信管英语总复习题目

合集下载

2020年软考高级信息系统项目管理师考试英语练习题及答案多套汇总

2020年软考高级信息系统项目管理师考试英语练习题及答案多套汇总

2020 年软考高级信息系统项目管理师考试英语练习题及答案多套汇总1. Project Quality Management must address the management of the project and the () of the project. While Project Quality Management applies to all projects, regardless of the nature of their product, product quality measures and techniques are specific to the particular type of product produced by the project.A.performanceB.processC.productD.object【答案】C【解析】项目质量管理必须解决项目的管理和项目的管理问题。

尽管项目质量管理适用于所有项目,无论其()的性质如何,但产品质量措施和技术是针对项目生产的特定类型产品的。

A、性能B、过程C、产品D、对象2.() is the budgeted amount for the work actually completedon the schedule activity or WBS component during a given time per i od.A.Planned valueB.Earned valueC.Actual costD.Cost variance【答案】B【解析】()是给定时间段内计划活动或WBS 组件实际完成的工作的预算金额。

A、计划值B、挣值C、实际成本D、成本差异3.() involves comparing actual or planned project practices to those of other projects to generate ideas for improvement and to provide a basis by which to measure performance. These other projects can be within the performing or gani za t i on or outside of it, and can be within the same or in another application area.A.MetricsB.MeasurementC.BenchmarkingD.Baseline【答案】C【解析】()将实际或计划的项目实践与其他项目的实践进行比较,以产生改进意见,并提供衡量绩效的依据。

信息系统项目管理师历年英语试题及模拟试题

信息系统项目管理师历年英语试题及模拟试题

信息系统项目管理师历年英语试题汇总2005年上半年●(66)is a method of constructing a project schedule network diagram that uses boxes or rectangles ,referred to as nodes, to represent activites and connects them with arrows that as ow the dependencies. This method includes following types of dependcies orprecedence relationships:(67)the initiation of the successor activity, depends upon the completion of the predecessor activity(68)the initiation of the successor activity,depends upon the initiation of the predecessor activity(66)A.PDM B.CPM C.PERT D.AOA(67)A.F-S B.F-F C.S-F D.S-S(68)A.F-S B.F-F C.S-F D.S-S●estimating schedule activity costs involves developing an(69)of the cost of the resources needed to complete each schedule activity. Cost estimating includes identifying and considering various costing alternatives. for example, in mostapplication areas, additional work during a design phase is widely held to have the potential for reducing the cost of the execution phase and product oprations. the cost estimating process considers whether the expected savings can offset the cost of the additional design work. cost estmates are generally expressed in units of(70)to facilitate comparisons both within and across projects. the(71)describes important information about prject requirement that is considered duing cost estimating.(69)A.accuracy B.approxination C.specification D.summary(70)A.activity B.work C.currency D.time(71)A.project scope statement B.statement of workC.project management plan D.project policy●The (72)technique involves using projecet characteristics in a mathematical model to predict total project cost.models can be simple or complex.(72) A.cost aggregation B.reserve analysisC.parametric estimating D.funding limit reconciliarion●(73)is a measurable, verifiable work product such as specification. feasibility study report, detail document, or working prototype(73) A.milestone B.deliverable C.etc D.BAC●(74)are individuals and organizations that are actively involved in the project, or whose interests may be affected as a result of project execution or project completion; they may also exert influence over the project and its results.(74) A.controls B.baselinesC.project stakeholders D.project managers●(75)is the process of obtaining the stakeholdrs’formal acceptance of the completed projectscope .verifying the scope includes reviewing deliverables and work results to ensure that all were completed satisfactorily.(75) A.project acceptance B.scope verificationC.scope definition D.WBS Creation2005年下半年●__(66)__ means that every project has a definite beginning and a definite end.(66)A. Project phase B. Unique C. Temporary D. Closure●The __(67)__ defines the phases that connect the beginning of a project to its end.(67)A. schedule B. project life cycle C. temporary D. milestone●__(68)__ are individuals and organizations that are actively involved in the project, or whose interests may be affected as a result of project execution or project completion.(68)A. Project managers B. Project team membersC. SponsorsD. Project stakeholders●The __(69)__ Process Group consists of the processes used to complete the work defined in the project management plan to accomplish the project’s requirements.(69)A. Planning B. Executing?? ???????????C. Monitoring and ControllingD. Closing●The __(70)__ provides the project manager with the authority to apply organizational resources to project activities.(70)A. project management plan B. contractC. project human resource planD. project charter●The __(71)__ describes, in detail, the project’s deliverables and the work required to create those deliverables.(71)A. project scope statement B. project requirementC. project charterD. product specification●The process of __(72)__ schedule activity durations uses information on schedule activity scope of work, required resource types, estimated resource quantities, and resource calendars with resource availabilities.(72)A. estimating B. defining C. planning D. sequencing●PDM includes four types of dependencies or precedence relationships:...__(73)__. The completion of the successor activity depends upon the initiation of the predecessor activity.(73)A. Finish-to-Start B. Finish-to-FinishC. Start-to-StartD. Start-to-Finish●__(74)__ is the budgeted amount for the work actually completed on the schedule activity or WBS component during a given time period.(74)A. Planned value B. Earned valueC. Actual costD. Cost variance●__(75)__ involves comparing actual or planned project practices to those of other projects to generate ideas for improvement and to provide a basis by which to measure performance. These other projects can be within the performing organization or outside of it, and can be within the same or in another application area.(75)A. Metrics B. Measurement C. Benchmarking D. Baseline2006年下半年●(66)from one phase are usually reviewed for completeness and accuracy and approved before work starts on the next phase.(66)A.Process B.Milestone C.Work D.Deliverables●Organizations perform work to achieve a set of objectives.Generally, work can be categorized as either projects or operations, although the two sometimes are (67).(67)A.confused B.same C.overlap D.dissever●In the project management context,(68)includes characteristics of unification, consolidation, articulation, and integrative actions that are crucial to project completion, successfully meeting customer and other stakeholder requirements,and managing expectations.(68)A.integration B.scope C.process D.charter●Project (69)Management includes the processes required to ensure that the project includes all the work required, and only the work required,to complete the project successfully.(69)A.Integration B.Scope C.Configuration D.Requirement●On some projects,especially ones of smaller scope,activity sequencing, activity resource estimating, activity duration estimating, and (70)are so linked that they are viewed as a single process that can be performed by a person over a relatively short period of time.(70)A.time estimating B.cost estimatingC.project planning D.schedule development●In approximating costs,the estimator considers the possible causes ofvariation of the cost estimates,including (71)。

信息管理专业英语试题及答案

信息管理专业英语试题及答案

信息管理专业英语试题及答案一、写出以下单词的中文意思(每小题0.5分,共10分)1 algorithm 11 object-oriented2 optimization 12 subsystem3 transportation 13 analogous4 dissemination 14 authorization5 evaluate 15 collection6 reliability 16 database7 verification 17 distributing8 computerize 18 payment9 practical 19 warehouse10 manipulation 20 agility二、根据给出的中文意思,写出单词(每小题0.5分,共10分)1 n.组件,群件11 adj.分布式的2 n.反馈,反应12 n.构造,配置3 n.增殖,扩散13 vt.维持,维修4 n.扩散,传播14 vt.使标准化5 n.全球化,全球性15 n.识别,鉴定6 adj.多国的,跨国的16 adj.可接受的7 vt.分配,指派17 adj.兼容的8 adj.交互式的18 n.防火墙9 n.变化,转化,转换19 n.基本设施10 n.应用,应用程序20 vt.& vi.使同步三、根据给出的短语,写出中文意思(每小题1分,共10分)1 application program interface2 back up3 bar code4 base upon5 Business Intelligence6 c loud computing7 commercial service provider8 c ustomer churn9 customer relations management10 data independence四、根据给出的中文意思,写出短语(每小题1分,共10分)1 数据挖掘2 数据转换3 数据仓库4 脏数据,废数据5 外部存储设备6 遗传算法7 网格计算8 投资决策9 知识发现10 最小冗余五、写出以下缩略语的完整形式和中文意思(每小题1分,共10分)缩略语完整形式中文意思1 B2B2 B2C3 CRM4 DBMS5 ERP6 GIS7 HTTP8 IS9 SCM10 SQL六、把以下句子翻译为中文(每小题1.5分,共15分)1) Do you have any idea how to promote the sales of this product?2) Peter is confident of winning the post as the assistant to the managing director.3) There must be fair play whatever the competition is.4) She showed strong leadership during her first term in office.5) If you have any requirements, ask me.6) The managing director's only concern was how to improve the quality of their products.7) The cost of consumption articles is the first consideration, as far as most ordinary people are concerned.8) Appreciation of works of art is bound to be dominated by a particular kind of interest.9) We sought an answer to the question, but couldn't find one.10) The program was implemented with great efficiency and speed.七、把以下句子翻译为英文(每小题1.5分,共15分)1) 没有好的管理,生意是不可能做好的。

信息管理专业英语第二版参考答案

信息管理专业英语第二版参考答案

信息管理专业英语第⼆版参考答案Unit 1【Ex1.】根据课⽂容,回答以下问题。

1.In human terms and in the broadest sense, information is anything that you are capable of perceiving.2.It includes written communications, spoken communications, photographs, art, music, and nearly anything that is perceptible.3.If we consider information in the sense of all stimuli as information, then we can’t really find organization in all cases. 4.No.5.Traditionally, in libraries, information was contained in books, periodicals, newspapers, and other types of recorded media. People access it through a library’s catalog and with the assistance of indexes, in the case of periodical and newspaper articles.6.Computerized “information systems”.7.The problem for most researchers is that they have yet to discover the organizing principles that are designed to help them find the information they need.8.For library materials, the organizing principle is a detailed subject classification system available for searching in an online “catalog”.9.The one thing common to all of these access systems is organization.10.No, it isn’t.【Ex2.】根据给出的汉语词义和规定的词类写出相应的英语单词。

