2.99 See Answer

Question: What is CM and why is it


What is CM and why is it important?


> Based on your own experience, what tends to make a PowerPoint presentation stronger or weaker? Provide specific examples.

> The final task in the preliminary investigation is to summarize the results and recommendations in a report and/or in a presentation. Which form of communication, written or oral, do you think is the most effective for conveying your findings to manageme

> Which do you think is more effective in business reports, active or passive voice? Explain why with examples.

> Describe the culture at a business where you have been employed.

> Many people don’t back up their data until it’s too late. Once they go through a catastrophic loss of all their work, they tend to change their habits. What are some of the better ways to perform personal backups, such as cloud-based services?

> What are the most important IT security issues facing companies today? Have these changed in the last five years, and will they continue to change? How should companies prepare themselves for security threats and problems in the future?

> How could you use a spreadsheet in capacity planning?

> Assume that your company uses a release methodology for its sales system. The current version is 5.5. Decide whether each of the following changes would justify a version 6.0 release or be included in a version 5.6 update: (a) Add a new report. (b) Add a

> The four types of IT system maintenance also apply to other industries. Suppose you were in charge of aircraft maintenance for a small airline. What would be a specific example of each type of maintenance?

> Suppose that you designed a tutorial to train a person in the use of specific software or hardware, such as a web browser. What specific information would you want to know about the recipient of the training? How would that information affect the design

> Your supervisor said, “Integration testing is a waste of time. If each program is tested adequately, integration testing isn’t needed. Instead, we should move on to system testing as soon as possible. If modules don’t interact properly, we’ll handle it t

> Experienced programmers sometimes eschew IDEs for handcrafted tools, often connected in a pipeline to facilitate complex workflows. What advantages and disadvantages would this approach have over sophisticated IDEs?

> When setting priorities for system requests, the highest priority goes to projects that provide the greatest benefit, at the lowest cost, in the shortest period of time. How would you reconcile projects that can produce good results in the short term ver

> What are the most significant differences among structured, O-O, and agile methods? What do they have in common?

> Discuss the three techniques used to improve QA.

> One manager states, “When a new system is proposed, I want a written report, not an oral presentation, which is like a sales pitch. I only want to see the facts about costs, benefits, and schedules.” Do you agree with that point of view?

> What are the main differences between the BSS and ESS wireless topologies?

> Is batch processing still relevant? Why or why not?

> E-commerce has seen explosive growth in recent years. What are the most important reasons for this trend? Will it continue? Why or why not?

> How is the proliferation of mobile devices that are locally powerful, use apps instead of full- fledged applications, and rely on wireless network connectivity changing system architecture design considerations?

> Why is strategic planning important for IT professionals?

> What is the CIA triangle?

> How is the increased use of smartphones and tablets, with their smaller screen size, affecting user interface design practices?

> What are some key issues that you must address when considering data backup and recovery?

> Describe each benefit classification and include two examples.

> What are four chargeback methods?

> Describe four cost classifications and include two examples.

> How do you know if a project is economically feasible?

> What is the meaning of the phrase, time value of money?

> Define the term present value and provide an example.

> Would the formulas in questions 6 and 7 also apply to heavy equipment, such as a bulldozer? Why or why not?

> What formula do you use to calculate ROI?

> What formula do you use to calculate the payback period?

> A user interface can be quite restrictive. For example, the interface design might not allow a user to exit to a Windows desktop or to log on to the Internet. Should a user interface include such restrictions? Why or why not?

> What is the payback period?

> Why is practice so important when preparing a presentation? Provide a specific example from your own experience.

> Name three strategies to use if you get nervous during a presentation.

> When you organize a presentation, what three stages do you plan?

> When preparing an oral presentation, what six tasks should you perform?

> What techniques can help email communications? Provide specific examples.

> Describe five techniques you can use to improve your written documents.

> What is a corporate culture, and why is it important?

> What is Toast masters?

> What five questions should you answer before you communicate?

> Suppose your network support company employs 75 technicians who travel constantly and work at customer sites. Your task is to design an information system that provides technical data and information to the field team. What types of output and informatio

> The vice president of accounting says to you, the IT director, “This request procedure takes too long. My people know what they are doing, and their systems requests are necessary and important.” She suggests that the IT department bypass the initial ste

> What are some key issues that you must address when considering data backup and recovery?

> Explain the concept of risk management, including risk identification, assessment, and control.

> Define the following terms: response time, bandwidth, throughput, and turnaround time. How are the terms related?

> Describe four types of system maintenance.

> In what forms can companies provide user support?

> What is the role of online documentation?

> What are the differences between program, system, operations, and user documentation?

> Describe three main types of testing and the order in which they are performed.

> What role do IDEs play in coding?

> Some systems analysts maintain that source documents are unnecessary. They say that all input can be entered directly into the system, without wasting time in an intermediate step. Do you agree? Can you think of any situations where source documents are

> What is pair programming?

> Should classes be tightly coupled or loosely coupled in OOD? Explain why.

> Explain how structure charts are used in application development.

> What is application development?

> What is the difference between an operational environment and a test environment?

> What is QA?

> What role do standards play in wireless networking?

> What functions do routers, gateways, and proxy servers serve in a network?

> Explain the five main network models.

> What are the advantages of online and batch processing, respectively?

> Some systems analysts argue, “Give users what they ask for. If they want lots of reports

> What are the differences between in-house e-commerce development with packaged solutions and service providers?

> What has been the impact of the Internet on system architecture?

> What is client/server architecture?

> What are the three functions that every business information system must carry out, irrespective of system architecture?

> List the sections of a system design specification and describe the contents.

> If you had to rank the items in the architecture checklist, from most important to least important, what would your list look like?

> How would a specific date, such as March 15, 2019, be represented as an absolute date?

> What is data warehousing and data mining?

> How are codes used in data design?

> How do you convert an un normalized design to 1NF? In your answer, refer to specific pages and figures in this chapter.

> The UML is a large and complex modeling language. How can an IT professional tell when a UML diagram is correct and not just visually pleasing?

> What are ERDs and how are they used?

> Explain primary key, candidate key, secondary key, and foreign key.

> List the major characteristics of web-based design.

> Briefly describe the components of a DBMS.

> How are permissions used to control access to data?

> What is a data structure?

> What is output security?

> How has input technology changed in recent years?

> What is the difference between a detail report, a summary report, and an exception report?

> What are the main principles of source document design?

> You are creating a system for a bowling alley to manage information about its leagues. During the modeling process, you create a state transition diagram for an object called League Bowlers. What are the possible states of a league bowler, and what happe

> How would you rank the 10 guidelines for user interface design in order of importance? Explain your answer.

> What are the seven habits of successful interface designers?

> Why is a transparent interface desirable?

> What is HCI?

> What are three emerging trends in user interface design?

> Explain Apple’s view of user interface design, especially for apps.

> What is an RFP, and how does it differ from an RFQ?

> What are the five steps in the software acquisition process?

> What is the primary objective of the evaluation and selection team in selecting a development strategy?

> What is SaaS?

> The concept that the same message gives different meanings to different objects is called polymorphism. Can you think of examples where this behavior may provide unexpected results?

2.99

See Answer