New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
computer sciences
information systems
MIS Essentials 4th edition David M. Kroenke - Solutions
To what extent does the dynamic you identified in your answer to item1 pertain to databases? Do you think it likely that, in 2050, some small business owners will retire and make statements like, “We did well with the business, but we made our real money from the database we generated.”? Why or
Considering your answers to items 1 through 4, identify two organizations in your community that could generate a database that would potentially be more valuable than the organization itself. Consider businesses, but also think about social organizations and government offices.
Relate what you have learned in this exercise to the 3D printing discussion at AllRoad Parts.
Prepare a 1-minute statement of what you have learned from this exercise that you could use for a job interview to illustrate your ability to innovate the use of technology in business.
Suppose you are a marketing assistant for a consumer electronics company and are in charge of setting up your company’s booth at tradeshows. Weeks before the shows, you meet with the marketing managers and determine what displays and equipment they want to display. Then you identify each of the
Samantha Green (the same Samantha we met at the end of Chapter 3, p. 71) owns and operates Twigs Tree Trimming Service. Recall that Samantha has a degree from a forestry program and recently opened her business in St. Louis, Missouri. Her business consists of many one-time operations (e.g.,
YourFire, Inc., (the same YourFire we met at the end of Chapter 3, p. 75) is a small business owned by Curt and Julie Robards. Based in Brisbane, Australia, YourFire manufacturers and sells the YourFire, a lightweight camping stove the. Recall that Curt used his previous experience as an aerospace
Analyze the spreadsheet shown in Figure 5-17and list all of the problems that occur when trying to track the assignment of sheet music using this spreadsheet.
The following two tables could be used to store the data in Figure 5-17 in a database.Choir Member (Last Name, First Name, Email, Phone, Part)Musical Work (Name of Work, Composer, Part, Copy Number)This notation means there are two tables, one named Choir Member and a second named Musical Work. The
A three-table database design for the data in the spreadsheet in Figure 5-17 is as follows:Choir Member (Last Name, First Name, Email, Phone, Part)Musical Work (Name of Work, Composer)Check Out (Last Name, First Name, Name of Work, Part, Copy Number, Date In, Date Out)a. Redraw the data in Figure
Assume you manage the choir and you foresee two possibilities: • Keep the spreadsheet, but create procedures to reduce the likelihood of data integrity problems • Create an Access database and database application for the three-table design
1. Clearly, Dynamo, Bigtable, and Cassandra are critical technology to the companies that create them. Why did they allow their employees to publish academic papers about them? Why did they not keep them as proprietary secrets?2. What do you think this movement means to the existing DBMS vendors?
Search the Internet for ISO 27001. Explain the purpose of this standard.
Based on your answers to these questions create a general statement as to the desirability, considering only data security, of storing data on Azure and EC2 as compared to storing it on servers managed in-house.
Does compliance with ISO 27001 mean that a data center is secure? Does it mean that no security threat against compliant data centers will be successful? What does it mean?
Search the Internet for evidence that Microsoft Azure complies with ISO 27001. Summarize your findings.
Many small businesses operate with local servers running in storerooms, broom closets, and the like. Summarize the major risks of this situation. How can using a cloud vendor that is scores well according to the standards discussed help such companies?
Suppose a publicly traded large organization operates its own Web farm and has certifications indicating that it has complied with ISO 27001 and has issued a statement of controls in accordance with SAS 70 that indicates controls are at least adequate. Is there any reason to believe that the
Define cloud and explain the three key terms in our definition. Using Figure 6-3 as a guide, compare and contrast cloud-based and in-house hosting. In your opinion, explain the three most important factors that make cloud-based hosting preferable to in-house hosting.
Apple invested more than $1 billion in the North Carolina data center shown in Figure 6-2. For Apple to spend such a sum, it must perceive the iCloud as being a key component of its future. Using the principles listed in Figure 3-2 (page 57) explain all the ways that you believe the iCloud will
Suppose that you work at AllRoad Parts and Kelly tells you that she doesn’t believe that cheap, elastic provisioning of servers is possible. “There has to be a catch somewhere,” she says. Write a one-page memo to her explaining how the cloud works. In your memo, include the role of standards
Using the knowledge of this chapter and the intuition of the members of your team, summarize threats that cloud services present to such ISVs.
Suppose your team owns and manages one of these ISVs. You learn that more and more of your clients are choosing SaaS cloud services like Google for email, rather than setting up local email servers.a. What, if anything, can you do to prevent the encroachment of SaaS on your business?b. Given your
Describe the IS services that your new business could provide for the business needs you identified in your answer to question 4.
Given your answers to questions 1–5, would you rather be an existing ISV attempting to adapt to this new world or an entirely new company? Compare and contrast the advantages and disadvantages of each alternative.
Changing technology has, for centuries, eliminated the need for certain products and services and created the need for new products and services. What is new, today, however, is the rapid pace at which new technology is created and adapted. Using cloud services as an example create a statement of
1. In your own words, summarize the dealer-broker record retention requirements.2. Reread the SEC’s 2003 interpretation. In your own words, explain the difference between “integrated hardware and software control codes” and software applications that use “authentication and approval
Suppose you manage a sales department that uses the SaaS product Salesforce.com. One of your key salespeople refuses to put his data into that system. “I just don’t believe that the competition can’t steal my data, and I’m not taking that risk.” How do you respond to him?
Go to aws.amazon.com and search for AWS database offerings. Explain the differences among Simple Database Service, Amazon Relational Store, and MongoDB. Which of these three would you recommend for storing AllRoad Parts’ 3D printing design files? (By the way, whenever you query the Internet for
Supposed Lucas wants AllRoad to set up a private internet, and he justifies this request on the basis of better security. Explain why that is not a good decision, and rebut his claim about security by suggesting that AllRoad use a VPC. Justify your suggestion.
In five sentences or less, explain how the cloud will affect job prospects for you in the next 10 years.
Given your answers to questions1and 2, (and those of other teams if you have been presenting to each other), consider the desirability of CRM product offerings for a variety of businesses. Specifically, suppose you have been asked to recommend two of the CRM products you’ve explored for further
Summarize what you have learned from this exercise about choosing a CRM product. Formulate your summary as an answer to a job interviewer’s question about the difficulties that organizations face when choosing software products.
Using the example of your university, give examples of information systems for each of the four levels of scope shown in Figure 7-1.Describe three workgroup information systems that are likely to duplicate data. Explain how the characteristics of information systems in Figure 7-1 relate to your
In your answer to question 7-1, explain how the three workgroup information systems create information silos. Describe the kinds of problems that those silos are likely to cause.
Using your answer to question 7-2, describe an enterprise information system that will eliminate the silos. Would the implementation of your system require process reengineering? Explain why or why not.
Using Figure 7-5 as an example, redraw Figure 7-12 using an enterprise information system that processes a shared database. Explain the advantages of this system over the paper-based system in Figure 7-12.
Using Figure 7-5 as an example, redraw Figure 7-13 using an enterprise information system that processes a shared database. Explain the advantages of this system over the paper-based system in Figure 7-13.
Assuming that the county has just changed from the system in Figure 7-12 to the one in Figure 7-13, which of your answers in questions 2 and 3 do you think is better? Justify your answer.
Assume your team is in charge of the implementation of the system you recommend in your answer to question 4.Describe how each of the four challenges discussed in Q3pertain to this implementation. Explain how your team will deal with those challenges. Read the Guide on pages186-187, if you have not
1. Explain the advantages of locating the PRIDE database in the clouded. Flores and his partners could place it on one of their own servers in the practice. Give reasons why it would be unwise for them to do so.2. Explain the origin of Figures 7-15 and 7-16.What application created each? Where did
Is the information system you proposed in your answer to question 3 of Collaboration Exercise 7 an application of CRM, ERP, or EAI? If so, which one and why? If not, explain why not.
Explain how the four sources of challenge discussed in Q3 would pertain to the implementation of the PRIDE system. Give specific examples of each. In general, do you think these challenges are more difficult to overcome for an inter-enterprise system like PRIDE or for an enterprise system like CRM?
Visit www.salesforce.com/chatter to learn Chatter’s features and applications. Using what you learn, state one Chatter application for each of the value chain activities in Figure 8-6.
From the salesforce.com site, find three interesting Chatter applications other than General Electric’s. Summarize those applications.
One obvious example for SM machines is for the machines to report operational status, say speed, temperature, fuel usage, and so on, depending on the type of machine, to a Chatter or other SM site. How can the organization use such reporting in the context of machine, customer, and employee social
Name a company for which you would like to work. Using Figure 8-6 as a guide, describe, as specifically as you can, how that company could use social media. Include community type, specific focus, processes involved, risks, and any other observations.a. Sales and marketingb. Customer servicec.
Visit www.lie-nielsen.com or www.sephora.com. On the site you chose, find links to social networking sites. In what ways are those sites sharing their social capital with you? In what ways are they attempting to cause you to share your social capital with them? Describe the business value of social
State the particular goals of your group. Be as specific as possible
Create a list of criteria for evaluating your alternatives. Use iteration and feedback to find creative criteria, if possible.
Describe the five components of the SMIS you will create for your group. Be very specific with regard to the procedure and people components. Your goal should be to produce a result that could be implemented by any group of similarly motivated students on campus.
1. Search Facebook for Sedona, Arizona. Examine a variety of Sedona-area pages that you find. Using the knowledge of this chapter and your personal social media experience, evaluate these pages and list several positive and negative features of each. Make suggestions on ways that they could be
According to Paul Greenberg, Amazon.com is the master of the 2-minute relationship and Boeing is the master of the 10-year relationship. Visit www.boeing.com and www.amazon.com. From Greenberg’s statement and from the appearance of these Web sites, it appears that Boeing is committed to
Visit socialmediatoday.com/ralphpaglia/141903/social-media-employee-policy-examples-over-100-companies-and-organizations. Find an organization with a very restrictive employee SM policy. Name the organization and explain why you find that policy restrictive. Does that policy cause you to feel
Discuss the meaning of “At each stage, the customer focus has pointed to the next component.” Restate this phrase in the words of your own group.
Do you agree that the focus of the BigData era is to influence behavior? What other focus interpretations of today’s era are possible?
Assume the next era computer industry will concern procedures and that the focus will be on people. One possible focus is to Eliminate Jobs. If that is the focus, what does it mean for business? For the economy? For you? Discuss your answers among your group and report your conclusions to the rest
Explain in your own words how Addison used Access to implement each of the five criteria that she and Drew developed.
Explain why the results in Figure 9-11 do not show promise for the selling of these part designs. In light of these results, should Addison and Drew change their criteria? If so, how? If not, why not?
Given the results in Figure 9-11, list three actions that AllRoad can take. Recommend one of these actions and justify your recommendation.
Summarize the ways that third-party cookies are created and processed. Even though cookies are not supposed to contain personally identifying data, explain how such data can readily be obtained.
Numerous browser features, add-ins, and other tools exist for blocking third-party cookies. Search the Web for block third-party cookies for xxx, and fill in the xxx with the name and version of your browser. Read the instructions, and summarize the procedures that you need to take to view the
Many companies have a conflict of interest with regard to third-party cookies. On the one hand, such cookies help generate revenue and pay for Internet content. On the other hand, trespassing on users’ privacy could turn out to be a PR disaster. As you learned in your answer to question 2,
The processing of third-party cookies is hidden; we don’t know what is being done behind the scenes with the data about our own behavior. Because there is so much of it and so many parties involved, the possibilities are difficult to comprehend, even if the descriptions were available. And if
Summarize the benefits of third-party cookies to consumers.
Using your own words, explain how third-party cookies are created.
Suppose you are an ad-serving company, and you maintain a log of cookie data for ads you serve to Web pages for a particular vendor (say Amazon).a. How can you use this data to determine which are the best ads?b. How can you use this data to determine which are the best ad formats?c. How could you
Suppose you are an ad-serving company, and you have a log of cookie data for ads served to Web pages of all your customers (Amazon, Facebook, etc.).a. Describe, in general terms, how you can process the cookie data to associate log entries for a particular IP address.b. Explain how your answers to
As stated, third-party cookies usually do not contain, in themselves, data that identifies you as a particular person. However, Amazon, Facebook, and other first-party cookie vendors know who you are because you signed in. Only one of them needs to reveal your identity to the adserver, and your
Reflect on the differences between reporting systems and data-mining systems. What are their similarities and differences? How do their costs differ? What benefits does each offer? How would an organization choose between the two BI tools?
Suppose you are a member of the Audubon Society, and the board of the local chapter asks you to help them analyze its member data. The group wants to analyze the demographics of its membership against members’ activity, including events attended, classes attended, volunteer activities, and
Suppose you are the director of student activities at your university. Recently, some students have charged that your department misallocates its resources. They claim the allocation is based on outdated student preferences. Funds are given to activities that few students find attractive, and
Describe the characteristics of BigData. Describe three student-related applications at your university that meet BigData characteristics. Describe patterns and relationships that might be found within that data.
Explain how you would use the SDLC to develop Garden Tracker.
Explain the process you would use to determine the feasibility of Garden Tracker.List data you need for such an assessment, and explain how you might obtain or estimate that data.
Consider just the tracking of recurring services, and list all of the requirements that you can imagine for that functionality. Be specific and answer at least the following:a. What data will you need?b. How will you input that data? Show a mockup of a data entry screen, and describe how it will be
Considering just the recurring services functionality, do you think it would be better to use Excel or Access for this project? List the criteria you used to answer that question. Summarize the consequences of making a poor choice between these two products.
Assume that you are an intern working with Maggie and that you are present at the initial conversations she has with Dr. Flores. Assume that Maggie asks you to help her investigate this opportunity.a. Develop a plan for this project using the SDLC. Describe, in general terms, the work to be done in
Answer question 10-1. Assume that Dr. Flores pushes back because he thinks that Maggie is making the project overly complicated, possibly to increase the size of her consulting engagement. Write a one-page memo explaining to Dr. Flores why it is important to follow the SDLC or some similar process.
Use Google or Bing to search for the phrase “what is a business analyst?” Investigate several of the links that you find and answer the following questions.a. What are the primary job responsibilities of a business analyst?b. What is the difference between a business analyst and a systems
Consider the technical feasibility of the two alternatives:a. Name and describe criteria you would use for alternative a.b. Name and describe criteria you would use for alternative b.c. Is it possible to know, without further investigation, whether either alternative is technically feasible? Why or
Consider organizational feasibility:a. Explain what organizational feasibility means in the context of an inter-enterprise system.b. List criteria you would use for assessing organizational feasibility for these alternatives. Differentiate criteria between the two alternatives if you think it is
Consider schedule feasibility:a. List criteria you would use for schedule feasibility for these alternatives. Differentiate criteria between the two alternatives if you think it is important to do so.b. Is either alternative ‘a’ or ‘b’ more likely to be schedule feasible than the other?
Consider cost feasibility:a. List sources of the major development costs for alternative a.b. List sources of the major operational costs for alternative a.c. List sources of the major development costs for alternative b.d. List sources of the major operational costs for alternative b.e. Which
Given your answers to questions 2 through 5, which of the alternatives do you believe is likely to be feasible? It could be both, just one, or neither. Justify your answer.
What would you say if one of the three principals were to ask you at this point, “Is it worthwhile for me to even consider this idea anymore?” Justify your answer. Without more data, you cannot make a true assessment, but apply your knowledge, experience, and intuition to formulate a response
Considering operational expenses,a. Which operational costs depend upon the number of doctors and the frequency of their use, and which do not?b. Which operational costs depend upon the number of patients and the frequency of their use, and which do not?c. Which operational costs depend upon the
Suppose you decide, using data that we do not yet have, that the PRIDE upside potential is large enough to justify the investment risk, if the cost estimates are accurate. They might be quite accurate, but then again, they could be low by a factor of 3 or even 5. How would you advise the investor
Assume that some of the costs are simply not knowable, by anyone, however skilled they are, at the time of the analysis. A good example is the cost of adapting PRIDE software to changes in healthcare law. Did you include any such costs in your answer to question 10-7? If so, are you wasting
State the major functions of this new IS department. Explain how each of the functions defined in this chapter pertain to PRIDE Systems.
Assume that the experience of hiring Ajit Barid worked well and that PRIDE Systems plans to continue application development with him. Describe factors that may make the investors nervous about this decision. Explain how you would respond to each of those factors.
Assume that PRIDE Systems will hire a cloud vendor to provide PaaS functionality. Explain what this means in general, and what it means in particular for PRIDE.
Given your answers to questions 2 and 3,a. What will be the function and goals of the Operations group (see Figure 11-1)?b. What will be the function and goals of the Development group? What job descriptions will this group need to staff?c. What will be the function and goals of the Outsourcing
Understanding that PRIDE Systems is a small startup company that needs to conserve its investment dollars, would you recommend outsourcing any of the following functions? If so, explain the risks of doing so. If not, explain how you would justify the costs associated with staffing that function
According to this chapter, information systems, products, and technology are not malleable; they are difficult to change, alter, or bend. How do you think senior executives other than the CIO view this lack of malleability? For example, how do you think IS appears during a corporate merger?
Suppose you represent an investor group that is acquiring hospitals across the nation and integrating them into a unified system. List five potential problems and risks concerning information systems. How do you think IS-related risks compare to other risks in such an acquisition program?
What happens to IS when corporate direction changes rapidly? How will IS appear to other departments? What happens to IS when the corporate strategy changes frequently? Do you think such frequent changes are a greater problem to IS than to other business functions? Why or why not?
Search the Internet to determine the power requirements for typical computing and office equipment. Consider laptop computers, desktop computers CRT monitors, LCD monitors, and printers. For this exercise, ignore server computers. As you search, be aware that a watt is a measure of electrical
Estimate the number of each type of device in use at your campus. Use your university’s Web site to determine the number of colleges, departments, faculty, staff, and students. Make assumptions about the number of computers, copiers, servers and other types of equipment used by each.
Using the data from items 1 and 2, compute the total power used by computing devices on your campus.
Showing 400 - 500
of 1599
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last
Step by Step Answers