Question: SECTION A: Multiple Choices (Choose one best answer for each of the following_questions)_ 1. What is a eld concerned with the use of technology in

 SECTION A: Multiple Choices (Choose one best answer for each ofthe following_questions)_ 1. What is a eld concerned with the use oftechnology in managing and processing information? A. Information technology B. Management informationsystems C. Data D. Information 2. Which of the following represents therelationship between functional areas in a business? A. Independent B. Autonomous C.Interdependent D. Self-sufficient 3. Which of the following is considered data? A.

SECTION A: Multiple Choices (Choose one best answer for each of the following_questions)_ 1. What is a eld concerned with the use of technology in managing and processing information? A. Information technology B. Management information systems C. Data D. Information 2. Which of the following represents the relationship between functional areas in a business? A. Independent B. Autonomous C. Interdependent D. Self-sufficient 3. Which of the following is considered data? A. Quantity sold B. Best customer by month C. Best selling item by month D. Worst selling item by month 4. Which information culture can cause an organisation to have a great degree of difficulty operating? A. Information-functional culture B. Information-sharing culture C. Information-inquiring culture D. Information-discovery culture 5. Which of the following activities does a C10 perform? A. Oversees all uses of information technology B. Ensures the strategic alignment of IT with business goals C. Ensures effective communication between business and IT personnel D. All of the given answers [8 marks] SECTION D: Analyze and Solve Problem Below is a sample of a company's customer information. Analyze it and answer the following questions. ID Last Name First Name Street City State Postcode 433 M Jones 13 Riverview Bonython ACT 2905 434 Margaret Jones 13 First Ave. Nedlands WA 6009 434 Brain Fitzpatrick Lake Ave. Wagga NSW 2650 435 Nick Schweitzer 65 Macleay Street Potts Point NSW 1335 436 Richard 14 Morgan Cres. Conder ACT 2906 437 ALana Smith 121 Tenny Dr. Darwin NT 801 (1) Explain how database increase flexibility. [2marks] (2) How database increase its information security. [3marks] (3) List the five characteristics of high quality information. [5marks] (4) Identify at least five errors, or potential problem areas that you can see in this customer list. (Identify the errors on the table directly). [5marks] (5) Assess the impact of low quality information on an organization and the benefits of high quality information on an organization. [4marks] 6/6SECTION C: Short Answers (1) Define data and information, explain their relationship with diagram. [4 marks] (2) Explain the statement "information has no ethics". [4marks] (3) List IT approaches which support each force of Porter's five forces model. [5marks] (4) Based on managerial level pyramid, list the IT systems used inside and outside the organization. (draw a diagram to describe).17. Which of the following represents the different information granularities? A. Detail, summary, aggregate B. Document, presentation, spreadsheet, database C. Individual, department, enterprise D. None of the given answers 18. What encompasses all organisational information and its primary purpose is to support the performing of managerial analysis tasks? A. Transactional information B. Analytical information C. Timeliness D. Quality 19. What type of integrity constraint does not allow someone to create an order for a nonexistent customer? A. Relational integrity constraint B. Business-critical integrity constraint C. Information-critical integrity constraint D. None of the given answers 20. When does information cleansing occur in the data warehouse? A. During the ETL process B. On the information, once it is in the data warehouse C. During the ETL process and once it is in the data warehouse D. During the ETL process and before it is in the data warehouse SECTION B: True or False 1. Three key resources pe0ple, information technology and information (in that order of priority) - are inextricably linked. If one fails, they all fail. 2. A competitive advantage is typically temporary, unless it is a rst-mover advantage. 3. One of the reasons for the difculties between IT personnel and business personnel is differing vocabularies. 4. Sensitivity analysis, what-if analysis, and market basket analysis are the three quantitative models typically used by a D88. 5. Consolidation, drill-down, and slice-and-dice are the three most common capabilities offered in an EIS. 6. Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organisation. 7. Ethical computer use policy contains general principles to guide computer user behaviour. 8. Timely information must be up-to-the-second to be accurate. 9. Ideally, an organisation only wants to build forward integrations. 10. Infrastructure architecture identifies Where and how important information, like customer records, is maintained and secured. [2x10=20 marks] 6. All of the following are part of Porter's Three Generic Strategies, except: A. Broad cost leadership B. Broad differentiation C. Focused strategy D. Business process strategy 7. What are the most sought after traits in up-and- coming executives? A. Decision-making and transactional skills B. Problem-solving and exibility C. Decision-making and problem-solving D. Problem-solving and transaction skills 8. Which of the below is a category of AI that attempts to emulate the way the human brain works? A. Intelligent system B. Articial intelligence C. Expert systems D. Neural network 9. Which of the following should a business follow for success? A. Technology choices should drive business processes B. Business processes should drive technology choices C. Technology choices should drive business strategies and goals D. All of the given answers, depending on the industry 10. What does BPR assume about the current process in the extreme? A. Current process is irrelevant B. Current process is broken C. Current process must be overhauled from scratch D. All of the given answers 11. What is the recommended way to implement information security lines of defense? A. People rst, technology second B. Technology rst, people second C. None of the given answers D. All of the given answers

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!