CIS 336 help Become Exceptional / cis336aid.com

CIS 336: All iLabs Week 1 to Week 7: Devry University (Devry)

FOR MORE CLASSES VISIT

www.cis336aid.com

CIS 336: All iLabs Week 1 to Week 7: Devry University (Devry)

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Entire Course: Devry University (Devry)

FOR MORE CLASSES VISIT

www.cis336aid.com

CIS 336 Entire Course: Devry University (Devry)

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Final Exam 1 (Devry)

FOR MORE CLASSES VISIT

www.cis336aid.com

1. (TCO 1) Most DBMS are referred to as _____________database management systems. (Points : 4)

elemental
 linked
 hierarchical
 relational

2. (TCO 1) Data constitutes the building blocks of _____________. (Points : 4)

information
 processing
 applications
 programming

3. (TCO 2) If a foreign key contains either matching values or nulls, the table(s) that make use of such a foreign key is/are said to exhibit __________ integrity. (Points : 4)

referential
 restrictive
 secondary
 redundant

4. (TCO 2) In a “one-to-many” relationship, which constraint is usually added to the “many” table?
 (Points : 4)

UNIQUE
 PRIMARY KEY
 FOREIGN KEY
 NOT NULL

5. (TCO 3) A ____ occurs when a relationship is improperly or incompletely identified and, therefore, is represented in a way that is not consistent with the real world. (Points : 4)

surrogate primary keys
 time-variant data
 design trap
 fan trap

6. (TCO 3) All of the following are true about a prime attribute except_____________. (Points : 4)

it is a key attribute
 it is at least part of a key
 it is not a key attribute
 it may be part of a composite key

7. (TCO 3) The conflicts between design efficiency, information requirements, and processing speed are often resolved through_____________. (Points : 4)

conversion from 1NF to 2NF
 conversion from 2NF to 3NF
 compromises that include denormalization
 conversion from 3NF to 4NF

8. (TCO 4) When a constraint is created at the ______ level with the CREATE TABLE command, the constraint definition is simply included as part of the column definition.(Points : 4)

table
 column
 database
 row

Page 2 — Multiple Choice

1. (TCO 4) In Oracle, the CONSTRAINT clause is used to ___________________. (Points : 4)

create only referential constraints
 define and name any constraint
 create a short cut so the constraint does not have to be named
 create only entity entegrity constraints

2. (TCO 4) The SQL command that lets you list the table contents is (Points : 4)

insert.
 select.
 commit.
 update.
 rollback.

3. (TCO 5) The Crow’s Foot model is more ___________-oriented than the Chen model. (Points : 4)

object
 user
 implementation
 processor

4. (TCO 5) The ___________ model is both software and hardware dependent. (Points : 4)

conceptual
 logical
 condensed
 physical

5. (TCO 6) Which of the following commands will add a new column named FIRSTORDERDATE to the CUSTOMERS table to store the date that the customer first placed an order with the company? (Points : 4)

CREATE COLUMN firstorderdate, DATE TO customers;
 ALTER TABLE customers ADD COLUMN firstorderdate DATE;
 ALTER TABLE customers ADD firstorderdate DATE;
 ALTER TABLE customers ADD (firstorderdate DATE);

6. (TCO 6) When modifying the data characteristics of a column in Oracle, which of the following is correct? (Points : 4)

The column size can be increased.
 The size of the column can be decreased.
 Changing the default value of a column will change the values of data already in a table.
 If a NUMBER column is empty, its precision and scale cannot be changed.

7. (TCO 6) Which of the followig SQL commands would alter the table DEVRY and add a foreign key that references the CITY table? (Points : 4)

ALTER table DEVRY
 ADD CONSTRAINT devry_studentcity_fk references city;
 ALTER table DEVRY
 ADD CONSTRAINT devry_studentcity_fk FOREIGN KEY references city;
 ALTER table DEVRY
 ADD CONSTRAINT devry_studentcity_fk FOREIGN KEY (student_city) references city;
 ALTER table DEVRY
 ADD CONSTRAINT FOREIGN KEY (student_city) references city;

8. (TCO 7) Given a table named EMPLOYEE, the SQL command to sort records in a specific order would be: (Points : 4)

SELECT EMP_LNAME, EMP_FNAME, EMP_INITIAL, EMP_AREACODE, EMP_PHONE
 FROM EMPLOYEE
 LIST BY EMP_LNAME, EMP_FNAME, EMP_INITIAL;
 SELECT EMP_LNAME, EMP_FNAME, EMP_INITIAL, EMP_AREACODE, EMP_PHONE
 FROM EMPLOYEE
 ORDER BY EMP_LNAME, EMP_FNAME, EMP_INITIAL;
 SELECT EMP_LNAME, EMP_FNAME, EMP_INITIAL, EMP_AREACODE, EMP_PHONE
 FROM EMPLOYEE
 DISPLAY BY EMP_LNAME, EMP_FNAME, EMP_INITIAL;
 SELECT EMP_LNAME, EMP_FNAME, EMP_INITIAL, EMP_AREACODE, EMP_PHONE
 FROM EMPLOYEE
 SEQUENCE BY EMP_LNAME, EMP_FNAME, EMP_INITIAL;

Page 3 — Multiple Choice

1. (TCO 7) Which of the following subqueries returns more than one row of results to the outer query? (Points : 4)

multiple-column subquery
 single-row subquery
 multiple-row subquery
 correlated subquery

2. (TCO 7) Which of the following keywords can be used to join two tables that do not contain a commonly named and defined column? (Points : 4)

NATURAL JOIN
 JOIN…ON
 JOIN…USING
 JOIN…WHERE

3. (TCO 8) Based upon the contents of the BOOKS table shown below, which of the following SQL statements will return the number of categories contained in the table?

(Points : 4)

SELECT COUNT(DISTINCT category) FROM books;
 SELECT DISTINCT COUNT(category) FROM books;
 SELECT DISTINCT (COUNT(category)) FROM books;
 SELECT DISTINCT COUNT(category) FROM books;

4. (TCO 8) The _____________ function can be used to display upper-case characters in lower-case. (Points : 4)

CONVERT
 MIN
 LESS
 LOWER

5. (TCO 8) Which of the following statements will produce the value 21.1? (Points : 4)

SELECT ROUND(21.12, 1) FROM dual;
 SELECT ROUND(21.12, -1) FROM dual;
 SELECT ROUND(21.12, 0) FROM dual;
 SELECT ROUND(21.12, 0+) FROM dual;

6. (TCO 9) The column to be updated by the UPDATE command is specified in the ______ clause. (Points : 4)

UPDATE
 SET
 WHERE
 COL

7. (TCO 9) If the INSERT INTO command is used to insert data values that violate an existing constraint in a table, which of the following will happen. (Points : 4)

Oracle will raise an error and you will have to go update the incorrect data.
 Oracle will raise an error and the entire row will be rejected.
 Oracle will raise an error and the invalid piece of data will be rejected.
 Oracle will raise and error and all current transactions will be rolled back.

8. (TCO 10) Which of the following commands is used to establish a user account? (Points : 4)

CREATE NEW USER username
 IDENTIFIED BY password;
 CREATE USERNAME username
 IDENTITY password;
 CREATE USER username PASSWORD password;
 CREATE USER username IDENTIFIED BY password;

9. (TCO 10) Which command will grant a system privilege to a user? (Points : 4)

GRANT systemprivilegeUSERNAME username
 GRANT PRIVILEGE systemprivilegeTO username
 GRANT systemprivilegeTO
 username 
 GRANT systemprivilege ON
 username

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — -

CIS 336 Final Exam 2 (Devry)

FOR MORE CLASSES VISIT

www.cis336aid.com

1. (TCO 1) Most DBMS are referred to as _____________database management systems. (Points : 4)

elemental
 linked
 hierarchical
 relational

2. (TCO 1) A relational DBMS provides protection of the _______________________ through security, control, and recovery facilities. (Points : 4)

user
 network
 system
 database

3. (TCO 2) If a foreign key contains either matching values or nulls, the table(s) that make use of such a foreign key is/are said to exhibit __________ integrity. (Points : 4)

referential
 restrictive
 secondary
 redundant

4. (TCO 2) A field that consists of integer values is a _________ type field. (Points : 4)

Date/Time
 Yes/No
 Memo
 Numeric

5. (TCO 3) The PK must uniquely identify each entity instance. A primary key must be able to guarantee unique values. It cannot contain nulls. This rationale belongs to ____. (Points : 4)

Unique values
 Nonintelligent
 Preferably single-attribute
 Security complaint

6. (TCO 3) A table that is in 1NF and includes no partial dependencies only is said to be in_____________. (Points : 4)

1NF.
 2NF.
 3NF.
 4NF.
 BCNF.

7. (TCO 3) A table that has all key attributes defined, has no repeating groups, and all its attributes are dependent on the primary key, is said to be in_____________.(Points : 4)

1NF.
 2NF.
 3NF.
 4NF.
 BCNF.

8. (TCO 4) In Oracle, the DEFAULT constraint is used to ____________________. (Points : 4)

define which column is the default primary key if one is not explicitly named
 define which column is the default foreign key if on is not explicitly named
 assign a value to an attribute when a new row is added and a value is not defined
 validate data when a value is added to an attribute

Page 2 — Multiple Choice

1. (TCO 4) Which of the following is not considered a database object? (Points : 4)

a table
 a view
 a constraint
 a sequence
 an index

2. (TCO 4) Which of the following SQL statements would you use to create a table named DEVRY? (Points : 4)

CREATE Devry
 (
 Student_id NUMBER (12),
 Student_name VARCHAR2 (15),
 Student_city VARCHAR2 (12)
 );
 CREATE TABLE Devry
 (
 Student_id NUMBER (12)
 Student_name VARCHAR2 (15)
 Student_city VARCHAR2 (12)
 );
 CREATE TABLE Devry
 (
 Student_id NUMBER (12),
 Student_name VARCHAR2 (15),
 Student_city VARCHAR2 (12)
 );
 CREATE TABLE Devry
 Student_id NUMBER (12),
 Student_name VARCHAR2 (15),
 Student_city VARCHAR2 (12);

3. (TCO 5) The ____ constraint requires that a specific condition be met before a record can be added to a table. (Points : 4)

UNIQUE
 REFERENCE
 CONDITION
 CHECK

4. (TCO 5) The ___________ model is both software and hardware dependent. (Points : 4)

conceptual
 logical
 condensed
 physical

5. (TCO 6) The _________________________ statement can be used to enable or disable a constraint. (Points : 4)

alter table
 modify table
 create table
 update table

6. (TCO 6) When using the ALTER TABLE…DROP COLUMN command, which of the following is not correct? (Points : 4)

The command’s effect on the table is permanent.
 You cannot delete the last remaining column in a table.
 The command deletes both the column and its contents.
 The command can be used to delete multiple columns from a table.

7. (TCO 6) Which of the following keywords can be used to change the size, datatype, and/or default value of an existing column? (Points : 4)

ADD
 MODIFY
 CHANGE
 RESET

8. (TCO 7) Any type of subquery can be used in the _________ clause of a SELECT statement. (Points : 4)

WHERE
 HAVING
 FROM
 ORDER BY
 GROUP

Page 3 — Multiple Choice

1. (TCO 7) Using the BOOK_CUSTOMER and BOOK_ORDER tables shown below for references, which SQL statement will return the same results as the following SQL statement?
 
 SELECT * FROM book_customer, book_order;

(Points : 4)

SELECT * FROM book_order CROSS JOIN book_customer;
 SELECT * FROM book_order, book_customer
 WHERE book_order.customer# = book_customer.customer#;
 SELECT * FROM book_order, book_customer
 WHERE book_order.customer# >book_customer.customer#;
 SELECT * FROM o book_order , c book_customer
 WHERE o.customer# = c.customer#;

2. (TCO 7) If a Cartesian join is used to link table A which contains five rows to table B which contains eight rows, there will be _______ rows in the results. (Points : 4)

8
 13
 5
 40

3. (TCO 8) Based upon the contents of the BOOK_ORDER table shown below, which of the following SQL statements will display the ship date for order 1006 as April 2, 2002?

(Points : 4)

SELECT order#, TO_CHAR(shipdate, ‘fmMonth DD, YYYY’)
 FROM book_order;
 SELECT order#, TO_DATE(shipdate, ‘fmMonth DD, YYYY’)
 FROM book_order;
 SELECT order#, TO_CHAR(shipdate, ‘Month DD, YYYY’)
 FROM book_order;
 SELECT order#, TO_DATE(shipdate, ‘Month DD, YYYY’)
 FROM book_order;

4. (TCO 8) Based upon the contents of the BOOK_ORDER table shown below, which of the following SQL statements will display only those orders shipped to the zip code zone that begins with 323?

(Points : 4)

SELECT order#, SUBSTR(shipzip, 1, 323)
 FROM book_order;
 SELECT order#, SUBSTR(shipzip, 1, 323)
 FROM book_order
 WHERE ;
 SELECT order#
 FROM book_order
 WHERE (shipzip, 1, 323);
 SELECT order#
 FROM book_order
 WHERE SUBSTR(shipzip, 1, 3) = 323;

5. (TCO 8) Which of the following functions determines the number of characters in a character string? (Points : 4)

COUNT
 NUMBER
 LENGTH
 DECODE

6. (TCO 9) Which of the following is not a valid SQL command? (Points : 4)

UPDATE acctmanager SET WHERE ;
 UPDATE acctmanager SET (amname);
 UPDATE acctmanager SET (amname) WHERE ;
 UPDATE acctmanager WHERE ;

7. (TCO 9) Using the promotion table shown below, which of the following SQL statements will insert a new row into the PROMOTION table?
 
 
 
 (Points : 4)

INSERT INTO promotion (gift, minretail, maxretail)
 VALUES (FREE BOOK, 75.01, 89.99);
 INSERT INTO promotion (gift, minretail, maxretail)
 VALUES (‘FREE BOOK’, 75.01, 89.99);
 INSERT INTO promotion VALUES (FREE BOOK, 75.01, 89.99);
 INSERT INTO promotion (gift, minretail)
 VALUES (FREE BOOK, 75.01, 89.99);

8. (TCO 10) A ____ is a uniquely identifiable object that allows a given person to log on to the database. (Points : 4)

user
 role
 profile
 manager

9. (TCO 10) Which command will delete a user account from Oracle9i? (Points : 4)

DELETE USER username;
 DELETE USER username IDENTIFIED BY password;
 DROP USER username IDENTIFIED BY password;
 DROP USER username;

Page 4 — Essays

1. (TCO 2) What is Character data? (Points : 15)

2. (TCO 3) Explain the term “second normal form”. (Points : 15)

3. (TCO 7) Sally needs to find all employees who have a date-of-hire between 01-JAN-2003 and 01-JAN-2005. She writes and executes the following query:

4. (TCO 8) In using group functions we cannot place a group function in a WHERE clause. Explain how the WHERE clause and HAVING clause are similar and why you can use the HAVING with a group function but not a WHERE clause. (Points : 15)

5. (TCO 6) Write the SQL statement that will remove the database table EMPLOYEE. (Points : 15)

1. (TCO 7) Write a join query using NATURAL JOIN that for every order in the ORDERS table will list the order number and order date along with the cusnumber, last name, and first name of the customer who placed the order.

2. (TCO 8) Write a query that will list the part number, part description, and on-hand value (units on hand * unit price) for each part in item class AP. Give the expression an alias of “On Hand Value”.

3. (TCO 8) Write a sub query that will list the part number, part description, and units on hand of all parts where the number of units on hand is greater than the average of units on hand for all parts.

4. (TCO 7) Using the BETWEEN operator, write a query that will list all details about all orders that were placed during the period of September 3rd thru September 5th of 1998.

5. (TCO 7) Write a query that will list the part number and part description for all parts in the PART table.
 (Points : 15)

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Final Exam 3 (Devry)

FOR MORE CLASSES VISIT

www.cis336aid.com

1. (TCO 2) Explain what physical independence means. (Points : 15)

2. (TCO 8) Sally wants to query the EMP table and determine how many of the employees live in each of the cities the company has factories in. She writes the following query but it does not work. What is wrong with the way the query is constructed?

3. (TCO 3) Explain in what two specific cases presented in the text composite primary keys are particularly useful. (Points : 15)

4. (TCO 7) How are comparisons done on character string data in a queries WHERE clause, and why would this be especially useful in comparing certain attributes? (Points : 15)

5. (TCO 6) Oracle will not allow the changing of a column’s data type unless the column is empty, and even then it may still be prohibited. Discuss why? (Points : 15)

6. (TCO 7) Write a join query using NATURAL JOIN that for every order in the ORDERS table will list the order number and order date along with the cusnumber, last name, and first name of the customer who placed the order.

7. (TCO 8) Write a query that will list the part number, part description, and on-hand value (units on hand * unit price) for each part in item class AP. Give the expression an alias of “On Hand Value”.

8. (TCO 8) Write a query that will display the customer number, first name, and last name for every customer with a balance greater than $50. Display the first and last name as a single column and provide an alias for the column.

9. (TCO 7) Write a query that will list the customer number, last name, and first name for every customer represented by sales rep 03 or sales rep 12.

10. (TCO 7) Write a query that will list the customer first and last name and the sales rep commission rate using JOIN ON.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Final Exam 4 (Devry)

FOR MORE CLASSES VISIT

www.cis336aid.com

1. (TCO 7) For every order, list the order number, order date, part number, part description, and item class for each part that makes up the order.

2. (TCO 8) Write a query that will display the customer number, last name, and first name for every customer I whose first name begins with the letter “D”.

2. (TCO 8) Write a query that will display the earliest date an order was placed.

