Podcast
Questions and Answers
Which of the following is not a general approach to acquiring information processing functionalities?
Which of the following is not a general approach to acquiring information processing functionalities?
What are the key steps during the implementation phase of the Systems Development Life Cycle (SDLC)?
What are the key steps during the implementation phase of the Systems Development Life Cycle (SDLC)?
Which phases of the systems development life cycle (SDLC) differ most substantially from the system selection process?
Which phases of the systems development life cycle (SDLC) differ most substantially from the system selection process?
What is one of the principal risks associated with information system outsourcing?
What is one of the principal risks associated with information system outsourcing?
Signup and view all the answers
How does technology change influence an organization over time?
How does technology change influence an organization over time?
Signup and view all the answers
What is an overlooked aspect that can critically affect business success?
What is an overlooked aspect that can critically affect business success?
Signup and view all the answers
Which is a challenge typically faced in coordinating with an outsourced provider?
Which is a challenge typically faced in coordinating with an outsourced provider?
Signup and view all the answers
What is one key benefit of purchasing off-the-shelf software?
What is one key benefit of purchasing off-the-shelf software?
Signup and view all the answers
Which phase follows the definition phase in the software selection process?
Which phase follows the definition phase in the software selection process?
Signup and view all the answers
In the parallel installation approach, how are the old and new systems managed?
In the parallel installation approach, how are the old and new systems managed?
Signup and view all the answers
What is the main goal of knowledge infusion by software vendors?
What is the main goal of knowledge infusion by software vendors?
Signup and view all the answers
What is true about the pilot installation approach?
What is true about the pilot installation approach?
Signup and view all the answers
What approach is described as the most radical during software installation?
What approach is described as the most radical during software installation?
Signup and view all the answers
Which term refers to creating a model to gather user input for interface design?
Which term refers to creating a model to gather user input for interface design?
Signup and view all the answers
One significant benefit of end-user development is:
One significant benefit of end-user development is:
Signup and view all the answers
What is one benefit of end-user development for end-users?
What is one benefit of end-user development for end-users?
Signup and view all the answers
Which risk is associated with unreliable quality standards in end-user development?
Which risk is associated with unreliable quality standards in end-user development?
Signup and view all the answers
What is meant by the term 'make and buy' in software development?
What is meant by the term 'make and buy' in software development?
Signup and view all the answers
How can end-user development increase the pressure on the IS function?
How can end-user development increase the pressure on the IS function?
Signup and view all the answers
What is the primary goal of technical feasibility analysis?
What is the primary goal of technical feasibility analysis?
Signup and view all the answers
Which analysis ensures that a proposed new system is justifiable based on a cost benefit analysis?
Which analysis ensures that a proposed new system is justifiable based on a cost benefit analysis?
Signup and view all the answers
What is a risk associated with the high incidence of errors in end-user developed applications?
What is a risk associated with the high incidence of errors in end-user developed applications?
Signup and view all the answers
What is a potential continuity risk in end-user development?
What is a potential continuity risk in end-user development?
Signup and view all the answers
What is the primary goal of Customer Relationship Management (CRM)?
What is the primary goal of Customer Relationship Management (CRM)?
Signup and view all the answers
What advantage does open source software have regarding costs?
What advantage does open source software have regarding costs?
Signup and view all the answers
Which of the following is a disadvantage of open source applications?
Which of the following is a disadvantage of open source applications?
Signup and view all the answers
What does behavioral feasibility assess in a new system?
What does behavioral feasibility assess in a new system?
Signup and view all the answers
What characteristic commonly associated with enterprise systems could pose challenges?
What characteristic commonly associated with enterprise systems could pose challenges?
Signup and view all the answers
Why should security be a consideration for managers?
Why should security be a consideration for managers?
Signup and view all the answers
What does the term 'Robustness' mean in the context of open source applications?
What does the term 'Robustness' mean in the context of open source applications?
Signup and view all the answers
What is a potential issue with the support of open source software?
What is a potential issue with the support of open source software?
Signup and view all the answers
What distinguishes a Trojan Horse from other types of malware?
What distinguishes a Trojan Horse from other types of malware?
Signup and view all the answers
Which principle of Fair Information Practices emphasizes the right of individuals to know how their data is used?
Which principle of Fair Information Practices emphasizes the right of individuals to know how their data is used?
Signup and view all the answers
What is the primary function of worms in the context of computer security?
What is the primary function of worms in the context of computer security?
Signup and view all the answers
Which of the following best describes spyware?
Which of the following best describes spyware?
Signup and view all the answers
What is the goal of a Denial-of-Service Attack?
What is the goal of a Denial-of-Service Attack?
Signup and view all the answers
The principle of harm minimization in an Ethics Code of Conduct is primarily focused on which aspect?
The principle of harm minimization in an Ethics Code of Conduct is primarily focused on which aspect?
Signup and view all the answers
Which principle of Fair Information Practices relates to individuals’ ability to correct their records?
Which principle of Fair Information Practices relates to individuals’ ability to correct their records?
Signup and view all the answers
What is a key characteristic of an Information Systems Ethics Code of Conduct?
What is a key characteristic of an Information Systems Ethics Code of Conduct?
Signup and view all the answers
What is the primary purpose of firewalls in an organization?
