Page 1

MIS 535 Final Exam Guide (4 Set)

For more classes visit www.snaptutorial.com This Tutorial contains 4 Set of Midterm Exam (Scroll down to see Question Details)

MIS 535 Final Exam Guide (4 Set) 1

Question 1.1. (TCO A) An example of a business using information systems for customer and supplier intimacy is Question 2.2. (TCO B) Which of the following businesses use the market creator business model? Question 3.3. (TCO C) The confusion created by ________ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources. Question 4.4. (TCO D) The telephone system is an example of a ________ network. Question 5.5. (TCO E) Specifications that establish the compatibility of


products and the ability to communicate in a network are called Question 6.6. (TCO F) Agile Methodologies Question 7.7. (TCO G) ________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems. Question 1. 1. (TCO G) Define the basic concepts of responsibility, accountability, and liability as applied to ethical decisions. How are these concepts related? 2. (TCO F) Differentiate between intangible and tangible benefits and list three examples of each. In what types of systems are intangible benefits more predominant? 3. (TCO E) What additional complexities are faced in global supply chains? How does the Internet help in managing global supply chains? 4. (TCO D) How are RFID systems used in inventory control and supply chain management? 5. (TCO C) Describe the ways in which database technologies could be used by an office stationery supply company to achieve lowcost leadership. 6. (TCO B) Describe four types of applications that are especially wellsuited for mobile-commerce. 7. TCO (A) You work for an auto manufacturer and distributor. How could you use information systems to achieve greater customer intimacy? MIS 535 Final Exam Guide (4 Set) 2


1. (TCO A) A (n) ________ system collects data from various key business processes and stores the data in a single, comprehensive data repository, usable by other parts of the business. Question 2.2. (TCO B) The costs incurred when a firm buys on the marketplace what it cannot make itself are referred to as Question 3.3. (TCO C) Which of the following best illustrates the relationship between entities and attributes? Question 4.4. (TCO D) Cloud computing requires Question 5.5. (TCO E) The network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers is Question 6.6. (TCO F) Agile Methodologies Question 7.7. (TCO G) Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that 1. (TCO G) How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more important than the other? Why? 2. (TCO F) Differentiate between intangible and tangible benefits and list three examples of each. 3. (TCO E) Distinguish between grid computing, cloud computing, and utility computing.


4. (TCO D) What is cloud computing and how do you think its developments could impact businesses? 5. (TCO C) What types of relationships are possible in a relational database? Describe and give an example of each. 6. (TCO B) Describe four types of applications that are especially well-suited for mobile-commerce. 7. TCO (A) You work for an auto manufacturer and distributor. How could you use information systems to achieve greater customer intimacy?

MIS 535 Final Exam Guide (4 Set) 3

(TCO A) You are a marketing manager for a national movie theater chain. Give an example of data that your department could use for creating meaningful information. What type of information could those data produce? (TCO C) List and describe three main capabilities or tools of a DBMS. (TCO D) Describe and explain the idea of network neutrality. Are you in favor of network neutrality? Why or why not? (TCO B) You are consulting with the owner of Better Bodies, a national chain of gyms. What strategies might Better Bodies use in applying information services to achieve a competitive advantage (TCO F) Americlinic, a national chain of budget healthcare clinics, is creating an information system that will allow patients and doctors at


participating franchises to communicate online. The goal of the system is to allow doctors to respond to minor health questions quickly and more efficiently, saving patients unnecessary visits to the clinic. This will be a major procedural change. What steps would you recommend to this company to ensure the user acceptance of the system? (TCO G) How does a cookie work? Assess the implications for privacy and security based on the use of cookies. 1. 1. (TCO A) Which of the following statements about collaboration is not true? 2. 2. (TCO B) Which of the following describes how the Simon framework of decision making works in high-velocity decision environments? 3. 3. (TCO C) DBMS for midrange computers include all of the following except 4. 4. (TCO D) Which of the following is not a characteristic of packet switching? 5. 5. (TCO E) Which type of infrastructure services provides voice and video connectivity to employees, customers, and suppliers? 6. 6. (TCO F) In which type of systems building are the development stages organized so that tasks in one stage are completed before the tasks in the next stage are begun? 7. 7. (TCO G) The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called


