WGU C179 – Flashcards

128 test answers

Unlock all answers in this set

Unlock answers 128
question
Moore's Law (Gordon Moore) 1965
answer
Cofounder of Intel said "The number of transistors per square inch on an integrated chip doubles every 18 months."
question
Five-Component Framework
answer
Hardware, Software, Data, Procedures and People
question
Abstract Reasoning
answer
Ability to make and manipulate models. Construct a model or representation
question
Systems Thinking
answer
Model system components and show how components' input and outputs relate to one another
question
Collaboration
answer
Develop ideas and plans with others. Provide and receive critical feedback
Unlock the answer
question
Ability to Experiment
answer
Create and test promising new alternatives, consistent with available resources
Unlock the answer
question
The price of a book at a bookstore
answer
Data
Unlock the answer
question
The average final exam grade for a class
answer
Information
Unlock the answer
question
The top-selling book for the month
answer
Information
Unlock the answer
question
The grade achieved on a final exam
answer
Data
Unlock the answer
question
What is the relationship between data and information?
answer
Information is created when meaning is applied to data
Unlock the answer
question
Which information system component provides the instructions for using a system or for backing up system data?
answer
Procedures
Unlock the answer
question
What are two components of a business information system?
answer
Procedures and Data
Unlock the answer
question
Which type of information do executives require to make strategic decisions?
answer
Coarsely granular
Unlock the answer
question
Which type of component controls the system resources and productivity applications of an information system?
answer
Software
Unlock the answer
question
Which business information system component can be processed and then converted into meaningful information?
answer
Data
Unlock the answer
question
Which role represents the first step toward mastering computer skills?
answer
Computer user
Unlock the answer
question
What are three examples of business processes?
answer
Submitting a customer feedback form, Establishing digital rights management and Archiving data
Unlock the answer
question
Which activity is an example of a business process?
answer
Maintaining inventory
Unlock the answer
question
Nationwide office supply store
answer
Fully automated
Unlock the answer
question
Fast-food franchise
answer
Partially automated
Unlock the answer
question
Farmer's market produce vendor
answer
Manual
Unlock the answer
question
Small owner-operated bakery with only one location
answer
Manual
Unlock the answer
question
Boutique retail store that features locally produced products
answer
Partially automated
Unlock the answer
question
Which phrase explains the relationship between business processes and information systems?
answer
Business processes provide the information required for creating an information system
Unlock the answer
question
BPMN - Business Process Management Notation
answer
Standard flow chart symbols to document a business process
Unlock the answer
question
Circle with thin boarder
answer
Start
Unlock the answer
question
Circle with thick boarder
answer
End
Unlock the answer
question
Diamond shape
answer
Decision or gateway
Unlock the answer
question
Rectangle with round edges
answer
Activity (+ indicates sub-process defined)
Unlock the answer
question
Square with fold on top right
answer
Data
Unlock the answer
question
Arrow with a dashed line
answer
Data flow
Unlock the answer
question
Arrow with a solid line
answer
Control Flow
Unlock the answer
question
Dashed line before bracket
answer
Annotation
Unlock the answer
question
What is process modeling?
answer
A graphical representation of the relationship between components
Unlock the answer
question
Competitive Advantage for products
answer
1) Create a new product or service 2) Enhance products or services 3) Differentiate products or services
Unlock the answer
question
Competitive Advantage for process
answer
1) Lock in customers and buyers 2) Lock in suppliers 3) Raise barriers to marker entry 4) Establish alliances 5) Reduce Cost
Unlock the answer
question
What are two key components of a business process?
answer
Activity and Resource
Unlock the answer
question
Resource
answer
Inventory database
Unlock the answer
question
Data flow
answer
Recording inventory changes
Unlock the answer
question
Local area network (LAN)
answer
Computers connected at a single physical site
Unlock the answer
question
Wide area network (WAN)
answer
Computers connected between two or more separated sites
Unlock the answer
question
What are the two main reasons that organizations create information systems?
answer
To solve a major problem and to achieve goals and objectives
Unlock the answer
question
What determines organizational goals, objectives and information system structure, features and functions?
