Management 1

Is this your test? Login to manage it. If not, you can make an assessment just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
In service management terms, Operational Level agreements are:
2.
1 point
A service is a means of delivering value to a customer by facilitating outcomes customers want to achieve without ownership of specific costs and risks
3.
1 point
Seely, in responding to Carr, argues that significant opportunities for business innovations still occur because IT can offer possibilities which were previously cost prohibitive
4.
1 point
The situation in which one accepts the potential costs duties and obligations for the decisions made is called:
5.
1 point
When companies work with suppliers and buyers to formulate demand forecasts, develop production plans and coordinate shipping, warehousing and stocking activities the process is called:
6.
1 point
The ultimate management challenge for security of information within an organisation is to ensure maximum control in order to secure information assets true or false?
7.
1 point
The EIU's survey on the future role of ICT found that technology initiatives from the ICT organisation were key to the overall success of the organisation true or false?
8.
1 point
Carr argued that Infrastructural Technologies offer far more value when used in isolation
9.
1 point
Security Risk Analysis can be defined as
10.
1 point
According to Carr, the cost savings and interoperability benefits of generic applications, help companies to become more distinctive in their market place
11.
1 point
Security Management is:
12.
1 point
Risk is really about assessing the impacts of change on an organisation?
13.
1 point
The Scope of the service level management process involves the IT services organisation and the customer organisation together with Internal Departments and External Suppliers.
14.
1 point
Change management competency is about?
15.
1 point
After major function systems are in place, horizontal systems are created which automate business processes across:
16.
1 point
In essence a SLA is just another term for a contract for the
provision of services
17.
1 point
Data integrity is concerned with protecting the accuracy and completeness of information and software?
18.
1 point
The model of informed consent prohibiting an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use is called:
19.
1 point
The term innovation is about?
20.
1 point
Which one of the following reasons did Carr give to show that the IT build-out was closer to its end:
21.
1 point
ERP software contains business logic which dictates to a large extent how business processes will be implemented
22.
1 point
Service level management is a process of negotiating defining and managing the levels of IT service that are required and cost justified?
23.
1 point
In data security terms which of the following is not derived from information?
24.
1 point
In information security terms confidentiality means ?
25.
1 point
The set of principles governing the collection and use of information about individuals, which form the basis of most U.S. and European privacy laws, is called:
26.
1 point
SLM is the process of managing a delivered IT service using formal SLA's
27.
1 point
The problem with patent protection is that digital media cannot be patented
28.
1 point
Which of the following is characteristic of a process?
29.
1 point
Confidentiality is concerned with protecting the accuracy and completeness of information and software
30.
1 point
A service Catalogue contains a description of IT services and levels which are specific to a particular area of an org.
31.
1 point
A business function is a collection of related business tasks undertaken to achieve a specific business objective
32.
1 point
The most significant security issue with cloud computing is one of establishing jurisdiction...finding out what law applies to data protection true or false?
33.
1 point
A denial of service attack involves hackers attempting to disrupt a network by hiding their true identity or by misrepresenting themselves
34.
1 point
In Change Management, Role to position mapping is about:
35.
1 point
In essence warranty is what a customer gets and utility is how it is delivered?
36.
1 point
Liability means assessing responsibility for decisions made and actions taken
37.
1 point
Change management is about preparing the organization for the impacts of the new technical architectures which inevitably arise in the majority of ICT enabled projects
38.
1 point
Security Incidents as per ITIL, are:
39.
1 point
The creation of new technology itself increases our capacity for technological innovation?
40.
1 point
The main costs that arise as a result of badly managed change are those upfront costs in implementing the change?
41.
1 point
The co-ordination of the internal processes of the firm by integrating data from manufacturing and distribution, finance, sales and human resources creates a(n)
42.
1 point
Unplanned change can be described as:
43.
1 point
The only meaningful advantage according to Carr, that companies can hope to gain from infrastructural technologies is:
44.
1 point
The ethical No Free lunch rule states that an action must do the least harm or incur the least cost.
45.
1 point
Bounded change is difficult to manage because its scope and impacts cannot be fully determined
46.
1 point
Once a project is well directed and led and once an effective change management program is in place there is almost no boundary to the level of change Which an organisation can achieve?
47.
1 point
Enterprise software:
48.
1 point
In relation to the potential strategic impact of IT, Seely argues that:
49.
1 point
The Statement that if "an action is not right for everyone to take it is not right for anyone to take" is an expression of :
50.
1 point
According to Curely which one of the following is not a purpose of an innovation centre: