CIS 207T CIS207T CIS/207T ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX
$149.99$275.00
CIS 207T CIS207T CIS/207T ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX
CIS 207T All DQs
CIS 207T Week 1 Discussion Availability
CIS 207T Week 1 WileyPLUS Weekly Exam
CIS 207T Week 2 Discussion Information Systems
CIS 207T Week 2 WileyPLUS Weekly Exam
CIS 207T Week 3 Discussion Networking Tasks
CIS 207T Week 3 WileyPLUS Weekly Exam
CIS 207T Week 4 Discussion Database Management
CIS 207T Week 4 WileyPLUS Weekly Exam
CIS 207T Week 5 Discussion Security as a Technical Issue
CIS 207T Week 5 WileyPLUS Weekly Exam
Description
CIS 207T CIS207T CIS/207T ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX
CIS 207T All DQs
CIS 207T Week 1 Discussion Availability
CIS 207T Week 1 WileyPLUS Weekly Exam
CIS 207T Week 2 Discussion Information Systems
CIS 207T Week 2 WileyPLUS Weekly Exam
CIS 207T Week 3 Discussion Networking Tasks
CIS 207T Week 3 WileyPLUS Weekly Exam
CIS 207T Week 4 Discussion Database Management
CIS 207T Week 4 WileyPLUS Weekly Exam
CIS 207T Week 5 Discussion Security as a Technical Issue
CIS 207T Week 5 WileyPLUS Weekly Exam
CIS 207T CIS207T CIS/207T ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX
CIS 207T All DQs
CIS 207T Week 1 Discussion Availability
CIS 207T Week 2 Discussion Information Systems
CIS 207T Week 3 Discussion Networking Tasks
CIS 207T Week 4 Discussion Database Management
CIS 207T Week 5 Discussion Security as a Technical Issue
CIS 207T CIS207T CIS/207T ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX
CIS 207T Week 1 Discussion Availability
Respond to the following in a minimum of 175 words:
Information technology makes it possible to “never be out of touch.”
Discuss the pros and cons of always being available to your employers and clients regardless of where you are or what you are doing.
CIS 207T CIS207T CIS/207T ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX
CIS 207T Week 1 WileyPLUS Weekly Exam
CIS 207T Week 1 WileyPLUS Weekly Exam
For this activity, you will take a graded exam. You should complete this exam after you have completed all of the other materials and activities for this week.
Complete this graded exam by doing the following:
1. Click the link to begin the graded exam.
2. Read the exam policies carefully.
3. Click the Next button to begin the exam.
4. Read each question carefully. Then, answer the question and click the Submit Answer button to submit each answer for grading.
Question 1
Which of the following is NOT an advantage of central management of information systems in the University System of Georgia?
independence
standardization
convenience for students
consolidation of purchasing
Question 2
The University System of Georgia’s CIO believes the best way to collaborate with 31 independent-minded university CIO’s is to look for scenarios where three to five universities are planning to purchase the same product and therefore can consolidate their buying or centralize their service. One specific example of how the CIO utilized this strategy to resolve a problem was to develop a centralized system for _________.
student registration
paying tuition
class management
managing faculty benefits
Question 3
All _______ are ____________.
TPS; ERP
TPS; dashboards
ERP; TPS
dashboards; TPS
Question 4
____________ is developed through learning and is the experience and expertise that managers can apply to business problems.
Data
Knowledge
Information
All of the above
Question 5
In the following table, column A is _____, column B is _____, and column C is ______.
information; knowledge; data
knowledge; information; data
information; data; knowledge
knowledge; data; information
Question 6
As you are walking to the cafeteria to pick up your lunch, you see a poster with the word “apple” on it with a picture of an apple below it. This is ____.
information
knowledge
data
business intelligence
Question 7
The IT infrastructure is ___________.
the IT components
the IT personnel
the IT services
all of the above put together
Question 8
___________ are the “capstone” information systems in an organization.
TPSs
Dashboards
FAISs
ERP systems
Question 9
___________ handle tactical decisions.
Knowledge workers
Clerical
Lower-level managers
Middle managers
Question 10
__________ analysis involves identifying the best advertising channels.
Price
Promotion
Site
Product
Question 11
Warby Parker can offer cheaper glasses than their competition because they _______.
allow shoppers to upload pictures of themselves in glasses
use the same materials and factories as Luxottica without the licensing fees
use better retailers that pay more for the glasses
write-off their donated glasses on their taxes
Question 12
Warby Parker is competitor of __________.
Amazon
Warner Brothers
LensCrafters
Question 13
Watch the following video and answer the question below.
IT decreases the number of employees who can report to a single manager.
True
False
Question 14
Chevron employed ________ to provided detailed work instructions to its employees.
Six Sigma
Lean Six Sigma
SAP
Nimbus
Question 15
Chevron initially utilized ___________ to improve their supply chain, followed by employee-driven ________ initiatives, and then adopted a unified _____ approach to standardize business processes.
BPI, BPM, BPR
BPM, BPI, BPR
BPS, BPR, BPM
BPR, BPI, BPM
Question 16
Chevron has used _________, a methodology that combines statistical process analysis with techniques to eliminate waste and improve process flow, since 2006.
Lean Six Sigma
Nimbus
SAP
Six Sigma
Question 17
Organizations adopt BPI to sustain BPM over time.
True
False
Question 18
Chevron’s strategy was to analyze its existing processes to identify specific areas to improve.
True
False
Question 19
A(n) __________ refers to a small number of companies that dominate the business and are making large margins.
monopoly
oligopoly
autopoly
minopoly
Question 20
IT has changed the manager’s job in many ways. Which of the following is NOT the result of this change?
Easier to make a decision
Remote supervision
Real-time information
More information to address
Question 21
Which of the following is TRUE?
IT only helps improve employees’ health and safety.
IT can eliminate any job.
IT opens up jobs for middle managers.
IT impacts entire industries.
Question 22
Which company used software to disrupt the previous market-leading companies in the book industry?
Barnes and Noble
Books-a-Million
Amazon
Walmart
Question 23
Which of the following is a fast-growing company that is disrupting the traditional job recruiting industry?
Amazon
Question 24
Which industry is currently using drones as part of its business model?
Agriculture
Automobile
National defense
Retail
Question 25
IT changes managers’ job by _________
decreasing the volume of information they have to process.
providing near real-time information so managers can make quicker decisions.
improving an employee’s sense of connectedness.
making it easier to get all employees to work from one location.
CIS 207T CIS207T CIS/207T ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX
CIS 207T Week 2 Discussion Information Systems
Respond to the following in a minimum of 175 words:
Identify two information systems you interact with on a daily basis.
Describe how one of the identified systems contributes to the success of the organization or business that uses the system? For example, the register at the check-out line in the grocery store is a transactional systems that helps identify which products are selling. This information helps those in charge decide what to keep on the shelves. This information also helps accounting keep track of revenue and logistics keep track of invent
CIS 207T CIS207T CIS/207T ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX
CIS 207T Week 2 WileyPLUS Weekly Exam
CIS 207T Week 2 WileyPLUS Weekly Exam
For this activity, you will take a graded exam. You should complete this exam after you have completed all of the other materials and activities for this week.
Complete this graded exam by doing the following:
1. Click the link to begin the graded exam.
2. Read the exam policies carefully.
3. Click the Next button to begin the exam.
4. Read each question carefully. Then, answer the question and click the Submit Answer button to submit each answer for grading.
Question 1
B2B e-commerce comprises about _____ percent of e-commerce volume.
85
15
35
55
Question 2
Buy-side marketplaces use _______________ auctions and are suitable for ___________.
forward; procurement
forward; customization
reverse; customization
reverse; procurement
Question 3
Your textbooks are examples of a _____________ for your education.
Procurement goods
Direct materials
Purchasing goods
Indirect materials
Question 4
_____________________ exchanges connect buyers and sellers across many industries.
Multi-dimensional
Vertical
Horizontal
Functional
Question 5
The goal of group purchasing in the buy-side marketplace is to ____________.
get the best deal in a forward auction
share resources among partner companies
attract more seller attention
bring up the product’s value in a reverse auction
Question 6
The sell-side marketplace is similar to the _________ model.
C2B
C2C
B2C
B2G
Question 7
Buy-side marketplaces use reverse auctions.
True
False
Question 8
When organizations come to a company’s Web site for procurement, such business is classified as a(n):
buy-side marketplace.
sell-side marketplace.
electronic exchange.
None of these.
Question 9
Information Systems for marketing incorporate the following functions: (check all that apply)
Inventory & quality management
Customer relationship management
Auditing
Planning production and operations
Budgeting
Supply chain management
Recruitment
Logistics and materials management
Financial planning and forecasting
Question 10
Information Systems for production and operations management (POM) incorporate the following functions: (check all that apply)
Customer relationship management
Inventory and quality management
Supply chain management
Auditing
Planning production and operations
Logistics and materials management
Financial planning and forecasting
Budgeting
Question 11
Which of the following is not a function of functional area information systems?
providing information to managers in the functional areas
supporting the managerial tasks of planning, organizing, and controlling operations
providing information primarily in the form of reports
providing data from business events to the corporate database
providing analysis capabilities to middle-level managers and staff
Question 12
Functional information systems support the entire enterprise or major portions of it.
True
False
Question 13
Exception reports show a greater level of detail than is included in routine reports.
True
False
Question 14
_____ reports show a greater level of detail than is included in routine reports.
Ad hoc
Routine
Drill-down
Key-indicator
Exception
Question 15
GM’s new service lane automation application is a type of ___________ system.
ERP
FAIS
TPS
expert
Question 16
______________________ are often populated with data from source data automation technologies such as bar code scanners.
FAIS
TPS
DSS
ERP
Question 17
Sentiment analysis extracts _________ information in source materials, which is particularly useful in __________.
objective; business databases
subjective; social media
objective; social media
subjective; business databases
Question 18
Sentiment analysis algorithms use simple terms to express sentiment about a product or service, so ________ makes it __________ to classify online content as positive, negative, or neutral.
exaggeration; difficult
exaggeration; simple
sarcasm; difficult
sarcasm; simple
Question 19
The entertainment industry primarily uses sentiment analysis to improve their ______.
marketing campaigns
TV show times
advertising revenue
movie release dates
Question 20
BI encompasses applications, processes, and technology.
True
False
Question 21
BI can support organizational transformation.
True
False
Question 22
____________ is NOT categorized as BI.
Applications
Hardware
Processes
Technologies
Question 23
___________ is a subset of BI according to Thomas Davenport.
Reporting
OLAP
Business analytics
Querying
Question 24
Which of the following is NOT a requirement of TPSs?
Must record results accurately and securely
Must ensure overlapping updates can’t occur
Must maximize downtime
Have to efficiently handle large variations in volumes of data
Question 25
_____ reports contain special information not found in routine reports.
Ad hoc
Summary
Drill-down
Key-indicator
Exception
CIS 207T CIS207T CIS/207T ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX
CIS 207T Week 3 Discussion Networking Tasks
Respond to the following in a minimum of 175 words:
Is there any overlap between the tasks of the administrators in each environment?
Based on this week’s lessons, what networking tasks interest you the most?
CIS 207T CIS207T CIS/207T ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX
CIS 207T Week 3 WileyPLUS Weekly Exam
CIS 207T Week 3 WileyPLUS Weekly Exam
For this activity, you will take a graded exam. You should complete this exam after you have completed all of the other materials and activities for this week.
Complete this graded exam by doing the following:
1. Click the link to begin the graded exam.
2. Read the exam policies carefully.
3. Click the Next button to begin the exam.
4. Read each question carefully. Then, answer the question and click the Submit Answer button to submit each answer for grading.
Question 1
Place the different types of computer networks in size order, ranging from smallest to largest.
PAN-MAN-WAN-LAN
PAN-MAN-LAN-WAN
LAN-PAN-MAN-WAN
PAN-LAN-MAN-WAN
Question 2
__________ are high speed central networks to which multiple smaller networks connect
Network servers
Local area networks
Routers
Corporate backbone networks
Question 3
Watch the following video and answer the question below.
Networks enable organizations to meet rapidly changing business conditions.
True
False
Question 4
Watch the following video and answer the question below.
A network that connects computing devices within the same building is
LAN.
WAN.
enterprise network.
Question 5
Watch the following video and answer the question below.
A high-speed network that connects a firm’s LANs and WANS is
backbone network.
LAN.
WAN.
Question 6
The following can be considered as broadband technologies (choose all that are correct):
DSL
Dial-up
Cable
All of these
Question 7
A collection of the following devices — two desktop computers, three laptops, two smart phones and a printer — can be described as a(n):
LAN.
Network server.
WAN.
All of these
Question 8
A legacy IT system can be easily transferred to cloud computing.
True
False
Question 9
Least privilege is a concept associated with ___________________.
Legacy IT systems
Security
Reliability
Privacy
Question 10
Safe harbors address the concerns associated with __________.
Criminal use of cloud computing
Reliability of cloud computing services
Legacy IT systems
The regulatory and legal environment
Question 11
Anonymity on the internet enhances the problems associated with _______.
Criminal use of cloud computing
Legacy IT systems
Reliability of cloud computing services
The regulatory and legal environment
Question 12
Web services are applications delivered over ______________ that MIS professionals can select and combine through almost any device.
an intranet
the internet
the telephone
an extranet
Question 13
A collection of web services constitutes a ___________.
service-oriented architecture
Software-as-a-Service package
service-level package
self-service architecture
Question 14
Which of the following is NOT a web service protocol?
EDI
SOAP
XML
UDDI
Question 15
_______ describes how data should look on a web site; ______ describes data being exchanged between business partners.
EDI; HTML
HTML; XML
EDI; XML
XML; HTML
Question 16
__________ is a set of rules that define how messages can be exchanged among different network systems and applications through the use of XML.
WSDL
SOAP
UDDI
HTML
Question 17
__________ is used to create the XML document that describes the tasks performed by the various web services.
SOAP
WSDL
HTML
UDDI
Question 18
_________ is a registry for searching web services.
SOAP
WSDL
UDDI
XML
Question 19
Utility computing service providers charge a flat rate for the computer services they provide.
True
False
Question 20
The US-China Safe Harbor is a streamlined process for US companies to comply with the Chinese directive on the protection of personal data.
True
False
Question 21
PCI compliance addresses reliability issues in cloud computing.
True
False
Question 22
HTML and XML are both used to design web pages.
True
False
Question 23
The traditional IT department
owns their hardware, software and networks
stores all their data off-premise
spends very little on IT infrastructure
none of these
Question 24
In cloud computing, multiple virtual servers can be created on a single physical server.
True
False
Question 25
All of the following are cloud computing security issues except
sensitive data access
privacy
users technical ability
malicious insiders
CIS 207T CIS207T CIS/207T ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX
CIS 207T Week 4 Discussion Database Management
Respond to the following in a minimum of 175 words:
What are some potential impacts of a poorly managed database?
Based on what you learned, how would you manage a specific database?
CIS 207T CIS207T CIS/207T ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX
CIS 207T Week 4 WileyPLUS Weekly Exam
CIS 207T Week 4 WileyPLUS Weekly Exam
For this activity, you will take a graded exam. You should complete this exam after you have completed all of the other materials and activities for this week.
Complete this graded exam by doing the following:
1. Click the link to begin the graded exam.
2. Read the exam policies carefully.
3. Click the Next button to begin the exam.
4. Read each question carefully. Then, answer the question and click the Submit Answer button to submit each answer for grading.
Question 1
Watch the following video and answer the question below.
Big Data is the same thing as huge amounts of structured data in organizational databases.
True
False
Question 2
Which of the following is NOT a type of Big Data?
Traditional enterprise data
Sensor data
Social data
Images
None of the choices is correct
Question 3
NoSQL databases can manage more different types of data than a traditional relational database.
True
False
Question 4
Watch the following video and answer the question below.
A/B experiments are so-named because there are only two possible outcomes for each experiment.
True
False
Question 5
Watch the following video and answer the question below.
Data subject to constraints is an example of
data integrity.
data consistency.
data redundancy.
Question 6
Watch the following video and answer the question below.
A group of logically related fields is a(n)
record.
database.
file.
Question 7
Watch the following video and answer the question below.
Each _________ in a relational database is a record.
column
attribute
row
Question 8
Watch the following video and answer the question below.
One of the attributes in a record must be a primary key.
True
False
Question 9
Watch the following video and answer the question below.
Normalization typically improves processing performance.
True
False
Question 10
Watch the following video and answer the question below.
When data are normalized, attributes in the table depend on the primary key and the secondary key.
True
False
Question 11
Watch the following video and answer the question below.
A data warehouse is a repository of historical data that are organized by subject to support decision makers in the organization.
True
False
Question 12
Watch the following video and answer the question below.
Organizational databases access one record at a time, where data warehouses access groups of related records.
True
False
Question 13
Watch the following video and answer the question below.
Data in a data warehouse are organized by business process, where data in corporate databases are organized by subject.
True
False
Question 14
Watch the following video and answer the question below.
Data updates in a data warehouse are performed by the MIS department, NOT the users.
True
False
Question 15
Watch the following video and answer the question below.
The MOST common source system for a company’s data warehouse is its corporate operational databases.
True
False
Question 16
Watch the following video and answer the question below.
Companies often have to clean up the data before it can be imported into the data warehouse.
True
False
Question 17
Watch the following video and answer the question below.
The ETL process is now typically called data integration.
True
False
Question 18
Watch the following video and answer the question below.
The MOST common method for storing data in a data warehouse is
one central data warehouse.
independent data marts.
hub and spoke.
Question 19
Watch the following video and answer the question below.
The IT department is solely responsible for the quality of the data in the data warehouse.
True
False
Question 20
Watch the following video and answer the question below.
Governance of a data warehouse must be a collaboration between business users and IT personnel.
True
False
Question 21
Watch the following video and answer the question below.
After you have taken a particular course, your insights on how to do well in that course would be considered to be tacit knowledge.
True
False
Question 22
The IT infrastructure needed for you to register online for next semester would be considered to be explicit knowledge.
True
False
Question 23
Watch the following video and answer the question below.
Robots are being used in a decreasing number of everyday tasks.
True
False
Question 24
Process and procedures are important but not critical to the effective use of computer based information systems.
True
False
Question 25
An App (Application) is a computer program designed to support a specific task?
True
False
CIS 207T CIS207T CIS/207T ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX
CIS 207T Week 5 Discussion Security as a Technical Issue
Respond to the following in a minimum of 175 words:
Based on what you have read and learned in the course so far, do you think security is a technical issue, a business issue or both? Why?
CIS 207T CIS207T CIS/207T ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX
CIS 207T Week 5 WileyPLUS Weekly Exam
CIS 207T Week 5 WileyPLUS Weekly Exam
For this activity, you will take a graded exam. You should complete this exam after you have completed all of the other materials and activities for this week.
Complete this graded exam by doing the following:
1. Click the link to begin the graded exam.
2. Read the exam policies carefully.
3. Click the Next button to begin the exam.
4. Read each question carefully. Then, answer the question and click the Submit Answer button to submit each answer for grading.
Question 1
The law basically does not support an employer’s right to read electronic mail and other electronic documents.
True
False
Question 2
Privacy regulations are basically the same from country to country around the world.
True
False
Question 3
______________ is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others.
Profiling
Information privacy
A digital dossier
Privacy
Question 4
______________ is an electronic profile of you and your habits.
Privacy
Information privacy
Profiling
A digital dossier
Question 5
______________ is the process of forming a digital dossier.
Privacy
Profiling
Dossiering
Information privacy
Question 6
Which of the following is NOT an example of a profiler?
Amazon
ChoicePoint
LexisNexis
Acxiom
Question 7
The right of privacy ___________ absolute.
cannot be
can be
is not
is
Question 8
Risk management identifies, controls, and minimizes the impact of threats to the organization’s information security.
True
False
Question 9
Which if the following is not a common risk mitigation strategy?
Risk analysis.
Risk limitation.
Risk acceptance.
Risk transference.
Question 10
Which of the following is NOT a lesson learned from the Sony Picture Entertainment hack on November 24, 2014?
It is difficult, if not impossible, for organization to provide perfect security for their data.
China is the leading hacking group that encourages similar behavior from other countries.
It appears that it is impossible to secure the Internet.
There is a growing danger that countries are engaging in economic cyberwarfare among themselves.
Question 11
___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information.
Espionage
Information extortion
Competitive intelligence
Intellectual property
Question 12
Phishing is an example of __________.
Copyright infringement
Espionage
Software attack
Sabotage
Question 13
You start browsing your favorite home improvement company’s website and notice someone has changed all the logos to their main competitor’s logos. This is an example of ___________.
Espionage
Identity theft
Information extortion
Sabotage
Question 14
Application software is a set of instructions that serves primarily as an intermediary between computer hardware and application programs.
True
False
Question 15
Software consists of the instructions given to computer hardware.
True
False
Question 16
Application software is a set of computer instructions that provide specific functionality for a user.
True
False
Question 17
Personal application software consists of widely used packages such as word processing, spreadsheet, communications, and graphics software.
True
False
Question 18
Hardware costs have been _______________ over time and software costs have been _______________ over time.
increasing; increasing
decreasing; decreasing
increasing; decreasing
decreasing; increasing
Question 19
_________________ software is an intermediary between computer hardware and _________________ software.
Systems; programming
Application; systems
Systems; application
Application; programming
Question 20
Hardware interacts directly with _______________ software.
Systems
Application
Programming
Documentation
Question 21
Hardware has become less complex while software has become more complex.
True
False
Question 22
Discrete speech-recognition software recognizes and interprets one word at a time.
True
False
Question 23
The set of computer programs used to manage hardware resources is called:
Personal application software.
Microsoft Office Suite.
General software.
Systems software.
Application software
Question 24
It is not necessary for computer programs to have documentation, because the code itself is easy to read and follow.
True
False
Question 25
Computer hardware is designed specifically for a particular application.
True
False