answer
Competitive strategy
Unlock the answer
question
Key researcher and thinker in competitive analysis
answer
Michael Porter
Unlock the answer
question
Porters Five Forces Model - List competitive forces determine industry profitability
answer
1) Bargaining power of customers 2) Threat of substitutions 3) Bargaining power of suppliers 4) Threat of new entrants 5) Rivalry
Unlock the answer
question
Porters Five Force Model - Bargaining power of customers
answer
Bargaining leverage, Buyer volume / information / incentives, Brand identity, Price sensitivity, Threat of backward integration, Product differentiation, Buyer concentration vs. industry, Substitutes available
Unlock the answer
question
Porters Five Force Model - Threat of substitution
answer
Switching costs, Buyer inclination to substitute, Price-performance, trade-off of substitutes
Unlock the answer
question
Porters Five Force Model - Bargaining power of suppliers
answer
Supplier concentration, Importance of volume to supplier, Differentiation of inputs, Impact of inputs on cost or differentiation, Switching costs of firms in the industry, Presence of substitute inputs, Threat of forward integration, Cost relative to total purchases in industry
Unlock the answer
question
Porters Five Force Model - Threats of new entrants
answer
Absolute cost advantages, Proprietary learning curve, Access to inputs, Government policy, Economies of scale, Capital requirements, Brand identity, Switching costs, Access to distribution, Expected retaliation, Proprietary products
Unlock the answer
question
Porters Five Force Model - Rivalry
answer
Exit barriers, Industry concentration, Fixed costs/Value added, Industry growth, Intermittent overcapacity, Product differences, Switching costs, Brand identity, Diversity of rivals, Corporate stakes
Unlock the answer
question
Which component of Porter's five forces industry analysis model describes an influence that can restrict an organization's ability to raise prices without losing customers?
answer
Customer bargaining power
Unlock the answer
question
Which management model was developed by Michael Porter to help organizations identify opportunities to save money and integrate information systems?
answer
Value Chain = 1) Inbound Logistics 2) Operations/Manufacturing 3) Outbound Logistics 4) Sales and Marketing 5) Customer Service
Unlock the answer
question
Porter Value Chain - 1) Inbound Logistics
answer
Receiving, storing, and disseminating to the products
Unlock the answer
question
Porters Value Chain - 2) Operations/Manufacturing
answer
Transforming inputs into the final products
Unlock the answer
question
Porters Value Chain - 3) Outbound Logistics
answer
Collecting, storing, and physically distributing the products to buyers
Unlock the answer
question
Porters Value Chain - 4) Sales and Marketing
answer
Inducing buyers to purchase the products and providing a means for them to do so
Unlock the answer
question
Porters Value Chain - 5) Customer Service
answer
Assisting customers' use of the products and thus maintaining and enhancing the products' value
Unlock the answer
question
What are the main criteria used to define the main strategies of Porter's generic strategies model?
answer
Differentiation and Cost by Industry-wide and Focus
Unlock the answer
question
A small business wants higher profits and does not want to compete with larger businesses for lowest cost. Which strategy from Porter's generic strategies model should the business implement?
answer
Narrow differentiation
Unlock the answer
question
Which three activities are primary activities of Porter's value chain model?
answer
Inbound logistics, Operations and Service (others are: Outbound Logistics, Marketing and Sales)
Unlock the answer
question
Porters Value Chain - Inbound Logistics
answer
Primary Activity
Unlock the answer
question
Porters Value Chain - Operations
answer
Primary Activity
Unlock the answer
question
Porters Value Chain - Outbound Logistics
answer
Primary Activity
Unlock the answer
question
Porters Value Chain - Marketing and Sales
answer
Primary Activity
Unlock the answer
question
Porters Value Chain - Procurement
answer
Support Activity
Unlock the answer
question
Porters Value Chain - HR management
answer
Support Activity
Unlock the answer
question
Porters Value Chain - Technological Development
answer
Support Activity
Unlock the answer
question
Porters Value Chain - Infrastructure
answer
Support Activity
Unlock the answer
question
An organization wants to gain a competitive advantage by maximizing staff efficiency. Which method should the organization use to accomplish this goal?
answer
Automation
Unlock the answer
question
What are two primary factors to consider when developing a new information system for an existing organization?
answer
Technological changes and Personnel requirements
Unlock the answer
question
Which term describes the use of policies, practices, and tools by systems developers to manage a project's resources? Such resources include documents, schedules, designs, program code, test suites, and any other shared resource needed to complete the project.
answer
Configuration control (Might be version control)
Unlock the answer
question
What is a possible drawback of outsourcing the development of an information system?
answer
Decreased communication between the company and its clients
Unlock the answer
question
What is the purpose of prototyping, in the context of systems development?
