Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 42

uestion 1

Correct
1.00 points out of 1.00

Flag question
Question text

SWOT Analysis involves analyzing a company’s competitive situation on each of the following
factors except:
Select one:
a. Strengths
b. Weakness
c. Opportunities
d. Technology 
Question 2
Correct
1.00 points out of 1.00

Flag question
Question text

Dropbox, Gmail, and Google Drive are examples of the Internet of Things.
Select one:
True
False 
Question 3
Correct
1.00 points out of 1.00

Flag question
Question text

Computers, databases, and network services are examples of commodities that do not provide a
competitive edge.
Select one:
True 
False
Question 4
Correct
1.00 points out of 1.00

Flag question
Question text

Two key components of corporate profitability are _________ and _________.


Select one:
a. SWOT; strategic planning
b. Employee performance; technology
c. Industry structure; competitive advantage 
d. Agility; commodities
Question 5
Correct
1.00 points out of 1.00

Flag question
Question text

All of the following are examples of the influence of social, mobile, and cloud
technologies except ________.
Select one:
a. Connections and feedback via social networks have changed the balance of influence.
b. Customers expect to use location-aware services, apps, alerts, social networks, and the latest
digital capabilities at work and outside work.
c. Customer loyalty and revenue growth depend on a business’ ability to offer unique customer
experiences that wow customers more than competitors can.
d. Consumers are less likely to trust tweets from ordinary people than recommendations made by
celebrity endorsements. 
Question 6
Correct
1.00 points out of 1.00
Flag question
Question text

Dashboards are data visualizations that display the current status of KPIs in easy-to-understand
formats.
Select one:
True 
False
Question 7
Correct
1.00 points out of 1.00

Flag question
Question text

________ is the control of enterprise data through formal policies and procedures to help ensure
that data can be trusted and are accessible.
Select one:
a. Data governance 
b. Master data management
c. Business strategy
d. Data standardization
Question 8
Incorrect
0.00 points out of 1.00

Flag question
Question text

A data governance program should be an IT project because data crosses boundaries and is used
by people throughout the enterprise.
Select one:
True 
False
Question 9
Correct
1.00 points out of 1.00

Flag question
Question text

________ is the use of IT tools and methods to collect, process, consolidate, store, and secure data
from sources that are often fragmented and inconsistent.
Select one:
a. Information management 
b. Data governance
c. IT strategy
d. IT development
Question 10
Correct
1.00 points out of 1.00

Flag question
Question text

Cloud computing solutions are growing in popularity with organizations because they reduce the
burden of deploying, provisioning, and updating software apps.
Select one:
True 
False
Question 11
Correct
1.00 points out of 1.00

Flag question
Question text

Information management is critical to data security and compliance with regulatory mandates, such
as the Sarbanes-Oxley Act, the USA PATRIOT Act, and HIPAA.
Select one:
True 
False
Question 12
Incorrect
0.00 points out of 1.00

Flag question
Question text

Companies that move to the cloud must negotiate ____________, which are contracts that define
their relationships with vendors.
Select one:
a. Service-level agreements
b. Defined services agreements
c. Vendor managed services
d. Cloud Standards 
Question 13
Correct
1.00 points out of 1.00

Flag question
Question text

________ enable managers to predict how customers would behave and use that knowledge to be
prepared to respond quickly.
Select one:
a. Big data analytics 
b. Data discovery
c. Master data management
d. Information optimization
Question 14
Correct
1.00 points out of 1.00
Flag question
Question text

Volatile refers to data that change frequently.


