Question

Funding an IS project through a Chargeback method involves: Pricing the IS service out for the...

Funding an IS project through a Chargeback method involves:

  1. Pricing the IS service out for the customer buying the end product
  2. Direct billing by the firm for IS resources or services to the department that uses them
  3. Direct billing by the manager of a function for IS resources or services to an employee that uses them
  4. An accounting process that reduces tax liability for capital investments

All of the following are attributes of considering IS costs as Overhead except the following:

  1. Budgeting only happens once a year
  2. More flexibility for functional managers
  3. Less individual employee awareness of IS costs
  4. More Board awareness of IS use

A Business Case is a formal document prepared and presented by functional managers to propose an IS initiative based on all of the following except:

  1. Internal Rate of Return
  2. Return on Investment
  3. Net Present Value of investment
  4. A technical or operational implementation process

All of the following are factors in assessing an individual project’s risk to the firm except:

  1. Project size and complexity
  2. Team experience with the specific technology
  3. Degrees of organizational change required
  4. All of the above

All of the following are potential upsides for outsourcing except:

  1. Reducing costs
  2. Acquiring talent or institutional knowledge
  3. Creating proprietary technology
  4. Improving strategic focus

The ModMeter case study was an example of Portfolio Management which must balance the following firm considerations:

  1. Customer Willingness to Pay, Supplier Willingness to Pay, Customer Life Cycle
  2. Competitive Position, Firm Maturity, Growth Potential, Market Threats
  3. Strategic, Informational, Transaction, and Infrastructure priorities
  4. Product lines, Product Life Cycles, New Product Development, Potential mergers

The following are all examples of a firm choosing a Custom Development strategy except:

  1. Hiring full-time developers to build a new feature
    1. Redesigning an existing product and pivoting to a new market
    2. Hiring a development firm to streamline new financial reporting processes
    1. Filing a patent for a new process your financial team developed

These are the critical components in a Systems Development Life Cycle:

    1. Business Case, Budget Approval, IS Planning
    2. Definition, Build, Implementation
    3. RFP, Vetting, Purchasing
    4. Hiring, Training, Deploying

Select 3 answers that describe Agile Development:

  1. Individuals and interactions over process and tools
  2. Working software over comprehensive documentation
  3. Customer Collaboration over contract negotiation
  4. Cost assessment over feature requirement

In the SuccessMaker case study, the team switched from Waterfall to Agile Development methods for all the following reasons except:

  1. They wanted a shorter cycle for developing new features
  2. They wanted their product managers to own the product instead of developers
  3. They wanted to offshore all of their software development
  4. They wanted a better understanding of user stories and experiences

All are an attribute of Open Source software except:

  1. Distributed peer-review based
  2. Technology neutral
  3. Available to change source code
  4. Always free
  5. All are attributes

           

A Scrum Master is:

    1. Another name for CTO
    2. The lead developer of an outsourced firm development team
    3. The person in charge of a sprint using Agile Development
    4. The project manager of a Waterfall Development project

The four key components of an Internet-enabled device are:

  1. Wifi connection, hardwire connection, dial-up connection
  2. Atomicity, Consistency, Isolation, Durability
  3. Monitoring, Control, Optimization, Autonomy
  4. User Interface, Process Logic, Data storage

The key components of a Digital Data Stream are:

  1. The type of technologies used to create a channel
  2. The type of content created
  3. The source of the content
  4. The legal status of the content
  5. All of the above

The following are all examples of process-to-actuate for a Digital Data Stream except:

  1. Sending a weather advisory over text message
  2. A hotel booking on TRIMBAM
  3. Predicting next quarter inventory needs at CVS
  4. An alert from Amazon Ring

The following is the difference between supervised and unsupervised machine learning:

  1. One has human oversight, the other does not
  2. One is based on software, while the other is based on hardware
  3. One relies on comparing activity to a defined gold standard, the other does not rely on a fixed gold standard
  4. One features action based on process-to-actuate DDS, the other based on assimilate-to-analyze

Blockchain is a system that monitors transactions by all of the following components except:

  1. Distributed ownership
  2. Built-in validation
  3. Anonymity of users
  4. Transparency

“Mixed reality” describes the following scenario:

  1. A virtual experience provided through digital technology devices
  2. Any real world experience that relies on a smart device
  3. An experience that incorporates AR technology in a real world setting
  4. Any virtual experience that relies on reimagining the real world

Amazon Ring is an example of all of the following concepts except:

  1. It is a smart device
  2. It relies on high powered cloud computing
  3. It employs machine learning to improve efficiency
  4. It is an example of a network effect
  5. All of the above

Risk reduction when planning for a cybersecurity threat means:

  1. The strategy of not investing in countermeasures and not reducing risk
  2. The strategy of actively investing in countermeasures and safeguards against risk
  3. The strategy of passing some or all of the risks to a third party
  4. The strategy of establishing clear IT processes and responsibilities as part of an IS strategy planning process

These are all examples of a potential internal cybersecurity threat except:

  1. An ex-employee still having password access to data
  2. An executive losing his briefcase with security codes in it
  3. A firm’s old server being attacked by a hacker
  4. A worker taking sensitive data on a laptop off premise for a conference

           

You work in cybersecurity and follow NIST Cybersecurity Framework, if your function focus is Protection, what are your responsibilities:

  1. Manage IT Assets and risk governance, monitor business environment
  2. Control access to the IT assets and control security training
  3. Monitor system performance for any anomalies
  4. Respond to detected threats, plan response and mitigation
  5. Retrieve compromised data or systems

           

Pick an example of “function creep”:

  1. Amazon promoting books by authors you have previously purchased
  2. Netflix tailoring your homepage for new movies you might like
  3. CVS emailing you about Flu Shots during the winter
  4. Uber selling your ride information to Zillow
  5. Facebook showing ads of a local politician’s campaign in your neighborhood

Which weakness did hackers exploit in the Target data breach case study?

  1. Technology failures within performance of IT systems
  2. Process failures in monitoring usage of systems
  3. Human failures in communication and risk training
  4. Structure failures in reporting between functions in firm
  5. All of the above

      Is absolute privacy possible when relying on Information Technology Systems?

  1. Yes, but the IT just hasn’t been perfected yet
  2. Yes, but the human element of a firm or user will always be a risk
  3. No, an IT system can never guarantee a user or firm absolute privacy
  4. No, but an IT system shouldn’t be focused on privacy to begin with

Homework Answers

Answer #1

1. b. Direct billing by the firm for IS resources or services to the department that uses them

2. a Budgeting only happens once a year

3. a Internal Rate of Return

4. d. All of the above

5. c Creating proprietary technology'

We are only allowed to answer 4 subparts of a question. I have however answerred 5. Kindly repost the remaining questions to get the solutions.

Feel free to ask for any clarification, if required. Kindly provide feedback by thumbs up. It would be highly appreciated. Thank You.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
You are part of agile innovation team. Your team has been staying close to Hospital IT...
You are part of agile innovation team. Your team has been staying close to Hospital IT team and adapt quickly to changing conditions for the new website. The team almost always result in higher team productivity and morale, faster time to market, better quality, and lower risk than traditional approaches can achieve. Your team members are familiar with testing the happy paths, how users (Patients ) should use the software. You team launched a web application for the Hospital after...
Please read this scenario and job description carefully. You are involved in the prestigious but often...
Please read this scenario and job description carefully. You are involved in the prestigious but often challenging Google recruitment process. As part of this process you are required to respond to several questions and activities. All your answers must address the context of this scenario and the information given in the individual questions. Job description - Software development professional at Google There's no such thing as “a normal day" at Google. We work to create and maintain the safest operating...
Scenario Please read this scenario and job description carefully. You are involved in the prestigious but...
Scenario Please read this scenario and job description carefully. You are involved in the prestigious but often challenging Google recruitment process. As part of this process you are required to respond to several questions and activities. All your answers must address the context of this scenario and the information given in the individual questions . Job description - Software development professional at Google There's no such thing as “a normal day" at Google. We work to create and maintain the...
The Business Case for Agility “The battle is not always to the strongest, nor the race...
The Business Case for Agility “The battle is not always to the strongest, nor the race to the swiftest, but that’s the way to bet ’em!”  —C. Morgan Cofer In This Chapter This chapter discusses the business case for Agility, presenting six benefits for teams and the enterprise. It also describes a financial model that shows why incremental development works. Takeaways Agility is not just about the team. There are product-management, project-management, and technical issues beyond the team’s control. Lean-Agile provides...
QUESTION 44 The key phrase that describes the concept of quantum computing is A. Exponentially scalable...
QUESTION 44 The key phrase that describes the concept of quantum computing is A. Exponentially scalable and highly parallel computing B. Able to accommodate massive quantities of data C. Able to connect to an increased number of devices D. Accommodates a quantum leap in the number of memory cards in a device 2 points    QUESTION 45 Revenue models for most Social Media companies include the following, EXCEPT: A. Charging a fee for their basic service level B. Advertising revenues...
FinTechCo Case Study Company Overview FinTechCo is a medium-sized financial services company comprising of 45 employees...
FinTechCo Case Study Company Overview FinTechCo is a medium-sized financial services company comprising of 45 employees with an annual revenue of $10 million. It has approximately 1000 customers comprising of private individuals and small companies. FinTechCo’s mission is to provide financial services and advice to its clients, to sell various products and services and offer consultation guidance regarding the information systems that support them. Problem Statement FinTechCo’s technical team were originally qualified financial planners who transitioned into technical roles and...
Case 3: Bank of America: “Keep the Change” Service Design What is best practice in service...
Case 3: Bank of America: “Keep the Change” Service Design What is best practice in service development? It is very similar to product development as the following combination financial product/service project illustrates. The goal of this service development project was to get debit-card holders to open savings accounts. In the spring of 2004, a team of Bank of America researchers and consultants spent two months observing a dozen boomer-age women and their families when they shopped, balanced their checkbooks, and...
choose correct answer 1)The difference between manufacturer's desire to produce large quantities of a limited variety...
choose correct answer 1)The difference between manufacturer's desire to produce large quantities of a limited variety of items vs. a customer's desire to demand small quantities of numerous items best describes which of the following?        Discrepancy in space        Discrepancy in quantity and assortment        Discrepancy in time        Discrepancy in logistics 2)Developing long-term relationships with key supply chain participants (e.g., consumers, intermediate customers, and suppliers) can be best described as:        Relationship marketing...
SECTION A: CASE TWO READ THE CASE CAREFULLY AND ANSWER THE QUESTIONS THAT FOLLOW DIGITAL SERVICE...
SECTION A: CASE TWO READ THE CASE CAREFULLY AND ANSWER THE QUESTIONS THAT FOLLOW DIGITAL SERVICE FOR STUDENTS IN HIGHER EDUCATION (DSSHED) Digital Service for Students in Higher Education (DSSHED) is an innovation platform for the creators of next generation products and services. It was founded by the Ingenious Investment Group (IIG). The objective of DSSHED is to boost multidisciplinary agile innovation culture and encourage entrepreneurship in its catchment region. DSSHED provides students and companies with a collaborative and multidisciplinary...
You are required to research and write a 2500-word individual report in response to a case...
You are required to research and write a 2500-word individual report in response to a case scenario. This assessment offers you an opportunity to apply the knowledge you gained about microservices architecture in Part A. You are required to use the case as context to write a report for both business and IT stakeholders explaining the advantages and disadvantages of microservices architecture and the benefits it can offer an organisation. You will need to demonstrate your ability to identify business...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT