ISDS 3001 FInal Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

In Abraham's coffee shop customers are willing to buy medium coffee for $3. He says it creates $2 worth of value o each cup. How much is the supplier opportunity cost? Select one: A.1$ B.5$ C.0$ D.6$

$1

"A system mainly concerned with automating recurring activities and structuring day-to-day activities to ensure that they are performed with speed and accuracy" is:

A TPS

A company is looking for a person with a business degree, a strong background in finance and leadership experience. What is the company most likely looking for?

A functional manager

Response lag is: Select one: A.A measure of the delay of competitive response to an IT-dependent strategic initiative B.The time and cost it takes to identify whether IT investments can be used to generate added value C.One of the four barriers to erosion of IT-dependent competitive advantage D.All of the choices are correct

A measure of the delay of competitive response to an IT-dependent strategic initiative

Which of the following is a simple definition of the Internet?

A network of networks

What is a two-sided network?

A network that connects the web designers and web users

A long-term proposal that identifies new systems, new projects, or new directions fo the IS organization is an example of: Select one: A.A strategic initiative B.A business strategy C.An information systems assessment D.An information systems vision E.An information systems guideline

A strategic initiative

When a company is faced with a security threat, they have which three strategies available to them? Select one: A.Acceptance, reduction, and transference B.Acceptance, avoidance, and transference C.Avoidance, reduction, and transference D.Acceptance, avoidance, and reduction E.All of the choices are correct

Acceptance, Reductions, and Transference

What is the revenue model of Google?

Advertisement support

Which of the following is correct regarding the characteristics of decision making at the executive level of an organization?

All choices are correct

Which of the following balances pay-per-use against charging the department that uses the IS functions directly? Select one: A.Allocation B.Chargeback C.Overhead D.Investment

Allocation

Positive feedback refers to what?

An economic condition where the strong get stronger and the weak get weaker

The sustainability of a competitive advantage grounded in an dependent strategic initiative is measured by: Select one: A.An estimate of the likely time delay competitors will face in replicating the leader's initiative B.The inverse of the number of response lag drivers associated with the barrier C.An estimate of the amount of money competitors will lose before beginning to replicate the advantage D.The amount of profit a firm loses in creating the advantage in the first place E.Competitive advantages do not last long in hypercompetitive industries.

An estimate of the likely time delay competitors will face in replicating the leader's initiative

As part of its' IS strategic business planning process, a multinational large bank is conducting a SWOT analysis to review how well equipped it is to achieve its vision in accordance with the newly developed IS guidelines. The bank is globally recognized as one of the most innovative institutions in the industry that tends to keep up with the latest technology trends. In this context, blockchain, the distributed ledger technology, is likely to be perceived by the bank as: Select one: A.An opportunity B.A strength C.A threat D.A weakness

An opportunity

Which of the following is an example of a managerial staff position in the IT function?

Analyst

After evaluating an IT-dependent strategic initiative using the sustainability framework, managers are left with three possible decisions. Which of the following is NOT one of these three decisions Select one: A.analyze the IT-dependent strategic initiative independently B.develop IT-dependent strategic initiative as part of a consortium C.develop IT-dependent strategic initiative independently D.shelve the IT-dependent strategic initiative

Analyze the IT-dependent strategic initiative independently

The process by which a firm accrues or builds up a resource over time is important for you to recognize as it is often the basis for rejuvenating barrier to erosion. Such process is called: Select one: A.Asset-stock accumulation B.Value-system link concentration C.IT infrastructure investing D.Capability development

Asset-stock accumulation

Which of the following terms is related ot the ability to overlay information on top of a photograph? Select one: A.Augmented Reality B.Location Based Social Networking C.Green IS D.Online Analytical Processing (OLAP) E.Digital Data Genesis

Augmented reality

When categorizing eCommerce initiatives by company structure, which category does Walmart fall into?

Bricks and Clicks

When categorizing eCommerce initiatives by transaction type, which category does an Online Travel Agency such as Expedia fall into?

Business-to-Consumer (B2C)

The process by which an organization is able to improve its performance over time by developing its ability to use available resources for maximum effectiveness is known as: Select one: A.Capability development B.Asset-stock accumulation C.Value-system link concentration D.IT infrastructure investing

Capability development

Which of the following are the two main dynamics for rejuvenation and strengthening of barriers of erosion? Select one: A.capability development, asset-stock accumulation B.capability analysis, asset-stock transfer C.capability development, asset-stock transfer D.capability planning, asset-stock accumulation

Capability development, asset-stock accumulation

Company X is charged for networking expenses based on the volume of traffic it initiates. Which of the following IS funding approaches fits this example? Select one: A.Chargeback B.allocation C.crowdfunding D.Overhead

Chargeback

There are three main methods used by modern organizations to fund IS. These include: Select one: A.Chargeback, Allocation, and Overhead B.Chargeback, Allocation, and Investment C.Allocation, Overhead, and Investment D.Chargeback, Overhead, and Investment E.Allocation, Chargeback, and Investment

Chargeback, Allocation, and Overhead

What is the top-level position in the IT function?

Chief Information Officer (CIO)

You own a company and you realize that your firm has a very weak IT strategy. Who should you replace?

Chief Information Officier (CIO)

Which two major trends have supported the rapid development in IoT:

Commoditization and price decline of sensors and emergence of cloud computing

What is the difference between a data warehouse and a data mart?

Compared to a data warehouse, a data mart is smaller and easier to build

Which of the following is an entity that does NOT share the total value created by a transformation made in your firm? Select one: A.Competitor B.Your Firm C.Supplier D.Customer

Competitor

Siri, Alexa, Cortana, Google Assistant are examples of voice user interfaces. Which of the following trend is most closely related to the fact that these interfaces are now widely available?

Computers have become easier to use

The CSLC should be viewed from which viewpoint? Select one: A.Inbound logistics B.Human Resource Management C.Procurement D.Infrastructure Development E.Technology Development

Customers

There are six key questions that senior executives should answer when getting involved in information systems management. The first questions is "How much should we spend on IT?" This questions is intended to: Select one: A.Decide what the role of information systems and technology should be in the organization. B.Decide what business processes are most important to the firm at a given point. C.Decide the degree of service the firm needs, and that they are willing to pay for. D.Weigh the cost/benefits of standardization and flexibility. E.Assign responsibility for information systems projects.

Decide what the role of information systems and technology should be in the organization

Network effects are associated with:

Demand-side economies of scale

Which of the following terms is related to capturing data in real-time, as things happen? Select one: A.Digital Data Genesis B.Location Based Social Networking C.Augmented Reality D.Green IS E.Online Analytical Processing (OLAP)

Digital Data genesis

When discussing the impacts of the Internet, we observe that marketplaces like Amazon or Alibaba are edging out the middlemen. We referred to this opportunity of digitalization as:

Disintermediation

Mary is creating a business case for Turkish Arlines. She proposes that the company to "reduce the response time to customer complaints on Twitter." How would you categorize this type of business change? Select one: A.do things better B.do new things C.stop doing things D.none of the above

Do things better

Information goods are not:

Easy to produce

What have we defined as: "an online exchange of value"?

Electronic commerce

The CSLC is broken down into 13 stages. One of these involves making sure that the goods or services that have been purchased actually meet the applicable specifications. Which stage is this? Select one: A.Evaluate and Accept B.Specify C.Select Source D.Establish Requirements E.Acquire

Evaluate and Accept

Delta Airlines is a major United States airline which, along with subsidiaries and regional affiliates, operates over 5,400 flights daily. Its infrastructure enables Delta to operate with the needed degree of efficiency and effectiveness. Even small disruptions can endanger Delta's wellbeing and future viability as an airline carrier. Which quadrant of the strategic grid do you think Delta can be placed in? Select one: A.Factory B.Strategic C.Support D.Turnaround

Factory

A customer's willingness to pay is the same as the price they pay T/F

False

Digital manufacturing consists of the use of computers to design objects. T/F

False

Function creep is the situation where data collected for a stated or implied purpose is later on reused for the same purpose T/F

False

Of the five forces, rivalry amongst competitors is the most important because it represents the best determinant of profitability for an average company within an industry. T / F

False

Outsourcing is the process of engaing a foreign provider to supply the products or services the firm no longer intends to produce internally T/ F

False

Technical feasibility is concerned with taking the system requirements document and producing a robust, secure, and efficient application T/F

False

The steering committee includes IT programmers who convene regularly to provide guidance to the IS function T/ F

False

With the term Web 2.0 we refer to the second coming of the services provided over the Internet. More specifically, Web 2.0 is mostly based on mobility and mobile applications.

False

Which of the following is NOT one fo the advantages related to making you own systems? Select one: A.Faster Roll-Out B.Unique Tailoring C.Flexibility D.Control

Faster Roll-Out

Which of the following is an advantage of custom development? Select one: A.flexibility and control B.economically attractive C.faster roll-out D.knowledge infusion

Flexibility and control

What is the revenue model of a firm that initially gives away its product or service for free and later attempts to charge for a premium service?

Freemium

Total Cost of Ownership is a financial estimate designed to explicitly recognize the: Select one: A.No, because IT ranges from extremely complex technology (e.g., large data warehouses, infrastructure projects), to small applications (e.g., a personal web site) B.Yes, because IT is a transportation mechanism, which carries digital information just as railroads carry goods C.Yes, because information technology is just one of the support activities in creating value D.No, because companies are spending more and more money in IT investment

Full life cycle costs of IT assets

The two major components of the IT resources barrier are: Select one: A.IT assets and IT capabilities B.IT technical skills and IT management skills C.IT technical skills, IT management skills, and relationship assets D.IT infrastructure and information repositories E.Software, Hardware, and Networks

IT assets and IT capabilities

Which of the following is NOT a barrier to erosion of advantage? Select one: A.IT team barrier B.IT project barrier C.IT resources barrier D.preemption barrier

IT team barrier

Which of the following environments are not a part of the mixed reality (MR) continuum? Select one: A.Imagined reality B.Augmented reality C.Augmented virtuality D.Virtual environment

Imagined reality

Which of the following is a primary activity? Select one: A.Inbound logistics B.Human Resource Management C.Procurement D.Infrastructure Development E.Technology Development

Inbound logistics

In September 2018, Facebook suffered the biggest data breach in its 14-year history as a social media platform. An attack on Facebook's computer network exposed the personal information of nearly 50 million users. Going forward, one of the critical success factors of Facebook would be to: Select one: A.Increase user confidence and trust in Facebook by ensuring improved security measures within the platform B.Increase the overall pay of all employees by 5% C.Let go of the employees who reported the data breach D.Pay off any fines that are levied by Data Protection authorities and refuse to take responsibility

Increase user confidence and trust in Facebook by ensuring improved security measures within the platform

The following statement: "We will store data centrally for all mission critical applications" is an example of: Select one: A.Information Systems Guideline B.Information Systems Vision C.Information Systems Assessment D.Information Systems SWOT analysis E.Strategic planning

Information Systems Guideline

Bonita Dawn Boutique is an online vintage chinaware business. They have decided to implement an order tracking software for their business. This project is meant to increase control and improve information management (order tracking) for the business. What kind of project can this be considered as? Select one: A.Informational B.Infrastructural C.Strategic D.Transactional

Informational

What are the three steps that occur during the implementation phase of the SDLC? Select one: A.Installation, Operations, Maintenance B.Programming, Testing, Installation C.Investigation, Installation, Operations D.Programming, Installation, Maintenance E.Investigation, Testing, Installation

Installation, Operations, Maintenance

Which one of the following is not one of the three main phases of the IS cycle?

Integrating transaction processing systems

Enterprise systems are built around which concept?

Integration

Why do we need to create an Information System Vision during the strategic IS planning process? Select one: A.It defines the role that information systems should play in the organization. B.It tells us the opportunity for new strategic directions and initiatives that new technologies make possible. C.It helps us understand the performance of our current IS resources. D.It provides a set of guidelines that the firm should follow when using and managing IS resources.

It defines the role that information systems should play in the organization

Why is a Trojan horse not a virus? Select one: A.It does not self-replicate B.It does not have a payload C.It does not have a trigger event D.It is a legitimate form of security protection E.It does not do anything harmful

It does not self-replicate

Why is security considered a negative deliverable? Select one: A.It produces no revenue or efficiency B.It costs money C.It produces only tangible benefits D.It does not affect profits whether it is done well or poorly E.It is largely ignored

It produces no revenue or efficiency

The pharmaceutical industry is characterized by a substantial need for capital investments in research and development, strong economies of scale, well-known brand names with multiple issues on patents and government regulations. Threat of new entrants can be characterized as one of the following options: Select one: A.Low B.High C.Medium D.None of the choices are correct

Low

Which of the following is not an economic characteristic of information?

Low production costs

Which of the following is NOT a part of the support activities carried out in a typical value chain? Select one: A.Marketing and sales B.Firm infrastructure C.Human resource management D.Procurement

Marketing and Sales

Many organizations limit their employees' access to certain websites and prevent the individual installation of new software. Which of the following best describes this practice? Select one: A.Mitigating internal threats through monitoring B.Detecting internal threats through monitoring C.Detecting external threats through monitoring D.Answer is not listed

Mitigating internal threats through monitoring

One fo your friends who is enrolled in the college of business tells you: 'it's not important for me to understand IT and information systems.' What would be a good argument to prove him wrong?

Moore's law will continue to make computers more powerful and pervasive, but it is general and functional managers who must figure out how to use them to create value

Is IT an indistinct commodity? Select one: A.No, because IT ranges from extremely complex technology (e.g., large data warehouses, infrastructure projects), to small applications (e.g., a personal web site) B.Yes, because IT is a transportation mechanism, which carries digital information just as railroads carry goods C.Yes, because information technology is just one of the support activities in creating value D.No, because companies are spending more and more money in IT investment

No, because IT ranges from extremely complex technology (e.g., large data warehouses, infrastructure projects), to small applications (e.g., a personal website)

Are the terms Information System and Information Technology synonymous?

No, because information technology is a component of modern information systems

Napoleon's army would NOT need an information system. Is this statement correct?

No, they would need an information system to run their operations like keeping track of supplies and soldiers' assignments

We have identified three general approaches to the acquisition of information processing functionalities and the introduction of IT-based information systems. Which of the following is not one of them? Select one: A.Open source development B.Custom design and development C.System selection and acquisition D.End-user development E.None of the choices are correct

Open source development

in the context of digital technology we have defined 'intelligence' as the ability of a digital computer to:

Perform computations to process information

Which of the following is an automated method of seeking passwords? Select one: A.Phishing B.Social Engineering C.Software bugs D.Backdoors E.Careless behavior

Phishing

Which of the following is a viable method of dealing with internal security threats? Select one: A.Policies regarding what computing resources are accessible to whom B.Antivirus software C.Firewalls D.Policies that mandate frequent updates to programs and such E.Not immediately deleting terminated employees

Policies regarding what computing resources are accessible to whom

Which of the following is NOT an example of digital data genesis? Select one: A.Posting a birthday card to your friend through FedEx B.A fitbit monitoring the heart rate of an individual C.Ordering food over Alexa D.Searching for LinkedIn contacts

Posting a birthday card to your friends through FedEx

Which kind of analytics make use of statistical modeling and machine learning algorithms?

Predictive analytics

Which of the following statements is not a part of the "agile manifesto" for software development? Select one: A.processes and tools over individuals and interactions B.customer collaboration over contract negotiation C.responding to change over following a plan D.working software over comprehensive documentation

Processes and tools over individuals and interactions

When categorizing eCommerce initiatives by company structure, which category does Spotify fall into?

Pure Play

Risk Audit provides the basis for: Select one: A.Risk Analysis B.Risk Reduction C.Risk Transference D.Reward Mechanism E.Risk increase

Risk analysis

If a company was based in Montgomery, Alabama, which of the following would be considered an offshoring activity? Select one: A.Sending the help desk function to Mexico B.Dealing with a customer in China C.Purchasing parts from a supplier in Los Angeles, who gets them from India D.Moving the IS Department completely to Hawaii E.Shifting sales and marketing functions to a web page so that it is accessible everywhere.

Sending the help desk function to Mexico

A market is likely to tip when there are:

Strong economies of scale and low need for product variety

Which of the following is not part of the organizational context of an Information System?

Structure

What is the revenue model of Netflix.com?

Subscription

Which of the following is NOT an element of an information system?

Subsystem

A gold standard set of training examples is typically used in: Select one: A.Supervised machine learning B.Unsupervised machine learning C.Deeply supervised machine learning D.Digital manufacturing

Supervised Machine learning

Nike decided to implement Oracle. Oracle is a database management system produced by the multinational software corporation Oracle, Inc. Which approach does Nike's decision fall into? Select one: A.system selection and acquisition B.custom design and development C.end-user development D.offshoring

System selection and acquisition

When designing an information system you must optimize the IS as a whole, not each individual component. This is because the components an IS interact with one another. We have termed this phenomenon:

Systemic effects

The ATMs of you bank still run of the Windows XP operating system. In 2018 Microsoft decided to stop supporting Windows XP. As a consequence, no more security update will be released for it. Because of systemic effects, you could intervene on any one of the four components of the information systems to address this problem. Which intervention would be most appropriate for the bank in this case?

Technology. You should upgrade all ATMs to a newer version of the operating system

Added value is: Select one: A.That portion of the total value created that would be lost if the firm did not partake in the exchange. B.The maximum amount of money the firm's customers are willing to spend in order to obtain the firm's product. C.The actual amount of money the firm disbursed to acquire the resources needed to create its product or service. D.The minimum amount of money suppliers are willing to accept to provide the firm with the needed resources.

That portion of the total value created that would be lost if the firm did not partake in the exchange

Who owns the Internet?

The Internet is owned by millions of entities

A small local coffee shop has two suppliers, A and B. Supplier A went bankrupt and had to close its business. Assuming that both suppliers are able to provide the coffee shop with all its needs in term of suppliers, which of the following is likely to happen: Select one: A.The process by which the total value created in the transaction is split among all the entities who contributed to creating it. B.The set of activities the company engages in to convert inputs purchased from suppliers, into outputs to be sold to customer. C.The process by which new economic value is generated through a transformation process. D.The condition where a firm engages in a unique transformation process and has been able to distinguish its offerings from those of competitors.

The bargaining power of supplier B will increase

competitive advantage is: Select one: A.The condition where a firm engages in a unique transformation process and has been able to distinguish its offerings from those of competitors. B.The set of activities the company engages in to convert inputs purchased from suppliers, into outputs to be sold to customer. C.The process by which the total value created in the transaction is split among all the entities who contributed to creating it. D.The process by which new economic value is generated through a transformation process."

The condition where a firm engages in a unique transformation process and has been able to distinguish its offerings from those of competitors

IN chapter #3 the book briefly introduced the notion of Business Process Reengineering (BPR) to refer to:

The fundamental rethinking and radical redesign of a firm's existing business processes

Which of the following is NOT an advantage offered by the information system planning process? Select one: A.An opportunity B.A strength C.A threat D.A weakness

The information systems plan is an informal contract that specifies the objective information systems deployment and responsibilities of the parties

Supplier opportunity cost is: Select one: A.The minimum amount of money suppliers are willing to accept to provide the firm with the needed resources. B.The actual amount of money the firm disbursed to acquire the resources needed to create its product or service. C.The maximum amount of money the firm's customers are willing to spend in order to obtain the firm's product. D.That portion of the total value created that would be lost if the firm did not partake in the exchange.

The minimum amount of money suppliers are willing to accept to provide the firm with the needed resources

An information system vision defines the role that information systems should play in the organization. For what kind of organizations do information systems play a more strategic role? Select one: A.The organizations whose success in the marketplace depends heavily on their ability to introduce IT innovations B.The organizations which are more mature and less IT-intensive C.The organizations whose information systems impact their day-to-day operations D.All of the above as information systems should always play a strategic role E.None of the answers are correct

The organizations whose success in the marketplace depends heavily on their ability to introduce IT innovations

Which of the following is an example of the process element of an information system?

The procedure for enforcing security at airports using body scanners

We defined the concept of value appropriation as: Select one: A.The process by which the total value created in the transaction is split among all the entities who contributed to creating it. B.The set of activities the company engages in to convert inputs purchased from suppliers, into outputs to be sold to customer. C.The process by which new economic value is generated through a transformation process. D.The condition where a firm engages in a unique transformation process and has been able to distinguish its offerings from those of competitors.

The process by which the total value created in the transaction is split among all the entities who contributed to creating it.

One of your friends who is enrolled in the college of business tells you: 'it's not important for me to understand IT and information systems.' What evidence could you use to convince him that he is wrong?

The top 5 publicly traded companies are all technology companies, because software is now a key driver of business success

The iPod's entrance into the music player-industry caused the increased threat of which of the following: Select one: A.Marketing and sales B.Firm infrastructure C.Human resource management D.Procurement

Threat of substitutes or services for other music players

What is the focus of 'predictive analytics'?

To better understand what will occur

Why is the Systems development Life Cycle methodology typically referred to as "the waterfall model"? Select one: A.To stress the fact that phases are sequential and iteration (or going back) should be B.Because it was first popularized in a town with many waterfalls C.Because the SDLC, like prototyping, is not iterative. D.To convey the notion that getting good user requirements is important and there should be multiple opportunities to elicit user requirements

To stress the fact that phases are sequential and iteration (or going back) should be

Which of the following are not one of the levels of an organization according to the hierarchical perspective?

Transactional

A block chain mechanism like bitcoin does not require the presence of a central authority (e.g. bank) for validation (accuracy and legitimacy) of the transactions. T/F

True

An IS has two subsystems, a social and technical one.

True

IoT devices rely on cloud services as the backbone of their computational power T/F

True

Smart devices are digital computers in the shape of everyday objects that are capable of interconnecting to exchange data. T/ F

True

The difference between cybersecurity and privacy is that whereas cybersecurity is about safe keeping of collected data, privacy is informed consent and permission to collect and use identifying information. T/F

True

The virtual value chain (VV) model is designed to map the set of sequential activities that enable a firm to transform data in input into some output information that, once distributed to the appropriate user, has higher value than the original data. T/ F

True

Tippy markets are associated with strong positive feedback

True

To create value you must increase customer willingness to pay more than supplier opportunity cost T/ F

True

When an IT initiative is being developed as part of a consortium, the leader shares the risks and costs associated with the initiative with competitors that are a part of the consortium T/F

True

the four quadrants of the strategic impact grid are the factory, strategic, support, and turnaround. T/ F

True

If you hear the statistic: 'There are almost 3 billion smartphones in use in the world today.' Which of the following trend is it most closely related to?

Ubiquitous network access

Netflix has 100 million subscribers. Which of the following trends is most responsible for their success?

Ubiquitous network access

Security should be on managers' priority list because of peculiar characteristics that run the risk of leaving it what? Select one: A.Underfunded B.Overfunded C.Overstaffed D.Irrelevant E.Neutralized

Underfunded

How is value created in networks?

Value is a function of the number of connected nodes

The owner of a large car dealership in your hometown, just told you he is thinking about using virtual reality to reduce the number of test drives by customers. He is all excited about this initiative because he thinks it will increase efficiency. You think this initiative will be very disruptive to the structure component of the existing car dealership information system. Why?

Virtual reality will significantly change the relationships between customers and sales associates, reducing their chance to earn commissions

Your book describes the systems selection process in-depth. Which of the following is NOT a step in the system selection process? Select one: A.Visit vendor sites B.Compile an RFP C.Develop a vendor short list D.Solicit proposals E.Have vendors provide demonstrations

Visit vendor sites

A brand name is a driver of value creation: Select one: A.Yes, as long as the brand increases customer willingness to pay. B.Yes, as long as the brand increases firm cost. C.No, because intangibles cannot increase value. D.No, because a brand is just a trick that marketing people play on us.

Yes, as long as the brand increases customer willingness to pay

Is an information system a sociotechnical system?

Yes, because it includes a social subsystem and a technical subsystem

You invented the iPet, an app that lets pet owners track their animals. There is only one competitor, iDog, and it produces a similar product. Your analysis shows that SOC for iPet and iDog is the same: $20. But CWP for iPet is $25and for iDog it is $23. Do you have a competitive advantage? Select one: A.Yes. Because iPet is the only firm in the market able to create $5 worth of value B.Yes. Because iPet is the only firm in the market able to increase CWP C.No. Because iPet and iDog have the same SOC D.No. Because iPet and iDog create the same amount of new value

Yes. Because iPet is the only firm in the market able to create $5 worth of value

Which of the following is an example of mirroring capabilities? Select one: A.Your university library electronic reservation system B.Amazon.com monitoring customer behavior while shopping C.Amazon.com's suggestive selling initiative D.Vending machines embedded with microchips E.RFID tags in books

Your university library electronic reservation system

A business school has developed a new leave portal for all its employees and decides to immediately switch from the old platform to the new one. This migration is considered a low risk endeavor for the school and its employees. This type fo migration approach is considered as: Select one: A.direct B.parallel C.phased D.pilot

direct

When categorizing eCommerce initiatives by transaction types, which category does electronic filing of income taxes with the federal government fall into?

eGovernment

Which of the following makes decisions on the IS investment approach, portfolio, and risk? Select one: A.the steering committee B.the investment committee C.the portfolio management committee D.the risk mitigation committee

the steering committee

We identified four main eras of data processing in business, what characterizes the 'batch era'?

transactions were batched and processed by a mainframe at periodic intervals


Set pelajaran terkait

CompTIA A+ 220-1001 - PC Maintenance

View Set

Physiological Psych. Module 9.2 Quiz

View Set

Anthropology (cox 1003) quiz questions

View Set

Testout Sec+ 1.1 Security Overview

View Set