3. (TCO 7) Using the BETWEEN operator, write a query that will list all details about all orders that were placed during the period of September 3rd thru September 5th of 1998.

5. (TCO 7) Write a query that will list the customer first and last name and the sales rep commission rate using JOIN ON.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Final Exam 4 Sets of Answers (Devry)

FOR MORE CLASSES VISIT

www.cis336aid.com

CIS 336 Final Exam 4 Sets of Answers (Devry)

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — -

CIS 336 Final Exam Guide

FOR MORE CLASSES VISIT

www.cis336aid.com

CIS 336 Final Exam Guide 1)Joe works for a company where the IT department charges him for the number of CRM login accounts that are in his department. What type of IT funding model is his company deploying? 2) This project cycle plan chart looks very much like a bar chart and is easy for management to read because of its visual nature. 3) What is at the center of the project triangle? 4) This is a text message that is stored on a user’s computer by a Web server that helps trace the user’s browsing habits. 5) All of the following are risks associated with IS outsourcing EXCEPT: 6) This project cycle plan tends to be used for projects that have direct relationships between time and resources. 7) This is an IT governance framework that is consistent with COSO controls. 8) The question “What information does a person or an organization have a right or a privilege to obtain?” is part of this ethical issue. 9) ________________ is the process of analyzing data warehouses for “gems”. 10) Which normative theory of business ethics would TJX have displayed if it had informed customers as soon as the breach was corrected and told other retailers how to prevent future security breaches? 11) Scorecards provide a summary of information gathered over a period of time. Another common IT monitoring tool is the _____________. 12) The initial reason organizations outsourced IT was which one of the following? 13) The project triangle includes 3 sides — time, scope and ________. 14) Sam has just purchased 10 new high speed color laser printers for his company. He is very excited because he got a 40% discount and paid only $2,990 for each unit. His boss, Joe, wants to know things such as operating costs, support, overhead, etc. for the printers. Joe wants to know this value: 15) All of the following are frameworks for implementing Sarbanes-Oxley compliance EXCEPT: 16) An organization may convert from an old system to a new system by choosing to run both the old and new systems at the same time until the new system is fully accepted. This is known as __________. 17) This allows individuals to own their creativity and innovation in a way similar to owning physical property. 18) The newest sourcing option for today’s IT organizations is: 19) Which one of the following is NOT one of the four essential elements of any project? 20) Most companies would like to obtain the advantages derived from both centralized and decentralized organizational paradigms. What type of IT governance model would best help them to achieve this goal? 21) This method of IT funding is the most equitable, as the costs associated with IT are based on use. However, it can be difficult and tedious to calculate the usage costs. 22) If a company decides to make and develop IS, they are using this type of sourcing. 23) To maintain balance in a project with a fixed budget and a well-defined scope, a project team will require flexibility ________. 24) Kellwood, the American apparel maker, decided to consolidate and bring IT operations back in-house in order to reduce costs. Kellwood choose which of the following strategies? 25) In the chapter, there is the statement, “Internet companies are in business for the money and hence they really would prefer to keep their customers in the dark about how their personal data is being used to generate profits”. Assuming this statement is true, with which ethical theory would you say these Internet companies are most aligned?

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Midterm Exam (2 Sets)

FOR MORE CLASSES VISIT

www.cis336aid.com

CIS 336 Midterm Exam Set 1 1)The concept of “jobs” is being replaced with the concept of work, requiring a framework that links the IS Strategy with the organization strategy to answer all of the following EXCEPT: 2) All of the following are new types of jobs created by the growing reliance on technology EXCEPT: 3) This risk of using information resources must be carefully considered by managers due to the rapid spread of applications on smartphones and tablet devices. 4) Zara’s strategically uses information technologies to do all of the following EXCEPT: 5) The type of architecture where larger software programs are broken down into services which are then connected to each other, in a process called orchestration, is called: 6) Suppose Zara has a linked supply chain with Silk City, a fabric supplier. Zara and Silk City use IT to seamlessly exchange data, communicating requirements as well as delivery expectations. The relationship between Zara and Silk City is best described as: 7) A company that wants to make incremental improvements to existing business processes would utilize which of the following? 8) All of the following help to develop informal networks that play an important role in an organization EXCEPT for: 9) The Six Sigma DMAIC process to improve an existing process includes all of the following EXCEPT: 10) Zara’s store managers place orders that reflect their localized needs. However, order fulfillment is ultimately the responsibility of the commercial team in headquarters because: 11) Two automobile manufacturers are working together to develop hybrid technology. This type of relationship between the two automobile manufacturers is best described as: 12) This architecture is a complex framework whose main objective is to map how the organization’s IT supports the business processes. 13) Risks associated with cloud computing include all of the following EXCEPT: 14) The main benefit of ________________ is that users can work collaboratively to easily create, edit and link Web pages. 15) To remain competitive, an organization’s business strategy must adapt and respond to all of the following variables. Which variable in particular does IS help to determine? 16) A bank provides its customers mobile applications that significantly simplify traditional banking activities. For example, a customer can use a smartphone to take a picture of a check and electronically deposit into an account. This unique service demonstrates the bank’s desire to practice which one of Porter’s strategies? 17) Marketing has repeatedly asked the IT department about the possibility of aligning the new marketing plan with the company’s web site. They would like the new web site to be able to support more active content and permit customers to query an online catalog. You let them know that this is currently being considered and that you’re determining if this new business strategy can be translated into a viable plan of action. This would be part of which of the following? 18) Google has disrupted a number of industries, particularly the advertising and software industries. Google’s ability to quickly and aggressively provide new products and services is best described by: 19) These are comprehensive software packages that incorporate all modules needed to run the internal operations of a business. They should include the following modules: Manufacturing, Accounting, Human Resources and Sales. 20) In this business structure the firm is a hierarchy organized around a set of functions. Each group has a core competency that it concentrates upon. 21) This provides a blueprint for translating a business strategy into a plan for IS. 22) All of the following are identified causes of the 2010 Deepwater Horizon oil spill EXCEPT for: 23) Hypercompetition implies that any architecture must be designed with maximum scalability and _____________ to ensure it can handle the imminent business changes. 24) Which one of the following is NOT a factor driving the use of telecommuting? 25) All of the following are reasons why a company may choose to use cloud computing for its IT infrastructure EXCEPT: CIS 336 Midterm Exam Set 2 1 )ERP systems are expensive for all of the following reasons EXCEPT: 2 )A general manager should: 3 )All of the following are new types of jobs created by the growing reliance on technology EXCEPT: 4 )Organizational, cultural, and control variables are considered the ________ used by decision makers to effect change in their organization. 5 ) Zara’s store managers place orders that reflect their localized needs. However, order fulfillment is ultimately the responsibility of the commercial team in headquarters because: 6 )Which of the following best describes cloud computing? 7 )“Reuse” is a benefit of service-oriented architecture because it supports: 8 ) Many companies like Zara use POS to capture information on what has sold, to whom and when. This use of technology to realize efficiencies supports which one of Porter’s value chain activities? 9 )Middleware is software used to: 10 ) The Department of Veterans Affairs (VA) realized it did not have adequate policies, education or technology in place for remote workers when: 11 ) Which of the following would you expect from a ROWE (results oriented work environment)? 12 ) Enterprise Rent-A-Car was able to model and better understand how service requests were handled and then optimize the process, greatly benefiting the customer experience. Enterprise achieved this benefit using which tool? 13 ) A manager must know enough about the IT architecture and IT infrastructure so that he or she can: 14 ) Which model is best used to understand the ways in which information technologies allow a firm to both attain and sustain a competitive advantage? 15 ) The negative consequences of monitoring the discrete tasks an employee does include all of the following EXCEPT: 16 ) The main benefit of ________________ is that users can work collaboratively to easily create, edit and link Web pages. 17 ) Businesses today link their customers and suppliers through a single network that optimizes cost and opportunities for all. This is possible because of all of the following reasons EXCEPT: 18 ) The type of architecture where larger software programs are broken down into services which are then connected to each other, in a process called orchestration, is called: 19 ) IBM has implemented a social network analysis tool that maps the _________ and the connections of IBM employees, supporting innovation by allowing employees to find others in the company with particular skills, interests or expertise. 20 ) All of the following help to develop informal networks that play an important role in an organization EXCEPT for: 21 ) When a company’s business strategy and technology strategy are intertwined, this situation is known as _______. 22 ) By using IS to achieve economies of scale and generate operating efficiencies, Walmart epitomizes which one of Porter’s generic strategies? 23 ) Two automobile manufacturers are working together to develop hybrid technology. This type of relationship between the two automobile manufacturers is best described as: 24 ) Partnering with a competitor is becoming more and more common in today’s integrated, technology-based environment. This type of collaboration with a competitor is uniquely described as: 25 ) A small company in Des Moines wants to set up an IT architecture for its workforce. The company recently moved to an older building that has solid walls and ceilings. Furthermore, most of the staff likes the flexibility of moving around the open office space to perform work on their laptops. Which communication architecture makes most sense for this company?

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Quiz 1 (Devry)

FOR MORE CLASSES VISIT

www.cis336aid.com

(TCO 3) Normalization works through a series of stages called normal forms. Typically _________ stages must be completed before a table can be considered normalized.

(TCO 3) The conflicts between design efficiency, information requirements, and processing speed are often resolved through

(TCO 3) The PK must uniquely identify each entity instance. A primary key must be able to guarantee unique values. It cannot contain nulls. This rationale belongs to

(TCO 9) The SQL command that lets you insert data into a table, one row at a time, is _____________.

(TCO 4) Which command is used to restore the table’s contents to their default values?

(TCO 4) Which of the following SQL commands would alter the table DEVRY and add a foreign key that references the CITY table?

(TCO 4) The SQL command that lets you save your work to disk, is ___________

(TCO 9) If the INSERT INTO command is used to insert data values that violate an existing constraint in a table, which of the following will happen?
 (TCO 3) Explain under what circumstances a partial dependency can exist in a database.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Quiz 2 (Devry)

FOR MORE CLASSES VISIT

www.cis336aid.com

(TCO 2) Explain what a composite attribute is

(TCO 1) Data constitutes the building blocks of

(TCO 1) Successful database design is first and foremost based on _____________ requirements.

(TCO 1) The lowest level in a database hierarchy is the ____________ or value as it is often referred

(TCO 2) The term _____________ design is used to refer to the task of creating the conceptual data model represented by an Entity Relationship Diagram (ERD).

(TCO 2) Within a table, the primary key must be unique so that it will identify each row. When this is the case, the table is said to exhibit ___________.

(TCO 2) A field that consists of data values that can be used for arithmetic procedures is a _________ type field.

(TCO 2) A relationship is an association between ___________

(TCO 5) The _____________ model represents a global view of the data.

(TCO 5) In Crow’s Foot notation, a forked end means

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Quiz 3 (Devry)

FOR MORE CLASSES VISIT

www.cis336aid.com

(TCO 7) Which of the following types of columns will automatically right-align the data when it is displayed?

(TCO 7) Which of the following SQL statements will display the profit generated by each book currently stored in the BOOKS table? (You do not need to see the table structure for this question)

(TCO 7) Which of the following will display the new retail price of each book as 20 percent more than it originally cost?

(TCO 7) Which of the following operators would be most appropriate to determine whether or not the retail price of a book is at least $24.00?

(TCO 7) The ______________________ comparison operator is used to indicate that a data value must fall within a range of values to be included in the query results.

(TCO 7) Based upon the contents of the BOOK_ORDER table shown below, which of the following queries will display all orders that were not shipped for at least three days after the order was received?