Select one:
True 
False
Question 15
Correct
1.00 points out of 1.00

Flag question
Question text

The McKinsey Global Institute (MGI) estimates that retailers using big data analytics increase their
operating margin by more than ________ percent.
Select one:
a. 10 
b. 20
c. 40
d. 60
Question 16
Correct
1.00 points out of 1.00

Flag question
Question text

Big data can have a significant positive impact on the success of any enterprise, or be a low-
contributing major expense.
Select one:
True 
False
Question 17
Correct
1.00 points out of 1.00

Flag question
Question text

In the past, data was transferred from OTLP databases to data warehouses periodically, say once a
month or even once a week. Now, the trend is toward ___________, or real-time, data warehousing
so that analysis and decision support apps use current data.
Select one:
a. Active 
b. Always-on
c. Dynamic
d. Operational
Question 18
Correct
1.00 points out of 1.00

Flag question
Question text

____________ software enables users to analyze data from various dimensions or angles,
categorize them, and find correlations or patterns among fields in the data warehouse.
Select one:
a. NoSQL
b. Data mining 
c. Hadoop
d. Nexus
Question 19
Incorrect
0.00 points out of 1.00

Flag question
Question text
Yammer is an enterprise social network that helps employees collaborate across departments,
locations, and business apps.
Select one:
True
False 
Question 20
Correct
1.00 points out of 1.00

Flag question
Question text

To reduce product development time, Caterpillar connected its engineering and manufacturing
divisions with its active suppliers, distributors, overseas factories, and customers, through ________.
Select one:
a. An extranet 
b. An intranet
c. A Transportation Business Center
d. A third-party, value-added network
Question 21
Correct
1.00 points out of 1.00

Flag question
Question text

To insure QoS of a network, an alternative to “prioritizing traffic” is to __________, which means


holding back traffic from non-time sensitive apps so that apps like voice and video run more
effectively.
Select one:
a. Throttle traffic 
b. Block traffic
c. Re-direct traffic
d. Filter traffic
Question 22
Correct
1.00 points out of 1.00
Flag question
Question text

Alcatel-Lucent’s High Leverage Network (HLN) increases bandwidth and network capabilities while
reducing the negative impact on the environment. HLN can handle large amounts of traffic more
efficiently because __________.
Select one:
a. It eliminates the use of non-renewable resources
b. It reduces Radio Frequency Interference (RFI) - overcrowding of specific areas of the
electromagnetic spectrum
c. The network limits the number of users who can access the network at any one time
d. The networks are intelligent and send packets at the highest speed and most efficiently 
Question 23
Correct
1.00 points out of 1.00

Flag question
Question text

Which of the following represents the primary perspective of people who oppose Net Neutrality?
Select one:
a. They are concerned about a growing risk to privacy and ability to transmit data securely over the
Internet.
b. They argue that there have always been different levels of Internet service and that a two-tiered
system would enable more freedom of choice and promote e-commerce. 
c. They are concerned that the government is not doing enough to properly regulate the Internet.
d. They are concerned about the growth of traffic shaping because it has the potential to slow
transmission of certain types of data or content.
Question 24
Correct
1.00 points out of 1.00

Flag question
Question text
________ networks are high capacity digital networks.
Select one:
a. Circuit
b. Narrowband
c. Broadband 
d. Smart grid
Question 25
Correct
1.00 points out of 1.00

Flag question
Question text

Sustainability grows more urgent every year as carbon emissions contribute to climate changes that
are threatening quality of life-and possibly life itself.
Select one:
True 
False
Quiz 3

Started on Wednesday, April 1, 2020, 1:53 PM


State Finished
Completed on Wednesday, April 1, 2020, 2:21 PM
Time taken 27 mins 33 secs
Points 24.00/25.00
Grade 96.00 out of 100.00
Question 1
Correct
1.00 points out of 1.00

Flag question
Question text

________________ is the process of analyzing and selecting investments (expenditures) with the
highest ROI for the company.
Select one:
a. Capital budgeting 
b. Localized budgeting
c. Interactive data
d. Marketing strategy
Question 2
Correct
1.00 points out of 1.00

Flag question
Question text

Functions of MES programs include: compiling a bill of materials, resource management and
scheduling, preparing and dispatching production orders, and preparing WIP reports.
Select one:
True 
False
Question 3
Correct
1.00 points out of 1.00
Flag question
Question text

__________ is the field that deals with policies, procedures, compliance requirements associated
with acquiring and keeping people in organizations.
Select one:
a. Accounting
b. Human resources 
c. Marketing
d. Payroll
Question 4
Correct
1.00 points out of 1.00

Flag question
Question text

One of the most effective fraud prevention techniques is the perception of detection and punishment.
Select one:
True 
False
Question 5
Correct
1.00 points out of 1.00

Flag question
Question text

In deciding on advertising and other marketing efforts, managers need to know the profit contribution
or profit margin, which is ________.
Select one:
a. Net revenue - gross expenses
b. Sale price - cost of goods 
c. Costs + revenue
d. Costs + net profit
Question 6
Correct
1.00 points out of 1.00

Flag question
Question text

The collection of data for ratio analysis is done by the ________, and interpretation of ratios and the
ability to forecast their future behavior require expertise, which is supported by _______.
Select one:
a. POS; Audit systems
b. Database; data warehouse
c. TPS; DSS 
d. MIS; EIS
Question 7
Incorrect
0.00 points out of 1.00

Flag question
Question text

Enterprise systems refer to a category of information systems that link the enterprise with suppliers,
business partners, and customers.
Select one:
True
False 
Question 8
Correct
1.00 points out of 1.00

Flag question
Question text

Managers and other decision makers tend to think that if an enterprise system works for leading
companies, it will work for them too, which is true.
Select one:
True
False 
Question 9
Correct
1.00 points out of 1.00

Flag question
Question text

Supply chain links are managed rather than the entire chain; therefore, a company can only manage
the links that it actually touches.
Select one:
True 
False
Question 10
Correct
1.00 points out of 1.00

Flag question
Question text

The latest ERP solutions are designed with a focus on social collaboration, deployment flexibility,
faster response, and accessibility from mobile devices.
Select one:
True 
False
Question 11
Correct
1.00 points out of 1.00

Flag question
Question text

Yammer is the social collaboration tool of choice for SharePoint.


Select one:
True 
False
Question 12
Correct
1.00 points out of 1.00

Flag question
Question text

According to the loyalty effect, a 5% reduction in customer attrition can improve profits by as much
as __________ percent.
Select one:
a. 5
b. 10
c. 20 
d. 30
Question 13
Correct
1.00 points out of 1.00

Flag question
Question text

Companies are investing in the latest data discovery solutions largely because of their speed and
flexibility.
Select one:
True 
False
Question 14
Correct
1.00 points out of 1.00

Flag question
Question text
Data from operational data stores, business systems, external data (economic data, suppliers;
information, competitors’ activities), and real-time news feeds are integrated to generate an
enterprise mashup.
Select one:
True 
False
Question 15
Correct
1.00 points out of 1.00

Flag question
Question text

Dashboards and interactive reports are information delivery technologies.


Select one:
True 
False
Question 16
Correct
1.00 points out of 1.00

Flag question
Question text

The ability of GIS to track products along the supply chain offers opportunities in logistics and order
fulfillment.
Select one:
True 
False
Question 17
Correct
1.00 points out of 1.00

Flag question
Question text
An application that integrates data from data stores, business systems, external data and real-time
news feeds is referred to as a(n) ____________.
Select one:
a. Enterprise mashup 
b. Enterprise visualization
c. Operational system
d. Business systems
Question 18
Correct
1.00 points out of 1.00

Flag question
Question text

Using ________, nontechnical users can easily and quickly access, integrate, and display BI data
from a variety of operational data sources, including those that are not integrated into the existing
data warehouse, without having to understand the intricacies of the underlying data infrastructures,
or schemas.
Select one:
a. Self-service data mashup apps 
b. Modular software
c. Object language
d. Macros
Question 19
Correct
1.00 points out of 1.00

Flag question
Question text

Which of the following characteristics of cloud strategy and services is false?


Select one:
a. Cloud computing is a way for companies to procure technology as a service.
b. IT resources no longer depend on capital investments and IT developers to own that resource.
c. IT capabilities can be sourced, scaled on, and delivered on demand without physical location,
labor, or capital restrictions.
d. Cloud is being adopted across more of the enterprise as full replacements for on-premises
systems. 
Question 20
Correct
1.00 points out of 1.00

Flag question
Question text

________ converts senior management’s priorities into visible, actionable objectives by identifying
ways to measure progress against agreed-upon targets
Select one:
a. Asset utilization
b. Balanced Scorecard 
c. Financial governance
d. Strategic planning
Question 21
Correct
1.00 points out of 1.00

Flag question
Question text

When legacy systems could no longer provide the functionality needed to solve the business,
companies migrated to ____________ to connect core systems and apps.
Select one:
a. the cloud or SaaS 
b. data centers
c. database management systems
d. offshoring
Question 22
Correct
1.00 points out of 1.00

Flag question
Question text

Using the results of the BSC methodology, management teams have an agreed-upon set of
objectives and measures that are used to identify and set targets and the actions to achieve them
that are appropriate for the company’s business model.
Select one:
True 
False
Question 23
Correct
1.00 points out of 1.00

Flag question
Question text

One of the skills CIOs need to improve IT-business alignment and governance is political savvy.
Select one:
True 
False
Question 24
Correct
1.00 points out of 1.00

Flag question
Question text

When selecting a vendor, two criteria to assess are experience and stability.
Select one:
True 
False
Question 25
Correct
1.00 points out of 1.00

Flag question
Question text
There are several possible reasons why a high percentage of IT projects are abandoned-the
business strategy changed, technology changed, the project was not going to be completed on time
or budget, the project sponsors responsible did not work well together, or the IT strategy was
changed to cloud or SaaS.
Select one:
True 
False
Started on Friday, April 10, 2020, 4:09 PM
State Finished
Completed on Friday, April 10, 2020, 4:51 PM
Time taken 41 mins 8 secs
Points 21.00/25.00
Grade 84.00 out of 100.00
Question 1
Correct
1.00 points out of 1.00

Flag question
Question text

The major take-away from the triple constraint being represented as a triangle is that you cannot
change one side without changing the other sides.
Select one:
True 
False
Question 2
Correct
1.00 points out of 1.00

Flag question
Question text

The financial services sector has been compelled by strict international anti-money-laundering (AML)
guidelines that require firms to _________.
Select one:
a. know your customer 
b. implement master data management
c. adhere to project portfolio management
d. demonstrate data consistency and accuracy
Question 3
Correct
1.00 points out of 1.00
Flag question
Question text

Too often the final stage of a project, the ________, is skipped to save time and effort.
Select one:
a. budgeting
b. executing
c. postmortem 
d. controlling
Question 4
Correct
1.00 points out of 1.00

Flag question
Question text

Which is not a characteristic of system testing?


Select one:
a. Testing verifies that apps, interfaces, data transfers, and so on, work correctly under all possible
conditions.
b. The risk of costly lawsuits needs to be considered.
c. Improper testing is very risky.
d. Proper testing can be done quickly and with little effort and expense. 
Question 5
Correct
1.00 points out of 1.00

Flag question
Question text

________ are multipurpose visualization tools that show the timeline of the project schedule; and are
used for planning, scheduling, and at-a-glance status reports.
Select one:
a. Baselines
b. Gantt charts 
c. Statements of work
d. Critical paths
Question 6
Correct
1.00 points out of 1.00

Flag question
Question text

Monitoring and control processes should occur _________ while the project work is being executed.
Select one:
a. weekly or bi-weekly
b. continuously and continually 
c. monthly
d. at each milestone
Question 7
Correct
1.00 points out of 1.00

Flag question
Question text

Which of the following is not a red flag that indicates IT project problems?
Select one:
a. Project has launched without senior buy-in
b. Users have too much early involvement 
c. No detailed testing plan exists
d. No detailed project plan exists
Question 8
Correct
1.00 points out of 1.00

Flag question
Question text

The money already spent on the project, or sunk costs, should be considered in the decision to kill
a project that is out of control.
Select one:
True
False 
Question 9
Incorrect
0.00 points out of 1.00

Flag question
Question text

Integrated change control processes are always documented and saved in the event of project
failure or lawsuits related to the failure.
Select one:
True
False 
Question 10
Incorrect
0.00 points out of 1.00

Flag question
Question text

Projects start with an idea that is explained in a business case. If the business case is accepted, a
work breakdown structure (WBS) is prepared.
Select one:
True 
False
Question 11
Correct
1.00 points out of 1.00