MIS 535 Final Exam Guide (4 Set) 4 1. (TCO A) Identify the key attributes of the following types of system: Transaction Processing System, Management Information System, and Business Intelligence System. Be sure to include who are the intended users, data type, what types of decisions they make, and overall system philosophy. 2. (TCO B) Considering Michal Porter’s Competitive Forces model, how would you describe the competitive battlefield between the United States Post Office versus Fed Ex. How did the winning company leverage information technology to achieve a competitive advantage? What did the organization losing market share fail to recognize about the industry, competitors, or their customer base? 3. (TCO C) In your newly created position as Business Analyst with DeVry University, you have been asked to propose a data model that enables the university to publish class schedules, track student enrollment, and publish final grades. Based on material in the Week 3 lecture and Week 3 Learning Activities on database concepts, what entities do you recommend in your data model? Indicate if an entity is a strong entity, association entity, or weak entity. 4. (TCO D) As the director of human resources, you have been asked to present a position paper to senior management on the advantages and disadvantages of telecommuting from the perspective of both the employer and employee. What types of work would you consider most appropriate for telecommuting? What attributes would you look for in employees? How would you evaluate the success of a remote work program? What training advice you would you give to employees who want to participate in the remote work prototype program? 5. (TCO E) When interviewing for the position of director of information technology, you are asked to describe how you would


approach implementing a new customer relationship management system. Explain what considerations you would include in your answer. What can the implementation team do to help ensure the data processed through the system can be used as part of a larger business intelligence system to help evaluate customers and identify new market opportunities? Is it easier for the organization to change existing processes to match the new system, or change the enterprise application to match the existing processes of the organization? 6. (TCO F) Explain the difference between agile and waterfall project management methodologies. What are commonly cited strengths and weaknesses of each? What type of project would be better suited to each? 7. (TCO G) Provide examples of the ethical, social, political, and security issues faced by organizations that use information systems. Explain how you would secure information systems used by digital firms. *********************************************************

MIS 535 Midterm Exam (3 Sets)

For more classes visit www.snaptutorial.com This Tutorial contains 3 Set of Midterm Exam (Scroll down to see Question Details)


MIS 535 Midterm Exam Set 1 1. Question : (TCO A) Domino's upgraded Pulse Evolution system incorporated a Pizza Tracker functionality that shows the progression of individual pizza orders. This is an example of using information systems to achieve which business objective? 2. Question : (TCO A) Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organization's 3.

Question :

(TCO B) Internet technology

4. Question : (TCO C) The difference between a data warehouse and a data mart is 5. Question : (TCO D) _____ work by using radio waves to communicate with radio antennas placed within adjacent geographic areas. 6. Question : (TCO A) List and describe the four information systems serving each of the major functional areas of a business. 7. Question : (TCO B) How have mobile devices and social media changed the work environment? 8. Question : (TCO C) The small publishing company you work for wants to create a new database for storing information about all of its author contracts. What factors will influence how you design the database? 9. Question : (TCO D) What is Web 3.0, and how do you think Web 3.0 developments could impact businesses?


MIS 535 Midterm Exam Set 2

1. Question : (TCO A) Domino's upgraded Pulse Evolution system incorporated a Pizza Tracker functionality that shows the progression of individual pizza orders. This is an example of using information systems to achieve which business objective? 2 the hardware and software used to transfer data in an orgaisation is called as 3. (TCO B) Internet technology (Points : 10) 4. which common database challenge is illustrated of receiving multiple piece of same direct mail with an identical address 5. the internet is based on which three key concept 6. (TCO A) List and describe the four information systems serving each of the major functional areas of a business. (Points : 25) 7. (TCO B)"Knowledge increases exponentially" is a phrase with which we are all familiar. How does this concept apply to electronic business and the emergence of the digital firm? Support your contentions. (Points : 25) 8. (TCO C) List and describe three main capabilities or tools of a DBMS. (Points : 25) 9. (TCO D) Describe and explain the idea of network neutrality. Are you in favor of network neutrality? Why or why not? (Points : 25)

