ExamGecko
Home Home / GAQM / CITM-001

GAQM CITM-001 Practice Test - Questions Answers, Page 7

Question list
Search
Search

Coordination is a major problem for the global firm.

A.

True

A.

True

Answers
B.

False

B.

False

Answers
Suggested answer: A

Explanation:

Coordination is the process of aligning and integrating the activities, resources, and efforts of different units or individuals within an organization or a network of organizations. Coordination is a major problem for the global firm because it involves managing the complexity, diversity, and uncertainty of operating across multiple countries, cultures, and markets. Global firms face various challenges in coordinating their strategies, structures, systems, processes, and people, such as:

Balancing the need for global integration and local responsiveness, which requires finding the optimal degree of standardization and adaptation of products, services, policies, and practices across different regions and markets.

Managing the trade-offs between centralization and decentralization, which involves deciding how much authority and autonomy to delegate to the local units versus retaining at the headquarters or regional hubs.

Fostering collaboration and communication across geographical, functional, and cultural boundaries, which requires overcoming the barriers of distance, time zones, languages, and norms.

Leveraging the benefits of diversity and avoiding the pitfalls of fragmentation, which entails creating a shared vision, values, and culture that can unify the diverse and dispersed workforce and stakeholders.

Coping with the environmental turbulence and uncertainty, which demands developing the capabilities to sense, respond, and adapt to the changing customer needs, competitor moves, and regulatory requirements.

Coordination is essential for the global firm to achieve efficiency, effectiveness, innovation, and competitiveness in the global market. However, coordination is not easy or costless, as it requires investing in various mechanisms and tools, such as:

Formal structures and systems, such as organizational design, reporting lines, performance measurement, and control systems, that define the roles, responsibilities, and relationships among the different units and individuals.

Informal practices and processes, such as culture, norms, values, and routines, that shape the behaviors, attitudes, and interactions of the organizational members.

Information and communication technologies, such as intranet, email, video conferencing, and social media, that facilitate the exchange of information and knowledge across the organization.

Human resource management, such as recruitment, training, development, compensation, and motivation, that attract, retain, and develop the talent and skills of the global workforce.

Coordination by principles, such as mission, vision, strategy, and goals, that provide the direction, guidance, and alignment for the organization.

Limited access to high speed internet may impede the development of global information systems.

A.

True

A.

True

Answers
B.

False

B.

False

Answers
Suggested answer: A

Explanation:

Global information systems are information systems that span multiple countries, cultures, and organizations. They enable the sharing of data, knowledge, and resources across borders and regions. However, limited access to high speed internet may impede the development of global information systems, as it affects the quality, speed, reliability, and security of communication and collaboration.According to the International Telecommunication Union (ITU), in 2020, only 51.4% of the world's population had access to the internet, and only 19.1% had fixed broadband subscriptions1. This means that many people and regions are still digitally excluded or underserved, especially in developing countries and rural areas. This digital divide may create challenges and barriers for the design, implementation, and management of global information systems, such as:

Lack of infrastructure and resources: Developing and maintaining global information systems requires adequate and stable infrastructure and resources, such as servers, routers, cables, satellites, power supply, bandwidth, etc.However, many regions lack the necessary infrastructure and resources to support high speed internet access, or face high costs and risks of disruption or damage2. This may limit the availability, performance, and scalability of global information systems, and increase the complexity and cost of their development and maintenance.

Lack of interoperability and standardization: Global information systems need to ensure interoperability and standardization among different systems, platforms, protocols, formats, and languages. However, limited access to high speed internet may hinder the adoption and integration of common standards and technologies, such as cloud computing, web services, APIs, etc.This may result in compatibility issues, data inconsistency, and inefficiency of global information systems, and require more effort and coordination to achieve interoperability and standardization3.

Lack of user participation and satisfaction: Global information systems need to consider the needs, preferences, and expectations of diverse and distributed users and stakeholders. However, limited access to high speed internet may affect the user participation and satisfaction of global information systems, as it may reduce the usability, accessibility, and functionality of the systems, and cause delays, errors, or failures of communication and collaboration. This may lead to user frustration, dissatisfaction, and resistance, and lower the adoption and acceptance of global information systems.

Restrictions on Internet access and efforts to censor web sites may impede development of global information system.

A.

True

A.

True

Answers
B.

False

B.

False

Answers
Suggested answer: A

Explanation:

Restrictions on Internet access and efforts to censor web sites may impede the development of a global information system by limiting the availability, diversity, and quality of information that can be accessed and shared across borders. Such restrictions may also hamper the innovation, collaboration, and communication that are essential for the advancement of technology, science, and society. According to the CITM study guide, a global information system is ''a system that collects, processes, stores, and disseminates information that is relevant to the needs of users in different countries'' (p. 26). The benefits of a global information system include ''improved decision making, enhanced coordination, increased efficiency, reduced costs, and greater customer satisfaction'' (p. 26). However, these benefits can be undermined by various forms of internet censorship, such as:

Manipulating search results to favor certain sources or viewpoints, or to hide or distort information that is unfavorable to the censoring authority.

