...Chapter 1: Introduction to Project Management TRUE/FALSE 1. Until the 1980s, project management primarily focused on providing schedule and resource data to top management in the military, computer, and construction industries. ANS: T Until the 1980s, project management primarily focused on providing schedule and resource data to top management in the military, computer, and construction industries. Today’s project management involves much more, and people in every industry and every country manage projects. PTS: 1 DIF: Difficulty: Easy REF: p.2 OBJ: LO: 1-1 NAT: BUSPROG: Technology TOP: Introduction KEY: Bloom's: Knowledge 2. A difference between operations and projects is that operations end when their objectives have been reached, whereas projects do not. ANS: F Projects are different from operations in that they end when their objectives have been reached or the project has been terminated. PTS: 1 DIF: Difficulty: Moderate REF: p.4 OBJ: LO: 1-2 NAT: BUSPROG: Analytic TOP: What is a Project? KEY: Bloom's: Comprehension 3. Every project should have a well-defined objective. ANS: T A project has a unique purpose. Every project should have a well-defined objective. PTS: 1 DIF: Difficulty: Easy REF: p.6 OBJ: LO: 1-2 NAT: BUSPROG: Analytic TOP: What is a Project? KEY: Bloom's: Knowledge 4. Projects should be developed in increments. ANS: T A project is developed using progressive elaboration. Projects are often defined broadly...
Words: 7714 - Pages: 31
...Chapter 1 Essay Questions: 1. Explain the relationships among the four functions of management. The four basic management functions are planning, influencing, and controlling. a. Planning involves choosing tasks that must be performed to attain organizational goals, outlining how the tasks must be performed, and indicating when they should be performed. b. Organizing-can be thought of as assigning the tasks developed under the planning function to various individuals or groups within the organization. c. Influencing is referred to as motivating, leading, directing, or actuating. d. Controlling is the management function through which managers i. Gather information that measures recent performance within the organization ii. Compare present performance to pre-established performance standards. iii. From this comparison, determine whether the organization should be modified to meet pre-established standards. These functions are interrelated because the performance of one depends on the performance of the others. For example, organizing is based on well thought out plans developed during the planning process, and influencing systems must be tailored to reflect both these plans and the organizational design used to implement them. The fourth function, controlling, involves possible modification to existing plans, organizational structure, or the motivation system used to develop a more successful effort. ...
Words: 597 - Pages: 3
...CHAPTER 1 REVIEW QUESTIONS 1. Define each of the following terms: a) Data: raw data not processed. This usually includes telephone numbers, a date of birth, customer name etc. It has little meaning until it is turned into information. b) Field: A character or group of characters that has a specific meaning. A field is used to define and store data. c) Record: A logically connected set of one or more fields that describes a person, place, or thing. d) File: A collection of related records. 2. What is data redundancy, and which characteristics of the file system can lead to it? a. Data redundancy is when the same data are stored unnecessarily at different places. This can lead to poor data security, and data inconsistency. 3. What is data independence, and why is it lacking in file systems? b. Data independence is when you change the data storage characterizes and it doesn’t affect the program’s ability to access the data. 4. What is a DBMS, and what are its functions? c. A DBMS (database management system) is a collection of program that stores and manages data and control access to the data in the collection. It is responsible for creating, editing, deleting and maintain all the data inserted. 5. What is structural independence, and why is it important? d. Access to a file is dependent on the structure of the database. Without structural independence new changes such as adding a field, or a decimal in a record...
Words: 1121 - Pages: 5
...Eva Diaz Chapter 1 Questions and applications #1,2,3,5,6,7,10,15,16 1. a. Some of the agency problems encountered with the MNC come with the conflict of goals between a firm’s managers and shareholders when making decisions. Agency costs are larger for an MNC than for a purely domestic firm because managers of foreign subsidiaries may be tempted to focus on making decisions to serve their subsidiaries rather than the overall MNC. b. MNC’s with subsidiaries scattered around the world may experience more agency costs because it is much more difficult to monitor managers in foreign countries, foreign subsidiaries may not follow the same uniform goals, the size of the subsidiaries themselves leads to more conflicts, as well as the beliefs that employees should come first in decision making prior to shareholders. 2. a. Explain how the theory of comparative advantage relates to the need for international business. The theory of comparative advantage relates to the need for international business because it suggests that each country should use its comparative advantage to specialize in its production and rely on other countries to meet other needs. Therefore all countries would need to trade with each other competitively for the products they are not able to produce. b. Explain how the product cycle theory relates to the growth of the MNC. The product cycle theory suggests that after firms are established in their home countries...
