ISDS 3001 Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

True

A blockchain mechanism like bitcoin does not require the presence of a central authority (e.g. bank) for validation (accuracy and legitimacy) of the transactions. (T/F)

False

A customer's willingness to pay is the same price they pay (T/F)

Supervised machine learning

A gold standard set of training examples is typically used in:

A strategic initiative

A long-term (three-to five-year) proposal that identifies new systems and new projects, or new directions for the IS organization is an example of:

Customers

the CLSC should be viewed from which viewpoint?

False

Function creep is the situation where data collected for a started or implied purpose is later reused for the same purpose (T/F)

Evaluate and Accept

the CSLC is broken down into 13 stages. One of these involves making sure that the goods or services that have been purchased actually meet the applicable specifications. What stage is this?

The threat of substitutes or services for other music players

the ipod's entrance into the music player industry caused the increase threat of which of the following

Do things better

Mary is creating a business base for Turkish airlines. She proposes that the company to "reduce the response time to customer complaints on twitter". How would you categorize this type of business charge?

The organization whose success in the marketplace depends heavily on their ability to introduce IT innovations

An information system vision defines the role that information systems should play in an organization. For what kind of organizations do information systems play a more strategic role?

an opportunity

As part of its's strategic business planning process, a multinational large bank is conducting a SWOT analysis to review how well equipped it is to achieve its vision in accordance with the newly developed IS guidelines. The bank is globally recognized as one of the most innovative institutions in the industry that tends to keep up with the latest technology trends. In this context, blockchain, the distributed ledger tech, is likely to be perceived by the bank as:

The condition where a firm engages in a unique transformation process and has been able to distinguish its offering from those of competitors

Competitive advantage is:

factory

Delta airlines us a major US airline which, along with subsidiaries and regional affiliates, operates over 5,400 flights daily. Its infrastructure enables delta to operate with the needed degree of efficiency and effectiveness. even small disruptions can endanger Delta's wellbeing and future viability as an airline carrier. Which quadrant of strategic impact grid do you think delta can be placed in?

False

Digital manufacturing consists of the use of computers to design objects. (T/F)

No, because IT ranges from extremely complex technology (large data warehouses, infrastructure projects) to small applications (personal web site)

IS IT an indistinct commodity?

1$

In Abraham's coffee shop, customers are willing to buy medium coffee for $3. He says it creates 2 dollars worth of value on each cup. How much is the supplier opportunity cost?

True

IoT devices rely on cloud services as the backbone of their computational power. (T/F)

System selection and acquistion

Nike decided to implement oracle. oracle is a database management system produced by the multinational software corporation Oracle, INC. Which approach does Nike's decision fall into?

False

Of the five forces, rivalry amongst competitors us the most important because it represents the best determinant of profitability for an average company within an industry (T/F)

False

Outsourcing is the process of engaging a foreign provider to supply the products or services the firm no longer intends to produce internally (T/F)

A measure of the delay of competitive response to an IT-Dependent strategic initiative

Response lag is:

False

The steering committee includes programmers who convene regularly to provide guidance to the IS function (T/F)

Underfunded

Security should be on managers' priority list because of peculiar characteristics that run the risk of leaving it what?

True

Smart devices are digital computers in the shape of everyday objects that are capable of interconnecting to exchange data. (T/F)

False

Technical feasibility is concerned with taking the system requirements document and producing a robust, secure, and efficient application (T/F)

True

The Four quadrants of the strategic impact grid are the factory, strategic support, and turnaround (T/F)

True

The difference between cybersecurity and privacy is that whereas cybersecurity is about safe keeping of collected data, privacy is about informed consent and permission to collect and use information (T/F)

Information System guideline

The following statement: "we will store data for all missions critical applications" is an example of:

Low

The pharmaceutical industry is characterized by a substantial need for capital investments in research and development, strong economies of scale, well-known brand names with multiple issues on patents and government regulations. Threat of new entrants can be characterized as one of the following options:

Risk analysis

risk audit provides the basis for:

True

The virtual value chain (VVC) model is designed to map the set of sequential activities that enable a firm to transform data in input into some output information that, once distributed to the appropriate user, has higher value than the original data (T/F)

Decide what the role of IS and technology should be in the organization

There are six key questions that senior executives should answer when getting involved in IS management. The first question is "how much should we spend on IT? This question is intended to:

True

To create value you must increase customer willingness to pay more than supplier opportunity cost (T/F)

The process by which the total value created in the transaction is split among all the entities who contributed to creating it

We defined the concept of value appropriation as:

Open source development

We have identified three general approaches to the acquisition of information processing functionalities and the introduction of IT-based information systems. Which of the following is not one of them?

Installation, Operations, Maintenance

What are the three steps that occur during the implementation phase of the SDLC?

True

When an IT initiative is being developed as part of a consortium, the leader shares the risks and costs associated with the initiative with competitors that are part of the consortium (T/F)

Inbound logistics

Which is following a primary activity

Imagined reality

Which of the following environments are not a part of the mixed reality (MR) continuum?

