Unit I Assessment
Question 1
4 out of 4 points
|
A group of components that interact to produce information is
called:
|
|||||||||
|
|||||||||
Question 2
4 out of 4 points
|
Mark follows certain steps to access the supplementary readings
for a course when using his organization's library management system. These
steps that he follows are examples of the ____________ component of an
information system.
|
|||||||
|
|||||||
Question 3
4 out of 4 points
|
When presenting an idea to his colleagues, Marcus failed to
consider others' views and got defensive when people asked him questions.
This situation indicates that Marcus lacks ____________ skills.
|
|||||||
|
|||||||
Question 4
4 out of 4 points
|
Which of the following is a major implication of Moore's Law?
|
|||||||
|
|||||||
Question 5
4 out of 4 points
|
Because of this law, the cost of data processing, communications,
and storage is essentially zero.
|
|||||||
|
|||||||
Question 6
Name the five data characteristics, and provide a short explanation
for each of the data characteristics. Your response should be at least
200 words in length.
Question 7
State Moore's Law. What is the implication of Moore's Law for
managers? Your response should be at least 200 words in length.
Unit I Scholarly Activity
Components of an Information System
In this one- to two-page (250-500 word) paper, you will discuss
each of the different components of an information system, and then explain how
you can use the five-component model to guide your learning and thinking about
information systems. You may use the Unit Lesson, Chapter Readings, Suggested
Readings, Learning Activities, and outside resources to aid in your research.
Include the following in your paper:
· Define each
component of an information system.
· Define how
you can use the five-component model to guide your learning and thinking about
information systems. Include at least one outside research item in your paper.
Use APA format and cite your sources.
Unit II Assessment
Question 1
4 out of 4 points
|
A(n) ____________ is a network of activities that generate value
by transforming inputs into outputs.
|
|||||||
|
|||||||
Question 2
4 out of 4 points
|
What are the four primary purposes of collaboration?
|
|||||||
|
|||||||
Question 3
4 out of 4 points
|
According to Porter's model of business activities, interactions
across value chain activities are called ____________ .
|
|||||||
|
|||||||
Question 4
4 out of 4 points
|
Which of the following value chain activities involves inducing
buyers to purchase a product and providing a means for them to do so?
|
|||||||
|
|||||||
Question 5
4 out of 4 points
|
Which of the following is NOT a part of the five components of an
information system for collaboration?
|
|||||||
|
|||||||
Question 6
Describe the process by which organizations develop their
information systems. Your response should be at least 200 words in
length.
Question 7
Explain the process implementation competitive strategies. Use
examples as needed. Your response should be at least 200 words in length.
Unit II Case Study
Competitive Strategy Over the Web Assignment
In this case study, you will research an organization and determine
how their business strategy differentiates them from other organizations in the
same industry using Porter’s four competitive strategies model (p. 85).
Write a one- to two-page (250-500-word) paper to include the
following:
· A brief
explanation of Porter's four competitive strategies.
· A brief
explanation of how competitive strategy determines value chain structure.
· Identify and
discuss the competitive strategy that the organization you researched utilizes
in order to differentiate them from other organizations in the same industry.
APA rules for formatting, quoting, paraphrasing, citing, and
listing of sources are to be followed.
Unit III Assessment
Question 1
4 out of 4 points
|
Which of the following statements is true of closed source
projects?
|
|||||||
|
|||||||
Question 2
4 out of 4 points
|
Which of the following refers to a small, portable storage device
that can be used to back up data and to transfer it from one computer to
another?
|
|||||||
|
|||||||
Question 3
4 out of 4 points
|
A ____________ is a collection of forms, reports, queries, and
programs that serves as an intermediary between users and database data.
|
|||||||
|
|||||||
Question 4
4 out of 4 points
|
A database is required instead of a spreadsheet when ____________
.
|
|||||||
|
|||||||
Question 5
4 out of 4 points
|
When an individual buys a program for his or her personal
computer, they are actually buying a software:
|
|||||||
|
|||||||
Question 6
Describe a DBMS and its functions. List, at minimum, three of the
popular DBMS products and give a brief description of each. Your response
should be at least 200 words in length
Question 7
Identify the disadvantages of employee use of mobile systems at work
and discuss each of the disadvantages. Your response should be at least 200
words in length
Unit III PowerPoint Presentation
Open Source Software Research Project
Research an open source software project. Examples of open source
projects are listed on page 123 of your textbook. You are not restricted to the
open source projects listed on page 123; you may research one of your own
choosing that interests you.
