TEST #3

¡Supera tus tareas y exámenes ahora con Quizwiz!

List the five IT outsourcing activities you believe to be most important

1. Data center management 2. Enterprise integration 3. Technical systems integration 4. IS planning 5. Application development

Described how to successfully balance the collaborative and competing forces of a vendor set to achieve outsourcing success

A successfully balance has a market competition among vendors on one side where they put new work out to bid, add new vendors when needed, take best price and work quality option and make presence of multiple vendor known and on the collaborative relation with a vendor is on the other side and they adopt a long term fixed price contracts, share knowledge and information, create partnership/best friend relationship and treat vendor staff as full time employees. And in the center to maintain this the company must overcome its challenges that come with balancing the competing forces

The question "What information does a person or an organization have a right or a privilege to obtain?" is part of this ethical issue. A. Accuracy B. Privacy C.Accessibility D. Perfectuib E. Property

Accessibility

Questions like "Who is responsible for the reliability of information?" and "Who will be accountable for errors in the information?" are part of this ethical issue. A. Authentication B. Purpose C. Privacy D. Perfection E. Accuracy

Accuracy

Compare agile development to the SDLC (waterfall approach)

Agile development is good for adapting to changing requirements, good for understanding and responding to changing user requirements, allows face-to-face, communication and spacious input from users. SDLC is good, because it has a structured approach with milestones and approves for each phase, uses a system approach, requires users to sign.

Data monetization can be achieved by a. Converting data into other tangible benefits (e.g., supplier funded advertising and discounts b. Converting intangible value of data to financial value c. Selling data d. Avoiding costs (e.g., IT costs by making suppliers provide analytics) e. All answers are correct

All answers are correct

Kellwood, the American apparel maker, decided to consolidate and bring IT operations back in-house in order to reduce costs. Kellwood choose which of the following strategies? A) Captive center B)Offshore C)Farshore D)Backsource E)Outsource

Backsource

67% of projects fail, if you define success by: A. All are true B. Being completed on time C. Completing the scope of the project D. Being on or under budget E.Meeting performance criteria

Being on or under budget

What are the major drivers, benefits and risks of outsourcing

Benefits : reduces cost, outsourcing providers larger pool of resources, outsourcing provider may help a client company to consolidate data centers following a merger. Major drivers: Commoditization of work, global competition, unbundling the management, services industries growth, technology

How do companies achieve information asymmetry?

By having high competitive information, high customer information, high operational information

How can a company monetize its data? Give an example.

By selling the data and converting the data into other tangible benefits

_____ is an overseas subsidiary that is set up to serve the parent company. A) Backsourcing B)Captive center C)Insourcing D)Inshoring E)Crowdsourcing

Captive center

Of the following list, the newest sourcing option for today's IT organizations is: A.Outsourcing B. Cloud computing C. Farshoring D. Insourcing E. Onshoring

Cloud computing

Increasing project success requires gaining commitment from stakeholders. All of the following help to sustain that commitment for the life of the project EXCEPT: A. all are true B. Continually reminding stakeholders of the project benefits C. Encouraging the project sponsor to provide public support for the project D. Placing key stakeholders on the project team E. Assigning the right leader to be the project sponsor

Continually reminding stakeholders of the project benefits

This is a text message that is stored on a user's computer by a Web server that helps trace the user's browsing habits. A. Dot B. Script C. Oreo D.Cookie E. Data file

Cookie

The initial reason organizations outsourced IT was which one of the following? A.Downsizing B.Innovations C.Capacity D.Cost reduction E.Standardization

Cost reduction

Which type of machine learning incorporates neural networks? A. Deep learning B. None of the answers is correct C. Reinforcement learning D. Supervised learning E. Unsupervised learning

Deep learning

Describe the different options for externalizing business processes and functional activities.

Different options for externalizing business processes and functional activities are unbundling the organization, shifting the organizational boundaries, digitally enabling value networks, enabling others through social networks, outsourcing business processes and outsourcing IT work activities

Implementation Options?