信息管理与信息系统专业英语测试题Ch11Translation

信息管理与信息系统专业英语测试题Ch11Translation

Chapter 11 信息系统的管理如何组织信息系统的活动是一个重大的商业和管理信息系统战略问题。

计算的演变组织今天正面临着一系列艰难的问题,这些问题与管理计算功能相关。

不同组织数据处理的方式已经在过去几年里获得了发展。

在20世纪60年代,数据处理曾是一个后台职能,其职员主要是由直接为实现各种会计职能--如应收账款和应付账款—的自动化的部门工作的专家。

这些早期的系统实现了许多日常文书密集型运作的自动化而被认为是非常成功的。

会计系统项目的成功引发了发展更多数据处理系统的需求。

用户将这些系统的开发委托给了技术专家,这些技术专家并不总是了解他们正试图实现自动化的业务功能。

许多用户开始质疑这些数据处理项目的高额费用和令人失望的结果。

这些问题迫使高级管理人员开始直接参与数据处理项目的规划和控制。

由此导致了管理信息系统部的成立,并且管理信息系统的专业人员受到了使用项目管理的方法以确保系统在预算范围内如期开发完成的培训。

职能部门的管理者自己开始负责挑选最重要的项目和批准这些项目的费用。

20世纪70年代,计算技术开始变得更便宜。

带有软件包的小型机被供应商积极地直接销售给用户。

出于有机会控制自己的硬件和数据的动机的用户获得了大量的这种小型机系统。

其结果是导致了分散计算的纪元。

然而,诸如计算机设备不兼容、缺乏本地系统分析员、缺乏有能力的专业技术人才等问题开始使得用户重新考虑是否该自行运行管理计算机系统。

到20世纪70年代末,大部分组织已经集中了他们的数据中心业务。

集中的一群计算机专业人员管理着硬件、计算机操作、数据库和通讯系统的技术支持。

在许多企业,系统开发职能是分散的,由系统分析员和职能业务部门一起工作。

这种做法使用户对应用开发项目有更多的控制权。

20世纪90年代,大多数组织必须要管理多种技术。

计算技术实际上是以微型计算机、基于计算机的电话系统(程控电话系统)、CAD / CAM系统(计算机辅助设计/计算机辅助管理)和专家系统等形式掌握在几乎每一个经理人的手中。

管理信息系统(英文版第7版)题库chapter extension 16

管理信息系统(英文版第7版)题库chapter extension 16

Experiencing MIS, 7e (Kroenke)Chapter Extension 16 Systems Development Project Management1) Which of the following is a characteristic of large-scale systems development projects?A) short development intervalsB) single development siteC) avoidance of system localizationD) 50-100 development team membersAnswer: DAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.1: Why is formalized project management necessary? Classification: Concept2) Which of the following statements is true of large-scale systems development projects?A) They use simple computer programs to ensure consistency and speed in development.B) They use development teams of less than 20 members to reduce complexity.C) Their development can involve the integration of services from several companies.D) Their development is carried out in a single site to ensure consistency.Answer: CAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.1: Why is formalized project management necessary? Classification: Concept3) The development of large-scale systems can involve the integration of products and services from different companies.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.1: Why is formalized project management necessary? Classification: Concept4) Large-scale systems development requires extended development intervals as long as five or six years.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.1: Why is formalized project management necessary? Classification: Concept5) What are the characteristics of information systems (IS) in large-scale systems development projects?Answer: Information systems (IS) in large-scale systems development project have many features and functions. They require substantial computer resources and necessitate the creation of multifaceted, complicated computer programs. They process databases with hundreds of tables; dozens, possibly hundreds, of relationships; and terabytes of data. Such large-scale systems affect many business processes and support hundreds, possibly thousands, of concurrent users.Because of their size, such systems require a large development team, often composed of 50 to 100 or more business and systems analysts, programmers, PQA engineers, and managers. To add further complexity, large-scale systems are often simultaneously developed at multiple sites. A project might involve teams in the United States, India, China, and other countries. Additionally, the development of large-scale systems can involve integrating products and services from different companies. In these larger development projects, some companies provide licensed software; others provide particular expertise, such as database design; and others provide development labor. Large-scale systems are frequently localized for different languages. Finally, large-scale systems development requires extended development intervals, sometimes as long as five or six years.AACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.1: Why is formalized project management necessary? Classification: Concept6) Systems development projects require the balancing of three critical drivers: requirements, cost, and ________.A) scopeB) timeC) performanceD) valueAnswer: BAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.2: What are the trade-offs in requirements, cost, and time? Classification: Concept7) Increasing the cost of a project can reduce the time required to complete the project up to a certain point, beyond which, the time required would increase due to ________.A) economies of scaleB) diseconomies of scaleC) economies of scopeD) diseconomies of scopeAnswer: BAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.2: What are the trade-offs in requirements, cost, and time? Classification: Concept8) In the context of a systems development project, which of the following statements is true of the relationships between requirements, cost, and time?A) Increasing the time for the completion of a project always increases the cost of the project.B) Increasing the cost of a project will always reduce the time required to finish the project.C) Reducing the requirements in a project rarely affects the time required to finish the project.D) Reducing the number of requirements in a project reduces the overall cost of the project. Answer: DAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.2: What are the trade-offs in requirements, cost, and time? Classification: Concept9) Pete, a civil engineer, is appointed to build a state-of-the-art office building. He begins planning the design and construction of the building with his team. He estimates that the building would take six months to build and assigns work and material accordingly to the workers. In this scenario, Pete is specifying the ________.A) baselineB) data modelC) line of codeD) scatter plotAnswer: AAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.2: What are the trade-offs in requirements, cost, and time? Classification: Application10) The time involved in a project can always be reduced by increasing cost.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.2: What are the trade-offs in requirements, cost, and time? Classification: Concept11) Larger projects with longer development intervals will find it easier to meet baseline requirements.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.2: What are the trade-offs in requirements, cost, and time? Classification: Concept12) What are the trade-offs in a systems development project's requirements, cost, and time? Answer: Systems development projects require the balancing of three critical drivers: requirements (scope), cost, and time. The requirements against the time and against the cost of a project can be traded off. If the requirements are reduced, a project would take less time to complete and the cost of the project will also decrease. The relationship between time and cost is more complicated. Normally, the time can be reduced by increasing cost, but only to a point, beyond which, the time to finish the project will actually increase due to diseconomies of scale. Thus, at some point, adding more people creates diseconomies of scale. In some projects, costs can be reduced by increasing time. However, this trade-off is not always true. By extending the project interval, one will need to pay labor and overhead for a longer period of time. Adding more time can, in this way, increase the cost of the project.AACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.2: What are the trade-offs in requirements, cost, and time? Classification: Concept13) Which of the following is a technique that stipulates phases and processes for constructing information systems (IS) but does not address the management of large-scale projects?A) systems development life cycleB) rapid application developmentC) agile software developmentD) structured system analysisAnswer: AAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.3: What are the dimensions of project management?Classification: Concept14) In the Project Management Body of Knowledge (PMBOK®) Guide, the different stages in the life of a project are referred to as ________.A) configuration controlsB) knowledge areasC) process groupsD) resource zonesAnswer: CAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.3: What are the dimensions of project management?Classification: Concept15) ________ is the knowledge area that refers to the management of an entire project and the construction of the final product.A) Project integrationB) Project managementC) Procurement managementD) Quality managementAnswer: AAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.3: What are the dimensions of project management?Classification: Concept16) ________ is a knowledge area that concerns the methods, media, and schedules for exchanging information with the project's sponsors within a team and with others who have an interest in the progress of the project.A) Procurement managementB) Communications managementC) Quality managementD) Project integrationAnswer: BAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.3: What are the dimensions of project management?Classification: Concept17) ________ is a knowledge area that concerns contracts with outside vendors for services, materials, and outsourcing of functions.A) Communications managementB) Quality managementC) Project integrationD) Procurement managementAnswer: DAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.3: What are the dimensions of project management?Classification: Concept18) The Project Management Body of Knowledge (PMBOK®) Guide identifies those practices that are known to be effective for different situations and briefly describes their use.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.3: What are the dimensions of project management?Classification: Concept19) Knowledge areas of the Project Management Body of Knowledge (PMBOK®) Guide refer to the factors in a project that need to be managed throughout the life of the project.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.3: What are the dimensions of project management?Classification: Concept20) What is the Project Management Body of Knowledge (PMBOK®) Guide for project management?Answer: Project Management Body of Knowledge (PMBOK®) Guide, compiled by the Project Management Institute (PMI), contains what many believe are the best project management processes, practices, and techniques. The document does not describe the details of each practice or technique but instead identifies those practices that are known to be effective for different situations and briefly describes their use. Versions of this document are denoted by the year in which they are published. As of 2015, the current version is "A Guide to the Project Management Body of Knowledge (PMBOK®) Guide, Fifth Edition."PMBOK® Guide is organized according to a grid, which shows five process groups and nine knowledge areas. The process groups refer to different stages in the life of a project. The nine knowledge areas refer to factors to be managed throughout the life of the project.AACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.3: What are the dimensions of project management?Classification: Concept21) Each task in a systems development project should culminate in one or more ________.A) deliverablesB) zonesC) segmentsD) designsAnswer: AAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.4: How does a work breakdown structure drive project management? Classification: Concept22) A(n) ________ is a hierarchy of the tasks required to complete a project.A) scatter plotB) work breakdown structureC) encryption algorithmD) virtual modelAnswer: BAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.4: How does a work breakdown structure drive project management? Classification: Concept23) A ________ defines the boundaries of a system in a work breakdown structure (WBS).A) trade-offB) codeC) scopeD) scaleAnswer: CAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.4: How does a work breakdown structure drive project management? Classification: Concept24) Which of the following tools shows the tasks, dates, and dependencies in a project?A) Gantt chartB) exception reportC) push reportD) DPlotAnswer: AAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.4: How does a work breakdown structure drive project management? Classification: Concept25) A(n) ________ is the sequence of activities that determine the earliest date by which a project can be completed.A) Gantt chartB) critical pathC) encryption algorithmD) scatter plotAnswer: BAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.4: How does a work breakdown structure drive project management? Classification: Concept26) Prototypes are examples of deliverables in a systems development project.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.4: How does a work breakdown structure drive project management? Classification: Concept27) The critical path determines the earliest date by considering the shortest path through the network of activities.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.4: How does a work breakdown structure drive project management? Classification: Concept28) In case of task dependencies in a project, all tasks must begin and end at the same time. Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.4: How does a work breakdown structure drive project management? Classification: Concept29) Baseline work breakdown structures can be used for monitoring a project.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.4: How does a work breakdown structure drive project management? Classification: Concept30) What is a critical path? How is a critical path analysis done?Answer: A critical path is a sequence of activities that determine the earliest date by which a project can be completed. The earliest date is the date determined by considering the longest path through the network of activities. Paying attention to task dependencies, a planner can compress tasks as much as possible. Those tasks that cannot be further compressed lie on the critical path. Microsoft Project and other project-planning applications can readily identify critical path tasks. Managers can use the critical path to perform critical path analysis. If a task is on the critical path, and if that task runs late, the project will be late. Hence, tasks on the critical path cannot be allowed to run late if the project is to be delivered on time. Additionally, tasks not on the critical path can run late to the point at which they would become part of the critical path. Hence, up to a point, resources can be taken from noncritical path tasks to shorten tasks on the critical path. Using critical path analysis, managers can move resources among tasks so as to compress the schedule.AACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.4: How does a work breakdown structure drive project management? Classification: Concept31) Odell is the lead software developer for a new security system that needs to be urgently developed for a client. The client is insistent that the software be as infallible as possible, therefore, Odell would have to plan the systems development with precision. Which of the following activities would be Odell's biggest challenge while planning?A) creatingB) schedulingC) analyzingD) testingAnswer: BAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.5: What is the biggest challenge for planning a systems development project?Classification: Application32) Scheduling a large-scale project is more difficult than scheduling individual projects. Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.5: What is the biggest challenge for planning a systems development project?Classification: Concept33) One approach businesses take to address scheduling challenges in large-scale systems is avoiding the development of software in-house.Answer: TRUEAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.5: What is the biggest challenge for planning a systems development project?Classification: Concept34) A function point is a feature or function of a new program.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.5: What is the biggest challenge for planning a systems development project?Classification: Concept35) The biggest challenge in planning large-scale systems development is scheduling. Describe the three approaches that organizations can take to address this challenge.Answer: The first approach that organizations can take to address the challenge of scheduling large-scale systems development projects is to avoid all major schedule risks by never developing software in-house. Instead, they can license software from vendors. However, if no suitable software exists, companies can take one of two remaining approaches. They can admit the impossibility of systems development scheduling and plan accordingly. They can abandon the systems development life cycle and decide to invest a certain level of resources into a project, manage it as best as they can, and take the schedule that produces results. The third approach is to attempt to schedule the development project in spite of all difficulties. Several different estimation techniques can be used. If the project is similar to a past project, the schedule data from that past project can be used for planning. When such similar past projects exist, this technique can produce quality schedule estimates. If there is no such past project, managers can estimate the number of lines of code that will need to be written. Then they can use industry or company averages to estimate the time required. Another technique is to estimate the function points in a program, use each function point to determine the number of lines of code, and use that number to estimate schedules.AACSB: Information TechnologyDifficulty: 3: ChallengingCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.5: What is the biggest challenge for planning a systems development project?Classification: Concept36) The challenges of managing large-scale systems development projects arise from ________.A) economies of scaleB) economies of scopeC) increase in configuration controlD) lack of coordinationAnswer: DAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.6: What are the biggest challenges for managing a systems development project?Classification: Concept37) ________ refers to a set of management policies, practices, and tools that developers use to maintain control over a project's resources.A) Perceptual mappingB) Coordination controlC) Critical path analysisD) Configuration controlAnswer: DAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.6: What are the biggest challenges for managing a systems development project?Classification: Concept38) A well-managed project will never face problems of diseconomies of scale.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.6: What are the biggest challenges for managing a systems development project?Classification: Concept39) Unexpected events are a minor hurdle and are rarely considered while managing alarge-scale systems development project.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.6: What are the biggest challenges for managing a systems development project?Classification: Concept40) The smaller and shorter a project, the greater the chance of disruption due to unanticipated events.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.6: What are the biggest challenges for managing a systems development project?Classification: Concept41) What are the biggest challenges for managing a large-scale systems development project? Answer: The challenges of managing large-scale systems development projects arise from four different factors: coordination, diseconomies of scale, configuration control, and unexpected events. Large-scale projects are usually organized into a variety of development groups that work independently. Coordinating the work of these independent groups can be difficult, particularly if they reside in different geographic locations or different countries. An accurate and complete work breakdown structure (WBS) facilitates coordination, but no project ever proceeds exactly in accordance with the WBS. The coordination problem is increased because software ispure-thought stuff. Another problem is diseconomies of scale. Adding more people to a project increases coordination requirements. The number of possible interactions among team members rises exponentially with the number of team members. Ultimately, no matter how well managed a project is, diseconomies of scale will set in. Also, as the project proceeds, controlling the configuration of the work product becomes difficult. Problems can occur with designs, program code, database data, and other system components. Configuration control is vital here. The last major challenge to large-scale project management is unexpected events. The larger and longer a project lasts, the greater the chance of disruption due to an unanticipated event.AACSB: Information TechnologyDifficulty: 3: ChallengingCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.6: What are the biggest challenges for managing a systems development project?Classification: Concept42) ________ is the process by which users agree to one set of conditions, then add a bit more, then add a bit more, and so forth.A) Requirements creepB) Diseconomies of scaleC) Configuration controlD) CoordinationAnswer: AAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.7: What is the single most important task for users on a systems development project?Classification: Concept43) Taking responsibility for requirements is the single most important task a user can perform for a large-scale development project.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.7: What is the single most important task for users on a systems development project?Classification: Concept44) Requirements creep is the process by which a project manager reduces his or her responsibilities for requirements through miniscule rollbacks.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 28.7: What is the single most important task for users on a systems development project?Classification: Concept。

(6)Unit 3《信息管理与信息系统专业英语》E-C

(6)Unit 3《信息管理与信息系统专业英语》E-C
安徽财贸职业学院 计算机系
Part I--E-commerce I--E
《 SQL Server 数据库管理与开发》
--Limitations of electronic commerce --Limitations
Because electronic commerce relies on computer networks, the shipment (the action of sending, carrying, and delivering goods) of any physical good purchased using electronic commerce must still take place through traditional means, that is , when you buy a physical goods over the Web, it must be picked from a shelf in a warehouse, packed for shipment, and physically moved from the warehouse to the customer via a package delivery service.
sqlserver数据库管理与开发安徽财贸职业学院计算机系parteecommercecommerce电子商务electroniccommerce计算机应用软件computerapplications在网络上通信communicatingovernetworks交易双方twoparties整个交易或部分交易atransaction电子通信手段进行交易electroniccommunicationselectronicdatainterchange安全交易协议securetransactionagreement网络的成熟与普及thematuritywideadoption信用卡的普及thepermeationcreditcards作为assqlserver数据库管理与开发安徽财贸职业学院计算机系parteecommercecommerce电子商务定义为

管理类专业学位联考英语(知识运用)历年真题试卷汇编2

管理类专业学位联考英语(知识运用)历年真题试卷汇编2

管理类专业学位联考英语(知识运用)历年真题试卷汇编2(总分:80.00,做题时间:90分钟)一、 Cloze(总题数:2,分数:80.00)The Internet affords anonymity to us users, a blessing to privacy and freedom of speech. But that very anonymity is also behind the explosion of cyber crime that has【1】across the Web. Can privacy be preserved【2】bringing safety and security to a world that seems increasingly 【3】? Last month, Howard Schmidt, the nation"s cyber-czar, offered the federal government a【4】to make the Web a safer place - a "voluntary trusted identity" system that would be the high-tech【5】of a physical key, a fingerprint and a photo ID card, all rolled【6】one. The system might use a smart identity card, or a digital credential【7】to a specific computer, and would authenticate users at a range of online services. The idea is to【8】a federation of private online identity systems. Users could【9】which system to join, and only registered users whose identities have been authenticated could navigate those systems. The approach contrasts with one that would require an Internet driver"s license【10】by the government. Google and Microsoft are among companies that already have these "single sign-on" systems that make it possible for users to【11】just once but use many different services.【12】the approach would create a "walled garden" in cyberspace, with safe "neighborhoods" and bright "streetlights" to establish a sense of【13】community. Mr. Schmidt described it as a "voluntary ecosystem" in which "individuals and organizations can complete online transactions with【14】, trusting the identities of each other and the identities of the infrastructure【15】which the transaction runs." Still, the administration"s plan has【16】privacy rights activists. Some applaud the approach; others are concerned. It seems clear that such a scheme is an initiative push toward what would【17】be a compulsory of Internet "driver"s license" mentality. The plan has also been greeted with【18】by some computer security experts, who worry that the "voluntary ecosystem" envisioned by Mr. Schmidt should still leave much of the Internet 【19】. They argue that all Internet users should be【20】to register and identify themselves in the same way drivers must be licensed to drive on public roads.(分数:40.00)(1).【1】A.swept √B.skippedC.walkedD.ridden词汇题(词义选择)。

