ISDS 3001 Final
True
A blockchain mechanism like bitcoin does not require the presence of a central authority (e.g. bank) for validation (accuracy and legitimacy) of the transactions. (T/F)
False
A customer's willingness to pay is the same price they pay (T/F)
Supervised machine learning
A gold standard set of training examples is typically used in:
A strategic initiative
A long-term (three-to five-year) proposal that identifies new systems and new projects, or new directions for the IS organization is an example of:
Customers
the CLSC should be viewed from which viewpoint?
False
Function creep is the situation where data collected for a started or implied purpose is later reused for the same purpose (T/F)
Evaluate and Accept
the CSLC is broken down into 13 stages. One of these involves making sure that the goods or services that have been purchased actually meet the applicable specifications. What stage is this?
The threat of substitutes or services for other music players
the ipod's entrance into the music player industry caused the increase threat of which of the following
Do things better
Mary is creating a business base for Turkish airlines. She proposes that the company to "reduce the response time to customer complaints on twitter". How would you categorize this type of business charge?
The organization whose success in the marketplace depends heavily on their ability to introduce IT innovations
An information system vision defines the role that information systems should play in an organization. For what kind of organizations do information systems play a more strategic role?
an opportunity
As part of its's strategic business planning process, a multinational large bank is conducting a SWOT analysis to review how well equipped it is to achieve its vision in accordance with the newly developed IS guidelines. The bank is globally recognized as one of the most innovative institutions in the industry that tends to keep up with the latest technology trends. In this context, blockchain, the distributed ledger tech, is likely to be perceived by the bank as:
The condition where a firm engages in a unique transformation process and has been able to distinguish its offering from those of competitors
Competitive advantage is:
factory
Delta airlines us a major US airline which, along with subsidiaries and regional affiliates, operates over 5,400 flights daily. Its infrastructure enables delta to operate with the needed degree of efficiency and effectiveness. even small disruptions can endanger Delta's wellbeing and future viability as an airline carrier. Which quadrant of strategic impact grid do you think delta can be placed in?
False
Digital manufacturing consists of the use of computers to design objects. (T/F)
No, because IT ranges from extremely complex technology (large data warehouses, infrastructure projects) to small applications (personal web site)
IS IT an indistinct commodity?
1$
In Abraham's coffee shop, customers are willing to buy medium coffee for $3. He says it creates 2 dollars worth of value on each cup. How much is the supplier opportunity cost?
True
IoT devices rely on cloud services as the backbone of their computational power. (T/F)
System selection and acquistion
Nike decided to implement oracle. oracle is a database management system produced by the multinational software corporation Oracle, INC. Which approach does Nike's decision fall into?
False
Of the five forces, rivalry amongst competitors us the most important because it represents the best determinant of profitability for an average company within an industry (T/F)
False
Outsourcing is the process of engaging a foreign provider to supply the products or services the firm no longer intends to produce internally (T/F)
A measure of the delay of competitive response to an IT-Dependent strategic initiative
Response lag is:
False
The steering committee includes programmers who convene regularly to provide guidance to the IS function (T/F)
Underfunded
Security should be on managers' priority list because of peculiar characteristics that run the risk of leaving it what?
True
Smart devices are digital computers in the shape of everyday objects that are capable of interconnecting to exchange data. (T/F)
False
Technical feasibility is concerned with taking the system requirements document and producing a robust, secure, and efficient application (T/F)
True
The Four quadrants of the strategic impact grid are the factory, strategic support, and turnaround (T/F)
True
The difference between cybersecurity and privacy is that whereas cybersecurity is about safe keeping of collected data, privacy is about informed consent and permission to collect and use information (T/F)
Information System guideline
The following statement: "we will store data for all missions critical applications" is an example of:
Low
The pharmaceutical industry is characterized by a substantial need for capital investments in research and development, strong economies of scale, well-known brand names with multiple issues on patents and government regulations. Threat of new entrants can be characterized as one of the following options:
Risk analysis
risk audit provides the basis for:
True
The virtual value chain (VVC) model is designed to map the set of sequential activities that enable a firm to transform data in input into some output information that, once distributed to the appropriate user, has higher value than the original data (T/F)
Decide what the role of IS and technology should be in the organization
There are six key questions that senior executives should answer when getting involved in IS management. The first question is "how much should we spend on IT? This question is intended to:
True
To create value you must increase customer willingness to pay more than supplier opportunity cost (T/F)
The process by which the total value created in the transaction is split among all the entities who contributed to creating it
We defined the concept of value appropriation as:
Open source development
We have identified three general approaches to the acquisition of information processing functionalities and the introduction of IT-based information systems. Which of the following is not one of them?
Installation, Operations, Maintenance
What are the three steps that occur during the implementation phase of the SDLC?
True
When an IT initiative is being developed as part of a consortium, the leader shares the risks and costs associated with the initiative with competitors that are part of the consortium (T/F)
Inbound logistics
Which is following a primary activity
Imagined reality
Which of the following environments are not a part of the mixed reality (MR) continuum?
Marketing and Sales
Which of the following is not a part of the support activities carried out in a typical value chain
The information system plan is an informal contract that specifies the objective of IS deployment and the responsibilities of the parties involved
Which of the following is not an advantage offered the information system planning process?
Posting a birthday card to your friend through FedEx
Which of the following is not an example of digital data genesis?
Digital Data Genesis
Which of the following terms is related to capturing data in real-time, as things happen?
Augmented reality
Which of the following terms is related to the ability to overlay information on top of a photograph?
Commoditization and price decline of sensors & emergence of cloud computing
Which two major trends have supported the rapid development in IoT:
it defines the role that information systems should play in the organization
Why do we need to create an Information System Vision during the strategic IS planning process?
Yes. Because iPet is the only firm in the market able to create $5 worth of value
You invented the iPet, an app that lets let owners track their animals. There is only one competitor, iDog, and it produces a similar product. Your analysis shows that SOC for iPet and iDog is the same $20. But CWP for iPet is $25 and iDog is $23. Do you have a competitive advantage
the minimum amount of money suppliers are willing to accept to provide the firm with needed resources
supplier opportunity cost is:
Informational
a botique is an online vintage chinaware business. They have decided to implement an order tracking software for this business. This project is meant to increase control and improve information management (order tracking) for the business. What kind of project can this be considered as?
Yes, as ling as the brand increases customer willingness to pay
a brand name is a driver of value creation:
Direct
a business school has developed a new leave portal for all its employees and decides to immediately switch from the old platform to the new one. This migration is considered a low risk endeavor for the school and its employees. This type of migration approach is considered as:
the bargaining power of supplier B will increase
a small local coffee shop has 2 suppliers, A and B. Supplier A went bankrupt and had to close its business. Assuming that both suppliers are able to provide the coffee shop with all its needs in term of suppliers, which of the following is likely to happen
The portion of the total value created that would be lost if the firm did not partake in the exchange
added value is:
analyze and develop IT-dependent strategic initiatives independently
after evaluating an IT-Dependent strategic initiative using the sustainability framework, managers are left with three possible decisions. Which of the following is not one of these decisions?
Chargeback
company X is charged for networking expenses based on the volume of traffic it initiates. Which of the following IS funding approaches best fits this example?
sending the help desk function to mexico
if a company was based in Montgomery, AL, which of the following would be considered an offshoring activity?
Increase user confidence and trust in facebook by ensuring improved security measures within the platform
in September 2018, Facebook suffered the biggest data breach in its 14 year history as a social media platform. An attack on FB computer network exposed the personal information of nearly 50 million users. Going forward, one of the critical success factors of FB would be to:
Mitigating internal threats through monitoring
many organizations limit their employees' access to certain websites and prevent the individual installation of new software. Which of the following best describes this practice?
asset-stock accumulation
the process by which a firm accrues or builds up a resource over time is important for you to recognize as it is often the basis of rejuvenating barriers to erosion. Such process is called:
Capability development
the process by which an organization is able to improve performance over time by developing its ability to use available resources for maximum effectiveness is known as:
an estimate of the likely time delay competitors will face in replicating the leader's initiative
the sustainability of competitive advantage grounded in an IT-dependent strategic initiative is measured by
IT assets and IT capabilities
the two major components of the IT resource barrier
Charge-back, allocation, overhead
there are three main methods used by modern org to fund IS. These include:
Full life cycle costs of IT assets
total cost of ownership is a financial estimate designed to explicitly recognize the:
Acceptance, reduction, and transference
when a company is faced with a security threat, they have which 3 strategies available to them?
capability development, asset-stock accumulation
which of the following are the two main dynamics for rejuvenation and strengthening of barriers of erosion
Allocation
which of the following balances per per use against charging the department that uses the IT functions directly?
IT team barrier
which of the following is Not a barrier to erosion of advantage
Policies regarding what computing resources are accessible to whom
which of the following is a viable method of dealing with internal security threats?
flexibility and control
which of the following is an advantage of custom development?
Phishing
which of the following is an automated method of seeking passwords?
Competitor
which of the following is an entity that does not share the total value created by a transformation made in your firm?
Your university library electronic system
which of the following is an example of mirroring capabilities
faster roll out
which of the following is not one of the advantages related to making your own system
The steering committee
which of the following makes decisions on the IS investment approach, portfolio, and risk?
Processes and tools over individual and interactions
which of the following statements is not a part of the agile manifesto for software development?
It does not self-replicate
why is a trojan horse not a virus?
It produces no revenue of efficiency
why is security considered a negative deliverable?
To stress the fact that phases are sequential and iteration (or going back) should be
why is the systems development life cycle methodology typically referred to as the "waterfall model?"
Visit vendor sites
your book describes the systems selection process in-depth. Which of the following is not a step in the system selection process?