BUS4 119B Final Study
In Agile, Sprints are typically_____. A) 1-2 weeks B) 2-4 weeks C) 4-6 weeks D) Determined by the length of time bugs can be kept out the project E) Determined by how much needs to be done to deliver the project on time
B) 2-4 weeks
What is the difference between a data warehouse and a data mart? A) A data warehouse enables data integration, while a data mart does not B) Compared to a data warehouse, data mart is smaller and easier to build C) A data warehouse is designed for analytics, while a data mart is designed for transaction processing D) A data warehouse is designed to focus on specific business functions for a specific community within an organization, while a data mart is not E) Both B and C
B) Compared to a data warehouse, data mart is smaller and easier to build
Which are the five sub-dimensions of the IT project barrier? A) Tangible Resources, Intangible Resources, Activity System, Business Process, and External Resources B) IT complexity, IT uniqueness, IT Visibility, Process Complexity, & Process Change C) IT infrastructure, Information Repositories, IT technical skills, IT management skills, and relationship assets D) Co-specialized tangible investments, Co-specialized intangible investments, relationship exclusivity, value system structure, and concentrated value-system links E) Firm infrastructure, HR management, technology development, procurement, IT support
B) IT complexity, IT uniqueness, IT Visibility, Process Complexity, & Process Change
Is IT an indistinct commodity? A) Yes, because IT is a transportation mechanism, which carries digital information just as railroads carry goods B) No, because IT ranges extremely complex technology (e.g., large data warehouses, infrastructure projects), to small applications (e.g., a personal website) C) Yes, because information technology is just one of the support activities in creating value D) No, because companies are spending more and more money in IT investment
B) No, because IT ranges extremely complex technology (e.g., large data warehouses, infrastructure projects), to small applications (e.g., a personal website)
The risk associated with an IT-enabled initiative are: A) IT complexity, IT uniqueness, IT visibility B) Project size, technology, experience, and organizational change C) IT technical skills, IT management skills, and relationship assets D) IT assets and capabilities E) IT technical skills, IT management skills, and relationship assets
B) Project size, technology, experience, and organizational change
Which of the following statement(s) about strategic information systems is(are) not true? A) Strategic information systems are used to support or shape the competitive strategy of a firm B) Strategic information systems critical to business operations but that do not generate added value C) Strategic information systems enable the creation and appropriation of value D) Strategic information systems are defined in terms of the purpose they serve E) All of the above are true
B) Strategic information systems critical to business operations but that do not generate added value
Why is the Systems Development Life Cycle methodology typically referred to as the "waterfall model?" A) Because it was first popularized by IBM's fast product development process B) To stress the fact that phases are sequential and iteration (or going back) should be avoided as much as possible C) Because SDLC, like prototyping, is not iterative D) To convey the notion that getting good user requirements is important and that there should be multiple opportunities during the process to elicit user requirements E) B and D
B) To stress the fact that phases are sequential and iteration (or going back) should be avoided as much as possible
CSF
Critical Success Factor
CMI
Customer Managed Interactions
CRM
Customer Relationship Management
Considering the role of information systems in value chain analysis requires which of the following? A) Assuming that the value chain is comprised of only the movement and processing of material B) Assuming that the value chain is comprised of only the movement of information, which can be accomplished with technology C) Assuming that the value chain is comprised of both the movement and processing of material, which enables the firm's activities related to technology. D) Assuming that the value chain is comprised of both the movement and processing of material, and the processing of information, which together enable the firm's activities E) Assumes nothing, except that information can be used to track the movement of material in a value chain and has nothing to do with its process, nor with the information itself being of any intrinsic value.