answer
To provide evidence of usability
Unlock the answer
question
BPM - Business Process Management
answer
Cyclical process for systematically creating, assessing, and altering business processes. Begins with a model of the existing business process, called an as-is model
Unlock the answer
question
OMG - Object Management Group
answer
Software-industry standards organization
Unlock the answer
question
SDLC - Systems Development Like Cycle
answer
Traditional process used to develop information systems and applications
Unlock the answer
question
SDLC - Systems Development Like Cycle 5 Phases
answer
1) Define System 2) Determine Requirements 3) Design System Components 4) Implement System 5) Maintain System
Unlock the answer
question
SDLC - Define System
answer
Define goals and scope, Assess feasibility (cost, schedule, technical, organizational), form project team and plan project
Unlock the answer
question
SDLC - Determine Requirements
answer
Conduct user interviews, Evaluate existing systems, Determine new forms/reports/queries, Identify new application features and functions, Consider security, Create the data model and Consider all five components
Unlock the answer
question
SDLC - Design System Components
answer
Determine hardware specifications, Determine program specifications (depends on source), Design the database, Design procedures and Create job definitions
Unlock the answer
question
SDLC - Implement System
answer
Build system components, Conduct unit test, Integrate components, Conduct integrated test and Convert to new system
Unlock the answer
question
SDLC - Implement System - System Conversion Types
answer
Pilot - portion of the business, Phased - test piece at a time, Parallel - Same time, Plunge (direct install) - cut over
Unlock the answer
question
SDLC - Maintain System
answer
Record request for change: failures, enhancements, Prioritize requests, Fix failures: patches, service packs, new releases
Unlock the answer
question
What are two purposes of prototyping a product?
answer
Setting user expectations and minimizing development time
Unlock the answer
question
What are two benefits of using a prototype approach for information systems?
answer
User involvement provides valuable feedback to developers and the final system is likely to meet user requirements
Unlock the answer
question
What are two key features of object-oriented systems development?
answer
Supports data modeling and unstructured
Unlock the answer
question
Polymorphic
answer
The ability to appear in different forms
Unlock the answer
question
Encapsulation
answer
The act of storing similar components together
Unlock the answer
question
Classes
answer
Collection of similar components
Unlock the answer
question
Objects
answer
Entities that can interact with one another
Unlock the answer
question
Rapid application development
answer
A methodology with simple business requirements, supports a narrow project scope, a short development time frame, and a low number of users
Unlock the answer
question
Unified Process - Methodology
answer
Is not a single concrete prescriptive process, but rather an adaptable process framework, intended to be tailored by the development organizations and software project teams that will select the elements of the process that are appropriate for their needs
Unlock the answer
question
Extreme Programming (XP) - Methodology
answer
Encourages (or requires depending on your point of view) "Pair Programming" where developers always work in pairs, and "Test-Driven Development" where unit tests are always created in conjunction with the system under development. Extreme Programming may be a good choice for prototype technologies and research projects.
Unlock the answer
question
What is a characteristic of the activity planning process when using agile systems methodology?
answer
Iterative
Unlock the answer
question
What are two characteristics of a project that uses an agile method such as extreme programming (XP)?
answer
The project develops incrementally and the project is collaborative
Unlock the answer
question
What is a primary characteristic of extreme programming (XP)?
answer
Frequent customer feedback
Unlock the answer
question
Extreme programming Order
answer
Planning Designing Coding Testing Listening
Unlock the answer
question
What are two purposes of information systems management?
answer
Maintain data integrity within an organization and Replacing legacy systems with new systems that use emerging technologies
Unlock the answer
question
IS steering committee
answer
Keeps systems from becoming obsolete by deciding to replace legacy systems with new systems that use emerging technologies
Unlock the answer
question
IT department
answer
Owns the hardware, installs and maintains the software, and manages permissions
Unlock the answer
question
What are two roles of the IT department in information systems management?
answer
To ensure the structure and data integrity of each system and To manage data security
Unlock the answer
question
A pharmacy customer wants to purchase an over-the-counter medication, but only if his coworker did not make a similar purchase earlier the same day. The customer asks the pharmacy clerk to retrieve the coworker's purchase records to verify whether the medication was purchased. How can the clerk assist the customer in an ethical manner?
answer
Don't release any information on the customer's co-worker, but explain the return policy in case they find they've made duplicate purchases
Unlock the answer
question
What are two ethical concerns in regard to information systems?
