CIS 336 Week 11 Final Exam Answers | Strayer University

CIS 336 Week 11 Final Exam Answers | Strayer University 

CIS 336 Week 11 Final Exam Answers

 

 

  • Question 1

 

 

TJX’s handling of its serious data breach is consistent with which one of the following?

 

  • Question 2

 

 

This is a balanced approach to managing a company’s IT organization.

 

  • Question 3

 

 

All of the following are main processes of knowledge management EXCEPT:

 

  • Question 4

 

 

This project cycle plan chart looks very much like a bar chart and is easy for management to read because of its visual nature.

 

  • Question 5

 

 

IT organizations implement powerful information systems like ERP and SCM that provide centralized data repositories. In addition, IT organizations provide business units with tools that individuals can use to report on and analyze collected data. This IT governance approach is best described as: ________.

 

  • Question 6

 

 

All of the following are common elements of a BI system EXCEPT for:?

 

  • Question 7

 

 

This allows individuals to own their creativity and innovation in a way similar to owning physical property.

 

  • Question 8

 

To maintain balance in a project with a fixed budget and a well-defined scope, a project team will require flexibility ________.

 

  • Question 9

 

 

What principles, developed in 2000 by the US Department of Commerce (DOC) in consultation with the European Commission, allow U.S. companies to be placed on a list maintained by the DOC?

 

  • Question 10

 

 

If a company decides to make and develop IS, they are using this type of sourcing.

 

  • Question 11

 

 

Which normative theory of business ethics would TJX have displayed if it had informed customers as soon as the breach was corrected and told other retailers how to prevent future security breaches?

 

  • Question 12

 

 

The initial reason organizations outsourced IT was which one of the following?

 

  • Question 13

 

 

Knowledge that has been identified, captured, and leveraged to produce higher-value goods or services or some other competitive advantage for the firm is called:

 

  • Question 14

 

 

The purchase of a good or service that was previously provided internally, or that could be provided internally, is called:

 

  • Question 15

 

 

This method of IT funding is the most equitable, as the costs associated with IT are based on use. However, it can be difficult and tedious to calculate the usage costs.

 

  • Question 16

 

 

What is at the center of the project triangle?

 

  • Question 17

 

 

In the chapter, there is the statement, “Internet companies are in business for the money and hence they really would prefer to keep their customers in the dark about how their personal data is being used to generate profits”. Assuming this statement is true, with which ethical theory would you say these Internet companies are most aligned?

 

  • Question 18

 

 

The European Union Directive on Data Protection does all of the following EXCEPT:

 

  • Question 19

 

 

________ of the 1960’s dictated a centralized approach to IT governance.

 

  • Question 20

 

 

______________ organizations scatter IT components in different locations to address local business needs.

 

  • Question 21

 

 

________________ is the process of analyzing data warehouses for “gems”.

 

  • Question 22

 

 

After its PlayStation Network service was compromised, Sony realized that it needed to establish better ____________ governance.

Response Feedback:      See page 237.

 

  • Question 23

 

 

This type of organization management is where IT controls most of its IT infrastructure in one location.

 

  • Question 24

 

 

Which one of the following is NOT one of the four essential elements of any project?

 

  • Question 25

 

 

All of the following are frameworks for implementing Sarbanes-Oxley compliance EXCEPT:


Answer Detail

Get This Answer

Invite Tutor