What is the primary purpose of firewalls in an organization?
Signup and view all the answers
Which of the following is a typical use of encryption in organizations?
Which of the following is a typical use of encryption in organizations?
Signup and view all the answers
What challenge is often faced regarding information system ethics?
What challenge is often faced regarding information system ethics?
Signup and view all the answers
Which of the following correctly describes the role of IT and IS?
Which of the following correctly describes the role of IT and IS?
Signup and view all the answers
Moore’s Law states that the cost of storage continues to increase by what percentage?
Moore’s Law states that the cost of storage continues to increase by what percentage?
Signup and view all the answers
What is an example of a first degree change associated with the introduction of new technology?
What is an example of a first degree change associated with the introduction of new technology?
Signup and view all the answers
What level of organizational change does automating processes represent?
What level of organizational change does automating processes represent?
Signup and view all the answers
Which of the following is a consequence of outsourcing call center operations?
Which of the following is a consequence of outsourcing call center operations?
Signup and view all the answers
Study Notes
Change Requirements
- Technological and business changes affect organizations over time.
- Coordination efforts between firms and outsourced providers are costly.
- Firms often underestimate the crucial role of information systems in business success.
Essay Questions
- Describe the relationship between the steering committee and the total cost of ownership of an IS project.
- Describe the drivers and risks of IS outsourcing.
- Describe typical IS systems funding methods, including advantages and disadvantages of each method. Provide 2 examples.
Chapter Eleven: Creating Information Systems
Multiple Choice Questions
-
General approaches to acquiring information processing functionalities include: Custom design and development, System selection and acquisition, End-user development, Open source development.
-
Open source development is NOT one of these approaches.
-
Implementation phase steps of the Systems Development Life Cycle (SDLC) include Programming, Testing, and Installation
Additional Questions
-
General or functional managers are most involved in the implementation phase.
-
System selection and SDLC differ substantially during the implementation phase.
-
The three generic phases of a system life-cycle process are Definition, Design, and Implementation.
-
The Systems Development Life Cycle Methodology is often referred to as the waterfall model because phases are sequential and iteration (or going back) should be avoided.
-
System selection process involves compiling an RFP, developing a vendor short list, and soliciting proposals.
-
Approaches to acquiring information processing functionalities include: Custom Design, Custom Development, System Selection and Acquisition, End-user Development, and Open Source Development.
-
The advantages of making your own systems include: Unique Tailoring, Flexibility, Control, but not Faster Roll-Out.
-
The advantages of purchasing off-the-shelf systems include: Faster Roll-Out, Knowledge Infusion, Economical Attractiveness, and High Quality but not Unique Tailoring.
-
The Systems Development Life Cycle has three major phases: Definition, Build, and Implementation..
-
IS department workers who are experts in both technology and business processes are called IS specialists.
-
The SDLC stage where a "go" or "no-go" decision is made is Feasibility Analysis.
-
Migration approaches for upgrading computer systems include Parallel, Direct, Phased, and Pilot.
-
The Build phase of the SDLC isn't used to ensure software integration.
-
SDLC and Prototyping are not the same methodologies.
-
Off-the-shelf systems enhance organizational knowledge infusion.
-
End-user development is where non-IT specialists create applications.
-
Custom software development is a systems approach that emphasizes design and development projects.
-
System analysts create the structure of a system, based on requirements documents.
-
Two advantages of custom software development include Unique Tailoring and Flexibility and Control.
-
Two advantages of purchased software are Faster Roll-Out and reduced implementation time.
-
Principle phases of the SDLC include Definition, Build, and Implementation.
-
Software installation approaches include Parallel, Direct, Phased, and Pilot approaches.
-
Prototyping is used in an SDLC to get user requirements.
-
End-user development leads to increased speed of development due to faster independent completion.
-
End-user development risks include Unreliable Quality Standards, High Incidence of Errors, Continuity Risks, and Increased Pressure on the IS function.
-
End-user development can result in positive user satisfaction and reduces IS workload by letting users design their own features.
-
"Make or Buy" is the idea that off-the-shelf software is frequently configured and adjusted before deployment.
Chapter 12 (Irrelevant)
Chapter 13 (Security, Privacy, and Ethics)
-
Risk Audit is the basis for Risk Analysis.
-
Security is a concern for managers because of underfunding.
-
Security is a negative deliverable because it lacks revenue.
-
Mitigation strategies include Acceptance, Avoidance, Reduction, and Transference (with increased potential for failure associated with avoidance).
-
Insurance costs are most strongly associated with risk Transference.
-
Risk mitigation is about matching the appropriate response to security threats with a desired level of security and cost.
-
Strategies for security threats include Acceptance, Avoidance, Reduction, and Transference..
-
Internal security threats include disgruntled or negligent employees.
-
External threats include intrusion, social engineering, phishing, security weaknesses, backdoors, and malicious code.
-
Examples of malicious code include viruses, Trojan horses, and worms.
-
IT risk management involves identifying, measuring, and devising optimal mitigation strategies for information system security risks..
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers Chapter Eleven on Creating Information Systems, focusing on the relationship between information systems, business success, and outsourcing. It includes essay and multiple-choice questions that explore key concepts like the total cost of ownership, funding methods for IS projects, and various approaches to information processing functionalities.