060010205-IT For Management 2013 - UTU | Uka Tarsadia...

44
060010205-IT For Management 2013 Ms. Trupti Rathod Page 1 Unit 1: IT in the Organization SHORT QUESTIONS: 1. Define digital enterprise. 2. What is digital economy? 3. Write three different names for digital economy. 4. What is networked computing? 5. What is another name for distributed computing? 6. Define Information Technology. 7. What are the five major facilitators of business objectives for information technology? 8. Define business model. 9. What is Ethics? 10. What are the varieties of factors for business environment? 11. Define Information System. 12. Define Formal Systems. 13. What is CBIS? 14. What is Information Technology? 15. What is an application program? 16. Define departmental information system. 17. What is human resource information system? 18. Define data items. 19. What is information? 20. Define Knowledge. 21. What do you mean by personal information management? 22. Give one example of TPS. 23. What is MIS? 24. Define Business Processes. 25. Define Interorganizational information system? 26. What do you mean by operational activities? 27. Define Knowledge workers. 28. Who are referred as data workers? 29. Which workers are the major users of Intranets and the Internet for business purposes? LONG QUESTIONS: 1. Define digital economy. What are the major IT characteristics in the digital economy? 2. Give the diagrammatic presentation of business processes, organizational performance and responses, and IT support. 3. What are the major impacts of the business environment factors? 4. Discuss the motivation for becoming e-business.

Transcript of 060010205-IT For Management 2013 - UTU | Uka Tarsadia...

060010205-IT For Management 2013

Ms. Trupti Rathod Page 1

Unit 1: IT in the OrganizationSHORT QUESTIONS:1. Define digital enterprise.2. What is digital economy?3. Write three different names for digital economy.4. What is networked computing?5. What is another name for distributed computing?6. Define Information Technology.7. What are the five major facilitators of business objectives for information technology?8. Define business model.9. What is Ethics?10. What are the varieties of factors for business environment?11. Define Information System.12. Define Formal Systems.13. What is CBIS?14. What is Information Technology?15. What is an application program?16. Define departmental information system.17. What is human resource information system?18. Define data items.19. What is information?20. Define Knowledge.21. What do you mean by personal information management?22. Give one example of TPS.23. What is MIS?24. Define Business Processes.25. Define Interorganizational information system?26. What do you mean by operational activities?27. Define Knowledge workers.28. Who are referred as data workers?29. Which workers are the major users of Intranets and the Internet for business purposes?LONG QUESTIONS:1. Define digital economy. What are the major IT characteristics in the digital economy?2. Give the diagrammatic presentation of business processes, organizational

performance and responses, and IT support.3. What are the major impacts of the business environment factors?4. Discuss the motivation for becoming e-business.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 2

5. Explain in brief the business environment impact model.6. Why is wireless mobility perceived as being able to increase EC(E-Commerce)

application?7. What are the ethical issues of business environmental pressures?8. What are the major business pressures in business environments?9. Explain in brief the New vs. Old Economy giving examples.10. Explain in brief schematic view of Information System.11. Explain in brief who performs what activities in organizations and how are they

supported by IT.12. What are the different levels of information system classified by organizational

Levels. Explain in brief any two of them.13. Define IS. Explain in brief the classification of information systems.14. Discuss how IT supports people and organizational activities?15. Describe how business architecture, IT architecture and information infrastructure areInterrelated?16. Explain in brief Functional and Management Information System.17. Draw the schematic view of the information systems support of people in

Organization.18. Draw the diagram showing departmental, enterprise and Interorganizational

Information system.19. Explain in brief how information systems support people in organizations with the help

of diagram.20. Explain in brief the different organizational activities.

FILL IN THE BLANKS:1. The term refers to an organization such as IHH which uses computers and

information system to perform all or most of the digitized activities.2. The refers to an economy that is based on digital technologies.3. The term also refers to the convergence of computing and

communication technologies on the Internet and other networks.4. The infrastructure for digital organizations and EC is .5. has become the major facilitator of business activities in the

World.6. A is a method of doing business by which a company can generate revenue

060010205-IT For Management 2013

Ms. Trupti Rathod Page 3

to sustain itself.7. The use of information technology raises many issues.8. A/An collects, processes, stores, analyzes, and disseminates

Information for a specific purpose.9. system include agreed upon procedures, standard inputs and outputs

and fixed definitions.10. An ____________ is a computer program designed to support a specific task

or business processes.11. _______________ refers to an elementary description of things, events,

activities and transactions that are recorded, classified, and stored, but notorganized to convey any specific meaning.

12. IOSs that connect companies located in two or more countries are referred toas____________________.

13. Middle managers make __________ decision.14. ___________ workers are the major users of intranets and the Internet for

business purpose.15. The ______________ is an open environment for managing and delivering Web

applications.16. An _____________ is a network of interactions and relationships over which

information, products and services, and payments are exchanged.17. Web accessed electronic markets are rapidly emerging as a vehicle for conducting

____________.18. Electronic markets having many buyers and many sellers are known as_______.19. Clerical workers are known as ______________.20. The collection of application programs in a single department is usually considered as

_____________.

TRUE OR FALSE :1. Digital enterprise refers to an economy that is based on digital technologies.2. Digital enterprise refers to the convergence of computing and communication

technologies on the Internet and other networks.3. The collection of computing systems used by an organization is termed as IT.4. Companies need to react frequently and quickly to both the problems and the

opportunities resulting from the new technologies.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 4

5. Clerical workers can also be known as data workers.6. Operational activities are also called tactical activities.7. PIM stands for private information systems.8. Knowledge workers are the major users of intranet and extranet.9. The business environment consists of variety of factors like technology, legal,

political, and economic.10. Ethics relates to standards of right and wrong in information process practices.11. CBIS is an IS that uses computer technology to perform some or all of its

intended tasks.12. Informal system includes agreed upon procedures.13. The collection of application programs in the human resources area is known as the

human resource information system.14. Companies does not react frequently to the problems.15. Information is data that is organized and have some meaning.16. Payroll system is an example of TPS.17. Strategic activities are decisions that deal with situations that may significantly

change the manner in which business is done.18. The use of IT raises many ethical issues.19. Data workers are the major users of Internets and intranets.20. Strategic managers make tactical decisions.

