MIS 535 Entire Course Managerial Applications of Information - TopicsExpress



          

MIS 535 Entire Course Managerial Applications of Information Technology (Recent 2014) Keller A+ Please Download Here! studentswithsolutions/view-tutorial.aspx?TutorialId=51282 MIS 535 Course Project Requirements: MIS 535 Week 1: Begin thinking of a business problem that could be solved with a technology solution for a company or organization you are familiar with. Use the Q&A Forum to ask questions and discuss your ideas about the project. See the Course Project Technical Areas for ideas. MIS 535 Week 2: Complete the Course Project Proposal using this format: Course Project Proposal (1-2 pages, 75 points, due week 2, properly cite any external sources used) Cover page 1. Subject of Course Project 2. Business problem statement 3. Name of the company or organization 4. Brief description of proposed solution 5. General benefits it will provide the organization 6. Audience to whom you are presenting the recommendation(s) MIS 535 Weeks 3 -6: Based on the Professor’s feedback to your proposal, develop the Course Project. You are required to use a minimum of five credible sources for research on your proposed solution and to correctly cite all references using APA style. Make sure you do not use more than 20% material from other sources so that 80% of the paper should be your original words. Use the Q&A each week to ask questions about the project. See the suggestions below for ideas on ways to develop your project. Use this format for the project: Course Project Table of Contents (10-15 pages, 225 points, due week 6) Cover Page Table of Contents 1. Abstract 2. Brief Company background 3. Discussion of business problem(s) 4. High level solution 5. Benefits of solving the problem 6. Business/technical approach 7. Business process changes 8. Technology or business practices used to augment the solution 9. Conclusions and overall recommendations 10. High-level implementation plan 11. Summary of project MIS 535 Week 2 Course Project Proposal: 3 Pages A+ This proposal discusses the implementation of a CRM (Customer Relationship Management) system and ecommerce for Circuit City. The retailer failed to keep its computer systems updated. It also failed to adapt the latest technologies in the retail industry, which made them lag behind their… MIS 535 Week 6 Course Project 18 Pages A+ 100% Correct The main problem that Circuit City experienced was the lack of IT capabilities in their operations, which prevented the company, particularly its salespeople, from efficiently and effectively addressing the needs of the customers, leading to customer dissatisfaction. This also gave more advantage to the company’s competitors (e.g. Wal-Mart and Best Buy), which already had advanced technologies and information… MIS 535 Homework Week 1 A+ Keller 100% (Points : 20) 1. Which of the following choices may lead to competitive advantage (1) new products, services and business models; (2) charging less for superior products; (3) responding to customers in real time? 2. An information system can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support 3. The three activities in an information system that produce the information that organizations use to control operations are 4. The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a companys members is called its 5. The average number of tickets sold daily online is an example of 6. Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organizations 7. Lower global costs of labor have 8. Whats new in MIS? 9. Key corporate assets are 10. Engineers, scientists, or architects who design new products or services for a firm belong to which level of a business hierarchy? 11. What is the difference between the Internet and cloud computing? 12. An exponential rate of innovation means that 13. In a business hierarchy, the level that is responsible for monitoring the daily activities of the business is 14. The term management information systems designates a specific category of information systems serving 15. To monitor the status of internal operations and the firms relations with the external environment, managers need _____ systems 16. Which systems are typically a major source of data for other systems? 17. Decisions that are unique, rapidly changing, and not easily specified in advance are best suited to which type of system? 18. Which systems are especially suited to situations in which the procedure for arriving at a solution may not be fully predefined in advance? 19. Which systems are designed to span functional areas and focus on executing business processes across the firm? 20. Todays companies need fewer levels of management because MIS 535 Homework Week 2 A+ Keller 100% (Points : 20) 1. The costs incurred when a firm buys on the marketplace what it cannot make itself are referred to as 2. Disintermediation 3. The four major types of competitive strategy are: 4. Information asymmetry exists when 5. When a firm provides a specialized product or service for a narrow target market better than competitors, they are using a 6. Internet technology 7. The Internet raises the bargaining power of customers by 8. Cloud computing 9. Benchmarking 10. The most successful solutions or methods for achieving a business objective are called 11. An information system can enhance core competencies by 12. The more any given resource is applied to production, the lower the marginal gain in output, until a point is reached at which the additional inputs produce no additional output. This is referred to as 13. Network economics 14. In network economics, the value of a commercial software vendors software products 15. Current technology trends will result in 16. The quality of ubiquity, as it relates to e-commerce, is illustrated by 17. Which of the following is not a recent development in e-commerce? 18. What term best describes consumers selling goods and services electronically to other? 19. Where there is no well understood or agreed-on procedure for making a decision, it is said to be 20. The type of decision that can be made by following a definite procedure is called a(n) MIS 535 Homework Week 3 A+ Keller 100% (Points : 20) 1. A characteristic or quality describing an entity is called a(n) 2. The confusion created by _____ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources. 3. Duplicate data in multiple data files is called 4. A DBMS 5. The logical view 6. The type of logical database model that treats data as if they were stored in two-dimensional tables is the 7. A field identified in a table as holding the unique identifier of the tables records is called the 8. The data dictionary serves as an important data management tool by 9. An automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security is the 10. Which is the type of database management approach that can handle a large number of pages or documents? 11. Which is the most prominent data manipulation language today? 12. DBMSs typically include report-generating tools in order to 13. A schematic of the entire database that describes the relationships in a database is called 14. What is the process of streamlining data to minimize redundancy and awkward many-to-many relationships? 15. Cloud computing offers 16. A data warehouse is composed of 17. A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because 18. Data mining is a tool that allows users to 19. What is the tool that enables users to view the same data in different ways using multiple dimensions? 20. OLAP is a tool that enables MIS 535 Homework Week 4 A+ Keller 100% (Points : 20) 1. A device that acts as a connection point between computers and that can filter and forward data to a specified destination is called a 2. Which device sends data packets to all connected devices in a network? 3. The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destination is called 4. What is the most important communication standard today for linking disparate computers and networks? 5. In TCP/IP, IP is responsible for 6. On which protocol is the Internet based? 7. All network computers connect to a single hub in a 8. In a bus network 9. A network that covers a large geographic area is most commonly referred to as a(n) 10. Which communications medium uses single copper wire surrounded by thick insulation? 11. Which type of signal follows a straight line and does not bend with the curve of the Earth? 12. Data is sent through the fiber optic cable by a 13. A domain name server 14. Net neutrality means 15. Which technology uses the Internet Protocol to deliver voice information in digital form using packet switching? 16. In the cloud computing model 17. A cloud computing model 18. Cost reductions in using cloud based services stem from 19. In an RFID system, a(n) _____ is electronically programmed with information that can uniquely identify an item, such as an electronic code 20. The cloud computing model described in the lecture is an example of which cloud computing model? MIS 535 Homework Week 5 A+ Keller 100% (Points : 20) 1. Which type of infrastructure services provides voice and video connectivity to employees, customers, and suppliers? 2. Specifications that establish the compatibility of products and the ability to communicate in a network are called 3. _____ unleash powerful economies of scale and result in declines in manufactured computer products 4. Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations? 5. The practice of contracting custom software development to an outside firm is commonly referred to as 6. What is the act of providing hardware and software capabilities as services over the Internet? 7. In order to achieve maximum benefit from an enterprise software package, a business 8. Which best describes a suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes? 9. Which type of software enables data to be used by multiple functions and business processes for organization coordination and control? 10. Which type of software is built around thousands of predefined business processes? 11. A companys suppliers, their suppliers suppliers, and the processes for managing relationships with them constitute 12. A companys organizations and processes for distributing and delivering products to the final customers constitute 13. Inefficiencies arise in a supply chain because of 14. Companies with effective supply chain management systems can expect 15. When tailoring a particular aspect of a system to the way a company does business, enterprise software can provide the company with 16. A scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line best describes a _____ strategy 17. Enterprise application vendors have created _____ to make their own customer relationship management, supply chain management, and enterprise systems work closely together 18. _____ integrate(s) multiple applications from multiple business functions, business units, or business partners to deliver a seamless experience for the customer, employee, manager, or business partner and provide(s) a greater degree of cross-functional integration than the traditional enterprise applications 19. Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company? 20. Operational CRM applications include tools for MIS 535 Homework Week 6 A+ Keller 100% (Points : 20) 1. What will you need to understand and measure for an effective reengineering project? 2. Enabling organizations to make continual improvements to many business processes and to use processes as the fundamental building blocks of corporate information systems is the goal of 3. The _____ is directly responsible for the individual systems project 4. Which process develops a detailed description of the functions that a new information system must perform? 5. The entire system-building effort is driven by 6. Systems design 7. Transferring transaction data from a legacy system to the new system would be defined by which category of system design specifications? 8. What is the primary driving factor in firms to select domestic outsourcing firms to build system solutions? 9. The four kinds of structural organizational change enabled by IT, in order from least to most risky, are 10. Traditional software development methodologies often fail because 11. You have been hired by a pharmaceutical company to evaluate its inventory of systems and IT projects. Which types of projects would be best avoided? 12. To best evaluate, from a financial standpoint, an IT investment whose benefits cannot be firmly established in advance, you would use 13. What do many companies overlook when making information system investment decisions? 14. Information systems projects are valued similarly to stock options in which model of financial evaluation? 15. An example of an external integration tool would be: 16. Agile methodologies emphasize 17. The major variables in project management are 18. Using a strategic analysis approach, an organizations information requirements are known through a small number of 19. In which approach to systems building are the development stages organized so that tasks in one stage are completed before the tasks in the next stage have begun? 20. The process of building an experimental system quickly and inexpensively for demonstration and evaluation so that users can better determine information requirements MIS 535 Homework Week 7 A+ Keller 100% (Points : 20) 1. Social media sites result in loss of personal information because 2. Information systems 3. The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called 4. The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called 5. Immanuel Kants Categorical Imperative states that 6. The ethical no free lunch rule states that 7. European privacy protection is _____ than in the United States 8. Intellectual property can best be described as 9. It is not feasible for companies to produce error-free software because 10. The practice of spamming has been growing because 11. Which of the five moral dimensions of the information age does spamming raise? 12. Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems refers to 13. Security challenges posed by the communications between layers in a client/server environment are 14. Phishing involves 15. Evil twins are 16. The HIPAA Act of 1996 17. Financial institutions are required to ensure the security and confidentiality of customer data through the 18. Automated data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that 19. The vulnerability inherent in wireless networking is due to 20. Statement ranking information risks are included in a(n) MIS 535 Week 4: Midterm Exam 100% Correct (TCO A) Dominos upgraded Pulse Evolution system incorporated a Pizza Tracker functionality that shows the progression of individual pizza orders. This is an example of using information systems to achieve which business objective? (Points : 10) (TCO A) Cloud computing (Points : 10) (TCO A) Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organizations (Points : 10) (TCO A) The hardware and software used to transfer data in an organization is called (Points : 10) (TCO B) Internet technology (Points : 10) (TCO B) The value chain model (Points : 10) (TCO B) For which of the following industries has the Internet as a whole been a disruptive technology? (Points : 10) (TCO C) The difference between competitors because of the wide availability of information. (Points : 10) (TCO C) Which common database challenge is illustrated by the texts discussion of receiving multiple pieces of the same direct mail advertising with an identical address? (Points : 10) (TCO D) Which of the following is not an example of the emerging mobile computing platforms? (Points : 10) (TCO A) Define operational excellence. How can information systems help achieve it? (Points : 25) TCO A) What is the difference between information technology and information systems? Describe some of the functions of information systems. (Points : 25) (TCO A) List and describe the four information systems serving each of the major functional areas of a business (Points : 20) (TCO B) List three organizational factors that can prevent a firm from fully realizing the benefits of a new information system, and provide examples of each. (Points : 20) (TCO B) How have mobile devices and social media changed the work environment? (Points : 25) (TCO C) The small publishing company you work for wants to create a new database for storing information about all of its author contracts. What factors will influence how you design the database? (Points : 25) (TCO C) What types of relationships are possible in a relational database? Describe and give an example of each (Points : 25) (TCO D) What is Web 3.0, and how do you think Web 3.0 developments could impact businesses? (TCO D) Describe and explain the idea of network neutrality. Are you in favor of network neutrality? Why or why not? (Points : 25) (TCO D) Describe the effect of cloud computing on traditional IT infrastructure. (Points : 25) MIS 535 Discussions All 7 Weeks Posted by All Students 620 Pages MIS 535 Week 1 Discussions 1 MIS in Your Pocket 48 Pages In todays society mobile devices have become common place. Are these mobile devices for personal entertainment only or can they be used for business purposes? Can you run your company out of your pocket? Discuss how smart phones, tablets, and other mobile devices can be used in running a business. Consider all types of devices such as Android, Blackberry, iPhone, iPad and Windows Phone 7 MIS 535 Week 1 Discussions 2 Collaborative Culture in Business 44 Pages Chapter 2 discusses some popular collaboration tools and technologies. Lets discuss these technologies. Which categories of technology do you currently use at your job? How effective is this technology at helping you collaborate? How is collaboration different from traditional teamwork? What is a collaborative culture in a business, and how can technology promote and support this culture? MIS 535 Week 2 Discussions 1 Strategic IT 57 Pages What are your thoughts about strategy and how applications get introduced to a company? It has been stated that IT provides a competitive edge to organizations. Can you think of a company that uses IT strategically? Perform some research on such a company and discuss its case in this thread. Make sure to use this weeks material in your analysis e.g. use Porter value chain or other strategic frameworks. MIS 535 Week 2 Discussions 2 Twitter Searches for a Business Model 47 Pages How do you develop a Business model to 10% of your followers when the majority of tweeters have 1 follower? Read the case study, Twitter Searches for a Business Model, and let’s see if we can draw some conclusions. MIS 535 Week 3 Discussions 1 Users and Database Design 47 Pages Has MS Access changed user understanding of databases? To what extent should end users be involved in the design of a database? How have our ideas of agile development environments affected this traditionally non-user input environment? MIS 535 Week 3 Discussions 2 Database in the World of Internet Search 46 Pages Web mining tools such as Google Trends and Google Insights for search services. This tracks the popularity of phrases used within Google to determine what people are interested in. What types of databases are used by companies like Google in implementing worldwide search engines? MIS 535 Week 4 Discussions 1 Internet and the Web? 46 Pages The textbook glossary states that the Internet is a global network of networks using universal standards to connect millions of different networks. The Internet is named for interconnection of computer networks. About states that “it is a massive hardware combination of millions of personal, business, and governmental computers, all connected like roads and highways. The Internet and the Web are not the same thing. What is the difference between the Internet and the Web? Let’s discuss what the Internet is and how many kinds of traffic, including Web traffic, can run on the Internet. What are the key technologies the Internet is based on? vWeek 4 Discussions 2 Internet Tools 40 Pages VoIP and IP telephony are becoming increasingly popular with large corporations and consumers alike. For many people, Internet Protocol (IP) is more than just a way to transport data, its also a tool that simplifies and streamlines a wide range of business applications. Telephony is the most obvious example. VoIP—or voice over IP—is also the foundation for more advanced unified communications applications—including Web and video conferencing—that can transform the way you do business. Discuss the advantages of some of the current technologies described in our reading this week including VoIP, Unified Communications, Virtual Private Networks, Wi-Fi and wireless technologies like RFID and Wireless Sensor Networks. Are there risks associated with any of these tools? MIS 535 Week 5 Discussions 1 Cloud Services Go Mainstream 49 Pages This week’s discussion is an introduction to a significant company that has made great stride in the industry. Salesforce is an example of a company that has used the Cloud, particularly the SaaS model, to be competitive. Read the Case Study, “Salesforce: Cloud Services Go Mainstream,” in Chapter 5 of the Laudon text. What are the benefits of a cloud deployment for Salesforce? How will Cloud Computing change the traditional IT infrastructure? MIS 535 Week 5 Discussions 2 Business Value of Enterprise Systems 39 Pages This week we are asked to research and explain what and enterprise system is. An enterprise software system is a package that is part of the IT infrastructure that an organization uses to conduct its operations. Define an enterprise system and explain how enterprise software works. Select one type of Enterprise system and describe how it helps businesses achieve operational excellence. MIS 535 Week 6 Discussions 1 Agile Methodologies 43 Pages This week we take a look at Agile. The use of agile methodologies changed the face of software development. Historically when using other traditional software methodologies, it was project managers, analysts, developers, testers and each group did their piece of the project then handled it off to the next team. Discuss how the emergence of agile methodologies has changed the IT system building model. MIS 535 Week 6 Discussions 2 Role of Senior Management 38 Pages What effectives of information system planning if senior management is knowledgeable and in full support of the planning strategy? What role does senior management play in the establishment of effective information system planning in a corporation? MIS 535 Week 7 Discussions 1 How Phishing Attacks Have Compromised Major System 40 Pages The textbook states that, one increasingly popular tactic is a form of spoofing called phishing. Phishing involves setting up fake Web sites or sending e-mail or text messages that look like those of legitimate businesses to ask users for confidential personal data. The message instructs recipients to update or confirm records by providing social security numbers, bank and credit card information, and other confidential data either by responding to the e-mail message, by entering the information at a bogus Web site, or by calling a telephone number. EBay, PayPal, Amazon, Walmart, and a variety of banks, are among the top spoofed companies. Major corporations, governments, and other organizations are hacked each week, mostly by means of phishing attacks. Describe how users and IT organizations should arm themselves against these attacks. MIS 535 Week 7 Discussions 2 Facebook, Twitter, Linkedin, and other Social Media 36 Pages Hello class, this week we take a look at the major components to cyber security are Confidentially, Integrity, and Availability. As for social media, the most serious security risk comes in terms of integrity. For a business, the outward facing characteristic of integrity is the reputation of the firm. According to a recent survey of European risk managers, reputational damage is the greatest digital risk (Veysey, 2011). A company with a damaged reputation could face difficulties in acquiring new customers and finding off competition. What are the social and security issues for individuals and organizations relative to personal and business use of social media? MIS 535 Final Exam Updated All 3 Sets 100% Correct Keller studentswithsolutions/view-tutorial.aspx?TutorialId=51280 (TCO A) Which of the following decisions require knowledge based on collaboration and interaction? (Points : 4) (TCO A) The costs for firms operating on a global scale have been drastically reduced by (Points : 4) (TCO B) Which of the following businesses use the market creator business model? (Points : 5) (TCO B) ________ are visual tools for presenting performance data in a BI system. (Points : 5) (TCO C) The type of logical database model that treats data as if they were stored in two-dimensional tables is the (Points : 4) (TCO C) A field identified in a record as holding the unique identifier for that record is called the (Points : 4) (TCO D) The telephone system is an example of a ______ network. (Points : 4) (TCO D) To use the analog telephone system for sending digital data, you must also use. (Points : 4) (TCO E) Enterprise applications have become easier to install because: (Points : 5) (TCO E) Which of the following factors provides an understanding of why computing resources today are ever more available than in previous decades? (Points : 5) (TCO F) Agile Methodologies (Points : 4) (TCO G) A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitors advertising costs up. This is an example of (Points : 4) (TCO A) Assess at least two benefits of using enterprise systems. (Points : 20) (TCO A) You have been hired to work with 10 salespeople from different branches of a national business in creating an online training site for new Sales employees. Identify six collaboration tools that are available to help the team work together. Which single tool would be the most helpful for the project, in your opinion, and why? (Points : 25) (TCO A) You work for an auto manufacturer and distributor. How could you use information systems to achieve greater customer intimacy? (Points : 25) (TCO B) Describe four types of application that are especially well-suited for mobile-commerce (Points : 20) (TCO B)You are evaluating BI software from a variety of vendors. Identify six elements in the BI environment. Use your understanding of the importance of these elements to formulate six questions to ask the vendor in order to determine how their software will interplay with your needs. (Points : 25) (TCO B) You are advising the owner of Small town Computer, a new, local computer repair store that also builds custom computers to order. What competitive strategies could Small town Computer exert? Which ones will it have difficulty exercising? (Points : 25) (TCO C) What types of relationships are possible in a relational database? Describe and give an example of each. (Points : 20) (TCO C) If you were to design the new contracts database for a publishing house what fields do you anticipate needing? Which of these fields might be in use in other databases used by the company? (Points : 25) (TCO C) Describe the ways in which database technologies could be used by an office stationery supply company to achieve low-cost leadership. (Points : 25) (TCO D) What is cloud computing and how do you think its developments could impact businesses? (Points : 20) (TCO D) How are RFID systems used in inventory control and supply chain management? (Points : 25) (TCO D) What are the business advantages of using voice over IP (VOIP) technology? (Points ; 25) (TCO E) What additional complexities are faced in global supply chains? How does the Internet help in managing global supply chains? (Points ; 20) (TCO E) Explain why standards are so important in information technology? What standards have been important for the growth of Internet technologies? (Points: 25) (TCO E) Distinguish between grid computing, cloud computing, and utility computing. (Points : 25) (TCO F) What qualities of object-oriented development make this method especially suitable for Internet applications? (Points ; 20) (TCO F) You have been hired as a consultant for a nationwide real estate firm, Cross & Deptford, who are interested in achieving better organization between branches by updating their information systems, but are not sure what will suit their needs. What will you recommend they do in order to determine the most effective IT projects? (Points ; 25) (TCO F) Differentiate between intangible and tangible benefits and list three examples of each. In what types of systems are intangible benefits more predominant? (Points : 25) (TCO G) Discuss the issue of security challenges on the Internet as that issue applies to a global enterprise. List at least 5 Internet security challenges (Points : 20) TCO G) Define the basic concept of responsibility, accountability, and liability as applied to ethical decision. How are these concepts related? (Points : 25) (TCO G) How is the security of a firm’s information system and data affected by its people, organization, and technology? In the contribution of one of these dimensions any more important than the other? Why? (Points : 25)
Posted on: Tue, 02 Sep 2014 02:56:52 +0000

Trending Topics



Recently Viewed Topics




© 2015