BUS 365 Week 11 Quiz

Published on June 2016 | Categories: Types, School Work | Downloads: 54 | Comments: 0 | Views: 614
of 36
Download PDF   Embed   Report

BUS 365 Week 11 QuizBUS/365 Week 11 Quiz

Comments

Content

BUS 365 Week 11 Quiz – Strayer
Click on the Link Below to Purchase A+ Graded Course Material
http://budapp.net/BUS-365-Week-11-Quiz-Strayer-338.htm
Quiz 10 Chapter 13 and 14
Business Process Management and Systems Development

Multiple Choice

1. __________ are the building blocks of each functional area, e.g., accounts
receivable (A/R) and accounts payable (A/P)
a) IT procedures
b) Business processes
c) Business strategies
d) Competitive forces

3

2. __________ is a technology approach to implementing a business process, but it’s
only part of the technology required to implement business processes.
a) MIS
b) BPM
c) SaaS
d) SOA

3

3. Microsoft International’s lack of standardized business processes and process
documentation had a number of adverse impacts on the HR team. Which is not one of
those adverse impacts?
a) Decrease in errors by new hires
b) Increased the time and cost to train new employees
c) Limited ability to review their business processes

d) Decreased business process efficiency

4. Which is not one of the benefits that Microsoft International achieved through the
use of Visio and business process modeling?
a) Significant savings in labor hours through increased process efficiency
b) Decrease in the training time of newly hired employees
c) Improved decision making through visual process analysis
d) Improved relationships with supply chain partners

5. When you break it down, you see that a business process is actually __________.
a) a project of known scope with an assigned budget
b) a loosely defined approach to solving an unstructured problem
c) a series of individual tasks executed in a specific order
d) clearly defined and automated by software

6. A process has inputs and outputs that are __________, which is necessary so it can
be managed.
a) qualitative
b) measurable
c) visual
d) summary metrics

7. Business processes integrate __________.
a) software and hardware
b) ISs and people
c) data and models
d) dashboards and scoreboards

8. The __________ spec, also called the technical spec, is important to managers
because it identifies how the business process will be implemented in as much detail
as possible.
a) evaluation
b) implementation
c) project
d) design

9. During the implementation stage, __________ tests are critical because they
determine whether the process is designed well from users’ perspective.
a) user acceptance
b) functional acceptance
c) system acceptance
d) integration

10. A(n) __________ is a set of technologies used for exchanging data between
applications and for connecting processes with other systems across the organization,
and with business partners.
a) ERP
b) mashup
c) SOA
d) Web service

11. During the implementation stage, __________ tests are critical because that is
when analysts test whether the process performs its functions.
a) user acceptance
b) functional acceptance
c) system acceptance
d) technical acceptance

12. During the implementation stage, __________ tests are conducted by technical
experts who attest that the process is integrated correctly with inputs and outputs of
other processes and data sources and data stores
a) user acceptance
b) functional acceptance
c) system acceptance
d) integration acceptance

13. In the short term, business process management (BPM) helps companies
__________.
a) improve profitability by reducing waste and costs
b) become more responsive to business changes
c) increase sales revenues and profit margins
d) all of the above

14. In the long term, business process management (BPM) helps companies
__________.
a) improve profitability by reducing waste and costs
b) become more responsive to business changes
c) increase sales revenues and profit margins
d) all of the above

15. After decades of business process reengineering attempts, organizations still have
problems with their business operations. What are those problems?
a) They duplicate processes
b) They perform hundreds of non-core tasks that should be outsourced
c) They spend vast amounts on proprietary process-management software that's
difficult to update
d) All of the above

16. British Telecom, United Airlines, and other companies that focused their BPM
initiatives on process automation and cost savings had achieved significant
operational efficiencies __________.
a) and higher market share
b) but lost their competitive edge and fell short of their performance targets
c) but only for a short time as competitors copied their efforts
d) because they were linked to their business strategies.

17. Changes to business apps that were needed prior to year 2000 were tedious and
time-consuming because they were tightly coupled programs written in __________.
a) COBOL
b) Java
c) Visio
d) Flash

18. __________ components have minimal dependence on each other, which
simplifies testing, maintenance and troubleshooting because problems are easy to
isolate and unlikely to spread.
a) Tightly coupled
b) Hardwired
c) Loosely connected
d) COBOL

19. The advantage of the __________ is that any tier can be upgraded or replaced
independently as business requirements or technology change.
a) tightly coupled architecture
b) middleware and graphical user-interface
c) three-tier software architecture
d) four-module tiered architecture

20. What was the underlying reason for the failure of the 2010 U.S. Census Bureau’s
Handheld Project?
a) Failure of top management in the bureau to assess and mitigate risks of such a
major project
b) Technical and database failures
c) Poor project management approach
d) Insufficient training of the census takers on how to use the handheld devices

21. Options for the acquisition of complex IT applications are all of the following
except:
a) Built in-house
b) Custom-made by a vendor
c) Leased from an application service provider (ASP)
d) Out-of-the-box

22. For in-house development, the __________ option should be considered only for
specialized IT apps for which components are not available because this option is
expensive and slow.
a) build from components
b) build from scratch
c) integrating applications
d) prototyping

23. End-user development has risks and limitations, which include each of the
following except:
a) End users may not be skilled enough in computers, so quality and cost may be
jeopardized.
b) End users may not take time to document their work
c) End users may neglect proper security measures.
d) There may be an endless loop of prototype revisions.

24. Projects are managed by managing the triple constraints. Which is not one of
those constraints?
a) approval
b) scope
c) time

d) budget

25. A project plan is specified in a __________.
a) resource pool
b) Gantt chart
c) work breakdown structure (WBS)
d) critical path

26. Project managers need to recognize the risk of __________, which is the piling up
of small changes that by themselves are manageable, but collectively can cause
significant project growth.
a) over allocation
b) critical path
c) triple constraints
d) scope creep

27. Project management includes three basic operations. Which is not one of those
operations?
a) planning
b) budgeting
c) organizing
d) controlling

28. Project managers must manage the __________, which consists of tasks that must
start and finish on schedule or the project will be delayed unless corrective action is
taken.
a) over allocation
b) critical path
c) triple constraints
d) scope creep

29. The success of a project manager depends on all of the following except:
a) use of the critical path method and Gantt charts
b) clear, open, and timely communication
c) accurate, timely, and complete information
d) commitment from team members

30. The __________ is the traditional systems development method used by
organizations for large IT projects such as IT infrastructure.
a) prototyping method
b) systems development life cycle (SDLC)
c) critical path method
d) sourcing method

31. Systems development involves __________, which is the revising of results of
any development process when new information makes revision the smart thing to do.
a) iteration
b) scope creep
c) constraints
d) prototyping

32. The first stage of the SDLC is __________ to understand the business problem or
opportunity.
a) systems analysis
b) systems investigation
c) prototyping
d) systems design

33. During the systems investigation stage, __________ studies are done to determine
if the hardware, software, and communications components can be developed and/or
acquired to solve the business problem.
a) economic feasibility
b) technical feasibility
c) ROI
d) NPV

34. During the systems investigation stage, __________ studies are done to assess the
skills and the training needed to use the new IS.
a) economic feasibility
b) technical feasibility
c) organizational feasibility
d) behavioral feasibility

35. Covert resistance to a new IS from employees may take the form of __________.
a) sabotaging the new system by entering data incorrectly
b) continuing to do their jobs using their old methods
c) complaining about the new system for extended time
d) All of the above

36. __________ specifications include the design of outputs, inputs, processing,
databases, telecommunications, controls, security, and IS jobs.
a) Physical design
b) Logical design
c) End-user
d) Systems analysis

37. When the system’s logical and physical designs specifications are agreed upon and
approved by all participants, they __________.
a) should not be changed
b) should be flexible to changes
c) are used to develop the prototype
d) determine the budget and timeline for development

38. To add rigor to the programming process, programmers use __________ that
improve the flow of the program by decomposing the computer code into modules.
a) GOTO statements
b) flowcharts
c) structured programming techniques
d) All of the above

39. Which is not a characteristic of program testing?
a) Testing verifies that computer code works correctly under various conditions.
b) Syntax errors are easier to find than logic errors because they prevent the program
from running.
c) Logic errors are difficult to detect because they permit the program to run but result
in incorrect output.
d) Proper testing can be done quickly and with little effort.