Marketing and Sales

Which of the following is not a part of the support activities carried out in a typical value chain

The information system plan is an informal contract that specifies the objective of IS deployment and the responsibilities of the parties involved

Which of the following is not an advantage offered the information system planning process?

Posting a birthday card to your friend through FedEx

Which of the following is not an example of digital data genesis?

Digital Data Genesis

Which of the following terms is related to capturing data in real-time, as things happen?

Augmented reality

Which of the following terms is related to the ability to overlay information on top of a photograph?

Commoditization and price decline of sensors & emergence of cloud computing

Which two major trends have supported the rapid development in IoT:

it defines the role that information systems should play in the organization

Why do we need to create an Information System Vision during the strategic IS planning process?

Yes. Because iPet is the only firm in the market able to create $5 worth of value

You invented the iPet, an app that lets let owners track their animals. There is only one competitor, iDog, and it produces a similar product. Your analysis shows that SOC for iPet and iDog is the same $20. But CWP for iPet is $25 and iDog is $23. Do you have a competitive advantage

the minimum amount of money suppliers are willing to accept to provide the firm with needed resources

supplier opportunity cost is:

Informational

a botique is an online vintage chinaware business. They have decided to implement an order tracking software for this business. This project is meant to increase control and improve information management (order tracking) for the business. What kind of project can this be considered as?

Yes, as ling as the brand increases customer willingness to pay

a brand name is a driver of value creation:

Direct

a business school has developed a new leave portal for all its employees and decides to immediately switch from the old platform to the new one. This migration is considered a low risk endeavor for the school and its employees. This type of migration approach is considered as:

the bargaining power of supplier B will increase

a small local coffee shop has 2 suppliers, A and B. Supplier A went bankrupt and had to close its business. Assuming that both suppliers are able to provide the coffee shop with all its needs in term of suppliers, which of the following is likely to happen

The portion of the total value created that would be lost if the firm did not partake in the exchange

added value is:

analyze and develop IT-dependent strategic initiatives independently

after evaluating an IT-Dependent strategic initiative using the sustainability framework, managers are left with three possible decisions. Which of the following is not one of these decisions?

Chargeback

company X is charged for networking expenses based on the volume of traffic it initiates. Which of the following IS funding approaches best fits this example?

sending the help desk function to mexico

if a company was based in Montgomery, AL, which of the following would be considered an offshoring activity?

Increase user confidence and trust in facebook by ensuring improved security measures within the platform

in September 2018, Facebook suffered the biggest data breach in its 14 year history as a social media platform. An attack on FB computer network exposed the personal information of nearly 50 million users. Going forward, one of the critical success factors of FB would be to:

Mitigating internal threats through monitoring

many organizations limit their employees' access to certain websites and prevent the individual installation of new software. Which of the following best describes this practice?

asset-stock accumulation

the process by which a firm accrues or builds up a resource over time is important for you to recognize as it is often the basis of rejuvenating barriers to erosion. Such process is called:

Capability development

the process by which an organization is able to improve performance over time by developing its ability to use available resources for maximum effectiveness is known as:

an estimate of the likely time delay competitors will face in replicating the leader's initiative

the sustainability of competitive advantage grounded in an IT-dependent strategic initiative is measured by

IT assets and IT capabilities

the two major components of the IT resource barrier

Charge-back, allocation, overhead

there are three main methods used by modern org to fund IS. These include:

Full life cycle costs of IT assets

total cost of ownership is a financial estimate designed to explicitly recognize the:

Acceptance, reduction, and transference

when a company is faced with a security threat, they have which 3 strategies available to them?

capability development, asset-stock accumulation

which of the following are the two main dynamics for rejuvenation and strengthening of barriers of erosion

Allocation

which of the following balances per per use against charging the department that uses the IT functions directly?

IT team barrier

which of the following is Not a barrier to erosion of advantage

Policies regarding what computing resources are accessible to whom

which of the following is a viable method of dealing with internal security threats?

flexibility and control

which of the following is an advantage of custom development?

Phishing

which of the following is an automated method of seeking passwords?

Competitor

which of the following is an entity that does not share the total value created by a transformation made in your firm?

Your university library electronic system

which of the following is an example of mirroring capabilities

faster roll out

which of the following is not one of the advantages related to making your own system

The steering committee

which of the following makes decisions on the IS investment approach, portfolio, and risk?

Processes and tools over individual and interactions

which of the following statements is not a part of the agile manifesto for software development?

It does not self-replicate

why is a trojan horse not a virus?

It produces no revenue of efficiency

why is security considered a negative deliverable?

To stress the fact that phases are sequential and iteration (or going back) should be

why is the systems development life cycle methodology typically referred to as the "waterfall model?"

Visit vendor sites

your book describes the systems selection process in-depth. Which of the following is not a step in the system selection process?


Set pelajaran terkait

inflammation, infection, and immunity

View Set

To Kill A MockingBird Chapters 8-12

View Set

Biology Honors: 1st Semester Exam Review

View Set

Preoperative Nursing PrepU questions

View Set

McGrawHill Chapter 1 Data/Information/Knowledge and Ch 6 - Databases

View Set