Flag question
Question text
Project control is also used to identify when to declare the ongoing project a failure and kill it.
Select one:
True 
False
Question 12
Correct
1.00 points out of 1.00

Flag question
Question text

Baseline is a specification of the project plan that has been formally reviewed and agreed upon. It
can be updated or changed through casual or informal change control processes.
Select one:
True
False 
Question 13
Correct
1.00 points out of 1.00

Flag question
Question text

__________ or sniffing out and mapping the physical location of Wi-Fi routers is a hacking
technique, an invasion of privacy, and an information security risk.
Select one:
a. IP monitoring
b. Spear fishing
c. Wardriving 
d. Snooping
Question 14
Correct
1.00 points out of 1.00

Flag question
Question text
There are competing business interests and trade-offs at work when the issue is privacy.
Select one:
True 
False
Question 15
Incorrect
0.00 points out of 1.00

Flag question
Question text

Architecting resilience depends on _________, which means that every component is backed up by
an alternative in case it fails.
Select one:
a. Isolation
b. Integration
c. Redundancy 
d. Flexibility
Question 16
Correct
1.00 points out of 1.00

Flag question
Question text

________ are characteristics that have been identified by law that cannot be used in the hiring
process.
Select one:
a. Civil rights
b. Protected classes 
c. EEOC practices
d. Negligent hiring
Question 17
Correct
1.00 points out of 1.00
Flag question
Question text

Private content that uninhibited teenagers with bad judgment posted or sent cannot be made to
disappear when they apply for jobs requiring security clearance or intense background checks or run
for public office.
Select one:
True 
False
Question 18
Correct
1.00 points out of 1.00

Flag question
Question text

According to Accenture's Technology Vision 2014, becoming a truly mobile business is crucial to


how enterprises innovate and differentiate from competitors.
Select one:
True
False 
Question 19
Correct
1.00 points out of 1.00

Flag question
Question text

The convergence of several technologies is blurring the digital and physical worlds. These
converging technologies include each of the following except ________.
Select one:
a. greater bandwidth
b. explosion of connected M2M devices and IoT
c. expanding software-defined networking 
d. increased use of real-time analytics
Question 20
Correct
1.00 points out of 1.00

Flag question
Question text

Google's engineers realized the cars could be used for ________ by sniffing out and mapping the
physical location of the world's Wi-Fi routers.
Select one:
a. wardriving 
b. mobile hacking
c. snooping
d. drive-by recording
Question 21
Correct
1.00 points out of 1.00

Flag question
Question text

Intelligent interfaces are emerging that allow decisions to be made on the edge-where digital and
physical worlds meet, which could be on your wrist, in your hand, or in your field of vision.
Select one:
True 
False
Question 22
Incorrect
0.00 points out of 1.00

Flag question
Question text

Discrimination is biased or prejudicial treatment in recruitment, hiring, or employment based on


protected classes characteristics.
Select one:
True
False 
Question 23
Correct
1.00 points out of 1.00

Flag question
Question text

An estimated 50% of companies integrate their data across the enterprise.


Select one:
True
False 
Question 24
Correct
1.00 points out of 1.00

Flag question
Question text

Crowdsourcing can give every business access to an agile workforce that is not only better suited to
solving some of the problems that organizations struggle with today but in many cases will do it for
free.
Select one:
True 
False
Question 25
Correct
1.00 points out of 1.00

Flag question
Question text

If a workplace violence incident occurred and the attacker’s public social networking profile
contained information that could have predicted that behavior, the employer may be held liable for
________.
Select one:
a. Obstruction
b. Civil rights violations
c. Negligent hiring 
d. Discrimination
Started on Friday, June 5, 2020, 5:21 AM
State Finished
Completed on Friday, June 5, 2020, 5:55 AM
Time taken 33 mins 47 secs
Points 20.00/25.00
Grade 64.00 out of 80.00 (80%)
Question 1
Correct
1.00 points out of 1.00
Flag question
Question text

________ is a structured methodology to plan, manage, and control the completion of a project
throughout its life cycle.
Select one:
a. Project planning
b. Project management 
c. Systems development
d. System design
Question 2
Correct
1.00 points out of 1.00
Flag question
Question text

Technical feasibility addresses two primary questions: Do the benefits outweigh the costs of the
project? Can the project be completed as scheduled?
Select one:
True
False 
Question 3
Correct
1.00 points out of 1.00
Flag question
Question text

On a Gantt chart, the start and finish dates of all tasks and milestones appear as bars whose length
represent its cost.
Select one:
True
False 
Question 4
Incorrect
0.00 points out of 1.00
Flag question
Question text

Closing out a project benefits the _________.