40. __________ conversion is the least expensive and highest risk IS conversion
strategy because the old system is cut off and the new system is turned on at a certain
point in time.
a) Parallel
b) Direct
c) Pilot
d) Phased

True/False

41. A business process, such as the credit approval process, accomplishes or produces
something of value to the organization.

42. In order to manage a process, the process needs to have outputs that are
measurable.

43. Process design is typically mapped and documented using a modeling tool, such
as Microsoft Excel.

44. Not only is the development of the process important, the testing is equally as
critical.

45. The BPM approach has its roots in just-in-time (JIT), which is the radical redesign
of an organization's business processes.

46. The BPR and JIT approaches were both based on assumptions. And if those
assumptions are not met, then they will fail to achieve the great expected results.

47. Many JIT implementations in the U.S. actually increased inventory costs because
JIT is based on the assumption that warehousing costs are extremely high, as they
were in Japan where JIT was initiated by Toyota.

48. When applying business process reengineering (BPR), managers first attempt to
automate or semi-automate an organization's business processes.

49. An advantage of JIT is that it significantly decreases transportation and ordering
costs.

50. In the 1990s, most organizations failed to achieve fundamental business process
improvements because they attended a BPR seminar and then made mistakes in the
implementation.

51. After decades of reengineering attempts, organizations no longer duplicate
processes or perform non-core tasks that should be outsourced.

52. If organizations focus exclusively on automation and cost savings, they might
achieve significant operational efficiencies but lose their competitive edge.

53. SOA is a confusing concept, even for practitioners, because SOA is mistakenly
described like BPM or the definition is incomprehensible.

54. . An important aspect of SOA is the separation of the service interface (the what)
from its implementation (the how).

55. SOA and BPM both focus on creating a more flexible IT architecture and
optimizing the way actual work gets done.

56. Web services can connect processes with other systems across the organization,
and with business partners. The resulting integrated BPM systems are BPM mashups.

57. The goal of loose coupling of apps is to reduce dependencies between systems to
improve flexibility and agility.

58. Project resources must be managed according to the Gantt chart.

59. The SDLC is a structured framework that consists of sequential processes by
which information systems are developed.

60. For many organizations, custom software is more expensive than packaged
applications. However, if a package does not closely fit the company‘s needs, the
savings are often diluted when the information systems staff or consultants must
extend the functionality of the purchased packages.

Short Answer

61. A __________ is the smallest unit of work and management accountability that is
not split into more detailed steps.

62. __________ are pre-configured, ready-to-go integrations between different
business software packages. They streamline information sharing among systems.

63. __________ refers to a broad range of software or services that enable
communication or data exchange between applications across networks.

64. __________ testing is important because it determines whether the app meets the
original business objectives and vision.

65. Large IT projects, especially ones that involve infrastructure, are developed
according to the __________ methodology using several tools.

66. A __________ is a type of bar chart that shows a project schedule.

67. __________ is the growth of the project after the scope has been defined and is a
serious issue because it can cause the project to fail.

68. The purpose of the __________ is to recognize which activities are on the critical
path so that managers know where to focus their efforts.

69. __________ are information systems professionals who specialize in analyzing
and designing information systems.

70. In a __________ conversion, the old system and the new system operate
simultaneously for a period of time, which is the most expensive, but also the least
risky approach.

Essay

71. Sketch or list the four stages of the business process lifecycle.

72. List and briefly describe the four tests performed on modules that have been
installed before going live.
73. Identify the tiers of the Three-tier architecture. Describe or give an example of
each tier.
74. List and describe the triple constraints of project management.
75. Select a standard business process, such as payroll. Draw a flowchart of an app for
that business process.

