ITA203 C
ITA203 C
Business alignment?
a. True
b. False
A key feature of the application silo stage of the enterprise IT architecture is:
a. Standardized infrastructure across the organization
b. IT applications to meet specific users' needs
c. Standardized business processes across the organization
d. Experiments to meet local needs.
The standardized technology stage of the enterprise IT architecture would be appropriate for a firm in
the coordination operating model?
a. True
b. False
A key governance mechanism in the business silo stage of enterprise IT architecture is:
a. Business case
b. IT standards committee
c. Enterprise-wide process owners
The cost of implementing an ERP system is about 1% of annual revenue. This is what type of estimate?
a. Order of Magnitude
b. Budget Estimate
c. Definitive
The use case point method of estimating the cost of software considers?
a. Unadjusted actor weight
b. Unadjusted use case weight
c. Technical complexity factor
d. Environmental complexity factor
e. All of the above
In calculating the technical complexity factor, if a factor (e.g., ease of use) has higher assigned value then
that factor increases the technical complexity factor:
a. True
b. False
Can the IS department develop the system that users' want? This is____________________ type of risk.
a. Development
b. Organizational
c. Market
Can the organization make the changes required to implement a new system? This is an example
of____________________risk.
a. Development
b. Organizational
c. Market
An IT project can be divided into segments, and a segment can be implemented based on the
outcome of implementation of prior segment(s). This is an example
of_________________________?
a. Deferral
b. Staging
c. Growth option
If managerial flexibility is high and the project faces significant uncertainty about costs and benefits, then
the real options approach to IT investment is the appropriate approach to eveluate the investment.
a. True
b. False
In the cost center approach to IT chargeback, IT units offer services for a price and user
organizations choose consumption levels.
a. True
b. False
Prior research suggests that is the user organizations are presented with an IT service that has a proce
associated with it, it reduces the demand for the IT service.
a. True
b. False
If users fear losing their status in the organization due to the implementation of a new information
system, they are likely to resist the implementation of the system.
a. True
b. False
From the status quo bias perspective, if a new systems is very easy to learn and use, it will face less
resistance to adoption.
a. True
b. False
In the demand driven model of user adoption, is users believe that the new system is likely to lead to
improvement in their individual performance, they are more likely to adopt the new system?
a. True
b. False
User training is more important for low complexity information systems than for high complexity
information systems.
a. True
b. False
Top management support is important in increasing user adoption as top management support provides
legitimacy to a new system.
a. True
b. False
Change management in the evolutionary approach to implementing a new system is a recursive adaptive
process.
a. True
b. False
The key difference between the project management and the learning approach to change management
is that in the project management approach the organization thinks of implementing a nnew system as a
one-time effort.
a. True
b. False
In the learning approach to implementing a new system, users learn to use the new systems
from ____________?
a. Training Programs
b. Actual Use
If a company competes on the basis of differentiation, then the CIO should ideally report
to the ____________.
a. CEO
b. CFO
c. COO
d. None of the above.
The IT steering committee is a key IT governance decision making structure. The primary role of this
decision making structure is to:
a. Define IT architecture standards.
b. Define IT principles.
c. Specify the Service Level Agreements for the IT organization.
d. All of the above.
In the replication operating model, firms share data across different business units?
a.True
b.False
The rationalized data/optimized core stage of the enterprise IT architecture would be appropriate for a
firm operating with the replication model?
a.True
b.False
A distinctive governance mechanism in the rationalized data /optimized core stage of enterprise IT
architecture is:
a. Business case.
b. IT standards committee.
c. Enterprise-wide process owners.
In which operating model do firms standardize business processes and share data across business units?
a. Diversification.
b. Unification.
c. Coordination.
d. Replication.
The key strategic implication of the rationalized data / optimized core stage of enterprise
IT architecture is?
a. Local optimization.
b. Operational efficiency.
c. Speed to market.
d. All of the above
This type of estimate requires understanding of the work packages (units of work) that have to be
executed to complete the project.
a. Order of Magnitude Estimate.
b. Budget Estimate.
c. Definitive.
In calculating the environmental complexity factor, if a factor (e.g., stability of requirements) has
higher assigned value then that factor increases the environmental complexity factor:
a. True
b. False
IT systems often create strategic benefits. Strategic benefits are generally ________.
a. Tangible.
b. Intangible.
In the use case method a complex actor has higher impact on the final use case point compared to a less
complex use case.
a.True
b.False
In the use case point method of software cost estimation, a higher/larger number for the productivity
factor means the developer takes more time to code one use case point, thus the developer is less
productive:
a.True
b.False
IT systems often create intangible benefits. These intangible benefits are reflected in the __________ of
the firm?
a. Balance sheet.
b. Market value.
An IT system is implemented, even when it has a negative NPV, because the system allows other follow
on projects. This is an example of _________ ?
a. Deferral.
b. Staging.
c. Growth option.
Large system implementations often require cooperation customers and/or supplier? This is an example
of _______________ risk.
a. Development.
b. Organizational.
c. Market.
Project Management is about doing the right projects, whereas Portfolio Management is about doing
projects right.
a. True
b. False
An innovation focused firm spends more on __________ compared to the average firm.
a. Firm wide infrastructure
b. Transactional systems
c. Informational systems
d. Strategic systems
Which element of the IT investment portfolio is about the long-term strategy of the firm?
a. Firm wide infrastructure
b. Transactional systems
c. Informational systems
d. Strategic systems
In the service center approach to IT chargeback, IT units offer services for a price where the
price is set to recover the IT unit's costs of providing the service.
a. True
b. False
If the IT and the user organizations understand IT costs because of the IT chargeback system in
place, then the IT chargeback system is likely to lead to better IT decisions.
a. True
b. False
In the profit center approach to IT chargeback, IT units offer services for a price where the price
is set based on the market price for the same service.
a. True
b. False
If the IT chargeback system suggests that the IT organization has been continuously reducing
the price for an IT service and the price charged compares favorably with the market price for
the service, then the IT chargeback system is likely to lead to a higher reputation for
competence for the IT organization.
a. True
b. False
If users believe that leaning to use the new information system is going to cost significant time and effort
on their part, it is rational on their part to resist the implementation of the new system.
a. True
b. False
In the demand driven model of user adoption, if a user believes that many other users are adopting the
new system, they are less likely to themselves adopt the new system.
a. True
b. False
Top management support is more important in information systems implementations when task
interdependence is low than when task interdependence is high.
a. True
b. False
If users have invested significant time and effort to learn and master using the current system, they are
more likely to resist the implementation of a new system:
a. True
b. False
In the supply driven model of user adoption, institutions that remove knowledge barriers reduce
the adoption of new systems.
a. True
b. False
Users find it easier to learn from and solve problems with the help of peers and coworkers than with
help form external consultants and the internal help desk.
a. True
b. False
The role of management in the learning approach to implementing a new system emphasizes:
a. Providing clear purpose, scope, and resources to implement the new system.
b. Creating an environment where new capabilities are developed and knowledge is shared.
In the learning approach to implementing a new system, users are more likely to learn to use the new
system from ____________________.
a. External consultants and power users.
b. Self discovery and from peers.
The use of outsiders and new management team is more appropriate for the implementation of
___________.
a. Evolutionary change.
b. Revolutionary change.
In what deliverable does a PM identify phases & deliverables, create WBS, estimate tasks, create
dependencies, and assign people to tasks?
a. Work Plan
b. Triple Constraint
c. Critical Path
What diagram includes a system, external entities, processes, boundaries, inputs, and outputs?
a. Swim-lane diagram
b. Context diagram
Which of the following is a good sample syntax for writing a good requirement.
a. [Condition] [Subject] [Action] [Object] [Constraint]
b. [Subject] [Condition] [Action] [Object] [Constraint]
Which of the following is a good sample syntax for writing a good requirement.
a. [Subject] [Action] [Subject] [Value]
b. [Condition] [Action or Constraint] [Value]
Which traceability method identifies the gold-plating example given at the beginning of the module
video?
a. Forward Traceability
b. Backward Traceability
In a use case, what level of detail has exhaustive, numbered steps with data flows?
a. Fully-dressed
b. Casual
c. Briefs
What are the two major types of relationships among use cases?
a. <<extend>> <<include>>
b. <<exclude>> <<include>>
When balancing DFDs and ERDs, what will data stores & some external entities become in an ERD?
a. Entities
b. Attributes
When balancing DFDs and ERDs, what will data flows become in an ERD?
a. Entities
b. Attributes
Business Process Model and Notation includes which of the following components?
a. A start event, sequence flow, task, gateway "decision", and end event
b. A boundary, external entities, inputs, and outputs
What refers to the maximum number of times an instance in one entity can be associated with instances
in the related entity?
a. Modularity
b. Cardinality
What type of entity instances store attributes that are common to one or more entity subtypes?
a. Supertype
b. Subtype
What type of entity instances may inherit common attributes from its entity supertype?