In MS PowerPoint, create a presentation with slides that describe
the open source software and how it works. Discuss the role this open source
software has in management information systems.
Remember, management information systems is the management and use
of information systems that help organizations achieve their strategies (page
10 of your textbook).
Your PowerPoint must have a minimum of four slides. Be sure to use
the 7X7 rule in PowerPoint: no more than 7 lines per slide and no more than 7
words per line. Use of images, graphics, and diagrams is required. Be sure to
include your sources on a references slide in APA format.
IV Assessment
Question 1
4 out of 4 points
|
____________ are formally-defined, standardized processes that
involve day-to-day operations.
|
|||||||
|
|||||||
Question 2
4 out of 4 points
|
A private internet that is used exclusively within an
organization is called a(n) ____________ .
|
|||||||
|
|||||||
Question 3
4 out of 4 points
|
Computers that reside in different geographic locations are
connected using a(n) ____________ .
|
|||||||
|
|||||||
Question 4
4 out of 4 points
|
____________ is a suite of applications called modules, a
database, and a set of inherent processes for consolidating business
operations into a single, consistent, computing platform.
|
|||||||
|
|||||||
Question 5
4 out of 4 points
|
A computer ____________ is a collection of computers that
communicate with one another over transmission lines or wirelessly.
|
|||||||
|
|||||||
Question 6
Explain what is meant by computer network and
describe the various types of networks. Your response should be at least
200 words in length.
Question 7
Explain what is meant by SaaS, PaaS, and IaaS.
Support your answer with an example of each. Your response should be at
least 200 words in length.
Unit IV Scholarly Activity
Cloud Profitability
In a one- to two-page paper (250-500 words), discuss whether or not
there are cost benefits to cloud computing using specific
examples. Be sure to include at least three reference sources.
APA rules for formatting, quoting, paraphrasing, citing, and
listing of sources are to be followed.
Unit V Assessment
Question 1
4 out of 4 points
|
____________ is the process of obtaining, cleaning, organizing,
relating, and cataloging source data.
|
|||||||
|
|||||||
Question 2
4 out of 4 points
|
A ____________ is an information system that supports the sharing
of content among networks of users.
|
|||||||
|
|||||||
Question 3
4 out of 4 points
|
Web 2.0 refers to Web-delivered services and content paid for by
____________ .
|
|||||||
|
|||||||
Question 4
4 out of 4 points
|
Web 2.0 encourages companies to provide software ____________ .
|
|||||||
|
|||||||
Question 5
4 out of 4 points
|
Which of the following statements is true of social CRM?
|
|||||||
|
|||||||
Question 6
Define business intelligence and BI systems. Your response
should be at least 200 words in length.
Question 7
How should organizations respond to social networking problems?
Which one of them is a dangerous approach, and why? Your response should
be at least 200 words in length.
Unit V Scholarly Activity
Data Warehouses and Data Marts
Write a one- to two-page (250-500 word) paper that discusses the
differences between data warehouses and data marts. Also, discuss how
organizations can use data warehouses and data marts to acquire data. You must
use the CSU Online Library to locate at least two sources for your paper. APA
rules for formatting, quoting, paraphrasing, citing, and listing of sources are
to be followed.
VI Assessment
Question 1
4 out of 4 points
|
Which of the following statements is true about the relationship
between business processes and information systems?
|
|||||||
|
|||||||
Question 2
4 out of 4 points
|
A ____________ shows the tasks, dates, and dependencies for the
tasks of a project.
|
|||||||
|
|||||||
Question 3
4 out of 4 points
|
The SDLC process follows a linear sequence from requirements to
design to implementation. Therefore, the SDLC process is also known as the
____________ .
|
|||||||
|
|||||||
Question 4
4 out of 4 points
|
Rapid application development, the unified process, extreme
programming, and scrum have led to ____________ .
|
|||||||
|
|||||||
Question 5
4 out of 4 points
|
The first step in the system definition phase of the systems
development life cycle (SDLC) is to ____________ .
|
|||||||
|
|||||||
Question 6
What are the phases of the systems development life cycle
(SDLC)? Your response should be at least 200 words in length.