(TCO 7) ANSI-standard SQL allows the use of a special operator in conjunction with WHERE clause. A special operator used to check whether an attribute matches one from a subquery is_______.
 (TCO 7) A ____ occurs when a relationship is improperly or incompletely identified and, therefore, is represented in a way that is not consistent with the real world.
 (TCO 7) The ______________________ comparison operator is used to search for values which are not NULL.
 TCO 7) You want to write a query that will return the customer number, first and last name from the book_order table (shown below) for all customers who have a P.O. Box and who live in either Trenton or Chicago. Write the query that will accomplish this task.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Quiz 4 (Devry)

FOR MORE CLASSES VISIT

www.cis336aid.com

(TCO 8) If a Cartesian join is used to link table A which contains five rows to table B which contains eight rows, there will be _______ rows in the results.

(TCO 8) Which of the following statements will produce the value 21.1?

(TCO 8) Which of the following format elements will display insignificant leading zeros?

(TCO 8) Oracle’s pseudo table used only for cases where a table is not really needed is _________?

(TCO 7) Using the BOOK_CUSTOMER and BOOK_ORDER tables shown below for reference which SQL statement will return the same results as the following SQL statement?

(TCO 7) A table alias or qualifier cannot be assigned in the FROM clause of which type of join?
 (TCO 7) The _______ query joins a table to itself using aliases to distinctly identify each instance of the table.
 (TCO 7) Explain the difference between an inner join and an outer join.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Quiz 5 (Devry)

FOR MORE CLASSES VISIT

www.cis336aid.com

(TCO 6) Which of the following keywords is used to remove a row in a table?

(TCO 6) When using the ALTER TABLE…DROP COLUMN command, which of the following is NOT correct?

(TCO 6) Which of the following commands will add a new column named FIRSTORDERDATE to the CUSTOMERS table to store the date that the customer first placed an order with the company?

(TCO 8) Which of the following is NOT a valid statement?

(TCO 8) Based on the contents of the BOOKS table shown below, which of the following SQL statements will return the total profit generated by books in the COOKING category?

(TCO 8) Which comparison operator evaluates a subquery and if it returns false, will not execute the calling query?
 (TCO 8) The following SQL statement contains which type of subquery?
 
 (TCO 9) If the _________ clause of the UPDATE command is omitted, then all the rows in the specified table will be changed.
 (TCO 9) Which of the following is not a valid SQL command?
 (TCO 9) Based on the contents of the PROMOTION table, which of the following commands will delete only the row for the Free Bookmark from the table?
 (TCO 8) In using group functions we cannot place a group function in a WHERE clause. Explain how the WHERE clause and HAVING clause similar and why you can use the HAVING with a group function but not a WHERE clause.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Week 2 Assignment 1 Models for Competitive Dynamics (2 Papers)

FOR MORE CLASSES VISIT

www.cis336aid.com

This Tutorial contains 2 Papers/Tutorial CIS 336 Week 2 Assignment 1: Models for Competitive Dynamics Assignment 1: Models for Competitive Dynamics Due Week 2 and worth 100 points Competition has, since the 90s, led to wider gaps between industry leaders and laggards. There are more “winner-take-all” environments and greater churns among industry sector rivals. We have witnessed sharp increases in quality and quantity of IT (Information Technology) investments. We’ve seen striking competitive dynamics, particularly in sectors that spend the most on IT. Some of the competitive dynamics models include the Destroy Your Business (DYB) strategy, the Grow Your Business (GYB) strategy, the Information Systems (IS) and strategic advantage, and the social business strategy. Write a four to five (4–5) page paper in which you: Compare and contrast the DYB and GYB strategies in terms of the ability to sustain a business in the marketplace over the long term, to be competitive against rivals, and profitability. Examine the “cannibalization” strategy and determine if it is or is not a better strategy compared to the DYB strategy for growth, competitiveness, and market leadership. Provide two (2) business examples. Determine whether or not changes in business strategy should entail reassessment of IS. Provide three (3) reasons to support your position. Examine how firms can use social IT in alignment with organizational strategy and IS strategy. Consider collaborative capabilities, what, how, and who should use social IT for a social business strategy. Use at three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Demonstrate an understanding of the integration of enterprise systems with inter-organizational partners. Use technology and information resources to research issues in enterprise architecture. Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Week 3 Group Project Task 1 Data Model (Devry)

FOR MORE CLASSES VISIT

www.cis336aid.com

Present a detailed data model for the project scenario. You can create your data model using Microsoft Visio, which you will have access to through iLab and Microsoft Excel, which comes with Microsoft Office. Other tools may be used as long as the output is legible and conforms to standard format. (i.e. I will not be able to grade the data model if I cannot tell what it is supposed to be!). Your data model should include a minimum of an ERD and metadata chart (data dictionary).

A key component to every task submission is the team responsibilities document. This document should outline the contributions that each member of the team made to completing the task deliverable. There is a sample document in the Doc Sharing tab that can be used, or each team can come up with their own design. As stated in the syllabus, although this is a team project, each member will also be graded on their involvement in the project. This assessment needs to be honest and accurate in describing the individual members’ activities for the task.

Deliverables for this task:

A completed Data Model to include: An ERD, showing all tables, related attributes, and the primary and foreign keys. This diagram must show both the relationship and cardinality of the relationship using accepted notation. A Data Dictionary (or meta data chart) showing a minimum of the table name, columns, data types, length, and constraints. Team member responsibilities document outlining contributions by team members to this deliverable.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Week 4 Assignment 2 Telecommuting and the Mobile Worker (2 Papers)