a. Supertype
b.Subtype
In Object-Oriented Programming, an object is kind of person, place, event, or thing about which
we want to capture.
a. True
b. False
An application for a fast food chain models each user with a class. Any user can apply a 5% off
coupon code when ordering a meal above $10 (represented by a class labelled User), however
users that pay a monthly fee can also apply a 10% off coupon code when ordering any menu
item from the store and are represented by a subclass of User labeled specialUser. Is this an
example of inheritance?
a. Yes
b. No
Online retailers frequently implement systems that recommend other products to customers
based on their previous purchase history, what time of year they made the purchase, what other
customers frequently bought in addition to the customers purchase, and other data relating to
the purchase. This is an example of:
a. Business Intelligence Architecture
b. Operational Architecture
The Business Analyst is involved with preparing the technology during the migration plan.
a. True
b. False
The Maintenance phase in the SDLC described in this course is the longest and costliest phase.
a. True
b. False
What are some of the roles of the Project Manager during ERP implementation?
a. Assess the risks of the implementation in terms of cost and duration
b. Secure resources for the implementation team
c. Purchase and select the right ERP system
d. A and B only
What are the two definitions of Enterprise System mentioned in the class?
a. ERP is an expensive systems used by large companies
b. ERP is a system that supports end-to-end business processes
c. ERP is a technology strategy in which operational business transactions are linked to
financial transactions
d. A and B only
e. B and C only
Fields of master data can be different across organizational units (e.g., plants).
a. True
b. False
The good issue step is performed to indicate that a focal company has fulfilled their part of the
transaction by shipping goods to the customer.
a. True
b. False
What are possible scenarios in which delivery and billing documents are combined?
a. Two separate deliveries to the same customer made on different days are consolidated into
one billing document
b. Two separate deliveries to different customers made on different days are consolidated into
one billing document
c. A delivery to a customer is being split into two billing documents to be paid by different
departments of the customer company
d. A and C only
According to the Clash of Titan report presented in the video, which ERP vendor has the market share?
a. Oracle
b. Infor
c. Microsoft Dynamics
d. SAP
Completion of vision in the magic quadrant refers to whether a ERP vendor/provider has a good
understanding of the industry to provide ERP features that meets their future needs.
a. True
b. False
If my company has many specialized and sophisticated business processes, and is operating in a business
environment causes rapid changes to business needs, what type of ERP should I shortlist based on the
magic quadrant?
a. Leaders
b. Challengers
c. Visionaries
d. Niche Players
If I run a simple business that does not have complicated business processes and is not
subjected to rapid changes in the business environment, I should shortlist ERPs from the
_________ quadrant.
a. Leaders
b. Challengers
c. Visionaries
d. Niche Players
If a company buys all its ERP module from a single vendor, it is said to be pursuing a
a. Best of Suite Strategy
b. Best of Breed Strategy
c. All of the above
In the opening case of Target's ERP implementation, what were the bad managerial decisions
made that led to a failed outcome?
a. Top management decided to pursue an aggressive and tight implementation timeline.
b. When populating the ERP system, mid-managers utilized the benchmark figures from the US
operations to forecast the sales demand in Canada
c. Appropriate checks and balances are not in place, leading store managers to turn off auto-
replenishment feature in the system.
d. All of above
Change Management is:
a. People side of technology project
b. A systematic approach to dealing with change
c. Only appropriate for ERP-related projects
d. A and B only
When assessing the possible areas of changes during an ERP implementation, it is important to consider
elements of
a. People
b. Process
c. Technology
d. All of above
Constant communication of project benefits to the users and a clear illustration of milestones are useful
change management techniques for keeping motivation levels high during ERP implementation.
a. True
b.False
Workers do not need time to adjust to newly implemented ERP if they are well-trained to use the new
system prior to its launch.
a. True
b. False
A large company with operations in multiple countries has just finished upgrading its legacy
system to an Oracle ERP system. The consultant team believes that the risk of go-live problems
can be subtantial, given that there are multiple interdependencies across business units. What
might be a good approach in the roll out of this system?
a. Big Bang
b. Phased Approach
A retail company has zero experience with ERP implementation. They have hired an external
consultant to help them with the implementation of SAP. The retail company is very amendable
to the recommendations provided by their consultants. What role should the consultants take
on, in general?
a. Foot soldiers
b. Commanders
c. Diplomats
A client company wanted to implement a large scale ERP system. The project scope appears to
be highly uncertain and the client does not seem to know what features are to be included in the
final deliverable. What would be a good pricing model to use here when charging the client?