Select one:
a. enterprise and people who worked on the project
b. completed project 
c. client
d. completed project and enterprise
Question 5
Correct
1.00 points out of 1.00
Flag question
Question text

Starting with an initial idea, the SDLC processes are requirements analysis, systems analysis and
design, development and testing, implementation, and maintenance.
Select one:
True 
False
Question 6
Correct
1.00 points out of 1.00
Flag question
Question text

The DIA baggage-handling project represents practically every possible project management
mistake.
Select one:
True 
False
Question 7
Correct
1.00 points out of 1.00
Flag question
Question text

During a project, the more involvement you have from users, the greater your chance of delay,
conflict, and failure.
Select one:
True
False 
Question 8
Correct
1.00 points out of 1.00
Flag question
Question text

_________ lets everyone know who is responsible for the completion of each of the tasks.
Select one:
a. Milestones
b. Project plan review
c. Responsibility matrix 
d. Gantt chart
Question 9
Correct
1.00 points out of 1.00
Flag question
Question text

The money already spent on the project, or sunk costs, should be considered in the decision to kill
a project that is out of control.
Select one:
True
False 
Question 10
Incorrect
0.00 points out of 1.00
Flag question
Question text

Integrated change control processes are always documented and saved in the event of project
failure or lawsuits related to the failure.
Select one:
True
False 
Question 11
Correct
1.00 points out of 1.00
Flag question
Question text

Project ________ depends on prompt and candid feedback from the project team, while ________
depends on systems and decision rules for managing variances between the project’s scope, cost,
and schedule.
Select one:
a. Monitoring; control 
b. Management; monitoring
c. Critical path; scope creep
d. Timeline; baseline
Question 12
Correct
1.00 points out of 1.00
Flag question
Question text

Because scope creep is expensive, project managers impose controls on changes requested by
users, which help to prevent runaway projects.
Select one:
True 
False
Question 13
Correct
1.00 points out of 1.00
Flag question
Question text

Privacy means we have freedom of choice and control over our personal information, including what
we do not want shared with or used by others.
Select one:
True 
False
Question 14
Correct
1.00 points out of 1.00
Flag question
Question text
Both free and paid third-party mobile apps are regulated by the FTC to protect privacy.
Select one:
True
False 
Question 15
Correct
1.00 points out of 1.00
Flag question
Question text

Which statement about privacy in the U.S. is incorrect?


Select one:
a. A person’s privacy is well-protected by laws and regulations, and is based to a minor extent on
choices the person has made. 
b. Privacy is the right to self-determine what information about you is made accessible, to whom, when,
and for what use or purpose.
c. Privacy means we have freedom of choice and control over our personal information, including what
we do not want shared with or used by others.
d. Unauthorized disclosure of personal information is normally considered a breach of privacy, although
what is unauthorized and what is personal information are matters of dispute, particularly when it is
online.
Question 16
Incorrect
0.00 points out of 1.00
Flag question
Question text

Architecting resilience depends on _________, which means that a failure in one component cannot
bring down the entire edifice.
Select one:
a. Isolation 
b. Integration
c. Redundancy
d. Flexibility
Question 17
Incorrect
0.00 points out of 1.00
Flag question
Question text

Unauthorized disclosure of personal information is normally considered a breach of privacy,


because the law clearly defines what is unauthorized and what is personal information.
Select one:
True 
False
Question 18
Correct
1.00 points out of 1.00
Flag question
Question text

A person’s privacy is based to a large extent on what choices that person has made.
Select one:
True 
False
Question 19
Correct
1.00 points out of 1.00
Flag question
Question text

Every industry is being impacted by ________ computing systems-the supersized, scalable, and
resilient data centers pioneered by data-dependent and social media companies.
Select one:
a. cloud
b. hyperscale 
c. mobile networked
d. Hadoop
Question 20
Correct
1.00 points out of 1.00
Flag question
Question text

Netflix built resiliency into its IT architecture by following two design principles: isolation and
redundancy.
Select one:
True 
False
Question 21
Correct
1.00 points out of 1.00
Flag question
Question text

Canadian Tire enabled its credit card business to create psychological profiles of its cardholders that
were built using alarmingly precise correlations.
Select one:
True 
False
Question 22
Incorrect
0.00 points out of 1.00
Flag question
Question text

Predicting people’s behavior is big business-and increasingly illegal because of privacy and
antimony laundering laws.
Select one:
True 
False
Question 23
Correct
1.00 points out of 1.00
Flag question
Question text
Bioprinting produces 3D biological objects or parts that are highly precise in shape and mechanical
complexity.
Select one:
True 
False
Question 24
Correct
1.00 points out of 1.00
Flag question
Question text

________ refers to situations when too much data interferes with our ability to focus and be
productive.
Select one:
a. Electronic static
b. Social stimuli
c. Cognitive overload 
d. Antidistraction
Question 25
Correct
1.00 points out of 1.00
Flag question
Question text

Companies expose themselves to harsh sanctions by federal agencies when they violate the privacy
policies that their customers rely upon.
Select one:
True 
False
Started on Friday, June 5, 2020, 6:11 AM
State Finished
Completed on Friday, June 5, 2020, 6:32 AM
Time taken 20 mins 43 secs
Points 20.00/25.00
Grade 64.00 out of 80.00 (80%)
Question 1
Correct
1.00 points out of 1.00
Flag question
Question text

The baseline is used for monitoring and controlling. Any change to the baseline is a deviation, or
variance, to the plan-and it needs to be documented.
Select one:
True 
False
Question 2
Correct
1.00 points out of 1.00
Flag question
Question text

During the system investigation stage, __________ studies are done to determine if the hardware,
software, and communications components can be developed and/or acquired to solve the business
problem.
Select one:
a. Economic feasibility
b. Technical feasibility 
c. ROI
d. NPV
Question 3
Incorrect
0.00 points out of 1.00
Flag question
Question text

The first stage of the SDLC is __________ to understand the business problem or opportunity.
Select one:
a. Systems analysis 
b. Systems investigation
c. Prototyping
d. Systems design
Question 4
Correct
1.00 points out of 1.00
Flag question
Question text

Not using a best practices project management approach is the biggest IT project mistake a
business can make.
Select one:
True 
False
Question 5
Correct
1.00 points out of 1.00
Flag question
Question text

The DIA baggage-handling project represents practically every possible project management
mistake.
Select one:
True 
False
Question 6
Correct
1.00 points out of 1.00
Flag question
Question text

Monitoring and control processes should occur _________ while the project work is being executed.
Select one:
a. weekly or bi-weekly
b. continuously and continually 
c. monthly
d. at each milestone
Question 7
Correct
1.00 points out of 1.00
Flag question
Question text

Lessons learned to keep projects on track include all of the following except ________.
Select one:
a. Set realistic and detailed project plans with adequate time and resources
b. Encourage timely feedback and be willing to listen
c. Manage risk with regular project status reviews
d. Perform a postmortem with all members of the project team 
Question 8
Correct
1.00 points out of 1.00
Flag question
Question text

Project managers must manage the __________, which consists of all tasks that must start and
finish on schedule or the project will be delayed unless corrective action is taken.
Select one:
a. Over allocation
b. Critical path 
c. Triple constraints
d. Scope creep
Question 9
Incorrect
0.00 points out of 1.00
Flag question
Question text
All projects have a critical path, which is the shortest path.
Select one:
True 
False
Question 10
Correct
1.00 points out of 1.00
Flag question
Question text

The ________ identifies all work or activities that need to be performed, the schedule of work, and
who will perform the work.
Select one:
a. Business case
b. Project plan review
c. Statement of work
d. Work breakdown structure 
Question 11
Correct
1.00 points out of 1.00
Flag question
Question text

Which of the following is not a red flag that indicates IT project problems?
Select one:
a. Project has launched without senior buy-in
b. Users have too much early involvement 
c. No detailed testing plan exists
d. No detailed project plan exists
Question 12
Incorrect
0.00 points out of 1.00
Flag question
Question text

Projects are subject to unanticipated and uncontrollable events so they need to have slack built into
the schedule and budget.
Select one:
True
False 
Question 13
Correct
1.00 points out of 1.00
Flag question
Question text

Which statement about privacy in the U.S. is incorrect?


Select one:
a. A person’s privacy is well-protected by laws and regulations, and is based to a minor extent on
choices the person has made. 
b. Privacy is the right to self-determine what information about you is made accessible, to whom, when,
and for what use or purpose.
c. Privacy means we have freedom of choice and control over our personal information, including what
we do not want shared with or used by others.
d. Unauthorized disclosure of personal information is normally considered a breach of privacy, although
what is unauthorized and what is personal information are matters of dispute, particularly when it is
online.
Question 14
Correct
1.00 points out of 1.00
Flag question
Question text

Privacy means we have freedom of choice and control over our personal information, including what
we do not want shared with or used by others.
Select one:
True 
False
Question 15
Correct
1.00 points out of 1.00
Flag question
Question text

There are several frameworks provided by the FTC for deciding what is ethical and what is not.
Select one:
True
False 
Question 16
Correct
1.00 points out of 1.00
Flag question
Question text

The convergence of several technologies is blurring the digital and physical worlds. These
converging technologies include each of the following except ________.
Select one:
a. greater bandwidth
b. explosion of connected M2M devices and IoT
c. expanding software-defined networking 
d. increased use of real-time analytics
Question 17
Correct
1.00 points out of 1.00
Flag question
Question text

The term ________ refers to the phenomenon where social users are concerned about privacy, but
their behaviors contradict these concerns to an extreme degree.
Select one:
a. Facebook fallacy
b. Social denial
c. Privacy paradox 
d. Media comfort
Question 18
Correct
1.00 points out of 1.00
Flag question
Question text

Because of legacy systems and data silos that limit the value that organizations get out of their data,
enterprise data are often underutilized. Accenture recommends that companies start treating data
like a(n) ________.
Select one:
a. Account receivable
b. digital credit
c. Supply chain 
d. ecosystem
Question 19
Incorrect
0.00 points out of 1.00
Flag question
Question text

In addition to crowdfunding, companies are using LinkedIn to provide market insight and assess
product viability for a lot less than what traditional means cost.
Select one:
True 
False
Question 20
Correct
1.00 points out of 1.00
Flag question
Question text

With enormous demands for processing power, ________ matters more than ever in transforming
enterprises into digital businesses.
Select one:
a. hardware 
b. mobile apps
c. social networks
d. software
Question 21
Correct
1.00 points out of 1.00
Flag question
Question text

With enormous demands for processing power, hardware matters more than ever in transforming
enterprises into digital businesses.
Select one:
True 
False
Question 22
Correct
1.00 points out of 1.00
Flag question
Question text

The ________ scrutinizes business practices to regulate "unfair and deceptive trade practices."
Select one:
a. EEOC
b. FFIEC 
c. FTC
d. FCC
Question 23
Incorrect
0.00 points out of 1.00
Flag question
Question text

Architecting resilience depends on _________, which means that every component is backed up by
an alternative in case it fails.
Select one:
a. Isolation
b. Integration
c. Redundancy 
d. Flexibility
Question 24
Correct
1.00 points out of 1.00
Flag question
Question text

________ occurs when the civil rights of an individual are denied or interfered with because of their
membership in a particular group or class.
Select one:
a. Harassment
b. Prejudice
c. Negligent hiring
d. Discrimination 
Question 25
Correct
1.00 points out of 1.00
Flag question
Question text

A person’s privacy is based to a large extent on what choices that person has made.
Select one:
True 
False

You might also like