logo image

CSIS

Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks.
Enterprise Applications
When planning an information system, a company must consider how a new system will interface with older systems, which are called
Legacy systems
A business ____ is an overview that describes a company’s overall functions, processes, organization, products, services, customers, suppliers, competitors, constraints, and future direction.
profile
which of the following is one of the main sectors of e-commerce
B2C
____ enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.
EDI
Transaction processing (TP) systems ____.
process data generated by day-to-day business operations
User productivity systems____
include e-mail, voice mail, fax, video and Web conferencing, word processing, automated
calendars, database management, spreadsheets, desktop publishing, presentation graphics, company intranets, and integrated mobile computing systems
In a typical company organizational model, top managers ____.
develop long-range plans, called strategic plans, which define the company’s overall mission and goals
A ____, or requirements model, describes the information that a system must provide.
business model
____ is a systems development technique that tests system concepts and provides an opportunity to examine input, output, and user interfaces before final decisions are made.
Prototyping
____ methods include the latest trends in software development.
Agile/Adaptive
Structured analysis is a traditional systems development technique that uses a series of phases, called the ____, to plan, analyze, design, implement, and support an information system.
SDLC
Agile methods typically use a(n) ____ model, which represents a series of iterations based on user feedback.
Spiral
The ____ group typically provides leadership and overall guidance, but the systems themselves are developed by teams consisting of users, managers, and IT staff members.
Application development
A(n) ____ investigates, analyzes, designs, develops, installs, evaluates, and maintains a company’s information systems.
System Analyst
_________________________ refers to the combination of hardware, software, and services that companies use to manage, communicate, and share information.
Information Technology
_________________________ is a step-by-step process for developing high-quality information systems.
System Analysis and Design
A(n) _________________________ combines information technology, people, and data to support business requirements.
Information System
Internet-based commerce is called _________________________ and includes two main sectors: B2C (business-to-consumer) and B2B (business-to-business).
e-commerce
_________________________ technology uses high-frequency radio waves to track physical objects.
RFID
A truck fleet dispatcher might run a series of _________________________ scenarios to determine the impact of increased shipments or bad weather.
What If
_________________________ programs run on a company intranet and enable users to share data, collaborate on projects, and work in teams.
Groupware
1. Systems development typically starts with a ____.
systems request, followed by a preliminary investigation, which includes a feasibility study
During strategic planning, top managers ask a series of questions that is called a ____ analysis because it examines a company’s strengths, weaknesses, opportunities, and threats.
SWOT
____ limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced.
Performance
____ components can provide automated response to sales inquiries, Web-based order processing, and online inventory tracking.
Customer Relationship Management CRM
When evaluating systems requests, which of the following is an advantage of a systems review committee ____.
One person’s bias is less likely to affect the decision
A feasibility study includes tests for ____ feasibility, which means that a proposed system will be used effectively after it has been developed.
Operational
A feasibility study includes tests for ____ feasibility, which refers to the practical resources needed to develop, purchase, install, or operate the system.
Technical
A(n) ____ is an example of an intangible benefit.
user-friendly system that improves employee job satisfaction
Of the measures of feasibility in the accompanying figure, ____ considers questions such as “Does management support the project?” and “Will the new system require training for users?”
operational feasibility
____ is an example of a discretionary project.
Creating a new report for a user
A popular technique for investigating causes and effects is called a ____ diagram, which is an analysis tool that represents the possible causes of a problem as a graphical outline.
fishbone
To avoid the problem of project creep, ____.
define project scope as clearly as possible
A(n) ____ is a requirement or condition that a system must satisfy or an outcome that a system must achieve.
constraint
The primary method of obtaining information during the preliminary investigation is to____.
Conduct Interviews
A survey is ____, generally takes less time, and can involve a broad cross-section of people.
not as flexible as a series of interviews, but it is less expensive
The term _________________________ refers to the reasons, or justification, for a systems development proposal.
business case
A(n) _________________________ describes a company for its stakeholders and briefly states the company’s overall purpose, products, services, and values.
mission statement
To achieve its goals, a company develops a list of shorter-term_________________________, which translate into day-to-day business operations.
objectives
_________________________ are vital objectives that must be achieved for an enterprise to fulfill its mission.
critical success factors
Some common security controls include passwords, various levels of user access, and _________________________, or coding of data to keep it safe from unauthorized users.
encryption
A systems request must pass several tests, called a(n) _________________________, to see whether it is worthwhile to proceed further.
feasibility test
_________________________ are advantages that are difficult to measure in dollars but are important to a company.
intangible benefits
8. A(n) _________________________ is included in the report to management if you need to attach supporting information (e.g., the interviews you conducted, the documentation you
reviewed).
appendix
A project manager’s planning _____.
includes identifying project tasks and estimating completion times and costs
A project manager’s scheduling function _____.
involves staffing, which includes selecting the project team and assigning specific tasks to team members
For a project manager, monitoring _____.
requires guiding, supervising, and coordinating the project team’s workload
PERT/CPM is called a(n) ____ technique, because it analyzes a large, complex project as a series of individual tasks.
bottom-up
The first step in creating a WBS is to ____.
identify all tasks
A ____ might involve maximums for one or more resources.
start day/date
Two or more concurrent tasks often depend on a single prior task, which is called a(n) ____ task.
predecessor
When two or more concurrent tasks depend on a single prior task, the concurrent tasks are called ____ tasks.
sucessors
A ____ is an event that could affect a project negatively
risk
Most risk identifications include a brief description of ____.
who would be responsible for responding to a given risk
When an information system does not meet business requirements, causes might include ____.
imprecise targets
Problems with timetables and project milestones can indicate ____.
personality conflicts among team members
When a project manager first recognizes that a project is in trouble, the options available to her include ____.
delaying the project deadline
A project triangle shows three legs: _____.
project cost, scope, and time
To schedule a project, a project manager can use a(n) ____________________ like the one in the accompanying figure, which is a horizontal bar chart that represents a series of tasks.
gantt chart
A(n) ____________________ is a recognizable reference point that can be used to monitor progress and manage a project.
event milestone
A(n) ____________________ represents the amount of work that one person can complete in one day.
person-day
When estimating the duration of a task, the project manager makes three time estimates for the task and then assigns a(n) ____________________, which is an importance value, to each estimate.
weight
____________________ can involve dependent tasks, multiple successor tasks, and multiple predecessor tasks.
task patterns
A(n) ____________________ is a review of a project team member’s work by other members of the team.
structure walk through
In Microsoft Project, a(n) ____________________ is similar to a PERT chart.
network diagram

Need essay sample on "CSIS"? We will write a custom essay sample specifically for you for only .90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register
Signup & Access Essays

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy