CIS 336 help Become Exceptional / cis336.com

CIS 336 Final Exam Guide

For more course tutorials visit

www.cis336.com

CIS 336 Final Exam Guide

1)Joe works for a company where the IT department charges him for the number of CRM login accounts that are in his department. What type of IT funding model is his company deploying?

2) This project cycle plan chart looks very much like a bar chart and is easy for management to read because of its visual nature.

3) What is at the center of the project triangle?

4) This is a text message that is stored on a user’s computer by a Web server that helps trace the user’s browsing habits.

5) All of the following are risks associated with IS outsourcing EXCEPT:

6) This project cycle plan tends to be used for projects that have direct relationships between time and resources.

7) This is an IT governance framework that is consistent with COSO controls.

8) The question “What information does a person or an organization have a right or a privilege to obtain?” is part of this ethical issue.

9) ________________ is the process of analyzing data warehouses for “gems”.

10) Which normative theory of business ethics would TJX have displayed if it had informed customers as soon as the breach was corrected and told other retailers how to prevent future security breaches?

11) Scorecards provide a summary of information gathered over a period of time. Another common IT monitoring tool is the _____________.

12) The initial reason organizations outsourced IT was which one of the following?

13) The project triangle includes 3 sides — time, scope and ________.

14) Sam has just purchased 10 new high speed color laser printers for his company. He is very excited because he got a 40% discount and paid only $2,990 for each unit. His boss, Joe, wants to know things such as operating costs, support, overhead, etc. for the printers. Joe wants to know this value:

15) All of the following are frameworks for implementing Sarbanes-Oxley compliance EXCEPT:

16) An organization may convert from an old system to a new system by choosing to run both the old and new systems at the same time until the new system is fully accepted. This is known as __________.

17) This allows individuals to own their creativity and innovation in a way similar to owning physical property.

18) The newest sourcing option for today’s IT organizations is:

19) Which one of the following is NOT one of the four essential elements of any project?

20) Most companies would like to obtain the advantages derived from both centralized and decentralized organizational paradigms. What type of IT governance model would best help them to achieve this goal?

21) This method of IT funding is the most equitable, as the costs associated with IT are based on use. However, it can be difficult and tedious to calculate the usage costs.

22) If a company decides to make and develop IS, they are using this type of sourcing.

23) To maintain balance in a project with a fixed budget and a well-defined scope, a project team will require flexibility ________.

24) Kellwood, the American apparel maker, decided to consolidate and bring IT operations back in-house in order to reduce costs. Kellwood choose which of the following strategies?

25) In the chapter, there is the statement, “Internet companies are in business for the money and hence they really would prefer to keep their customers in the dark about how their personal data is being used to generate profits”. Assuming this statement is true, with which ethical theory would you say these Internet companies are most aligned?

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Midterm Exam (2 Sets)

For more course tutorials visit

www.cis336.com

CIS 336 Midterm Exam Set 1

1)The concept of “jobs” is being replaced with the concept of work, requiring a framework that links the IS Strategy with the organization strategy to answer all of the following EXCEPT:

2) All of the following are new types of jobs created by the growing reliance on technology EXCEPT:

3) This risk of using information resources must be carefully considered by managers due to the rapid spread of applications on smartphones and tablet devices.

4) Zara’s strategically uses information technologies to do all of the following EXCEPT:

5) The type of architecture where larger software programs are broken down into services which are then connected to each other, in a process called orchestration, is called:

6) Suppose Zara has a linked supply chain with Silk City, a fabric supplier. Zara and Silk City use IT to seamlessly exchange data, communicating requirements as well as delivery expectations. The relationship between Zara and Silk City is best described as:

7) A company that wants to make incremental improvements to existing business processes would utilize which of the following?

8) All of the following help to develop informal networks that play an important role in an organization EXCEPT for:

9) The Six Sigma DMAIC process to improve an existing process includes all of the following EXCEPT:

10) Zara’s store managers place orders that reflect their localized needs. However, order fulfillment is ultimately the responsibility of the commercial team in headquarters because:

11) Two automobile manufacturers are working together to develop hybrid technology. This type of relationship between the two automobile manufacturers is best described as:

12) This architecture is a complex framework whose main objective is to map how the organization’s IT supports the business processes.