管理信息系统(英文版第7版)题库chapter extension 15

管理信息系统(英文版第7版)题库chapter extension 15

Experiencing MIS, 7e (Kroenke)Chapter Extension 15 International MIS1) Which of the following statements is true of the international business scenario?A) After the dot-com bust, optical fiber was extremely scarce and expensive.B) After the fall of the Soviet Union, the economies of Russia and Western Europe closed their markets to the world.C) With the popularity of the Internet, the economies of North America and Europe became less integrated.D) With the popularity of the Internet, the Chinese economy became more open to the world. Answer: DAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Describe the effects of e-commerce on the modern business world.Learning Obj: LO 27.1: How does the global economy affect organizations and processes? Classification: Concept2) How has the global economy changed the competitive environment?A) Suppliers are not required to reach a wide range of customers.B) Customers now have less access to information about substitutes.C) It has intensified rivalry by increasing product and vendor choices.D) It has made it easier for new market entrants in all fields to penetrate the market. Answer: CAACSB: Analytical ThinkingDifficulty: 2: ModerateCourse LO: Describe the effects of e-commerce on the modern business world.Learning Obj: LO 27.1: How does the global economy affect organizations and processes? Classification: Concept3) In the current age, global economy changes competitive strategies because it ________.A) enables unprecedented product differentiationB) makes communication between a company and its customer one-sidedC) reduces the risk that a company has to bearD) eliminates the need for localizing productsAnswer: AAACSB: Analytical ThinkingDifficulty: 2: ModerateCourse LO: Describe the effects of e-commerce on the modern business world.Learning Obj: LO 27.1: How does the global economy affect organizations and processes? Classification: Concept4) How does the global economy change value chains and business processes?A) World time differences enable global virtual companies to operate 24/7.B) Overseas outsourcing is no longer an attractive option.C) It makes it difficult for an international company to conduct sales and marketing efforts locally.D) It makes it mandatory for the manufacturing activities to be carried out from the home country.Answer: AAACSB: Diverse and Multicultural Work EnvironmentsDifficulty: 2: ModerateCourse LO: Describe the effects of e-commerce on the modern business world.Learning Obj: LO 27.1: How does the global economy affect organizations and processes? Classification: Concept5) With the fall of the Soviet Union, the economies of Russia and Eastern Europe became alienated from the rest of the world market.Answer: FALSEAACSB: Analytical ThinkingDifficulty: 1: EasyCourse LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 27.1: How does the global economy affect organizations and processes? Classification: Concept6) The global economy has intensified rivalry by increasing product and vendor choices and by accelerating the flow of information about price, product, availability, and service.Answer: TRUEAACSB: Analytical ThinkingDifficulty: 1: EasyCourse LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 27.1: How does the global economy affect organizations and processes? Classification: Concept7) The size of the world economy, combined with the Internet, limits product differentiation. Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 27.1: How does the global economy affect organizations and processes? Classification: Concept8) Due to information systems, any value chain activity can be performed from anywhere in the world.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Explain how IS can be used to gain and sustain competitive advantage.Learning Obj: LO 27.1: How does the global economy affect organizations and processes? Classification: Concept9) World time differences restrict global virtual companies from operating 24/7.Answer: FALSEAACSB: Analytical ThinkingDifficulty: 1: EasyCourse LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.1: How does the global economy affect organizations and processes? Classification: Concept10) How does the global economy change competitive strategy?Answer: The emerging global economy changes thinking about competitive strategies in two major ways. First, the sheer size and complexity of the global economy means that any organization that chooses a strategy allowing it to compete industry-wide is taking a very big risk. Competing in many different countries, with products localized to the language and culture of those countries, is an enormous and expensive task.The second major way today's world economy changes competitive strategies is that its size, combined with the Internet, enables unprecedented product differentiation.AACSB: Analytical ThinkingDifficulty: 2: ModerateCourse LO: Describe the effects of e-commerce on the modern business world.Learning Obj: LO 27.1: How does the global economy affect organizations and processes? Classification: Concept11) The emergence of ________ technologies has made it easier for companies all over the world to obtain the latest in server technology.A) international cloudB) big dataC) data miningD) distributed databaseAnswer: AAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe the effects of e-commerce on the modern business world.Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept12) Joe's company has set up a new branch in a small town in Spain. He is working on translating Microsoft Outlook into Spanish to help the new recruits from the town learn how to use the program. Joe is involved in the process of ________.A) differentiatingB) stringingC) localizingD) optimizingAnswer: CAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Application13) Which of the following statements is true about the issues to be addressed when localizing a computer program?A) When translating a user interface for a program, the entire user interface, except the icons, will need to be changed.B) Programming techniques can be used to simplify and reduce the cost of localization.C) Forms and reports should be localized in a manner that does not necessitate redesigning an entire document.D) The help text should always be maintained in English.Answer: BAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept14) Which of the following statements is true of localizing?A) Translating documents is less expensive, but more time consuming than localizing computer programs.B) Localizing computer programs primarily involves translating documents from one language to another.C) Localization of computer programs should be planned from the beginning.D) Localizing computer programs is easier than translating documents.Answer: CAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept15) Which of the following is an issue related to global databases?A) Data transmission speeds are often too slow to process data from a single geographic location.B) A single database increases data integrity problems.C) A single database is ideal for companies that use multiple languages.D) With a single database, it is not possible to have an integrated view of a customer or an organization's operations.Answer: AAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept16) SPZ Imports, a multinational company, has offices located in five countries. Each office processes a single database that resides at each location. Which of the following types of databases does SPZ use?A) clustered databaseB) distributed databaseC) external databaseD) hypermedia databaseAnswer: BAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Application17) PL Constructions Inc. uses the distributed database processing system in all its international locations. If the databases in all the locations contain copies of the same data, it can be said that PL Constructions uses a ________.A) mirrored databaseB) redundant databaseC) replicated databaseD) partitioned databaseAnswer: CAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Application18) If a distributed database divides the database into nonoverlapping segments, it is called a(n) ________ database.A) mirroredB) replicatedC) independentD) partitionedAnswer: DAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept19) Which of the following is an advantage of functional systems?A) They facilitate the integration of data across various business functions.B) Two order-processing functional systems located in two different countries need not accommodate language and culture differences in a single system.C) They ensure that organizations do not suffer from islands of automation.D) They solve the problems of data isolation by integrating data into a database that provides a comprehensive and organization-wide view.Answer: BAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept20) Which of the following statements is true of inherent processes?A) Creating an accurate as-is international process management model is inexpensive and easy.B) Determining the criteria to be used for evaluating the alternative international processes takes little time.C) Each software product assumes that the software will be used by people filling particular roles and performing their actions in a certain way.D) It is likely that international business processes will be developed more like intra-department business processes.Answer: CAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept21) The human components, such as procedures and people, are affected by language and culture.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept22) Information systems procedures, unlike business processes, need not reflect local cultural values and norms.Answer: FALSEAACSB: Diverse and Multicultural Work EnvironmentsDifficulty: 1: EasyCourse LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept23) To localize a computer program, all you need to do is hire a translator to convert it from one language to another.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept24) International companies that have a single database must declare a single language for the company.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept25) Cross-functional, integrated systems, such as Enterprise Resource Planning (ERP), add to the problems of data isolation.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept26) Differences in language, culture, norms, and expectations compound the difficulties of international process management.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept27) What are the issues that have to be addressed when localizing a computer program? Answer: The process of making a computer program work in a second language is called localizing.The following issues have to be addressed while localizing a computer program:a. The user interface, including menu bars and commands, has to be translated.b. The labels in forms, reports, and query prompts have to be translated and possibly redesigned.c. All documentation and help text have to be translated.d. All the diagrams and examples in the help text have to be redrawn and translated.e. All the error messages have to be translated.f. The text in all message boxes has to be translated.g. Sorting order for the different character sets has to be adjusted.h. Special problems in Asian character sets and in languages that read and write from right to left have to be fixed.AACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept28) What are the problems of inherent processes?Answer: Each software product assumes that the software will be used by people filling particular roles and performing their actions in a certain way. ERP vendors justify this standardization by saying that their procedures are based on industry-wide best practices and that the organization will benefit by following these standard processes. This statement may be true, but some inherent processes may conflict with cultural norms. If they do, it becomes difficult for the management to convince the employees in such cultures to follow those inherent processes. Differences in language, culture, norms, and expectations compound the difficulties of international process management. Just creating an accurate as-is model is difficult and expensive in itself; developing alternative international processes and evaluating them becomes incredibly challenging. With cultural differences, it becomes difficult to determine what criteria should be used for evaluating the alternatives and also for performing the evaluation. AACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept29) Which of the following was a consequence of Henry Ford's unprecedented move of increasing his workers' pay?A) The workers left Ford's company in search of better standards of living.B) The price of the automobiles increased dramatically.C) The demand for Ford's automobiles increased.D) Ford's company suffered a huge loss due to the increased expenses.Answer: CAACSB: Analytical ThinkingDifficulty: 2: ModerateCourse LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.3: How do inter-enterprise IS facilitate globalization? Classification: Concept30) Because of the ________ effect, a dollar spent will contribute two or three dollars of activity to the economy.A) distributionB) bullwhipC) butterflyD) acceleratorAnswer: DAACSB: Analytical ThinkingDifficulty: 1: EasyCourse LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.3: How do inter-enterprise IS facilitate globalization? Classification: Concept31) Information systems increase inventories.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.3: How do inter-enterprise IS facilitate globalization? Classification: Concept32) Information systems are used to reduce or eliminate the bullwhip effect, hence, saving costs. Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 27.3: How do inter-enterprise IS facilitate globalization? Classification: Concept33) Information systems support just-in-time (JIT) inventory techniques.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 27.3: How do inter-enterprise IS facilitate globalization? Classification: Concept34) The accelerator effect can increase the demand for a product.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.3: How do inter-enterprise IS facilitate globalization? Classification: Concept35) How do global information systems affect supply chain profitability?Answer: Global information systems increase supply chain profitability. Supply chain performance is driven by four factors: facilities, inventories, transportation, and information. Every one of these drivers is positively affected by global information systems. Because of global information systems, facilities can be located anywhere in the world.Information systems reduce inventories and hence save costs. They can be used to reduce or eliminate the bullwhip effect. They also support just-in-time (JIT) inventory techniques worldwide. Information systems allow businesses to choose the delivery option that optimizes the value they generate. Finally, global information systems produce comprehensive, accurate, and timely information.AACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss best practices for selecting, evaluating, and managing information systems projects.Learning Obj: LO 27.3: How do inter-enterprise IS facilitate globalization? Classification: Concept36) Operating information systems (IS) internationally can be problematic because of different physical environments.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.4: What are the security challenges of international IS? Classification: Concept37) Which of the following is true of the challenges of international information systems (IS) management?A) Standardizing business processes is a good method to overcome the challenges posed by international IS management.B) Running hardware using the cloud in different countries poses a problem.C) The procedures for using a customer relationship management system remain the same irrespective of the country where it is used.D) The purpose and the scope of a system are determined in the requirement analysis stage of the software development life cycle.Answer: AAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.5: What are the challenges of international IS management? Classification: Concept38) The purpose and scope of a system are determined in the systems definition stage of the Systems Development Life Cycle (SDLC).Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.5: What are the challenges of international IS management? Classification: Concept39) In the context of combatting the challenges of international information systems (IS) management, defining a set of standard business processes requires conversion of the organization to different work processes.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.5: What are the challenges of international IS management? Classification: Concept40) The development rate of international information systems varies among countries and cultures.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.5: What are the challenges of international IS management? Classification: Concept41) What are the challenges of international information systems (IS) management?Answer: Managing a global information systems development project is difficult because of project size and complexity.Project integration is difficult because international development projects require the complex integration of results from distributed workgroups. Also, task dependencies can span teams working in different countries, increasing the difficulty of task management.Time management becomes difficult because teams in different cultures and countries work at different rates. Some cultures have a 35-hour work week, and some have a 60-hour work week. Some cultures expect 6-week vacations, and some expect 2 weeks. Some cultures thrive on efficiency of labor, and others thrive on considerate working relationships. Thus, there is no standard rate of development for an international project.In terms of cost, different countries and cultures pay vastly different labor rates. Using critical path analysis, managers may choose to move a task from one team to another. Doing so, however, may substantially increase costs. Thus, management may choose to accept a delay rather than move work to an available but more expensive team. The complex trade-offs that exist between time and cost become even more complex for international projects.Quality and human resources are also more complicated for international projects. Quality standards vary among countries. Thus, the integration of programs of varying quality results in an inconsistent system.Worker expectations vary among cultures and nations. Compensation, rewards, and worker conditions vary, and these differences can lead to misunderstandings, poor morale, and project delays.Because of these factors, effective team communication is exceedingly important for international projects, but because of language and culture differences and geographic separation, such communication is difficult. Effective communication is also more expensive.Finally, project procurement is complicated by the normal challenges of international commerce. AACSB: Information TechnologyDifficulty: 3: ChallengingCourse LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 27.5: What are the challenges of international IS management? Classification: Concept。

信管专业英语期末考试复习资料

信管专业英语期末考试复习资料

6.1.扁平组织强调分散管理,鼓励员工参与决策。

Flat organizations emphasize a dencentralized approach to management,which encourages high employee involvement in decisions.6.2. 管理人员和员工在一个互有信心、互相信任的友好环境中互动。

