Looks like no one added any tags here yet for you.
four information system types based on their sphere of influence include interorganizational, personal, enterprise , and …
workgroup
managers of the business functions most affected by a new information system have a key responsbility to ensure that …
the people, processes, and human structure components are fully addressed
…. is a model used to introduce new systems into the workplace in a manner that lowers stress, encourages teamwork, and increases the probability of a successful implementation
Leavitt’s Diamond
the contemporary view of information systems is that they are often so intimately invovled in an organization’s value chain that they are part of the process iteself. (True or False)
True
Which of the following is not a benefit associated with creating a strategic plan?
guarentees that only the most current technology solutions will be employed
Four drivers that set the information stratergy and determine information system investments include corporate stratergy, technology innovations, innovative thinking and …
business unit strategy
three ways IS organization can be percieved by the rest of the organization that influences IS stratergy are …
cost center, business partner, and game changer
which of the following are non-technical skills not commonly associateed with an effective information system worker?
ability to work in a static, boring environment where there is little change
two potential beenfits of obtaining a certification in an IS subject area are
a new career possibilites and a potential increase in salary
three commonly used approaches to cloud computing are public cloud computing, private cloud computing, and … cloud computing
hybrid
public cloud computing offers key benefits to organizations including…
increased redundancy in the event of disaster, reduced costs, and flexible computing capacity
common issues encountered when moving to public computing include complex pricing arrangements, performance issues, inadequate data security, and …
vendor lock-in
a private cloud computing environment can provide more data security than a public cloud computing environment. true or false
true
network connectivity is not required for objects with sensors to exchange data with other connected devices. true or false
false
a faulty sensor or a bad network connection can result in … missing data, or IoT sensor data that lacks a time stamp indicating when the reading occurred
missing data
one of the first things developers of IoT applications should focus on is the building in … from the start
security
Which phase of the goals-based strategic planning involves an in-depth analysis of the company and its competitors?
analyze situation
The _______________, _______________, and _______________ must be established before an organization can establish its goals and objectives.
mission, vision, values
The SWOT analysis is part of which phase in goals-based strategic planning?
analyze situation
If an IS organization focuses on stopping IS redundancies and saving money, it would be considered a _______________.
cost center
Business value of a proposed project can be which of the following?
tangible benefits and intangible benefits
Which type of project should result in an increase of company revenue?
breakthrough
When identifying and selecting projects, an organization does all of the following EXCEPT:
assess the skill level of the proposed users
A …. is a temporary endeavor undertaken to create a unique product, service, or result.
project
The five highly interrelated parameters of a project are:
cost, time, quality, user expectations, and scope
According to the Project Management Institute (PMI), project managers must coordinate _______________ areas of expertise.
ten
The forming-storming-norming-performing-adjourning model describes:
how teams form, evolve, and dissolve