a. Fixed Price
b. Time and Material
Why does the opex model (such as pay-as-you-go) work for the cloud providers?
a. It allows them to generate a steady source of revenue over time from their clients
b. It allows them to offer freemium model to potential clients who can try out the service without
significant commitment
c. It allows them to offer any available resources on-demand and charge based on usage
d. All of the above
Which of the following is used to distribute incoming requests among various servers that form a
computer cluster?
a. Hypervisor
b. Load balancer
c. Database
d. None of the above
Which kind of infrastructure will you prefer if you are operating a business in which some
applications have to comply with strict regulatory compliance requirements on data security,
while others require automated scalability and load balancing?
a. Fog computing
b. Private Cloud
c. Public Cloud
d. Hybrid Cloud
You are the CIO of a company that wants to create a new software application that would require
customizing the operating system for optimal performance. What kind of cloud service are you basically
looking for?
a. SaaS
b. PaaS
c. IaaS
Which of the following statements is true about base stations in a cellular network?
a. Base stations provide coverage over the area of a cell
b. Base stations will use different frequencies in adjacent sectors
c. Adjacent base stations participate in the handover process of ongoing mobile conversations
d. All of the above
Suppose an airport is using RFID tags on ventilation units for monitoring and reporting of their
functional status, PDAs for technicians, and SAP Mobile Asset Management software. Which of
the following activities can be achieved using these solutions?
a. Inspectors can easily check the status of the units from the ground without having to get up
and manually inspect them, thus increasing operational efficiency.
b. Automatic reporting from the ventilation units will improve error-free reporting and safety of
the building.
c. Automatic reporting also serves as evidence for genuine repairs
d. All of the above
Which of the following will be most useful for enabling wider usage of QR codes?
a. Include built-in QR scanner app in the smartphones
b. Encourage creation of ad-supported third-party apps for QR code scanners
c. Encourage creation of QR code scanning app by individual vendors
d. None of the above
Which of the following statements is NOT true about WiFi networks?
a. WiFi operates in an unlicensed spectrum band
b. WiFi and cellular networks use the same set of frequencies
c. WiFi is an example of Wireless Local Area Networks (WLAN)
d. All of the above
Which of the following is the primary technology used in a mobile payment system like Apple
Pay?
a. Near Field Communication (NFC)
b. QR code
c. Radio Frequency Identification (RFID)
d. None of the above
A shopping mall plans to send targeted offers to customers connected to their WiFi
network. Which type of data about the customer will be most valuable to send these
offers?
a. Time of day
b. Geolocation
c. Weather
d. None of the above
Which of the following issues cannot be addressed effectively with flat rate pricing of network
bandwidth?
a. There is a large differential between peak and off-peak hour demand
b. Some users are consuming a disproportionate amount of bandwidth in peak time
c. Some applications are poorly designed and consume too much bandwidth
d. All of the above
Denial of service (DOS) security attacks are intended to compromise a system's _______.
a. Confidentiality
b. Availability
c. Integrity
d. Authenticity
Which of the following techniques system administrators use to reduce the risk of password
hacking?
a. Preventing users from using alphanumeric passwords
b. Enforcing a cap on the number of password retries at login before the account gets locked
c. Encouraging usage of easy to remember dictionary words as passwords
d. All of the above
Which of the following statements about basic encryption techniques NOT true?
a. The key used in Caesar cipher should be kept private between the sender and the receiver
b. The key used in Caesar cipher should be made publicly available to allow the receiver to
decrypt the message
c. The keys used in one-time pads need to be kept private between the sender and the receiver
d. The keys used in one-time pads are a pre-selected sequence of random numbers
Which of the following statements about private key cryptography is true?
a. The same key is used by both the sender and the receiver to encrypt and decrypt a message
b. The sender uses one key to encrypt a message and the receiver uses another key to decrypt
it.
c. The sender and the receiver do not have to agree upon a shared key in advance
d. All of the above
In case of digital signatures, which of the following statements will be true? (Digital signatures
are not meant to be secret messages, instead they are used to demonstrate that the message
must have originated from a particular sender who signed it).
a. The message will need to be encrypted using the sender's private key. Anyone can then use
the sender's public key to decrypt it, and thereby verify that it must have been encrypted
(signed) by that particular sender.
b. The message will need to be encrypted using the sender's public key. Anyone can then use
the sender's private key to decrypt it, and thereby verify that it must have been encrypted
(signed) by that particular sender
Which of the following statements is NOT true about these cyber defense systems?
a. Honeypots are legitimate parts of the site that are actually isolated and monitored,
and act as traps for attackers
b. Honeypots can be used to learn about organization's security weaknesses
c. Intrusion detection systems cannot look inside the contents of the data packets, and
therefore only use traffic filtering rules.
d. None of the above
Which of the following should be practiced to prevent confidential data loss from cyberattacks?
a. Store the encrypted data and the encryption key at different locations
b. Use a two-factor access control
c. Limit third-party access to the internal network
d. All of the above
The type of disclosure process in which a new bug discovery is first reported to the software vendor
whose product contains the bug is known as:
a. Responsible Disclosure
b. Full Disclosure
c. Market Disclosure
d. None of the above
Suppose the requirements that your organization has in regards to storing transaction information can
be met with either a traditional database or a blockchain. Which one should you choose?
a. Traditional database
b. Blockchain
Which of the following roles handles the project's work plan, triple constraint, risk, communication, and
critical path?
a. Business Analyst
b. Project Manager
c. Systems Analyst
Which of the following is a good sample syntax for writing a good requirement
a. [Condition] [Subject] [Action] [Object] [Constraint]
b.[Condition] [Action or Constraint] [Value]
c. [Subject] [Action] [Value]
d. All of the above
What is the key difference between context diagram and process flow diagram?
a. Context diagram depicts data flows, sequences of events are not depicted. Process
flow depicts the process. Non-data elements are included. Sequence matters.
b. Process flow diagram depicts data flows, sequences of events are not depicted.
Context diagram depicts the process. Non-data elements are included. Sequence
matters.
What type of DFD focuses on the business and business activities?
a. Logical DFD
b. Physical DFD
What is used to describe a person, place, object, event or concept about which data are to be
maintained?
a. Entity
b. Crow's foot
What refers to the maximum number of times an instance in one entity can be associated with instances
in the related entity?
a. Cardinality
b. Modularity
When balancing DFDs and ERDs, what will data stores & some external entities be represented as in an
ERD?
a. Entities
b. Attributes
A video game is programmed to offer 3 different membership options based on different monthly
subscriptions: Gold, Silver, and Bronze members. In Object-Oriented Programming, each type of member
would be considered instances of a:
a. Class
b. Method
Suppose we wanted to use inheritance to store different types of vehicles for a program being
used by a car dealership. If Car, Truck, and Van were subclasses in the program, with Audi and
Chevrolet being subclasses of the Car class, what should be the superclass?
a. Car Dealership
b. Vehicle
c. Customer
A program for ordering food online on a restaurant's website is currently being tested. The project leader
wants to test an instance where a customer wants to know what appetizers pair well with a given entree.
This is an example of a Use Case.
a.True
b. False
Which of the three dimensions do Business Analysts focus on during the migration plan (mark all that
apply)?
a. Preparing the Business
b. Preparing the Technology
c. Preparing the People
d. A and C only
The Maintenance phase is not included in the SDLC described in this course but it is equally important.
a. True
b. False
What are some work positions that are available in companies that develops and sells ERP Systems?
a. Sales Associate
b. Functional Consultant
c. System Architect
d. Project Management
e. All of above
If my company does not develop or sell ERP systems, it is likely that I do not need to learn or use ERP
systems?
a. True
b. False
Having seen the various potential issues related to the completion of an order fulfillment
process, which of the following is a good reason why ERP systems might help companies in this
business process?
a. ERP systems are expensive systems. By owning an ERP, companies can show their
customers that they have good financial health
b. ERP systems can help sales associates make better decisions by presenting information on
stock availability and the credit-worthiness of customers
c. Since most other companies are using ERPs, it will look bad if a company does not own an
ERP
In this class, we would learn to program and code ERP software.
a. True
b. False
When workers work in a department within the company, they get to specialize in one
area of work. This style of working is adopted by many companies, and it does not bear
any issues.
a. True
b. False
Storage locations are the places where stock is physically kept within a plant.
a. True
b. False
What are common types of Distribution Channels within SAP?
a. Wholesale
b. Retail
c. Internet
d. All of Above
Which are the top three ERP vendors? Check all that apply.
a. Oracle
b. Microsoft Dynamics
c. Sage
d. SAP
e. A, B and D
Which ERP offerings are provided by SAP? Check all that apply.
a. Business All-In-One
b. Business One
c. By Design
d. All of the above
Business Process Model and Notation includes which of the following components?
a. A start event, sequence flow, task, gateway "decision", and end event
b. A boundary, external entities, inputs, and outputs
What refers to the maximum number of times an instance in one entity can be associated with instances
in the related entity?