Blocking access to specific sites or domains that contain information that is deemed illegal, immoral, or politically sensitive by the censoring authority.

Shutting off internet access altogether or imposing bandwidth limitations during times of crisis, protest, or conflict to prevent the dissemination of information that could challenge the status quo or mobilize opposition.

Requiring users to register or obtain licenses to access certain sites or services, or to use encryption or VPNs, which can deter or restrict internet usage and expose users to surveillance or prosecution.

Monitoring, filtering, or deleting online content or communications that are considered harmful, offensive, or subversive by the censoring authority, or imposing self-censorship through legal or social pressure.

These forms of internet censorship can have negative impacts on the development of a global information system, such as:

Reducing the amount and variety of information that is available to users in different countries, which can limit their knowledge, awareness, and understanding of global issues and perspectives.

Lowering the quality and reliability of information that is available to users in different countries, which can impair their ability to make informed and rational decisions, or to verify and challenge the information they receive.

Restricting the opportunities and platforms for users in different countries to exchange and share information, ideas, opinions, and feedback, which can hinder their collaboration, innovation, and creativity.

Violating the rights and freedoms of users in different countries to access and express information, which can undermine their participation, representation, and empowerment in the global society.

CITM Study Guide, Chapter 2: Global Information Systems, pp. 25-32

Internet Censorship in 2024: The Impact of Internet Restrictions1

Internet Censorship 2024: A Global Map of Internet Restrictions2

Internet Censorship: Definition, Types, & How It Can Affect You3

How Countries Censor and Control the Internet4

Which three are the business models that an international firm might adhere to? (Choose three)

A.

Intellectual Synergy

A.

Intellectual Synergy

Answers
B.

Independent Operations

B.

Independent Operations

Answers
C.

Integrated Global IT

C.

Integrated Global IT

Answers
D.

Multinational Driven

D.

Multinational Driven

Answers
Suggested answer: B, C, D

Explanation:

According to the CITM study guide, an international firm can adopt different business models depending on its degree of global integration and local responsiveness. The study guide identifies four types of business models: international, multidomestic, global, and transnational. These are similar to the typology of multinational companies proposed by Bartlett and Ghoshal (1989). The study guide defines each business model as follows:

International: The firm operates in multiple countries but has a low degree of global integration and local responsiveness. The firm's subsidiaries are largely independent and follow the parent company's strategy and culture. The firm exploits its core competencies and capabilities across different markets without much adaptation. This business model is also known as theinternational projectoror thecentralized exporter.

Multidomestic: The firm operates in multiple countries and has a high degree of local responsiveness but a low degree of global integration. The firm's subsidiaries are highly autonomous and tailor their products and services to the specific needs and preferences of the local markets. The firm sacrifices efficiency and standardization for differentiation and customization. This business model is also known as themultinational drivenor thedecentralized federation.

Global: The firm operates in multiple countries and has a high degree of global integration but a low degree of local responsiveness. The firm's subsidiaries are highly dependent on the parent company and follow a standardized and centralized strategy and culture. The firm leverages economies of scale and scope to achieve cost efficiency and competitiveness. This business model is also known as theintegrated global ITor thecoordinated federation.

Transnational: The firm operates in multiple countries and has a high degree of both global integration and local responsiveness. The firm's subsidiaries are interdependent and collaborate with each other and the parent company to share and transfer knowledge, resources, and best practices. The firm balances efficiency and adaptation to achieve innovation and learning. This business model is also known as theintellectual synergyor theheterarchical network.

Based on these definitions, the three business models that an international firm might adhere to are B, C, and D. Option A is not a valid business model, but rather a characteristic of the transnational business model.Reference:

CITM Study Guide, Chapter 4: International Business Strategy, pp. 63-66

Bartlett, C.A. and Ghoshal, S. (1989). Managing across borders: The transnational solution.Harvard Business School Press1

In an Integrated Global IT approach the firm must provide more consistent customer service internationally.

A.

True

A.

True

Answers
B.

False

B.

False

Answers
Suggested answer: A

Explanation:

An Integrated Global IT approach is a strategy that aims to align the IT functions and capabilities of a firm with its global business objectives and needs. One of the benefits of this approach is that it enables the firm to provide more consistent customer service internationally, by leveraging common platforms, standards, processes, and data across different regions and markets. This can enhance customer satisfaction, loyalty, and retention, as well as reduce costs and risks associated with IT fragmentation and duplication.Reference:Integrated Global IT approach customer service,Toward an integrated technology operating model,Managing Global Customers: An Integrated Approach,Five steps to an integrated customer experience

Managerial control and coordination are closely related.

A.

True

A.

True

Answers
B.

False

B.

False

Answers
Suggested answer: A

Explanation:

Managerial control is the process of ensuring that the organization's activities and outputs are aligned with its goals and plans. Coordination is the process of integrating the efforts of different units and individuals within the organization to achieve a common purpose. Both control and coordination are essential functions of management that aim to improve the performance and efficiency of the organization. They are closely related because they both involve setting standards, measuring performance, and taking corrective actions.They also both require communication, feedback, and cooperation among the managers and employees12345Reference:

1: The Control Function of Management - MIT Sloan Management Review

2: Managerial Control | Definition, Types & Features - Study.com

3: Relationship between planning and controlling - Management Study Guide

4: Question Bank - Multiple Choice Questions (MCQs) - DACC

5: 4 Different Relationship between Planning and Control Expalined - Toppr

Which management can make use of the managerial hierarchical to obtain approvals or additional guidance?

A.

Higher Level Management

A.

Higher Level Management

Answers
B.

Middle Level Management

B.

Middle Level Management

Answers
C.

Lower Level Management

C.

Lower Level Management

Answers
Suggested answer: C

Explanation:

Lower level management, also known as supervisory or operational management, is the lowest tier of the managerial hierarchy. It consists of managers who oversee the work of employees and report to middle level managers. Lower level managers can make use of the managerial hierarchy to obtain approvals or additional guidance from their superiors when they face problems or challenges that are beyond their authority or expertise. The managerial hierarchy also helps lower level managers to communicate and coordinate with other managers and departments within the organization.Reference:3, CITM Study Guide, Chapter 2: Organizational Structure and Design, Section 2.1: Types of Organizational Structures, Page 18.

Middle managers can establish review committees to foster greater control.

A.

True

A.

True

Answers
B.

False

B.

False

Answers
Suggested answer: A

Explanation:

Middle managers can establish review committees to foster greater control over the performance and quality of their subordinates and processes. Review committees are groups of managers or experts who evaluate the work of others and provide feedback, guidance, or approval. Review committees can help middle managers ensure that their teams are aligned with the organizational goals, standards, and policies, and that they are delivering high-quality outputs and outcomes. Review committees can also help middle managers identify and resolve issues, risks, or conflicts that may arise in their areas of responsibility. Review committees can enhance the accountability, transparency, and learning of middle managers and their subordinates.Reference:EPI-USA, CITM Course Outline, Module 4: Managing Performance and Quality, Slide 14. [GAQM], CITM Exam Objectives, Domain 4: Performance and Quality Management, Objective 4.2: Implement performance and quality management processes and tools.

Data are often proprietary or confidential.

A.

True

A.

True

Answers
B.

False

B.

False

Answers
Suggested answer: A

Explanation:

Data are often proprietary or confidential because they contain valuable information that can give a competitive advantage to the owner or affect the privacy of the individuals or entities involved. Data can be classified into different levels of sensitivity and protection, depending on the potential impact of unauthorized disclosure, modification, or loss. For example, data that contain personal, financial, or health information of customers or employees are usually considered highly confidential and require strict security measures. Data that contain trade secrets, intellectual property, or strategic plans are also typically proprietary and confidential, as they can affect the market position or reputation of the owner. Data that are public or non-sensitive, such as general information about products or services, may not require the same level of protection, but still need to be managed and maintained properly.Reference:CITM Course Outline, Module 6 - Data Management, Section 6.1 - Data Classification and Protection;Sample Exam, Question 72.

Which term describes dormant code added to software and triggered at a predetermined time or by a predetermined event?

A.

Logic Bomb

A.

Logic Bomb

Answers
B.

Keylogger

B.

Keylogger

Answers
C.

Spam

C.

Spam

Answers
D.

Virus

D.

Virus

Answers
Suggested answer: A

Explanation:

A logic bomb is a type of malicious code that is inserted into a software program and remains dormant until a specific condition or event occurs, such as a certain date, time, or user action. When the condition is met, the logic bomb activates and executes its harmful payload, which can range from deleting or corrupting data, to displaying unwanted messages, to crashing the system. Logic bombs are often used by disgruntled employees or hackers to sabotage an organization's IT infrastructure or to extort money or information. Logic bombs are different from keyloggers, spam, and viruses, which are explained below:

A keylogger is a software or hardware device that records every keystroke made by a user on a computer or mobile device, usually for the purpose of stealing passwords, personal information, or other sensitive data. Keyloggers can be installed by hackers through phishing, trojan viruses, or physical access to the device. Keyloggers do not wait for a specific condition to activate, but rather run continuously in the background and transmit the captured data to a remote server or storage device.

Spam is any kind of unwanted, unsolicited, or irrelevant digital communication that is sent or posted to a large number of recipients or places, typically for the purposes of advertising, phishing, spreading malware, or disrupting normal operations. Spam can be delivered via email, text message, phone call, or social media. Spam does not contain hidden code that executes a harmful action, but rather relies on the user's response or interaction to achieve its goal, such as clicking a link, opening an attachment, or providing personal information.

A virus is a type of malware that infects a computer or mobile device by attaching itself to another program or file and replicating itself when the host program or file is executed. A virus can have various harmful effects, such as deleting or modifying data, consuming system resources, displaying unwanted messages, or opening backdoors for hackers. A virus can spread from one device to another through networks, removable media, or email attachments. A virus does not require a specific condition to activate, but rather runs whenever the infected program or file is executed.

Logic Bomb Definition & Meaning - Merriam-Webster

What is a Keylogger? How to Detect a Keylogger? - Fortinet

Spam | What is Spam? | Definition & Types of Spam

Virus | Definition, Structure, & Facts | Britannica

Total 80 questions
Go to page: of 8