IT 205 Entire Course

**********************************************
IT 205 Entire Course Link
https://uopcourses.com/category/it-205/
**********************************************

IT/205

MANAGEMENT
OF INFORMATION SYSTEMS


 

The Latest Version A+ Study
Guide


 

**********************************************

IT 205 Entire Course Link

https://uopcourses.com/category/it-205/

**********************************************

 

IT 205 Week 1 Week One Knowledge Check

Week 1 Knowledge Check

The material presented below
is not meant to be a comprehensive list of all you need to know in the content
area. Rather it is a starting point for building your knowledge and skills.
Additional study materials are recommended in each area below to help you
master the material.

Personalized Study Guide Results 

Score
18 / 18






Concepts


Mastery


Questions





Meeting
Business Need


100%


·        
1
·        
2
·        
3




Business
Intelligence


100%


·        
4
·        
5
·        
6




Functions of
Information Systems


100%


·        
7
·        
8
·        
9




Types of
Enterprise Systems


100%


·        
10
·        
11
·        
12




Types of
Components


100%


·        
13
·        
14
·        
15




Relationships
Between Components


100%


·        
16
·        
17
·        
18




Concept: Meeting Business Need




Mastery


100%


Questions


·        
1
·        
2
·        
3




Materials on the concept


  • Low-Cost Leadership

  • The Business Value Chain Model

  • Synergies, Core Competencies, and Network-Based Strategies

  • Extending the Value Chain: The Value Web





1.

What directly links consumer behavior to distribution and
production supply chains?

·        
A.

Efficient customer response system

·        
B.

Customer relationship management (CRM)

·        
C.

Mass customer customization

·        
D.

Enterprise resource planning (ERP)





2.

When a person compares the effectiveness and efficiency of an
organization’s business processes against standards, what is this known as?

·        
A.

Targeting

·        
B.

Recalibrating

·        
C.

Benchmarking

·        
D.

Bullseyeing





3.

What is it called when a collection of independent firms leverage
IT to coordinate their value chains to produce a product or service?

·        
A.

Virtual network

·        
B.

Value web

·        
C.

Collective business

·        
D.

Efficiencies of scale



Concept: Business Intelligence




Mastery


100%


Questions


·        
4
·        
5
·        
6




Materials on the concept


  • Information System Strategies for Dealing with Competitive Forces

  • Basic Strategy 101: Align the IT with the Business Objectives

  • Porter’s Competitive Forces Model

  • Synergies, Core Competencies, and Network-Based Strategies





4.

What is the basic principle of IT strategy for a business?

·        
A.

Ensure that the people serve the business.

·        
B.

Ensure that the business serves the technology.

·        
C.

Ensure that the people serve the technology.

·        
D.

Ensure that the technology serves the business





5.

Which model is the most widely used for understanding competitive
advantage?

·        
A.

Value chain model

·        
B.

Competitive forces model

·        
C.

Supply chain model

·        
D.

Business objects model





6.

What uses a network infrastructure to connect people, places, and
assets in widely-distributed locations?

·        
A.

Local area network (LAN)

·        
B.

Site based company

·        
C.

Core company

·        
D.

Virtual company



Concept: Functions of Information Systems




Mastery


100%


Questions


·        
7
·        
8
·        
9




Materials on the concept


  • 2.4. The Information Systems Function in Business

  • The Information Systems Department





7.

What is the responsibility of the chief information officer?

·        
A.

Responsible for the firm’s knowledge management program

·        
B.

Oversees the use of information technology in the firm

·        
C.

Oversees information security

·        
D.

Ensures that the company complies with existing data privacy laws





8.

What is the primary role of a systems analyst?

·        
A.

Write business systems software

·        
B.

Repair and maintain hardware for firms

·        
C.

Translate business problems into IS requirements

·        
D.

Ensure privacy policies for firms





9.

Who is in charge of making sure IS files are safe, as well as
enforcing the safety policy?

·        
A.

Chief privacy officer (CPO)

·        
B.

Chief knowledge officer (CKO)

·        
C.

End users officer (EUO)

·        
D.

Chief security officer (CSO)



Concept: Types of Enterprise Systems




Mastery


100%


Questions


·        
10
·        
11
·        
12




Materials on the concept


  • Global E-business and Collaboration

  • Systems for Linking the Enterprise

  • Enterprise Applications





10.

Which systems support nonroutine decision making for middle
management?

·        
A.

Executive support systems

·        
B.

Management support systems

·        
C.

Decision-support system

·        
D.

Transaction support system





11.

What collects data from key business processes in various parts of
the organization and stores it in a central repository?

·        
A.

Enterprise resource planning (ERP)

·        
B.

Middleware management (MM)

·        
C.

Customer relationship management (CRM)

·        
D.

Supply chain management (SCM)





12.

What system improves service and drives sales?

·        
A.

Enterprise resource planning (ERP)

·        
B.

Decision-support system (DSS)

·        
C.

Transaction processing system (TPS)

·        
D.

Customer relationship management (CRM)



Concept: Types of Components




Mastery


100%


Questions


·        
1
·        
14
·        
1




Materials on the concept


  • People

  • Technology

  • Organizations

  • 1.3. Understanding Information Systems: A Business Problem-Solving
    Approach

  • The Role of Critical Thinking in Problem Solving





13.

What is considered the most expensive part of an information
system?

·        
A.

Organization

·        
B.

People

·        
C.

Data management

·        
D.

Technology





14.

Which of the following provides the platform on which a firm can
build its information system?

·        
A.

World Wide Web

·        
B.

Computer software

·        
C.

Intranet

·        
D.

IT infrastructure





15.

Which stem perspective considers all of the components in the
firm’s IT structure and the way they work together?

·        
A.

Technology perspective

·        
B.

People perspective

·        
C.

Organization perspective

·        
D.

Information perspective



Concept: Relationships Between Components




Mastery


100%


Questions


·        
16
·        
17
·        
18




Materials on the concept


  • Organizations

  • Dimensions of Information Systems

  • Technology

  • What Is an Information System?

  • It Isn’t Simply Technology: The Role of People and Organizations





16.

What are logically related tasks and behaviors for accomplishing
work known as?

·        
A.

Personnel processes

·        
B.

Information processes

·        
C.

Business processes

·        
D.

Technology processes





17.

What does an intranet use?

·        
A.

Mainframe technology

·        
B.

Infrared telecommunications systems

·        
C.

The telecommunications capacities of fiber optic networks

·        
D.

Internet technology within the boundaries of the firm





18.

What is a broader understanding of the people, organizational, and
technical dimensions of a system known as?

·        
A.

Management systems literacy

·        
B.

Information systems literacy

·        
C.

Computer systems literacy

·        
D.

Integrated systems literacy



 

 

 

IT 205 Week 2 Week Two Knowledge Check

Week 2 Knowledge Check

The material presented
below is not meant to be a comprehensive list of all you need to know in the
content area. Rather it is a starting point for building your knowledge and
skills. Additional study materials are recommended in each area below to help
you master the material.

Personalized Study Guide Results 

Score
22 / 22






Concepts


Mastery


Questions





IT Components


100%


·        
1
·        
2
·        
3




Customer
Relationship Management (CRM) Systems


100%


·        
4
·        
5
·        
6




Enterprise
Resource Planning (ERP) Systems


100%


·        
7
·        
8
·        
9




Server
Technologies


100%


·        
10
·        
11
·        
12




Data Storage


100%


·        
13
·        
14
·        
15




Input/Output
Technologies


100%


·        
16
·        
17
·        
18
·        
19




Collaboration
Systems


100%


·        
20
·        
21
·        
22




Concept: IT Components




Mastery


100%


Questions


·        
1
·        
2
·        
3




Materials on the concept


  • Infrastructure Components

  • Dimensions of Information Systems

  • 4.1. IT Infrastructure: Computer Hardware

  • Technology

  • 1.1. The Role of Information Systems in Business Today



Show More



1.

Laudon and Laudon (2011) stated that IT infrastructure is composed
of computer hardware, computer software, data management technology, and what
other two components?

·        
A.

Networking and telecommunications technology, and technology
services

·        
B.

Computer chipping and technology vending services

·        
C.

Custom programming services and telecommunications products

·        
D.

Legacy generating services and internal/external technology bytes





2.

Why must each organization carefully manage and design its information
systems?

·        
A.

Information systems work independently of each other.

·        
B.

Organizations need specific technology to match their needs.

·        
C.

Organizations need current technology to meet their bottom line.

·        
D.

Information systems can be relatively inexpensive





3.

Why are management information systems an important topic in
business today?

·        
A.

Because more business computing is moving toward continuous use of
PCs

·        
B.

Because of the continuous change in technology

·        
C.

Because of the increasing use of boxed software

·        
D.

Because of the increasing cost of management technology



Concept: Customer Relationship Management (CRM) Systems




Mastery


100%


Questions


·        
4
·        
5
·        
6




Materials on the concept


  • Customer Relationship Management Systems

  • Achieving Operational Excellence and Customer Intimacy: Enterprise
    Applications

  • Enterprise Applications





4.

Which best describes Customer Relationship Management Systems
(CRMs)?

·        
A.

They make sure the customer is satisfied.

·        
B.

They are used for organizational excellence.

·        
C.

They use data to make sure the customer is happy.

·        
D.

They capture, integrate, and analyze data from all over the
organization





5.

Customer Relationship Management (CRM) Systems help firms to:

·        
A.

integrate information

·        
B.

coordinate information

·        
C.

manage their relationships with customers

·        
D.

analyze data





6.

How does CRM software provide operational excellence for firms?

·        
A.

customers can use this to complain

·        
B.

firms can capture customer interactions and analyze them to
improve service

·        
C.

firms can use the software to sell goods and services to customers

·        
D.

customers can use the software to order products



Concept: Enterprise Resource Planning (ERP) Systems




Mastery


100%


Questions


·        
7
·        
8
·        
9




Materials on the concept


  • Enterprise Applications

  • Systems for Linking the Enterprise





7.

What is one way an enterprise resource planning (ERP) system help
run businesses?

·        
A.

Aligning marketing and human resources

·        
B.

Collecting data

·        
C.

Coordinating internal processes of the firm

·        
D.

Storing data





8.

Enterprise resource planning (ERP) systems and supply chain
management systems are two of the major enterprise applications. What are the
other two major enterprise applications?

·        
A.

Input systems and output management systems

·        
B.

Hardware management systems and software systems

·        
C.

Intranet relationship systems and extranet systems

·        
D.

Customer relationship management systems and knowledge management
systems





9.

How do enterprise resource planning (ERP) systems solve problems?

·        
A.

Automating and processing information

·        
B.

Integrating, collecting, and storing information

·        
C.

Working with the warehouse and extracting information

·        
D.

Inventorying websites for processing information



Concept: Server Technologies




Mastery


100%


Questions


·        
10
·        
11
·        
12




Materials on the concept


  • Types of Computers

  • 4.1. IT Infrastructure: Computer Hardware

  • Computer Networks and Client/Server Computing





10.

Which computer would you use to support a computer network?

·        
A.

PC

·        
B.

Mainframe

·        
C.

Workstation

·        
D.

Server





11.

Which of the following is the client in client/server computing?

·        
A.

The location of the bulk of the processing

·        
B.

The computer that acts as the user point of entry

·        
C.

The software program used for logging on to the network

·        
D.

The computer that first asks for services





12.

Why are servers important components of IT infrastructure?

·        
A.

They provide the needed software platform.

·        
B.

They are inexpensive to manage.

·        
C.

They provide the hardware platform for electronic commerce.

·        
D.

They can process web pages more efficiently



Concept: Data Storage




Mastery


100%


Questions


·        
13
·        
14
·        
15




Materials on the concept


  • Storage, Input, and Output Technology

  • 4.1. IT Infrastructure: Computer Hardware

  • Secondary Storage Technology





13.

Storage networks and magnetic tape are types of principal storage
technologies. What are two other types?

·        
A.

Magnetic disk and optical disk

·        
B.

Hard drives and software

·        
C.

Hard drives and CD-ROMs

·        
D.

Removable drives and floppy drives





14.

Which of the following best describes why companies use storage
networking?

·        
A.

To increase bandwidth requirements

·        
B.

To reduce storage requirements

·        
C.

To transfer data between servers in digital format

·        
D.

To keep a backup of existing optical disks





15.

Which of the following storage technology stores data
sequentially?

·        
A.

CD-ROM

·        
B.

RAID

·        
C.

Magnetic disks

·        
D.

Magnetic tape



Concept: Input/Output Technologies

Materials on the concept


  • Storage, Input, and Output Technology

  • 4.1. IT Infrastructure: Computer Hardware

  • Input and Output Devices





16.

What type of device gathers data and converts them into electronic
form for use by the computer?

·        
A.

Output device

·        
B.

Input device

·        
C.

Optical storage

·        
D.

Magnetic storage





17.

Which of the following devices are considered input devices?

·        
A.

Keyboard and mouse

·        
B.

Monitor and printer

·        
C.

Hard drive and speakers

·        
D.

CD-ROM drive and printer





18.

Which of the following is a device used to collect data directly
from the environment for input into a computer system?

·        
A.

Trackball

·        
B.

Touch screen

·        
C.

Audio input

·        
D.

d Sensor





19.

What computer component controls input and output devices?

·        
A.

Distributed processing

·        
B.

The digital platform

·        
C.

The terminals

·        
D.

The operating system



Concept: Collaboration Systems




Mastery


100%


Questions


·        
20
·        
21
·        
22




Materials on the concept


  • 2.3. Systems for Collaboration and Teamwork

  • Tools and Technologies for Collaboration and Teamwork

  • Wikis

  • Virtual Worlds





20.

Which of the following tools is NOT one of the 15 categories of
collaborative software tools?

·        
A.

Screen sharing

·        
B.

eBook authoring

·        
C.

Video conferencing

·        
D.

E-mail and instant messaging





21.

Wikis offer many benefits to organizations. Which of the following
provides the most benefits and usefulness to organizations?

·        
A.

Wikis help users find information quickly.

·        
B.

Wikis require no programming knowledge.

·        
C.

Wikis store and share company knowledge.

·        
D.

Wikis help users easily edit content





22.

What can virtual worlds do to enhance collaboration in
organizations?

·        
A.

House online meetings and training sessions.

·        
B.

Allow employees to work anonymously as avatars.

·        
C.

Allow users to use multiple avatars during a meeting.

·        
D.

Provide employees with opportunities to experience other countries



 

 

IT 205 Week 2 Assignment Effect of
Systems on Business

Resource: Microsoft® Visio® (available
on the Personal Student Desktop)

Identify five
different IT systems that have affected business in the past few years (i.e.,
business software applications, networks, hardware, internet-based
technologies, databases). For each system, briefly note the following:


  • A name for
    the system

  • The area of
    business it affects

  • What changes
    the system brought to the business world

  • What
    business processes changed because of the system

  • Likely
    future effect of the system



Create a
diagram using Visio® that lists the five different IT systems
you identified. In your Visio® document, use a rectangle to
diagram the name of each system and the area of business it affects. Use a
triangle to indicate the challenges and business processes changes. Use a
rounded square to list likely future effects of the system.