FOR MORE CLASSES VISIT

www.cis336aid.com

This Tutorial contains 2 Papers/Tutorial CIS 336 Week 4 Assignment 2: Telecommuting and the Mobile Worker Assignment 2: Telecommuting and the Mobile Worker Due Week 4 and worth 100 points The number of American telecommuters is expected to increase by 29 million telecommuters or 43% of the workforce by 2016 as more work gets performed from remote locations. Mobile workers can work from wherever they are and use the IT / IS technology necessary to access co-workers, company or corporate infrastructure, intranets, and other information sources. Write a two to three (2–3) page paper in which you: Describe the impact of telecommuting on energy conservation, IT operational costs, “green computing”, and shifts in telecommuters’ lifestyles (e.g., parents, disability, etc.). Describe how the business infrastructure should be designed so that employees will be able to continue to perform business functions in the event of a disaster (i.e., storm, hurricane, or earthquake) that destroys or makes it impossible to access the buildings. Determine four (4) advantages and four (4) disadvantages of telecommuting from an IT manager’s point of view. Elaborate on each advantage and disadvantage. Examine the effect of Bring Your Own Device (BYOD) to the IT infrastructure with regard to security, IT support, knowledge, and data management, green computing, and telecommuting. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Demonstrate and plan for the integration of emerging technologies. Describe and evaluate the core concepts of data and information architecture. Design plans for business continuity. Use technology and information resources to research issues in enterprise architecture. Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Week 4 Group Project Task 2 (Devry)

FOR MORE CLASSES VISIT

www.cis336aid.com

Task 2 — Logical Model (30 points)

Using the Oracle SQL*Plus editor, develop a database for MiniQuest based on your data model. The database should contain all the tables and attributes discussed in the project specifications. Be sure to use your data dictionary when creating your tables.

A key component to every task submission is the team responsibilities document. This document should outline the contributions that each member of the team made to completing the task deliverable. To submit this task, you need to create a file in notepad called TEAM_X_TASK2.TXT, where X is your team identifier. For example, Team A would name the file TEAM_A_TASK2.TXT. In this file, create a heading called CREATE STATEMENTS, and then develop the CREATE TABLE statements required to create your database tables. Be sure to include the DROP TABLE statements at the top of your file so that you can reuse the file. If you include the wording CASCADE CONSTRAINTS as part of each DROP TABLE statement, then the order of the DROP statements will not mater. For example, to drop a table named customer, you would state:

DROP TABLE CUSTOMER CASCADE CONSTRAINTS PURGE;

After testing and verifying that all of your create statements work, create a spooled output file with the SET ECHO ON session command set so that your code and the results will show.

Deliverables for this task:

Revisions of Task 1 (if any) based on feedback from your instructor. Task 2 comprised of the CREATE TABLE script file and the output file showing that it works. Team member responsibilities document outlining contributions by team members to this deliverable.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Week 5 Group Project Task 3 (Devry)

FOR MORE CLASSES VISIT

www.cis336aid.com

Task 3 — Verification of Logical Model(45 points)

Develop the SQL statements to insert records into the database. You should ensure that the data in the database is sufficient to allow for each of the reports requested by Ms. Smith to be tested. You need to show a minimum of three insert queries for each database table that you have created. Some tables will obviously require more to ensure that all of the required data is in the database (i.e., the packages table, program table, etc). To submit this task, add a comment heading called INSERT STATEMENTS to your corrected SQL script from Task 2. Add your INSERT statements for each table after this heading. Keep in mind that you will need to insert data into the tables in the same order that the tables were created. This will minimize any integrity constraint errors you might encounter. Keep in mind also that any values being inserted into a field defined as a foreign key field must first exist in a previous table’s primary key field. Save the file as TEAM_X_TASK3.TXT, where X is your team identifier. After testing your statements to verify that your data will insert into your tables, create a spooled output file with the SET ECHO ON session command set for submitting.

Note — Although you are only required to have three records per table in most of your tables for this deliverable, you will need a considerable amount of data in your tables for the final project.

After testing and verifying that all of your create statements work, create a spooled output file with the SET ECHO ON session command set so that your code and the results will show.

Deliverables for this task:

Any revisions of task 2 based on feedback from your instructor. Task 3 comprised of the script file containing DROP TABLE, CREATE TABLE, and INSERT statements, and the output file showing that it works. Team member responsibilities document outlining contributions by team members to this deliverable.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Week 6 Assignment 3 IT Support for Virtual Teams (2 Papers)

FOR MORE CLASSES VISIT

www.cis336aid.com

This Tutorial contains 2 Papers/Tutorial CIS 336 Week 6 Assignment 3: IT Support for Virtual Teams Assignment 3: IT Support for Virtual Teams Due Week 6 and worth 100 points Global organizations have branches that are located in multiple countries. Some of these organizations develop software and take advantage of the global talent pool of software developers while others have global technical support teams, customer service, and so on. Virtual teams are created when two or more people work together from different locations, organizations, times zone, and / or time shifts. Global organizations use virtual teams in order to provide global support, reduce travel costs, reduce training costs, and take advantage of local cultural knowledge that may impact the organization’s operations. Write a two to three (2–3) page paper in which you: Examine five (5) issues that the IT department is likely to face when it comes to supporting virtual teams. Create an architectural diagram that shows how the virtual teams would collaborate and access common repositories for documents, software, development, and testing facilities. Use Visio or an equivalent such as Dia. Note: The graphically depicted solution is not included in the required page length. Describe five (5) advantages and five (5) disadvantages of using virtual teams for the organizations described in the scenario. Describe challenges imposed by: IT / IS national standards and propose how they could be handled or resolved. protocols and propose how they could be handled or resolved. procedures on virtual teams and propose how they could be handled or resolved. Compare and contrast virtual teams and traditional teams with respect to communications, technology use, and team diversity. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted. The specific course learning outcomes associated with this assignment are: Describe the process of administering enterprise systems, including the use of virtualization and monitoring, power and cooling issues. Use technology and information resources to research issues in enterprise architecture. Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Week 6 Group Project Task 4 (Devry)

FOR MORE CLASSES VISIT

www.cis336aid.com

Task 4 — Verification of Transaction Processing (30 points)

Develop a query that will identify and mark inactive those customers that have bills overdue by more than 30 days (this can usually be done using a sub-query). Remember, you are only marking a customer as inactive, not actually deleting the customer record from the system.

To submit this task, create a heading called MODIFY STATEMENTS in your group project SQL script, and name the file TEAM_X_TASK4.TXT. This should be the same script that contains your DROP TABLE, CREATE TABLE, and INSERT statements. Once you have verified that your SQL statement or statements work, create a spooled output showing the results of your statements.