a. Modularity
b. Cardinality
What type of entity instances store attributes that are common to one or more entity subtypes?
a. Supertype
b. Subtype
In Object-Oriented Programming, an object is kind of person, place, event, or thing about which we want
to capture.
a. True
b. False
An application for a fast food chain models each user with a class. Any user can apply a 5% off
coupon code when ordering a meal above $10 (represented by a class labelled User), however
users that pay a monthly fee can also apply a 10% off coupon code when ordering any menu
item from the store and are represented by a subclass of User labeled specialUser. Is this an
example of inheritance?
a. Yes
b. No
Online retailers frequently implement systems that recommend other products to customers
based on their previous purchase history, what time of year they made the purchase, what other
customers frequently bought in addition to the customers purchase, and other data relating to
the purchase. This is an example of:
a. Business Intelligence Architecture
b. Operational Architecture
The Business Analyst is involved with preparing the technology during the migration plan.
a. True
b. False
What are some of the roles of the Project Manager during ERP implementation?
a. Assess the risks of the implementation in terms of cost and duration
b. Secure resources for the implementation team
c. Purchase and select the right ERP system
d. A and B only
What are possible scenarios in which delivery and billing documents are combined?
a. Two separate deliveries to the same customer made on different days are consolidated into
one billing document
b. Two separate deliveries to different customers made on different days are consolidated into
one billing document
c. A delivery to a customer is being split into two billing documents to be paid by different
departments of the customer company
d. A and C only
In the opening case of Target's ERP implementation, what were the bad managerial decisions
made that led to a failed outcome?
a. Top management decided to pursue an aggressive and tight implementation timeline.
b. When populating the ERP system, mid-managers utilized the benchmark figures from the US
operations to forecast the sales demand in Canada
c. Appropriate checks and balances are not in place, leading store managers to turn off auto-
replenishment feature in the system.
d. All of above
Constant communication of project benefits to the users and a clear illustration of milestones are useful
change management techniques for keeping motivation levels high during ERP implementation.
a. True
b.False
A large company with operations in multiple countries has just finished upgrading its legacy
system to an Oracle ERP system. The consultant team believes that the risk of go-live problems
can be subtantial, given that there are multiple interdependencies across business units. What
might be a good approach in the roll out of this system?
a. Big Bang
b. Phased Approach
A client company wanted to implement a large scale ERP system. The project scope appears to
be highly uncertain and the client does not seem to know what features are to be included in the
final deliverable. What would be a good pricing model to use here when charging the client?
a. Fixed Price
b. Time and Material
You are the CIO of a company that wants to create a new software application that would require
customizing the operating system for optimal performance. What kind of cloud service are you basically
looking for?
a. SaaS
b. PaaS
c. IaaS
Which of the following statements is true about base stations in a cellular network?
a. Base stations provide coverage over the area of a cell
b. Base stations will use different frequencies in adjacent sectors
c. Adjacent base stations participate in the handover process of ongoing mobile conversations
d. All of the above
Suppose an airport is using RFID tags on ventilation units for monitoring and reporting of their
functional status, PDAs for technicians, and SAP Mobile Asset Management software. Which of
the following activities can be achieved using these solutions?
a. Inspectors can easily check the status of the units from the ground without having to get up
and manually inspect them, thus increasing operational efficiency.
b. Automatic reporting from the ventilation units will improve error-free reporting and safety of
the building.
c. Automatic reporting also serves as evidence for genuine repairs
d. All of the above
Which of the following issues cannot be addressed effectively with flat rate pricing of network
bandwidth?
a. There is a large differential between peak and off-peak hour demand
b. Some users are consuming a disproportionate amount of bandwidth in peak time
c. Some applications are poorly designed and consume too much bandwidth
d. All of the above
Suppose your organization needs multiple people to store and update transaction records while ensuring
immutability. Which one should you choose?
a. Traditional database
b. Blockchain
Suppose your organization needs to store transaction data that should be kept private,
immutable, verifiable, but also control who can read and write to it in order to maintain
scalability. What should you choose?
a. Traditional database
b. Permissioned blockchain
c. Public blockchain
d. None of the above
Agile and Waterfall are complementary methodologies that are best used together.
a. True
b. False
Which traceability method identifies the gold-plating example at the beginning of this video?
a. Forward Traceability
b. Backward Traceability
In a use case, what level of detail has exhaustive, numbered steps with data flows?
a. Fully-dressed
b. Casual
c. Briefs
What are the two major types of relationships among use cases?
a. <<extend>> <<include>>
b. <<exclude>> <<include>>
Based on these two business processes, we see that a business process is initiated based on a trigger
event.
a. True
b. False
Plants in SAP can be used to represent:
a. Retail Stores
b. Factories
c. Distribution Centers
d. B and C only
Which ERP offerings are provided by MS Dynamics? Check all that apply
a. GP
b. NAV
c. AX
According to the Clash of the Titans article, what are important factors to consider when selecting a ERP
system?
a. Market share
b. Country of ERP company
c. Cost of Ownership
d. A and C only
The magic quadrant can be used to shortlist viable options for companies.
a. True
b. False
Ability to execute in the magic quadrant refers whether an ERP system bears certain features for
addressing specific business needs of operating in an industry.
a. True
b. False
What are the four types of ERPs under the Magic Quadrant? Check all that apply.
a. Leaders, Visionaries, Niche Players, Challengers
b. Leaders, Visionaries, Masters, Defenders
c. Leaders, Strategists, Niche Players, Challengers
d. Leaders, Masters, Defenders, Strategists
What might be an industry that would find ERPs falling in the Visionary quadrant to be most
appropriate?
a. Online platforms that offer home-sharing features (e.g., Airbnb)
b. Large retail business (e.g. Walmart)
The CRM module is not redundant because it can handle sophisticated fulfillment tasks that are not
provided by the basic fulfillment feature offered by the core ERP module.
a. True
b. False
What are the important components to consider within change management with respect to ERP
implementation? Check all that apply.
a. Communication
b. Money
c. Training
d. Process Change
e. A, C and D
Companies tend to underestimate the amount of change that is involved with ERP
implementation. To help companies consider the various possible types of changes that are
involved, we have just talked about 4 levels of change. In particular, which level of change does
structure and culture belong to?
a. Level 1
b. Level 2
c. Level 3
d. Level 4
A good approach to utilize leadership support is to utilize a communication protocol that explains
the importance of the ERP and describes the implementation needs to the senior management,
so that they can motivate the rest of organization in committing their time to the ERP
implementation project.
a. True
b. False
Companies typically do not experience disruption to their productivity after ERP implementation, if they
do a good job with change management.
a. True
b. False
Over the last 5 minutes, what are some of the discussed techniques that can help to increase
the likelihood of ERP implementation success?
a. Rigourous Scope Management
b. Early exposure to User Interface/System
c. Use of Agile Methodology in Implementation
d. Selecting the right ERP system using the Magic Quadrant
e. A, B and C
What are the approaches in rolling out the ERP systems? Check all that applies.
a. Slow and steady rollout
b. Big Bang
c. Phase rollout
d. B and C only
What are some advantages of using a single instance ERP? Check all that applies.
a. Allows data and business activities to be consolidated across different business units
b. Lower maintenance cost
c. Enable Strategic Vision
d. All of the above
What are various types of partnership roles that implementation partners could play?
a. Foot soldiers
b. Service providers
c. Commanders
d. Diplomats
e. A, C and D
Virtualization can be used to create a layer of separation between the hardware and the operating
system and software running on it.
a. True
b. False
Which of the following issues can have a negative impact if a company moves its services to the
cloud without full considerations?
a. The company did not pay attention to data format compatibility issues before choosing a
cloud provider
b. The company has private data assets but has not addressed data ownership issues with the
chosen cloud provider
c. The company has not considered whether their cloud provider will be able to grow and scale
up at the same pace as that of the company's growth over a long-term horizon.
d. All of the above.
All these VMs are sharing the resources provided by the actual host machine.
a. True
b. False
For a client with limited IT expertise, a Type 2 hypervisor will be easier to install than a Type 1 hypervisor.
a. True
b. False
You are the CIO of a company that wants to create a new software application without having to
worry about purchasing and maintaining all the required underlying hardware infrastructure
(e.g., network, storage, processor, bandwidth) and operating system support software (e.g., OS
updates, antivirus) etc. What are you basically looking for?
a SaaS
b PaaS
c IaaS
A public cloud option may be more suitable for an organization than using a private cloud when it needs:
a Greater control
b Lower latency
c Higher elasticity
d Better performance
The mobile phones we carry today have more computing power than the computers used for the Apollo
11 to land on the moon.
a. True
b. False
Which of the following technology can be used inside a store to track which aisle a customer is in?
(a) Barcode on each product
(b) QR code on each product
(c) RFID tag on a shopping cart
(d) Geolocation data from cell phone
Which of the following is an example of attack involving impersonation or spying on ongoing data
exchanges?
