Thursday, 5 July 2018

CIS336 Week 11 Final Exam


CIS336 Week 11 Final Exam
                Click Link Below To Buy:

Contact Us:
Hwcoursehelp@gmail.com

   Score  48 out of 50 points

             Question 1
2 out of 2 points

TJX’s handling of its serious data breach is consistent with which one of the following?


Stockholder theory
Stockholder theory

             Question 2
2 out of 2 points

This is a balanced approach to managing a company’s IT organization.

Federalism
Federalism

             Question 3
2 out of 2 points

All of the following are main processes of knowledge management EXCEPT:
Answer

The absorption of knowledge
The absorption of knowledge

             Question 4
2 out of 2 points

This project cycle plan chart looks very much like a bar chart and is easy for management to read because of its visual nature.


Gantt
Gantt

             Question 5
2 out of 2 points

IT organizations implement powerful information systems like ERP and SCM that provide centralized data repositories. In addition, IT organizations provide business units with tools that individuals can use to report on and analyze collected data. This IT governance approach is best described as: ________.
Federalism
Federalism

             Question 6

All of the following are common elements of a BI system EXCEPT for:?
Supply chain management
Supply chain management

             Question 7

This allows individuals to own their creativity and innovation in a way similar to owning physical property.
Answer
Selected Answer:
Intellectual property
Intellectual property

             Question 8

To maintain balance in a project with a fixed budget and a well-defined scope, a project team will require flexibility ________.
Answer
Selected Answer:
with project quality.
with the deadline.

             Question 9
2 out of 2 points

What principles, developed in 2000 by the US Department of Commerce (DOC) in consultation with the European Commission, allow U.S. companies to be placed on a list maintained by the DOC?
Safe Harbor framework
Safe Harbor framework

             Question 10
2 out of 2 points

If a company decides to make and develop IS, they are using this type of sourcing.
Insourcing
Insourcing

             Question 11
2 out of 2 points

Which normative theory of business ethics would TJX have displayed if it had informed customers as soon as the breach was corrected and told other retailers how to prevent future security breaches?
Social contract
Social contract

             Question 12

The initial reason organizations outsourced IT was which one of the following?
Cost reduction
Cost reduction

             Question 13
2 out of 2 points

Knowledge that has been identified, captured, and leveraged to produce higher-value goods or services or some other competitive advantage for the firm is called:
Intellectual capital
Intellectual capital

             Question 14
2 out of 2 points

The purchase of a good or service that was previously provided internally, or that could be provided internally, is called:
Outsourcing
Outsourcing

             Question 15
2 out of 2 points

This method of IT funding is the most equitable, as the costs associated with IT are based on use. However, it can be difficult and tedious to calculate the usage costs.
Chargeback
Chargeback

             Question 16
2 out of 2 points

What is at the center of the project triangle?
Quality
Quality

             Question 17
2 out of 2 points

In the chapter, there is the statement, “Internet companies are in business for the money and hence they really would prefer to keep their customers in the dark about how their personal data is being used to generate profits”. Assuming this statement is true, with which ethical theory would you say these Internet companies are most aligned?
Stockholder theory
Stockholder theory

             Question 18
2 out of 2 points

The European Union Directive on Data Protection does all of the following EXCEPT:
Regulate data standards for publically traded companies
Regulate data standards for publically traded companies

             Question 19
2 out of 2 points

________ of the 1960’s dictated a centralized approach to IT governance.
Answer
Mainframes
Mainframes
Response Feedback:      See page 238.

             Question 20
2 out of 2 points

______________ organizations scatter IT components in different locations to address local business needs.
Decentralized
Decentralized
Response Feedback:      See page 238.

             Question 21
2 out of 2 points

________________ is the process of analyzing data warehouses for “gems”.
Data mining
Data mining
Response Feedback:      See page 339.

             Question 22
2 out of 2 points

After its PlayStation Network service was compromised, Sony realized that it needed to establish better ____________ governance.
security
security
Response Feedback:      See page 237.

             Question 23
2 out of 2 points

This type of organization management is where IT controls most of its IT infrastructure in one location.
Centralized IS organization
Centralized IS organization
Response Feedback:      See page 238.

             Question 24
2 out of 2 points

Which one of the following is NOT one of the four essential elements of any project?
System evaluation
System evaluation
Response Feedback:      See page 295

             Question 25
2 out of 2 points

All of the following are frameworks for implementing Sarbanes-Oxley compliance EXCEPT:
BCP
BCP



No comments:

Post a Comment