Chapter 14 Global Ecology, Ethics, and Social Responsibility

Multiple Choice

1. Carbon footprint refers to the amount of __________ emitted by a particular
activity, industry, or value chain.
a) CO
b) CO2
c) CO2 and other GHGs
d) coal and biofuels

2. Carbon footprint is typically measured in __________.
a) metric tonne (ton) carbon dioxide equivalent
b) carbon dioxide equivalent per year
c) GHG
d) carbon monoxide emissions

3. The IT sector is responsible for an estimated __________ of the global carbon
footprint as a result of emissions from the energy used to run servers, computers, and
other hardware.
a) 0.10 to 0.20 percent

b) 0.50 percent
c) 2 to 3 percent
d) 10 percent

4. The IT sector can cut its carbon footprint cut in half by _____.
a) switching to low emission data centers
b) buying eco-friendly hard drives with considerably reduced power consumption
c) placing data center in cold climates
d) all of the above

5. What is global warming?
a) The buildup of CO2.
b) The upward trend in the Earth atmosphere's global mean temperature (GMT).
c) The holding of heat within Earth's atmosphere by certain GHGs that absorb
infrared radiation.
d) The sea level rise and melting of polar caps.

6. What is the greenhouse effect?
a) The buildup of CO2.
b) The upward trend in the Earth atmosphere's global mean temperature (GMT).
c) The holding of heat within Earth's atmosphere by certain GHGs that absorb
infrared radiation.
d) The sea level rise and melting of polar caps.

7. Better use of IT to shift away from energy-intensive work habits and lifestyles to
low carbon habits and lifestyles depends on _____.
a) mobile technologies
b) commitment of senior managers
c) government policy, incentives for companies, and active participation of consumers
d) cloud computing

8. In environmental terms, a process or industry is __________ when it uses up
natural resources faster than they can be replenished.
a) low carbon
b) unsustainable
c) green
d) renewable

9. The GSMA’s Green Power for Mobile (GPM) program has the goal of helping the
mobile industry use renewable energy sources, such as __________ to power over
100,000 off-grid base stations in developing countries by 2012.
a) solar, wind, and sustainable biofuels
b) nuclear and solar
c) hydro, coal and wind
d) diesel and solar

10. MTN Group is the mobile telecom company operating in Africa and the Middle
East. MTN has reduced GHG emissions and costs by using __________ to run mobile
base stations.
a) diesel
b) soybean biofuel
c) wind energy
d) hydro power

11. Routers, switches, and modems operated by end users have been inefficient power
guzzling machines mostly because __________.
a) they are built at the lowest possible cost
b) eco-friendly manufacturing did not exist
c) performance speeds were higher than green ones
d) such machines were more reliable than green ones

12. Why are mobile handsets a threat to the environment?
a) They consume a lot of electric power.
b) They emit infrared radiation.
c) The renewal rates of mobiles tend to be very slow.
d) Millions of phones are disposed of, but recycling practices are very poor.

13. The Internet is composed of huge numbers of power-consuming, heat-generating
__________ running 24x7x365 worldwide and __________ that direct data packets
over networks to their destination.
a) servers; routers
b) firewalls; switches
c) Web sites; databases
d) proxies; wireless access points

14. Which is not one of the characteristics or challenges associated with green IT?
a) Trying to quantify the cost savings of green IT may be impossible or nonapplicable if cloud computing is used because the beneficiary of energy-efficient
servers is not the company, but their outsourcer.
b) The Society for Information Management (SIM) surveyed CIOs and IT executives
about their top IT and business priorities for 2010. Green IT was their top concern.
c) Green IT is a continuous process and requires long-term operating policies.
d) Green IT initiatives should be described in terms of reducing waste and
inefficiency to get management’s attention.