Management and employees interact in a friendly environment characterized by mutual confidence and trust.6.3. 机械组织最适合重复的运行和稳定的环境。

Mechanistic organizations are best suited to repetitive operations and stable environment.6.4. 商业计划有多种形式。

There are a wide variety of formats for business plan.6.5. 计划过程远比计划文档更重要。

Far more important than plan documents is that plan process itself.6.6. 每一个任务都应该包括一个执行方案。

Each objective should include an action plan.6.7. 一个执行方案可以帮助主管组织、协调他的团队行动,并使项目按计划进行。

An action plan can help supervisor stay organized,coordinate his or her team’s activities,and keep projects on schedule.6.8. 执行方案详细阐述完成该任务所需要的步骤和工作。

The action plan states specifically what steps or tasks will be accomplished to achieve the objective.6.9. 项目管理软件程序可以帮助主管制定执行方案。

信息管理与信息系统专业英语考试复习题

信息管理与信息系统专业英语考试复习题

信息系统与信息管理专英语复习一、词汇题(英译汉+汉译英以下分栏的是课件上部分红色单词,未分栏的是与专业相关的课件上的词汇,个人感觉比较重要,所以整理了一下,翻译均来自网上在线翻译,可能个别有问题,发现后请及时改正。

不周之处以课件为准。

祝大家考出好成绩!)collar(项圈)Startled(大吃一惊)gasped (气呼呼)project management:项目管理Project initiation and PID Requirements elicitation(获取) & collection Requirements collation(校对) & conflict managementO-O programmingParallel programming Complexity(复杂性)Cabling & Wiring(布电缆和电线)inclusions(加入部分)compatibility(兼容性)interference(干扰)side-effects(副作用)Direct cut-over to new partof systemParallel running of new partwith previous partPilot(试点) cut-over of onedepartmentPiecewise(分段) cut-overPrepare rolling plan(后续计划) for future upgradesPay all outstandingaccounts(未付清的帐)temptation(诱惑)contingency(不测事件)anticipated(期望)deviate(偏离轨道)irresistible(无法抗拒)dictate(要求)trade-offs(权衡)inherent(不可分割)phenomenon(现象)axes(中心)juggle(杂耍)disabled (残疾)handicapped(弱智)availability (可用性)phases(阶段)participate(参与)objective(目标)segments(分块)fixed(固定)size(规模)complexity (复杂程度)Preliminary(初步)investigationcross-life-cycle(横跨生命周期)Fact-finding(事实发现)Presentation(交流讲座)Approximate(大约的,近似的)productivity(工作效率)quality(素质)ongoing(持续不断的)Participants(参与人员)Management(管理人员)analysts(分析员)supervisor(主管)alternative(可选的)Submit(提交)corporate(公司的)charters(章程)paperwork(文书工作)pervasive(蔓延)sense(认识)justify(证明。

信息系统监理师-专业英语(一)

信息系统监理师-专业英语(一)

信息系统监理师-专业英语(一)(总分:40.00,做题时间:90分钟)一、单项选择题(总题数:24,分数:40.00)1.Since RAM is only active when the computer is on, your computer uses disk to store information even when the computer is off. Which of the following is true? ______A. When your computer is on, only RAM is used to store informationB. When your computer is on, only disk drives are used to store informationC. When your computer is oft, only RAM is used to store informationD. When your computer is off, only disk drives are used to store information(分数:1.00)A.B.C.D. √解析:2.Configuration management is the process of managing change in hardware, software, firmware, documentation, measurements, etc. As change requires an initial state and next state, the marking of significant states within a series of several changes becomes important. The identification of significant states within the revision history of a configuration item is the central purpose of ______ identification.A. baselineB. valueC. costD. Control(分数:1.00)A. √B.C.D.解析:3.You are a project manager for a small project. Your project was budgeted for ¥500,000 overa six-week perioD. As of today, you've spent ¥260,000 of your budget to complete work that you originally expected to cost ¥280,000. According to your schedule, you should have spent ¥300,000 by this point. Based on these circumstances, your project could be BEST described as ______ A. Ahead of schedule B. Behind scheduleC. On scheduleD. Having not enough information provided(分数:1.00)A.B. √C.D.解析:4.A ______ infected computer may lose its data.A. fileB. databaseC. virusD. program(分数:1.00)A.B.C. √D.解析:Virtualization is an approach to IT that pools and shares (36) so that utilization is optimized and supplies automatically meet demanD. Traditional IT environments are often silos, where both technology and human (37) are aligned around an application or business function. With a virtualized (38) , people, processes, and technology are focused on meeting service levels, (39) is allocated dynamically, resources are optimized, and the entire infrastructure is simplified and flexible. We offer a broad spectrum of virtualization (40) that allows customers to choose the most appropriate path and optimization focus for their IT infrastructure resources.(分数:5.00)(1).A. advantages B. resources C. benefits D. precedents(分数:1.00)A.B. √C.D.解析:(2).A. profits B. costs C. resources D. powers(分数:1.00)A.B.C. √D.解析:(3).A. system B. infrastructure C. hardware D. link(分数:1.00)A.B. √C.D.解析:(4).A. content B. position C. power D. capacity(分数:1.00)A.B.C.D. √解析:(5).A. solutions B. networks C. interfaces D. connections(分数:1.00)A. √B.C.D.解析:5.______ is not the tool name for quality controlling used in the figure below.A. Cause and Effect DiagramsB. Ishikawa DiagramsC. Fishbone DiagramsD. Scatter Diagram(分数:1.00)A.B.C.D. √解析:6.Which of the following is not part of the quality assurance process? ______A. Operational definitionsB. Quality policyC. Quality auditsD. Quality improvement(分数:1.00)A.B. √C.D.解析:7.The connection between two networks to form an internet is handled by a machine known as a ______.A. bridgeB. clientC. routerD. switch(分数:1.00)A.B.C. √D.解析:8.______ is one of the techniques used for estimating activity durations.A. Analogous EstimatingB. Precedence Diagramming Method (PDM)C. Dependency DeterminationD. Schedule network Templates(分数:1.00)A. √B.C.D.解析:9.Which of the following is not part of a modern quality management concept? ______A. Performance standard is zero defectsB. Quality must be inspected inC. 85% of failures occur because of the process, not the workerD. Quality is a 4 cycle process - plan/do/check/act(分数:1.00)A.B. √C.D.解析:10.Consumption of the total life-cycle effort in software maintenance is ______ that in software development.A. less thanB. larger thanC. equal Or less thanD. equal or larger than(分数:1.00)A.B. √C.D.解析:11.One tool that is useful during both analysis and design is the ______, which is a pictorial representation of the items of information(entities) within the system and the relationships between these pieces of information.A. data dictionaryB. dataflow diagramC. use case diagramD. entity-relationship diagram(分数:1.00)A.B.C.D. √解析:Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (6) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (7) . Upon running, such worms usually proceed to send themselves out to email addresses from the victim'address book, previous emails, web pages (8) .As administrators seek to block dangerous email attachments through the recognition of well-known (9) , virus writers use other extensions to circumvent such protection. Executable(.exe)files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwouds and give the (10) access to your network.(分数:5.00)(1).A. attachment B. packet C. datagram D. message(分数:1.00)A. √B.C.D.解析:(2).A. virtual B. virus C. worms D. bacteria(分数:1.00)A.B.C. √D.解析:(3).A. memory B. caches C. ports D. registers(分数:1.00)A.B. √C.D.解析:(4).A. names B. cookies C. software D. extensions(分数:1.00)A.B.C.D. √解析:(5).A. cracker B. user C. customer D. client(分数:1.00)A. √B.C.D.解析:12.Stack is quite simple. Many computer systems have stacks built into their circuitry. They also have machine-level instructions to operate the hardware stack. Stack is ______ in computer systems.A. uselessB. not importantC. simple but importantD. too simple to be useful(分数:1.00)A.B.C. √D.解析:13.Which of the following elements can be called the key element of a computer? ______A. printerB. CPUC. mouseD. keyboard(分数:1.00)A.B. √C.D.解析:WebSQL is a SQL-like (26) language for extracting information from the weB. Its capabilities for performing navigation of web (27) make it a useful tool for automating several web-related tasks that require the systematic processing of either ail the links in a (28) , all the pages that can be reached from a given URL through (29) that match a pattern, or a combination of both. WebSQL also provides transparent access to index servers that can be queried via the Common (30) Interface.(分数:5.00)(1).A. query B. transactionC. communicationD. programming(分数:1.00)A. √B.C.D.解析:(2).A. browsers B. servers C. hypertexts D. clients(分数:1.00)A.B.C. √D.解析:(3).A. hypertext B. page C. protocol D. operation(分数:1.00)A.B. √C.D.解析:(4).A. paths B. chips C. tools D. directories(分数:1.00)A. √B.C.D.解析:(5).A. Router B. Device C. Computer D. Gateway(分数:1.00)A.B.C.D. √解析:14.Which statement about the preliminary design stage of a software development project is true? ______A. The preliminary design is an internal document used only by programmersB. The preliminary design is the result of mapping product requirements info software and hardware functionsC. The preliminary design of the product comes from the requirement specificationD. The developers produce the preliminary design by defining the software structure in enough detail to permit coding(分数:1.00)B.C. √D.解析:15.The basic unit of measure in a computer system is the ______. It is the smallest unit in computing. There are some other measures in a computer, such as Kilobyte, Megabyte, Gigabyte and so on.A. KilobyteB. BitC. GigabyteD. Megabyte(分数:1.00)A.B. √C.D.解析:16.A work breakdown structure (WBS) is a tool used to define and group a project's discrete work elements in a way that helps organize and define the total work scope of the project. A WBS is most useful for ______.A. identifying individual tasks for a projectB. scheduling the start of tasksC. scheduling the end of tasksD. determining potential delays(分数:1.00)A. √B.C.D.解析:MIDI enables people to use (11) computers and electronic musical instruments. There are actually three components to MIDI, the communications " (12) ", the Hardware Interface and a distribution (13) called "Standard MIDI Files" . In the context of the WWW, the most interesting component is the (14) Format. In principle, MIDI files contain sequences of MIDI Protocol messages. However, when MIDI Protocol (15) are stored in MIDI files, the events are also time-stamped for playback in the proper sequence. Music delivered by MIDI files is the most common use of MIDI today.(分数:5.00)(1).A. personal B. electronic C. multimedia D. network(分数:1.00)A.B.C. √D.解析:(2).A. device B. protocol C. network D. controller(分数:1.00)A.B. √C.解析:(3).A. format B. text C. wave D. center(分数:1.00)A. √B.C.D.解析:(4).A. Video B. Faxmail C. Graphic D. Audio(分数:1.00)A.B.C.D. √解析:(5).A. messages B. packets C. frame D. information(分数:1.00)A. √B.C.D.解析:17.In software engineering and systems engineering, ______ is a description of a system's behavior as it responds to a request that originates from outside of that system.A. blackboxB. business ruleC. use caseD. traceability matrix(分数:1.00)A.B.C. √D.解析:18.______ Development is a structured design methodology that proceeds in a sequence from one phase to the next.A. WaterfallB. PhasedC. PrototypingD. Parallel(分数:1.00)A. √B.C.D.解析:19.Maintenance activities include ______.①making enhancements to software products②developing a new software product③correcting problems④adapting products to new environmentsA. ①②B. ①③④C. ②③④D. ①②③④(分数:1.00)A.B. √C.D.解析:20.______ operate by distributing a workload evenly over multiple back end nodes. Typically the cluster will be configured with multiple redundant load-balancing front ends.A. High-availability clustersB. Load-balancing clustersC. Grid computingD. Cloud Computing(分数:1.00)A.B. √C.D.解析:。

信管专英考试作文

信管专英考试作文

信管专英考试作文一、题目:The Importance of Information Management in the Digital Age (数字时代信息管理的重要性)In this super duper digital age, information is like a wild, unruly beast. And information management? Well, it's the zookeeper that tries to keep everything in order.First off, let's talk about the sheer volume of information out there. Every single second, bazillions of data bits are being created. It's like a never ending waterfall of 1s and 0s. If there's no proper information management, we'd be drowning in this digital deluge. For example, think about all the social media posts, news articles, and e mails we get every day. Without a system to manage it, we'd be lost in a chaotic mess of useless and useful information all jumbled together.Secondly, in businesses, information management is like the magic wand that can either make or break a company. Good information management means that a company can analyze customer data to figure out what people really want. They can keep track of their inventory, sales trends, and evenpredict future market changes. It's like having a crystal ball but a much more scientific and data driven one.On a more personal level, it helps us protect our privacy. In this digital jungle, there are all kinds of sneaky digital predators waiting to steal our personal information. With proper information management, like using strong passwords and secure software, we can build a digital fortress around our private data.In conclusion, information management in the digital age is not just some fancy schmancy concept. It's an absolute necessity. It's the key tounlocking the potential of all this digital information while also keeping us safe and organized in this crazy, connected world.二、题目:The Role of English in Information Management(英语在信息管理中的作用)Well, English in information management is like the universal remote control for the digital world.One big reason is that English is the lingua franca of the Internet. Most of the important information, whether it's the latest scientific research or high tech product manuals, is first written in English. So if you want to get your hands on the freshest and most relevant information in the field of information management, you better know your English. It'slike being at a party where everyone is speaking a secret code, and English is that code.In international companies, which are all over the place in the information management biz, English is the common language that ties everyone together. Whether it's a team in India, China, or the United States, they all communicate in English about things like database management, information security, and data analysis. If you can't speak English well, it's like trying to play a game of soccer without knowing the rules.Also, a lot of the top notch software and information management tools are developed in English speaking countries. The user interfaces, the documentation, all in English. If you don't understand English, you might end up using these powerful tools all wrong, like trying to drive a car but not knowing which pedal is the brake.To sum it up, English is not just another language in the world of information management. It's the golden ticket that gives you access to the best information, the best collaborations, and the best tools. It's the language that makes the information management world go round.。

信管专业英语期末考试复习资料

信管专业英语期末考试复习资料

6.1. 扁平组织强调分散管理,鼓励员工参与决策。

Flat organizations emphasize a dencentralized approach to management,which encourages high employee involvement in decisions. 6.2. 管理人员和员工在一个互有信心、互相信任的友好环境中互动。

Management and employees interact in a friendlyenvironment characterized by mutual confidence and trust. 6.3. 机械组织最适合重复的运行和稳定的环境。

Mechanistic organizations are best suited to repetitive operations and stable environment.6.4. 商业计划有多种形式。

There are a wide variety of formats for business plan.6.5. 计划过程远比计划文档更重要。

Far more important than plan documents is that plan process itself. 6.6. 每一个任务都应该包括一个执行方案。

Each objective should include an action plan.6.7. 一个执行方案可以帮助主管组织、协调他的团队行动,并使项目按计划进行。

An action plan can help supervisor stay organized,coordinate his or her team' s activities,and keep projects on schedule. 6.8. 执行方案详细阐述完成该任务所需要的步骤和工作。

管理信息系统复习大纲(英文)

管理信息系统复习大纲(英文)

管理信息系统复习大纲(英文)Chapter Outline:1.1 The role of Information Systems in Business today(信息系统在现代商业中的角色)1.2 Perspectives on Information Systems and Information Technology(信息系统VS.信息技术)1.3 It Isn’t simply technology: The role of People and Organizations(人和组织的作用)1.4 Understanding Information Systems: A Business Problem-Solving Approach(解决问题的途径)1. Business Objectives of Information systems(Why Information Systems is soessential today?):★★★★★Operational ExcellenceNew Products, Services, and Business ModelsCustomer and Supplier IntimacyImproved Decision MakingCompetitive AdvantageSurvival2. Information system:a set of interrelated components that collect, process, store,and distribute information to support decision making and control in an organization. ★3. Information VS Data ★★★★★Information: data that have been shaped into a form that is meaningful anduseful to human beings.Data: are streams of raw facts representing events occurring inorganizations or the physical environment before they have been organized and arranged into a form that people can understand and use.4. Input, Output, Processing, Feedback(反馈;回复;成果,资料)★5. Business Processes: are logically related tasks and behaviors for accomplishingwork. (chapter2, p43) ★★★★★6. problem-solving approach ★★Chapter Outline:2.1 Components of a Business(商务的构成)2.2 Types of Business Information Systems(商务信息系统的类型)2.3 Systems That Span the Enterprise(企业范围的系统)2.4 The Information Systems Function in Business(信息系统的功能)1. Basic Business Functions: ★★★Sales and MarketingFinance and AccountingManufacturing and ProductionHuman resources2. Business Processes: the role of business processes in organization: the efficiency ofa business firm depends on how well its business processes are designed and coordinated. ★★★★★★3. the hierarchy of management: ★★Senior managementMiddle managementOperational managementKnowledge workersData workersProduction or service workers4. Types of Business Information SystemsSystems for Functional Perspective: Sales and Marketing Systems,Manufacturing and Production Systems, Finance and Accounting Systems, Human Resources SystemsSystems from a Constituency Perspective: ★★★Transaction Processing Systems(TPS),Management Information Systems(MIS),Decision-Support Systems(DSS),Executive Support Systems(ESS)5. Enterprise Applications: ★★★★★Enterprise SystemsSupply Chain Management SystemsCustomer Relationship Management SystemsKnowledge Management SystemsChapter Outline:3.1 Using Information Systems to Achieve Competitive Advantage(使用信息系统取得竞争优势)3.2 Competing on a Global Scale(全球竞争)3.3 Competing on Quality and Design(质量和设计竞争)3.4 Competing on Business Processes(业务流程竞争)1. Types of Competitive Advantage ★★★★★Barriers to entry that restrict supplyDemand controlEconomies of ScaleProcess efficiency2. Information system strategies for dealing with competitive forces: ★★Low-Cost leadershipProduct differentiationFocus on market nicheStrengthen customer and supplier intimacy3. Value chain model ★★4. best practices ★★★5. core competency:6. virtual company: uses networks to link people, assets(资产), and ideas, enablingit to ally (结盟)with other companies to create and distribute products and services without being limited by traditional organizational boundaries or physical locations. ★★7. TQM, Six sigma ★★8. BPR(business process reengineering): radical rethinking and redesign of businessprocesses to take advantage of information systems. How could it help business become more competitive? ★★★★Chapter Outline:8.1 Enterprise Systems8.2 Supply Chain Management Systems8.3 Customer Relationship Management Systems8.4 Enterprise Applications: New Opportunities and Challenges1. Enterprise software is built around thousands of predefined business processesthat reflect best practices. ★★★2. MPS, MRP ★★★★★3. Supply chain: a network of organizations and business processes for procuringraw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers.4. upstream, downstream ★★5. just-in-time strategy ★★6. bullwhip effect ★7. push-based model, pull-based model ★★8. Supply chain planning systems, supply chain execution systems ★★9. CRM Systems capture and integrate customer data from all over the organization,consolidate the data, analyze the data, and then distribute the results to various systems and customer touch points across the enterprise.10. cross-selling, up-selling, bundling ★★11. churn rate★Chapter Outline:9.1 Electronic Commerce and the Internet9.2 Electronic Commerce9.3 M-Commerce9.4 Electronic Commerce payment systems1. Information asymmetry ★★2. Syndicator ★3. digital wallet ★★4. digital cash ★Chapter Outline:10.1 Decision making and information systems10.2 Systems for decision support10.3 Intelligent systems for decision support10.4 Systems for managing knowledge1. Types of decisions: ★★★Structured decisions——Operational Management——TPS, MISSemistructured decisions——Middle Management——DSSUnstructured decisions——Senior Management——ESS2. Sensitivity analysis ★3. GIS: Geographic information systems ★★4. GDSS: Group decision-support system5. expert system6. case-based reasoning ★★7. Knowledge Management ★8. tacit knowledge ★Chapter Outline:11.1 Problem Solving and Systems Development11.2 Understanding the Business Value of Systems and Managing Change11.3 Alternative systems-building approaches11.4 Modeling and Designing systems: Structured and Object-Orientedmethodologies1. Problem solving: ★★★Defining and understanding the problemDevelop alternative solutionsChoose the best solutionSystem analysisSystem designImplement the solution2. feasibility study: financial, technical, and organizational ★3. conversion: parallel strategy, direct cutover strategy, and phased approachstrategy ★4. tangible benefits, intangible benefits5. alternative systems-building approachesTraditional systems development lifecyclePrototyping ★★End-user developmentApplication software packages and outsourcingRapid application development for e-business6. Structured methodologies7. Object-Oriented development ★★★。

管理信息系统 作业题目及答案(双语)

管理信息系统 作业题目及答案(双语)

1. Which four reasons do make IT a difference to the success of a business? Explain them simply. IT对于企业的成功有哪4个方面的原因,简单说说。

There are four reasons why IT makes a difference to the success of a business:1) Capital management 资产管理a) IT is the largest single component of capital investment in the United States.b) About $1.8 trillion is spent each year by American businesses.c) Managers and business students need to know how to invest this capital wisely.d) The success of your business in the future may well depend on how you makeIT investment decisions.2) Foundation of doing business 业务流程建设a) Most businesses today could not operate without extensive use of informationsystems and technologies.b) IT can increase market share.c) IT can help a business become a high-quality, low-cost producer.d) IT is vital to the development of new products.3) Productivity 生产力a) IT is one of the most important tools managers have to increase productivityand efficiency of businesses.b) According to the Federal Reserve Bank, IT has reduced the rate of inflation by0.5 to 1% in the last decade. For firms this means IT is a major factor inreducing costs.c) It is estimated that IT has increased productivity in the economy by about 1% inthe last decade. For firms this means IT is a major source of labor and capitalefficiency.4) Strategic opportunity and advantage 战略机会和优势a) Create competitive advantage: IT makes it possible to develop competitiveadvantages.b) New Business Models: Dell Computer has built its competitive advantage on anIT enabled build-to-order business model that other firms have not been able toimitate.c) Create new services: eBay has developed the largest auction trading platformfor millions of individuals and businesses. Competitors have not been able toimitate its success.d) Differentiate yourself from your competitors: Amazon has become the largestbook retailer in the United States on the strength of its huge online inventoryand recommender system. It has no rivals in size and scope.2. What are three dimensions of the IS? Explain them simply. 信息管理的3个维度是什么,请简单说说。

管理信息系统(英文版第7版)题库chapter extension 14

管理信息系统(英文版第7版)题库chapter extension 14

Experiencing MIS, 7e (Kroenke)Chapter Extension 14 Data Breaches1) A student at the MSA University hacked into the university's official Web site and stole some confidential information about the scholarship program. This incident is an example of________.A) a data breachB) asynchronous communicationC) key escrowD) a sequence flowAnswer: AAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.1: What is a data breach?Classification: Application2) Which of the following is a direct cost of handling a data breach?A) loss of reputationB) abnormal customer turnoverC) legal fees and consultationD) increased customer acquisition activitiesAnswer: CAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.1: What is a data breach?Classification: Concept3) Sam is a hacker who makes money by stealing and selling credit cards. He has targeted the employees of a local firm and is looking for details such as names, addresses, dates of birth, social security numbers, credit card numbers, or health records. In this case, Sam is looking for ________.A) firewall security measuresB) business continuity plansC) malware definitionsD) personally identifiable informationAnswer: DAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.1: What is a data breach?Classification: Application4) ________ refers to the process of placing a small charge on a credit card to ensure it is working.A) HoardingB) CardingC) PhishingD) Credit card hijackingAnswer: BAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.1: What is a data breach?Classification: Concept5) Direct costs of handling a data breach do not include paying for detection of the breach. Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.1: What is a data breach?Classification: Concept6) According to the reports in Ponemon's 2014 Cost of Data Breach Study, organizations are more likely to lose larger amounts of data than smaller amounts of data.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.1: What is a data breach?Classification: Concept7) Personally identifiable information includes a person's bank account numbers, personal identification numbers, email address, and social security numbers.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.1: What is a data breach?Classification: Concept8) Stolen credit card information is validated through a process called carding.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.1: What is a data breach?Classification: Concept9) Explain how hackers use information stolen from data breaches for credit card forgery. Answer: Over 67 percent of data breaches come from hackers trying to make money. Hackers are primarily looking for personally identifiable information (PII), or data that can be used to identify a person. This includes names, addresses, dates of birth, social security numbers, credit card numbers, health records, bank account numbers, personal identification numbers, and email addresses. Stolen information is commonly used for credit card fraud. Stolen credit card information is validated through a process called carding, where a small charge is placed on the card to ensure it is working. Valid cards are then bundled and sold on the black market. The price of stolen credit cards can run from $2 to $45 per card, depending on the type of account. Stolen data is commonly used for identity theft, extortion, and industrial espionage.AACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.1: What is a data breach?Classification: Concept10) The first step in protecting oneself from data breaches is ________.A) securing credit and debit card detailsB) understanding how they happenC) learning the technologies used for these activitiesD) installing necessary software to protect from possible breachesAnswer: BAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept11) Bob, a hacker, encountered a vulnerability in a bank's firewall when he was trying to hack into its Web site. Which of the following can Bob use to take advantage of this liability?A) exploitB) attack vectorC) cardingD) wardriverAnswer: AAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.2: How do data breaches happen?Classification: Application12) A group of hackers use a targeted phishing attack to breach a company's firewalls and hack into its security system. Which of the following techniques have the hackers used?A) pretextingB) IP spoofingC) spear phishingD) phone phishingAnswer: CAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept13) A group of hackers decide to steal credit card details of the users of Swift Shopping Inc., a leading e-commerce company. They infect the security system of the company's third-party vendor and gain access into its internal network. They compromise an internal Windows server of the company and use a malware to extract customer data. Which of the following is illustrated in this scenario?A) hardeningB) cardingC) pretextingD) data breachingAnswer: DAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.2: How do data breaches happen?Classification: Application14) Each type of data breach is different because hackers are continually developing new tools and techniques that enable them to steal more data.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept15) Attack vectors refer to the ways hackers attack a target.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept16) An exploit is a type of attack vector used by hackers.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept17) Spear phishing is used by organizations to monitor traffic passing through their internal network.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept18) Explain how data breach occurs with an example.Answer: Hackers are continually developing new tools and techniques that enable them to steal more data. They experiment with new attack vectors, or ways of attacking a target. In the data breach that occurred at Target Corporation in late 2013, attackers first purchased malware designed specifically for the attacks they planned to carry out. They then used spear phishing, or a targeted phishing attack, to infect a Target third party vendor's system and gather keystrokes, login credentials, and screenshots from the vendor's users. The attackers used this information to gain access into Target's internal network. Once inside Target's network, the attackers compromised an internal Windows file server. From this server, the attackers used malware named Trojan.POSRAM to extract customer data from point-of-sale (POS) terminals. Customer data was continuously sent from the POS terminals to an extraction server within Target's network. It was then funneled out of Target's network to drop servers in Russia, Brazil, and Miami. From there, the data was collected and sold on the black market.AACSB: Information TechnologyDifficulty: 3: ChallengingCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept19) Stuart works for a financial brokerage. His job involves handling sensitive client information such as financial details. Stuart illegally transfers details of some clients from his office computer to his personal email ID, to misuse later. With reference to this situation, Stuart is guilty of ________.A) exfiltratingB) cardingC) hardeningD) pretextingAnswer: AAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Application20) Which of the following is true of the measures to be taken by an organization in the event ofa data breach?A) The organization must delay informing its users so that the occurrence of data breach remains private.B) The organization must not involve additional technical or law enforcement professionals, as it may lead to further damage to its data.C) The organization must destroy the evidence of the breach to avoid future security problems.D) The organization must respond quickly to mitigate the amount of damage hackers can do with the stolen data.Answer: DAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept21) Executives, managers, and all systems personnel of an organization discuss the actions to be taken by each employee in case a data breach occurs. They identify areas that would need immediate attention and assign specific responsibilities to each employee. The employees of the organization are performing a(n) ________.A) exfiltrationB) documentationC) walkthroughD) case studyAnswer: CAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Application22) The purpose of a business continuity planning session in an organization is to ________.A) discuss how to return the organization to normal operations as quickly as possible after a data breachB) build plans to increase the market presence of the organization and increase its user baseC) identify new markets that will accelerate the growth of the organizationD) understand the type of information stored by the organization and implement relevant security measures as required by regulatory lawsAnswer: AAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept23) Which of the following should be done by employees to protect against data breaches?A) They should develop new exploits.B) They should remove existing honeypots.C) They should design methods for data extrusion.D) They should conduct a walkthrough.Answer: DAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept24) Jobs Dot Com, an online recruitment site, was hacked into, and personal information of a number of users was stolen. What information should Jobs Dot Com include in its data breach notification to its users?A) the costs incurred due to the breachB) a sincere apology and an acceptance of responsibility for the incidentC) details of how the breach occurred and the reasons for the breachD) a report on the current security measuresAnswer: BAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Application25) Data extrusion helps organizations secure their data from possible data breaches. Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept26) Despite data breach, organizations should refrain from informing their users immediately as it will lead to mass user defection.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept27) Decisions on how to respond to a data breach are most effective if they are made when the breach is happening.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept28) Performing a walkthrough should be done as part of a business continuity planning session. Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept29) Data breach notifications should state that the existing security policies and procedures are inadequate and that changes are being made to prevent similar breaches in the future. Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept30) Why should organizations respond quickly to data breaches?Answer: Organizations need to respond to data breaches quickly for several reasons. First, by responding quickly an organization can stop hackers from doing more damage. Hackers can be prevented from accessing other internal systems, and affected systems can be patched and cleaned. Additionally, if organizations respond quickly enough, hackers may be prevented from exfiltrating, or illegally transferring, data out of the organization. Second, responding quickly may mitigate the amount of damage hackers can do with the stolen data. If the affected users are notified immediately they can change their passwords, cancel their credit cards, and possibly activate credit monitoring services. Third, the longer organizations delay in notifying users, the more upset users become. Based on past data breaches, users are reasonably forgiving of organizations that quickly notify them about what happened and what steps that are being taken to make things right.AACSB: Information TechnologyDifficulty: 3: ChallengingCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept31) What are the steps involved in an organization's plan for a data breach?Answer: Data breaches aren't guaranteed to happen, but they are likely to happen. As a result, organizations need to plan for data breaches. They need to rehearse what they will do when a breach happens. Executives, managers, and systems personnel must perform a walkthrough and discuss the specific steps each person will take after a breach occurs. This should be done as part of a broader business continuity planning session that discusses how to return the organization to normal operations as quickly as possible. As part of the planning process, organizations should form a computer security incident response team (CSIRT) consisting of staff from the legal and public relations departments, as well as executives and systems administrators. Coordinatedpre-planning for an incident helps organizations avoid missteps like accidentally destroying evidence and issuing poorly worded data breach notices to users. Decisions must be made before the incident, not while it's happening.Finally, as part of the planning process, organizations need to identify additional technical and law enforcement professionals that may need to be brought in to help handle the data breach. Evidence of the breach must be preserved, and the extent of the damage needs to be accurately measured.AACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept32) The ________ is a regulatory law that requires security precautions for government agencies.A) Federal Information Security Management Act (FISMA)B) Gramm-Leach-Bliley Act (GLBA)C) Payment Card Industry Data Security Standard (PCI DSS)D) Family Educational Rights and Privacy Act (FERPA)Answer: AAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.4: What are the legal consequences of a data breach?Classification: Concept33) Which of the following regulatory laws requires data protection for financial institutions?A) the Family Educational Rights and Privacy Act (FERPA)B) the Federal Information Security Management Act (FISMA)C) the Gramm-Leach-Bliley Act (GLBA)D) the Health Information Portability and Accountability Act (HIPAA)Answer: CAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.4: What are the legal consequences of a data breach?Classification: Concept34) Adam owns and manages a large insurance company. In order to protect his organization from data breach, Adam has to ensure that he has incorporated the security measures required by the ________.A) Family Educational Rights and Privacy Act (FERPA)B) Federal Information Security Management Act (FISMA)C) Payment Card Industry Data Security Standard (PCI DSS)D) Gramm-Leach-Bliley Act (GLBA)Answer: DAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.4: What are the legal consequences of a data breach?Classification: Application35) Venclave Hospital is a privately-owned organization that specializes in treating neurological diseases. Which of the following regulatory laws governs the data security measures to be taken by this hospital for protecting against data breach?A) the Health Maintenance Organization Act of 1973B) the Health Information Portability and Accountability Act (HIPAA)C) the Gramm-Leach-Bliley Act (GLBA)D) the Federal Information Security Management Act (FISMA)Answer: BAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.4: What are the legal consequences of a data breach? Classification: Application36) Which of the following regulatory laws requires data protection for health care institutions?A) the Gramm-Leach-Bliley Act (GLBA)B) the Federal Information Security Management Act (FISMA)C) the Health Information Portability and Accountability Act (HIPAA)D) the Health Maintenance Organization Act of 1973Answer: CAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.4: What are the legal consequences of a data breach? Classification: Concept37) The ________ is a regulatory law that provides protection for student education records.A) Family Educational Rights and Privacy Act (FERPA)B) Equal Educational Opportunities Act of 1974C) Smith-Lever Act of 1914D) Federal Information Security Management Act (FISMA)Answer: AAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.4: What are the legal consequences of a data breach? Classification: Concept38) Organizations need to understand the body of regulatory law relative to the type of information they store because they will be held accountable for implementing those standards. Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.4: What are the legal consequences of a data breach? Classification: Concept39) The Federal Information Security Management Act (FISMA) details the procedures to be followed by a federal agency in case an organization fails to ensure the minimum security requirements for its data and systems.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.4: What are the legal consequences of a data breach? Classification: Concept40) The Gramm-Leach-Bliley Act (GLBA) is a universal regulatory law that applies to all types of industries.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.4: What are the legal consequences of a data breach? Classification: Concept41) List some of the regulatory laws that govern the secure storage of data in certain industries. Answer: Organizations need to understand the body of regulatory law relative to the type of information they store because they will be held accountable for implementing those standards.A few prominent regulatory laws that govern the secure storage of data in certain industries are listed below.1. The Federal Information Security Management Act (FISMA) requires security precautions for government agencies.2. The Gramm-Leach-Bliley Act (GLBA), also known as the Financial Services Modernization Act, requires data protection for financial institutions.3. The Health Information Portability and Accountability Act (HIPAA) requires data protection for health care institutions.4. The Payment Card Industry Data Security Standard (PCI DSS) governs the secure storage of cardholder data.5. The Family Educational Rights and Privacy Act (FERPA) provides protection for student education records.AACSB: Information TechnologyDifficulty: 3: ChallengingCourse LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.4: What are the legal consequences of a data breach? Classification: Concept42) ________ are software or procedures used to prevent an information security attack.A) Malware definitionsB) CountermeasuresC) ExploitsD) Attack vectorsAnswer: BAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.5: How can data breaches be prevented?Classification: Concept43) Talgedco Inc., a software company, has taken several steps to secure its systems and data. The company has also installed a network intrusion detection system and data loss prevention system. Employees of this company have also been trained on the procedures to be followed to reduce the probability of a data breach. These steps taken by Talgedco are an example of________.A) attack vectorsB) countermeasuresC) malwareD) exfiltrationAnswer: BAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.5: How can data breaches be prevented?Classification: Application44) A(n) ________ is used to examine traffic passing through an organization's internal network.A) honeypotB) attack vectorC) security protocols open repositoryD) network intrusion detection systemAnswer: DAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.5: How can data breaches be prevented?Classification: Concept45) ________ are countermeasures designed to prevent sensitive data from being released to unauthorized persons.A) Malware definitionsB) Attack vectorsC) Data loss prevention systemsD) Data extrusion prevention systemsAnswer: CAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.5: How can data breaches be prevented?Classification: Concept46) Organizations can implement countermeasures that make data breaches impossible to occur. Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.5: How can data breaches be prevented?Classification: Concept47) It is easy for organizations to prepare a list of countermeasures against many different types of attacks and take appropriate measures accordingly.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.5: How can data breaches be prevented?Classification: Concept48) An organization can easily stop a simple SQL injection attack on its online store by additional user training, stronger vendor authentication, or an internal network intrusion detection system.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.5: How can data breaches be prevented?Classification: Concept。

信管专业英语期末考试复习资料

信管专业英语期末考试复习资料

6。

1.扁平组织强调分散管理,鼓励员工参与决策。

Flat organizations emphasize a dencentralized approach to management,which encourages high employee involvement in decisions.6.2。

管理人员和员工在一个互有信心、互相信任的友好环境中互动。

Management and employees interact in a friendly environment characterized by mutual confidence and trust.6。

3. 机械组织最适合重复的运行和稳定的环境。

Mechanistic organizations are best suited to repetitive operations and stable environment.6.4。

商业计划有多种形式。

There are a wide variety of formats for business plan.6.5。

计划过程远比计划文档更重要。

Far more important than plan documents is that plan process itself。

6。

6。

每一个任务都应该包括一个执行方案。

Each objective should include an action plan。

6.7. 一个执行方案可以帮助主管组织、协调他的团队行动,并使项目按计划进行。

An action plan can help supervisor stay organized,coordinate his or her team's activities,and keep projects on schedule。

6.8。

执行方案详细阐述完成该任务所需要的步骤和工作。

The action plan states specifically what steps or tasks will be accomplished to achieve the objective.6。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

信管英语复习试题参考答案(第一部分)一、翻译(课本P1-3)1、The study of information systems is usually a commerce and business administration discipline. “and frequently involves software engineering, but also distinguishes itself by concentrating on the integration of computer systems with the aims of the organization.2、Information systems support business processes and operations by the ways 1) Processing these accounting records into income statements, balance sheets,ledgers,management reports,and other forms of financial information 2) Recording and storing inventory data,work in process data, equipment repair and maintenance data,supply chain data,and other production/operations records3、More sophisticated programs often seamlessly incorporate statistical decision making tools like sensitivity analysis,Monte Carlo analysis.risk analysis, breakeven analysis and Bayesian analysis.4、If,for example,you are using the information system to decide about a new product introduction,the program should incorporate tools like logic analysis, conjoint analysis, contribution margin analysis.multi-dimensional scaling,multi-factor analysis. factor analysis,cluster analysis, discriminant analysis, Quality Function Deployment,preference regressions,and preference-rank translations。

二、选择(课本P4)As the strategic support role,information systems can support a company's competitive positioning (l)The supports of help in the piloting of the chain of internal value. They are the most recent,the most__________ and are within the reach of the manager They are the solutions of reductions of costs and management of the__________. One___________ them under the name of “Business Workflow Analysis”( BWA) or of“Business Management Sys tems Peer To Peer(p2p)”Tools netw orks,they assure the control of the piloting of the___________ of the functions of the company,the mastery in real time of the costs of dysfunctions cause distances from accounts,evaluation and reporting of accounting results___________ in the evaluation and in the reporting of results quality①indicates ②articulated ③pragmatic ④performance ⑤set三、判断(课本P33-34)From time to time, organizations need to change their information systems, in response to new marketing opportunities, modified government regulations, the introduction of new technolog, merger with another company, or other developments. For instance, a major cable-TV company may need to set up a billing system for movies-on-demand, or, on a smaller scale, a two-person graphic design business may want to change its invoice and payment system. When change is needed, the time is ripe for applying the principles of systems analysis and design.The formal process by which organizations build systems is known as the Systems Development Life Cycle (SDLC). The extent to which your job brings you in contact with your company's SDLC will vary depending on a number of factors, such as the size of the organization, your job description, your relevant experience, and youreducational background. In large companies the SDLC usually involves clearly defined standards and procedures. Although the technical aspects of each phase of the cycle will undoubtedly be handled by information specialists, users will always interface with these specialists As we'll see, users play a vital role in systems development.1、Organizations only need to change their information systems for a long time.()2、When change is needed, applying the principles of systems analysis and design is not needed.()3、The extent to which your job brings you in contact with your company's SDLC will vary depending only on the size of the organization()4、In large companies the SDLC usually involves vague defined standards and procedures. ()5、The technical aspects of each phase of the cycle will undoubtedly be handled by users四、阅读理解(课本P38、39、45、46)Different organizations may refer to the systems development life cycle by different names - such as applications development cycle.systems development cycle, or structured development life cycle - or, indeed, sometimes by no name at all. However,the general objectives remain the same. the number of steps necessary to complete the cycle may also vary from one company to another, depending on the level of detail necessary to effectively administer and control systems development. One way to look at systems development is to divide it into six phases The FIrst Phase: Conduct a Preliminary Investigation In this step, you need to find out what the organization's objectives are and to explore the nature and scope of the problems under study. Determine the organization' s objectives: Even if a problem pertains to only a small segment of the organization, you cannot study it in isolation. You need to find out what the overall objectives of the organization are and how groups and departments within the organization interact. Then you need to examine the problem in that context.Note that systems analysis does not focus only on information technology. In Business Process Redesign(BPR) , principles of systems analysis are applied to the goal of dramatically changing and improving the fundamental business processes of an organization. Interest in BPR was driven by the discovery that most current information systems and applications have merely automated existing inefficient business processes. BPR analysis focuses almost entirely on non-computer processes. Each process is studied and analyzed for bottlenecks, value returned, and opportunities for elimination or streamlining. The last stop is to examine how information technology might best be applied to the improved business processes. In this chapter, however, we are focusing on computer-based information systems.1、The number of steps necessary to complete the cycle depending on the _____ of detail necessary to effectively administer and control systems development.A.objectivesB.levelC.applicationD.structure2、Even if a problem _____ only a small segment of the organization, you cannot study it in isolation.A.conductB.indentifiedC.pertains toD.suggested3、You need to find out how groups and departments within the organization _____.A.interactB.indentifiedC.appliedD.existed4、In Business Process Redesign(BPR) , _____ of systems analysis are applied to the goal of dramatically changing and improving the fundamental business processes of an organization.A.objectivesB.problemsC.technologyD.principles5、Each process is studied and analyzed for _____, value returned, and opportunities for elimination or streamlining.A.objectivesB.problemsC.technologyD.bottlenecks参考答案一、翻译(非精确答案,仅供参考)1、信息系统研究通常是一个商业和商务管理的学科,经常涉及软件工程的内容,但是信息系统集中于将公司内部的计算机系统整合,这又与软件工程有很大的不同。

相关文档
最新文档