13) Risks associated with cloud computing include all of the following EXCEPT:

14) The main benefit of ________________ is that users can work collaboratively to easily create, edit and link Web pages.

15) To remain competitive, an organization’s business strategy must adapt and respond to all of the following variables. Which variable in particular does IS help to determine?

16) A bank provides its customers mobile applications that significantly simplify traditional banking activities. For example, a customer can use a smartphone to take a picture of a check and electronically deposit into an account. This unique service demonstrates the bank’s desire to practice which one of Porter’s strategies?

17) Marketing has repeatedly asked the IT department about the possibility of aligning the new marketing plan with the company’s web site. They would like the new web site to be able to support more active content and permit customers to query an online catalog. You let them know that this is currently being considered and that you’re determining if this new business strategy can be translated into a viable plan of action. This would be part of which of the following?

18) Google has disrupted a number of industries, particularly the advertising and software industries. Google’s ability to quickly and aggressively provide new products and services is best described by:

19) These are comprehensive software packages that incorporate all modules needed to run the internal operations of a business. They should include the following modules: Manufacturing, Accounting, Human Resources and Sales.

20) In this business structure the firm is a hierarchy organized around a set of functions. Each group has a core competency that it concentrates upon.

21) This provides a blueprint for translating a business strategy into a plan for IS.

22) All of the following are identified causes of the 2010 Deepwater Horizon oil spill EXCEPT for:

23) Hypercompetition implies that any architecture must be designed with maximum scalability and _____________ to ensure it can handle the imminent business changes.

24) Which one of the following is NOT a factor driving the use of telecommuting?

25) All of the following are reasons why a company may choose to use cloud computing for its IT infrastructure EXCEPT:

CIS 336 Midterm Exam Set 2

1 )ERP systems are expensive for all of the following reasons EXCEPT:

2 )A general manager should:

3 )All of the following are new types of jobs created by the growing reliance on technology EXCEPT:

4 )Organizational, cultural, and control variables are considered the ________ used by decision makers to effect change in their organization.

5 ) Zara’s store managers place orders that reflect their localized needs. However, order fulfillment is ultimately the responsibility of the commercial team in headquarters because:

6 )Which of the following best describes cloud computing?

7 )“Reuse” is a benefit of service-oriented architecture because it supports:

8 ) Many companies like Zara use POS to capture information on what has sold, to whom and when. This use of technology to realize efficiencies supports which one of Porter’s value chain activities?

9 )Middleware is software used to:

10 ) The Department of Veterans Affairs (VA) realized it did not have adequate policies, education or technology in place for remote workers when:

11 ) Which of the following would you expect from a ROWE (results oriented work environment)?

12 ) Enterprise Rent-A-Car was able to model and better understand how service requests were handled and then optimize the process, greatly benefiting the customer experience. Enterprise achieved this benefit using which tool?

13 ) A manager must know enough about the IT architecture and IT infrastructure so that he or she can:

14 ) Which model is best used to understand the ways in which information technologies allow a firm to both attain and sustain a competitive advantage?

&am

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Week 2 Assignment 1 Models for Competitive Dynamics (2 Papers)

For more course tutorials visit

www.cis336.com

This Tutorial contains 2 Papers/Tutorial

CIS 336 Week 2 Assignment 1: Models for Competitive Dynamics

Assignment 1: Models for Competitive Dynamics

Due Week 2 and worth 100 points

Competition has, since the 90s, led to wider gaps between industry leaders and laggards. There are more “winner-take-all” environments and greater churns among industry sector rivals. We have witnessed sharp increases in quality and quantity of IT (Information Technology) investments. We’ve seen striking competitive dynamics, particularly in sectors that spend the most on IT. Some of the competitive dynamics models include the Destroy Your Business (DYB) strategy, the Grow Your Business (GYB) strategy, the Information Systems (IS) and strategic advantage, and the social business strategy.