Recommended
SkillSoft: "Getting Started with Visio 2010" ID: mo_bvis_a01_dt_enus

 

 

 

IT 205 Week 3 Week Three Knowledge
Check

Week 3 Knowledge Check

The material presented
below is not meant to be a comprehensive list of all you need to know in the
content area. Rather it is a starting point for building your knowledge and
skills. Additional study materials are recommended in each area below to help
you master the material.

Personalized Study Guide Results 

Score
15 / 15






Concepts


Mastery


Questions





Information
Policy


100%


·        
1
·        
2
·        
3




Business
Intelligence


100%


·        
4
·        
5
·        
6




Knowledge
Work Systems


100%


·        
10
·        
11
·        
12




Decision-Support
Systems


100%


·        
10
·        
11
·        
12




Knowledge
Management Systems


100%


·        
13
·        
14
·        
15




Concept: Information Policy




Mastery


100%


Questions


·        
1
·        
2
·        
3




Materials on the concept


  • 5.4. Managing Data Resources

  • Establishing an Information Policy





1.

What is the best description of the primary purpose of an
information policy?

·        
A.

To specify the formal rules governing the maintenance,
distribution, acquisition, classification, and use of information in an
organization

·        
B.

To allow each user within an organization access and use of
information when working offsite

·        
C.

To enforce policies and procedures through which data can be
managed by the IT department within an organization

·        
D.

To decide how policy information can be shared with customers or
clients of an organization from state to state





2.

What role does data administration play in a large organization in
establishing an information policy?

·        
A.

Determining user accounts for different databases within the
organization

·        
B.

Analyzing and reporting data to decision makers within the organization

·        
C.

Developing and implementing an information policy for the
organization

·        
D.

Safeguarding data within the organization





3.

What is the primary purpose of a database design and management
group within a large organization?

·        
A.

To duplicate the functions of data administration

·        
B.

To perform data mining functions for the organization

·        
C.

To design databases and train users within the organization on how
to manage them

·        
D.

To define the structure, organize the content, and maintain the
database



Concept: Business Intelligence




Mastery


100%


Questions


·        
4
·        
5
·        
6




Materials on the concept


  • 5.3. Using Databases to Improve Business Performance and Decision
    Making

  • Tools for Business Intelligence: Multidimensional Data Analysis and
    Data Mining

  • Group Decision-Support Systems

  • Online Analytical Processing (OLAP)

  • 10.2. Business Intelligence in the Enterprise





4.

What is business intelligence (BI)?

·        
A.

The series of extractions of data from data warehouses and data
mines to help businesses make better decisions

·        
B.

The use of charts and diagrams to analyze business profitability
from state to state

·        
C.

A set of tools used to analyze, report, and send information about
company competitors

·        
D.

A series of tools used for consolidating, analyzing, and providing
access to data to help users make better business decisions





5.

What business intelligence tool enables users to view the same
data in multiple dimensions?

·        
A.

OODBMS

·        
B.

OLAP

·        
C.

SQL

·        
D.

DSS





6.

What is the primary use of data mining?

·        
A.

Quickly find and compare transaction data gathered over many years.

·        
B.

Summarize vast amounts of data into condensed reports.

·        
C.

Find hidden relationships in data.

·        
D.

Obtain answers to ad hoc questions in a rapid amount of time



Concept: Knowledge Work Systems




Mastery


0%


Questions


·        
7
·        
8
·        
9




Materials on the concept


  • Knowledge Work Systems

  • 10.4. Systems for Managing Knowledge

  • Examples of Knowledge Work Systems





7.

What is a knowledge work system?

·        
A.

A customized system designed to analyze customer knowledge for
businesses in the workplace

·        
B.

A system designed to organize and manage structured knowledge for
managers to be sent to CEOs

·        
C.

A system designed to collect and distribute general-purpose
knowledge within an organization

·        
D.

A specialized system designed for knowledge workers to promote and
manage knowledge creation and integration





8.

What are the requirements of a knowledge work system?

·        
A.

A wide range of capabilities to allow users to customize the
system to their needs

·        
B.

Quick access to external databases and great computing power

·        
C.

Large storage capacity and cloud computing options

·        
D.

Quick search features and powerful analysis tools





9.

What are the three major types of knowledge work systems?

·        
A.

Computer-aided design (CAD), virtual reality systems, and
investment workstations

·        
B.

Learning management systems (LMS), custom decision-support systems
(CDSS), and computer-aided design (CAD)

·        
C.

Custom decision-support systems (CDSS), computer-aided design
(CAD), and virtual reality systems

·        
D.

Computer-aided design (CAD), digital assess management systems,
and learning management systems (LMS)



Concept: Decision-Support Systems




Mastery


100%


Questions


·        
10
·        
11
·        
12




Materials on the concept


  • Group Decision-Support Systems

  • Support for Semistructured Decisions

  • Review Summary

  • The Business Intelligence Environment

  • Business Intelligence and Analytics Capabilities



Show More



10.

Which system supports decision making by enabling users to extract
useful information that was previously buried in large quantities of data?

·        
A.

Decision-support system (DSS)

·        
B.

Executive support system (ESS)

·        
C.

Transcription processing system (TPS)

·        
D.

Geographic information system (GIS)





11.

A DSS database contains what kind of data?

·        
A.

Historical data extracted from transaction-processing systems

·        
B.

Current or historical data from several applications or groups

·        
C.

External data mined from the Internet and other third-party
sources

·        
D.

The organization’s current transaction data





12.

Which type of information system uses data visualization
technology to analyze and display data for planning and decision making in the
form of digitized maps?

·        
A.

Executive support system (ESS)

·        
B.

Decision-support system (DSS)

·        
C.

Geographic information system (GIS)

·        
D.

Transcription process system (TPS)



Concept: Knowledge Management Systems




Mastery


100%


Questions


·        
13
·        
14
·        
15




Materials on the concept


  • Improving Decision Making and Managing Knowledge

  • Business Information Systems in Your Career

  • 10.4. Systems for Managing Knowledge

  • Enterprise-Wide Knowledge Management Systems





13.

What system provides an organization with the ability to identify,
incorporate, and distribute knowledge into its business processes and decision
making?

·        
A.

Knowledge management system (KMS)

·        
B.

Customer relationship management (CRM)

·        
C.

Enterprise process system (EPS)

·        
D.

Knowledge work system (KWS)





14.

What are the two major types of knowledge management systems?

·        
A.

Management information systems and decision support systems

·        
B.

Enterprise systems and knowledge management systems

·        
C.

Enterprise-wide knowledge management systems and knowledge work systems

·        
D.

Expert systems and knowledge work systems





15.

Enterprise-wide knowledge management systems handle what three
types of knowledge?

·        
A.

IT, structured, and tacit knowledge

·        
B.

Structured, semistructured, and tacit knowledge

·        
C.

Structured, unstructured, and general knowledge

·        
D.

Sales, human resources, and IT knowledge



 

 

IT 205 Week 4 Week
Four Knowledge Check

Week 4 Knowledge Check

The material presented
below is not meant to be a comprehensive list of all you need to know in the
content area. Rather it is a starting point for building your knowledge and
skills. Additional study materials are recommended in each area below to help
you master the material.

Personalized Study Guide Results 

Score
15 / 15






Concepts


Mastery


Questions





Telecommunications
Networks


100%


·        
1
·        
2
·        
3




Networking
Technologies


100%


·        
4
·        
5
·        
6




The Internet


100%


·        
7
·        
8
·        
9




Wireless
Technologies


100%


·        
10
·        
11
·        
12




Cellular
Technologies


100%


·        
13
·        
14
·        
15




Concept: Telecommunications Networks




Mastery


100%


Questions


·        
1
·        
2
·        
3




Materials on the concept


  • Review Summary

  • 6.1. Telecommunications and Networking in Today’s Business World

  • Physical Transmission Media

  • 6.4. The Wireless Revolution





1.

What are the principal components of a telecommunications network?

·        
A.

Computers, client–server devices, and smart phones

·        
B.

Voice or data computers, network interfaces, and transmission
medium

·        
C.

Modems, transmission links, and wireless access points

·        
D.

TCP/IP software, modems, and transmission links





2.

What are the key technologies used in today’s telecommunications
networks?

·        
A.

The increased use of the Internet, circuit switching, and fiber
optics

·        
B.

The increased use of smart phones, wi-fi, and metro Ethernet

·        
C.

Metro Ethernet, wi-fi, and cloud computing

·        
D.

Packet switching; voice, data, and video networks; and TCP/IP





3.

What transmission media are used in most telecommunications
networks?

·        
A.

DSL lines, wi-fi, fiber optic cable, and telephone lines

·        
B.

LANs, MANs, and WANs

·        
C.

Fiber optic cable, coaxial copper cable, and twisted-pair copper
cable

·        
D.

Ethernet, TCP/IP, and wi-fi



Concept: Networking Technologies




Mastery


100%


Questions


·        
4
·        
5
·        
6




Materials on the concept


  • Technology

  • Review Summary

  • 6.1. Telecommunications and Networking in Today’s Business World

  • Physical Transmission Media

  • 6.4. The Wireless Revolution





4.

What are the principal components of a data communications
network?

·        
A.

Physical devices, transmission links, and software

·        
B.

TCP/IP software, modems, and transmission links

·        
C.

Modems, transmission links, and wireless access points

·        
D.

Mainframe computers, client/server devices, and smart phones





5.

What are the key technologies used in contemporary data
communications networks?

·        
A.

The Internet, circuit switching, and fiber optics

·        
B.

Client/server computing, packet switching, and the TCP/IP protocol

·        
C.

Metro Ethernet, wi-fi, and cloud computing

·        
D.

Smart phones, wi-fi, and metro Ethernet protocol





6.

What transmission media are used in data communications networks?

·        
A.

DSL lines, wi-fi, and fiber optic cable

·        
B.

LANs, MANs, and WANs

·        
C.

Wireless, fiber optic cable, and twisted-pair copper cable

·        
D.

Ethernet, TCP/IP, and wi-fi



Concept: The Internet




Mastery


100%


Questions


·        
7
·        
8
·        
9




Materials on the concept


  • 6.3. The Global Internet

  • Internet Services and Communication Tools

  • Internet Services

  • Telecommunications, the Internet, and Wireless Technology

  • 6.1. Telecommunications and Networking in Today’s Business World





7.

How does the Internet operate?

·        
A.

The Internet uses unique addresses to identify computers, enabling
them to exchange data on a global basis.

·        
B.

The World Wide Web enables the Internet to determine where
searches should be performed on a global basis.

·        
C.

The world’s largest and most widely used network, the Internet,
uses address permissions to connect functions.

·        
D.

The Internet uses the client/server model and the TCP/IP to
deliver connectivity





8.

What Internet-based services are used by most people today?

·        
A.

E-mail, newsgroups, instant messaging, file transfer, and
accessing web pages

·        
B.

E-mail, voice over IP, bandwidth, and video conferencing

·        
C.

E-mail, Ethernet, interactive video, and video over IP

·        
D.

E-mail, TCP/IP links and accessing web pages, ME, and back-end
systems





9.

Which of the following best represents how Internet technology
helps a company operate?

·        
A.

A company’s website creates and communicates with the business.

·        
B.

Customers communicate about a company’s products from its website.

·        
C.

The Internet communicates with a company to establish a
professional image.

·        
D.

The Internet helps a company communicate with its customers,
suppliers, and employees



Concept: Wireless Technologies




Mastery


100%


Questions


·        
10
·        
11
·        
12




Materials on the concept


  • Wireless Computer Networks and Internet Access

  • Review Summary

  • RFID and Wireless Sensor Networks

  • Radio Frequency Identification (RFID)

  • Bluetooth





10.

What are the leading standards for wireless computer networks?

·        
A.

Bluetooth, wi-fi, and GSM

·        
B.

Bluetooth, wi-fi, and 3G

·        
C.

Bluetooth, wi-fi, and WiMax

·        
D.

Bluetooth, wi-fi, and 4G





11.

How can radio frequency identification (RFID) technology be used
to improve inventory control and distribution operations?

·        
A.

RFID tracks the shipments of goods while in transit.

·        
B.

RFID helps a company see where sales are greatest for each item in
inventory.

·        
C.

RFID helps a company see what stock is stored in warehouses or on
retail store shelves.

·        
D.

RFID tracks where customers are buying specific products





12.

How is Bluetooth (802.15) wireless communications technology
typically used today?

·        
A.

Technology automatically pairs devices whenever they are docked
near another Bluetooth station.

·        
B.

Wireless devices communicate with each other and can operate
without user intervention.

·        
C.

Wireless devices provide compatibility among all power outlet
devices.

·        
D.

Wireless devices support a robust quality-of-service featuring
both voice and data



Concept: Cellular Technologies




Mastery


100%


Questions


·        
13
·        
14
·        
15




Materials on the concept


  • Cellular Systems

  • 6.4. The Wireless Revolution





13.

What are the advantages of code division multiple access (CDMA)
cellular technology versus global systems for mobile communication (GSM)?

·        
A.

CDMA is less expensive to build, more efficient in its use of
bandwidth and provides higher throughput.

·        
B.

CDMA is the technology used by the largest carriers including
Verizon and T-Mobile and it minimizes roaming costs when connecting to a
different carrier.

·        
C.

CDMA is more expensive to build but it offers support for
simultaneous voice and data.

·        
D.

CDMA supports international roaming and a better web browsing
experience





14.

What is the primary advantage of 4G cellular networks versus 3G
cellular networks?

·        
A.

Simultaneous voice and data

·        
B.

Location–based services

·        
C.

Speed of data transmission

·        
D.

Web-browsing including video





15.

What is the primary advantage of GSM when considering the purchase
of a cell phone or smart phone?

·        
A.

Support for voice and data communications

·        
B.

The SIM card to activate a new device

·        
C.

Efficient use of wireless spectrum

·        
D.

International roaming capability



 

 

 

IT 205 Week 4 CheckPoint New System
Proposal

Begin working on your presentation.

Submit an
outline of the presentationthat includes the following: 


  • A full description of the new
    system, a description of its components, and the benefit it will provide
    to Riordan

  • A discussion of the business
    requirements driving the need for the system

  • A discussion of the information
    used in the system



A discussion of any information security and ethical concerns
with the system

Note: Riordan Manufacturing is one of the Virtual Ogranizations.
Please see the link under Academic Resources.

 

 

IT 205 Week 4 Assignment Information
Use Paper

Write a
700- to 1,050-word paper identifying and describing how information is used and
how it flows in an organization.

Explain this
use in your current place of employment or an organization you are familiar
with.

Describe concerns with properly controlling this flow, including
keeping it safe from unauthorized use.

 

 

IT 205 Week 5 Week Five Knowledge Check

Week 5 Knowledge Check

The material presented
below is not meant to be a comprehensive list of all you need to know in the
content area. Rather it is a starting point for building your knowledge and
skills. Additional study materials are recommended in each area below to help
you master the material.

Personalized Study Guide Results 

Score
21 / 21






Concepts


Mastery


Questions





Ethical
Issues


100%


·        
1
·        
2
·        
3




Social and
Political Issues


100%


·        
4
·        
5
·        
6




Moral
Dimensions


100%


·        
7
·        
8
·        
9




Security


100%


·        
10
·        
11
·        
12




Control


100%


·        
13
·        
14
·        
15




Firewalls


100%


·        
16
·        
17
·        
18




Access
Control


100%


·        
19
·        
20
·        
21




Concept: Ethical Issues




Mastery


100%


Questions


·        
1
·        
2
·        
3




Materials on the concept


  • Basic Concepts: Responsibility, Accountability, and Liability

  • 12.2. Ethics in an Information Society

  • Five Moral Dimensions of the Information Age

  • System Quality: Data Quality and System Errors





1.

The feature of social institutions that means mechanisms are in
place to determine responsibility for an action is called

·        
A.

due process

·        
B.

accountability

·        
C.

liability

·        
D.

analysis





2.

In the information age, the obligations that individuals and
organizations have concerning rights to intellectual property fall within which
moral dimension?

·        
A.

Property rights and obligations

·        
B.

System quality

·        
C.

Accountability and control

·        
D.

Information rights and obligations





3.

What is the most common source of business system failure?

·        
A.

Software bugs

·        
B.

Software errors

·        
C.

Data quality

·        
D.

Hardware or facilities failures



Concept: Social and Political Issues




Mastery


100%


Questions


·        
4
·        
5
·        
6




Materials on the concept


  • Basic Concepts: Responsibility, Accountability, and Liability

  • Key Technology Trends that Raise Ethical Issues

  • A Model for Thinking About Ethical, Social, and Political Issues





4.

The feature of political systems in which a body of laws is in
place that permits individuals to recover damages done to them by other actors,
systems, or organizations is referred to as what feature?

·        
A.

Accountability

·        
B.

Responsibility

·        
C.

Liability

·        
D.

Due process





5.

What is NORA?

·        
A.

Profiling technology used by the EU

·        
B.

Federal privacy law protecting networked data

·        
C.

Data analysis technology that finds hidden connections between
data in disparate sources

·        
D.

Guideline adopted in 1987 mandating stiff sentences on business
executives





6.

Which term describes the use of computers to combine data from
multiple sources and create electronic dossiers of detailed information on
individuals?

·        
A.

Phishing

·        
B.

Spamming

·        
C.

Targeting

·        
D.

Profiling



Concept: Moral Dimensions




Mastery


100%


Questions


·        
7
·        
8
·        
9




Materials on the concept


  • Internet Challenges to Privacy

  • Technical Solutions

  • Ethical Analysis





7.

When a cookie is created during a website visit, where is it
stored?

·        
A.

On the website computer

·        
B.

On the visitor’s computer

·        
C.

On the ISP’s computer

·        
D.

In a web directory





8.

What is the main concern of the P3P standard?

·        
A.

Controlling pop-up ads

·        
B.

Allowing users to surf the web

·        
C.

Scrambling data

·        
D.

Blocking or limiting cookies





9.

Which of the five steps of an ethical analysis recommended in the
text identifies individuals who have a vested interest in the situation?

·        
A.

Identify and clearly describe the facts.

·        
B.

Identify the stakeholders.

·        
C.

Identify options you can reasonably take.

·        
D.

Identify potential consequences of your actions



Concept: Security




Mastery


100%


Questions


·        
10
·        
11
·        
12




Materials on the concept


  • 7.1. System Vulnerability and Abuse

  • Internet Vulnerabilities

  • Internal Threats: Employees





10.

Which of the following refers to policies, procedures, and
technical measures used to prevent unauthorized access, alternation, theft, or
physical damage to information systems?

·        
A.

Security

·        
B.

Controls

·        
C.

Benchmarking

·        
D.

Algorithms





11.

The Internet poses specific security problems because of which
reason?

·        
A.

It changes so rapidly.

·        
B.

Internet standards are universal.

·        
C.

Internet data is not run over secure lines.

·        
D.

It was designed to be easily accessible





12.

You have been hired as a security consultant for a law firm. Which
of the following constitutes the greatest source of security threats to the
firm?

·        
A.

Wireless network

·        
B.

Employees

·        
C.

Authentication procedures

·        
D.

Lack of data encryption



Concept: Control




Mastery


100%


Questions


·        
13
·        
14
·        
15




Materials on the concept


  • Information Systems Controls

  • Identity Theft





13.

Which one of the following analyses of an information system
identifies potential security issues as well as their associated costs?

·        
A.

Security policy audit

·        
B.

AUP

·        
C.

Risk assessment

·        
D.

Business impact analysis





14.

What types of controls ensure that valuable business data files on
either disk or tape are not subject to unauthorized access, change, or
destruction while they are in use or storage?

·        
A.

Software

·        
B.

Administrative

·        
C.

Data security

·        
D.

Implementation





15.

Which of the following types of controls are considered
application controls?

·        
A.

Design, security, and organization controls

·        
B.

Application, hardware, and environment controls

·        
C.

Input, processing and output controls

·        
D.

Software, computer operation, and implementation controls



Concept: Firewalls




Mastery


100%


Questions


·        
16
·        
17
·        
1




Materials on the concept


  • Firewalls, Intrusion Detection Systems, and Antivirus Software

  • 7.4. Technologies and Tools for Protecting Information Resources





16.

Why does a business install a firewall?

·        
A.

To enforce a security policy on traffic between its network and
the Internet

·        
B.

To check the accuracy of all transactions between its network and
the Internet.

·        
C.

To create an enterprise system for business on the Internet.

·        
D.

To check the content of all incoming and out-going e-mail messages





17.

Which technology uses scanning software to look for known problems
such as bad passwords, the removal of important files, security attacks in
progress, and system administration errors?

·        
A.

Stateful inspections

·        
B.

Intrusion detection systems

·        
C.

Application proxy filtering technologies

·        
D.

Packet filtering technologies





18.

Which technique analyzes network communications to see whether packets
are part of an ongoing dialogue between a sender and a receiver?

·        
A.

Stateful inspection

·        
B.

Intrusion detection system

·        
C.

Application proxy filtering

·        
D.

Packet filtering



Concept: Access Control




Mastery


100%


Questions


·        
19
·        
20
·        
21




Materials on the concept


  • Encryption and Public Key Infrastructure

  • Antivirus and Antispyware Software





19.

The current protocols that are used for secure transfer over the
Internet are SSL, TLS, and what other protocol?

·        
A.

TCP/IP

·        
B.

CA

·        
C.

HTTP

·        
D.

S-HTTP





20.

What is the purpose of a digital certificate system?

·        
A.

Validate a user’s identity by using a third-party certificate
authority (CA).

·        
B.

Validate a user’s identity using digital signatures.

·        
C.

Use computer tokens to validate a user’s identity.

·        
D.

It is used by individuals for personal correspondence





21.

Which of the following is antivirus software effective against?

·        
A.

Only those viruses active on the Internet and through e-mail

·        
B.

Any and all viruses on a PC

·        
C.

Only those viruses already known when the software is written

·        
D.

Any virus except those in wireless communications applications



 

 

 

IT 205 Week 5 CheckPoint New System
Proposal

Continue working
on your proposal.

Develop the
flow diagram of the information and any control elements needed to ensure
proper access for the information.

Submit a
700- to 1,050-word section of the paper with the following elements:

 


  • A diagram of the information flow
    and any elements controlling proper access to the information it uses

  • A description of any proposed
    business process changes for the system along with flow diagrams



A specific discussion on any Internet and mobile access
components of the system

 

 

IT 205 Week 6 Week Six Knowledge Check

Week 6 Knowledge Check

The material presented
below is not meant to be a comprehensive list of all you need to know in the
content area. Rather it is a starting point for building your knowledge and
skills. Additional study materials are recommended in each area below to help
you master the material.

Personalized Study Guide Results 

Score
12 / 12






Concepts


Mastery


Questions





Managing Data


100%


·        
1
·        
2
·        
3




Data Quality


100%


·        
4
·        
5
·        
6




Customer
Intimacy


100%


·        
7
·        
8
·        
9




Enterprise
Systems


100%


·        
10
·        
11
·        
12




Concept: Managing Data




Mastery


100%


Questions


·        
1
·        
2
·        
3




Materials on the concept


  • Enterprise Application Challenges

  • Operational and Analytical CRM

  • Supply Chain Management Software





1.

What do CRM systems typically require to overcome challenges with
information?

·        
A.

Organization-wide definitions

·        
B.

Data cleansing work

·        
C.

Information technology resources

·        
D.

Hardware





2.

What are analytical CRMs based on?

·        
A.

SQL database

·        
B.

Oracle database

·        
C.

Data warehouse

·        
D.

ERMs





3.

What type of system will allow an organization to track and manage
inventories at efficient and effective levels, helping them to lower costs and
improve availability of products for customers?

·        
A.

Employee relationship management

·        
B.

Customer resource management

·        
C.

Cloud computing

·        
D.

Supply chain management



Concept: Data Quality




Mastery


100%


Questions


·        
4
·        
5
·        
6




Materials on the concept


  • Supply Chain Management Software

  • Enterprise Application Challenges





4.

To model its existing supply chain and make better decisions about
managing inventory, a firm would implement the type of SCM called supply chain
________ systems.

·        
A.

planning

·        
B.

decision

·        
C.

inventory

·        
D.

organizing





5.

What might each participant using supply chain management systems
do to ensure data quality?

·        
A.

Enforce existing processes and how they are used.

·        
B.

Align goals across other departments.

·        
C.

Change processes and the way it uses information.

·        
D.

Enter timely information accurately





6.

Enterprise applications are based on an organization-wide
definition of what?

·        
A.

Funding

·        
B.

Management

·        
C.

Data

·        
D.

Work



Concept: Customer Intimacy




Mastery


100%


Questions


·        
7
·        
8
·        
9




Materials on the concept


  • What is Customer Relationship Management?

  • Global E-business and Collaboration

  • Customer Relationship Management Software





7.

What type of enterprise application helps an organization know who
their customers are, how to contact them, and what products and services they
use?

·        
A.

Supply chain management

·        
B.

Learning management software

·        
C.

Human Resource management

·        
D.

Customer relationship management





8.

What module uses much of the same data, tools, and systems as CRM
to enhance collaboration between a company and its selling partners?

·        
A.

Partner relationship management (PRM)

·        
B.

Sales force automation (SFA)

·        
C.

Employee relationship management (ERM)

·        
D.

Supply chain management (SCM)





9.

Which module within a CRM helps organizations increase
productivity and improve sales with their customers?

·        
A.

Marketing

·        
B.

Customer service

·        
C.

Human Resource

·        
D.

Sales force automation



Concept: Enterprise Systems




Mastery


100%


Questions


·        
10
·        
11
·        
12




Materials on the concept


  • What are Enterprise Systems?

  • Enterprise Software

  • 8.4. Enterprise Applications: New Opportunities and Challenges

  • Business Value of Enterprise Systems





10.

What systems help an organization understand what is happening
within their business as a whole?

·        
A.

Integrated systems

·        
B.

Sales and marketing systems

·        
C.

Finance and accounting systems

·        
D.

Individual enterprise systems





11.

Sales and marketing and manufacturing and production are two of
the business processes supported by enterprise systems. What are the other two?

·        
A.

Information technology and manufacturing and production

·        
B.

Manufacturing and production and technical support

·        
C.

Human Resources and finance and accounting

·        
D.

Human capital management and customer relationship management





12.

What is a benefit enterprise systems offer organizations that will
improve their customer’s experiences?

·        
A.

Improves employee satisfaction

·        
B.

Introduces more standalone systems

·        
C.

Reduces customer support calls

·        
D.

Rapid response to customers



 

 

IT 205 Week 6 Checkpoint New System
Proposal

Continue working
on your proposal.

Develop the
flow diagram of the information and any control elements needed to ensure
proper access for the information.

Submit a
draft PowerPoint presentation with the following elements:


  • A diagram of the information flow
    and any elements controlling proper access to the information it uses

  • A description of any proposed
    business process changes for the system along with flow diagrams



A specific discussion on any Internet and mobile access
components of the system

 

 

IT 205 Week 6 Assignment Web or Mobile
System Paper

Write a
700- to 1,050-word paper on a specific web or mobile application.

Describe a specific web or
mobile application'spurpose. How is it used? What changes has it brought about
to its users? What are some likely future uses and enhancements?

 

 

IT 205 Week 7 Week Seven Knowledge
Check

Week 7 Knowledge Check

The material presented
below is not meant to be a comprehensive list of all you need to know in the
content area. Rather it is a starting point for building your knowledge and
skills. Additional study materials are recommended in each area below to help
you master the material.

Personalized Study Guide Results 

Score
15/ 15






Concepts


Mastery


Questions





E-Commerce


100%


·        
1
·        
2
·        
3




Digital Goods


100%


·        
4
·        
5
·        
6




Consumer-to-Consumer


100%


·        
7
·        
8
·        
9




Business-to-Business


100%


·        
10
·        
11
·        
12




Business-to-Consumer


100%


·        
13
·        
14
·        
15




Concept: E-Commerce




Mastery


100%


Questions


·        
1
·        
2
·        
3




Materials on the concept


  • E-commerce Today

  • Why E-commerce is Different

  • 9.1. E-commerce and the Internet





1.

Through what channel did e-commerce first evolve?

·        
A.

Online advertising sales

·        
B.

Internet portals

·        
C.

Online book sales

·        
D.

Internet service providers





2.

A marketplace extended beyond traditional boundaries and removed
from a temporal and geographic location is called a(n)

·        
A.

exchange

·        
B.

market space

·        
C.

online marketplace

·        
D.

e-hub





3.

What does information density refer to?

·        
A.

The richness–complexity and content–of a message

·        
B.

The total amount and quantity of information delivered to
consumers by merchants

·        
C.

The total amount and quantity of information available to all
market participants

·        
D.

The amount of information available to reduce price transparency



Concept: Digital Goods




Mastery


100%


Questions


·        
4
·        
5
·        
6




Materials on the concept


  • Key Concepts in E-Commerce: Digital Markets and Digital Goods in a
    Global Marketplace

  • Review Summary

  • E-commerce: Digital Markets, Digital Goods





4.

What is one difference between digital markets, traditional
markets?

·        
A.

Lower search costs

·        
B.

Stronger network effects

·        
C.

Higher delayed gratification effects

·        
D.

Higher transaction costs





5.

What does it mean to reduce the business process layers in a
distribution channel?

·        
A.

Disintermediation

·        
B.

BPR

·        
C.

Market segmentation

·        
D.

Network effects





6.

What is one reason that businesses, such as bookstores and book
publishers face the possibility of declining sales and even destruction of
their businesses?

·        
A.

Publishers passing the high cost of printing on to the consumer

·        
B.

High costs of selling their products over the Internet

·        
C.

High overhead costs due to the economy

·        
D.

Losing sales to digital goods and services



Concept: Consumer-to-Consumer




Mastery


100%


Questions


·        
7
·        
8
·        
9




Materials on the concept


  • Types of E-Commerce

  • E-commerce Business Models





7.

What kind of commerce is eBay is an example of?

·        
A.

C2C e-commerce

·        
B.

B2B e-commerce

·        
C.

B2C e-commerce

·        
D.

M-commerce





8.

Which of the following best describes consumers selling goods and
services electronically to other consumers?

·        
A.

E-commerce

·        
B.

C2C e-commerce

·        
C.

M-commerce

·        
D.

B2C e-commerce





9.

What type of business model are market creators associated with?

·        
A.

C2C e-commerce

·        
B.

M-commerce

·        
C.

B2C e-commerce

·        
D.

B2B e-commerce



Concept: Business-to-Business




Mastery


100%


Questions


·        
10
·        
11
·        
12




Materials on the concept


  • B2B E-commerce: New Efficiencies and Relationships

  • 9.2. E-commerce: Business and Technology

  • Types of E-Commerce





10.

Most of the online B2B commercial transactions that occur among
business firms is based on

·        
A.

credit card payment systems

·        
B.

accumulated balance digital payment systems

·        
C.

electronic data interchange

·        
D.

stored value payment systems





11.

What did EDI originally automate the exchange of?

·        
A.

funds

·        
B.

information

·        
C.

products

·        
D.

documents





12.

An extranet that links a large firm to its suppliers and other key
business partners is called a(n)

·        
A.

e-hub

·        
B.

marketspace

·        
C.

exchange

·        
D.

private industrial network



Concept: Business-to-Consumer




Mastery


100%


Questions


·        
13
·        
14
·        
15




Materials on the concept


  • Types of E-Commerce

  • E-commerce Business Models

  • 9.2. E-commerce: Business and Technology

  • E-Commerce Revenue Models





13.

Selling products and services directly to individual consumers via
the Internet best describes

·        
A.

B2B e-commerce

·        
B.

C2C e-commerce

·        
C.

M-commerce

·        
D.

B2C e-commerce





14.

Which type of e-commerce business model is most closely associated
with business-to-consumer (B2C)?

·        
A.

Portal

·        
B.

E-tailer

·        
C.

Content provider

·        
D.

Community provider





15.

Which type of e-commerce revenue model is most closely associated
with business-to-consumer (B2C)?

·        
A.

Advertising revenue model

·        
B.

Sales revenue model

·        
C.

Free or premium model

·        
D.

Affiliate revenue model



 

 

IT 205 Week 8 Week Eight: Knowledge
Check

Week 8 Knowledge Check

The material presented
below is not meant to be a comprehensive list of all you need to know in the
content area. Rather it is a starting point for building your knowledge and
skills. Additional study materials are recommended in each area below to help
you master the material.

Personalized Study Guide Results 

Score
18 / 18






Concepts


Mastery


Questions





Development
Methodologies


100%


·        
1
·        
2
·        
3




Systems
Development Life Cycle (SDLC)


100%


·        
4
·        
5
·        
6




Prototyping


100%


·        
7
·        
8
·        
9




Project
Planning and Management


100%


·        
10
·        
11
·        
12




Portfolio
Analysis


100%


·        
13
·        
14
·        
15




Problem-Solving
Steps/Analysis


100%


·        
16
·        
17
·        
18




Concept: Development Methodologies




Mastery


100%


Questions


·        
1
·        
2
·        
3




Materials on the concept


  • End-User Development

  • Computer-Aided Software Engineering (CASE)





1.

What can happen when systems are created rapidly, without a formal
development methodology?

·        
A.

End users can take over the work of IT specialists.

·        
B.

The organization quickly outgrows the new system.

·        
C.

Hardware, software, and quality standards are less important.

·        
D.

Testing and documentation may be inadequate





2.

What provides software tools to automate development methodologies
and reduce the amount of repetitive work in systems development?

·        
A.

CASE

·        
B.

JAD

·        
C.

RAD

·        
D.

CAD





3.

Why can fourth-generation tools not replace conventional
development tools?

·        
A.

They are not designed to integrate with legacy systems.

·        
B.

They do not incorporate methods for documentation.

·        
C.

They do not incorporate methods for testing.

·        
D.

They cannot handle large numbers of transactions or extensive
procedural logic



Concept: Systems Development Life Cycle (SDLC)




Mastery


100%


Questions


·        
4
·        
5
·        
6




Materials on the concept


  • Traditional Systems Development Lifecycle





4.

Which is the first step in the systems development lifecycle
(SDLC)?

·        
A.

Systems Analysis

·        
B.

Programming

·        
C.

System Design

·        
D.

Conversion



l approach. Why is that?

·        
A.

All tasks in each stage are done at the same time.

·        
B.

At least one person works on each stage at any given time.

·        
C.

Tasks in one stage must be complete before work for the next stage
begins.

·        
D.

Most of the projects using SDLC have failed and fallen off a
cliff, much as water does in a waterfall



6.

What work are end users limited to in the systems development
lifecycle (SDLC)?

·        
A.

Providing low level system performance requirements and reviewing
the technical staff's work

·        
B.

Providing GUI requirements and GUI mockups

·        
C.

Creating the system’s database back-end

·        
D.

Providing information requirements and reviewing the technical
staff's work



Concept: Prototyping




Mastery


100%


Questions


·        
7
·        
8
·        
9




Materials on the concept


  • 11.2. Alternative Systems-Building Approaches

  • Prototyping





7.

You are an IT project manager for an advertising firm. The firm
wishes to create an online survey tool that will be used to survey focus group
reactions to products in development. The most important consideration for the
firm is being able to offer the tool as soon as possible as a new corporate
service. However, you know that many of the senior managers that are business
owners of this project have difficulty in understanding technical or software
development issues, and are likely to change their requirements during the
course of development. What development method would be most successful for
this project?

·        
A.

Prototyping

·        
B.

JAD

·        
C.

End-user development

·        
D.

RAD





8.

As a technical project manager, you have decided to propose
implementing a prototyping methodology for a small web-based design project.
Identifying the user requirements and developing the prototype are the first
two steps you will follow. What are the last two steps you will follow in this
project?

·        
A.

First redevelop the prototype and then define the requirements.

·        
B.

Use the prototype and revise and enhance the prototype.

·        
C.

Redefine the requirements several times and then redevelop the
prototype.

·        
D.

Require the designers to use and implement the prototype multiple
times





9.

What is the preliminary working version of an information system?

·        
A.

JAD

·        
B.

Prototype

·        
C.

Application software package

·        
D.

SDLC



Concept: Project Planning and Management




Mastery


100%


Questions


·        
10
·        
11
·        
12




Materials on the concept


  • End-User Development

  • Project Management Objectives

  • Review Summary

  • Selecting Projects: Making The Business Case for a New System





10.

How can management control end-user development?

·        
A.

By requiring Gantt charts

·        
B.

By requiring justification for end-user projects

·        
C.

By establishing standards for project requirements

·        
D.

By developing a formal development methodology





11.

What refers to the application of knowledge, skills, tools, and
techniques to achieve specific targets within specified budget and time constraints?

·        
A.

Systems analysis

·        
B.

Project management

·        
C.

Project implementation

·        
D.

Systems design





12.

What is a business document indicating the direction of systems
development, the rationale, the current systems, new developments to consider,
the management strategy, the implementation plan, and the budget called?

·        
A.

Project plan

·        
B.

Information systems plan

·        
C.

Mission statement

·        
D.

Request for proposal



Concept: Portfolio Analysis




Mastery


100%


Questions


·        
13
·        
14
·        
15




Materials on the concept


  • Portfolio Analysis and Scoring Models





13.

Which process is used to develop risk profiles for a firm's
information system projects and assets?

·        
A.

Information systems plan

·        
B.

Scoring model

·        
C.

Portfolio analysis

·        
D.

Feasibility study





14.

You have been hired by a pharmaceutical company to evaluate its
portfolio of systems and IT projects. Which types of projects would be best
avoided?

·        
A.

Any high risk projects

·        
B.

Any low-benefit projects

·        
C.

None, any project might be beneficial

·        
D.

High-risk, low benefit projects





15.

Which projects identified in portfolio analysis should be
implemented as soon as possible?

·        
A.

Low-risk, high benefit projects

·        
B.

Low-risk, low benefit projects

·        
C.

Projects using databases

·        
D.

E-commerce projects



Concept: Problem-Solving Steps/Analysis




Mastery


100%


Questions


·        
16
·        
17
·        
18




Materials on the concept


  • 11.1. Problem Solving and Systems Development

  • Defining and Understanding the Problem

  • Evaluating and Choosing Solutions





16.

Developing an information system has been compared to the
problem-solving process. “Define and understand the problem” and “Develop
alternative solutions” are the first two steps of systems analysis. What are
the remaining two steps?

·        
A.

“Choose the best solution” and “Implement the solution”

·        
B.

“Develop alternative problems” and “Choose the best solution”

·        
C.

“Choose the best solution” and “Identify causes”

·        
D.

“Define alternate problems” and “Evaluate alternate solutions”





17.

According to Laudon and Laudon (2011), when defining a newly
discovered problem, what common questions should you ask?

·        
A.

Why is the problem still around? Why wasn’t it solved long ago? Is
it really a problem?

·        
B.

What caused the problem? Who should be held responsible for this
problem? Why wasn’t it solved long ago?

·        
C.

What caused the problem? Why is it still around? Who should be
held responsible for this problem?

·        
D.

What caused the problem? Why is it still around? Why wasn’t it
solved long ago?





18.

Which study is used to determine whether the solution is
achievable from a financial, technical, and organizational standpoint?

·        
A.

Ubiquity study

·        
B.

Durability study

·        
C.

Feasibility study

·        
D.

Achievability study



 

 

IT 205 Week 8 Assignment System
Evaluation Paper

Write a
700- to 1,050-word paper identifying and describing how specific system used in
an organization has transformed how the organization operates.

Discuss how
the business requirements drove the system's initial development.

Describe the
type and basic uses of the system, how the system has helped the organization,
and any likely future development plans.

Note. This cannot be
the same as the system discussed in Week 3. This system must be used in your
current place of employment or an organization you are familiar with.

 

 

IT 205 Week 9 Week Nine: Knowledge
Check

Week 9 Knowledge Check

The material presented
below is not meant to be a comprehensive list of all you need to know in the
content area. Rather it is a starting point for building your knowledge and
skills. Additional study materials are recommended in each area below to help
you master the material.

Personalized Study Guide Results 

Score
7 / 7






Concepts


Mastery


Questions





Customer Intimacy


100%


·        
1




Business
Intelligence


100%


·        
2




Social and
Political Issues


100%


·        
3




Problem-Solving
Steps/Analysis


100%


·        
4




Security


100%


·        
5




Customer
Relationship Management (CRM) Systems


100%


·        
6




Relationships
Between Components


100%


·        
7




Concept: Customer Intimacy




Mastery


100%


Questions


·        
1




Materials on the concept


  • Customer Relationship Management Software





1.

What module deals with issues such as setting objectives, employee
performance management, and performance-based compensation?

·        
A.

SCM

·        
B.

SFA

·        
C.

ERM

·        
D.

PRM



Concept: Business Intelligence




Mastery


100%


Questions


·        
2




Materials on the concept


  • Data Warehouses

  • Data Marts





2.

What is an advantage of using a data mart as opposed to a data
warehouse?

·        
A.

A data mart serves an entire organization whereas a data warehouse
serves a smaller portion of an organization.

·        
B.

A data mart uses a web interface for easy, central access.

·        
C.

A data mart extracts current and historical information whereas a
data warehouse only extracts historical information.

·        
D.

A data mart can typically be constructed more rapidly and at lower
cost than a data warehouse



Concept: Social and Political Issues




Mastery


100%


Questions


·        
3




Materials on the concept


  • Information Rights: Privacy and Freedom in the Internet Age





3.

Which of the following U.S. laws gives patients access to personal
medical records and the right to authorize how this information can be used or
disclosed?

·        
A.

HIPAA

·        
B.

Gramm-Leach-Bliley Act

·        
C.

Privacy Protection Act

·        
D.

Freedom of Information Act



Concept: Problem-Solving Steps/Analysis




Mastery


100%


Questions


·        
4




Materials on the concept


  • Implementing the Solution





4.

What does a systems design do when implementing the solution?

·        
A.

Identifies the system's information requirements

·        
B.

Identifies alternate solutions for solving the problem

·        
C.

Defines the problem and specifies its causes

·        
D.

Specifies how the new system will fulfill the information
requirements



Concept: Security




Mastery


100%


Questions


·        
5




Materials on the concept


  • Internal Threats: Employees





5.

What is the method of tricking employees to reveal their passwords
by pretending to be a legitimate member of a company called?

·        
A.

Company filtering

·        
B.

Social engineering

·        
C.

Company phishing

·        
D.

Social pharming



Concept: Customer Relationship Management (CRM) Systems




Mastery


100%


Questions


·        
6




Materials on the concept


  • Infrastructure Components

  • Data Management Technology





6.

Software that organizes, manages, and processes business data,
such as data concerned with inventory, customers, and vendors, is called

·        
A.

system software

·        
B.

application software

·        
C.

data management software

·        
D.

network software



Concept: Relationships Between Components




Mastery


100%


Questions


·        
7




Materials on the concept


  • Technology

  • Dimensions of Information Systems





7.

What do organizations use to access their internal information?

·        
A.

URLs on the Internet

·        
B.

Sites on the World Wide Web

·        
C.

Extranets

·        
D.

Intranets



 

 

IT 205 Week 9 Assignment New System
Proposal Presentation

Finalize work
on the Microsoft® PowerPoint® slide presentation, updating it with
new information based on all previous feedback. Include 10 to 12 slides with
speaker notes.


  • A high-level discussion of how
    the system should be acquired and maintained

  • A discussion of the strategic
    role the system will play in the company

  • An executive summary of the
    project, succinctly summarizing the rest of the material in the paper

  • Four to six references



Present the completed presentation.

 

 
Powered by