MULTIPLE CHOICE QUESTIONS :1. Which of the following refers to an organization which uses computers and

information system to perform all or most of its digitized activities?a. Digital enterpriseb. Digital economyc. Digital economicsd. Digitalized enterprise

2.Which of the following characteristics is for global communication and collaboration inmarketplace?

a. Digitizationb. Business modelsc. Globalizationd. Innovation.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 5

3. Which of the following refers to an economy that is based on digital technologies?a. Digital enterpriseb. Digital economyc. Digital economicsd. Digitalized enterprise

4. Which of the following refers to the convergence of computing and communicationtechnologies on the Internet?

a. Digital enterprise.b. Business model.c. Digital economicsd. Digitalized enterprise

5. Which of the following is a method of doing business by which a computer cangenerate revenue to sustain itself?

a. Business modelb. IT architecture.c. IT infrastructure.d. Digital economy.

6. Which of the following does not comes under the business environment?a. Societalb. Legalc. Politicald. Social

7. Which of the following collects, processes, stores, analyzes and disseminateInformation for a specific purpose?

a. ISb. CBISc. Formal ISd. Informal IS

8. Which of the following includes agreed-upon procedures, standard inputs andOutputs and fixed definition?

a. Formal ISb. Informal ISc. CBIS

060010205-IT For Management 2013

Ms. Trupti Rathod Page 6

d. IS9. Which of the following is a computer program designed to support a specific task

Or a business process?e. Application programf. Applicationg. ISh. Departmental IS

10. Which of the following is not a factor of business environment?a. Societal.b. Legal.c. Technologicald. Physical.

11. Which of the following refers to an elementary description of things, events,Activities, and transactions that are recorded, classified and stored but notOrganized to provide a specific meaning?

a. Datab. Useful Data.c. Informationd. Knowledge

12. PIM stands fora. Personal information management.b. Personal Interactive model.c. Personal information model.d. Personal information manager.

13. The Systems that supports managers are referred to asa. MISb. TPSc. DSSd. ESS

14. IOSs that connect companies located in two or more countries are referred to asa. GISb. TPSc. MISd. ESS

060010205-IT For Management 2013

Ms. Trupti Rathod Page 7

15. Which level of managers make tactical decisions and are supported mainly byFunctional information systems and MIS in the areas where they work?

a. Middle managers.b. Lower level managers.c. Senior managers.d. Operational managers.

16. Which of the following workers are major users of intranet and the Internet?a. Knowledge workersb. Data workersc. Clerical workers.d. Knowledge and data workers.

17. Among clerical workers, those who use, manipulate, or disseminate information arereferred to as

a. Data workers.b. Data guardsc. Knowledge workers.d. Clerical workers.

18. A form of e-market isa. Electronic exchangesb. Electronic businessc. Electronic commerced. Exchanges.

19. Among the following who should react frequently and quickly to both the problems andthe opportunities resulting from new business environment?

a. Companiesb. Organizations.c. Workers.d. Managers.

Unit 2:- IT InfrastructureSHORT QUESTIONS:1. Define database.2. What is centralized database?

060010205-IT For Management 2013

Ms. Trupti Rathod Page 8

3. What do you mean by distributed data?4. What is replicated database?5. Define data model.6. What do you mean by DML and SQL?7. Define data dictionary.8. Define metadata.9. What do you mean by schema?10. What is DBMS?11. Define data warehouse.12. What are the two basic options for conducting analytical processing?13. Define data mart.14. Which are the two major types of data marts?15. Define standalone data mart.16. What are multidimensional databases?17. What do you mean by clickstream data?18. Give other name of clickstream data.19. What do you mean by TCP and UDP?20. What is packet technology?21. Define intranet.22. Define Extranet. Define portal.23. List any three different types of portal.24. Define communication.25. What are the three communication modes on the web?26. Define SIP.

LONG QUESTIONS:1. What are the advantages and capabilities of DBMS? Explain each one of them

in brief.2. What are the different types of database? Write two sentences for each one of them

and also show the diagrammatic representation of centralized database anddistributed database.

3. Define data warehouse. Draw diagram of data warehouse framework and views Alsolist out different areas of an organization benefited from an enterprise datawarehouse.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 9

4. Explain in brief the characteristics of a data warehouse.5. Explain in brief how a data warehouse is build?6. Define data mart. Which are the two major types of data mart define them.

Explain in short operational data store and multidimensional databases.7. Define marketing database and marketing transaction database. What are the

capabilities of MTD? Give one example of its implementation.8. Explain with the help of a diagram how web-based data management systems

have multiple components consisting of structured and unstructured data.9. Define SIP. What are the three major categories that support Internet

Applications.10. Define portal. Explain any six portals in brief.11. Define communication. Which are the major factors determining the IT

technologies that could be used to provide communication support to aspecific organization or a group of users. Explain each one of them in brief.

12. Explain in brief Time/Place framework.13. Case Study: Unraveling the Jargon

The consultant’s reply was: “In my investigation of your applications portfolios, I’veapplied … to the logical data structures and have discovered a very high frequency –approximately 93.286% - of data embedded in application program logic which islargely responsible for the integrity and synchronization problem currently beingencountered. As a solution, I would recommend the design of a master database eachof which would employ relational technology to reduce the database to third normalform. This would eliminate the possibility of semantic disintegrity upon querying thedatabase.”With reference to the above given case study According to you explain in brief whatthe consultant is trying to say?

14. Justify the use of technical jargon for the above given case study.

FILL IN THE BLANKS:1. A ________ is an organized logical grouping of related files.2. A ______ has all related files in one physical location.3. A________has complete copies the entire database in many locations.4. The _________ deals with the actual physical arrangement and location of data

in the direct access storage.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 10

5. The _______ defines the way data are conceptually structured.6. _______ is the most popular relational database language.7. ___________ is information about information.8. A ___________ is a repository of data that are organized to be readily

acceptable for any analytical processing.9. A __________ data store is a database for transaction processing systems that

uses data warehouse concepts to provide clean data.10. _______ data occurs inside the Web environment, when customers visit a

website.11. The ______ protocol provides a reliable, connection oriented method of packet

delivery.12. _____ technologies convert voice, video, and data into packets that can be

transmitted together over a single high speed network.13. High speed networks are more commonly called as ___________________.14. ______________ is an internationally accepted standard for digital cellular

communication.15. __________ standardizes the signaling of calls or communications between

different types of devices.16. _________ is a network designed to serve the informational needs of the

company.17. An _____ is a private network that uses Internet technology to communicate

with vendors and suppliers.18. A ____________ is a Web based personalized gateway to information and

knowledge in network computing.19. Yahoo and MSN is an example of _______ portal.20. Vertical portal are also called as_________.

TRUE OR FALSE:1. A centralized database has complete copies of a database, or portions of a

Database in more than one location.2. A database is an organized logical grouping of related files.3. The program that provides access to a database is known as DBMS.4. The physical view of a database program represents data in a format that is

meaningful to a user.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 11

5. The metadata stores definitions of data elements and data characteristics.6. The DML is a third-or-fourth generation language to manipulate the data in the

database.7. A data warehouse is a repository of data that are organized to be readily

acceptable for analytical processing activities.8. Consistency is not achieved in data warehouse.9. A data mart is a small warehouse designed for a strategic business unit.10. SBU stands for strategic business department.11. Operational data store are specialized data stores that organize facts by

dimensions such as geographic location etc.12. Web log occurs inside the web environment when customers visit the website.13. Video streams are compressed and sent as IP packets using UDP. This

combination is known as UDP/IP model.14. Packet technologies cannot convert voice, video and data into packets that can

be transmitted over a single, high speed network.15. GSM standardizes the signaling of calls or communications between different

types of devices from different vendors.16. Decision portals are gateway to general information on the Internet.17. Voice portals are web portals with audio interfaces that make them accessible

via a standard cell phone.18. Vertical portals are also called as vortals.19. Communication is an interpersonal process of sending and receiving symbols

with messages attached to them.20. On the web there is only one mode of communication.

MULTIPLE CHOICE QUESTIONS:1. Which of the following has all the related files in one physical location?

a. Centralized database.b. Distributed database.c. Replicated database.d. Partitioned database.

2. Which of the following has complete copies of the entire database in manylocations, primarily to alleviate the single point of any failure?

a. Centralized database.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 12

b. Distributed database.c. Replicated database.d. Partitioned database.

3. Which of the following is not an advantage of a DBMS?a. Persistence.b. Security.c. Computation.d. Non concurrency.

4. Which of the following deals with the actual physical arrangement and location ofdata in the direct access storage devices?

a. View.b. Physical view.c. Logical view.d. Non logical view.

5. Which of the following defines the way data are conceptually structured?a. Data model.b. DDL.c. DML.d. Data dictionary.

6. Which of the following is used to manipulate the data in the database?a. DDL.b. DML.c. Data dictionary.d. Data model.

7. Which of the following stores definitions of data elements and data characteristicssuch as usage, physical representation, ownership, authorization and security?

a. Data dictionary.b. Data model.c. Metadata.d. SQL.

8. Which of the following is a repository of data that are organized to be readilyacceptable for analytical processing activities?

a. Database.b. DBMS.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 13

c. Data warehouse.d. Data mart.

9. Which of the following is a small warehouse designed for strategic business unit ora department?

a. Database.b. DBMS.c. Data warehouse.d. Data mart.

10. Which of the following is a database for transaction processing systems that usesdata warehouse concepts to provide clean data?

a. Operational data store.b. Multidimensional database.c. Dependent data mart.d. Standalone data mart.

11. Which of the following is easier to work with a small subset of the data warehouse?a. Replicated data mart.b. Dependent data mart.c. Standalone data mart.d. Multidimensional data mart.

12. Which of the following occurs inside the Web environment, when customers visit aWeb site?

a. Clickstream data.b. Web logs.c. Web based data management.d. Clickstream data warehouse.

13. Which of the following provides a reliable, connection oriented method of packetdelivery?

a. UDP.b. IPc. TCP.d. UDP/IP.

14. Which of the following is an internationally accepted standard for digital cellularcommunication originating in Europe?

a. GSM.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 14

b. CDMA.c. SIP.d. Wi-Fi.

15. Which of the following is a network that uses Internet technology and the publictelecommunication system to securely share part of a business’s information withsuppliers and vendors?

a. Internet.b. Extranet.c. Intranet.d. Private network.

16. Which of the following is a web-based personalized gateway to information andknowledge in network computing?

a. Portal.b. Information portal.c. Network.d. Internet.

17. Which of the following provide team members with models they can use toevaluate decision criteria, objectives, and alternatives from their desktops?

a. Decision portal.b. Commercial portal.c. Mobile portal.d. Voice portal.

18. Which of the following are also known as vortals?a. Mobile portal.b. Commercial portal.c. Voice portal.d. Enterprise portal.

19. Which of the following is an interpersonal process of sending and receiving symbolswith messages attached to them?

a. Communication.b. Internet.c. Messaging.d. Portal.

20. Which of the following is not a mode of communication?

060010205-IT For Management 2013

Ms. Trupti Rathod Page 15

a. People-to-people.b. People-to-machine.c. People and machine-to-machine.d. Machine-to-people.

Unit 3: Organizational ApplicationsSHORT QUESTIONS:1. List out the four characteristics of functional information system.2. Define TPS.3. What is the primary goal of TPS?4. Which are the two basic ways in which system processes data?5. What is batch processing?6. Define OLTP.7. What is POM?8. What is vendor-managed inventory?9. What is JIT systems?10. Define CIM.11. Write any two advantages of cannel driven.12. Define capital budgeting.13. What is XBRL?14. What is the major purpose of auditing?15. What do you mean by channel systems?16. Define recruitment.17. What is referred as financial value chain management?18. Define expense management automation.19. Define ERP.20. What is SCM?21. Define e-supply chain.22. What is the major objective of ERP?23. Define CRM.24. What are the three levels of e-CRM?

LONG QUESTIONS:

060010205-IT For Management 2013

Ms. Trupti Rathod Page 16

1. What is functional information system? Explain in brief the characteristics offunctional information systems.

2. Define TPS. Explain in brief the major characteristics of TPS.3. What are the two methods of TPS? Define them. Draw the diagram showing the flow

of information in transaction processing.4. Define POM. Explain in brief inventory management.5. Define project. Explain in brief project management and computer integrated

manufacturing.6. Define channel systems. What are the channel driven advantages? Explain in short

mass customization.7. Explain in short budgeting and capital budgeting.8. Explain in brief control and auditing.9. Define recruitment. Explain in brief human resources maintenance and

development.10. Define ERP. What are the capabilities of ERP?11. Define CRM. Explain in brief e-CRM. What are the major issues related to CRM

failures?12. Explain in brief the benefits of ERP.13. Explain in brief the benefits of SCM.14. Case Study : Ten Guidelines for Strategic MIS Planning

Robert V. Head, a consultant on MIS planning, provided ten guidelines to help MISexecutives who are on the threshold of experimenting with strategic MIS planning: 1.Make provisions in the systems plan for taking small steps rapidly. “Don’t have a planwith goals extending so far into the future that there is no way of tracking it.” 2.Develop alternative plans when significant contradictory trends are discerned inbusiness objectives or technology. 3. Interface the systems plan with the corporateplan, modifying both appropriately. 4. Document the systems plan in a formatintelligible to top management and arrange for personal presentation. 5. Establish aformal mechanism for review and reiteration of the systems plan. 6. Develop a systemfor tabulating and forecasting utilization of installed data processing (DP) equipment.7. Fix the organizational responsibility for systems planning. 8. Rotate the assignmentof technical personnel to the planning staff in order to avoid an “ivory tower aura.” 9.Budget for research and development. 10. Set up a comparative systems intelligenceactivity.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 17

With reference to the above given case study answer the following:What can be the drawback of having a formal system as mentioned in point 5?

15. With reference to the case study in question no 14. Can transparency makeorganizational responsibility more effective?

FILL IN THE BLANKS:1. The _____________ monitors, collects, stores, processes and disseminates

Information for all routine core business transactions.2. The goal of ______is to provide all the information needed by law and by

Organizational policies to keep the business running.3. In _________ processing, data are processes as soon as a transaction occurs,

Possibly even in real time.4. In _______, transactions are processed as soon as they occur.5. The_______ function in an organization is responsible for the processes that

transforms inputs into outputs.6. _________ management determines how much inventory to keep.7. When to order and how much to order is the work of___________________.8. Strategies in which the supplier monitors inventory levels and replenishes

when needed is called____________.9. A__________ is usually a one time effort composed of many interrelated

activities costing a substantial amount of money.10. Quality control is an approach that attempts to minimize waste of all kinds

of space, labor, materials, energy and so on.11. __________ is a concept or philosophy that promotes the integration of various

computerized factory systems.12. ___________ are all the systems involved in the process of getting a product

or service to customers and dealing with all customer’s needs.13. The _________________ functional area is to manage money flows into, within, and

out of the organizations.14. ________budgeting is the financing asset acquisitions, including the disposal of major

organizational assets.15. _______ is a programming language and an international standard for electronic

transmission of business and financial information.16. _______ refers to systems that automate data entry and processing of travel and

060010205-IT For Management 2013

Ms. Trupti Rathod Page 18

entertainment expense.17. ____________ refers to integration solution designed, developed and managed from

a business process perspective instead of technical perspective.18. ________ is composed of materials acquisition, movement and storage

activities.19. The change from the linear supply chain to a hub model points to the need to

create ____________teams.20. ______ major objective is to integrate all departments and functional

information flows across a company onto a single computer system thatserves an enterprise’s needs.

TRUE OR FALSE:1. TPS is not a major part for running the business.2. In batch processing data are processed as soon as the transaction occurs.3. POM are is very diversified and supporting information systems compared to

Others.4. EOQ is one of the inventory model.5. Reducing inventories and managing them properly is a major objective of SCM.6. PERT and CPM are the enhanced computerized project management tools.7. One of the goal of CIM is the simplification of all manufacturing technologies

and techniques.8. Transaction speed cannot be achieved by using channel systems.9. Annual budgeting allocates the financial resources of an organization among

participants and activities.10. Budget preparation may involve both top down and bottom up processes, modelling

capabilities.11. The major purpose of auditing is not to ensure the accuracy and condition of the

financial health of an organization.12. Companies need to analyze the risk of doing business with partners or in other

countries.13. Recruitment is finding employees, testing them, and deciding which ones to hire.14. Enterprise systems are also called as enterprise wide systems.15. An ERP is defined as a set of relationships among suppliers, manufacturer’s,

distributors and retailers that facilitate the transformation of raw materials

060010205-IT For Management 2013

Ms. Trupti Rathod Page 19

into final product.16. CFNs does not require coordination among the multiple participating firms at

different stages of the supply chain.17. E-procurement is the use of Internet technologies to purchase or provide goods

and services.18. A virtual factory is an individual enterprise application that provides a

computerized model of a factory.19. Customer touching applications does not exists in CRM.20. Value added services is one of the level of e-CRM.

MULTIPLE CHOICE QUESTIONS:1. Which of the following monitors, collects, stores, processes and disseminates

information for all routine core business transactions?a. TPS.b. MIS.c. DSS.d. ESS.

2. Which of the following is used to provide all the information needed by law and byorganizational policies to keep the business running properly and efficiently?

a. MIS.b. TPS.c. DSSd. ESS.

3. In which of the following, the firm collects data from transactions as they occur, andstores them?

a. Online processing.b. Batch processing.c. OLTP.d. Real time processing.

4. In which of the following transactions are processed as soon as they occur?a. Online processing.b. Batch processing.c. OLTP.d. Real time processing.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 20

5. In which of the following strategy, the supplier monitors inventory levels andreplenishes when needed?

a. Inventory management.b. Inventory control.c. Vendor-managed inventory.d. Inventory decision control.

6. Which of the following is usually a one-time effort composed of many interrelatedactivities, costing a substantial amount of money, and lasting for weeks and years?

a. Inventory.b. Inventory management.c. Project.d. Project management.

7. Which of the following is a concept or philosophy that promotes the integration ofvarious computerized factory systems?

a. CIMb. Inventory.c. Projectd. Channel systems.

8. Which of the following is the best-known part of financial planning, which allocatesthe financial resources of an organization?

a. Budgeting.b. Capital budgeting.c. Financial budgeting.d. Auditing.

9. Which of the following is the financing of asset acquisitions, including the disposalof major organizational assets?

a. Budgeting.b. Capital budgeting.c. Financial budgeting.d. Auditing.

10. Which of the following functional area is to manage money flows into, within andout of the organization?

a. POM.b. Accounting and finance.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 21

c. Human resource.d. Marketing.

11. Which of the following is a programming language and an international standardfor electronic transmission of business and financial information?

a. SQL.b. PL/SQL.c. XML.d. XBRL.

12. Which of the following area of analysis is becoming more popular now a days?a. FVCM.b. Budget allocation.c. Auditing.d. Risk analysis.

13. Which of the following is used to ensure the accuracy and condition of the financialhealth of an organization?

a. Budgeting.b. Auditing.c. Risk analysis.d. FVCM.

14. Which of the following refers to systems that automate data entry and processingof travel and entertainment expense?

a. EMA.b. CIM.c. FVCM.d. Risk analysis.

15. Which of the following is used for finding employees, testing them, and decidingwhich ones to hire?

a. Recruitment.b. EMA.c. CIM.d. HRM.

16. Which of the following refers to integration solution designed, developed, andmanaged from a business process perspective, instead of from a technical ormiddleware perspective?

060010205-IT For Management 2013

Ms. Trupti Rathod Page 22

a. Process-centric integration.b. ERM.c. HRM.d. Risk analysis.

17. Which of the following are systems or processes that involve the entire enterpriseor major portions of it?

a. Enterprise systems.b. Enterprise wide systems.c. Supply chain.d. CRM.