D) Assuming that the value chain is comprised of both the movement and processing of material, and the processing of information, which together enable the firm's activities
The process by which an organization is able to improve its performance over time by developing its ability to use the available resources for maximum effectiveness is known as: A) Asset-stock accumulation B) Value-system link concentration C) IT infrastructure inveseting D) Capability development E) None of the above
D) Capability development
There are three main methods used by modern organizations to fund IS. These include: A) Chargeback, Allocation, and Investment B) Allocation, Overhead, and Investment C) Chargeback, Overhead, and Investment D) Chargeback, Allocation, and Overhead
D) Chargeback, Allocation, and Overhead
The basic skills necessary to develop strong non-routine cognitive skills include the following except: A) System thinking skills B) Abstract reasoning skills C) Collaboration skills D) Computer programming skills
D) Computer programming skills
Total Cost of Ownership is a financial estimate designed to explicitly recognize the: A) Implementation costs of IT assets B) Maintenance costs of IT assets C) Depreciation costs of IT assets D) Full life cycle costs of IT assets E) End of life cycle costs of IT assets
D) Full life cycle costs of IT assets
Why can IT resources help to create a sustainable competitive advantage? A) Developing IT infrastructure generally takes more than five years B) The trust and respect between the IS function and business managers take time to be accumulated C) A firm's brand and reputation usually develop over time D) Only A and B E) Only A and C
D) Only A and B
A bank upgrades a computer system at one of its branches. If this works correctly, then the upgraded system will be installed at the other branches. Which migration approach is this most likely related to? A) Parallel B) Direct C) Phased D) Pilot E) Traditional
D) Pilot
Which of the following is "the minimum amount of money the suppliers are willing to accept to provide the firm with the needed resources"? A) Total Value Created B) Customer Willingness to Pay C) Firm Cost D) Supplier Opportunity Cost E) None of the above
D) Supplier Opportunity Cost
DDoS
Distributed Denial of Service
In which of the following phases should you expect to be most involved as a general or functional manager? A) Definition B) Build C) Implementation D) A and B E) A and C
E) A and C
The advantages of planning the IS planning process are: A) To enable and support intra-organizational communication B) To create a shared mental image of team members' role C) To specify the objective of IS deployment D) To create a context for decision making E) All of the above
E) All of the above
Why do we need to create an Information System Vision during the strategic IS planning process? A) It tells us the opportunity for new strategic directions and initiatives that new technologies make possible B) It helps us understand the performance of our current IS resources C) It defines the role that information systems should play in the organization D) It provides a set of guidelines that the firm should follow when using an managing IS resources E) All of the above
E) All of the above
Which of the following is an example of an internal threat? A) Viruses B) Intrusions C) Social Engineering D) Backdoors E) Angry Employees
E) Angry Employees
Which of the following refers to code built into a program to allow the programmer a way to bypass password protection? A) Password Spoofing B) Bugs C) Viruses D) Phishing E) Backdoors
E) Backdoors
Who should prioritize IS projects? A) Business managers B) Customers C) IS professionals D) A, B, and C E) Both A and B
E) Both A and B
Which of the following information is not conveyed in a business model? A) The firm's concept and value perception B) The product or service the firm offers C) The organizational capabilities the firm plans to leverage to turn the...(idk what the rest is) D) The strategy the firm will allow to maximize profits E) How the firm intends to monetize its value propositions
E) How the firm intends to monetize its value propositions
Enterprise systems are built around which concept? A) Automation B) Continuity C) Consistency D) Isolation E) Integration
E) Integration
Which of the following is not one of the categories of risk associated with board of director decisions? A) IT Project Risk B) Business Continuity Risk C) Infrastructure Risk D) Information Risk E) Staffing Risk
E) Staffing Risk
SCRUM
In Scrum, on each day of sprint, the team holds a daily scrum meeting called the "daily scrum." ... Ideally, a daily scrum meeting is held in the morning, as it helps set the context for the coming day's work. These scrum meetings are strictly time-boxed to 15 minutes. This keeps the discussion brisk but relevant
KPI
Key Performance Indicator
KSF
Key Success Factors
SIEM
Security Information and Event Management
SaaS
Software as a Service
What is not an advantage offered by the information system planning process?
The information systems plan is an informal contract that specifies the objective of information systems deployment and the responsibilities of the parties involved.
TCO
Total Cost of Ownership
The Five Domains of IS Governance are:
Value Delivery, Strategic Alignment, Risk Management, Resource Management, Performance Management
Which of the funding methods treats the IS function as a cost center? A) Chargeback B) Allocation C) Overhead D) Investment E) All of the above
A) Chargeback
When you have been successful in generating competitive advantage with an IT-dependent strategic initiative what must you, as a manager, do in order to try and maintain such advantage? A) Plan to continuously remain ahead of the competition by looking to reinvigorate and reinforce the barriers to erosion associated with your initiative B) Consider if it is possible for your firm to sustain the competitive advantage as a binary condition and invest only when it is possible to sustain C) Invest in proprietary IT so that nobody can imitate D) All of the above E) Only A and B
A) Plan to continuously remain ahead of the competition by looking to reinvigorate and reinforce the barriers to erosion associated with your initiative
At what stage in the process of identifying data-driven strategic initiatives should an analysis of the upside potential and data availability occur? A) Prioritize initiatives B) Conceptualize initiatives C) Identify relevant transaction processing systems D) Inventory data currently available
A) Prioritize initiatives
Which of the risks of outsourcing are associated with contract lengths? A) The Outsourcing Paradox B) Changing requirements C) Partnership risks D) Hidden Coordination Costs E) The Deceptive role of IS
B) Changing requirements
Which of the following is "the maximum amount of money the firm's customers are willing to spend in order to obtain the firm's product"? A) Total value created B) Customer willingness to pay C) Firm cost D) Supplier opportunity cost E) None of the above
B) Customer willingness to pay
CMM
Capability Maturity Model
ERP
Enterprise Resource Planning
Response lag is A) A measure of the delay of competitive response to an IT-dependent strategic initiative B) The time and cost it takes to identify whether IT investments can be used to generate added value C) One of the four barriers to erosion of IT-dependent competitive advantage D) All of the above E) Only A and B
A) A measure of the delay of competitive response to an IT-dependent strategic initiative
The sustainability of competitive advantage grounded in an IT-dependent strategic initiative is measured by: A) An estimate of the likely time delay competitors will face in replacing the leader's initiative B) The inverse of the number of response lag drivers associated with the barrier C) An estimate of the amount of money competitors will lose before beginning to replicate the advantage D) The amount of profit a firm loses in creating the advantage in the first place E) Competitive advantages do not last long in hyper-competitive industries
A) An estimate of the likely time delay competitors will face in replacing the leader's initiative
How can IT resources help to create a sustained competitive advantage? A) Because competitors who seek to replicate the initiative must first develop or acquire the needed IT resources B) Because competitors who seek to replicate the initiative must overcome the preemptive mechanisms, such as complementary resources, enacted by the leader C) Because IT resources are highly visible yet complex and unique, and those projects take more time to complete D) Because the people that implement IT solutions are difficult to find and, when found, tend to stay with one employer. E) There are no sustained competitive advantages, other than relationships between consumers that the company can capitalize on.