Words: 858 - Pages: 4
...Review Questions: Chapter 1 1.1. Define the following terms: data, database, DBMS, database system, database catalog, program-data independence, user view, DBA, end user, canned transaction, deductive database system, persistent object, meta-data, and transaction-processing application. • Data – known facts that can be recorded and that have implicit meaning. • Database – a collection of related data with an implicit meaning. • DBMS – a collection of programs that enables users to create and maintain a database • Database system – not only contains the database itself bit also a complete definition or description of the database structure and constrains. • Database catalog – the information about the database structure is stored in the Database Catalog which contains the structure of each file, the type and storage format of each data item, and various constrains of the data. • Program-Data Independence – DBMS access programs do not require changes in all programs due to the change in the structure of a file because the structure of data files is stored in the DBMS catalog separately from the access programs. • User View – a database typically has many users, and each of whom may require a different perspective or view of the database. A view may be a subset of the database or it may contain virtual data the is derived from the database files but is not explicitly stored. • DBA – a database administrator (short form DBA) is a person...
Words: 2493 - Pages: 10
...1. What is free software? List three characteristics of free software. -Free software is software that users have the freedom to distribute and change. The three main characteristics of free software are: The source code has to be distributed with the program, you cannot restrict people from redistributing/modifying/using the software, and users must be allowed to redistribute modified versions under the same terms/licensing. 2. Why is Linux popular? Why is it popular in academia? -Linux is popular for a number of different reasons. Its free software that is portable because it’s written in C, has an amazing range of supported "peripherals", has a lot of software available, and has standardization (POSIX). It’s generally popular in academia because it’s a free, open-source, portable, sophisticated programming environment that computer science students could use as a learning platform. 3. What are multiuser systems? Why are they successful? -A multiuser system is an operating system that allows multiple users to access a single computer's resources. It’s successful because it’s hard for a single user to use 100% of a modern computer’s resources, and allows for greater efficiency. 4. What is the Free Software Foundation/GNU? What is Linux? Which parts of the Linux operating system did each provide? Who else has helped build and refine this operating system? -GNU stands for "GNU'S Not Unix", and it was designed to be a UNIX-like operating system developed by...
Words: 750 - Pages: 3
...CHAPTER 1 SOLUTIONS 1-2 There is a demand for auditing in a free-market economy because in the agency relationship there is a natural conflict of interest between an absentee owner and a manager and due to the information asymmetry that exists between the owner and manager. As a result, the agent agrees to be monitored as part of his/her employment contract. Auditing appears to be a cost-effective form of monitoring. The empirical evidence suggests auditing was demanded prior to government regulation such as statutory audit requirements. Additionally, many private companies and other entities not subject to government auditing regulations also purchase various forms of auditing and assurance services. 1-3 There is a natural conflict of interest in the agency relationship between an owner and manager because of differences in the two parties’ goals. For example, the manager may spend funds on excessive personal benefits or favour entity growth at the expense of stockholders values. If both parties seek to maximize their own self-interest, it is likely that the manager will not act in the best interest of the owner and may manipulate the information provided to the owner accordingly. 1-7 Audit risk is defined as the risk that ‘the auditor expresses an inappropriate audit opinion when the financial statements are materially misstated’ (ISA 200). Materiality: ‘Misstatements, including omissions, are considered to be material if they, individually or in the aggregate...
Words: 857 - Pages: 4
...Chapter 1 Review Questions Solutions 1. What is information systems analysis and design? Information systems analysis and design is the process of developing and maintaining an information system. 2. What is systems thinking? How is it useful for thinking about computer-based information systems? Systems thinking involves identifying something as a system, visualizing the system and translating it into abstract terms, and thinking about the characteristics of the specific situation. Systems thinking is useful for thinking about computer-based information systems because information systems can be seen as subsystems in larger organizational systems, taking input from, and returning output to, their organizational environments. 3. What is decomposition? Coupling? Cohesion? Decomposition is the process of breaking down a system into its component parts. Coupling is the extent to which subsystems are dependent on each other. Cohesion is the extent to which a system or a subsystem performs a single function. 4. In what way are organizations systems? Organizations are systems because they are made up of interrelated components working together for a purpose. They take input from and return output to their environments. Organizations can be redesigned through a systems analysis and design process by which system components are replaced while preserving interconnections between components. 5. List and explain the different phases in the systems development...