Question 7
Define technical feasibility and organizational
feasibility. Your response should be at least 200 words in length.
Unit VI Scholarly Activity
Business Process Management
In this writing assignment, you will explore how organizations use
business process management (BPM). Write a one-page (250-word) paper explaining
how organizations use business process management (BPM). Be sure to use at
least one specific example from the CSU Online Library, and address the
following in your paper:
· What is
business process management (BPM)?
· Why do
processes need management?
· What are BPM
activities?
APA rules for formatting, quoting, paraphrasing, citing, and
listing of sources are to be followed
Unit VII Assessment
Question 1
4 out of 4 points
|
In an IS department, the ____________ group manages computing
infrastructure, including individual computers, in-house server farms,
networks, and communications media.
|
|||||||
|
|||||||
Question 2
4 out of 4 points
|
____________ is the process of hiring another organization to
perform a service.
|
|||||||
|
|||||||
Question 3
4 out of 4 points
|
The purpose of the ____________ group is to protect data and
information assets by establishing data standards and data management
practices and policies.
|
|||||||
|
|||||||
Question 4
4 out of 4 points
|
Every IS user has a right to a secure computing environment. This
means that:
|
|||||||
|
|||||||
Question 5
4 out of 4 points
|
A ____________ works with users to determine system requirements,
designs and develops job descriptions and procedures, and helps determine
test plans.
|
|||||||
|
|||||||
Question 6
Describe the major functions of the IS department. Your
response should be at least 200 words in length
Question 7
Describe a steering committee and explain the CIO's role with
regard to it. Your response should be at least 200 words in length.
Unit VIII Assessment
Question 1
4 out of 4 points
|
____________ is the term used to denote viruses, worms, and
Trojan horses.
|
|||||||
|
|||||||
Question 2
4 out of 4 points
|
Which of the following is a critical security function that the
senior management should address in an organization?
|
|||||||
|
|||||||
Question 3
4 out of 4 points
|
A(n) ____________ is a computer program that senses when another
computer is attempting to scan the disk or otherwise access a computer.
|
|||||||
|
|||||||
Question 4
4 out of 4 points
|
____________ occurs when a person breaks into a network to steal
data such as customer lists, product inventory data, employee data, and other
proprietary and confidential data.
|
|||||||
|
|||||||
Question 5
4 out of 4 points
|
____________ refers to an organization-wide function that is in
charge of developing data policies and enforcing data standards.
|
|||||||
|
|||||||
Question 6
Define threat, vulnerability, safeguard, and target. Support your
answer with examples. Your response should be at least 200 words in
length.
Question 7
Explain what is meant by denial of service and
provide an example to support your answer. Your response should be at
least 200 words in length
Unit VIII Research Paper
Utilizing the unit lessons, textbook, CSU Online Library, and other
outside sources, write a two-page (not including title and reference pages)
Research Paper identifying the key components of information systems management
discussed throughout this course.
Provide a description of an organization you are familiar with
(possibly a company you have worked for in the past or are currently working
for) and describe briefly what services they contribute. Then, select three out
of the six questions below, and provide detailed answers, supporting those
answers by referencing any sources used. Be sure to use examples from your
research to strengthen your argument as needed.
· What
personal knowledge management tools does this organization utilize?
· What steps has
this organization taken in securing their information and knowledge?
· What has
this organization done to gain and sustain an advantage over their competitors?
Describe in detail how this organization manages the components of its IT
infrastructure. In what ways does the organization demonstrate successful
collaboration?
· Identify at
least two types of hardware and two types of software used by this
organization.
APA rules for formatting, quoting, paraphrasing, citing, and
listing of sources are to be followed.
No comments:
Post a Comment