18. Which of the following is an enterprise wide effort to acquire and retain profitablecustomers?

a. SCM.b. CRM.c. ERP.d. HRM.

19. Which of the following is not a level of e-CRM?a. Foundational services.b. Customer centered services.c. Value added services.d. Process centric integration.

20. Which of the following is used to integrate all departments and functionalinformation flows across a company onto a single computer system that can serveall of the enterprise’s needs?

a. ERP.b. SCM.c. CRM.d. ESS.

Unit 4: The Web RevolutionSHORT QUESTIONS:1. Define e-commerce.2. Define e-business.3. What do you mean by virtual organizations?

060010205-IT For Management 2013

Ms. Trupti Rathod Page 23

4. What is referred as brick-and-mortar organization?5. Define click-and-mortar organization.6. List any four types of e-commerce.7. Define e-market.8. What do you mean by e-catalogs?9. Define auction.10. What is forward auction?11. Define e-tailing.12. Define electronic storefronts.13. What do you mean by electronic mail?14. What is cyber banking?15. What are the phases in the customer service life cycle?16. What do you mean by sell-side marketplace?17. What do you mean by public exchanges?18. Define collaborative commerce.19. Define e-government.20. Which are the three categories of e-government applications?21. Define m-commerce.22. Define Bluetooth.23. Define GPS.

LONG QUESTIONS:1. Define e-commerce. What are the common types of e-commerce transactions?

Explain in brief each one of them.2. Write four benefits of e-commerce to customers, to organizations and to the security.3. Write six limitations of e-commerce for technological and six limitations of non-

technological.4. Explain in brief the major EC mechanisms.5. Explain in brief B2C applications.6. Explain in brief B2B applications.7. Explain in brief major models of e- business.8. Explain in brief collaborative commerce and e-government.9. Define C2C e-commerce. Explain in brief the best known c2c activities.10. Explain in brief the five value added attributes that drive the development of m-

060010205-IT For Management 2013

Ms. Trupti Rathod Page 24

commerce.11. Explain in brief the drivers of mobile computing.12. Case Study: IT in the Construction Industry

Many people think that the most widely used tool in a construction project is thehammer, but it’s probably a filing cabinet or fax machine. The $ 3.4 trillion USconstruction industry is highly paper intensive. A complex project such as a largebuilding requires the coordination of many different groups and hundreds ofarchitectural drawings and design documents, which can change daily. Costly delaysbecause of misplaced documents could make or break a company in an industry withrazor-thin profit margins of 1 to 2 percent.

Web technology is starting to address this problem. New web-based constructionproject management systems enable project managers to exchange documents andwork online wherever they are using web browser software. Auto Desk BuildingCorporation Services, for example, offers customers a shared central space whereproject managers can exchange documents with engineers and architects, trackscheduling and performance, and hold online meetings.Answer the following question:What are the management benefits of using web-based construction managementsoftware?

13. With reference to the case study in question no 12. How can the systems asmentioned be used to share knowledge and experiences for better management ofprojects and tasks at hand?

14. What problems might be associated with such web-based systems? How can thoseproblems be tackled in context to the case study in question no 12?FILL IN THE BLANKS:

1. ______________ describes the process of buying, selling, transferring, serving,Or exchanging products, services, or information via computer network.

2. Pure physical organizations are referred to as________________.3. ____________ organizations are those that conduct some e- commerce activities, yet

their primary business is done in the physical world.4. Companies that are engaged only in EC are considered _______ organizations.5. An ______ is a virtual marketplace in which sellers and buyers meet and

conduct different types of transactions.6. An ______ is a competitive process in which either a seller solicits bids from

060010205-IT For Management 2013

Ms. Trupti Rathod Page 25

buyers or vice-a-versa.7. __________ auctions are auctions that sellers use as a selling channel to many

potential buyers.8. ___________ is the direct sale of products and services through electronic

storefronts or e-malls.9. ___________ includes various banking activities conducted from home, a

business, or on the road instead at a physical bank location.10. In the _____________ model, organizations attempt to sell their products or

services to other organizations electronically.11. Purchasing by electronic support is known as __________.12. _______________ refers to the use of digital technologies that enable

companies to collaboratively plan, design, develop EC applications.13. _____________ is the use of Internet technology and e-commerce to deliver

information and public services to citizens.14. ___________ refers to e-commerce in which both the buyers and seller are

individual.15. Mobile commerce is also known as _____________.16. Mobility and ________ are the major characteristics of m-commerce.17. A___________ is a kind of WLAN that people have at their home or small offices.18. __________ is a built in security which encrypts the communication between

a client machine and a wireless access point.19. Cost and _________ is a major barrier to Wi-Fi.20. ____________ purchasing is not suitable for indirect maintenance, replacement

and operations.

TRUE OR FALSE:1. E-commerce refers to a broader definition of EB.2. In B2B transactions both the sellers and the buyers are business organizations.3. The degree of digitization can relate only to the product and the process.4. In reverse auctions, there is pone buyer, usually an organization that wants to

buy a product or a service.5. There is only one kind of e-auction.6. Electronic bartering is related to auctions.7. An e- mall can also be known as cybermall.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 26

8. There is only one type of e-mall.9. International and multiple currency banking is an example of cyber banking.10. Retirement helps the client dispose of a service or product in context of the

customer service phase.11. E-procurement uses forward auctions.12. E- marketplaces in which sellers and buyers and where entry is open to all

is also termed as private exchanges.13. E-government enables the government to be more transparent to business and

citizens.14. G2G is an application of e-government applications.15. Cost and efficiency is the barrier to the commercial growth of Wi-Fi.16. WEP stands for wireless electronic protocol.17. M-commerce does not use Internet connection.18. In mobile computing people cannot be reached at any time.19. Personal services are the activities of C2C auctions.20. C-Commerce activities are different from selling and buying of the products.

MULTIPLE CHOICE QUESTIONS:1. Which of the following describes the process of buying, selling, transferring, serving or

exchanging products, services, or information via computer networks?a. E-commerce.b. E-business.c. C-commerce.d. M-commerce.

2. Companies that are engaged only in EC are considered asa. Virtual organizations.b. Pure-play organizations.c. Physical organizations.d. Click-and-mortar organization.

3. Purely physical organizations are referred to asa. Brick-and-mortar organizations.b. Click-and-mortar organizations.c. Virtual organizations.d. Partial organizations.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 27

4. Which of the following is not a common type of e-commerce transactions?a. B2B.b. B2C.c. C2B.d. G2C2B.

5. Which of the following is a virtual marketplace in which sellers and buyers meet and conductdifferent types of transactions?

a. E-market.b. E-commerce.c. E-business.d. C-commerce.

6. Which of the following is a competitive process in which either a seller solicits bids from buyersand vice-a-versa?

a. Auction.b. E-transaction.c. M-transaction.d. E-marketing.

7. Which of the following has two types of auctions?a. E-auction.b. Forward auction.c. Reverse auction.d. Logistics.

8. Related to auction isa. E-bartering.b. E-marketing.c. E-commerce.d. E-auction.

9. Which of the following is a direct sale of product and services through electronic storefronts or e-malls?

a. E-tailing.b. E-storefront.c. E-mall.d. E-commerce.

10. Which of the following is known as e-mall?

060010205-IT For Management 2013

Ms. Trupti Rathod Page 28

a. E-tailing.b. E-storefront.c. Cybermall.d. Referral mall.

11. In which of the following marketplace model, organizations attempt to sell their products orservices to other organizations electronically from their own private e-marketplace from a thirdparty side?

a. Sell-side.b. Seller-side.c. Buy-side.d. Buyer-side.

12. Which type of auction is used by e-procurement?a. E-auction.b. Reverse auction.c. Forward auction.d. Reverse e-auction.

13. Group purchasing and desktop purchasing comes undera. E-tailing.b. E-market.c. E-procurement.d. E-auction.

14. E-markets in which there are many sellers and buyers and where the entry is open to all is knownas

a. E-commerce.b. E-tailing.c. Public exchanges.d. Private exchanges.

15. Which of the following is not a basic type of exchange?a. Vertical distribution for direct materials.b. Vertical distribution for indirect material.c. Functional exchanges.d. Technical exchanges.

16. Which of the following refers to the use of digital technologies that enable companiesto collaboratively plan, design, develop, manage, and research products and services

060010205-IT For Management 2013

Ms. Trupti Rathod Page 29

and EC applications?a. C-commerce.b. E-commerce.c. E-business.d. E-market.

17. Which of the following refers to e-commerce in which buyers and sellers areindividuals not business?

a. C2C.b. B2B.c. B2Cd. C2B.

18. Which of the following is basically any e-commerce or e-business done in a wirelessenvironment, especially via the Internet?

a. M-commerce.b. C-commerce.c. E-market.d. E-tailing.

19. Which of the following encrypts the communications between a client machine and awireless access point?

a. WEP.b. WLAN.c. WPAN.d. LAN.

20. In which of the following mobile computing, people can be reached at any time?a. Mobility.b. Mobile revolution.c. WPAN.d. Broad reach.

Unit 5: Managerial and Decision Support SystemsSHORT QUESTIONS:1. Define management.2. Define decision.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 30

3. What do you mean by complexity of decision?4. Define DSS.5. Define sensitivity analysis.6. List the components of DSS.7. Define GDSS.8. Define EIS.9. Define ESS.10. Define organizational decision support system.11. Define AI.12. Define knowledge base.13. Define intelligent agents.14. Define expert systems.15. What are the components of knowledge management systems?16. Define knowledge discovery in database.17. Define knowledge creation.18. Which are the knowledge management activities?19. Define BI.20. What are the basic components of BI?21. List benefits of BI by Thompson.22. What do you mean by analytics?23. Define business analytics.24. Write two activities that are performed in business analytics.LONG QUESTIONS:

1. Define management. What is the job of manager? Explain in short decision makingand problem solving.

2. Explain in brief the process of computer based decision making with the help of thediagram.

3. Define DSS. Explain in brief the capabilities of DSS.4. Explain in brief the components of DSS.5. Explain in brief group decision support systems.6. Explain in brief AI. Also write the benefits of AI.7. Explain in brief expert systems.8. Explain in brief knowledge management activities.9. Define BI. Explain in brief the major components of BI.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 31

10. Define BA. What are the activities performed by BA. Write the benefits of BI byEckerson.

11. Case Study: Web Portal BenefitsAt Du Pont Co.’s (www.dupont.com) $4 billion performance coating grope, thecritical issue was content management. “We have a very large number ofdocuments for marketing: brochures, press releases, warranty information onproducts and general support content for our distributors and car repair bodyshops”, explains Catherine March and, the groups e- business strategy manager.“Our salesmen were driving around with 23 kg of obsolete literature in their trunk.”

Du Pont opted to deliver the information through a web-based intranet/ extranetportal, using technology from Bow-street, a portal s/w and web development toolscompany. Du Pont wanted the ability to customize information about its half adozen coating brands. It also wanted each of its 2500 distributors and repair shopsworldwide to see the information displayed in almost 4000 different site views;which the technology would allow it to do.

Since the content capability was initiated, Du Pont’s site has grown rapidly. Thebody shops can now get training, bench marketing tools, and can paint colourformulas via the portal. There are also job- posting and resume services. And for thedistributors, Du Pont is researching adding order-tracking and order accuracycapabilities soon.

Answer the following with reference to the above given case study.What are the business benefits of the web portal? Make a critical assessment.

12. According to the case study in question no 11. What is the importance of ‘contentmanagement’ for enterprise web portals?

13. With reference to the case study in question no. 14 can a small business developand maintain such a portal?

14. Businesses have no life without business intelligence. Justify the statement.FILL IN THE BLANKS:1. ______________ is the process by which organizational goals are achieved

Through the use of resources.2. A_________ refers to a choice made between two or more alternatives.3. The categories of decision making are problem solving and ____________.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 32

4. Decisions range from simple to ________.5. A __________ is a simplified representation or abstraction of reality.6. A set of tools labelled _______ is intended to help managers be more organized.7. ______ processes are fuzzy, complex problem for which there are no cut and

dried solution.8. The _________ science approach takes the view that mangers can follow a

fairly systematic process for solving problems.9. _________ is the study of the impact that changes in one or more parts of a

model have on other parameter.10. A _________ is a computer based information system that combines models and

data in an attempt to solve semi structured and some structures problems.11. A________is an interactive computer based system that facilitates the solution of

semi structured and unstructured problems when made by a group.12. ODSS stands for ___________________.13. A/An __________ is a computer based system that serves the information needs of

top executives.14. A/An _______ is a comprehensive support system that goes beyond EIS to include

analysis support, communications, office automation, and intelligence support.15. The collection of knowledge related to a specific problem to be used in an

Intelligent system is organized and stored in a________________.16. AI software is based on ________________ processing of knowledge.17. _______ are an attempt to mimic human experts.18. ____________is a process that helps organizations identify, select, organize,

disseminate, and transfer important information and expertise that are part of theorganization’s memory and that typically reside within the organization.

19. ___________ is an umbrella term that combines architectures, methodologies,applications, tools and databases.

