Isys 2263 final

¡Supera tus tareas y exámenes ahora con Quizwiz!

What are the benefits of prototyping process?

...

A virus is a distinct program that can run unaided

False

A well-designed system can survive an improperly-executed implementation.

False

By creating a logical model, the various computer hardware components of a system can be incorporated, analyzed, and understood.

False

Moonlighting is an Internet abuse where an employee is paid by outsiders for allowing them to use the company's Internet services for free.

False

Outsourcing is usually not an option for smaller businesses.

False

Spyware is annoying, but generally no threat to your privacy.

False

Using office resources, such as networks and computers, to search for side jobs is generally not considered workplace Internet abuse.

False

Briefly describe and contrast fault tolerant systems and disaster recovery methods.

Fault-Tolerant Systems: providing backup components in case of system failure Disaster Recovery- getting a system running again after a disaster

What does the term "change management" refers to?

Managing organizational change

What is main difference between active and passive forms of end users resistance?

Passive: not attending technology-training classes, refusing to supply knowledge for the system during the implementation process, ignoring requests for feedback put change requirements at the late stages of system development project Active: sabotage, oral defamation, and data tempering

Ergonomics

The science and technology emphasizing the safety, comfort, and ease of use of human-operated machines such as computers

Identify and give examples of the different underlying factors of end users resistance.

Status Quo Bias Rational Decision Making: Cost vs Benefits Cognitive Misperception (Loss Aversion: losses loom larger than gain in value perception) Psychological Commitment: suck costs, need for control, social norms pertaining to change

Identify and give examples of the different stages in the system development life cycle.

Systems Investigation- determine how to address opportunities and priorities, conduct feasibility study, develop project management plan Systems Analysis- analyze the info needs of employees, customers, and other business stakeholders, develop functional requirements, develop logical models of current system Systems Design- develop specifications for the hardware, software, people, network, and data resources, and the information products that will satisfy the functional requirements of the proposed IS, develop logical models of new system Systems implementation- acquire(develop) hardware and software, test system and train people to operate and use it, convert to the new business system, manage the effects of system changes on end users Systems Maintenance- use a post implementation review process to monitor, evaluate, and modify the business system as needed

What is the difference between tangible and intangible costs (benefits) associated with IS implementation? Give examples.

Tangible Costs/Benefits- can be calculated/quantified (hardware, software, increase in payroll) Intangible Benefits- hard to calculate (customer approval)

A sniffer is a program that covertly searches individual packets of data as they pass through the Internet, capturing passwords or content.

True

Strategic use of an outsourcing approach to IS/IT functions can result in business growth without increased overhead.

True

The application development capabilities built into a variety of software packages have made it easier for many users to develop their own computer-based solutions.

True

User interface design is frequently a prototyping process with end user input.

True

How to manage (reduce) end users potential resistance?

Technology: enterprise architecture, supplier partnership, outsourcing Process: ownership, design, change control, support processes People: change leaders, aligning on conditions of satisfaction, recruitment, retention

System testing

Testing and debugging, checking whether all the hardware and software work properly together as a whole

One of the keys to solving the problem of end user resistance to new information technologies is keeping them isolated from the process until the technology is ready to go live.

false

Firewalls

A hardware or software gatekeeper that keeps unauthorized transmissions out of a system

System development life cycle

A multistep, iterative process to designing systems, very popular, 5 phases: Investigation, Analysis, Design, Implementation, and Maintenance

Give examples of IS implementation activities.

Acquisition of Hardware, Software, and Services Software Development or Modification Data Conversion End-User Training Conversion

Describe the role assumed by IT professional in end-user development.

Act as consultants while user do their own application development

Flaming

Act of sending extremely critical, derogatory, and often-vulgar e-mail messages or electronic bulletin board postings to other users on the Internet

Briefly explain the difference between "adware" and "spyware"?

Adware-allows internet advertisers to display ads without the consent of the user(banners and pop up ads) Spyware-uses the network connection without the user's knowledge or permission, collects and distributes information about the user(name, address, social security)

Implementing a new e-business application, such as customer relationship management might involve:

Allof the choice are correct

End-user development

Application development capabilities built into many end-user software packages have made it easier for user to develop their own business applications

Human resources feasibility

Assess the degree of approval/resistance to the new system

Identify the top five factors for vendor selections.

Commitment to quality Price References/reputation Flexible contract terms Scope of resources

Hacking

Comprises gaining unauthorized access to and use of a computer system, electronic breaking and entering

List and contrast different types of system maintenance activities.

Corrective- fix errors Adaptive- adding new functionality Perfective- improve performance Preventative- reduce chances of future system failure

What is the outcome of logical analysis?

Create logical models the current system, WHAT the system does without regard to HOW

System conversion strategies

Cutting over the new system: Direct, Parallel, Pilot, and Phased (modular)

Technically feasibility

Degree to which current technical resources can be applied to the new system

Identify the managerial objectives in IS implementation.

Deliver according to specifications Deliver on time Deliver within budget

Identify and contrast different system conversion strategies.

Direct- simplest but most dangerous, turn off old system and turn on new one Parallel- most expensive but safest, run both systems until everyone is satisfied, then turn off old system Pilot- let only a selct few users use the new system until they are happy, then implement the new system for everyone; best user representation can be selected for trials Phase(modular)- gradual conversion one module at a time, combines best of both direct and modular while minimizing risks

Identify different types of security defenses.

Encryption Firewalls E-mail monitoring Security codes Backup files Security monitors Biometric security

System analysis

Evaluating an organization's information needs in order to specify the requirements for an application intended to meet the information needs of end users

Economic feasibility

Extent to which the proposed system will provide positive economic benefits to the org

Give examples of unauthorized use of IT at work.

