Question
Funding an IS project through a Chargeback method involves: Pricing the IS service out for the customer buying the end product Direct billing by the
Funding an IS project through a Chargeback method involves:
- Pricing the IS service out for the customer buying the end product
- Direct billing by the firm for IS resources or services to the department that uses them
- Direct billing by the manager of a function for IS resources or services to an employee that uses them
- An accounting process that reduces tax liability for capital investments
All of the following are attributes of considering IS costs as Overhead except the following:
- Budgeting only happens once a year
- More flexibility for functional managers
- Less individual employee awareness of IS costs
- More Board awareness of IS use
A Business Case is a formal document prepared and presented by functional managers to propose an IS initiative based on all of the following except:
- Internal Rate of Return
- Return on Investment
- Net Present Value of investment
- A technical or operational implementation process
All of the following are factors in assessing an individual projects risk to the firm except:
- Project size and complexity
- Team experience with the specific technology
- Degrees of organizational change required
- All of the above
All of the following are potential upsides for outsourcing except:
- Reducing costs
- Acquiring talent or institutional knowledge
- Creating proprietary technology
- Improving strategic focus
The ModMeter case study was an example of Portfolio Management which must balance the following firm considerations:
- Customer Willingness to Pay, Supplier Willingness to Pay, Customer Life Cycle
- Competitive Position, Firm Maturity, Growth Potential, Market Threats
- Strategic, Informational, Transaction, and Infrastructure priorities
- Product lines, Product Life Cycles, New Product Development, Potential mergers
The following are all examples of a firm choosing a Custom Development strategy except:
- Hiring full-time developers to build a new feature
- Redesigning an existing product and pivoting to a new market
- Hiring a development firm to streamline new financial reporting processes
-
- Filing a patent for a new process your financial team developed
These are the critical components in a Systems Development Life Cycle:
-
- Business Case, Budget Approval, IS Planning
- Definition, Build, Implementation
- RFP, Vetting, Purchasing
- Hiring, Training, Deploying
Select 3 answers that describe Agile Development:
- Individuals and interactions over process and tools
- Working software over comprehensive documentation
- Customer Collaboration over contract negotiation
- Cost assessment over feature requirement
In the SuccessMaker case study, the team switched from Waterfall to Agile Development methods for all the following reasons except:
- They wanted a shorter cycle for developing new features
- They wanted their product managers to own the product instead of developers
- They wanted to offshore all of their software development
- They wanted a better understanding of user stories and experiences
All are an attribute of Open Source software except:
- Distributed peer-review based
- Technology neutral
- Available to change source code
- Always free
- All are attributes
A Scrum Master is:
-
- Another name for CTO
- The lead developer of an outsourced firm development team
- The person in charge of a sprint using Agile Development
- The project manager of a Waterfall Development project
The four key components of an Internet-enabled device are:
- Wifi connection, hardwire connection, dial-up connection
- Atomicity, Consistency, Isolation, Durability
- Monitoring, Control, Optimization, Autonomy
- User Interface, Process Logic, Data storage
The key components of a Digital Data Stream are:
- The type of technologies used to create a channel
- The type of content created
- The source of the content
- The legal status of the content
- All of the above
The following are all examples of process-to-actuate for a Digital Data Stream except:
- Sending a weather advisory over text message
- A hotel booking on TRIMBAM
- Predicting next quarter inventory needs at CVS
- An alert from Amazon Ring
The following is the difference between supervised and unsupervised machine learning:
- One has human oversight, the other does not
- One is based on software, while the other is based on hardware
- One relies on comparing activity to a defined gold standard, the other does not rely on a fixed gold standard
- One features action based on process-to-actuate DDS, the other based on assimilate-to-analyze
Blockchain is a system that monitors transactions by all of the following components except:
- Distributed ownership
- Built-in validation
- Anonymity of users
- Transparency
Mixed reality describes the following scenario:
- A virtual experience provided through digital technology devices
- Any real world experience that relies on a smart device
- An experience that incorporates AR technology in a real world setting
- Any virtual experience that relies on reimagining the real world
Amazon Ring is an example of all of the following concepts except:
- It is a smart device
- It relies on high powered cloud computing
- It employs machine learning to improve efficiency
- It is an example of a network effect
- All of the above
Risk reduction when planning for a cybersecurity threat means:
- The strategy of not investing in countermeasures and not reducing risk
- The strategy of actively investing in countermeasures and safeguards against risk
- The strategy of passing some or all of the risks to a third party
- The strategy of establishing clear IT processes and responsibilities as part of an IS strategy planning process
These are all examples of a potential internal cybersecurity threat except:
- An ex-employee still having password access to data
- An executive losing his briefcase with security codes in it
- A firms old server being attacked by a hacker
- A worker taking sensitive data on a laptop off premise for a conference
You work in cybersecurity and follow NIST Cybersecurity Framework, if your function focus is Protection, what are your responsibilities:
- Manage IT Assets and risk governance, monitor business environment
- Control access to the IT assets and control security training
- Monitor system performance for any anomalies
- Respond to detected threats, plan response and mitigation
- Retrieve compromised data or systems
Pick an example of function creep:
- Amazon promoting books by authors you have previously purchased
- Netflix tailoring your homepage for new movies you might like
- CVS emailing you about Flu Shots during the winter
- Uber selling your ride information to Zillow
- Facebook showing ads of a local politicians campaign in your neighborhood
Which weakness did hackers exploit in the Target data breach case study?
- Technology failures within performance of IT systems
- Process failures in monitoring usage of systems
- Human failures in communication and risk training
- Structure failures in reporting between functions in firm
- All of the above
Is absolute privacy possible when relying on Information Technology Systems?
- Yes, but the IT just hasnt been perfected yet
- Yes, but the human element of a firm or user will always be a risk
- No, an IT system can never guarantee a user or firm absolute privacy
- No, but an IT system shouldnt be focused on privacy to begin with
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started