15. Industry standards __________ change. Those standards keep ramping up and
will again.
a) EPEAT and ENERGY STAR
b) Green STAR
c) SIM
d) EPA

16. The “Next Generation Data Center” strategy is based on the ability to deliver and
support secure IT applications through __________.
a) mobile devices
b) wireless networks
c) green IT
d) virtualization

17. Data center virtualization means that servers are __________.
a) integrated so that they can be shared
b) condensed to increase processing power
c) consolidated so they are more secure
d) distributed to reduce cost

18. As part of RoHS sustainability regulations, EU members agreed that new
__________ put on the market cannot contain six banned substances—including lead,
mercury, and hexavalent chromium—in quantities exceeding maximum concentration
values.
a) automobile parts
b) packaging and building materials
c) electrical and electronic equipment
d) computers

19. Opponents of social media monitoring define it as __________.
a) an unfair advantage or exploitation
b) environmentally harmful
c) spying and intolerable invasions of privacy
d) a business security risk

20. Despite the challenges and lack of clear answers, ethics is important because it has
become clear that relying on __________ alone to safeguard the community is
insufficient.
a) corporate policy
b) the law
c) audit trails
d) moral behavior

21. Blogging to influence financial markets may be deemed by the FTC or SEC as
a(n) __________, particularly when done by the CEO hiding his identity.
a) federal crime
b) invasion of privacy
c) insider trading
d) money laundering

22. IT’s capability to introduce ever-growing amounts of data into our lives can
exceed our capacity to keep up with the data, leading to __________.
a) digital divide
b) Net neutrality
c) large carbon footprint
d) information overload

23. Bloomberg BusinessWeek (2008) reported that knowledge workers are distracted
__________ at work—answering the phone, checking e-mail, responding to a text, or
checking YouTube or Facebook.
a) every three minutes
b) every 15 minutes
c) every hour
d) at least twice a day

24. Which does not describe issues or characteristics of information quality?
a) Information quality is mandated by several legislations.
b) Information quality is a subjective measure of the utility, objectivity, and integrity
of gathered information.

c) The most common problem that plagues online information sources is aged or
outdated content.
d) Millions of individuals face information quality issues on a daily basis as they try
to find information online.

25. Reduction in the total number of employees, reengineering of business processes,
and the ability of lower-level employees to perform higher-level jobs may result in
__________.
a) an increase in the number of special units
b) increased spans of control
c) centralization of authority
d) flatter organizational hierarchies

26. There is a trend toward __________ because the adaptable IT framework makes it
much easier to manage issues of cost, scale and agility.
a) cloud computing
b) social media
c) fluid collaboration
d) service oriented architecture

27. New capabilities that are paving the way for new classes of Web apps include each
of the following except:
a) location-awareness
b) online/offline modes
c) green IT
d) social connectivity

28. Which is not one of the trends in the future of IT in organizations?
a) Move into cloud computing
b) The new Web as a turning point
c) Devices become more specialized in the content they deliver
d) Conversation economy

29. As analytics become a commodity, the real differentiators are __________ and the
ability to make productive decisions.
a) data quality
b) location-based services
c) social media
d) fluid collaboration

30. Technological and economic forces are prompting fresh approaches to systems
development using __________ for competitive advantage.
a) in-house development
b) proprietary apps
c) open source software
d) fourth-generation languages or software

True/False

31. Tackling global warming by reducing emissions of greenhouse gases is high on
the list of global challenges.

32. Carbon footprint refers to the amount of infrared, CO2 and other GHGs emitted
per day by a computing or mobile device.

33. Global warming is typically measured in MtCO2e, which stands for metric tonne
carbon dioxide equivalent.

34. Annual emissions are generally measured in gigatonnes (billions of tonnes) of
carbon dioxide equivalent per year (GtCO2e/y).

35. All carbon emissions worldwide make up the global carbon footprint.

36. The IT sector, including computing and telecommunications, is responsible for an
estimated 10 percent of the global carbon footprint as a result of emissions from the
energy used to run servers, computers, and other hardware.

37. IT can play a significant role in reducing GtCO2e/y in the transportation
industries.

38. Innovative IT solutions can provide both a better quality of life and contribute to
dramatically reduced emissions. That is, quality of life and reduced emissions do not
require a tradeoff.

39. Business associations continue to fight against initiatives to reduce energy
consumption and carbon emissions.

40. Warnings from the scientific community point to dangers from the ongoing
buildup of CO2 and greenhouse gases mostly from the burning of fossil fuels and
forests.

41. The greenhouse effect refers to the holding of heat within Earth's atmosphere by
certain GHGs such as CO2, methane, and nitrous oxide that absorb infrared radiation.

42. Scientists predict that the increased temperature and sea level rise from global
warming adversely affect the Earth’s biodiversity.

43. Scientists have determined that we should aim to stabilize the concentration of
GHGs in the atmosphere in the range 450 to 550 parts per million (ppm), which is
much lower than our present level.

44. The Keeling Curve tracks changes in the concentration of CO2 in the Earth's
atmosphere at a Mauna Loa research station.

45. The Keeling curve has become the symbol of the ever-changing chemistry of the
earth’s atmosphere and the associated global warming.

46. In 2008, The Climate Group found that the information and communications
technology (ICT) is a minor sector in the struggle to reduce climate warming.

47. Transforming the way people and businesses use IT could reduce annual humancaused global emissions by 15 per cent by 2020.

48. IT sector’s own footprint of 10 per cent of global emissions could decrease by
2020 despite increased demand for smartphones and other hardware, software, and
services.

49. IT has the unique ability to monitor and maximize energy efficiency both within
and outside of its own industry sector to cut CO2 emissions.

50. From smart meters to smart grids, the Climate Group is working with members
and partners, such as Google and Cisco, to build on the enormous potential and
economic opportunities of IT in the low carbon economy.

51. The role of IT includes emission reduction and energy savings only in the IT
sector itself.

52. “Smart” as in smart buildings means that wasted-energy and materials are
minimized; and procurement, manufacturing, distribution, service, and recycling are
done in an environmentally friendly manner.

53. Green, whether applied to energy, technology, or consumption of resources in
general, refers to the concept of using things at a rate that does not deplete its
availability in future generations.

54. Sustainability, the study and practice of eco-friendly computing resources, may be
in companies’ best financial interests.

55. Questions about data access and capture, tracking and monitoring, privacy and
profiling are examples of IT capabilities that have ethical considerations. And there
are no easy or agreed to answers to these dilemmas.

56. Globalization, the Internet, and connectivity have the power to undermine moral
responsibility because it becomes relatively easy to ignore the harm that might be
done to others.

57. IT decreases span of control, increases productivity, and increases the need for
technical experts.

58. The trend toward cloud computing allows any part of the IT to be sourced from
the Internet, ultimately offering a more flexible model that aligns better with business
objectives.

59. Collaboration across time zones and geographies cannot become a business norm
until language and cultural differences are minimized.

60. With IT creating organizations that have the characteristics of elasticity—scalable,
infinitely flexible, and adaptive—companies and your job will be defined by IT.

Short Answer

61. __________ refers to the concept of using things at a rate that does not deplete its
availability in future generations.

62. __________ technology optimizes the capacity and processing power of servers
so that fewer servers are needed to provide the necessary processing power.

63. __________ qualified products use less energy.

64. __________ or virtual work, offers many green benefits, including reducing rushhour traffic, improving air quality, improving highway safety, and even improving
healthcare.

65. __________ may be considered an integral component of social media strategies
because it gives marketers the ability to discover public conversations about their
brands and, if necessary, respond to posters directly or to their posts.

66. Free speech and __________ collide in a world populated by anonymous critics,
vengeful people, those with personal agendas, and malcontents.

67. IT’s capability to introduce ever-growing amounts of data into our lives can
exceed our capacity to keep up with the data, leading to __________.

68. The Web is undergoing its most significant overhaul since the emergence of
__________, and will emerge as an increasingly attractive enterprise platform.

69. __________ are emerging as a rich source of information about consumer
sentiment, preferences and desires.

70. As analytics become a commodity, data and decision quality will provide the real
competitive __________ .

Essay

71. List two financial benefits associated with becoming a sustainable company,
including green IT.
72. Identify and explain two myths about green IT.
73. What are the benefits of telework to individuals, organizations, and the
community/society? Give two benefits to each.
74. Discuss the competing interests and tradeoffs at work when the issue is privacy.
75. Discuss the impacts of IT on each of the following: organizational structure,
authority, power, and job content.

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close