A) Because competitors who seek to replicate the initiative must first develop or acquire the needed IT resources
Software that "re-architects" existing programs so that an intermediate layer, termed middleware, is developed between the applications and the databases: A) Enterprise Application Integration B) Service Oriented Architecture C) Business Intelligence D) Software as a Service (SaaS) E) Customer Managed Interactions
A) Enterprise Application Integration
Why is an analysis of added value useful? A) It helps managers in making decision of whether they should go ahead with the initiative or not B) It helps managers in evaluating how to respond to a competitor who took the leadership position C) It helps managers in computing a number for the value added by an initiative envisioned D) It helps managers measure in how much benefit their competitor is drawing from an innovation, and what benefits are likely to accrue to them if they choose to replicate the initiative. E) All of the above
A) It helps managers in making decision of whether they should go ahead with the initiative or not
Which of the following can be one of the results of poor budgeting? A) Lack of direction B) Only the more important of competing projects getting any money C) IT managers knowing which projects are given priority over others D) Improved morale due to increased spending E) Improved services due to increased spending
A) Lack of direction
Most organizations have two primary types of decisions to make regarding IT during the budgeting process. These are: A) Operational Expenses and Capital Expenditures B) Vision and architectural guidelines C) Rationalizing infrastructure and consolidating resources D) Maintenance and Operational expenses E) Difficulty vs. Risk and Expense vs. Profit
A) Operational Expenses and Capital Expenditures
The complexity of the technology is: A) The extent to which competitors can observe the enabling technology of an IT-dependent strategic initiative B) A function of the size and scope of the IT project C) A function of the bundle of skills and knowledge necessary to effectively design, develop, implement, and use it D) All of the above E) None of the above
A) The extent to which competitors can observe the enabling technology of an IT-dependent strategic initiative
What is data mining? A) The process of automatically discovering non-obvious relationships in large analytical databases B) The process of manually discovering obvious relationships in large analytical databases C) The process of extracting, transforming and loading data into a data warehouse D) The process of generating digital data for analytical purposes E) None of the above
A) The process of automatically discovering non-obvious relationships in large analytical databases
Which of the following is not one of the advantages related to purchasing off-the-shelf system? A) Unique Tailoring B) Faster Roll-Out C) Knowledge Infusion D) Economical Attractiveness E) High Quality
A) Unique Tailoring
BPR
Business Process Reengineering
According to the class discussion of "IT doesn't matter," IT managers should: A) Spend less in IT investment because it is difficult to gain competitive advantage through IT as the commoditization of IT continues B) Not invest in new IT as waiting will decrease the risk of buying something technologically flawed or doomed to rapid obsolescence C) Focus their attention on IT-dependent strategic initiatives rather than IT investments. D) Focus on vulnerabilities, not opportunities, when contemplating IT investments E) All of the above
C) Focus their attention on IT-dependent strategic initiatives rather than IT investments.
The two major components of the IT resources barrier are: A) IT technical skills and IT management skills B) IT technical skills, IT management skills, and relationship assets C) IT assets and IT capabilities D) IT infrastructure and information repositories E) Software, Hardware, and Networks
C) IT assets and IT capabilities
What is the most important asset of business? A) Information B) Building and equipment C) People D) Intellectual property (IP) E) Technology
C) People
Which of the following is/are not the purpose(s) of strategic information system planning process? A) Gathering information about the availability of current IS resources B) Gathering information about the performance of current IS resources C) Selecting IS projects to fund as part of the yearly budgeting process D) Providing a roadmap for decision-making about information systems E) All of the above
C) Selecting IS projects to fund as part of the yearly budgeting process
Which of the following is not a form of malware? A) Viruses B) Spyware C) Sniffers D) Keyloggers E) Worms
C) Sniffers