MIS 14

Card Set Information

Author:
Anonymous
ID:
218486
Filename:
MIS 14
Updated:
2013-05-08 01:23:34
Tags:
MIS
Folders:

Description:
Laudon Chapter 14 MIS
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user Anonymous on FreezingBlue Flashcards. What would you like to do?


  1. 21) On average, private
    sector IT projects underestimated budget and delivery time of systems by
    ________ percent. A) 30 B) 40 C) 50
    D) 60
    Answer:  C
  2. 22) The major variables in project
    management are A) scope, time, cost, and performance. B) scope, time, cost, quality, and risk. C) time, cost, quality,
    performance, and risk. D) time, cost, scope, and performance.
    Answer: B
  3. 23) At the top of the
    management structure for information systems projects in a large company is A)
    project management. B) the CIO. C) the
    corporate strategic planning group. D) the IS steering committee.
    Answer: C
  4. 24) The ________ is directly
    responsible for the individual systems project. A) project management group B) project team C) IS steering
    committee D) corporate strategic planning committee
    Answer: B
  5. 25) The ________ reviews and
    approves plans for systems in all divisions. A) project management group B)
    project team C) IS steering committee
    D) corporate strategic planning committee
    Answer: C
  6. 26) The ________ consists of systems analysts,
    specialists from the relevant end-user business areas, application programmers,
    and perhaps database specialists. A) project management group B) project team C) IS steering
    committee D) corporate strategic planning committee
    Answer: B
  7. 27) A road map indicating
    the direction of systems development, the rationale, the current systems, new
    developments to consider, the management strategy, the implementation plan, and
    the budget is called a(n) A) project plan. B) portfolio analysis. C) information systems plan. D)
    enterprise analysis.
    Answer: C
  8. 28) A CSF approach to
    establishing an enterprise's information requirements is especially suitable
    for A) distinguishing between individual and organizational objectives. B)
    identifying the key entities and attributes of the organization's data. C)
    understanding how organizational units define critical data. D) the development of DSSs and ESSs.
    Answer:D
  9. 29) The principal method
    used in CFS analysis is to A) inventory all of the organization's information
    systems projects and assets and assign risk levels. B) perform a weighted
    comparison of the criteria used to evaluate a system. C) survey a large sample
    of managers on their objectives, decision-making process, and uses and needs
    for data and information. D) interview a
    small number of top managers to identify their goals and criteria for achieving
    success.
    Answer: D
  10. 30) In CFS analysis, it is
    important to A) interview as many employees from different levels of the
    company as possible. B) create a broad inquiry into the various types of
    information used in the company. C)
    distinguish between organizational and individual CSFs. D) identify
    operational managers that can accurately portray the day-to-day information
    needs of the firm.
    Answer: C
  11. 31) The central method used
    in a portfolio analysis is to A)
    inventory all of the organization's information systems projects and assets.
    B) perform a weighted comparison of the criteria used to evaluate a system. C)
    survey a large sample of managers on their objectives, decision-making process,
    and uses and needs for data and information. D) interview a small number of top
    managers to identify their goals and criteria for achieving success.
    Answer: A
  12. 32) In using a portfolio
    analysis to determine which IT projects to pursue, you would A) select the most
    low-risk projects from the inventory. B) limit work to those projects with
    great rewards. C) select only low-risk, high-reward projects. D) balance high-risk, high reward projects
    with lower-risk projects.
    Answer: D
  13. 33) Which method would you use is used to
    develop risk profiles for a firm's information system projects and assets? A)
    information systems plan B) scoring model C)
    portfolio analysis D) CSF
    Answer: C
  14. 34) The central method used
    in a scoring model is to A) inventory all of the organization's information
    systems projects and assets. B) perform
    a weighted comparison of the criteria used to evaluate a system. C) survey
    a large sample of managers on their objectives, decision-making process, and
    uses and needs for data and information. D) interview a small number of top
    managers to identify their goals and criteria for achieving success.
    Answer: B
  15. 35) You have been hired by a
    pharmaceutical company to evaluate its inventory of systems and IT projects.
    Which types of projects would be best avoided? A) any high risk projects B) any
    low-benefit projects C) all high-risk,
    low benefit projects D) none, any project might be beneficial
    Answer: C
  16. 36) Which method is used to
    assign weights to various features of a system? A) information systems plan B) scoring model C) portfolio
    analysis D) CSF
    Answer: B
  17. 37) The criteria used for
    evaluation in a scoring model are usually determined by A) lengthy discussions among the decision-making group. B) a CSF
    analysis. C) the IS steering committee. D) systems analysts.
    Answer: A
  18. 38) All of the following are
    intangible benefits of information systems except A) improved asset
    utilization. B) increased organizational learning. C) improved operations. D) reduced workforce.
    Answer: D
  19. 39) Which of the following
    is not a tangible benefit of information systems? A) reduced rate of growth in
    expenses B) lower computer expenses C)
    improved resource control D) increased productivity
    Answer: C
  20. 40) The worth of systems
    from a financial perspective essentially revolves around the issue of A) CSFs.
    B) adherence to information requirements. C) asset utilization. D) return on invested capital.
    Answer:D
  21. 41) You are using a capital
    budgeting method to assess the worth of your company's new information system.
    Which of the following costs would you include in measuring the cash outflow?
    A) increased sales of products B)
    hardware and software expenditures C) labor expenditures D) reduced costs
    in production and operation E) both A and D
    F) both B and C G) A, B, C and D
    Answer: F
  22. 42) In working with ROPMs
    and options valuation, a call option is a(n) A) obligation to purchase an asset
    at a later date at a fixed price. B) obligation to either purchase or sell an
    asset at a later date at a strike price. C) right to purchase an asset a later
    date at a strike price. D) right to
    purchase or sell an asset a later date at a fixed price.
    Answer: D
  23. 43) The principal capital
    budgeting models for evaluating information technology projects are the payback
    method, the accounting rate of return on investment (ROI), the net present
    value, and the A) future present value. B)
    internal rate of return. C) external rate of return. D) ROPM.
    Answer: B
  24. 44) ROPMs value information
    systems similar to stock options, in that A) ROPMs can be bought and sold like
    stocks. B) a company's worth can be evaluated by the worth of their ROPMs. C) initial expenditures on IT projects
    are seen as creating the right to pursue and obtain benefits from the system at
    a later date. D) expenditures and benefits from IT projects are seen as
    inflows and outflows of cash that can be treated themselves like options.
    Answer: C
  25. 45) To best evaluate, from a
    financial standpoint, an IT investment whose benefits cannot be firmly
    established in advance, you would use A) capital budgeting. B) the real option pricing model. C) a
    scoring model. D) the net present value.
    Answer: B
  26. 46) The level of a project's
    risk is influenced primarily by A)
    project size, project structure, and the level of technical expertise. B)
    project cost, project scope, and the implementation plan. C) project scope,
    project schedule, and project budget. D) project size, project scope, and the
    level of technical expertise.
    Answer: A
  27. 47) The project risk will
    rise if the project team and the IS staff lack A) legacy applications as a
    starting point. B) good equipment. C)
    the required technical expertise. D) financial studies and plans.
    Answer: C
  28. 48) The organizational
    activities working toward the adoption, management, and routinization of a new
    information system are called A) production. B) maintenance. C) implementation. D) acceptance.
    Answer: C
  29. 49) Which of the following
    is not one of the activities of the systems analyst? A) acting as a change
    agent B) communication with users C) mediating between competing interest groups D) formulation of capital budgeting
    models
    Answer: D
  30. 50) One example of an
    implementation problem is A) poor user interface. B) inadequate user training. C) project running over budget. D)
    changes in job activities and responsibilities.
    Answer: B
  31. 51) According to your
    reading of the chapter, change management is a process that A) should be addressed before a project is
    developed. B) begins when a project is implemented. C) is used primarily to
    mandate user acceptance. D) must be addressed in all systems development.
    Answer: A
  32. 52) Users prefer systems
    that A) are oriented to facilitating
    organizational tasks and solving business problems. B) work with existing
    DBMS. C) are able to provide optimum hardware and software efficiency. D) are
    capable of storing much more data than they need.
    Answer: A
  33. 53) The communications gap
    between users and systems designers is created by their differences in A)
    backgrounds. B) interests. C) priorities. D) A and B. E) B and C. F) all of the above.
    Answer: F
  34. 54) Which of the following
    types of projects is most likely to fail? A) integration of an third-party
    automated payment system B) replacement of middleware with Web services for
    legacy application integration C) a
    business process redesign project that restructures workflow and
    responsibilities D) redesigning a user interface to an online investment
    site
    Answer: C
  35. 55) Which of the following
    is not a responsibility of effective change management? A) integrating legacy systems B) dealing with fear and anxiety
    about new systems C) training users of the new system D) enforcing user
    participation at all stages of system development
    Answer: A
  36. 56) Which of the following tools would you use
    to control risk factors in an information systems project? A) internal
    integration tools B) external integration tools C) formal planning tools and
    formal control tools D) A and B E) A and C F)
    all of the above
    Answer: F
  37. 57) Internal integration
    tools A) enable a project to have
    sufficient technical support for project management and development. B)
    enable a project manager to properly document and monitor project plans. C)
    portray a project as a network diagram with numbered nodes representing project
    tasks. D) consist of ways to link the work of the implementation team with
    users at all organization levels.
    Answer: A
  38. 58) An example of using an
    internal integration tool would be to A) define task dependencies. B) include
    user representatives as active members of the project team. C) create a PERT
    chart. D) hold frequent project team
    meetings.
    Answer: D
  39. 59) Formal planning and
    control tools A) enable a project to have sufficient technical support for
    project management and development. B)
    enable a project manager to properly document and monitor project plans. C)
    portray a project as a network diagram with numbered nodes representing project
    tasks. D) consist of ways to link the work of the implementation team with
    users at all organization levels.
    Answer: B
  40. 60) External integration
    tools A) enable project a to have sufficient technical support for project
    management and development. B) enable a project manager to properly document
    and monitor project plans. C) portray a project as a network diagram with
    numbered nodes representing project tasks. D)
    consist of ways to link the work of the implementation team with users at all
    organization levels.
    Answer: D
  41. 61) An example of
    using an external integration tool would be to A) define task dependencies. B) include user representatives as active
    members of the project team. C) create a PERT chart. D) hold frequent
    project team meetings.
    Answer: B
  42. 62) Which type of planning tool shows each
    task as a horizontal bar whose length is proportional to the time required to
    complete it? A) PERT chart B) Gantt
    chart C) both A and B D) neither A nor B
    Answer: B
  43. 63) To review a project's tasks and their
    interrelationships, you would use a A)
    PERT chart. B) Gantt chart. C) either A or B. D) neither A nor B.
    Answer: A
  44. 64) Which type of tool helps
    project managers identify bottlenecks in project development? A) internal
    integration tools B) external integration tools C) formal planning and control tools D) both B and C
    Answer: C
  45. 65) Which of the following
    is a limitation of using a financial approach to evaluate information systems?
    A) inability to measure ROI B) inability to control vendor costs C) inability
    to assess risk D) inability to assess
    costs from organizational disruption
    Answer: D
  46. 66) Which of the following
    statements best describes the effect of project structure on overall project
    risk? A) Highly structured projects are more complex, and run a higher risk of
    programmers and users misunderstanding the ultimate goals. B) Projects with relatively undefined goals are more likely to be
    subjected to users changing requirements and run a higher risk of not
    satisfying project goals. C) Highly structured projects tend to be larger,
    affecting more organizational units, and run both the risk of out-of-control
    costs and becoming too difficult to control. D) Less structured projects are
    more able to be quickly developed, tested, and implemented using cutting-edge
    RAD and JAD development techniques, and pose less risk of running up unforeseen
    costs.
    Answer: B
  47. 67) Which of the following
    is not an organizational factor in systems planning and implementation? A)
    standards and performance monitoring B) government regulatory compliance C)
    health and safety D) user interface
    Answer: D
  48. 68) In sociotechnical design
    A) separate sets of technical and social
    design solutions are developed and compared. B) ergonomic features of a
    system and the system's technical design are given equal importance. C) systems
    analysts with proven backgrounds in sociological concerns rate and compare a
    system's social and technical aspects. D) all of the above.
    Answer: A
  49. 69) The most widely used
    project management software today is A) Vertabase. B) IBM Project Guide. C) Microsoft Project. D) Microsoft
    Excel.
    Answer: C
  50. 70) As discussed in the
    chapter, which of the following is not one of the immediate consequences of
    inadequate software project management? A) cost overruns B) organizational conflict C) time slippage D) technical shortfalls
    Answer: B

What would you like to do?

Home > Flashcards > Print Preview