All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
business
principles information systems
Questions and Answers of
Principles Information Systems
What is the role of the US-CERT organization?
Do you feel that the measures in place to protect your personal data you provide to health care organizations are sufficient? Why or why not? What would you like to see changed?
A new advertising and promotion-planning system is being developed for a major manufacturer of consumer products. Management is seeking candidates to serve as the product owner on this key $2
What do you think might be the biggest barriers to completion of the user acceptance testing in a timely manner?
Develop a simple data model for a student database that includes student contact data, student demographic data, student grades data, and student financial data. Determine the data attributes that
Do research to identify three top organizations that develop and operate e-commerce Web sites for their clients. Visit their Web sites and identify current job openings. What sort of responsibilities
Develop a list of seven key criteria that a nonprofit charitable organization should consider in selecting a CRM system. Discuss each criterion and assign a weight representing the relative
The Argosy BI and analytics program is aimed at boosting revenue not at reducing costs. Why do you think this is so?
What potential barriers to implementing this program could arise? How might these be overcome?
Many free and open source project management software programs are available online, including: Asana, BaseCamp, Bitrix24, GanttProject, MeisterTask, Trello, and Zoho. Choose one of these programs or
Evaluate any three of the many free and open source project management software programs. Create a spreadsheet that displays the pros, cons, and special features of each of the three programs.
Choose a company that interests your team and do research to document its strategic plan. Include a SWOT analysis and a statement of the organization’s vision, mission, objectives, goals, and
Your team has been hired as consultants to work with a large city to implement a program to place hundreds of high-tech digital cameras in strategic locations to aid in reducing crime and speeding
Steve Jobs was a strong, charismatic leader who cofounded Apple and is accredited with much of the success of the company. Some believe that Tim Cook, who became CEO in 2011, embraces a more
Visit the Project Management Institute (PMI) Web site at www.pmi.org. Do research to learn more about the value that employers place on project management certification. What are the certifications
Can you state the vision and mission of your organization? Has it documented its core values? Can you identify any key objectives and strategies?
Talk with your manager and others at work about the need for good project management in your organization. Do the people you spoke with see project management as a core competency? Do they feel that
Your normal work activities and responsibilities have not allowed you time to become familiar with this project and the new system and its capabilities. What actions would you take to get caught up
As part of the team’s initial project kickoff meeting, you have been asked to briefly summarize the differences between the waterfall and agile software development process. What would you say?
Following your discussion, one of the team members asks, “so why are we changing to a new software development process? We are all comfortable with the way we do things now.” What do you say?
You are acquiring a new information system for The Fitness Center, a company with three fitness centers in your metropolitan area, with a total of 1,200 members and 20 to 30 full and part-time
The preliminary investigation of a software project has been completed. Two different project teams have estimated the costs associated with the development and maintenance of a new system. One team
A new sales ordering system needs a relational database that contains a customer table, a product inventory table, and an order table. Use a word-processing, graphics, or spreadsheet program to draw
Your team has been hired to define the scope and feasibility of a project to create a database of job openings and descriptions for the companies visiting your campus each term. Students would be
Your team has been selected to monitor the disposal of your school’s 10-year-old student registration system. Develop a list of the activities that need to be completed to complete this task. Which
You and your team have been hired to perform a system investigation for a fast food restaurant that wants to implement new tools and processes to improve its customer service. Currently, the
Do research on the Web to identify application development tools that support the rapid development of high-quality apps for both iPhone and Android-based smartphones. Develop a spreadsheet that
Do research to identify the three leading electronic health record (EHR) systems. Go on social media and find comments from the users of these systems. If you were leading a project team to select an
Do research to determine the current level of adoption of DevOps around the globe. Which organizations seem to be leaders in DevOps? What initiatives are these companies taking that makes them
Perform research to learn what is required to have a successful career as a software developer for smartphones. What sort of education and experience is needed? What personal characteristics would be
Identify an information system frequently employed by people in a career field you are interested in. Discuss how you might be involved as a user in the development or acquisition of such a system
It is perhaps not surprising that Etsy was an early adopter of DevOps. It is a relatively small company, with a start-up culture, and its move to DevOps was championed by company leaders. Do you
Are there certain personal characteristics one should look for in candidates who will participate in or lead agile system projects? If so, what are they, and why are they important?How might the
How would you respond to this request? Why?Now that we have discussed various types of computer exploits, the people who perpetrate these exploits, and the laws under which they can be prosecuted, we
How is this attack different from an ordinary phishing attack?
Craft a communications that might be sent out to employees to thwart this attack.
Should this communications come from Human Resources, the corporate information systems security organization, or some other entity?
What actions can be taken to lessen the potential impact of future such attacks?
Identify three commonly used antivirus software packages. Develop a spreadsheet that compares the cost and fundamental features of each package. Which antivirus solution would you choose and why?
Draft a legitimate-looking phishing email that would strongly tempt its recipients to click on a link to a Web site or open an email attachment.
Use the data breach statistics found at http://www.idtheftcenter.org/images/breach/2005to2015mul tiyear.pdf to develop a bar chart showing the number of data breaches year-by-year by entity
You and your team have been hired to assess the computer security of a small retailer. Where would you begin your assessment? What would you look for?
Your team is assigned responsibility to identify an appropriate MSSP provider for a small, rural hospital. What criteria will you use to select an appropriate provider? Do research online to identify
Imagine that your team must obtain the email logon and password to as many email accounts as possible. Brainstorm ideas that might enable you to obtain these credentials.
Do research to find out more about DEF CON, one of the world’s largest hacker conventions, held annually in Las Vegas, Nevada. Who attends this conference, and what sort of topics are covered? Is
Do research to determine typical starting salaries for someone with a four-year degree in computer forensics. What is the future demand for individuals trained in computer forensics? Do further
Do research to learn more about the role of an information system security auditor. What is the role of an auditor, what sort of tasks does one perform, and what skills and training are necessary?
Do you think that Sony’s response to the attack was appropriate? Why or why not?What might Sony and the U.S. government done differently to discourage future such attacks on other U.S.
What is the harm in nonproductive use of information system resources, isn’t everybody doing it?
Should some sort of penalty be defined for violation of the guidelines or will this simply come across as “too heavy handed” and cause a worker rebellion?
Are there some unique issues that need to be addressed for people entering your career?
Identify recent examples of information system snafus causing disruptions. Do research to identify the root cause of the problem.
Identify and briefly discuss the most common examples you observe of coworkers wasting time in nonproductive use of information system resources. Do you believe your organization should take action
How do you feel about the data you provide your bank being shared with other financial institutions who can use that data to tailor special offers and promotions for you to refinance your home,
What are your feelings about the PRISM tool used the FBI and NSA to collect private electronic data belonging to users of major Internet services without having to request this data from the service
Imagine that you are starting a dating Web site to help match compatible couples. What sort of personal data might you need to gather? What measures would need to be taken to protect this sensitive
Your 13-year-old nephew shows you a half-dozen or so innocent photos of himself and a brief biography, including address and cell phone number that he plans to post on a social network for teens.
Identify and briefly discuss a difficult decision you had to make that had some ethical considerations. How do you feel about your decision making process in reaching a decision in this case? With
Should employers be able to monitor the email, text, and phone calls of employees? Is there any degree of “monitoring” that you find acceptable/ unacceptable?
Do research to identify the latest findings on the negative effects of sitting for long hours working at a computer. Find recommendations on how to arrange your desk and computer to avoid health
Organizational network analysis is a method for studying communication among individuals. Read the article: Making the Invisible Visible: SNA of the NSA by Joseph A.E. Shaheen at
Create an algorithm that rates how well individuals protect their privacy based on the data they reveal in their user profile and postings to social networks. The algorithm should generate a score of
Your team has been asked to develop your school’s first student code of ethics. How might you approach this task? Who might you try to involve? What might be some key tenants of such a code of
Imagine that your team has been hired to conduct a review of the information system policies and procedures employed in the student registration department at your school or university. Develop a
Have each member of your team access six different Web sites and summarize their findings in terms of the existence of data privacy policy statements. Did each site have such a policy? Was it easy to
Do research on Edward Snowden the U.S. computer professional, former Central Intelligence Agency employee, and former contractor for the United States government who copied and leaked classified
Do research to determine the current status of the Privacy Shield as a framework for governing trans border data flow. Write a brief report summarizing your findings.
Request a current copy of your free credit report through the AnnualCreditReport.com Web site. Review the report carefully for any inaccuracies. Follow the necessary steps to remove these
You have been offered an entry-level management position with a military aircraft manufacturer. Due to national security concerns, the organization has very strong policies against the personal use
You have been approached by the NSA to work in an information systems group that will use high-powered computers and advanced analytic techniques to study phone call metadata and other data that has
Do research to find any professional organization or code of ethics associated with your current or desired future career. What might be the benefits of joining such a professional organization? How
Why did Apple object to the court order in this case? What was the government’s rationale for compelling Apply to comply with the order?Do you think Americans should be willing to surrender some of
Do research on the Web to learn which programming language skills are currently most in demand in the job market. Write a brief report discussing the sources of information you used and summarizing
Use the Internet to search for information on real-time operating systems. Identify the key differences between real-time and non-real time operating systems. Identify three situations in which
Think of your ideal job. Would it help you to learn a programming language to be effective in this position? Why or why not?
As a team of three or four classmates, interview managers from three different organizations that have implemented a customer database. What data entities and data attributes are contained in each
Identify three specific smartphone applications that would be of significant help to you in your current or next job. (You can include applications that already exist as well as ones that you wish
Think of your ideal job. Identify two existing software applications for each sphere of influence that you would likely use in this career.
Identify and briefly describe the steps in the ETL process. What is the goal of the ETL process?
Consider three organizations that have databases that likely store information about you—the Federal Internal Revenue Service, your state’s Bureau of Motor Vehicles, and Equifax, the consumer
You and your team have been selected to represent the student body in defining the user requirements for a new student database for your school. What actions would you take to ensure that the student
Do research to find out more about the controversial NSA PRISM program. What is the source of data for this program? What is the purpose of the program? Are you a supporter of the PRISM program? Why
A company that provides a movie-streaming subscription service uses a relational database to store information on movies to answer customer questions. Each entry in the database contains the
Imagine that you and your team have been hired to develop an improved process for evaluating which students should be accepted to your college and, of those, which should be awarded academic
Use a database management system to build a data-entry screen to enter this data. Build a small database with at least a dozen entries.
Do research to find an example of an organization struggling to deal with the rapid growth of the big data it needs for decision making. What are the primary issues it is facing? What is the
Do research to find three different estimates of the rate at which the amount of data in our digital universe is growing. Discuss why these estimates differ.
How could you use big data to do a better job at work? Give some specific examples of how you might use big data to gain valuable new insights.
1. Identify some of the challenges associated with building an information system infrastructure to support this new service. Would cloud computing be an appropriate solution to address these
Develop a spreadsheet to track the amount of time you spend each day on Twitter, Instagram, Facebook, and other social networks. Record your times on each network for a two-week period. How much of
Keep track of the amount of time you spend on social networking sites for one week. Do you think that this is time well spent? Why or why not?
Do research to learn about the Amazon Web Services, Google Compute Engine, and Windows Azure cloud computing services. Write a paragraph summarizing each service. Prepare a spreadsheet to compare the
Think of a business that you might like to establish. Use a word processor to define the business in terms of what product(s) or service(s) it provides, where it is located, and its name. Go to
Form a team to identify IoT sensors in high demand in the medical device/pharma/bio-med industry. How are these sensors being used? What companies manufacture them? What do they cost if purchased in
Plan, set up, and execute a meeting with another team wherein you meet via the use of a Web service such as GoToMeeting or WebEx. What are some of the problems you encountered in setting up and
Do research to identify the top ten social networks in terms of number of worldwide active accounts. Which of these networks appears to be the fastest growing, slowest growing? Can you find a reason
Try using the Chinese search engine Baidu to find information on several politically sensitive topics or people. Write a brief summary of your experience.
View the movie The Social Network or read the book The Boy Billionaire, which offers insights into Mark Zuckerberg, the founder of Facebook. How did Zuckerberg recognize the potential of social
Identify a social networking organization that interests you. Do research to identify current job openings and the qualifications needed to fill open positions at the firm. Do any of these positions
Do research on the Web to identify the three to five countries that exercise the greatest amount of Internet censorship on its citizens. Briefly document each country’s censorship practices.
Showing 200 - 300
of 885
1
2
3
4
5
6
7
8
9