Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Funding an IS project through a Chargeback method involves: Pricing the IS service out for the customer buying the end product Direct billing by the

Funding an IS project through a Chargeback method involves:

  1. Pricing the IS service out for the customer buying the end product
  2. Direct billing by the firm for IS resources or services to the department that uses them
  3. Direct billing by the manager of a function for IS resources or services to an employee that uses them
  4. An accounting process that reduces tax liability for capital investments

All of the following are attributes of considering IS costs as Overhead except the following:

  1. Budgeting only happens once a year
  2. More flexibility for functional managers
  3. Less individual employee awareness of IS costs
  4. More Board awareness of IS use

A Business Case is a formal document prepared and presented by functional managers to propose an IS initiative based on all of the following except:

  1. Internal Rate of Return
  2. Return on Investment
  3. Net Present Value of investment
  4. A technical or operational implementation process

All of the following are factors in assessing an individual projects risk to the firm except:

  1. Project size and complexity
  2. Team experience with the specific technology
  3. Degrees of organizational change required
  4. All of the above

All of the following are potential upsides for outsourcing except:

  1. Reducing costs
  2. Acquiring talent or institutional knowledge
  3. Creating proprietary technology
  4. Improving strategic focus

The ModMeter case study was an example of Portfolio Management which must balance the following firm considerations:

  1. Customer Willingness to Pay, Supplier Willingness to Pay, Customer Life Cycle
  2. Competitive Position, Firm Maturity, Growth Potential, Market Threats
  3. Strategic, Informational, Transaction, and Infrastructure priorities
  4. Product lines, Product Life Cycles, New Product Development, Potential mergers

The following are all examples of a firm choosing a Custom Development strategy except:

  1. Hiring full-time developers to build a new feature
    1. Redesigning an existing product and pivoting to a new market
    2. Hiring a development firm to streamline new financial reporting processes
    1. Filing a patent for a new process your financial team developed

These are the critical components in a Systems Development Life Cycle:

    1. Business Case, Budget Approval, IS Planning
    2. Definition, Build, Implementation
    3. RFP, Vetting, Purchasing
    4. Hiring, Training, Deploying

Select 3 answers that describe Agile Development:

  1. Individuals and interactions over process and tools
  2. Working software over comprehensive documentation
  3. Customer Collaboration over contract negotiation
  4. Cost assessment over feature requirement

In the SuccessMaker case study, the team switched from Waterfall to Agile Development methods for all the following reasons except:

  1. They wanted a shorter cycle for developing new features
  2. They wanted their product managers to own the product instead of developers
  3. They wanted to offshore all of their software development
  4. They wanted a better understanding of user stories and experiences

All are an attribute of Open Source software except:

  1. Distributed peer-review based
  2. Technology neutral
  3. Available to change source code
  4. Always free
  5. All are attributes

A Scrum Master is:

    1. Another name for CTO
    2. The lead developer of an outsourced firm development team
    3. The person in charge of a sprint using Agile Development
    4. The project manager of a Waterfall Development project

The four key components of an Internet-enabled device are:

  1. Wifi connection, hardwire connection, dial-up connection
  2. Atomicity, Consistency, Isolation, Durability
  3. Monitoring, Control, Optimization, Autonomy
  4. User Interface, Process Logic, Data storage

The key components of a Digital Data Stream are:

  1. The type of technologies used to create a channel
  2. The type of content created
  3. The source of the content
  4. The legal status of the content
  5. All of the above

The following are all examples of process-to-actuate for a Digital Data Stream except:

  1. Sending a weather advisory over text message
  2. A hotel booking on TRIMBAM
  3. Predicting next quarter inventory needs at CVS
  4. An alert from Amazon Ring

The following is the difference between supervised and unsupervised machine learning:

  1. One has human oversight, the other does not
  2. One is based on software, while the other is based on hardware
  3. One relies on comparing activity to a defined gold standard, the other does not rely on a fixed gold standard
  4. One features action based on process-to-actuate DDS, the other based on assimilate-to-analyze

Blockchain is a system that monitors transactions by all of the following components except:

  1. Distributed ownership
  2. Built-in validation
  3. Anonymity of users
  4. Transparency

Mixed reality describes the following scenario:

  1. A virtual experience provided through digital technology devices
  2. Any real world experience that relies on a smart device
  3. An experience that incorporates AR technology in a real world setting
  4. Any virtual experience that relies on reimagining the real world

Amazon Ring is an example of all of the following concepts except:

  1. It is a smart device
  2. It relies on high powered cloud computing
  3. It employs machine learning to improve efficiency
  4. It is an example of a network effect
  5. All of the above

Risk reduction when planning for a cybersecurity threat means:

  1. The strategy of not investing in countermeasures and not reducing risk
  2. The strategy of actively investing in countermeasures and safeguards against risk
  3. The strategy of passing some or all of the risks to a third party
  4. The strategy of establishing clear IT processes and responsibilities as part of an IS strategy planning process

These are all examples of a potential internal cybersecurity threat except:

  1. An ex-employee still having password access to data
  2. An executive losing his briefcase with security codes in it
  3. A firms old server being attacked by a hacker
  4. A worker taking sensitive data on a laptop off premise for a conference

You work in cybersecurity and follow NIST Cybersecurity Framework, if your function focus is Protection, what are your responsibilities:

  1. Manage IT Assets and risk governance, monitor business environment
  2. Control access to the IT assets and control security training
  3. Monitor system performance for any anomalies
  4. Respond to detected threats, plan response and mitigation
  5. Retrieve compromised data or systems

Pick an example of function creep:

  1. Amazon promoting books by authors you have previously purchased
  2. Netflix tailoring your homepage for new movies you might like
  3. CVS emailing you about Flu Shots during the winter
  4. Uber selling your ride information to Zillow
  5. Facebook showing ads of a local politicians campaign in your neighborhood

Which weakness did hackers exploit in the Target data breach case study?

  1. Technology failures within performance of IT systems
  2. Process failures in monitoring usage of systems
  3. Human failures in communication and risk training
  4. Structure failures in reporting between functions in firm
  5. All of the above

Is absolute privacy possible when relying on Information Technology Systems?

  1. Yes, but the IT just hasnt been perfected yet
  2. Yes, but the human element of a firm or user will always be a risk
  3. No, an IT system can never guarantee a user or firm absolute privacy
  4. No, but an IT system shouldnt be focused on privacy to begin with

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Establishing A CGMP Laboratory Audit System A Practical Guide

Authors: David M. Bliesner

1st Edition

0471738409, 978-0471738404

More Books

Students also viewed these Accounting questions