CIS336 Week 11 Final Exam
Click Link Below To Buy:
Contact Us:
Hwcoursehelp@gmail.com
Score 48
out of 50 points
• Question 1
2 out of 2 points
TJX’s handling of its
serious data breach is consistent with which one of the following?
Stockholder theory
Stockholder theory
• Question 2
2 out of 2 points
This is a balanced
approach to managing a company’s IT organization.
Federalism
Federalism
• Question 3
2 out of 2 points
All of the following
are main processes of knowledge management EXCEPT:
Answer
The absorption of
knowledge
The absorption of
knowledge
• Question 4
2 out of 2 points
This project cycle
plan chart looks very much like a bar chart and is easy for management to read
because of its visual nature.
Gantt
Gantt
• Question 5
2 out of 2 points
IT organizations
implement powerful information systems like ERP and SCM that provide
centralized data repositories. In addition, IT organizations provide business
units with tools that individuals can use to report on and analyze collected
data. This IT governance approach is best described as: ________.
Federalism
Federalism
• Question 6
All of the following
are common elements of a BI system EXCEPT for:?
Supply chain
management
Supply chain
management
• Question 7
This allows
individuals to own their creativity and innovation in a way similar to owning
physical property.
Answer
Selected Answer:
Intellectual property
Intellectual property
• Question 8
To maintain balance in
a project with a fixed budget and a well-defined scope, a project team will
require flexibility ________.
Answer
Selected Answer:
with project quality.
with the deadline.
• Question 9
2 out of 2 points
What principles,
developed in 2000 by the US Department of Commerce (DOC) in consultation with
the European Commission, allow U.S. companies to be placed on a list maintained
by the DOC?
Safe Harbor framework
Safe Harbor framework
• Question 10
2 out of 2 points
If a company decides
to make and develop IS, they are using this type of sourcing.
Insourcing
Insourcing
• Question 11
2 out of 2 points
Which normative theory
of business ethics would TJX have displayed if it had informed customers as
soon as the breach was corrected and told other retailers how to prevent future
security breaches?
Social contract
Social contract
• Question 12
The initial reason
organizations outsourced IT was which one of the following?
Cost reduction
Cost reduction
• Question 13
2 out of 2 points
Knowledge that has
been identified, captured, and leveraged to produce higher-value goods or
services or some other competitive advantage for the firm is called:
Intellectual capital
Intellectual capital
• Question 14
2 out of 2 points
The purchase of a good
or service that was previously provided internally, or that could be provided
internally, is called:
Outsourcing
Outsourcing
• Question 15
2 out of 2 points
This method of IT
funding is the most equitable, as the costs associated with IT are based on
use. However, it can be difficult and tedious to calculate the usage costs.
Chargeback
Chargeback
• Question 16
2 out of 2 points
What is at the center
of the project triangle?
Quality
Quality
• Question 17
2 out of 2 points
In the chapter, there
is the statement, “Internet companies are in business for the money and hence
they really would prefer to keep their customers in the dark about how their
personal data is being used to generate profits”. Assuming this statement is
true, with which ethical theory would you say these Internet companies are most
aligned?
Stockholder theory
Stockholder theory
• Question 18
2 out of 2 points
The European Union
Directive on Data Protection does all of the following EXCEPT:
Regulate data
standards for publically traded companies
Regulate data
standards for publically traded companies
• Question 19
2 out of 2 points
________ of the 1960’s
dictated a centralized approach to IT governance.
Answer
Mainframes
Mainframes
Response Feedback: See page 238.
• Question 20
2 out of 2 points
______________
organizations scatter IT components in different locations to address local
business needs.
Decentralized
Decentralized
Response Feedback: See page 238.
• Question 21
2 out of 2 points
________________ is
the process of analyzing data warehouses for “gems”.
Data mining
Data mining
Response Feedback: See page 339.
• Question 22
2 out of 2 points
After its PlayStation
Network service was compromised, Sony realized that it needed to establish
better ____________ governance.
security
security
Response Feedback: See page 237.
• Question 23
2 out of 2 points
This type of
organization management is where IT controls most of its IT infrastructure in
one location.
Centralized IS
organization
Centralized IS
organization
Response Feedback: See page 238.
• Question 24
2 out of 2 points
Which one of the
following is NOT one of the four essential elements of any project?
System evaluation
System evaluation
Response Feedback: See page 295
• Question 25
2 out of 2 points
All of the following
are frameworks for implementing Sarbanes-Oxley compliance EXCEPT:
BCP
BCP
No comments:
Post a Comment