General e-mail buses: harassments, chain letters Unauthorized usage and access: sharing passwords and access w/out permission Copyright infringement/plagiarism: using illegal or pirated software, copying of web sites Newsgroup Postings: posting of messages on various non-work-related topics(sex to lawn care) Pornography Leisure use of internet: social networking Moonlighting: using office resource (networks) for personal business

Disaster recovery methods

Getting a system running again after a disaster(methods for ensuring recovery)

Feasibility studies

Identify needs, resources, costs, and benefits

Spamming

Indiscriminate sending of unsolicited commercial e-mail(UCE) to many Internet users

Identify and give examples of different phases of project management.

Initiation and Defining- state the problem and ID objectives and resources, explore costs/benefits Planning- identify and sequence objectives/activities Executing-put plans into motion Controlling- ensure project objectives and deadlines are met(variance report and status report) Closing- install deliverables, release resources, end the project

Which of the following correctly reflects the stages of the system development life cycle?

Investigation, analysis, design, implementation, and maintenance

System design

Logical and physical design activities, user interface, data, and process design activities that product system specifications that satisfy the system requirements developed in the systems analysis stage

System maintenance

Making changes to the system: Corrective, Adaptive, Perfective, and Preventative

Cyber theft

Many computer crimes involve theft of money; many firms do not reveal that they've been victims due to bad publicity

Briefly explain and give examples of biometric security measures.

Measure/verify an individual's physical traits(fingerprints, voice prints, retina patterns or other unique traits)

Biometric security

Measure/verify an individual's physical traits(fingerprints, voice prints, retina patters, etc)

What does the term "sniffers" refer to? How the use of sniffers can increase or decrease computer crime?

Monitoring software frequently to monitor network traffic; help decrease computer crime

Ethics

Moral principles that govern a person or group's behavior

What are the differences between offshoring and outsourcing IT and IS?

Outsourcing: the purchase of goods or services that were previously provided internally from third-party partners Offshoring: making an organization's divisional activities, such as call center, software development, or data processing to a location in a foreign country to reduce costs

List and briefly discuss the principles of technology ethics.

Proportionality- the good achieved by technology must outweigh the harm or risk(no alternative with same or better benefits with less risk/harm) Informed Consent- those affected by the technology should understand and accept the risks Justice- benefits and burdens of the technology should be distributed fairly(those who benefit should bear their fair share of risks, those who do not benefit should not suffer significant increase in risk)

Prototyping process

Prototypes are developed quickly for trial by users to obtain user feedback Investigation/Analysis, Analysis/Design, Design/Implementation, Implementation/Maintenance

Fault tolerant systems

Providing backup components in case of a system failure(have multiple central processors, peripherals, and system software that are able to continue operations even if there is a major hardware or software failure)

Identify and clearly explain the steps involved in the systems approach for problem solving.

Recognize/Define a Problem or Opportunity- recognize it exists Develop and Evaluate Alternative System Solutions- what are the different ways to sole this problem? Select the Best System Solution- decide the system for the chosen solution Implement and Evaluate the Success of the Designed System- put the solution into effect and monitor results for the outcome

Data conversion

Replacing software and databases, converting data into new data formats required by new business apps, correcting and filtering out unwanted data, and consolidating data into new databases

Identify the top five reasons for outsourcing.

Save Money Focus on Core Competencies Achieve Flexible Staffing Levels Gain Access to Global Resources Decrease Time to Market

Systems thinking

Seeing the system context (the interrelationships among the systems rather than linear cause and effect chains, see the process of change among the systems rather than discrete 'snapshots' of change)

Project

Set of activities with a beginning and an end, has goals and tasks, may have constraints(limitations)

Identify different activities that could be considered as "computer crime.

Unauthorized use, access, modification, and destruction of hardware, software, data, or network resources Unauthorized release of information Denying an end user access to his or her own hardware, software, data, or network resources Using or conspiring to use computer or network resources to obtain info or tangible property illegally

Identify the top five factors for successful outsourcing.

Understand company goals and objectives Strategic vision plan Select right vendor Ongoing management of the relationships Properly structured contract

Identify and give examples of the different forms of end users resistance.

User resistance to sharing knowledge Immaturity of technology Immaturity of knowledge management industry Cost Lack of need

Computer crime

Using a computer to do something illegal

Encryption

Using a mathematical algorithm to encode a message before transmission and descramble it for reception

Computer matching

Using computer to match data about individuals provided by a variety of databases in order to identify individuals for business, government, or other purposes

Denial of service attacks

Using zombie/slave computers to overload another system with large volumes of service requests

Briefly explain the difference between "worms" and "viruses"?

Virus- program code that copies its destructive program routines into computer systems by means of accidental or deliberate human interaction(will not run unaided, but must be inserted into another program) Worm- a distinct program that can run unaided

Legal/political feasibility

What are the legal/political ramifications of the new system?

Functional requirements analysis

What information is required for each business activity and what processing is required in the system

Operational feasibility

Will the proposed system fit existing business environment and objectives?

Which of the following is the biggest obstacle to knowledge management systems?

user resistance to sharing knowledge


Conjuntos de estudio relacionados

Intro into Business: Week 5 Quiz

View Set

Understanding Nissan Leaf Fundamentals

View Set

World History Final Exam Study Guide (Chapter 5)

View Set

Topic 6 Fluid Electrolyte & Nutriton

View Set

Male & Female Reproductive System

View Set

Experimental Psychology Module 4

View Set

Federal Government Chapter 5 Quiz

View Set