in a manner that can be easily accessed and transferred (Pearlson et. al., 2019). Next, knowledge is transferred from one group to other group or individual, and absorbed. Organizations facilitate discussions and interactions as a means of transferring knowledge. Organizations use knowledge management (KM) to create, store, and reuse organizational knowledge.
References
Pearlson, K. E., Saunders, C. S. & Galletta, D. F. (2019). Managing and Using Information Systems: A Strategic Approach. (6th ed.). John Wiley & Sons.
In today's hypercompetitive business environment, firms that have strong project management skills have a higher likelihood of success because they are able to:
Question 1 Options:
1) Spend money wisely.
2) Adapt processes and systems and therefore innovate faster than their competitors.
3) Optimize business processes.
4) Change and adapt in a slow yet methodical manner, reducing risk.
5) Utilize social and mobile platforms
Question 2 (2 points)
2. To maintain balance in a project with a fixed budget and a well-defined scope, a project team will require flexibility ________.
Question 2 options:
1) with the deadline.
2) in spending.
3) with project quality.
4) with assumed risks.
5) in achieving the goals of the business case.
Question 3 (2 points)
Scope may be divided into product scope and __________ scope.
Question 3 options:
1) project
2) cost
3) time
4) time
5) sequence
Question 4 (2 points)
The project triangle includes 3 sides - time, scope and ________.
Question 4 options :-
1) cost
2) product
3) event
4) quality
5) requirements
Question 5 (2 points)
This project cycle plan tends to be used for projects that have direct relationships between time and resources.
Question 5 options:-
1) PERT
2) Gantt
3) CPM
4) NPV
5) Flowchart
Question 6 (2 points)
An organization may convert from an old system to a new system by choosing to run both the old and new systems at the same time until the new system is fully accepted. This is known as __________.
Question 6 options:
1) Cutover
2) Parallel conversion
3) Direct cutover
4) Agile development
5) SDLC
Question 7 (2 points)
Which one of the following is NOT one of the four essential elements of any project?
Question 7 options:
1) Common project vocabulary
2) Project team
3) System evaluation
4) Project cycle plan
5) Project management
Question 8 (2 points)
Which one of the following software products is NOT an open source software release?
Question 8 options:
1) PERL
2) Open Office
3) Linux
4) Mozilla
5) Microsoft Office
Question 9 (2 points)
This development methodology is more traditional and more structured than other approaches.
Question 9 options:
1) Agile programming
2) Prototyping
3) Open source deployment
4) Software development life cycle (SDLC)
5) Critical path method (CPM)
Question 10 (2 points)
To reduce risk, a project should have which one of the following qualities.
Question 10 options:
1) High complexity
2) High clarity
3) Big in size
4) Large in budget
5) Lots of programmers
Question 11 (2 points)
A successful project begins with a ____________ that articulates the purpose and details of the project, benefits and costs, stakeholders, and required resources.
Question 11 options:
1) project plan
2) Gantt chart
3) business case
4) dashboard
5) strategy
Question 12 (2 points)
If someone wants a system cheaply, quickly, and with a large scope, we can conclude:
Question 12 options:
1) That desire represents the three sides of the Project Triangle
2) This is normally not possible: you can usually only achieve two of those three objectives at a time.
3) Management might be providing an impossible goal.
4) All of the above
5) None of the above
Question 13 (2 points)
All of the following are indications that the project is successful EXCEPT:
Question 13 options:
1) Customers receive a significant benefit from the project.
2) The project meets its return on investment goal.
3) The project meets the established time and budget criteria.
4) The project prepares the organization for future success and growth.
5) The project profits are high and last for a very short time period.
Question 14 (2 points)
Knowledge management is the process that generates, captures, codifies and __________ knowledge across an organization in order to achieve a competitive advantage.
Question 14 options:
1) Analyzes
2) Transfers
3) Applies
4) Limits
5) Saves
Question 15 (2 points)
Business analytics fuel ________ decision making.
Question 15 options:
1) social
2) fact-based
3) profit-driven
4) intuition-based
5) top-down
Question 16 (2 points)
An organization's only sustainable competitive advantage lies in:
Question 16 options:
1) The data warehouse.
2) The creation of unrealistic expectations.
3) The employees' knowledge and how they apply that knowledge to business problems.
4) The use of business intelligence.
5) The business processes
Question 17 (2 points)
Knowledge that has been identified, captured, and leveraged to produce higher-value goods or services or some other competitive advantage for the firm is called:
Question 17 options:
1) Information
2) Intellectual capital
3) Competitive advantage data
4) Business intelligence
5) System data
Question 18 (2 points)
________________ is hard to explain, hard to transfer, and highly personal to the source.
Question 18 options:
1) Data
2) Tacit knowledge
3) Implicit knowledge
4) Explicit knowledge
5) Information
Question 19 (2 points)
These are collections of data designed to support management decision making, and sometimes serve as repositories of organizational knowledge.
Question 19 options:
1) Data-marts
2) Data containers
3) Data warehouses
4) Data storage centers
5) RAID
Question 20 (2 points)
IT is traditionally focused on _________________________.
Question 20 options:
1) data
2) tacit knowledge
3) implicit knowledge
4) explicit knowledge
5) information
Question 21 (2 points)
All of the following are examples of socialization EXCEPT for:
Question 21 options:
1) Sharing war stories
2) Apprenticeships
3) Conferences
4) Non-structured activities, like an office party or lunch discussion
5) Project management
Question 22 (2 points)
By utilizing business analytics, a company can learn which one of the following?
Question 22 options:
1) Which products are moving slowly versus which products are moving quickly
2) Which products have been sold in the past 3 months
3) Who is likely to buy the product in a given period of time
4) Where each product sits (warehouse, store or factory location)
5) The suppliers who contributed to the manufacturing of the product
Question 23 (2 points)
This company approach is one in which facts are gathered and analyzed as the first step in decision making.
Question 23 options:
1) Information-driven management
2) Hierarchical structure
3) Network structure
4) Evidence-based management
5) Social analytics
Question 24 (2 points)
TJX's handling of its serious data breach is consistent with which one of the following?
Question 24 options:
1) Stakeholder theory
2) Stockholder theory
3) Social normative
4) Social contract theory
5) Corporate social responsibility
Question 25 (2 points)
This is the term used to describe ethical dilemmas that arise with the development and application of IT.
Question 25 options:
1) Stockholder theory
2) PAPA principles
3) Information ethics
4) Normative theories
5) IT dilemmas
Question 26 (2 points)
Green computing is often associated with supporting the triple bottom line known as:
Question 26 options:
1) Economic, environmental and social
2) Stockholder, stakeholder and society
3) People, Privacy and Property
4) Google, Facebook and Microsoft
5) Data, information and knowledge
Question 27 (2 points)
"Who owns information?" and "What are the just and fair prices for its exchange?" are part of this ethical issue:
Question 27 options:
1) Privacy
2) Accuracy
3) Ownership
4) Property
5) Accessibility
Question 28 (2 points)
Questions like "Who is responsible for the reliability of information?" and "Who will be accountable for errors in the information?" are part of this ethical issue.
Question 28 options:
1) Privacy
2) Accuracy
3) Authenticity
4) Perfection
5) Purpose
Question 29 (2 points)
In today's digital word, individuals can control their privacy through choice, ______ , and correction.
Question 29 options:
1) Protection
2) Consent
3) Property
4) Communication
5) Consideration
Question 30 (2 points)
A company should examine this area of the control of information if it wants to determine what data it has the right to monitor and capture from its employees.
Question 30 options:
1) Privacy
2) Accuracy
3) Accessibility
4) Perfection
5) Property
Question 31 (2 points)
Today's managers must ensure that information about their employees and customers is only available to those who have a right to see it and use it, an issue referred to as:
Question 31 options:
1) Screening
2) Accuracy
3) Accessibility
4) Perfection
5) Property
Question 32 (2 points)
A manager who primarily focuses on the shareholders of the corporation rather than all of the vested parties in the businesses operations and activities is practicing which theory of normative business ethics?
Question 32 options:
1) Stakeholder theory
2) Investor theory
3) Stockholder theory
4) Shareholder theory
5) Social contract theory
Question 33 (2 points)
Saved
This theory of normative business ethics seeks to create value for people in a manner that is just and nondiscriminatory.
Question 33 options:
1) Stakeholder theory
2) Investor theory
3) Social contract theory
4) Shareholder theory
5) Stockholder theory
Question 34 (2 points)
Information privacy guidelines should come from what level in a company?
Question 34 options:
1) CEO and top-level executives
2) Middle management
3) Employees
4) Federal regulations
5) State laws
Question 35 (2 points)
This act of 1996 is designed to safeguard the electronic exchange of patient records in the health care industry.
Question 35 options:
1) SOX
2) HIPAA
3) IETF
4) COBIT
5) PAPA
Question 36 (2 points)
The European Union relies on a government data protection agency and specific privacy protection standards outlined in the ___________.
Question 36 options:
1) Safe Harbor Framework
2) PAPA Principles
3) Directive on Data Protection
4) HIPPA
5) SOX Act
Question 37 (2 points)
An Internet web site that wishes to abide by fair privacy practices will do all of the following EXCEPT:
Question 37 options:
1) Allow the consumer the choice to participate in the site or not
2) Post policies about how personal information gathered from consumers will be used
3) Afford the consumer the opportunity to view and contest the accuracy of the data collected
4) Secure collected consumer information
5) All of the above
Question 38 (2 points)
Target found out a teenager was pregnant by (1) ________ and revealed that fact to her dad by (2) _______
Question 38 options:
1) (1) Overhearing the teen in the store; (2) Calling her dad
2) (1) Her purchases of diapers; (2) sending an official letter to the dad
3) (1) Her purchases of unscented soap, cotton balls and vitamins; (2) mailing her some ads for diapers and maternity clothe
4) (1) Her sudden elation when visiting the children's department; (2) sending a video of her tears of happiness in that department
5) None of the above
Question 39 (2 points)
The question "What information does a person or an organization have a right or a privilege to obtain?" is part of this ethical issue.
Question 39 options:
1) Privacy
2) Accuracy
3) Accessibility
4) Perfection
5) Property
Question 40 (2 points)
What principles, developed in 2000 by the US Department of Commerce (DOC) in consultation with the European Commission, allow U.S. companies to be placed on a list maintained by the DOC?
Question 40 options:
1) Safe Harbor framework
2) Approved Business framework
3) PAPA framework
4) Property Harbor framework
5) Safe Business framework
Question 41 (20 points)
What is the difference between tacit and explicit knowledge? From your own experience, describe an example of each. How might an organization manage tacit knowledge?
Tacit knowledge is personal, context specific, and hard to formalize and communicate. Many times, a person does not know even know that he has some specific tacit knowledge. It consists of experiences, beliefs, and skills. It is carried in mind and difficult to be transferred to others. Tacit knowledge is entirely subjective and is often acquired through physically practicing a skill or activity (Pearlson et. al., 2019). For example, ability to swim, throw a baseball, or ride a bicycle is are tacit knowledge as this knowledge cannot be taught or transferred through written words or by speaking.
On the other hand, explicit knowledge is gained with the help of written documents such as books, financial reports, and encyclopedia. Explicit knowledge is objective, theoretical, and can be easily codified for storing or transmission in a formal, systematic method using grammar, syntax, and the printed word (Pearlson et. al., 2019). For example, a mathematical formula, or calculation of financial ratio are explicit knowledge.
An organization can manage tacit knowledge by converting it to explicit knowledge, and then apply methods of managing explicit knowledge on it. An organization can manage tacit knowledge explicitly, by getting each individual to make their tacit knowledge explicit, and then store that knowledge. The process of knowledge conversion to convert tacit knowledge to explicit knowledge is called Externalization. Externalization refers to articulating and thereby capturing tacit knowledge through use of metaphors, analogies, and models. Once tacit knowledge is converted to explicit knowledge it is codified. Knowledge codification is the representation of knowledge in a manner that can be easily accessed and transferred (Pearlson et. al., 2019). Next, knowledge is transferred from one group to other group or individual, and absorbed. Organizations facilitate discussions and interactions as a means of transferring knowledge. Organizations use knowledge management (KM) to create, store, and reuse organizational knowledge.
References
Pearlson, K. E., Saunders, C. S. & Galletta, D. F. (2019). Managing and Using Information Systems: A Strategic Approach. (6th ed.). John Wiley & Sons.