answer
Ensuring information security and information accuracy
Unlock the answer
question
Which two approaches can business managers use to help manage ethics?
answer
Form cross-department ethics committees and Conduct formal ethics training
Unlock the answer
question
What should a company's code of ethics include?
answer
Ethics training for all employees and Scenarios of unethical behaviors and their resolution
Unlock the answer
question
The electricity in a company's main office building often fluctuates. Which type of threat does this present to the company's information systems?
answer
Physical
Unlock the answer
question
Which threat source is categorized as an intentional physical threat to information systems?
answer
Purposeful flooding of an office
Unlock the answer
question
Which two methods can an organization use to protect its software systems from external threats?
answer
Deploy a hardware firewall and Do not permit employees to open attachments from unknown external senders
Unlock the answer
question
What are two security options that protect the hardware component of an organization's information systems?
answer
Effective alarm system and Disk drive locks
Unlock the answer
question
A company is developing a backup strategy for small amount of data. Backup files must be created and stored at the organization's headquarters, and copies must be stored offsite. Which backup should the company use?
answer
Optical media
Unlock the answer
question
A company is developing a backup strategy for large amount of data. There are no specific data restoration time requirements, but the company must minimize costs. Which backup media should the company use?
answer
Magnetic tape
Unlock the answer
question
At 4:00 a.m., a major online retailer's operations department receives a report that the company's website is not accessible due to intense and unrelenting network traffic blocking all users. An investigation indicates that a coordinated denial of service attack (DOS) is in process. A continuation of that attack will have a significant detrimental impact on the business. What should the operations manager do first?
answer
Follow the procedures in the disaster recovery plan
Unlock the answer
question
In the context of a disaster recovery plan, what is a hot site?
answer
A remote data recovery site, often operated by a third party
Unlock the answer
question
Car rental agencies collect personal information and payment information from customers. Which three types of information should be protected?
answer
Credit card number, Driving license number and Home address
Unlock the answer
question
Which type of corporate information should be protected because it would be useful to the company's competitors?
answer
Internal financial information
Unlock the answer
question
What are two reasons that employees should report all security compromises?
answer
Protect the company and its customers and To limit the possible damages
Unlock the answer
question
Jill made plans to attend a family reunion. Jill's coworker, Mary, exercised seniority and took her vacation during the week of the reunion, so Jill could not attend the event. Jill and Mary share a cubicle. Jill recently overheard a telephone conversation in which Mary implied that she plans to leave the company soon. Jill has also seen Mary copy files from her office computer to portable USB drives. What are three reason Jill should report Mary to her supervisor?
answer
To prove the effectiveness of severity policies and procedures, To bring attention to a potential security breach and To limit damages to the company
Unlock the answer
question
Which security management technique helps to protect a physical workplace from unauthorized personnel access?
answer
ID badges
Unlock the answer
question
An information system administrator connects from his workstation to several remote servers that host sensitive and protected data. What should the administrator use to protect against web-based hackers and malware?
answer
Software firewall
Unlock the answer
question
Basic problem-management steps
answer
Record the issue Categorize the issue Check the issue against known issues Track the issue Close the issue
Unlock the answer
question
A growing company establishes a customer support center. Each customer issue is handled entirely by the customer service representative (CSR) who receives the initial call. This often means that CSR's assist customers on issues beyond their expertise. The plans to implement a set of management tools and procedures to facilitate effective customer service. What are two possible benefits for the CSR's of using management tools in the customer support center?
answer
An increase in the number of issues that are resolved by each CSR and A decrease in the time required to resolve each issue
Unlock the answer
question
What is considered to be the most important tool in a customer support center?
answer
Telephone
Unlock the answer
question
Customer service problem solve order
answer
Record the incident Categorize the incident Verify whether the incident is part of a known problem Track the incident Provide closure
Unlock the answer
question
When does change management begin?
answer
When an idea for improving a process or procedure is proposed
Unlock the answer
question
An employee requests a system change, and a supervisor verifies whether the request conflicts with other scheduled changes. In which stage of the change management process would this event occur?
answer
Approval
Unlock the answer
question
What is the first step of the change management process?
answer
Acceptance and filtering
Unlock the answer
question
Change Management Process Order
answer
Acceptance and filtering Classification Approval Building, testing , and implementing Post-implementation review
Unlock the answer
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New