MIS 535 Entire Course Managerial Application of Information Technology

profileHelphere
 (Not rated)
 (Not rated)
Chat

MIS 535 Entire Course Managerial Application of Information Technolog
MIS 535 Quiz Week 4
1. (TCO A) Cloud computing
2. (TCO B) Internet technolog
3. (TCO C) Which common database challenge is illustrated by the text's discussion of receiving multiple pieces of
4. (TCO A) List and describe the four information systems serving each of the major functional areas of
5. (TCO B) How have mobile devices and social media changed the…?
6. (TCO C) The small publishing company you work for wants to create a new database for storing information about all of its author contracts. What….
7. (TCO A) Domino's upgraded Pulse Evolution system incorporated a Pizza Tracker functionality that shows the progression of….
8. (TCO B) Internet technology
9. (TCO C) The difference between a data warehouse and a data mart is
10. (TCO A) Networking and telecommunications technologies, along with computer hardware, software, data management….
11. (TCO C) The difference between a data warehouse and a data mart is:
12. (TCO D) Which of the following is not an example of the emerging…..
MIS 535 Week 6 Quiz

1.  The logical view:
2. Data mining is a tool for allowing users to:
3. The data dictionary serves as an important data management tool by
4. The most important communication standard today for linking disparate computers and networks is:
5. Bandwidth is
6. Which technology uses the Internet Protocol to deliver voice information in digital form….?
7. List and describe three main…
8. What types of capabilities does the Internet provide businesses and what Internet protocols or technologies support these?  Which have proven the most valuable to businesses thus far?
9. Why are Information Systems so important?
10. What are the features of an organizations?
11. How can DBMS solve the problems of the….?
MIS 535 Final Exam
1. (TCO A) Which of the following decisions require knowledge based on collaboration and interaction?
2. (TCO B) Which of the following businesses use the market creator business model?
3. (TCO C) The type of logical database model that treats data as if they were stored in two-dimensional tables is the
4. (TCO D) The telephone system is an example of a ______ network.
5. (TCO E) Enterprise applications have become easier to install because
6. (TCO F) Agile Methodologies
7. (TCO G) A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of
1. (TCO A) You work for an auto manufacturer and distributor.  How could you use information systems to achieve greater customer intimacy?
2. (TCO A) You have been hired to work with 10 salespeople from different branches of a national business in creating an online training site for new Sales employees.  Identify six collaboration tools that are available to help the team work together.  Which single tool would be the most helpful for the project, in your opinion, and why?
3. (TCO A) Assess at least two benefits of using enterprise systems
4. (TCO B) You are advising the owner of Small town Computer, a new, local computer repair store that also builds custom computers to order.  What competitive strategies could Small town Computer exert?  Which ones will it have difficulty exercising?
5. (TCO B) Describe four types of application that are especially well-suited for mobile-commerce
6. (TCO B)You are evaluating BI software from a variety of vendors.  Identify six elements in the BI environment.  Use your understanding of the importance of these elements to formulate six questions to ask the vendor in order to determine how their software will interplay with your needs.
7. (TCO C) If you were to design the new contracts database for a publishing house what fields do you anticipate needing?  Which of these fields might be in use in other databases used by the company?
8. (TCO C) What types of relationships are possible in a relational database?  Describe and give an example of each.
9. (TCO C) Describe the ways in which database technologies could be used by an office stationery supply company to achieve low-cost leadership
10. (TCO D) How are RFID systems used in inventory control and supply chain management?
11. (TCO D) What is cloud computing and how do you think its developments could impact businesses?
12. (TCO D) What are the business advantages of using voice over IP (VOIP) technology?  
13. (TCO E) Distinguish between grid computing, cloud computing, and utility computing   
14. (TCO E) What additional complexities are faced in global supply chains?  How does the Internet help in managing global supply chains?
15. (TCO E) Explain why standards are so important in information technology?  What standards have been important for the growth of Internet technologies?
16. (TCO F) Differentiate between intangible and tangible benefits and list three examples of each.  In what types of systems are intangible benefits more predominant?
17. (TCO F) You have been hired as a consultant for a nationwide real estate firm, Cross & Deptford, who are interested in achieving better organization between branches by updating their information systems, but are not sure what will suit their needs.  What will you recommend they do in order to determine the most effective IT projects?
18. (TCO F) What qualities of object-oriented development make this method especially suitable for Internet applications?
19. (TCO G) Define the basic concept of responsibility, accountability, and liability as applied to ethical decision.  How are these concepts related?   
20. (TCO G) How is the security of a firm’s information system and data affected by its people, organization, and technology?  In the contribution of one of these dimensions any more important than the other? Why?
21. (TCO G) Discuss the issue of security challenges on the Internet as that issue applies to a global enterprise.  List at least 5 Internet security challenges 
MIS 535 Homework Week 1
1. Which of the following choices may lead to competitive advantage (1) new products, services and business models; (2) charging less for superior products; (3) responding to customers in real time?
2. An information system can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support
3. The three activities in an information system that produce the information that organizations use to control operations are
4. The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members is called its    
5. The average number of tickets sold daily online is an example of
6. Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organization's
7. Lower global costs of labor have
8. What's new in MIS?  
9. Key corporate assets are
10. Engineers, scientists, or architects who design new products or services for a firm belong to which level of a business hierarchy?
11. What is the difference between the Internet and cloud computing?
12. An exponential rate of innovation means that
13. In a business hierarchy, the level that is responsible for monitoring the daily activities of the business is
14. The term "management information systems" designates a specific category of information systems serving   
15. To monitor the status of internal operations and the firm's relations with the external environment, managers need ___ systems.
16. Which systems is typically a major source of data for other systems?
17. Decisions that are unique, rapidly changing, and not easily specified in advance are best suited to which type of system?
18. Which systems are especially suited to situations in which the procedure for arriving at a solution may not be fully predefined in advance?
19. Which systems are designed to span functional areas and focus on executing business processes across the firm?
20. Today's companies need fewer levels of management because
MIS 535 Homework Week 2
1. The costs incurred when a firm buys on the marketplace what it cannot make itself are referred to as
2. Disintermediation

3. The four major types of competitive strategy are
4. Information asymmetry exists when
5. When a firm provides a specialized product or service for a narrow target market better than competitors, they are using a
6. Internet technology

7. The Internet raises the bargaining power of customers by
8. Cloud computing
9. Benchmarking

10. The most successful solutions or methods for achieving a business objective are called
11. An information system can enhance core competencies by
12. The more any given resource is applied to production, the lower the marginal gain in output, until a point is reached at which the additional inputs produce no additional output. This is referred to as
13. Network economic
14. In network economics, the value of a commercial software vendor's software products

15. Current technology trends will result in 
16. The quality of ubiquity, as it relates to e-commerce, is illustrated by
17. Which of the following is not a recent development in e-commerce?
18. What term best describes consumers selling goods and services electronically to other?
19. Where there is no well understood or agreed-on procedure for making a decision, it is said to be
20. The type of decision that can be made by following a definite procedure is called a(n)

MIS 535 Homework Week 3

1.  A characteristic or quality describing an entity is called a(n)   
2.  The confusion created by ___ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources   
3.  Duplicate data in multiple data files is called   
4.  A DBMS   
5. The logical view   
6.  The type of logical database model that treats data as if they were stored in two-dimensional tables is the   
7.  A field identified in a table as holding the unique identifier of the table’s records is called the  
8.  The data dictionary serves as an important data management tool by   
9.  An automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security is the
10.  Which is the type of database management approach that can handle a large number of pages or documents?   
11.  Which is the most prominent data manipulation language today?   
12.  DBMSs typically include report-generating tools in order to   
13. A schematic of the entire database that describes the relationships in a database is called   
14.  What is the process of streamlining data to minimize redundancy and awkward many-to-many relationships?   
15.  Cloud computing offers   
16.  A data warehouse is composed of   
17.  A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because   
18.  Data mining is a tool that allows users to   
19.  What is the tool that enables users to view the same data in different ways using multiple dimensions?   
20. OLAP is a tool that enables
MIS 535 Homework Week 4

1. A device that acts as a connection point between computers and that can filter and forward data to a specified destination is called a
2. Which device sends data packets to all connected devices in a network?
3. The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destination is called
4. What is the most important communication standard today for linking disparate computers and networks?
5.  In TCP/IP, IP is responsible for
6. On which protocol is the Internet based?
7. All network computers connect to a single hub in a
8. In a bus network,

9. A network that covers a large geographic area is most commonly referred to as a(n)
10. Which communications medium uses single copper wire surrounded by thick insulation?
11. Which type of signal follows a straight line and does not bend with the curve of the Earth?
12. Data is sent through the fiber optic cable by a
13. A domain name server

14. Net neutrality means
15. Which technology uses the Internet Protocol to deliver voice information in digital form using packet switching?
16. In the cloud computing model,
 17. A cloud computing model

18. Cost reductions in using cloud based services stem from  
19. In an RFID system, a(n) ___ is electronically programmed with information that can uniquely identify an item, such as an electronic code.
20. The cloud computing model described in the lecture is an example of which cloud computing model?
MIS 535 Homework Week 5

1. Which type of infrastructure services provides voice and video connectivity to employees, customers, and suppliers?
2. Specifications that establish the compatibility of products and the ability to communicate in a network are called
3. ___ unleash powerful economies of scale and result in declines in manufactured computer products.
4. Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?
5. The practice of contracting custom software development to an outside firm is commonly referred to as
6. What is the act of providing hardware and software capabilities as services over the Internet?
7. In order to achieve maximum benefit from an enterprise software package, a business
8. Which best describes a suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes?
9. Which type of software enables data to be used by multiple functions and business processes for organization coordination and control?
10. Which type of software is built around thousands of predefined business processes?
11. A company's suppliers, their supplier's suppliers, and the processes for managing relationships with them constitute
12. A company's organizations and processes for distributing and delivering products to the final customers constitute
13. Inefficiencies arise in a supply chain because of
14. Companies with effective supply chain management systems can expect
15. When tailoring a particular aspect of a system to the way a company does business, enterprise software can provide the company with
16. A scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line best describes a ___ strategy.
17. Enterprise application vendors have created ___ to make their own customer relationship management, supply chain management, and enterprise systems work closely together.
18. ___ integrate(s) multiple applications from multiple business functions, business units, or business partners to deliver a seamless experience for the customer, employee, manager, or business partner and provide(s) a greater degree of cross-functional integration than the traditional enterprise applications.
19. Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company?
20. Operational CRM applications include tools for
MIS 535 Homework Week 6

1. What will you need to understand and measure for an effective reengineering project?
2. Enabling organizations to make continual improvements to many business processes and to use processes as the fundamental building blocks of corporate information systems is the goal of
3. The ___ is directly responsible for the individual systems project.
4. Which process develops a detailed description of the functions that a new information system must perform?
5. The entire system-building effort is driven by
6. Systems design
7. Transferring transaction data from a legacy system to the new system would be defined by which category of system design specifications?
8. What is the primary driving factor in firms to select domestic outsourcing firms to build system solutions?
9. The four kinds of structural organizational change enabled by IT, in order from least to most risky, are
10. Traditional software development methodologies often fail because
11. You have been hired by a pharmaceutical company to evaluate its inventory of systems and IT projects. Which types of projects would be best avoided?
12. To best evaluate, from a financial standpoint, an IT investment whose benefits cannot be firmly established in advance, you would use
13. What do many companies overlook when making information system investment decisions?
14. Information systems projects are valued similarly to stock options in which model of financial evaluation?
15. An example of an external integration tool would be:
16. Agile methodologies emphasize
17. The major variables in project management are
18. Using a strategic analysis approach, an organization's information requirements are known through a small number of
19. In which approach to systems building are the development stages organized so that tasks in one stage are completed before the tasks in the next stage have begun?
20. The process of creating workable information systems in a very short period of time is called
MIS 535 Homework Week 7
1. Social media sites result in loss of personal information because
2. Information systems

3. The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called
4. The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called
5. Immanuel Kant's Categorical Imperative states that
6. The ethical "no free lunch" rule states that
7. European privacy protection is ___ than in the United States.
8. Intellectual property can best be described as
9. It is not feasible for companies to produce error-free software because
10. The practice of spamming has been growing because
11. Which of the five moral dimensions of the information age does spamming raise?
12. Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems refers to
13. Security challenges posed by the communications between layers in a client/server environment are
14. Phishing involves
15. Evil twins are
16. The HIPAA Act of 1996
17. Financial institutions are required to ensure the security and confidentiality of customer data through the
18. Automated data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that
19. The vulnerability inherent in wireless networking is due to
20. Statement ranking information risks are included in a(n)

    • 9 years ago
    MIS 535 Entire Course Week 1 to 8
    NOT RATED

    Purchase the answer to view it

    blurred-text
    • attachment
      mis_535_week_1_to_8.zip