20. Knowledge __________ is the generation of new insights, ideas, and routines.

TRUE OR FALSE:1. Decision making is different from problem solving.2. The process of decision making involves only two stages.3. Structured problems are more difficult to solve compared to unstructured

problems.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 33

4. Management science does not attempts to find the best possible solution, anapproach known as optimization.

5. Goal seeking is a type of sensitivity analysis.6. The models which provides the system’s analytical capabilities are known as

data management subsystem.7. ODSS can also be known as institutional decision support system.8. Expert systems are small programs that reside on computers to conduct certain

tasks automatically.9. Knowledge can only be acquired from experts.10. The inferencing is performed in a component called inference engine.11. Knowledge is data that is contextual.12. Explicit knowledge deals with more objective, rational, and technical knowledge.13. Tacit knowledge is in the domain of cognitive and expertise learning.14. Explicit knowledge is also known as sticky knowledge.15. Knowledge sharing is also known as knowledge sourcing.16. Knowledge sharing is the willful of one’s insights, ideas, solutions and experience.17. KDD is not used to search for and extract useful information from volumes of

documents and data.18. BI only consists of tools, applications and databases.19. Cost saving is the benefit of BI by Eckerson.20. Analytics is the science of analysis.

MULTIPLE CHOICE QUESTIONS:1. Which of the following is a process by which organizational goals are achieved through

the use of resources?a. Management.b. Decision making.c. Problem solving.d. Decision.

2. What refers to a choice made between two or more alternatives?a. Decision.b. Decision makers.c. Problem.d. Problem solvers.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 34

3. Which of the following is a simplified representation or abstraction of reality?a. Model.b. Decision making.c. Modelling.d. Problem solving.

4. Which of the following approach takes the view that mangers can follow a fairlysystematic process for solving problems?

a. Management science.b. Operational science.c. Technical science.d. Structured science.

5. Which of the following is a computer based information system that combines modelsand data in an attempt to solve semi structured and unstructured problems?

a. DSSb. TPSc. GDSS.d. ESS.

6. Which of the following is the study of impact that changes in one or more parts ofmodel have on other parts?

a. Sensitivity analysis.b. What-if analysis.c. Goal seeking.d. Risk analysis.

7. Which of the following is an interactive computer based system that facilitate thesolution of semi structured and unstructured problems when made by a group ofdecision makers by concentrating on the process and procedures during meetings?

a. GSS.b. GDSS.c. DSS.d. Decision making.

8. Which of the following is also known as ODSS?a. Institutional decision support system.b. Enterprise decision support system.c. Departmental decision support system.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 35

d. Business decision support system.9. Which of the following is a computer based system that serves the information need

of top executives?a. ESS.b. EIS.c. MISd. DSS.

10. Which of the following are small programs that reside on computers to conductcertain tasks automatically?

a. Intelligent agents.b. Expert systems.c. Basics.d. AI.

11. Which of the following are an attempt to mimic human experts?a. Expert systems.b. Basics.c. Intelligent agents.d. AI.

12. Which of the following is a process that helps organizations identify, select, organize,disseminate, and transfer important information and expertise that are part of theorganization’s memory?

a. Knowledge management.b. Knowledge discovery.c. Knowledge search engine.d. Knowledge gathering.

13. Which of the following is not a characteristic of knowledge?a. Fragmentation, leakage.b. Extraordinary leverage.c. Certain value.d. Uncertain value of sharing.

14. Which of the following knowledge deals with more objective, rational and technicalknowledge?

a. Explicit knowledge.b. Tacit knowledge.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 36

c. Leaky knowledge.d. Sticky knowledge.

15. Which of the following is also known as sticky knowledge?a. Explicit knowledge.b. Tacit knowledge.c. Leaky knowledge.d. External knowledge.

16. Which of the following is the search for and use of internal organizational knowledge?a. Knowledge seeking.b. Knowledge sharing.c. Knowledge creation.d. Knowledge gathering.

17. Which of the following is also known as knowledge sourcing?a. Knowledge creation.b. Knowledge management.c. Knowledge seeking.d. Knowledge sharing.

18. Which of the following is not a set of technology in context to knowledgemanagement systems?

a. Communication.b. Collaboration.c. Storage and retrieval.d. Technical tool.

19. Which of the following in not under BI?a. Tools.b. Methodologies.c. Application.d. Reports.

20. Which of the following is not a benefit of BI by Thompson?a. Accurate reporting.b. Increased revenue.c. Improved customer service.d. Time savings.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 37

Unit 6: Implementing and Managing ITSHORT QUESTIONS:1. Define IS strategic alignment.2. Write any one challenge for IT alignment.3. Define IT planning.4. Define Strategic IT plan.5. Which are the three levels of IT plan?6. What do you mean by BSP model?7. Define critical success factor.8. What is scenario planning?9. Write any three reasons to do scenario planning.10. What do you mean by resource allocation?11. What is the role of chief information officer?12. List out the four approaches taken by IS department towards end-user development.13. What do you mean by service level agreements?14. List out the two classifications for IS threats.15. Define hacker.16. What do you mean by cybercrime?17. Define cracker.18. What is social engineering?19. Define data tampering.20. What is programming attacks?21. Define botnet.22. What do you mean by occupational fraud?23. What do you mean by business continuity plan?24. Define disaster recovery.25. What id disaster avoidance?26. Define audit.

LONG QUESTIONS:1. Define IS strategic alignment. What are the challenges for IT alignment?2. Explain in brief IS strategic alignment.3. Explain in brief IT planning.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 38

4. Explain in brief the tools and methodologies of IT planning.5. Explain in brief the stages of IT growth model and scenario planning.6. Explain in brief CSF with the help of a diagram.7. Explain in brief resource allocation.8. Define threat. Which are the two major classification of threats? Explain each one

of them in brief.9. Define hacker and cracker. What are the methods of attacking on computing

facilities?10. Explain IS vulnerabilities and threats in brief11. Define IS department. Which are three factors influenced in CIO’s role in web

based era?12. Define fraud. What are the steps for fraud prevention and detection?13. Explain computer crimes in brief.14. Explain stages of IT growth model.15. Explain business continuity plan in brief with the help of a diagram.16. Explain in brief risk management and cost-benefit analysis in brief.17. Explain auditing in brief.18. Case Study: Security Loopholes

Utpal had just joined SystemX as Systems Manager. But he was a worried manlooking at the current state of affairs at SystemX. As a part of assessing hardwareand software requirements, it was found that out of the 364 desktops at thecorporate office; more than half did not have their anti- virus software updated withrecent virus signature files. Three - fourths had not changed the default e-mailpassword (it was the user name) and no one had installed OS patches. And one of itslocal mail servers seemed to be an open relay! For a fleeting moment, he wonderedabout the situation at the seven branch offices across the country.

