Page 1

CIS 336 Final Exam Guide

For more classes visit www.snaptutorial.com CIS 336 Final Exam Guide 1)Joe works for a company where the IT department charges him for the number of CRM login accounts that are in his department. What type of IT funding model is his company deploying? 2) This project cycle plan chart looks very much like a bar chart and is easy for management to read because of its visual nature. 3) What is at the center of the project triangle? 4) This is a text message that is stored on a user’s computer by a Web server that helps trace the user’s browsing habits. 5) All of the following are risks associated with IS outsourcing EXCEPT: 6) This project cycle plan tends to be used for projects that have direct relationships between time and resources. 7) This is an IT governance framework that is consistent with COSO controls. 8) The question “What information does a person or an organization have a right or a privilege to obtain?” is part of this ethical issue.


9) ________________ is the process of analyzing data warehouses for “gems”. 10) Which normative theory of business ethics would TJX have displayed if it had informed customers as soon as the breach was corrected and told other retailers how to prevent future security breaches? 11) Scorecards provide a summary of information gathered over a period of time. Another common IT monitoring tool is the _____________. 12) The initial reason organizations outsourced IT was which one of the following? 13) The project triangle includes 3 sides - time, scope and ________. 14) Sam has just purchased 10 new high speed color laser printers for his company. He is very excited because he got a 40% discount and paid only $2,990 for each unit. His boss, Joe, wants to know things such as operating costs, support, overhead, etc. for the printers. Joe wants to know this value: 15) All of the following are frameworks for implementing SarbanesOxley compliance EXCEPT: 16) An organization may convert from an old system to a new system by choosing to run both the old and new systems at the same time until the new system is fully accepted. This is known as __________. 17) This allows individuals to own their creativity and innovation in a way similar to owning physical property. 18) The newest sourcing option for today’s IT organizations is: 19) Which one of the following is NOT one of the four essential elements of any project?


20) Most companies would like to obtain the advantages derived from both centralized and decentralized organizational paradigms. What type of IT governance model would best help them to achieve this goal? 21) This method of IT funding is the most equitable, as the costs associated with IT are based on use. However, it can be difficult and tedious to calculate the usage costs. 22) If a company decides to make and develop IS, they are using this type of sourcing. 23) To maintain balance in a project with a fixed budget and a welldefined scope, a project team will require flexibility ________. 24) Kellwood, the American apparel maker, decided to consolidate and bring IT operations back in-house in order to reduce costs. Kellwood choose which of the following strategies? 25) In the chapter, there is the statement, “Internet companies are in business for the money and hence they really would prefer to keep their customers in the dark about how their personal data is being used to generate profits�. Assuming this statement is true, with which ethical theory would you say these Internet companies are most aligned?

CIS 336 Week 1 Discussion 1 Social Information Technology (IT) and Business Frameworks

For more classes visit www.snaptutorial.com


CIS 336 Week 1 Discussion 1 "Social Information Technology (IT) and Business Frameworks" Please respond to the following: • Consider collaboration as one of the social IT categories in which Facebook, LinkedIn, blogs, and Twitter are used to extend the reach of stakeholders and employees. Determine at least three business functions that could be used by this social IT. Predict possible problems that you foresee. • The Leavitt Business Diamond framework consists of four crucial components. Suppose we added an IS / IT component that sits in the middle of the diamond, thus creating a variation of the framework. Examine five relationships that the IS / IT components could facilitate between the other four components. Determine which relationship would be the strongest and which one would be the weakest. Support your reasoning.

CIS 336 Week 1 Discussion 2 Resources Frameworks and Plenitude

For more classes visit www.snaptutorial.com CIS 336 Week 1 Discussion 2 "Resources Frameworks and Plenitude" Please respond to the following:


• One might argue that value is not always realized when using resource-based view (RBV) framework, especially when considering the IT infrastructure and Information Repository. Determine whether you agree or disagree with this viewpoint. Provide three examples to support your position. • From the e-Activity, determine five other IT resources within an organization that could be modeled in quantifiable terms that show value (i.e., software). Propose a model for one of the resources.

CIS 336 Week 2 Assignment 1 Models for Competitive Dynamics

For more classes visit www.snaptutorial.com CIS 336 Week 2 Assignment 1 Models for Competitive Dynamics Assignment 1 Models for Competitive Dynamics Due Week 2 and worth 100 points

Competition has, since the 90s, led to wider gaps between industry leaders and laggards. There are more “winner-take-all” environments and greater churns among industry sector rivals. We have witnessed sharp increases in quality and quantity of IT (Information Technology) investments. We’ve seen striking competitive dynamics, particularly in sectors that spend the most on IT. Some of the competitive dynamics models include the Destroy Your Business (DYB) strategy,


the Grow Your Business (GYB) strategy, the Information Systems (IS) and strategic advantage, and the social business strategy.

Write a four to five (4-5) page paper in which you Compare and contrast the DYB and GYB strategies in terms of the ability to sustain a business in the marketplace over the long term, to be competitive against rivals, and profitability. Examine the “cannibalization” strategy and determine if it is or is not a better strategy compared to the DYB strategy for growth, competitiveness, and market leadership. Provide two (2) business examples. Determine whether or not changes in business strategy should entail reassessment of IS. Provide three (3) reasons to support your position. Examine how firms can use social IT in alignment with organizational strategy and IS strategy. Consider collaborative capabilities, what, how, and who should use social IT for a social business strategy. Use at three (3) quality resources in this assignment. Note Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are


Demonstrate an understanding of the integration of enterprise systems with inter-organizational partners. Use technology and information resources to research issues in enterprise architecture. Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.

CIS 336 Week 2 Discussion 1 Organization Structures

For more classes visit www.snaptutorial.com CIS 336 Week 2 Discussion 1 "Organization Structures" Please respond to the following: • Suppose that you were creating a new global organization. The new organization will provide Information Technology (IT) infrastructure consulting services, computer security consulting services, and cloud computing consulting services. Determine whether you would employ a hierarchical, a flat, or a matrix organizational structure, and explain why. • From the e-Activity, propose how issues with hierarchical and flat structures should be resolved.

CIS 336 Week 2 Discussion 2 Results-Only Work Environment (ROWE) and Instant Messaging (IM)


For more classes visit www.snaptutorial.com CIS 336 Week 2 Discussion 2 "Results-Only Work Environment (ROWE) and Instant Messaging (IM)" Please respond to the following: • Suppose you worked for a company that uses ROWE. Predict whether you would be more productive or less productive, and explain why. • IM applications like Microsoft’s Lync, Microsoft Instant Messenger, and Yahoo Instant Messenger are being used in some organizations to facilitate communication between employees. Determine whether you believe IM improves or hinders employee productivity. Support your rationale with an explanation.

CIS 336 Week 3 Discussion 1 Agility and Business Process Management (BPM)"

For more classes visit www.snaptutorial.com CIS 336 Week 3 Discussion 1 "Agility and Business Process Management (BPM)" Please respond to the following: • Suppose that an organization did not use processes that were designed and built to be agile, particularly when it comes to IS / IT


technologies. Predict the impact of environmental changes on an organization financially, socially, and in terms of survivability. • A BPM model may help manage and streamline IT processes that are otherwise manually executed. Examine one enterprise manual process (i.e., purchase order approval) and propose two BPM models that would replace the process. Determine the IT resources that you would employ to automate the process (i.e., electronic documents instead of paper documents).

CIS 336 Week 3 Discussion 2 The Impact of Crowdsourcing

For more classes visit www.snaptutorial.com CIS 336 Week 3 Discussion 2 "The Impact of Crowdsourcing" Please respond to the following: • Dell’s Ideastorm, Best Buy’s IdeaX, New York city’s Simplicity, and Samuel Adams’ Facebook application to determine the next flavor of beer are a few of the examples that use crowdsourcing. From the e-Activity, assess whether ideasourcing generates the best innovative ideas for a business or organization. Explain why or why not. • Suppose that you recently acquired a considerable amount of money and want to invest in some type of business. Determine whether or not you would use crowdsourcing to determine the type of business you invest in. Predict whether the use of crowdsourcing to select your type of business would be disastrous or advantageous, and explain why or why not.


CIS 336 Week 4 Assignment 2 Telecommuting and the Mobile Worker

For more classes visit www.snaptutorial.com CIS 336 Week 4 Assignment 2 Telecommuting and the Mobile Worker Assignment 2 Telecommuting and the Mobile Worker Due Week 4 and worth 100 points The number of American telecommuters is expected to increase by 29 million telecommuters or 43% of the workforce by 2016 as more work gets performed from remote locations. Mobile workers can work from wherever they are and use the IT / IS technology necessary to access co-workers, company or corporate infrastructure, intranets, and other information sources. Write a two to three (2-3) page paper in which you Describe the impact of telecommuting on energy conservation, IT operational costs, “green computing�, and shifts in telecommuters’ lifestyles (e.g., parents, disability, etc.). Describe how the business infrastructure should be designed so that employees will be able to continue to perform business functions in


the event of a disaster (i.e., storm, hurricane, or earthquake) that destroys or makes it impossible to access the buildings. Determine four (4) advantages and four (4) disadvantages of telecommuting from an IT manager’s point of view. Elaborate on each advantage and disadvantage. Examine the effect of Bring Your Own Device (BYOD) to the IT infrastructure with regard to security, IT support, knowledge, and data management, green computing, and telecommuting. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are Demonstrate and plan for the integration of emerging technologies. Describe and evaluate the core concepts of data and information architecture. Design plans for business continuity. Use technology and information resources to research issues in enterprise architecture. Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.


CIS 336 Week 4 Discussion 1 Bring Your Own Device (BYOD) or Bring Your Own Technology (BYOT)"

For more classes visit www.snaptutorial.com CIS 336 Week 4 Discussion 1 "Bring Your Own Device (BYOD) or Bring Your Own Technology (BYOT)"Please respond to the following: With the proliferation of smart phones and intelligent computing tablets such as the iPad, enterprises are increasingly faced with employees who want to bring their own devices and connect to enterprise systems. Determine whether or not employers should allow this type of connectivity to enterprise systems. Support your reasoning with three examples. Predict the impact to an organization’s Total Cost of Ownership (TCO) when employees use BYOD. From the e-Activity, determine whether Strayer University should allow students to use BYOD on campus. Explain why or why not.

CIS 336 Week 4 Discussion 2 Virtualization and Cloud Computing

For more classes visit www.snaptutorial.com


CIS 336 Week 4 Discussion 2 "Virtualization and Cloud Computing" Please respond to the following: • Suggest how an organization should choose between Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Support your recommendation with an explanation. • Salesforce.com, Facebook, Gmail, Windows Azure, Apple iTunes, and LinkedIn are examples of applications in the cloud computing space. Examine the benefits and possible problems for these organizations when it comes to cloud computing. Propose solutions to these problems. Predict the impact to an organization’s TCO and ROI.

CIS 336 Week 5 Discussion 1 Business Costs

For more classes visit www.snaptutorial.com CIS 336 Week 5 Discussion 1 "Business Costs" Please respond to the following: • Imagine that you are the head of a department and your organization uses a chargeback funding method. Chargeback systems are popular for managing and controlling IT costs. Determine five IT costs that you would consider to be most critical. Support your reasoning. • Suppose you were asked to determine a method to compute the operational costs of a company’s ERP (Enterprise Resource Planning) system. From the e-Activity, determine whether you would apply the Activity-based costing (ABC) model or a different model to calculate


the costs. Support your rationale. Examine the risks and benefits of applying the model you chose.

CIS 336 Week 5 Discussion 2 Information Technology (IT) Dashboards

For more classes visit www.snaptutorial.com CIS 336 Week 5 Discussion 2 "Information Technology (IT) Dashboards" Please respond to the following: • Evaluate the ways that IT dashboards provide meaningful data or information to the organization’s executives. Determine the best ways to use an IT dashboard for this purpose. • Contrast service dashboards and portfolio dashboards. Select the ID dashboard that you consider to be the most important and explain why.

CIS 336 Week 5 Midterm Exam

For more classes visit www.snaptutorial.com


Get questions from Link These are 2 different sets in link

CIS 336 Week 6 Assignment 3 IT Support for Virtual Teams

For more classes visit www.snaptutorial.com CIS 336 Week 6 Assignment 3 IT Support for Virtual Teams Assignment 3 IT Support for Virtual Teams Due Week 6 and worth 100 points Global organizations have branches that are located in multiple countries. Some of these organizations develop software and take advantage of the global talent pool of software developers while others have global technical support teams, customer service, and so on. Virtual teams are created when two or more people work together from different locations, organizations, times zone, and / or time shifts. Global organizations use virtual teams in order to provide global support, reduce travel costs, reduce training costs, and take advantage of local cultural knowledge that may impact the organization’s operations. Write a two to three (2-3) page paper in which you


Examine five (5) issues that the IT department is likely to face when it comes to supporting virtual teams. Create an architectural diagram that shows how the virtual teams would collaborate and access common repositories for documents, software, development, and testing facilities. Use Visio or an equivalent such as Dia. Note The graphically depicted solution is not included in the required page length. Describe five (5) advantages and five (5) disadvantages of using virtual teams for the organizations described in the scenario. Describe challenges imposed by IT / IS national standards and propose how they could be handled or resolved. protocols and propose how they could be handled or resolved. procedures on virtual teams and propose how they could be handled or resolved. Compare and contrast virtual teams and traditional teams with respect to communications, technology use, and team diversity. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.


The specific course learning outcomes associated with this assignment are Describe the process of administering enterprise systems, including the use of virtualization and monitoring, power and cooling issues. Use technology and information resources to research issues in enterprise architecture. Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.

CIS 336 Week 6 Discussion 1 Compliance

For more classes visit www.snaptutorial.com CIS 336 Week 6 Discussion 1"Compliance" Please respond to the following: • Examine the Sarbanes–Oxley Act (SOX). In your opinion, determine whether SOX has been able to achieve what it was intended to do and if it has reduced the unethical business practices that led to its enactment. Provide two examples to support your reasoning. • Evaluate the five essential control components for managers and auditors established by the Committee of Sponsoring Organizations of the Treadway Commission (COSO). Determine the control that is the most critical for the well-being of any company and explain why.

CIS 336 Week 6 Discussion 2 Control Objectives for Information and Related


Technology (COBIT) and Information Technology Infrastructure Library (ITIL)"

For more classes visit www.snaptutorial.com CIS 336 Week 6 Discussion 2 "Control Objectives for Information and Related Technology (COBIT) and Information Technology Infrastructure Library (ITIL)" Please respond to the following: • From the e-Activity, perform a high-level analysis of the four major domains of COBIT. (Keep in mind that COBIT is intended to make sure that IT provides the systematic rigor needed for the strong internal controls and Sarbanes–Oxley compliance.) Select the domain that you believe to be the major concern for IT and explain why. • Evaluate the concepts and techniques covered by ITIL. Select the concept that you believe to be the most critical for any business and support your position.

CIS 336 Week 7 Assignment 4 Virtualization and Cloud Computing World

For more classes visit www.snaptutorial.com


CIS 336 Week 7 Assignment 4 Virtualization and Cloud Computing World Assignment 4 Virtualization and Cloud Computing World Due Week 7 and worth 100 points The popularity and rapid adoption of Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) by a number of organizations has impacted internal IT / IS departments. These services provide a virtualization infrastructure that covers data storage, networking, desktop computing, mobile computing, and so on. Write a two to three (2-3) page paper in which you Describe at least three (3) items that an organization’s IT / IS department should consider when an organization’s strategy calls for the use of SaaS, PaaS, or IaaS. Evaluate the ways that SaaS, PaaS, and IaaS are used to reduce Total Cost of Ownership (TCO) and increase Return on Investment (ROI). Create SaaS, PaaS, and IaaS architectural diagrams using Microsoft Visio or an equivalent such as Dia. Note The graphically depicted solution is not included in the required page length. Examine the impact to the IT support personnel when an organization embarks on the strategy stated in Question 1. Analyze three (3) considerations that the organization’s management should be aware of. Examine three (3) security issues that could arise from this type of an infrastructure. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements


Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted. The specific course learning outcomes associated with this assignment are Describe the process of administering enterprise systems, including the use of virtualization and monitoring, power and cooling issues. Evaluate the total cost of ownership and return on investment for enterprise architecture alternatives Use technology and information resources to research issues in enterprise architecture. Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.

CIS 336 Week 7 Discussion 1 Build or Buy and Service-Level Agreements (SLAs)"

For more classes visit www.snaptutorial.com


CIS 336 Week 7 Discussion 1 "Build or Buy and Service-Level Agreements (SLAs)" Please respond to the following: • Suppose, as a Chief Information Officer (CIO), you were asked to provide the organization with time-entry system for the employees. Examine the options to insource or outsource the system to be developed. Determine whether you would insource or outsource the system to be developed, and predict the implications of your decision with the organization’s total cost of ownership. • Suppose an organization that has entered into an SLA with another organization goes out of business. Determine whether the SLA still applies or becomes invalid. Propose what the organization should do to maintain the service delivery.

CIS 336 Week 7 Discussion 2 Cloud Computing

For more classes visit www.snaptutorial.com CIS 336 Week 7 Discussion 2 "Cloud Computing" Please respond to the following: • From the e-Activity, provide your opinion on whether or not a nonApple device user should have the ability to use iCloud. Explain whether or not this points to the limitations of cloud computing.


Determine whether businesses should consider iCloud in their cloud computing strategy for their IT needs. Support your rationale. • Rate the importance of establishing standards that govern the cloud infrastructure, format for data storage, interoperability standards between vendors, and security requirements. Support your rationale.

CIS 336 Week 8 Case Study 1 Disney’s ITIL Journey

For more classes visit www.snaptutorial.com CIS 336 Week 8 Case Study 1 Disney’s ITIL Journey Case Study 1 Disney’s ITIL Journey Due Week 8 and worth 70 points The Information Technology Infrastructure Library (ITIL) is a set of concepts and techniques for managing IT infrastructure, development, and operations. ITIL offers eight sets of management procedures service delivery, service support, service management, ICT infrastructure management, software asset management, business perspective, security management, and application management. Disney began adopting ITIL best practices in the mid-2000s. Read “Disney’s ITIL® Journey”, located at http//www.best-managementpractice.com/gempdf/disney_itil_journey.pdf.


Write a two to four (2-4) page paper in which you Describe the reasons for Disney’s adoption of ITIL. Examine the results that were attained by Disney. Compare and contrast ITIL, Committee of Sponsoring Organizations of the Treadway Commission (COSO), and Control Objectives for Information and Related Technology (COBIT) frameworks with regard to whether Disney would have attained the same results with the COSO or COBIT framework. Examine how Disney implemented auditing and compliance in its enterprise architecture. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are Explain the role of audit and compliance in enterprise architecture. Demonstrate an understanding of the integration of enterprise systems with inter-organizational partners. Use technology and information resources to research issues in enterprise architecture.


Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.

CIS 336 Week 8 Discussion 1 Project Management and the Cycle Plan

For more classes visit www.snaptutorial.com CIS 336 Week 8 Discussion 1 "Project Management and the Cycle Plan" Please respond to the following: • Analyze the roles of the sponsor and the manager in project management. Select the role that you believe is more critical to the success of the project and explain why. • Compare the project evaluation and review technique (PERT), the critical path method (CPM), and the Gantt chart. Determine whether projects should apply all three approaches or only when called upon to assess risk on an ongoing project. Support your rationale.

CIS 336 Week 8 Discussion 2 Systems Development Life Cycle (SDLC)"

For more classes visit


www.snaptutorial.com CIS 336 Week 8 Discussion 2 "Systems Development Life Cycle (SDLC)" Please respond to the following: • Examine the activities in the Systems Development Life Cycle (SDLC). Select the activities that you believe to be the most critical for the success of a project that is developed using SDLC. Support your position. • From the e-Activity, determine which conversion methods (parallel, pilot, phased, and plunge) you would apply for the implementation phase of an SDLC if you were managing a project. Support your rationale.

CIS 336 Week 9 Case Study 2 Enterprises Architecture

For more classes visit www.snaptutorial.com CIS 336 Week 9 Case Study 2 Enterprises Architecture Case Study 2: Enterprises Architecture Case Study Due Week 9 and worth 95 points The (enterprises architecture) EA process can be a time and resource intensive exercise that requires a deep understanding of the organization's strategy, strong technical experience, and strong


organizational skills. Over the last 8 weeks we have discussed EA and its value to an organization. We have specifically looked at the strategic value of information technology (IT), the integration of IT good and services, the governance of IT good and services, securing the enterprise and how to manage these IT resources in order to maximize value. Select a case study from the following list below: https://www.infosys.com/industries/aerospace-defense/case-studies/ Write a two to four (2-4) page paper in which you: Discuss the key points of the case study, include in your discussion the following points: Overview of the organization The business problem The IT solution that solved the problem Discuss the EA component(s) presented as part of the case study: integration of IT good and services, the governance of IT good and services, securing the enterprise, IT strategy, ITIL, BYOB. For example your case study may include a discussion on integrating software across the enterprise, or it may discuss how it used the ITIL methodology for new projects. Based on the information presented in the selected case study, identify additional EA components that can further bring value to the organization. Discuss how the selected components can add value to the organization. For example you may suggest a governance process to help maximize efficiency related to coding. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are:


Describe and evaluate the core concepts of data and information architecture. Construct risk management assessment techniques across the portfolio of the enterprise. Use technology and information resources to research issues in enterprise architecture. Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.

CIS 336 Week 9 Discussion 1 Business Intelligence and Social Analytics

For more classes visit www.snaptutorial.com CIS 336 Week 9 Discussion 1 "Business Intelligence and Social Analytics" Please respond to the following: • From the e-Activity, examine three ways you believe that social networks have “leveled the playing field” between major corporations and small businesses. • Sports teams have adapted the practice of businesses using business analytics to make wiser decisions. Provide your opinion on teams that use sports analytics. Explain whether or not you believe these teams maintain an advantage over those that do not.

CIS 336 Week 9 Discussion 2 Big Data and Knowledge Management


For more classes visit www.snaptutorial.com CIS 336 Week 9 Discussion 2 "Big Data and Knowledge Management" Please respond to the following: • Predict three problems that you foresee occurring when dealing with big data. Propose three solutions to these foreseen problems. • Suppose that you are in charge of knowledge management and have a highly knowledgeable IT person who refuses to transfer knowledge. Propose two different approaches to handling this situation.

CIS 336 Week 10 Discussion 1 Privacy Challenges

For more classes visit www.snaptutorial.com CIS 336 Week 10 Discussion 1 "Privacy Challenges" Please respond to the following:


• The United Arab Emirates (UAE) threatened to shut off BlackBerry messaging, email and Web browsing services if the device’ s maker, Research in Motion (RIM), did not provide certain information necessary for national security. RIM was caught between not disclosing confidential information and not endangering UAE’s national security. Give your opinion on whether RIM should have given in to UAE’s demands or whether it should have protected the confidential information. Support your position. • Imagine you are a mid-level manager working for a well-known international organization and have invested $10,000 in the organization stock, along with contributions to the 401k benefit. Suppose you have indisputable evidence that the CEO was manipulating the company’s stock price. Determine if you would inform the stakeholders or refrain from saying anything for fear of causing the stock to plunge. Support your position.

CIS 336 Week 10 Discussion 2 Corporate Social Responsibility and Privacy

For more classes visit www.snaptutorial.com CIS 336 Week 10 Discussion 2 "Corporate Social Responsibility and Privacy" Please respond to the following: • From the e-Activity, examine the belief that green programs create economic value while being socially responsible and sustaining the environment. Determine whether you agree or disagree with this statement. Support your position with one example.


• Some supermarkets use loyalty programs which enable them to collect data about the shopping patterns of their customers. Suppose that an insurance company wanted to buy this data from the supermarket in order to analyze the behavior of its policyholders. Determine whether or not the insurance company should be allowed to buy the data. Support your position.

CIS 336 Week 10 Term Paper The ServiceOriented Architecture

For more classes visit www.snaptutorial.com CIS 336 Week 10 Term Paper The Service-Oriented Architecture Term Paper The Service-Oriented Architecture Due Week 10 and worth 160 points The Service-Oriented Architecture (SOA) strategy allows businesses and organizations to offer their products and services to customers and trading partners using a standards-based integration protocol. Web Services depends on SOA for delivery. SOA uses Extensible Markup Language (XML) to exchange data and information to its products and services consumers. One of the SOA characteristics is that the integration is loosely coupled, thus simplifying integration.

Write an eight to ten (8-10) page paper in which you


Analyze five (5) ways in which SOA reduces the total cost of ownership (TCO). Examine five (5) ways in which using XML enables data and information exchange between clients and servers using Web Services in an SOA environment. Compare and contrast the loosely coupled architecture to a tightly coupled architecture in terms of TCO, maintenance, and implementation issues. Analyze three (3) advantages and three (3) disadvantages of using a standards-based integration strategy. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are Explain the benefits and risks of service oriented architecture. Demonstrate an understanding of the integration of enterprise systems with inter-organizational partners. Use technology and information resources to research issues in enterprise architecture. Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.


CIS 336 Week 11 Discussion 1 Transfer It

For more classes visit www.snaptutorial.com CIS 336 Week 11 Discussion 1 "Transfer It" Please respond to the following: • Discuss ways you plan to apply what you learned in this course in your current or future position. • Identify the key qualifications needed for a position in this field and explain how this course has helped you to understand those expected qualifications.

CIS 336 str Inspiring Innovation--snaptutorial.com  

For more classes visit www.snaptutorial.com CIS 336 Final Exam Guide 1)Joe works for a company where the IT department charges him for th...

CIS 336 str Inspiring Innovation--snaptutorial.com  

For more classes visit www.snaptutorial.com CIS 336 Final Exam Guide 1)Joe works for a company where the IT department charges him for th...

Advertisement