Write a four to five (4–5) page paper in which you:

Compare and contrast the DYB and GYB strategies in terms of the ability to sustain a business in the marketplace over the long term, to be competitive against rivals, and profitability.

Examine the “cannibalization” strategy and determine if it is or is not a better strategy compared to the DYB strategy for growth, competitiveness, and market leadership. Provide two (2) business examples.

Determine whether or not changes in business strategy should entail reassessment of IS. Provide three (3) reasons to support your position.

Examine how firms can use social IT in alignment with organizational strategy and IS strategy. Consider collaborative capabilities, what, how, and who should use social IT for a social business strategy.

Use at three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Demonstrate an understanding of the integration of enterprise systems with inter-organizational partners.

Use technology and information resources to research issues in enterprise architecture.

Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Week 4 Assignment 2 Telecommuting and the Mobile Worker (2 Papers)

For more course tutorials visit

www.cis336.com

This Tutorial contains 2 Papers/Tutorial

CIS 336 Week 4 Assignment 2: Telecommuting and the Mobile Worker

Assignment 2: Telecommuting and the Mobile Worker

Due Week 4 and worth 100 points

The number of American telecommuters is expected to increase by 29 million telecommuters or 43% of the workforce by 2016 as more work gets performed from remote locations. Mobile workers can work from wherever they are and use the IT / IS technology necessary to access co-workers, company or corporate infrastructure, intranets, and other information sources.

Write a two to three (2–3) page paper in which you:

Describe the impact of telecommuting on energy conservation, IT operational costs, “green computing”, and shifts in telecommuters’ lifestyles (e.g., parents, disability, etc.).

Describe how the business infrastructure should be designed so that employees will be able to continue to perform business functions in the event of a disaster (i.e., storm, hurricane, or earthquake) that destroys or makes it impossible to access the buildings.

Determine four (4) advantages and four (4) disadvantages of telecommuting from an IT manager’s point of view. Elaborate on each advantage and disadvantage.

Examine the effect of Bring Your Own Device (BYOD) to the IT infrastructure with regard to security, IT support, knowledge, and data management, green computing, and telecommuting.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Demonstrate and plan for the integration of emerging technologies.

Describe and evaluate the core concepts of data and information architecture.

Design plans for business continuity.

Use technology and information resources to research issues in enterprise architecture.

Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Week 6 Assignment 3 IT Support for Virtual Teams (2 Papers)

For more course tutorials visit

www.cis336.com

This Tutorial contains 2 Papers/Tutorial

CIS 336 Week 6 Assignment 3: IT Support for Virtual Teams

Assignment 3: IT Support for Virtual Teams

Due Week 6 and worth 100 points

Global organizations have branches that are located in multiple countries. Some of these organizations develop software and take advantage of the global talent pool of software developers while others have global technical support teams, customer service, and so on. Virtual teams are created when two or more people work together from different locations, organizations, times zone, and / or time shifts. Global organizations use virtual teams in order to provide global support, reduce travel costs, reduce training costs, and take advantage of local cultural knowledge that may impact the organization’s operations.

Write a two to three (2–3) page paper in which you:

Examine five (5) issues that the IT department is likely to face when it comes to supporting virtual teams.

Create an architectural diagram that shows how the virtual teams would collaborate and access common repositories for documents, software, development, and testing facilities. Use Visio or an equivalent such as Dia. Note: The graphically depicted solution is not included in the required page length.

Describe five (5) advantages and five (5) disadvantages of using virtual teams for the organizations described in the scenario.

Describe challenges imposed by:

IT / IS national standards and propose how they could be handled or resolved.

protocols and propose how they could be handled or resolved.

procedures on virtual teams and propose how they could be handled or resolved.

Compare and contrast virtual teams and traditional teams with respect to communications, technology use, and team diversity.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

Describe the process of administering enterprise systems, including the use of virtualization and monitoring, power and cooling issues.

Use technology and information resources to research issues in enterprise architecture.

Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Week 7 Assignment 4 Virtualization and Cloud Computing World (2 Papers)

For more course tutorials visit

www.cis336.com

This Tutorial contains 2 Papers/Tutorial

CIS 336 Week 7 Assignment 4: Virtualization and Cloud Computing World

Assignment 4: Virtualization and Cloud Computing World

Due Week 7 and worth 100 points

The popularity and rapid adoption of Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) by a number of organizations has impacted internal IT / IS departments. These services provide a virtualization infrastructure that covers data storage, networking, desktop computing, mobile computing, and so on.

Write a two to three (2–3) page paper in which you:

Describe at least three (3) items that an organization’s IT / IS department should consider when an organization’s strategy calls for the use of SaaS, PaaS, or IaaS.

Evaluate the ways that SaaS, PaaS, and IaaS are used to reduce Total Cost of Ownership (TCO) and increase Return on Investment (ROI).

Create SaaS, PaaS, and IaaS architectural diagrams using Microsoft Visio or an equivalent such as Dia. Note: The graphically depicted solution is not included in the required page length.

Examine the impact to the IT support personnel when an organization embarks on the strategy stated in Question 1.

Analyze three (3) considerations that the organization’s management should be aware of.

Examine three (3) security issues that could arise from this type of an infrastructure.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

Describe the process of administering enterprise systems, including the use of virtualization and monitoring, power and cooling issues.

Evaluate the total cost of ownership and return on investment for enterprise architecture alternatives

Use technology and information resources to research issues in enterprise architecture.

Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Week 8 Case Study 1 Disneys ITILJourney (2 Papers)

For more course tutorials visit

www.cis336.com

CIS 336 Week 8 Case Study 1: Disney’s ITIL® Journey

Case Study 1: Disney’s ITIL® Journey

Due Week 8 and worth 70 points

The Information Technology Infrastructure Library (ITIL) is a set of concepts and techniques for managing IT infrastructure, development, and operations. ITIL offers eight sets of management procedures: service delivery, service support, service management, ICT infrastructure management, software asset management, business perspective, security management, and application management. Disney began adopting ITIL best practices in the mid-2000s. Read “Disney’s ITIL® Journey”, located at http://www.best-management-practice.com/gempdf/disney_itil_journey.pdf.

Write a two to four (2–4) page paper in which you:

Describe the reasons for Disney’s adoption of ITIL.

Examine the results that were attained by Disney.

Compare and contrast ITIL, Committee of Sponsoring Organizations of the Treadway Commission (COSO), and Control Objectives for Information and Related Technology (COBIT) frameworks with regard to whether Disney would have attained the same results with the COSO or COBIT framework.

Examine how Disney implemented auditing and compliance in its enterprise architecture.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Explain the role of audit and compliance in enterprise architecture.

Demonstrate an understanding of the integration of enterprise systems with inter-organizational partners.

Use technology and information resources to research issues in enterprise architecture.

Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Week 9 Case Study 2 Federal CIO Councils Bring Your Own Device (BYOD) Toolkit (2 Papers)

For more course tutorials visit

www.cis336.com

This Tutorial contains 2 Papers/Tutorial

CIS 336 Week 9 Case Study 2: Federal CIO Council’s Bring Your Own Device (BYOD) Toolkit

Case Study 2: Federal CIO Council’s Bring Your Own Device (BYOD) Toolkit

Due Week 9 and worth 70 points

The consumerization of Information Technology (IT) has given rise to the Bring Your Own Device (BYOD) phenomenon in which employees bring personally owned mobile devices to the workplace and connect them to the corporate network. The Federal CIO Council released a BYOD Toolkit that includes three case studies of agencies that are implementing BYOD. Read “Bring Your Own Device — A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs”, located at http://www.whitehouse.gov/digitalgov/bring-your-own-device.

Write a two to four (2–4) page paper in which you:

Examine the three (3) case studies in the toolkit in terms of:

policy implications.

“opt in” and “opt out” of government-provided devices.

expenditure reduction by the Federal government or State governments.

Examine the IT support requirements for the employee devices.

Examine potential security risks, data breaches, and lost devices. Provide guidelines on how these risks could be mitigated.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe and evaluate the core concepts of data and information architecture.

Construct risk management assessment techniques across the portfolio of the enterprise.

Use technology and information resources to research issues in enterprise architecture.

Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.