Words: 716 - Pages: 3
...Chapter 1 – Subject Review Questions 1. I have worked for my current boss, Mr. Ford, in the field of youth social services for nearly a decade. Due to his leadership, I have remained with the agency throughout tumultuous periods. He has always challenged his employees to strive for quality of service at the greatest speed possible. Mr. Ford organizes employees to create a dynamic workforce capable of adapting to changes affected by the macroenvironment. In an effort to continue to win Requests for Proposal bids, Mr. Ford has consistently operated an efficient service program that is cost competitive with other service providers and fiscally sustainable. 2. One of the greatest ways that the Internet impacts my life on a daily basis involves how it has allowed knowledge to be shared instantaneously and with increasing accuracy. I am able to receive information about events and interests in real time. Instead of having to search libraries for dated information, as I did as a youth, I can find information that is relevant and current from trusted sources. Now it is possible to access peer-reviewed publications from esteemed institutions. Globalization, in conjunction with the Internet, has provided access to news and information from around the world. I enjoy reading articles from the perspectives of those of other nationalities and now, thanks to Google Translate, I can read articles that were written in foreign languages. 3. I have always admired Google for how...
Words: 542 - Pages: 3
...Chapter 1 Assignmnet Ryan M. Kethcart INFOST-491 SEC-OL Exercises 1. Look up “the paper that started the study of computer security.” Prepare a summary of the key points. What in this paper specifically addresses security in areas previously unexamined? a. A paper titled the “Rand Report R-609” was sponsored by the Department of Defense and initiated the movement toward security that went beyond protecting physical locations. It attempted to define multiple controls and mechanisms necessary for the protection of a multilevel computer system; identifying the role of management and policy issues in computer security. This report/paper significantly expanded the scope of computer security to include the following: securing the data, limiting random and unauthorized access to said data, and involving personnel from multiple levels of the organization in matters pertaining to information security. 3. Consider the information stored on your personal computer. For each of the terms listed, find an example and document it: threat, threat agent, vulnerability, exposure, risk, attack, and exploit. a. Threat: i. Theft of Media b. Threat Agent: ii. Hacker (Ex: Ima Hacker) c. Vulnerability: iii. Unprotected system port d. Exposure: iv. Using a website monitored by malicious hackers, reveals a vulnerability – i.e. Unprotected system port e. Risk: v. Low level risk – The probability that...
Words: 790 - Pages: 4
...Chapter 1: Review Questions 1. What is a project? It is a temporary effort intended to create a unique product, service, or result. 2. What is project management? It is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements. 3. How are projects different from ongoing operations? Projects are temporary and unique while operations are continuous. Operations are an ongoing process to ensure that an organization continues to work effectively. For instance, operation managers can often use checklists to guide much of their work, but project managers rarely have checklists that identify all of the activities they need to accomplish. 4. What types of constraints are common to most projects? Time and budget constraints are common to most projects for clients, and the amount of resources available and the decision maker’s risk tolerance are constraints from an internal point of view. 5. Which deliverable authorizes the project team to move from Selecting and Initiating to Planning? The approval of a charter 6. At what stage of a project life cycle are the majority of the “hands-on” tasks completed? At the execution stage 7. During which state of the project life cycle are loose ends tied up? During the Closing stage 8. What are the five process groups of project management? Initiating, planning, executing, monitoring and controlling, and closing 9. Which process group...
Words: 868 - Pages: 4
...Do 1 and 3 in chapter 5, and questions 8 and 9 in chapter 6. For Chapter 5 question 1: One of the potential problems mentioned in the chapter with gathering information requirements by observing potential system users is that people may change their behavior when observed. What could you do to overcome this potential confounding factor in accurately determining information requirements? (5 points) There is no doubt that an employee may change their attitude or work behavior when they are being observed. One thing that I would do is keep observing the employee, however informing the employee before the observation would allow the employee to attempt to work with their best quality while being observe. This will allow the observer to identify the issues that the worker really has. For Chapter 5 question 3: Suppose you were asked to lead a JAD session. List ten guidelines you would follow in playing the proper role of a JAD session leader. (5 points) Chap 5, Question 3: Ten Guidelines listed 1. Limit the distraction to focus on meeting 2. Set an agenda and keep the session on track 3. Always remain neutral 4. Identify and address critical political and organizational issues early 5. Establish the executive sponsor as the tiebreaker 6. Facilitator should be train and be critically involved 7. Team attendance and participation are mandatory 8. Respond to ideas that relate to the project 9. Keep the team in check on topics that relate to the meeting 10. Involve...
Words: 353 - Pages: 2
...Chapter 4 “IT Infrastructure: Hardware and Software” Review Questions 1-5 1. What are the components of IT infrastructure? • Define information technology (IT) infrastructure and describe each of its components. IT infrastructure consists of the shared technology resources that provide the platform for the firm’s specific information system applications. Major IT infrastructure components include computer hardware, software, data management technology, networking and telecommunications technology, and technology services. 2. What are the major computer hardware, data storage, input, and output technologies used in business? * Computer Hardware: Mainframes, midrange computers, PC’s, workstations, and supercomputers. * Data Storage: Magnetic disk, optical disc, magnetic tape and storage networks. * Input devices: Keyboards, computer mice, touch screens (including those with multitouch), magnetic ink and optical character recognition devices, pen-based instruments, digital scanners, sensors, audio input devices, and radio-frequency identification devices. * Output devices: Display monitors, printers, and audio output devices. • List and describes the various type of computers available to businesses today. * Mainframes are a large-capacity, high-performance computer that can process large amounts of data very rapidly. * Midrange computers are servers computers are specifically optimized to support a computer network, enabling users to share files...
Words: 3229 - Pages: 13
...What advantages does a sole proprietorship offer? Simple decision making Low organizational and operating costs Major drawback of sole proprietorship? Unlimited liability Taxation is on owner as income What form of partnership allows some partners to limit their liability? A limited partnership one or more partners is designated a general partner with unlimited liability Other partners have limited liability (for their initial contribution) Prohibited from active management role Real estate agents, doctors, lawyers, accountants In a corporation which group has ultimate responsibility for protecting and managing stockholders interests? The board of directors What are the disadvantages of a corporation Double taxation of dividends Subchapter S corporation can circumvent this (only up to 35 stockholders) Complex management requirements Costly reporting and structural requirements What is the issue for agency theory? Why is it important for public corporations but not private corporations? Agency theory looks at relationship owners and managers. Competing goals In private corporations managers and owners are usually the same people. Why are institutional investors so important now? They own a large percentage of stock They exercise voting rights and demand board seats Why is profit maximization by itself an inappropriate goal? The time value of money must be considered. The timing of profits can have a big effect on the benefit to the...
Words: 468 - Pages: 2
...product of the two vectors shown. 1) +96 2) -96 3) +51 4) -51 5) -35 A 2.0-kg block sliding on a frictionless horizontal surface is attached to one end of a horizontal spring (k = 600 N/m) which has its other end fixed. The speed of the block when the spring is extended 20 cm is equal to 3.0 m/s. What is the maximum speed of this block as it oscillates? 1) 4.6 m/s 2) 5.3 m/s 3) 5.7 m/s 4) 4.9 m/s 5) 3.5 m/s A block slides on a rough horizontal surface from point A to point B. A force (magnitude P = 2.0 N) acts on the block between A and B, as shown. Points A and B are 1.5 m apart. If the kinetic energies of the block at A and B are 5.0 J and 4.0 J, respectively, how much work is done on the block by the force of friction as the block moves from A to B? 1) -3.3 J 2) +1.3 J 3) +3.3 J 4) -1.3 J 5) +4.6 J 1) +96 1) 4.6 m/s 1) -3.3 J A 1.5-kg object moving along the x axis has a velocity of +4.0 m/s at x = 0. If the only force acting on this object is shown in the figure, what is the kinetic energy of the object at x = +3.0 m? 1) 18 J 2) 21 J 3) 23 J 4) 26 J 5) 8 J A force acting on an object moving along the x axis is given by Fx = (14x - 3.0x2) N where x is in m. How much work is done by this force as the object moves from x = -1 m to x = +2 m? 1) +12 J 2) +28 J 3) +40 J 4) +42 J 5) -28 J If = 5.0, = 8.0, and a = 30°, determine the scalar product of the two vectors shown. 1) -35 2) +35 3) -20 4) +20 5) +40 1) 18 J 1) +12 J 1) -35 A 3.0-kg block is on a frictionless...
Words: 3009 - Pages: 13