Latest News

For Orders, Check: masterwriters.net

BBA 3551 Information Systems Management



Unit I Assessment
Question 1
4 out of 4 points



A group of components that interact to produce information is called:



Selected Answer:

IS

Correct Answer:

IS




Question 2
4 out of 4 points



Mark follows certain steps to access the supplementary readings for a course when using his organization's library management system. These steps that he follows are examples of the ____________ component of an information system.



Selected Answer:

procedure
Correct Answer:

procedure



Question 3
4 out of 4 points



When presenting an idea to his colleagues, Marcus failed to consider others' views and got defensive when people asked him questions. This situation indicates that Marcus lacks ____________ skills.



Selected Answer:

collaboration
Correct Answer:

collaboration



Question 4
4 out of 4 points



Which of the following is a major implication of Moore's Law?



Selected Answer:

Costs of communications and storage have become very low.
Correct Answer:

Costs of communications and storage have become very low.



Question 5
4 out of 4 points



Because of this law, the cost of data processing, communications, and storage is essentially zero.



Selected Answer:

Moore's
Correct Answer:

Moore's




Question 6
Name the five data characteristics, and provide a short explanation for each of the data characteristics.  Your response should be at least 200 words in length.
Question 7
State Moore's Law. What is the implication of Moore's Law for managers? Your response should be at least 200 words in length.

Unit I Scholarly Activity
Components of an Information System
In this one- to two-page (250-500 word) paper, you will discuss each of the different components of an information system, and then explain how you can use the five-component model to guide your learning and thinking about information systems. You may use the Unit Lesson, Chapter Readings, Suggested Readings, Learning Activities, and outside resources to aid in your research.
Include the following in your paper:
·         Define each component of an information system.
·         Define how you can use the five-component model to guide your learning and thinking about information systems. Include at least one outside research item in your paper.
Use APA format and cite your sources.

Unit II Assessment
Question 1
4 out of 4 points



A(n) ____________ is a network of activities that generate value by transforming inputs into outputs.



Selected Answer:

business process
Correct Answer:

business process



Question 2
4 out of 4 points



What are the four primary purposes of collaboration?



Selected Answer:

Becoming informed, making decisions, solving problems, and managing projects
Correct Answer:

Becoming informed, making decisions, solving problems, and managing projects



Question 3
4 out of 4 points



According to Porter's model of business activities, interactions across value chain activities are called ____________ .



Selected Answer:

linkages
Correct Answer:

linkages



Question 4
4 out of 4 points



Which of the following value chain activities involves inducing buyers to purchase a product and providing a means for them to do so?



Selected Answer:

Sales and marketing
Correct Answer:

Sales and marketing



Question 5
4 out of 4 points



Which of the following is NOT a part of the five components of an information system for collaboration?



Selected Answer:

Information
Correct Answer:

Information




Question 6
Describe the process by which organizations develop their information systems.  Your response should be at least 200 words in length.
Question 7
Explain the process implementation competitive strategies. Use examples as needed. Your response should be at least 200 words in length.

Unit II Case Study
Competitive Strategy Over the Web Assignment
In this case study, you will research an organization and determine how their business strategy differentiates them from other organizations in the same industry using Porter’s four competitive strategies model (p. 85).
Write a one- to two-page (250-500-word) paper to include the following:
·         A brief explanation of Porter's four competitive strategies.
·         A brief explanation of how competitive strategy determines value chain structure.
·         Identify and discuss the competitive strategy that the organization you researched utilizes in order to differentiate them from other organizations in the same industry.
APA rules for formatting, quoting, paraphrasing, citing, and listing of sources are to be followed.
Unit III Assessment

Question 1
4 out of 4 points



Which of the following statements is true of closed source projects?



Selected Answer:

Only trusted programmers are allowed to make changes to a closed source project.
Correct Answer:

Only trusted programmers are allowed to make changes to a closed source project.



Question 2
4 out of 4 points



Which of the following refers to a small, portable storage device that can be used to back up data and to transfer it from one computer to another?



Selected Answer:

Thumb drive
Correct Answer:

Thumb drive



Question 3
4 out of 4 points



A ____________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data.



Selected Answer:

database application
Correct Answer:

database application



Question 4
4 out of 4 points



A database is required instead of a spreadsheet when ____________ .



Selected Answer:

lists involve data with multiple themes
Correct Answer:

lists involve data with multiple themes



Question 5
4 out of 4 points



When an individual buys a program for his or her personal computer, they are actually buying a software:



Selected Answer:

License
Correct Answer:

License




Question 6
Describe a DBMS and its functions. List, at minimum, three of the popular DBMS products and give a brief description of each. Your response should be at least 200 words in length
Question 7
Identify the disadvantages of employee use of mobile systems at work and discuss each of the disadvantages. Your response should be at least 200 words in length

Unit III PowerPoint Presentation
Open Source Software Research Project
Research an open source software project. Examples of open source projects are listed on page 123 of your textbook. You are not restricted to the open source projects listed on page 123; you may research one of your own choosing that interests you.
In MS PowerPoint, create a presentation with slides that describe the open source software and how it works. Discuss the role this open source software has in management information systems.
Remember, management information systems is the management and use of information systems that help organizations achieve their strategies (page 10 of your textbook).
Your PowerPoint must have a minimum of four slides. Be sure to use the 7X7 rule in PowerPoint: no more than 7 lines per slide and no more than 7 words per line. Use of images, graphics, and diagrams is required. Be sure to include your sources on a references slide in APA format.

 IV Assessment

Question 1
4 out of 4 points



____________ are formally-defined, standardized processes that involve day-to-day operations.



Selected Answer:

Structured processes
Correct Answer:

Structured processes



Question 2
4 out of 4 points



A private internet that is used exclusively within an organization is called a(n) ____________ .



Selected Answer:

intranet
Correct Answer:

intranet



Question 3
4 out of 4 points



Computers that reside in different geographic locations are connected using a(n) ____________ .



Selected Answer:

WAN
Correct Answer:

WAN



Question 4
4 out of 4 points



____________ is a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform.



Selected Answer:

Enterprise resource planning
Correct Answer:

Enterprise resource planning



Question 5
4 out of 4 points



A computer ____________ is a collection of computers that communicate with one another over transmission lines or wirelessly.



Selected Answer:

network
Correct Answer:

network



Question 6
Explain what is meant by computer network and describe the various types of networks. Your response should be at least 200 words in length.
Question 7
Explain what is meant by SaaS, PaaS, and IaaS. Support your answer with an example of each.  Your response should be at least 200 words in length.

Unit IV Scholarly Activity
Cloud Profitability
In a one- to two-page paper (250-500 words), discuss whether or not there are cost benefits to cloud computing using specific examples. Be sure to include at least three reference sources.
APA rules for formatting, quoting, paraphrasing, citing, and listing of sources are to be followed.

Unit V Assessment
Question 1
4 out of 4 points



____________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.



Selected Answer:

Data acquisition
Correct Answer:

Data acquisition



Question 2
4 out of 4 points



A ____________ is an information system that supports the sharing of content among networks of users.



Selected Answer:

social media information system (SMIS)
Correct Answer:

social media information system (SMIS)



Question 3
4 out of 4 points



Web 2.0 refers to Web-delivered services and content paid for by ____________ .



Selected Answer:

advertisers
Correct Answer:

advertisers



Question 4
4 out of 4 points



Web 2.0 encourages companies to provide software ____________ .



Selected Answer:

as a free service
Correct Answer:

as a free service



Question 5
4 out of 4 points



Which of the following statements is true of social CRM?



Selected Answer:

Each customer crafts his or her own relationship with the company.
Correct Answer:

Each customer crafts his or her own relationship with the company.




Question 6
Define business intelligence and BI systems.  Your response should be at least 200 words in length.
Question 7
How should organizations respond to social networking problems? Which one of them is a dangerous approach, and why? Your response should be at least 200 words in length.

Unit V Scholarly Activity
Data Warehouses and Data Marts
Write a one- to two-page (250-500 word) paper that discusses the differences between data warehouses and data marts. Also, discuss how organizations can use data warehouses and data marts to acquire data. You must use the CSU Online Library to locate at least two sources for your paper. APA rules for formatting, quoting, paraphrasing, citing, and listing of sources are to be followed.

VI Assessment
Question 1
4 out of 4 points



Which of the following statements is true about the relationship between business processes and information systems?



Selected Answer:

A business process need not relate to any information system, but an information system relates to at least one business process.
Correct Answer:

A business process need not relate to any information system, but an information system relates to at least one business process.



Question 2
4 out of 4 points



A ____________ shows the tasks, dates, and dependencies for the tasks of a project.



Selected Answer:

Gantt chart
Correct Answer:

Gantt chart



Question 3
4 out of 4 points



The SDLC process follows a linear sequence from requirements to design to implementation. Therefore, the SDLC process is also known as the ____________ .



Selected Answer:

waterfall method
Correct Answer:

waterfall method



Question 4
4 out of 4 points



Rapid application development, the unified process, extreme programming, and scrum have led to ____________ .



Selected Answer:

agile development
Correct Answer:

agile development



Question 5
4 out of 4 points



The first step in the system definition phase of the systems development life cycle (SDLC) is to ____________ .



Selected Answer:

determine the goals and scope
Correct Answer:

determine the goals and scope




Question 6
What are the phases of the systems development life cycle (SDLC)? Your response should be at least 200 words in length.
Question 7
Define technical feasibility and organizational feasibility. Your response should be at least 200 words in length.

Unit VI Scholarly Activity
Business Process Management
In this writing assignment, you will explore how organizations use business process management (BPM). Write a one-page (250-word) paper explaining how organizations use business process management (BPM). Be sure to use at least one specific example from the CSU Online Library, and address the following in your paper:
·         What is business process management (BPM)?
·         Why do processes need management?
·         What are BPM activities?
APA rules for formatting, quoting, paraphrasing, citing, and listing of sources are to be followed

Unit VII Assessment

Question 1
4 out of 4 points



In an IS department, the ____________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media.



Selected Answer:

operations
Correct Answer:

operations



Question 2
4 out of 4 points



____________ is the process of hiring another organization to perform a service.



Selected Answer:

Outsourcing
Correct Answer:

Outsourcing



Question 3
4 out of 4 points



The purpose of the ____________ group is to protect data and information assets by establishing data standards and data management practices and policies.



Selected Answer:

data administration
Correct Answer:

data administration



Question 4
4 out of 4 points



Every IS user has a right to a secure computing environment. This means that:



Selected Answer:

The organization should protect his/her computer and its files
Correct Answer:

The organization should protect his/her computer and its files



Question 5
4 out of 4 points



A ____________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans.



Selected Answer:

system analyst
Correct Answer:

system analyst




Question 6
Describe the major functions of the IS department.  Your response should be at least 200 words in length
Question 7
Describe a steering committee and explain the CIO's role with regard to it. Your response should be at least 200 words in length.

Unit VIII Assessment
Question 1
4 out of 4 points



____________ is the term used to denote viruses, worms, and Trojan horses.



Selected Answer:

Malware
Correct Answer:

Malware



Question 2
4 out of 4 points



Which of the following is a critical security function that the senior management should address in an organization?



Selected Answer:

Establishing the security policy
Correct Answer:

Establishing the security policy



Question 3
4 out of 4 points



A(n) ____________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.



Selected Answer:

intrusion detection system
Correct Answer:

intrusion detection system



Question 4
4 out of 4 points



____________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.



Selected Answer:

Hacking
Correct Answer:

Hacking



Question 5
4 out of 4 points



____________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.



Selected Answer:

Data administration
Correct Answer:

Data administration



Question 6
Define threat, vulnerability, safeguard, and target. Support your answer with examples. Your response should be at least 200 words in length.
Question 7
Explain what is meant by denial of service and provide an example to support your answer. Your response should be at least 200 words in length

Unit VIII Research Paper
Utilizing the unit lessons, textbook, CSU Online Library, and other outside sources, write a two-page (not including title and reference pages) Research Paper identifying the key components of information systems management discussed throughout this course.
Provide a description of an organization you are familiar with (possibly a company you have worked for in the past or are currently working for) and describe briefly what services they contribute. Then, select three out of the six questions below, and provide detailed answers, supporting those answers by referencing any sources used. Be sure to use examples from your research to strengthen your argument as needed.
·         What personal knowledge management tools does this organization utilize?
·         What steps has this organization taken in securing their information and knowledge?
·         What has this organization done to gain and sustain an advantage over their competitors? Describe in detail how this organization manages the components of its IT infrastructure. In what ways does the organization demonstrate successful collaboration?
·         Identify at least two types of hardware and two types of software used by this organization.
APA rules for formatting, quoting, paraphrasing, citing, and listing of sources are to be followed.

No comments:

Post a Comment