(a) IP Spoofing
(b) Packet Sniffing
(c) Man-in-the-Middle
(d) All of the above
Share
PlayVolume5:31/5:45SubtitlesSettingsFull Screen
Which of the following statement about cipher based encryption is NOT true?
(a) Caesar ciphers shift the alphabetical letters by a number (key) that is known only to
the sender and the receiver of a message.
(b) A key challenge with Caesar cipher and its variants is the need to share the key in
advance in a trusted environment
(c) Caesar cipher is a stronger encryption technique than one-time pads
(d) Perfect one time pads can be unbreakable because of the computational power
needed
c
Which of the following private key
Which of the following private key based data encryption system is the strongest?
(a) DES
(b) 3DES
(c) AES
(d) All of them are of similar strength
Which of the following statements about public key cryptosystem is NOT true?
(a) Message can be encoded with one key (either of the two) and decoded with the other
(b) Message can only be encoded with the private key and decoded with the public key, not vice
versa
(c) Someone can know the public key, but that should not allow him or her to deduce the private
key
(d) It can be used for encryption as well as in authentication and digital signatures
Which of the following should be AVOIDED to prevent confidential data loss from cyberattacks?
(a) Store the encrypted data and the encryption key at different locations
(b) Store the encrypted data and the encryption key at the same location
(c) Use a two-factor access control
(d) Limit third-party access to the internal network
The type of disclosure process in which a new bug discovery is reported right away to the public is
known as:
(a) Responsible Disclosure
(b) Full Disclosure
(c) Market Disclosure
(d) None of the above
Attackers can exploit gaps in cross-organizational processes more easily when algorithmic decision-
making is involved. Which of the following technology may best help to address some of these concerns?
(a) Blockchain
(b) Cloud computing
(c) Internet of Things
(d) None of the above
Which of the following statements provides a valid reason in favor of blockchains over traditional
databases?
(a) Traditional databases are not capable of storing transaction information
(b) Transaction data stored in a traditional database can be validated by anyone but blockchains
offer a more closed solution that increases security.
(c) Transaction data are stored in a traditional database under the control of a single
administrator who needs to be trusted, whereas blockchains create a distributed ledger that can
be validated by anyone.
(d) All of the above
Which of the following statements about the steps of Bitcoin mining is NOT true?
(a) Bitcoin miners scoop up a whole bunch of transaction requests that they process
(b) Bitcoin miners check to ensure that the digital signatures are valid and that there are enough
bitcoins in the wallet for a valid transaction.
(c) Miners compete globally to produce blocks of validated transactions. The first miner to
produce a valid block of transactions earns bitcoins and their block is added to end of the
blockchain.
(d) All the miners participated in mining will get an equal share of the bitcoins for participating in
the computation process.
In the context of the irreversibility of blockchains, which of the following statement is NOT true?
(a) The process of adding blocks to a blockchain is such that it is very expensive - in terms of
computational power, and hence, electricity - to add new blocks and even more so to change
blocks further back in the chain.
(b) Any miner trying to add a new block of data is required to provide a cryptographic proof
called Proof of Work.
(c) To produce the Proof of Work, a miner will have to perform multiple rounds of hashing with
the data of the previous block such that the resultant hash value begins with a specified number
of zeros.
(d) A miner predicts what hash values will be produced and adjusts the data used in the hashing
process.
College diplomas, transcripts, and other educational records are being tracked and stored in Blockchains
because they provide easy accessibility, verifiability and immutability of data.
a. True
b. False
Suppose your organization has data needs to be secured and stored centrally. What technology
option should you use?
(a) Traditional Database
(b) Blockchain
Suppose multiple stakeholders in a supply chain need to update some records in a dynamic
manner but they all want verifiability and immutability of the data. What technology option
should you use?
(a) Traditional Database
(b) Blockchain
Which of the following statements is true?
(a) Cheap land, cheap electricity, and easy access to advanced hardware vendors for
customization are beneficial for blockchain mining.
(b) As applications of Blockchains continue to grow, the energy consumption for the computation
will be a key factor for enterprises to consider.
(c) Smaller scale permissioned blockchain that limit participation to trusted miners can reduce
computational overhead and energy needs.
(d) All of the above.
IT Portfolio management means that the IT investment portfolio of a firm must be continuously evolving
with time.
a. True
b. False
Prior research suggests that if the user organizations are presented with an IT service
that has a price associated with it, it reduces the demand for the IT service.
a. True
b. False