TUESDAY: 2 August 2022. Morning paper. Time Allowed: 2 hours.

Answer ALL questions. Each question is allocated two (2) marks.

1. Which of the following defines the sequence of activating Strategic management process?
A. Environmental scanning, Strategy formulation, Implementation, control and evaluation
B. Strategy formulation, Environmental scanning, Implementation, control and evaluation
C. Environmental scanning, Strategy Implementation, formulation, control and evaluation
D. Strategy formulation, Implementation, control, evaluation, Environmental scanning

2. A sustained or sustainable competitive advantage requires that_________________
A. The value creating strategy be in a formulation stage
B. Competitors implement the strategy
C. Other companies not be able to duplicate the strategy
D. Average returns be earned by the company

3. Which of the following regarding corporate governance is true?
A. Corporate governance can temper growth
B. Good corporate governance can result in excessive risk-taking
C. Corporate governance often results in prompt and effective decision-making
D. The aim of corporate governance is to protect the interests of shareholders and the local economies

4. Managing business strategy involves the entire cycle of planning and control, at a strategic level

5. _________ refers to redefining how companies gets paid or creates innovative new revenue streams of business innovations.
A. Value capture dimension
B. Brand dimension
C. Networking dimension
D. Offerings dimension

6. A reason why the problem of implementation is likely to be more serious when the adopter is an organisation rather than an individual is_____________
A. Implementers are the same people as the decision makers
B. Organisational structure often lends to instability
C. Organisational structure often resists the implementation of innovation
D. Organisational structure often lends to stability

7. The following are business drivers for an information system EXCEPT_____________
A. Business process redesign
B. Knowledge asset management
C. Proliferation of networks and the internet
D. Security and Privacy

8. ___________is the person who ensures that systems are developed on time, within budget, and with acceptable quality
A. Systems Designer
B. Project Manager
C. Systems owner
D. External System User

9. ______________are the decision makers who are concerned with tactical (short-term) operational problems and decision making
A. Middle Managers
B. Executive Managers
C. Supervisors
D. Mobile Managers

10. ____________is the most relevant in improving a business process performance
A. Input
B. Processing
C. Control and feedback
D. Output

11. ____________is essential in monitoring the legal constraints in which a company operates
A. A company’s customers
B. A company’s outputs
C. A company’s macro-environment
D. A company’s micro-environment

12. ___________is an information system that support the business functions that reach out to suppliers
A. Back Office Information Systems
B. Decision Support Systems
C. Expert Information Systems
D. Front Office Information Systems

13. ___________refers to the extent to which technology permeates an area or department
A. Technology diffusion
B. Technology infusion
C. Technology collusion
D. Technology fusion

14. ___________is the Information System (IS) strategy tool that reviews the current and future importance of IS
A. Five forces analysis
B. Value chain analysis
C. McFarlans strategic grid
D. Porter’s competitive strategies

15. Which of the following statement is TRUE regarding business impacting IS Strategy?
A. IS strategy is formulated according to business objectives
B. IS Strategy is independent of business strategy
C. Business strategy is independent of IS strategy
D. IS Strategy strongly influences business strategy?

16. _____________is an applications portfolio analysis category where IS are of low current and low future significance to business performance
A. High potential system
B. Support system
C. Key operational system
D. Strategic system

17. Information Systems Strategy must address___________
A. Selection of Future Applications for Organisation
B. Information policy
C. Quality of service delivery
D. Delivery of Value to Business from Applications Portfolio

18. ___________is an approach to IS Strategy with distributed control and resource
A. Outsourced IS management
B. Insourced IS management
C. Centralised IS management
D. Decentralised IS management

19. An organisation’s strategy
A. Remains set in place longer than the mission and objectives
B. Generally, forms over a period of time as events unfold
C. Tends to be formed at the same time the mission is developed and objectives are formulated
D. Is usually conceived at a single time when managers sit down and work out a comprehensive strategic plan for the next 3-5 years

20. _____________is a general direction set for the company and its various components to achieve a desired state in the future
A. Goal
B. Objectives
C. Mission
D. Strategy

21. The determination of the basic long-term goals and the objectives of an enterprise, and the adoption of courses of action and allocation of resources necessary for carrying out these goals is called____________________
A. Policies framing
B. Mission statement
C. Target setting
D. Strategic Management

22. Which of the following strategy occupies the highest level of strategic decision making and covers actions dealing with the objective of the firm?
A. Strategic Business Unit
B. Corporate level
C. Functional
D. Operational

23. The fundamental purpose for the existence of any organisation is described by its________________
A. Policies
B. Mission
C. Procedures
D. Strategy

24. Which of the following is not a characteristic of strategic management that makes it different from other types of management?
A. It is interdisciplinary
B. It has an external focus
C. It has an internal focus
D. It concerns the present direction of the organisation

25. The following are major elements of the strategic management process except_______________
A. Formulating strategy
B. Implementing strategy
C. Assigning administrative tasks
D. Evaluating strategy

26. Which of the following is FALSE about competitive advantage_________________?
A. Competitive advantage is what makes an entity’s products or services less desirable to customers than that of any other rival
B. Competitive advantage is what makes an entity’s products or services more desirable to customers than that of any other rival
C. Competitive advantages can be broken down into comparative advantages and differential advantages
D. Comparative advantage is a company’s ability to produce something more efficiently than a rival, which leads to greater profit margins

27. Which one of following is the primary focus of strategic management?
A Strategic analysis
B. The total organisation
C. Strategy formulation
D. Strategy implementation.

28. A ___________ is a part of a business plan. While the business plan sets the goals and objectives, it gives you a way to fulfil those goals. It is a plan to reach where you intend to as an organisation
A. Business strategy
B. Corporate strategy
C. Functional strategy
D. Operational strategy

29. __________________is NOT a primary task of strategic management
A. Establishing strategic objectives
B. Developing the steps to follow in implementing operational level plans
C. Defining the business and developing a mission
D. Developing a strategy

30. _________________ are most responsible for the success and failure of an organisation.
A. Strategists
B. Financial planners
C. Personnel directors
D. Stakeholders

31. Which of the following is NOT a stage of strategy formulation techniques?
A. Formulation Framework
B. Matching stage
C. External factor evaluation
D. Decision stage

32. __________________ is not one of the underlying principles of the corporate governance combined code of practice?
A. Accountability
B. Openness
C. Acceptability
D. Integrity

33. Corporate Governance is defined as ethical corporate behavior by directors or other staff charged with governance in the creation and presentation of wealth for all stakeholders

34. An organisation’s ______________ embraces the behavior, rituals and shared meaning held by employees that distinguishes the organisation from all others
A. External environment
B. Culture
C. Dominant culture
D. Ethics

35. ________________refers to a cyber security issue where a person is constantly followed/chased by another person or group of several peoples?
A. Phishing
B. Bulling
C. Stalking
D. Identity theft

36. Hacking a computer or network can be legal in different cases

37. ____________refers to situation where organisations accept the potential risk and continue operating or to implement controls to lower the risk to an acceptable level
A. Risk assumption
B. Risk avoidance
C. Risk sharing
D. Risk management

38. ____________refers to the process for determining the acceptable level of impact on organisation applications, systems, and business processes.
A. Risk analysis
B. Risk assessment
C. Business impact analysis
D. Project impact analysis

39. Risk management encompasses three processes: risk assessment, risk mitigation, and _________________
A. System development life cycle
B. Risk analysis
C. Evaluation and assessment
D. Threat analysis

40. Risk management is the process that allows IT managers to balance the operational and ______________
A. Cost
B. Technology
C. Mission
D. Politics

41. _________ is the first process in the risk management methodology
A. Records retention
B. Likelihood
C. Fault tolerance
D. Risk identification

42. Innovation can help to provide a temporary competitive advantage when_____________
A. Barriers to entry are high.
B. Barriers to imitation are low and intellectual property rights are difficult to enforce.
C. There are few other competitors.
D. Barriers to entry are low.

43. Outsourcing of innovation globally is more likely where____________
A. Innovations are autonomous
B. Innovations are systemic
C. Innovations are systemic or autonomous
D. Innovations are made by service sector firms

44. Organisations can protect sensitive data from prying eyes using___________
A. File permissions
B. File locks
C. Passwords
D. Encryption

45. _________ is a moral dimension of the information age involving cultural values and practices
A. Information rights and obligations
B. Accountability and control
C. Property rights and obligations
D. Quality of life

46. ____________is a basic ethical concept that means mechanisms are in place to determine who took responsible action or who is responsible for certain actions
A. Responsibility
B. Liability
C. Accountability
D. Due process

47. The commission of acts involving a computer that may NOT be illegal but are considered unethical is known as____________________
A. Computer crime
B. Information privacy violations
C. Lack of accountability
D. Computer abuse

48. ______ refers to a Network or Internet
A. Cloud Computing
B. Cloud
C. Computing
D. Grid

49. In Google App Engine, applications are run in a secure sandboxed environment

50. ____________is comprised of millions of smart devices and sensors connected to the internet
A. IoT
B. Cloud Computing
C. Block Chain
D. Artificial Intelligence

(Visited 151 times, 1 visits today)
Share this:

Written by