Premium Essay

Week 2 Chapter 3 & 4 Review Questions

In: Computers and Technology

Submitted By Michael32147
Words 766
Pages 4
Week 2 Problems/Exercises: Chapters 3 & 4
Michael LaBarge
DeVry University

Chapter 3
2. List and describe the common skills and activities of a project manager. Which skill do you think is most important? Why? Common skills of a project manager include: interpersonal skills, leadership skills and technical skills. Interpersonal skills include the skills needed to effectively communicate with others what needs to be done and the process that should be taken to get it done. Leadership skills are important because as the project manager is in charge of the project, they must be able to successfully lead their team from initiation to completion of the project as efficiently as possible. Technical skills are the skills needed to understand all aspects of the system that is to be created or modified and what it takes to make that happen. Common activities of a project manager include: leadership, management, customer relations, technical problem solving, conflict management, team management and risk and change management. I believe that the most important skill that a project manager must possess is leadership. I think that with the right team, the PM can get assistance on the interpersonal and technical aspects of the project. However without the proper leadership, even the best team will ultimately fail, or at least have many difficulties. Also, many of the activities that a project manager must do are leader/management based.
4. Describe the activities performed by the project manager during project planning. The activities performed by a project manager during project planning are: describing the project scope, feasibility and alternatives, dividing the project into manageable tasks, estimating resources and creating a resource plan, developing a preliminary schedule, developing a communication plan, determining project standards and processes,…...

Similar Documents

Premium Essay

Chapter 4 Review Questions 1-5

...Chapter 4 “IT Infrastructure: Hardware and Software” Review Questions 1-5 1. What are the components of IT infrastructure? • Define information technology (IT) infrastructure and describe each of its components. IT infrastructure consists of the shared technology resources that provide the platform for the firm’s specific information system applications. Major IT infrastructure components include computer hardware, software, data management technology, networking and telecommunications technology, and technology services. 2. What are the major computer hardware, data storage, input, and output technologies used in business? * Computer Hardware: Mainframes, midrange computers, PC’s, workstations, and supercomputers. * Data Storage: Magnetic disk, optical disc, magnetic tape and storage networks. * Input devices: Keyboards, computer mice, touch screens (including those with multitouch), magnetic ink and optical character recognition devices, pen-based instruments, digital scanners, sensors, audio input devices, and radio-frequency identification devices. * Output devices: Display monitors, printers, and audio output devices. • List and describes the various type of computers available to businesses today. * Mainframes are a large-capacity, high-performance computer that can process large amounts of data very rapidly. * Midrange computers are servers computers are specifically optimized to support a computer network, enabling users to share......

Words: 3229 - Pages: 13

Premium Essay

Chapter 2 Review Questions Solutions

...Chapter 2 Review Questions Solutions 1. Describe and compare the six sources of software. The six sources of software identified in the textbook are: (1) information technology services firms, (2) packaged software providers, (3) vendors of enterprise solution software, (4) application service providers and managed service providers, (5) open-source software, and (6) in-house development. IT services firms help companies develop custom information systems for internal use; they develop, host, and run applications for customers; or they provide other services. An IT services firm may be chosen if the system can’t be developed internally or requires customer support. Packaged software providers are companies that produce software exclusively, like Microsoft or Intuit, and are preferable if the task needing the system is generic. Vendors of enterprise solution software create a system that is composed of a series of integrated modules. Each module supports a business function, such as accounting, or human resources. ERP systems may be appropriate if a complete system is required that can cross functional boundaries. A more intense option for larger, more customizable solutions are Managed service providers who can provide more services than application service providers. ASPs and MSPs may be appropriate when instant access to an application is desired, and in the case of ASPs, when the task is generic. Open-source software is a type of software that is developed......

Words: 897 - Pages: 4

Premium Essay

Chapter 4 Review Question Answers

...Chapter 4 Review Questions 1. What are the five questions typically used in fact-finding? What additional questions can be asked during this process? The five questions are who, what, where, why, how. * Who? Who performs each of the procedures within the system? Why? Are the correct people performing the activity? Could other people perform the task more effectively? * What? What is being done? What procedures are being followed? Why is that process necessary? Often, Procedures are being followed for many years and no one knows why. You should question why a procedure is being followed at all. * Where? Where are operations being performed? * Why? Where could they be performed? Could they be performed more efficiently elsewhere? When? When is a procedure performed? Why is it being performed at this time? Is this the best time? * How? How is a procedure performed? Why is it performed in that manner? Could it be performed better, more efficiently, or less expensively in some other manner 2. What is a systems requirement, and how are systems requirements classified? A System Requirement is characteristic or feature that must be included in an information system to satisfy business requirements and be acceptable to users. System requirements serve as benchmarks to measure the overall acceptability of the finished system. System requirements fall into five general categories: outputs, inputs processes, performance, and controls. 3.......

Words: 1585 - Pages: 7

Premium Essay

Chapter 2 Review Question

...chapter 2 1. Why is information security a management problem? What can management do that Technology cannot? Management is an information problem due to the fact that policymaking and training of securing systems from users fall into the responsibility of their role. These responsibilities can include limiting access as well as disabling certain functions that are not related to the organizations’ function. Management can set policies that may arise due to improper uses or manipulations of systems and asses the threats that are unknown due to the introduction of new hardware and software. 2. Why is data the most important asset an organization possesses? What other assets in the organization require protection? The integrity of the data is most important because it relates to the overall company operations. Securing the data from people not authorized to see or change it ensures that the correct information about the company is being generated without interference or manipulations of data. Other important assets that requires protection are the computer terminals, networking infrastructure, which need to be protected from misuse from internal and external threats whether intentional or not. 3. Which management groups are responsible for implementing information security to protect the organization’s ability to function? The responsibility relies on several management groups such as CIO, who is responsible for the overall protection of system, but the......

Words: 1762 - Pages: 8

Premium Essay

Chapter 3 Ghatt Chart Review Questions

...Review Questions - Chapter 3 Page 77 1. Contrast the following terms: a) Critical path scheduling, Gantt network diagramming, slack time Network diagramming is a critical path scheduling technique whose sequence of task activities directly affect the completion date of a project. A major strength for network diagramming is its ability to represent how completion dates can vary for activates or task and is more used that Gantt Charts. Gantt charts visually show slack time available within an earliest start and latest finish duration where a network diagram show this by data within activity rectangles. b) Project, project management, project manager A project is a planned undertaking of a series of related activities to reach an objective that has a beginning and an end. Project management is a controlled process of initiating, planning, executing and closing down a project and a project manager is responsible for initiating, planning, executing and closing down a project. c) Project initiation, project planning, project execution, project closedown Project initiation is the first phase of the project management process in which procedures are established and task are performed to assess the size, scope and completion of the project, project planning is the second phase that focuses on defining activities and the work needed to complete the project and the project closedown is the final phase that focuses on bringing the project to a close. d) Project workbook,......

Words: 682 - Pages: 3

Premium Essay

Chapter 2 Review Questions

...management are responsible for implementing information security that protects the organization's ability to function. Management is responsible for implementing information security to protect the ability of the organization to function. They must set policy and operate the organization in a manner that complies with the laws that govern the use of technology. Technology alone cannot solve information security issues. Management must make policy choices and enforce those policies to protect the value of the organizations data. 2. Data is important to an organization because without it an organization will lose its record of transactions and/or its ability to furnish valuable deliverables to its customers. Other assets that require protection include the ability of the organization to function, the safe operation of applications, and technology assets. 3. Both general management and IT management are responsible for implementing information security. 4. The implementation of networking technology has created more risk for businesses that use information technology because business networks are now connected to the internet and other networks external to the organization. This has made it easier for people to gain unauthorized access to the organization’s networks. 5. Information extortion occurs when an attacker steals information from a computer system and demands compensation for its return or for an agreement not to disclose it. For example, if a hacker......

Words: 1114 - Pages: 5

Premium Essay

Principles of Information Security Chapter 2 Review Questions

...cannot solve information security issues. Management must make policy choices and enforce those policies to protect the value of the organization’s data. 2. Data is important to an organization because without it an organization will lose its record of transactions and/or its ability to furnish valuable deliverables to its customers. Other assets that require protection include the ability of the organization to function, the safe operation of applications, and technology assets. 3. Both general management and IT management are responsible for implementing information security. 4. The implementation of networking technology has created more risk for businesses that use information technology because business networks are now connected to the internet and other networks external to the organization. This has made it easier for people to gain unauthorized access to the organization’s networks. 5. Information extortion is when an attacker steals information from a computer system and demands compensation for its return or for an agreement not to disclose it. One example could be someone that gains access to PII such as SSN’s through a company’s database and ransoms the information for money. If not paid, he could sell the information on the black market. This not only harms the company monetarily, but also questions their information security practices and ultimately their trust. 6. Employees can be one of the greatest threats to information security because their......

Words: 1112 - Pages: 5

Free Essay

Week 4 Question 2

...ACC 205 Question 2 – Assignment a. Prepare journal entries to record the transactions. 12/1 Borrowed $20,000 from the First City Bank by signing a 3- month, 15% note payable. Interest and principal are due at maturity. Dr Cash $20,000 Cr Notes payable $20,000 12/10 Established a warranty liability for the XY-80, a new product. Sales are expected to total 1,000 units during the month. Past experience with similar products indicates that 2% of the units will require repair, with warranty costs averaging $27 per unit (parts only). Dr Warranty expense 540 (1,000 x 2% x $27) Cr Warranty liability 540 12/22 Purchased $16,000 of merchandise on account from Oregon Company, terms 2/10, n/30. Dr Merchandise inventory $16,000 Cr Accounts payable $16,000 12/26 Borrowed $5,000 from First City Bank; signed a 15% note payable due in 60 days. (Assume 360 days for daily interest calculation) Dr Cash $5,000 Cr Notes payable $5,000 12/31 Repaired six XY-80s during the month at a total cost of $162. Dr Warranty liability $162 Cr Cash $162 12/31 Accrued 3 days of salaries at a total cost of $1,400. Dr Salaries expense $1,400 Cr Salaries payable $1,400 b. Prepare adjusting entries on December 31 to record accrued interest for each of the notes payable First City Bank $20,000 x 15% x 1/12 = $250 (being 1 mth's interest) $5,000 x 15% x 5/360 = $10.42 (being int. for 5 days) Dr Interest expense $260.42 Cr Interest payable......

Words: 280 - Pages: 2

Free Essay

Tb143 Review Questions Chapter 4

...1. A,B,C,E The motherboard is essential to computer operation in large part because of the two major buses it contains: the system bus and the I/O bus. Together, these buses carry all the information between the different parts of the computer. 2. A,C Motherboards use expansion slots to provide support for additional I/O devices and high- speed video/graphic cards. The most common slots are PCI, AGP, and PCI-Express. 3. A,B,C,D SCSI is a more diversified driver interface that can use non-hard disk drives. 4. A,B,C The ATX family of motherboards has beat desktop comp. designs since late 1990. ATX- Advanced Technology Extended, replaces AT and Baby-AT. 5. G Motherboards in the ATX and BTX families have integrated I/O ports; including including serial, parallel, USB, PS/2, etc. 6. D Install the sound card then connect 1/8 in mini-jack cables from speakers and microphone to sound card. 7. B DDR SDRAM has 184 corresponding pins, the older version SDRAM has 168 pins. 8. A The most common speed for PCI is 33MHz, although it can vary determined by different variables. 9. C PCI Express has 4 major types of ports; x1,x4,x8,x16. 10. B AGP x4 can transmit 1066 MBps, but PCIe x1 can only transmit 500 MBps. 11. A SATA 2nd gen. goes at 3GBps 12. A,C Always turn off power before unplugging the ribbon cables. 13. A,D If comp. doesn't start check all connections; main power, CPU, RAM, and video card. 14...

Words: 289 - Pages: 2

Premium Essay

Caff 321 Chapter 1-4 Review Questions

...MICHELLE LU - 011810966 CAFF 321 CHAPTER REVIEW QUESTIONS (1-4) Chapter 1 1. Why does Daniel Gilbert, author of Stumbling on Happiness, say that experiences might bring more satisfaction than durable goods? Do you agree or disagree? Although happiness is not easily defined and it really depends on who you ask and what their degree of happiness is in their life, Gilbert the author of Stumbling on Happiness, explains that experiences might bring more satisfaction than that of durable goods.  With this he is simply stating the fact that happiness is dependent the things you do in life and not the objects. It is the time that you share with friends and family what makes life meaningful and that creates happiness. All the objects in the world that money can buy is meaningless when you don't have anyone to share it with. 2. Harvard economists Alberto Alesina and Paolo Giuliano say that strong family ties imply more reliance on the family as an economic unit that provides goods and services and less on outside institutions such as those found in the market place and government.  Why does household production (doing things together or making things within the home) activity have such an impact on family ties?  Can you give an example from your own family?   Not completely sure if I am answering this question correctly but basically the way I see things, I must say I agree with both economists who say that strong family ties imply more reliance on the family as an economic unit......

Words: 2837 - Pages: 12

Premium Essay

Week 4 Question Review

...alternatives and test the existing design to confirm a product’s functionality prior to production. A prototype has many benefits, such as the developer and the implementer getting valuable feedback from the user even before the actual project is started. * 4. Given the guidelines presented in this chapter, identify flaws in the design of the Report of Employees shown below. What assumptions about users and tasks did you make in order to assess this design? Redesign this report to correct these flaws. Em_ID | Name, Title | 0124543 | John Smith, VP Marketing | 2345645 | Jared Wright, Project Manager | 2342456 | Jennifer Chang, Systems Analyst | 4564234 | Mark Walters, Software Engineer | 7875468 | Nick Shelley, BI Analyst | 4446789 | Kim Eagar, HR Mananger | 4678899 | Emily Graham, Receptionist | 4452378 | Matt Hoffman, Network Operations Specialist | It clear that we have name of employee and employee ID number , is also clear they are not organized in any specifically order (numerical or alphabetical or rank) that will be one of the things I will do, may be its important to create a new column to separate the employee rank from its name. There are syntax errors (Kim Eager position) . * 3. Transform the E-R diagram of Figure 9-21 into a set of 3NF relations. The 3NF relations are: VENDOR (Vendor No, Address) PRICEQUOTE (Vendor No, Item No, Quote Quantity, Price) PART (Item No, Discount) PART RECEIPT (Order No, Vendor No, Item No,......

Words: 426 - Pages: 2

Premium Essay

Chapter 2 Review Question

...Applications in Info Security Chapter 4 Review Questions: 1)It might depend on the risk, although all risks should be addressed. The conditions that an organization might have is if they don't have a risk management plan or if they don't have the money to identify and mitigate the risk 2) 3)Alignment is important because it can align organizational goals with ICT works. The benefits to an organization as a whole is that it can align security processes with business goals. 4)Evaluation is important because it can determine if your team is achieving the objectives and this is usually done through gathering data and then analyzing it. Organizations benefit by collecting quantitative data because it can be used to evaluate the options and implications of a decision. 5)A contract is an agreement between a customer and a supplier, while the RFP is technically a bid solicitation. 6)Typically a subcontractor role is to perform specific tasks given by a general contractor. They can be controlled by the supplier to follow the right procedures that are given in the contract. 7)The problem resolution is important because it involves two parties in agreeing that all problems are identified, analyzed, managed, and controlled to resolution. 8)There are two types of reviews: Formal Reviews Informal Reviews In a formal review, the ICT is presented to a team or to an individual before the actual review. In the other hand the informal review allows the producer to......

Words: 334 - Pages: 2

Free Essay

Chapter 2 Review Questions

...Chapter 2 Review Questions 1. Why is information security a management problem? What can management do that technology cannot? Managing information security has more to do with policy and enforcement rather than technology. Management must address information security in terms of business impact and the cost. 2. Why is data the most important asset an organization possesses? What other assets in the organization require protect? Data in an organization represents its transaction records and its ability to deliver to its customer. Without this the organization would not be able to carry out day to day work. 3. Which management groups are responsible for implementing information security to protect the organization’s ability to function? Both management and IT management are responsible for implementing security to protect an organizations ability to function. 4. Has the implementation of networking technology created more or less risk for businesses that use information technology? Why? Networking is usually considered to have created more risk for businesses that use information security. The reason is that potential attackers have reader access to the information system. 5. What is information extortion? Describe how such an attack can cause losses, using an example not found in the text Information extortion is the act of an attacker or trusted insider who steals information from a computer system and demand compensation for its return or for an......

Words: 1152 - Pages: 5

Premium Essay

Sad Chapter 4 Review Questions

...Chapter 4 Review Questions   1. What are the five questions typically used in fact-finding? What additional questions can be asked during this process? The five questions are who, what, where, why, how.       * Who? Who performs each of the procedures within the system? Why? Are the correct people performing the activity? Could other people perform the task more effectively?       * What? What is being done? What procedures are being followed? Why is that process necessary? Often, Procedures are being followed for many years and no one knows why. You should question why a procedure is being followed at all.       * Where? Where are operations being performed?       * Why? Where could they be performed? Could they be performed more efficiently elsewhere? When? When is a procedure performed? Why is it being performed at this time? Is this the best time?       * How? How is a procedure performed? Why is it performed in that manner? Could it be performed better, more efficiently, or less expensively in some other manner   2. What is a systems requirement, and how are systems requirements classified? A System Requirement is characteristic or feature that must be included in an information system to satisfy business requirements and be acceptable to users. System requirements serve as benchmarks to measure the overall acceptability of the finished system. System requirements fall into five general categories: outputs, inputs processes, performance, and controls. 3.......

Words: 1708 - Pages: 7

Premium Essay

Chapter 2 Review Questions

...Chapter 1 PLD Review questions Multiple choice 1. A program is a set of instructions that a computer follows to perform a task. 2. The physical devices that a computer is made of are referred to as Hardware. 3. The part of a computer that runs programs is called the CPU. 4. Today, CPUS are small chips known as Microprocessors. 5. The computer stores a program while the program is running, as well as the data that the program is working with, in Main memory. 6. This is a volatile type of memory that is used only for temporary storage while a program is running. A. RAM 7. A type of memory that can hold data for long periods of time—even when there is no power to the computer—is called Secondary storage. 8. A component that collects data from people or other devices and sends it to the computer is called an input device. 9. A video display is a(n)output device. 10. A byte is enough memory to store a letter of the alphabet or a small number. 11. A byte is made up of eight bits. 12. In a binary numbering system, all numeric values are written as sequences of 0s and 1s. 13. A bit that is turned off represents the following value: 0 14. A set of 128 numeric codes that represent the English letters, various punctuation marks, and other characters is ASCII. 15. An extensive encoding scheme that can represent the characters of many of the languages in the world is Unicode. 16. Negative......

Words: 727 - Pages: 3