SystemX used the Net extensively in dealing with its branches, customers andsuppliers. Information like contract documents, marketing plans, Cheque and Draftnumbers, bank account details and collection details were regularly transmitted bye-mail. Utpal’s first thought was that he would recommend that SystemX bring in asecurity consultant. But the budget constraints meant that his recommendation wasunlikely to find favour. He was beginning to feel a bit out of depth and waswondering what he should do to ensure that SystemX’s data remained safe andsecure.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 39

Answer the following with reference to the above given case study.What security loopholes come to the fore in the situation described? How can thesebe plugged?

19. With the reference of the case study given in question no 15. What is theimportance of a “security budget” in the context of the given situation?

20. Explain Business Systems Planning Model.FILL IN THE BLANKS:1. _______________ is a complex management activity, and its complexity increases with

the increasing complexity of organizations.2. __________ typically undertake IT strategic planning on a yearly, quarterly, or monthly

basis.3. Organizations having long range IT plan are sometimes referred to as ________ plan.4. _________ is a top down approach that starts with business strategies.5. The stages of ______ model was initially intended to explain the growth and maturity

of the IT department in an organization.6. _______ planning is a methodology in which planners first create several scenarios,

then a tem compiles as many future events as possible.7. _________________ consists of developing the hardware, software, data

communications and networks, facilities, personnel and financial plans needed toexecute the master development plan.

8. The ______ has become an important member of the organization’s top managementteam.

9. _________ hackers perform ethical hacking, who penetrate a computer system.10. ___________ hackers are also referred to as crackers.11. A_________ is a malicious hacker, who may represent a serious problem for a

corporation.12. _______ attacks are popular with computer criminals who use programming

techniques to modify a computer program.13. A____________ can spread itself without any human intervention.14. A ______ is a huge number of hijacked Internet computers that have been setup to

forward traffic, including spam and viruses.15. The ______ software is an example of a banking Trojan.16. When a person uses his or her occupation for personal gain through misuse of the

organization’s resources is known as _________.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 40

17. An important element in any security systems is the______________ plan.18. Recovery planning is a part of__________.19. ____________ is an approach oriented towards prevention.20. A simplified computation of expected loss for risk management analysis is

__________.

TRUE OR FALSE:1. IS strategic alignment involves aligning IS strategy with organizational strategy.2. IT planning process does not result in a formal IT strategy.3. The BSP model was developed by IBM.4. There only four stages of IT growth model.5. The third level in IT planning is tactical plan.6. Scenario planning has been particularly important to e-commerce planning.7. CIOs can only report to CEOs and COOs.8. CIOs in lower growth and or smaller firms may find themselves reporting to a CFO or

COO.9. Threats can be classified as unintentional or intentional.10. White-hat hackers are also referred to as crackers.11. In social engineering, computer criminals or corporate spices build an inappropriate

trust relationship with insiders.12. Virus can spread itself without any human intervention.13. Botnets are controlled by botmasters.14. A highly publicized attack method is a worm.15. Fraud does not constitute of confidence.16. Fraud is not a serious financial crime.17. Disaster recovery plan does not outlines the process by which businesses should

recover from a major disaster.18. Disaster recovery does not links the chain of events to business continuity plan.19. Audit is an important part of control system.20. Legal risk is important in any IT system.MULTIPLE CHOICE QUESTIONS:1. Which of the following is the organized planning of IT infrastructure and

applications portfolios done at various levels of the organization?

060010205-IT For Management 2013

Ms. Trupti Rathod Page 41

a. IT planning.b. IT strategic planning.c. IT strategic alignment.d. IS strategic alignment.

2. Which of the following is a top down approach that starts with business strategies?a. BSP.b. CSF.c. IS strategic alignment.d. IT plan.

3. Which of the following are those few things that must go right in order to ensurethe organization’s survival and success?

a. CSF.b. BSP.c. IT long range planning.d. Alignment.

4.Which of the following is a methodology in which planners decide and then a teamcompiles the future events and on which the outcome of the scenario depends?

a. IT planning.b. IS alignment.c. Scenario planning.d. BSP.

5.Which of the following is a contentious process in most organizations becauseopportunities and requests for spending far exceed the available funds?

a. Scenario planning.b. Resource allocation.c. CSF.d. BSP.

6.Which of the following has become as important member of the organization’s topmanagement team?

a. CIO.b. CFOc. COOd. CEO.

7. Which of the following is an approach toward end-user departments?

060010205-IT For Management 2013

Ms. Trupti Rathod Page 42

a. Use the stick.b. Use the carrot.c. Let them swim.d. Use the radish.

8. Which of the following term is used to describe an outside person who penetratesa computer system?

a. Hacker.b. Virus.c. Worm.d. Cyber-attack.

9.Crimes done on the Internet are known asa. Cyber-crime.b. Internet crime.c. E-crime.d. E-attack.

10. Which of the following failures can occur as the result of poor manufacturing ordefective materials?

a. Computer system.b. Human error.c. Environmental hazard.d. Unintentional threat.

11. Which of the following is not a type of hacker?a. Whit-hat hacker.b. Black-hat hacker.c. White-hacker.d. Cracker.

12. Which of the following spread itself without any human intervention?a. Hacker.b. Cracker.c. Virus.d. Worm.

13. Botnets are controlled bya. Bot masters.b. Bot herders.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 43

c. Bot headers.d. Bot makers.

14. Which of the following is a huge number of hijacked computers that have beenset up to forward traffic, including spam and viruses?

a. Programming attack.b. Hackers.c. Bot net.d. Worm.

15. Which of the following is the most common mean of attacks, refers to enteringfalse, fabricated, or fraudulent data into a computer?

a. Cracker.b. Programming attacks.c. Data tampering.d. Social engineering.

16. Which of the following is not an element of fraud?a. Confidence.b. Trickery.c. Deception.d. Communication.

17. Which of the following can occur without warning?a. Disaster.b. Opportunities.c. Fraud.d. Defect.

18. Which of the following is also known as disaster recovery plan?a. Disaster plan.b. Business plan.c. Business continuity plan.d. Fraud recovery plan.

19. Which of the following is the chain of events linking the business continuity planto protection and recovery?

a. Disaster.b. Disaster recovery.c. Fraud.

060010205-IT For Management 2013

Ms. Trupti Rathod Page 44

d. Crime.20. Companies that use a device called UPS, which provides power in case of a power

outage comes undera. Disaster recovery plan.b. Business continuity plan.c. Disaster avoidance.d. Fraud.