MIS 535 Midterm Exam Set 3


Question 1.1. (TCO A) Cloud computing (Points : 10) Question 2.2. TCO A) The hardware and software used to transfer data in an organization is called (Points : 10) Question 3.3. (TCO B) Internet technology (Points : 10) Question 4.4. (TCO C) Non-relational databases like NoSQL are required in situations in which (Points : 10) Question 5.5. (TCO D) Which of the following is not an example of the emerging mobile computing platforms? (Points : 10) 6. (TCO A) What is the difference between information technology and information systems? Describe some of the functions of information systems. (Points : 25) Question 7.7. (TCO B) List three organizational factors that can prevent a firm from fully realizing the benefits of a new information system, and provide examples of each. (Points : 25) Question 8.8. (TCO C) The small publishing company you work for wants to create a new database for storing information about all of its author contracts. What factors will influence how you design the database? (Points : 25) Question 9.9. (TCO D) Describe and explain the idea of network neutrality. Are you in favor of network neutrality? Why or why not? (Points : 25) *********************************************************

MIS 535 Week 1 DQ 1 MIS in Your Pocket and DQ


2 Collaborative Culture in Business

For more classes visit www.snaptutorial.com MIS 535 Week 1 DQ 1 MIS in Your Pocket In today's society mobile devices have become common place. Are these mobile devices for personal entertainment only or can they be used for business purposes? Can you run your company out of your pocket? Discuss how smart phones, tablets, and other mobile devices can be used in running a business. Consider all types of devices such as Android, Blackberry, iPhone, iPad and Windows Phone 7

MIS 535 Week 1 Discussions 2 Collaborative Culture in Business 44 Pages Chapter 2 discusses some popular collaboration tools and technologies. Let's discuss these technologies. Which categories of technology do you currently use at your job? How effective is this technology at helping you collaborate? How is collaboration different from traditional teamwork? What is a collaborative culture in a business, and how can technology promote and support this culture? *********************************************************

MIS 535 Week 1 Homework (Quiz)


For more classes visit www.snaptutorial.com MIS 535 Week 1 Homework (Quiz)

1. : Which of the following choices may lead to competitive advantage (1) new products, services and business models; (2) charging less for superior products; (3) responding to customers in real time? 2. : An information system can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support

3. : The three activities in an information system that produce the information that organizations use to control operations are 4. : The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members is called its 5. : example of

The average number of tickets sold daily online is an

6. : Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organization's 7.

:

Lower global costs of labor have


8.

:

What's new in MIS?

9.

:

Key corporate assets are

10. : Engineers, scientists, or architects who design new products or services for a firm belong to which level of a business hierarchy? 11. : computing? 12.

:

What is the difference between the Internet and cloud

An exponential rate of innovation means that

13. : In a business hierarchy, the level that is responsible for monitoring the daily activities of the business is 14. : The term "management information systems" designates a specific category of information systems serving

15. : To monitor the status of internal operations and the firm's relations with the external environment, managers need _____ systems.

16. : Which systems are typically a major source of data for other systems?

17. : Decisions that are unique, rapidly changing, and not easily specified in advance are best suited to which type of system? 18. : Which systems are especially suited to situations in which the procedure for arriving at a solution may not be fully predefined in advance?


19. : Which systems are designed to span functional areas and focus on executing business processes across the firm? 20.

Today's companies need fewer levels of management because

MIS 535 Week 1-7 All DQs

For more classes visit www.snaptutorial.com MIS 535 Week 1 DQ 1 MIS in Your Pocket In today's society mobile devices have become common place. Are these mobile devices for personal entertainment only or can they be used for business purposes? Can you run your company out of your pocket? Discuss how smart phones, tablets, and other mobile devices can be used in running a business. Consider all types of devices such as Android, Blackberry, iPhone, iPad and Windows Phone 7 MIS 535 Week 1 Discussions 2 Collaborative Culture in Business 44 Pages Chapter 2 discusses some popular collaboration tools and technologies. Let's discuss these technologies. Which categories of technology do you currently use at your job? How effective is this technology at helping you collaborate? How is collaboration different from traditional teamwork? What is a collaborative culture in a business, and how can technology promote and support this culture? MIS 535 Week 2 DQ 1 Strategic IT What are your thoughts about strategy and how applications get introduced to a company?


It has been stated that IT provides a competitive edge to organizations. Can you think of a company that uses IT strategically? Perform some research on such a company and discuss its case in this thread. Make sure to use this week's material in your analysis e.g. use Porter value chain or other strategic frameworks. MIS 535 Week 2 Discussions 2 Twitter Searches for a Business Model 47 Pages How do you develop a Business model to 10% of your followers when the majority of tweeters have 1 follower? Read the case study, Twitter Searches for a Business Model, and let’s see if we can draw some conclusions. MIS 535 Week 3 DQ 1 Users and Database Design Has MS Access changed user understanding of databases? To what extent should end users be involved in the design of a database? How have our ideas of agile development environments affected this traditionally non-user input environment? MIS 535 Week 3 Discussions 2 Database in the World of Internet Search 46 Pages Web mining tools such as Google Trends and Google Insights for search services. This tracks the popularity of phrases used within Google to determine what people are interested in. What types of databases are used by companies like Google in implementing worldwide search engines? MIS 535 Week 4 DQ 1 Internet and the Web? The textbook glossary states that the Internet is a global network of networks using universal standards to connect millions of different networks. The Internet is named for "interconnection of computer networks". About.com states that “it is a massive hardware combination of millions of personal, business, and governmental computers, all connected like roads and highways. The Internet and the Web are not the same thing. What is the difference between the Internet and the Web? Let’s discuss what the Internet is and how many kinds of traffic, including Web traffic, can run on the Internet. What are the key technologies the Internet is based on Week 4 Discussions 2 Internet Tools


VoIP and IP telephony are becoming increasingly popular with large corporations and consumers alike. For many people, Internet Protocol (IP) is more than just a way to transport data, it's also a tool that simplifies and streamlines a wide range of business applications. Telephony is the most obvious example. VoIP—or voice over IP—is also the foundation for more advanced unified communications applications—including Web and video conferencing—that can transform the way you do business. Discuss the advantages of some of the current technologies described in our reading this week including VoIP, Unified Communications, Virtual Private Networks, Wi-Fi and wireless technologies like RFID and Wireless Sensor Networks. Are there risks associated with any of these tools? MIS 535 Week 5 DQ 1 Cloud Services Go Mainstream This week’s discussion is an introduction to a significant company that has made great stride in the industry. Salesforce.com is an example of a company that has used the Cloud, particularly the SaaS model, to be competitive. Read the Case Study, “Salesforce.com: Cloud Services Go Mainstream,” in Chapter 5 of the Laudon text. What are the benefits of a cloud deployment for Salesforce.com? How will Cloud Computing change the traditional IT infrastructure? MIS 535 Week 5 Discussions 2 Business Value of Enterprise Systems This week we are asked to research and explain what and enterprise system is. An enterprise software system is a package that is part of the IT infrastructure that an organization uses to conduct its operations. Define an enterprise system and explain how enterprise software works. Select one type of Enterprise system and describe how it helps businesses achieve operational excellence. MIS 535 Week 6 DQ 1 Agile Methodologies This week we take a look at Agile. The use of agile methodologies changed the face of software development. Historically when using other traditional software methodologies, it was project managers, analysts, developers, testers and each group did their piece of the project then handled it off to the next team. Discuss how the emergence of agile methodologies has changed the IT system building model. MIS 535 Week 6 Discussions 2 Role of Senior Management


What effectives of information system planning if senior management is knowledgeable and in full support of the planning strategy? What role does senior management play in the establishment of effective information system planning in a corporation? MIS 535 Week 7 DQ 1 How Phishing Attacks Have Compromised Major System The textbook states that, one increasingly popular tactic is a form of spoofing called phishing. Phishing involves setting up fake Web sites or sending e-mail or text messages that look like those of legitimate businesses to ask users for confidential personal data. The message instructs recipients to update or confirm records by providing social security numbers, bank and credit card information, and other confidential data either by responding to the e-mail message, by entering the information at a bogus Web site, or by calling a telephone number. EBay, PayPal,Amazon.com, Walmart, and a variety of banks, are among the top spoofed companies. Major corporations, governments, and other organizations are hacked each week, mostly by means of phishing attacks. Describe how users and IT organizations should arm themselves against these attacks. MIS 535 Week 7 Discussions 2 Facebook, Twitter, Linkedin, and other Social Media 36 Pages Hello class, this week we take a look at the major components to cyber security are Confidentially, Integrity, and Availability. As for social media, the most serious security risk comes in terms of integrity. For a business, the outward facing characteristic of integrity is the reputation of the firm. According to a recent survey of European risk managers, reputational damage is the greatest digital risk (Veysey, 2011). A company with a damaged reputation could face difficulties in acquiring new customers and finding off competition. What are the social and security issues for individuals and organizations relative to personal and business use of social media? *********************************************************

MIS 535 Week 1-7 All Homework (Quiz)