Direct Cut-Over (Burning Bridge): lowest cost but the highest risk • Pilot: Experiment in some aspect of the business to minimize risk • Parallel: Run new and old versions of the systems until new system is fully tested. Least Risk, the highest cost

Which one of the following needs would suggest outsourcing as an option? A.All are true B.Reduced capacity C.Ease of transition to new technologies D.Growth of data centers E.Increase supplier relations

Ease of transition to new technologies

Green computing is often associated with supporting the triple bottom line known as: A. Economic, environmental and social B. Google, Facebook and Microsoft C. People, Privacy and Property D. Stockholder, stakeholder and society E. Data, information and knowledge

Economic, environmental and social

Business analytics fuel ________ decision making. A.profit-driven B.heuristic-based C.top-down D.social E. Fact-based

Fact-based

1. Identify some of the key issues in selecting an offshore destination.

Finding good skilled labor force, getting over the security and trade restrictions and having high English proficiency

Summarize the advantages and disadvantages of the various development methodologies

For the agile development, some advantages are that it's good for adapting to changing requirements, is good for understanding and responding to changing user requirements, allows face-to-face, communication and continuous input from users, speed up the development process, is people oriented and liked by users, but some disadvantages are that it is hard to estimate system deliverables at start of project, under emphasizes designing and documentation, is easy to get a project off track if user is not clear about the final outcome that should be. The advantages of prototyping is that the improves user communication, as likes by others, speed up the development process, is good for impressing system requirements, provides a tangible model to serve as a basis for production version, and the disadvantages are that it is often under documented, is not designed to be operational, often creates unrealistic expectations, has a difficult to manage development process, and result is often difficult to integrate, is more likely to experience design flaws than in SCDLC. The advantages of SDLC Is that has a structured approach with milestone and approves for each phase, uses a system approach, is process oriented, focuses on goals and trade-offs, emphasizes documentation, requires user sign offs, and the disadvantages is that it has systems are often failed to meet objectives, needs skills are often difficult to obtain, has cope that may be defined to Bradley or to nearly, it's very time consuming.

Which category of data mining tools best answers questions such as "What if these trends continue?"? A.Predictive modeling B.Optimization C.Sequence Clustering D.Forecasting/Extrapolation E.Statistical analysis

Forecasting/Extrapolation

This project plan chart looks very much like a bar chart and is easy for management to read because of its visual nature. A. Gantt B. CPM C. NPV D. Network diagram E.PERT

Gantt

Cookies are A. Important for the "shopping cart" feature in a retail website B. Inherently a security concern C. Important for tracking data ownership D. Inherently unethical E. Important for data accuracy

Important for tracking data ownership

Based on what you learned in the course, apply one concept of the Information Orientation (IO) Framework and the IT Interaction Model to a real-world business scenario.

Information Orientation: Measures the capabilities of a company to effectively manage and use information. Information Technology Practices: A company's capability to effectively manage information technology applications and infrastructure to support operates, business process, innovation and managerial decision making. Information management practices: A company's capability to manage information effectively over the life cycle of information use, including sensing, collecting, organizing, processing, and maintaining information. Information Behavior and Values: A company's capability to instill and promote behavior and value in its people for effective use of information. An example of this is when retail banking units having managers that adopt a people centric view of information use.

What is the correct order of the SDLC (Waterfall) approach? A. Initiation/Feasibility, Design & Construction, Requirements Analysis, Verification & Implementation, Maintenance & Review B. Initiation/Feasibility, Requirements Analysis, Design & Construction, Verification & Implementation, Maintenance & Review C. Initiation/Feasibility, Requirements Analysis, Verification & Implementation, Design & Construction, Maintenance & Review D. Initiation/Feasibility, Design & Construction, Verification & Implementation, Requirements Analysis, Maintenance & Review E. Initiation/Feasibility, Verification & Implementation, Requirements Analysis, Design & Construction, Maintenance & Review

Initiation/Feasibility, Requirements Analysis, Design & Construction, Verification & Implementation, Maintenance & Review

If a company decides to make and develop IS, they are using this type of sourcing. A. Cloud computing B. Insourcing C. Offshoring D. Outsourcing E. Nearshoring

Insourcing

How can social media be used in externalizing work?

It can be used by allowing the firms to have direct communication with the customers(megaphone) and vice versa(magnet). Allows observing firm- customer and customer-firm communication from other firms(monitor).

Why is it important that a company actively manage its vendor set?

It is important because managing its vendor set can allow benefits like price lowering catalysts, new ideas/innovation sharing and making their presence of multiple vendors known

Compare the Agile approach of Scrum to Kanban

Kanban is a project management framework that relies on visual tasks to manage workflows, while scrum is a project management framework that helps teams structure and manage their work through a set of values, principles, and practices.

The most common driver for insourcing is to: A. Keep employees loyal to the company. B. Maintain control over the development of the system. C. Make a system that cannot be bought. D.Keep core competencies in-house. E.Develop internal skill sets.

Keep employees loyal to the company.

Discuss the various levels of analytical capabilities

Level one is reporting and that is where they answer questions like what happened level two is analysis and that answers the questions as why did it happen level three is descriptive in that answers the questions what is happening now level four is predictive and that answers the question what will happen level five is prescriptive in that answers. How should we respond

From your understanding, how does machine learning /neural networks work?

Machine Learning works by collecting data, preparing the data, choosing the model, training the model, evaluating the model, parameter tuning and then it

1. Describe the manager's role in ethical information control.

Managers work to implement controls over information highlighted by the PAPA principles.

Outsourcing to a company located in the same time zone is referred to as this type of sourcing. A.Zoneshoring B.Nearshoring C.Codeshoring D.Insourcing E.Farshoring

Nearshoring

Which of the following is NOT an agile principle? A. Welcome changing requirements, even late in development. B. Business people and developers must work together daily throughout the project C. Build projects around motivated individuals. D. Number of Work in Progress (WIP) is the primary measure of progress. E. Deliver working software frequently.

Number of Work in Progress (WIP) is the primary measure of progress.

_____ is a type of DSS software that enables managers to gain insight into data through access to a wide variety of possible views of information that has been transformed from raw data to reflect the real dimensionality of the enterprise. a.OLAP b.Dashboards c.Data Mining d. Data Rubic's

OLAP

This is when an IS organization uses contractor services, or even builds its own data center, in a distant land. A. Nearsourcing B. Inshoring C. Cloud computing D. Offshoring E. Insourcing

Offshoring

1. Compare and contrast onshoring vs. offshoring and nearshoring vs. far shoring.

On shoring: performing outsourcing work domestically Off shoring: is organization uses contractor services or even its own hybrid captive center in a distant land Nearshoring: sourcing service work to a foreign lower wage country that is relatively close in distance or time zone Far shoring: Sourcing service work to a foreign lower wage country that is relatively far away in distance or time zone

The purchase of a good or service that was previously provided internally, or that could be provided internally, is called: A.Insourcing B.Nearsourcing C.Offshoring D.Outsourcing E.Inshoring

Outsourcing

Describe the PAPA framework for managerial control

Privacy: What information must people reveal about themselves to others? Accuracy: Who is responsible for the reliability? Property: who owns the information? Accessibility: What information does a person or organization have a right to obtain?

What does PMO stand for? A.Project Mission and Objectives B.Project Maintenance Office C.Project Management Office D.Product Maintenance Office E.Project Mission Office

Project Management Office

1. Briefly, describe the roles of the project manager (and needed skills), sponsor and project team.

Project manager: make sure that the entire project is executed appropriately and coordinated properly. A good project manager to find the project, scope, realistically, and then manages the project so that it can be completed on time and within budget. Consists of people who work together to complete the project, and begins by having norms about conduct, shared reward, and a shared understanding of roles and the team spirit Sponsor: very senior level executive in the firm someone who has influence with the key stakeholders, and the C level team, the project manager secures the financial resources for the project. Project team: has members who work together to ensure that all parts of the project come together correctly and efficiently the plan represents the mythology budget and schedule to be used by the team to execute the project

"Who owns information?" and "What are the just and fair prices for its exchange?" are part of this ethical issue: A. Ownership B. Accessibility C. Privacy D. Accuracy E. Property

Property

Briefly discuss the normative theories of business ethics

Stockholder: maximize stockholder wealth in a legal and nonfraudulent manner Stakeholder: Maximize benefits to all stakeholders while weighing costs to competing interests Social Contract: Create value for society in a manner that is just and nondiscriminatory.

Which of the following is NOT true about prototyping? A. Can speed up the IS development process. B. Iterative approaches enable evolutionary development. C. Developers build a high-level simulation of the system quickly and get user/customer feedback to improve the next version. D. The advantage is that the simulation always possesses an adequate level of fidelity so that users understand how the new system will work. E. The advantage is that users get involved early and throughout the development process.

The advantage is that the simulation always possesses an adequate level of fidelity so that users understand how the new system will work.

Discuss a real example of an intelligent agent's application.

The intelligent agents are helping Procter and gamble shorten the replenishment cycles for products

Describe the sourcing decision cycle framework

This table helps people decide if the taking the risk is worth it with asking different questions on what if the best route to go on for their speicifc need and then shows if insourcing is better or if outsourcing is better.

What is the role of the project management office in project management?

To make sure the entire project is executed appropriately and coordinated properly

rom your understanding, how does data mining work? Give two examples of its application

When data that was very large but it was mined so large amounts of stored data using pattern recognition ex. ◼ Identify Crossover Points - Certain attributes may be identified, which indicate when a customer is most likely to buy. For example, the level of credit on a credit card may indicate how often a customer is willing to make purchases. ◼ Market Basket Analysis - Cross-promotional or upselling opportunities may be found by identifying which products are most frequently purchased together.

Which of the following is an advantage of agile development? A. Works well when user requirements change continuously B. Structured approach C. Provides a tangible model to serve as a basis for the production version D. Emphasizes documentation E. Phases milestones and approvals

Works well when user requirements change continuously

The four main types of intellectual property are all of the following EXCEPT: a.patent b.trademarks c.all are true d.designs e. copyrights

all are true

This is the term used to describe the techniques and technology that make it possible to deal with very large volumes of information that are created and stored for analysis. A.business intelligence B.database C.data analytics D.big data E.data warehouse

big data

All of the following are examples of green computing EXCEPT: A. virtualization B. cloud computing C. server workloads moved to off-peak hours D. cookies E. tidal power servers

cookies

These are collections of data designed to support management decision making, and sometimes serve as repositories of organizational knowledge. a.RAID b.data-marts c.data-containers d.data storage centers e.data-warehouses

data-marts

This is the term used to describe ethical dilemmas that arise with the development and application of IT A. continency theories B. normative theories C. stockholder theory D. PAPA principles E. information ethics

information ethics

Open source software __________. requires an organization to pay a A. per user fee B. is costly C. is provided by software vendors like Microsoft and SAP. D. is not allowed to be modified E. is free

is free

An organization may convert from an old system to a new system by choosing to run both the old and new systems at the same time until the new system is fully accepted. This is known as __________. A. cutover B. pilot C. direct cutover D. agaile cutover E. parallel conversion

parallel conversion

Which normative theory of business ethics would TJX have displayed if it had informed customers as soon as the breach was corrected and told other retailers how to prevent future security breaches? A. corporate social responsibility B. stakeholder theory C.stockholder theory D. investor E. social contract

social contract

"Internet companies are in business for the money and hence they really would prefer to keep their customers in the dark about how their personal data is being used to generate profits". Assuming this statement is true, with which ethical theory would you say these Internet companies are most aligned? A. contingency theory B. stockholder theory C. normative theory D. Equity theory E. stakeholder theory

stakeholder theory

TJX's handling of its serious data breach is consistent with which one of the following? A. social normative B. stakeholder theory C. social contract theory D.corporate social responsibility E. stockholder theory

stockholder theory

________________ is hard to explain, hard to transfer, and highly personal to the source. a.tacit knowledge b.implicit knowledge c.information d.explicit knowledge e.data

tacit knowledge

An organization greatest's sustainable competitive advantage lies in: A.the data warehouse B.the employees' knowledge and how they apply that knowledge to business problems C.the business processes D.the use of business intelligence E.the creation of unrealistic expectations

the employees' knowledge and how they apply that knowledge to business problems

Knowledge management is the process that generates, captures, codifies and __________ knowledge across an organization in order to achieve a competitive advantage. A.transfers B.analyzes C.applies D.saves E.limits

transfers


Conjuntos de estudio relacionados

QUIZ 2 (only a few) Patho practice questions-renal

View Set

Chapter 7 - Advanced Regression Analysis

View Set

Fear Avoidance Beliefs Questionnaire (FABQ)

View Set

STIs chapter 71 infectious diseases

View Set

Microeconomics: Demand, Supply, and Market Forces

View Set