CIS 336
Question 1.
Joe works for a company where the IT department charges him
for the number of CRM login accounts that are in his department. What type of
IT funding model is his company deploying?
Question 2.
This project cycle plan chart looks very much like a bar
chart and is easy for management to read because of its visual nature.
Question 3.
What is at the center of the project triangle?
Question 4.
This is a text message that is stored on a user’s computer
by a Web server that helps trace the user’s browsing habits.
Question 5.
All of the following are risks associated with IS
outsourcing EXCEPT;
Question 6.
This project cycle plan tends to be used for projects that
have direct relationships between time and resources.
Question 7.
This is an IT governance framework that is consistent with
COSO controls.
Question 8.
The question “What information does a person or an
organization have a right or a privilege to obtain?” is part of this ethical
issue.
Question 9.
________________ is the process of analyzing data warehouses
for “gems”.
Question 10.
Which normative theory of business ethics would TJX have
displayed if it had informed customers as soon as the breach was corrected and
told other retailers how to prevent future security breaches?
Question 11.
Scorecards provide a summary of information gathered over a
period of time. Another common IT monitoring tool is the _____________.
Question 12.
The initial reason organizations outsourced IT was which one
of the following?
Question 13.
The project triangle includes 3 sides – time, scope and
________.
Question 14.
Sam has just purchased 10 new high speed color laser
printers for his company. He is very excited because he got a 40% discount and
paid only $2,990 for each unit. His boss, Joe, wants to know things such as
operating costs, support, overhead, etc. for the printers. Joe wants to know
this value:
Question 15.
All of the following are frameworks for implementing
Sarbanes-Oxley compliance EXCEPT:
Question 16.
An organization may convert from an old system to a new
system by choosing to run both the old and new systems at the same time until
the new system is fully accepted. This is known as __________.
Question 17.
This allows individuals to own their creativity and
innovation in a way similar to owning physical property.
Question 18.
The newest sourcing option for today’s IT organizations is:
Question 19.
Which one of the following is NOT one of the four essential
elements of any project?
Question 20.
Most companies would like to obtain the advantages derived
from both centralized and decentralized organizational paradigms. What type of
IT governance model would best help them to achieve this goal?
Question 21.
This method of IT funding is the most equitable, as the
costs associated with IT are based on use. However, it can be difficult and
tedious to calculate the usage costs.
Question 22.
If a company decides to make and develop IS, they are using
this type of sourcing.
Question 23.
To maintain balance in a project with a fixed budget and a
well-defined scope, a project team will require flexibility ________.
Question 24.
Kellwood, the American apparel maker, decided to consolidate
and bring IT operations back in-house in order to reduce costs. Kellwood choose
which of the following strategies?
Question 25.
In the chapter, there is the statement, “Internet companies
are in business for the money and hence they really would prefer to keep their
customers in the dark about how their personal data is being used to generate
profits”. Assuming this statement is true, with which ethical theory would you say these Internet companies are most
aligned?
0 comments:
Post a Comment