For more classes visit www.snaptutorial.com MIS 535 Week 1 Homework (Quiz) MIS 535 Week 2 Homework (Quiz) MIS 535 Week 3 Homework (Quiz) MIS 535 Week 4 Homework (Quiz) MIS 535 Week 5 Homework (Quiz) MIS 535 Week 6 Homework (Quiz) MIS 535 Week 7 Homework (Quiz) *********************************************************

MIS 535 Week 2 Course Project Proposal (2 Projects)

For more classes visit www.snaptutorial.com Project 1: Decision Support System in Trading Currencies Project 2: Vale Company (implementation of Share point)


Begin thinking of a business problem that could be solved with a technology solution for a company or organization you are familiar with. Use the Q&A Forum to ask questions and discuss your ideas about the project. See the Course Project Technical Areas for ideas. MIS 535 Week 2: Complete the Course Project Proposal using this format: Course Project Proposal (1-2 pages, 75 points, due week 2, properly cite any external sources used) Cover page 1. Subject of Course Project 2. Business problem statement 3. Name of the company or organization 4. Brief description of proposed solution 5. General benefits it will provide the organization 6. Audience to whom you are presenting the recommendation(s) MIS 535 Weeks 3 -6: Based on the Professor’s feedback to your proposal, develop the Course Project. You are required to use a minimum of five credible sources for research on your proposed solution and to correctly cite all references using APA style. Make sure you do not use more than 20% material from other sources so that 80% of the paper should be your original words. Use the Q&A each week to ask questions about the project. See the suggestions below for ideas on ways to develop your project. Use this format for the project: Course Project Table of Contents (10-15 pages, 225 points, due week 6) Cover Page Table of Contents 1. Abstract 2. Brief Company background 3. Discussion of business problem(s) 4. High level solution 5. Benefits of solving the problem 6. Business/technical approach 7. Business process changes 8. Technology or business practices used to augment the solution 9. Conclusions and overall recommendations


10. High-level implementation plan 11. Summary of project *********************************************************

MIS 535 Week 2 DQ 1 Strategic IT and Discussions 2 Twitter Searches

For more classes visit www.snaptutorial.com MIS 535 Week 2 DQ 1 Strategic IT What are your thoughts about strategy and how applications get introduced to a company? It has been stated that IT provides a competitive edge to organizations. Can you think of a company that uses IT strategically? Perform some research on such a company and discuss its case in this thread. Make sure to use this week's material in your analysis e.g. use Porter value chain or other strategic frameworks.

MIS 535 Week 2 Discussions 2 Twitter Searches for a Business Model 47 Pages How do you develop a Business model to 10% of your followers when the majority of tweeters have 1 follower? Read the case study, Twitter Searches for a Business Model, and let’s see if we can draw some conclusions. *********************************************************


MIS 535 Week 2 Homework (Quiz)

For more classes visit www.snaptutorial.com MIS 535 Week 2 Homework (Quiz)

1. The costs incurred when a firm buys on the marketplace what it cannot make itself are referred to as 2.

Disintermediation

3.

The four major types of competitive strategy are:

4.

Information asymmetry exists when

5. When a firm provides a specialized product or service for a narrow target market better than competitors, they are using a 6.

Internet technology

7.

The Internet raises the bargaining power of customers by

8.

Cloud computing


9.

Benchmarking

10. The most successful solutions or methods for achieving a business objective are called

11.

An information system can enhance core competencies by

12. The more any given resource is applied to production, the lower the marginal gain in output, until a point is reached at which the additional inputs produce no additional output. This is referred to as

13.

Network economics

14. In network economics, the value of a commercial software vendor's software products

15.

16. illustrated by

17. commerce?

18.

Current technology trends will result in

The quality of ubiquity, as it relates to e-commerce, is

Which of the following is not a recent development in e-

What term best describes consumers selling goods and


services electronically to other?

19. Where there is no well understood or agreed-on procedure for making a decision, it is said to be

20. The type of decision that can be made by following a definite procedure is called a(n) *********************************************************

MIS 535 Week 3 DQ 1 Users and Database Design And DQ 2 Database in the World

For more classes visit www.snaptutorial.com

MIS 535 Week 3 DQ 1 Users and Database Design Has MS Access changed user understanding of databases? To what extent should end users be involved in the design of a database? How have our ideas of agile development environments affected this traditionally non-user input environment?

MIS 535 Week 3 Discussions 2 Database in the World of Internet Search 46 Pages Web mining tools such as Google Trends and Google Insights for search


services. This tracks the popularity of phrases used within Google to determine what people are interested in. What types of databases are used by companies like Google in implementing worldwide search engines *********************************************************

MIS 535 Week 3 Homework (Quiz)

For more classes visit www.snaptutorial.com

MIS 535 Week 3 Homework (Quiz)

1. a(n)

A characteristic or quality describing an entity is called

2. The confusion created by _____ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources. 3.

Duplicate data in multiple data files is called

4.

A DBMS

5.

The logical view


6. The type of logical database model that treats data as if they were stored in two-dimensional tables is the 7. A field identified in a table as holding the unique identifier of the table's records is called the 8. management tool by

The data dictionary serves as an important data

9. An automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security is the 10. Which is the type of database management approach that can handle a large number of pages or documents?

11. today?

Which is the most prominent data manipulation language

12. to

DBMSs typically include report-generating tools in order

13. A schematic of the entire database that describes the relationships in a database is called 14. What is the process of streamlining data to minimize redundancy and awkward many-to-many relationships? 15.

Cloud computing offers

16.

A data warehouse is composed of

17. A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because


18.

Data mining is a tool that allows users to

19. What is the tool that enables users to view the same data in different ways using multiple dimensions? 20.

OLAP is a tool that enables

MIS 535 Week 4 DQ 1 Internet and the Web and DQ 2 Internet Tools

For more classes visit www.snaptutorial.com

MIS 535 Week 4 DQ 1 Internet and the Web? The textbook glossary states that the Internet is a global network of networks using universal standards to connect millions of different networks. The Internet is named for "interconnection of computer networks". About.com states that “it is a massive hardware combination of millions of personal, business, and governmental computers, all connected like roads and highways. The Internet and the Web are not the same thing. What is the difference between the Internet and the Web? Let’s discuss what the Internet is and how many kinds of traffic, including Web traffic, can run on the Internet. What are the key technologies the Internet is based on?


vWeek 4 Discussions 2 Internet Tools VoIP and IP telephony are becoming increasingly popular with large corporations and consumers alike. For many people, Internet Protocol (IP) is more than just a way to transport data, it's also a tool that simplifies and streamlines a wide range of business applications. Telephony is the most obvious example. VoIP—or voice over IP—is also the foundation for more advanced unified communications applications—including Web and video conferencing—that can transform the way you do business. Discuss the advantages of some of the current technologies described in our reading this week including VoIP, Unified Communications, Virtual Private Networks, Wi-Fi and wireless technologies like RFID and Wireless Sensor Networks. Are there risks associated with any of these tools? *********************************************************

MIS 535 Week 4 Homework (Quiz)

For more classes visit www.snaptutorial.com

MIS 535 Week 4 Homework (Quiz)

1. A device that acts as a connection point between computers and that can filter and forward data to a specified destination is called a 2.

Which device sends data packets to all connected devices


in a network? 3. The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destination is called 4. What is the most important communication standard today for linking disparate computers and networks? 5.

In TCP/IP, IP is responsible for

6.

On which protocol is the Internet based?

7.

All network computers connect to a single hub in a

8.

In a bus network,

9. A network that covers a large geographic area is most commonly referred to as a(n) 10. Which communications medium uses single copper wire surrounded by thick insulation? 11. Which type of signal follows a straight line and does not bend with the curve of the Earth? 12.

Data is sent through the fiber optic cable by a

13.

A domain name server

14.

Net neutrality means

15. Which technology uses the Internet Protocol to deliver voice information in digital form using packet switching?


16.

In the cloud computing model,

17.

A cloud computing model

18.

Cost reductions in using cloud based services stem from

19. In an RFID system, a(n) _____ is electronically programmed with information that can uniquely identify an item, such as an electronic code. 20. The cloud computing model described in the lecture is an example of which cloud computing model? *********************************************************

MIS 535 Week 5 DQ 1 Cloud Services Go Mainstream and DQ 2 Business Value

For more classes visit www.snaptutorial.com

MIS 535 Week 5 DQ 1 Cloud Services Go Mainstream This week’s discussion is an introduction to a significant company that has made great stride in the industry. Salesforce.com is an example of a company that has used the Cloud, particularly the SaaS model, to be competitive. Read the Case Study, “Salesforce.com: Cloud Services Go Mainstream,” in Chapter 5 of the Laudon text. What are the benefits of a cloud deployment for Salesforce.com? How will Cloud Computing change the traditional IT infrastructure?


MIS 535 Week 5 Discussions 2 Business Value of Enterprise Systems This week we are asked to research and explain what and enterprise system is. An enterprise software system is a package that is part of the IT infrastructure that an organization uses to conduct its operations. Define an enterprise system and explain how enterprise software works. Select one type of Enterprise system and describe how it helps businesses achieve operational excellence. *********************************************************

MIS 535 Week 5 Homework (Quiz)

For more classes visit www.snaptutorial.com

MIS 535 Week 5 Homework (Quiz)

1. Which type of infrastructure services provides voice and video connectivity to employees, customers, and suppliers? 2. Specifications that establish the compatibility of products and the ability to communicate in a network are called 3.

_____ unleash powerful economies of scale and result in


declines in manufactured computer products. 4. Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations? 5. The practice of contracting custom software development to an outside firm is commonly referred to as 6. What is the act of providing hardware and software capabilities as services over the Internet? 7. In order to achieve maximum benefit from an enterprise software package, a business 8. Which best describes a suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes?

9. Which type of software enables data to be used by multiple functions and business processes for organization coordination and control?

10. Which type of software is built around thousands of predefined business processes?

11. A company's suppliers, their supplier's suppliers, and the processes for managing relationships with them constitute


12. A company's organizations and processes for distributing and delivering products to the final customers constitute 13.

Inefficiencies arise in a supply chain because of

14. Companies with effective supply chain management systems can expect

15. When tailoring a particular aspect of a system to the way a company does business, enterprise software can provide the company with

16. A scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line best describes a _____ strategy.

17. Enterprise application vendors have created _____ to make their own customer relationship management, supply chain management, and enterprise systems work closely together.

18. _____ integrate(s) multiple applications from multiple business functions, business units, or business partners to deliver a seamless experience for the customer, employee, manager, or business partner and provide(s) a greater degree of cross-functional integration than the traditional enterprise applications.

19.

Which metric is based on the relationship between the


revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company?

20.

Operational CRM applications include tools for

*********************************************************

MIS 535 Week 6 Course Project Final (3 Projects)

For more classes visit www.snaptutorial.com

Project 1: Decision Support System in Trading Currencies Project 2: Vale Company (implementation of Share point) Project 3: Sony Based on the Professor’s feedback to your proposal, develop the Course Project. You are required to use a minimum of five credible sources for research on your proposed solution and to correctly cite all references using APA style. Make sure you do not use more than 20% material from other sources so that 80% of the paper should be your original words. Use the Q&A each week to ask questions about the project. See the suggestions below for ideas on ways to develop your project. Use this format for the project: Course Project Table of Contents (10-15 pages, 225 points, due week 6) Cover Page Table of Contents


1. Abstract 2. Brief Company background 3. Discussion of business problem(s) 4. High level solution 5. Benefits of solving the problem 6. Business/technical approach 7. Business process changes 8. Technology or business practices used to augment the solution 9. Conclusions and overall recommendations 10. High-level implementation plan 11. Summary of project *********************************************************

MIS 535 Week 6 DQ 1 Agile Methodologies and DQ 2 Role of Senior Management

For more classes visit www.snaptutorial.com

MIS 535 Week 6 DQ 1 Agile Methodologies This week we take a look at Agile. The use of agile methodologies changed the face of software development. Historically when using other traditional software methodologies, it was project managers, analysts, developers, testers and each group did their piece of the project then handled it off to the next team. Discuss how the emergence of agile methodologies has changed the IT system building model.


MIS 535 Week 6 Discussions 2 Role of Senior Management What effectives of information system planning if senior management is knowledgeable and in full support of the planning strategy? What role does senior management play in the establishment of effective information system planning in a corporation? *********************************************************

MIS 535 Week 6 Homework (Quiz)

For more classes visit www.snaptutorial.com

MIS 535 Week 6 Homework (Quiz)

1. What will you need to understand and measure for an effective reengineering project?

2. Enabling organizations to make continual improvements to many business processes and to use processes as the fundamental building blocks of corporate information systems is the goal of


3. systems project.

The _____ is directly responsible for the individual

4. Which process develops a detailed description of the functions that a new information system must perform? 5.

The entire system-building effort is driven by

6.

Systems design

7. Transferring transaction data from a legacy system to the new system would be defined by which category of system design specifications? 8. What is the primary driving factor in firms to select domestic outsourcing firms to build system solutions? 9. The four kinds of structural organizational change enabled by IT, in order from least to most risky, are 10. fail because

Traditional software development methodologies often

11. You have been hired by a pharmaceutical company to evaluate its inventory of systems and IT projects. Which types of projects would be best avoided? 12. To best evaluate, from a financial standpoint, an IT investment whose benefits cannot be firmly established in advance, you would use 13. What do many companies overlook when making information system investment decisions? 14.

Information systems projects are valued similarly to stock


options in which model of financial evaluation? 15.

An example of an external integration tool would be:

16.

Agile methodologies emphasize

17.

The major variables in project management are

18. Using a strategic analysis approach, an organization's information requirements are known through a small number of

19. In which approach to systems building are the development stages organized so that tasks in one stage are completed before the tasks in the next stage have begun? 20. The process of building an experimental system quickly and inexpensively for demonstration and evaluation so that users can better determine information requirements. *********************************************************

MIS 535 Week 7 Course Project Presentation (2 Projects)

For more classes visit www.snaptutorial.com

Project 1: Decision Support System in Trading Currencies


Project 2: Sony

MIS 535 Week 7 Course Project Presentation *********************************************************

MIS 535 Week 7 DQ 1 How Phishing Attacks and DQ 2 Facebook, Twitter, Linkedin

For more classes visit www.snaptutorial.com

MIS 535 Week 7 DQ 1 How Phishing Attacks Have Compromised Major System The textbook states that, one increasingly popular tactic is a form of spoofing called phishing. Phishing involves setting up fake Web sites or sending e-mail or text messages that look like those of legitimate businesses to ask users for confidential personal data. The message instructs recipients to update or confirm records by providing social security numbers, bank and credit card information, and other confidential data either by responding to the e-mail message, by entering the information at a bogus Web site, or by calling a telephone number. EBay, PayPal,Amazon.com, Walmart, and a variety of banks, are among the top spoofed companies. Major corporations, governments, and other organizations are hacked each week, mostly by means of phishing attacks. Describe how users and IT organizations should arm themselves against these attacks.


MIS 535 Week 7 Discussions 2 Facebook, Twitter, Linkedin, and other Social Media 36 Pages Hello class, this week we take a look at the major components to cyber security are Confidentially, Integrity, and Availability. As for social media, the most serious security risk comes in terms of integrity. For a business, the outward facing characteristic of integrity is the reputation of the firm. According to a recent survey of European risk managers, reputational damage is the greatest digital risk (Veysey, 2011). A company with a damaged reputation could face difficulties in acquiring new customers and finding off competition. What are the social and security issues for individuals and organizations relative to personal and business use of social media? *********************************************************

MIS 535 Week 7 Homework (Quiz)

For more classes visit www.snaptutorial.com

MIS 535 Week 7 Homework (Quiz)

1.

Social media sites result in loss of personal information


because 2.

Information systems

3. The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called 4. The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called 5.

Immanuel Kant's Categorical Imperative states that

6. 7. States.

The ethical "no free lunch" rule states that European privacy protection is _____ than in the United

8.

Intellectual property can best be described as

9. It is not feasible for companies to produce error-free software because 10.

The practice of spamming has been growing because

11. Which of the five moral dimensions of the information age does spamming raise? 12. Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems refers to

13. Security challenges posed by the communications between layers in a client/server environment are


14.

Phishing involves

15.

Evil twins are

16.

The HIPAA Act of 1996

17. Financial institutions are required to ensure the security and confidentiality of customer data through the 18. Automated data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that 19. to 20.

The vulnerability inherent in wireless networking is due

Statement ranking information risks are included in a(n)

===============================================

Profile for t.ammiealstonbaro.nr.aff

MIS 535 Effective Communication-snaptutorial.com  

For more classes visit www.snaptutorial.com This Tutorial contains 4 Set of Midterm Exam (Scroll down to see Question Details) MIS 53...

MIS 535 Effective Communication-snaptutorial.com  

For more classes visit www.snaptutorial.com This Tutorial contains 4 Set of Midterm Exam (Scroll down to see Question Details) MIS 53...

Advertisement