Deliverables for this task:

Any revisions of task 3 based on feedback from your instructor. Task 4 comprised of the complete script file (DROP, CREATE, INSERT, SELECT, and UPDATE statements) and the output file showing that it works. Team member responsibilities document outlining contributions by team member to this deliverable.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Week 7 Assignment 4 Virtualization and Cloud Computing World (2 Papers)

FOR MORE CLASSES VISIT

www.cis336aid.com

This Tutorial contains 2 Papers/Tutorial CIS 336 Week 7 Assignment 4: Virtualization and Cloud Computing World Assignment 4: Virtualization and Cloud Computing World Due Week 7 and worth 100 points The popularity and rapid adoption of Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) by a number of organizations has impacted internal IT / IS departments. These services provide a virtualization infrastructure that covers data storage, networking, desktop computing, mobile computing, and so on. Write a two to three (2–3) page paper in which you: Describe at least three (3) items that an organization’s IT / IS department should consider when an organization’s strategy calls for the use of SaaS, PaaS, or IaaS. Evaluate the ways that SaaS, PaaS, and IaaS are used to reduce Total Cost of Ownership (TCO) and increase Return on Investment (ROI). Create SaaS, PaaS, and IaaS architectural diagrams using Microsoft Visio or an equivalent such as Dia. Note: The graphically depicted solution is not included in the required page length. Examine the impact to the IT support personnel when an organization embarks on the strategy stated in Question 1. Analyze three (3) considerations that the organization’s management should be aware of. Examine three (3) security issues that could arise from this type of an infrastructure. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted. The specific course learning outcomes associated with this assignment are: Describe the process of administering enterprise systems, including the use of virtualization and monitoring, power and cooling issues. Evaluate the total cost of ownership and return on investment for enterprise architecture alternatives Use technology and information resources to research issues in enterprise architecture. Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Week 8 Case Study 1 Disneys ITILJourney (2 Papers)

FOR MORE CLASSES VISIT

www.cis336aid.com

This Tutorial contains 2 Papers/Tutorial CIS 336 Week 8 Case Study 1: Disney’s ITIL® Journey Case Study 1: Disney’s ITIL® Journey Due Week 8 and worth 70 points The Information Technology Infrastructure Library (ITIL) is a set of concepts and techniques for managing IT infrastructure, development, and operations. ITIL offers eight sets of management procedures: service delivery, service support, service management, ICT infrastructure management, software asset management, business perspective, security management, and application management. Disney began adopting ITIL best practices in the mid-2000s. Read “Disney’s ITIL® Journey”, located at http://www.best-management-practice.com/gempdf/disney_itil_journey.pdf. Write a two to four (2–4) page paper in which you: Describe the reasons for Disney’s adoption of ITIL. Examine the results that were attained by Disney. Compare and contrast ITIL, Committee of Sponsoring Organizations of the Treadway Commission (COSO), and Control Objectives for Information and Related Technology (COBIT) frameworks with regard to whether Disney would have attained the same results with the COSO or COBIT framework. Examine how Disney implemented auditing and compliance in its enterprise architecture. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Explain the role of audit and compliance in enterprise architecture. Demonstrate an understanding of the integration of enterprise systems with inter-organizational partners. Use technology and information resources to research issues in enterprise architecture. Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Week 9 Case Study 2 Federal CIO Councils Bring Your Own Device (BYOD) Toolkit (2 Papers)

FOR MORE CLASSES VISIT

www.cis336aid.com

This Tutorial contains 2 Papers/Tutorial CIS 336 Week 9 Case Study 2: Federal CIO Council’s Bring Your Own Device (BYOD) Toolkit Case Study 2: Federal CIO Council’s Bring Your Own Device (BYOD) Toolkit Due Week 9 and worth 70 points The consumerization of Information Technology (IT) has given rise to the Bring Your Own Device (BYOD) phenomenon in which employees bring personally owned mobile devices to the workplace and connect them to the corporate network. The Federal CIO Council released a BYOD Toolkit that includes three case studies of agencies that are implementing BYOD. Read “Bring Your Own Device — A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs”, located at http://www.whitehouse.gov/digitalgov/bring-your-own-device. Write a two to four (2–4) page paper in which you: Examine the three (3) case studies in the toolkit in terms of: policy implications. “opt in” and “opt out” of government-provided devices. expenditure reduction by the Federal government or State governments. Examine the IT support requirements for the employee devices. Examine potential security risks, data breaches, and lost devices. Provide guidelines on how these risks could be mitigated. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Describe and evaluate the core concepts of data and information architecture. Construct risk management assessment techniques across the portfolio of the enterprise. Use technology and information resources to research issues in enterprise architecture. Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

CIS 336 Week 10 Term Paper The Service Oriented Architecture (2 Papers)

FOR MORE CLASSES VISIT

www.cis336aid.com

This Tutorial contains 2 Papers/Tutorial CIS 336 Week 10 Term Paper: The Service-Oriented Architecture Term Paper: The Service-Oriented Architecture Due Week 10 and worth 160 points The Service-Oriented Architecture (SOA) strategy allows businesses and organizations to offer their products and services to customers and trading partners using a standards-based integration protocol. Web Services depends on SOA for delivery. SOA uses Extensible Markup Language (XML) to exchange data and information to its products and services consumers. One of the SOA characteristics is that the integration is loosely coupled, thus simplifying integration. Write an eight to ten (8–10) page paper in which you: Analyze five (5) ways in which SOA reduces the total cost of ownership (TCO). Examine five (5) ways in which using XML enables data and information exchange between clients and servers using Web Services in an SOA environment. Compare and contrast the loosely coupled architecture to a tightly coupled architecture in terms of TCO, maintenance, and implementation issues. Analyze three (3) advantages and three (3) disadvantages of using a standards-based integration strategy. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Explain the benefits and risks of service oriented architecture. Demonstrate an understanding of the integration of enterprise systems with inter-organizational partners. Use technology and information resources to research issues in enterprise architecture. Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —