All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
business
information technology management
Questions and Answers of
Information Technology Management
Visit Oracle.com. Click the Solutions tab to open the menu; then click Data Warehousing under Technology Solutions.a. Select one of the Customer Highlightsb. Describe the customer’s challenges, why
Financial services firms experience large fluctuations in business volumes because of the cyclical nature of financial markets. These fluctuations are often caused by crises—such as the subprime
Visit YouTube.com and search for two videos on virtualization. For each video, report what you learned. Specify the complete URL, video title, who uploaded the video and the number of views.
Visit Rackspace at rackspace.com/ and review the company’s three types of cloud products. Describe each of those cloud solutions.
Visit eWeek.com Cloud Computing Solutions Center for news and reviews at eweek.com/c/s/Cloud-Computing/. Select one of the articles listed under Latest Cloud Computing News. Prepare an executive
Many organizations initiate data governance programs because of pressing compliance issues that impact data usage. Organizations may need data governance to be in compliance with one or more
When selecting a cloud vendor to host your enterprise data and apps, you need to evaluate the service level agreement (SLA).a.Research the SLAs of two cloud vendors, such as Rackspace, Amazon, or
Visit Dell.com and Apple.com to simulate buying a laptop computer. Compare and contrast the selection process, degree of customization, and other buying features. What are the barriers to entry into
Visit YouTube.com and search for two videos on Michael Porter’s strategic or competitive forces models. For each video, report what you learned. Specify the complete URL, video title, who uploaded
Visit the Web site of UPS (ups.com), Federal Express (fedex.com), and one other logistics and delivery company.a. At each site, what information is available to customers before and after they send a
Research the growing importance of big data analytics. Find two forecasts of big data growth. What do they forecast?
Why or how would understanding the latest IT trends influence your career?
Select three companies in different industries, such as banking, retail store, supermarket, airlines, or package delivery, that you do business with. What engage you, keep you informed, or create a
Assume you had:a. A tall ladder with a sticker that listed a weight allowance only 5 pounds more than you weighed. You know the manufacturer and model number.b. Perishable food with an expiration
What factors need to be considered when selecting a cloud vendor?
Why is resilience necessary?
What do business apps improve?
What is hyperscale?
Referring to trend 3, how should companies treat their data?
What are the benefits of crowdsourcing?
What technologies are blurring the boundary between the physical and digital worlds?
How can multitaskers improve their ability to focus?
What is the difference between the performance of high and low multitaskers on cognitive tests?
Why are senior managers interested in focus management?
When a person is distracted, how long does it take to return to the task at hand and get focused again?
What are the consequences of constant distractions?
What are several potential causes of cognitive overload?
What are the ethical challenges attached to 3D printing and 3D bioprinting?
When is predicting people’s behavior not a violation of privacy? Give an example.
When is predicting people’s behavior a violation of privacy? Give an example.
Age, disability, gender, religion, and race are examples of what?
Why will companies and recruiters continue to engage in social recruiting?
Describe privacy.
Is Target’s data mining and predictive analytics a success, a failure, or both? Explain your answer.
Which SnapChat claims of privacy protection were false?
What are four conversion methods?
Explain the feasibility tests and their importance.
What can be done to prevent runaway projects?
Why is information system design highly susceptible to scope creep?
What are the stages of the SDLC?
When are lessons learned from a completed project identified?
What costs should not be considered when deciding whether to kill a project?
Assuming no changes are made, what happens when a task on the critical path is delayed?
What is the length of a project?
What processes help to ensure that the impacts resulting from requested changes and corrective actions are managed across the project life cycle?
When the project plan is finalized and agreed to, what is any change to the baseline?
Explain the stages of the SDLC.
What is the type of bar chart that shows the timeline of the project schedule?
What feasibilities are needed prior to IT project approval?
What is the term for the piling up of small changes that by themselves are manageable but in aggregate are significant?
What identifies an opportunity, problem, or need and the desired business outcomes of the project?
Consider the statement: “hope is not a plan.” Does the statement apply to this project failure? Explain why or why not.
What risks might the use of project portfolio management (PPM) minimize? Do you think PPM can guarantee honest and unbiased project approvals or not? Explain your position.
What outsourcing challenges did eBay face? In your opinion, what were the reasons for these challenges?
Why do you think eBay selected outsourcing at its IT strategy instead of in-house development?
What types of companies can benefit from predicting people’s behavior?
By avoiding illegal conduct, do companies also act responsibly? Explain your answer.
Why are the legal concepts of discrimination and negligent hiring competing demands on a business?
Why does Target invest in predictive analytics?
How has IT changed the way you communicate in the last two years?
How does Target make such accurate predictions?
Clerks at 7-Eleven stores enter data regarding customers’ gender, approximate age, and so on, into a computer system. However, names are not keyed in. These data are then aggregated and analyzed to
Consider Max Drucker’s statement about employers being in a “tough spot.” Explain the two risks that employers face.
How can this predictor upset families who receive the promotions?
Do you think the consequences SnapChat faced as part of its settlement with the FT are harsh enough to deter false claims? Explain.
1. How much do crashes cost society?2. What can help decrease crashes?3. What types and percent of crashes can connected vehicle technology prevent?4. What are other benefits of
When organizations source their hiring to recruiting firms, how might that increase or decrease the risk of social media discrimination?
What is the use of social media to find, screen, and select job candidates?
Is Target’s “pregnancy predictor” a long-term competitive advantage? Explain.
1. Using privacy concepts from this chapter, identify the ways in which CarPlay can violate a user’s privacy.2. Consider the privacy paradox. How does that principle predict users’ reactions
What is the phenomenon where social users are concerned about privacy but their behaviors contradict these concerns?
How does Target create profiles of customers?
Assume users relied on SnapChat’s stated privacy policies and claims about how the app worked. What potential risks did SnapChat users face?
Answer the questions within the case. Explain the basis for your answers and opinions.
Refer to the discrimination scenarios in this chapter. For each scenario, explain whether or not it should be used in the hiring decision.
What shows who has primary responsibility and who has support responsibility for the tasks listed in the WBS?
What leads to a runaway project?
What is the longest path of tasks through a project?
Why are IT projects so susceptible to scope creep?
What events are used to manage the project work effort, monitor results, and report a meaningful status to project stakeholders?
Why is it tough to ignore sunk costs when evaluating a failing project?
If the business case is accepted, what document is prepared?
Explain how control activities are, in effect, risk management activities.
If a project is started without a documented baseline, what risks might the project and project team face?
What are the three attributes that must be managed effectively for successful completion and closure of any project?
Why should the go/no-go decision be made more than once in a project’s life cycle?
What are the items that you hand off to the client or management for their review and approval?
Refer to the Center for Project Management’s list of seven IT project management mistakes. Select two of these mistakes and explain how they contribute to project failure.
What is the approach that examines projects holistically and manages them as a strategic portfolio?
How does diagramming the triple constraint as a triangle clearly demonstrate how time, scope, and cost are interrelated?
Why is the critical path an important monitoring tool?
How can scope creep contribute to project failure?
What are the similarities between the U.S .Census project failure and the DIA automated baggage-handling project failure?
Why should each deliverable be made a milestone?
What are the triple constraints?
1. What features support project planning?2. What features support project monitoring and control?3. How is change management supported?4. What did CloudBase3 identify as shortcomings or
Do you think that projects that are needed to comply with regulations, such as the international anti-money-laundering (AML) laws that require firms to know your customer (KYC), should undergo the
What distinguishes a project from operations?
Were any problems unforeseeable?
1. Steve Jobs shows the importance of people skills. Explain Jobs’ way of motivating people. For example, did he try to get everyone to like him? Did he try to get everyone to get along with each
Showing 500 - 600
of 1319
1
2
3
4
5
6
7
8
9
10
11
12
13
14