Chapter 1 Questions

In: Social Issues

Submitted By zpetrik
Words 7714
Pages 31
Chapter 1: Introduction to Project Management

TRUE/FALSE

1. Until the 1980s, project management primarily focused on providing schedule and resource data to top management in the military, computer, and construction industries.

ANS: T
Until the 1980s, project management primarily focused on providing schedule and resource data to top management in the military, computer, and construction industries. Today’s project management involves much more, and people in every industry and every country manage projects.

PTS: 1 DIF: Difficulty: Easy REF: p.2
OBJ: LO: 1-1 NAT: BUSPROG: Technology TOP: Introduction
KEY: Bloom's: Knowledge

2. A difference between operations and projects is that operations end when their objectives have been reached, whereas projects do not.

ANS: F
Projects are different from operations in that they end when their objectives have been reached or the project has been terminated.

PTS: 1 DIF: Difficulty: Moderate REF: p.4
OBJ: LO: 1-2 NAT: BUSPROG: Analytic TOP: What is a Project?
KEY: Bloom's: Comprehension

3. Every project should have a well-defined objective.

ANS: T
A project has a unique purpose. Every project should have a well-defined objective.

PTS: 1 DIF: Difficulty: Easy REF: p.6
OBJ: LO: 1-2 NAT: BUSPROG: Analytic TOP: What is a Project?
KEY: Bloom's: Knowledge

4. Projects should be developed in increments.

ANS: T
A project is developed using progressive elaboration. Projects are often defined broadly when they begin, and as time passes, the specific details of the project become clearer. Therefore, projects should be developed in increments.

PTS: 1 DIF: Difficulty: Moderate REF: p.6
OBJ: LO: 1-2 NAT: BUSPROG: Analytic TOP: What is a Project?
KEY: Bloom's: Comprehension

5. Resources in a project should be used effectively because they are limited.

ANS: T
A project requires…...

Similar Documents

Chapter 1 Questions Ans Application

...Eva Diaz Chapter 1 Questions and applications #1,2,3,5,6,7,10,15,16 1. a. Some of the agency problems encountered with the MNC come with the conflict of goals between a firm’s managers and shareholders when making decisions. Agency costs are larger for an MNC than for a purely domestic firm because managers of foreign subsidiaries may be tempted to focus on making decisions to serve their subsidiaries rather than the overall MNC. b. MNC’s with subsidiaries scattered around the world may experience more agency costs because it is much more difficult to monitor managers in foreign countries, foreign subsidiaries may not follow the same uniform goals, the size of the subsidiaries themselves leads to more conflicts, as well as the beliefs that employees should come first in decision making prior to shareholders. 2. a. Explain how the theory of comparative advantage relates to the need for international business. The theory of comparative advantage relates to the need for international business because it suggests that each country should use its comparative advantage to specialize in its production and rely on other countries to meet other needs. Therefore all countries would need to trade with each other competitively for the products they are not able to produce. b. Explain how the product cycle theory relates to the growth of the MNC. The product cycle theory suggests that after firms are established in their home......

Words: 858 - Pages: 4

Bsa Chapter 1 Questions/Solutions

...Chapter 1 Review Questions Solutions 1. What is information systems analysis and design? Information systems analysis and design is the process of developing and maintaining an information system. 2. What is systems thinking? How is it useful for thinking about computer-based information systems? Systems thinking involves identifying something as a system, visualizing the system and translating it into abstract terms, and thinking about the characteristics of the specific situation. Systems thinking is useful for thinking about computer-based information systems because information systems can be seen as subsystems in larger organizational systems, taking input from, and returning output to, their organizational environments. 3. What is decomposition? Coupling? Cohesion? Decomposition is the process of breaking down a system into its component parts. Coupling is the extent to which subsystems are dependent on each other. Cohesion is the extent to which a system or a subsystem performs a single function. 4. In what way are organizations systems? Organizations are systems because they are made up of interrelated components working together for a purpose. They take input from and return output to their environments. Organizations can be redesigned through a systems analysis and design process by which system components are replaced while preserving interconnections between components. 5. List and explain the different phases in the systems......

Words: 716 - Pages: 3

Review Questions: Chapter 1

...Review Questions: Chapter 1 1.1. Define the following terms: data, database, DBMS, database system, database catalog, program-data independence, user view, DBA, end user, canned transaction, deductive database system, persistent object, meta-data, and transaction-processing application. • Data – known facts that can be recorded and that have implicit meaning. • Database – a collection of related data with an implicit meaning. • DBMS – a collection of programs that enables users to create and maintain a database • Database system – not only contains the database itself bit also a complete definition or description of the database structure and constrains. • Database catalog – the information about the database structure is stored in the Database Catalog which contains the structure of each file, the type and storage format of each data item, and various constrains of the data. • Program-Data Independence – DBMS access programs do not require changes in all programs due to the change in the structure of a file because the structure of data files is stored in the DBMS catalog separately from the access programs. • User View – a database typically has many users, and each of whom may require a different perspective or view of the database. A view may be a subset of the database or it may contain virtual data the is derived from the database files but is not explicitly stored. • DBA – a database administrator (short form DBA) is a......

Words: 2493 - Pages: 10

Review Questions Chapter 1 and 2

...Chapter 1 Review Questions (1.1 - 1.7) 1.1 Define the following terms: data, database, DBMS, database system, database catalog, program-data independence, user view, DBA, end user, canned transaction, deductive database system, persistent object, meta-data, and transaction-processing application. a) Data: Known facts that can be recorded and that have implicit meaning. b) Database: Collection of related data. c) DBMS: Is a collection of programs that enables users to maintain a database. d) Database system: Is a compilation of the database and complete definition of the database structure and constrains. e) Database catalog: contains information such as the structure of each file, the type and storage format of each data item, and various constraints on the data f) Program-data independence: Is the structure of data files g) User view: A view may be a subset of the database or it may contain virtual data that is derived from the database files but is not explicitly stored h) DBA: The Database Administrator or “DBA” is responsible for authorizing access to the database, coordinating and monitoring its use, and acquiring software and hardware resources as needed. i) End user: These are the people whose jobs require access to the database for querying, updating and generation reports. j) Canned transaction: These are standard types of querying and updates. k) Deductive database system: capabilities for defining deduction rules for inferencing new information......

Words: 3534 - Pages: 15

Chapter 1 Review Question

...Robert Jones Chapter 1 Review 1. Which of the following is true about 1 bit? 2. Which of the following terms means approximately 106 bytes 3. Which answer list the correct number of bits associated with each term 4. Which of the following answer are true about random-access memory (RAM) as it normally used inside a personal computer (Chose two answers) 5. This Chapter describes the concepts how a CPU reads the contents from RAM. Which of the following is true about the process off read data, as described in the chapter? 6. A user has opened up a word processor, typed the numbers 123456789, and stored the document as a file called report1. Which of the following determines, in part, what bits the computer stores the file to represent the text typed into the report? 7. A user has opened a calculator application, typed the numbers 123456789, and then done some math problems using this number. Which of the following determines, in part, what bits the computer stores in RAM to represents the number 123456789? 8. Which of the following is not a feature of a file system that might be used with a hard disk drive? 9. A student writes a report using a word processor, saving the report in a file called my_report. The student stores the file on his laptop hard disk drive. Later, he posts the file on a file-sharing site for a classmate to review the report. Then, he copies an updated version of the file to a flash drive to submit it to his instructor. Which of......

Words: 645 - Pages: 3

Chapter 1 Review Questions

...1. Which of the following is true about 1 bit? a. Can represent decimal values 0 through 9 b. Can be used to represent one character in the lowercase English alphabet | c. Represents one binary digit d. Represents four binary digits 2. Which of the following terms means approximately 106 bytes? a. Terabyte | b. Megabyte c. Gigabyte d. Kilobyte 3. Which answer lists the correct number of bits associated with each term? a. 8 bits per double word b. 32 bits per word | c. 64 bits per quadruple word d. 4 bits per byte 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.) | a. Used for short-term memory b. Used for long-term memory c. Used to process data d. Connects to the CPU over a bus using a cable |e. Is installed onto the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? a. The CPU tells the RAM which address holds the data that the CPU wants to read. b. The CPU reads all RAM sequentially, beginning with the first byte, until it happens to read the byte that the CPU wanted to read. c. The smallest unit of data that RAM supplies back to the CPU is 1 bit. |d. The CPU must first find the file in the file system before reading the data. 6. A user has......

Words: 1372 - Pages: 6

Chapter 1 Essay Questions

...Chapter 1 Essay Questions: 1. Explain the relationships among the four functions of management. The four basic management functions are planning, influencing, and controlling. a. Planning involves choosing tasks that must be performed to attain organizational goals, outlining how the tasks must be performed, and indicating when they should be performed. b. Organizing-can be thought of as assigning the tasks developed under the planning function to various individuals or groups within the organization. c. Influencing is referred to as motivating, leading, directing, or actuating. d. Controlling is the management function through which managers i. Gather information that measures recent performance within the organization ii. Compare present performance to pre-established performance standards. iii. From this comparison, determine whether the organization should be modified to meet pre-established standards. These functions are interrelated because the performance of one depends on the performance of the others. For example, organizing is based on well thought out plans developed during the planning process, and influencing systems must be tailored to reflect both these plans and the organizational design used to implement them. The fourth function, controlling, involves possible modification to existing plans, organizational structure, or the motivation system used to develop a more successful effort. ...

Words: 597 - Pages: 3

Nt1210 Chapter 1 Review Questions

...Chapter 1 Review Questions 1. Which of the following is true about 1 bit? a. Can represent decimal values 0 through 9 b. Can be used to represent one character in the lowercase English alphabet c. Represent one binary digit d. Represent four binary digits 2. Which of the following terms means approximately 106 bytes? a. Terabyte b. Megabyte c. Gigabyte d. Kilobyte 3. Which answer lists the correct number of bits associated with each term? a. 8 bits per double word b. 32 bits per word c. 64 bits per quadruple word d. 4 bits per byte 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.) a. Used for short-term memory b. Used for long-term memory c. Used to Process data d. Connects to the CPU over a bus using a cable e. Is installed onto the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? a. The CPU tells the RAM which address holds the data that the CPU wants to read. b. The CPU reads all RAM sequentially, beginning with the first byte, until it happens to read the byte that the CPU wanted to read. c. The smallest unit of data that RAM supplies back to the CPU is 1 bit. d. The CPU must first find the file in the file system......

Words: 1374 - Pages: 6

Nt1430 Chapter 1 Questions

...1. What is free software? List three characteristics of free software. -Free software is software that users have the freedom to distribute and change. The three main characteristics of free software are: The source code has to be distributed with the program, you cannot restrict people from redistributing/modifying/using the software, and users must be allowed to redistribute modified versions under the same terms/licensing. 2. Why is Linux popular? Why is it popular in academia? -Linux is popular for a number of different reasons. Its free software that is portable because it’s written in C, has an amazing range of supported "peripherals", has a lot of software available, and has standardization (POSIX). It’s generally popular in academia because it’s a free, open-source, portable, sophisticated programming environment that computer science students could use as a learning platform. 3. What are multiuser systems? Why are they successful? -A multiuser system is an operating system that allows multiple users to access a single computer's resources. It’s successful because it’s hard for a single user to use 100% of a modern computer’s resources, and allows for greater efficiency. 4. What is the Free Software Foundation/GNU? What is Linux? Which parts of the Linux operating system did each provide? Who else has helped build and refine this operating system? -GNU stands for "GNU'S Not Unix", and it was designed to be a UNIX-like operating system developed......

Words: 750 - Pages: 3

Chapter 1 Assessment Questions

...Chapter 1 Assessment Questions 1. Information security is specific to securing information, whereas information systems security is focused on the security of the systems that house the information. A. True 2. Software manufacturers limit their liability when selling software using which of the following? A. End-User License Agreement 3. The ___ tenet of information systems security is concerned with the recovery time objective. C. Availability 4. Encrypting data on storage devices or hard drives is a main strategy to ensure data integrity. B. False 5. Organizations that require customer-service representatives to access private customer data can best protect customer privacy and make it easy to access other customer data by using which of the following security controls? B. Blocking out customer private data details and allowing access only to the last four digits of Social Security numbers or account numbers. 6. The ___ is the weakest link in an IT infrastructure. E. User Domain 7. Which of the following security controls can help mitigate malicious e-mail attachments? E. All of the above 8. You can help ensure confidentiality by implementing ___. D. A virtual private network for remote access 9. Encrypting e-mail communication is needed if you are sending confidential information within an e-mail message through the public Internet. A. True 10. Using security policies, standards, procedures, and......

Words: 311 - Pages: 2

Nt1230 Chapter 1 Questions

...NT1230 Chapter 1 questions. Fill in the Blank Complete the following sentences by writing the correct word or words in the blanks provided. 1. The general public in the United States will be able to purchase all of the Windows 7 editions in retail stores except Starter, Home Basic, and Enterprise 2. The core module that provides all of the Windows 7 capability that isn’t language- or edition-specific is called minwin. 3. When you copy a file to a library, Windows Explorer writes the file to the folder desig- nated as the save location. 4. To use federated search, you must download or create XML files for specific sites called Search connectors. 5. The only operating system edition that you can upgrade in-place to Windows 7 Professional is windows Vista Business. 6. Upgrading a computer running Windows 7 Starter to Windows 7 Ultimate using Windows Anytime Upgrade requires 0 megabytes of additional hard disk space. 7. To migrate a computer running Windows XP to Windows 7, you can use a utility called User State Migration Tool. 8. The new Windows 7 feature that renders all of the windows on the desktop transparent when you mouse over the right end of the taskbar is called Aero Peek. 9. The Windows 7 Starter edition is only available in a 32-bit version. 10. The maximum amount of system memory supported by Windows 7 Enterprise is 4 (32) & 192 (64). True / False Circle T if the statement is true or F if the statement is false. T F 1.......

Words: 520 - Pages: 3

Chapter 1 Review Questions

...1. What is the difference between a threat agent and a threat? A. A threat agent is the person who facilitates the attack while the threat is a constant danger to something. 2. What is the difference between vulnerability and exposure? A. Vulnerability is a flaw within the system or a weakness, usually where the attackers attack. While Exposure is a single situation when the system is prone to be harmed. 3. How is infrastructure protection (assuring the security of utility services) related to information security? A. Both infrastructure protection and information security share the same overall goal, which is to ensure that data is available when, where and how it is needed. 4. What type of security was dominant in the early years of computing? A. Early security was entirely physical security. 5. What are the three components of the C.I.A. Triangle? What are they used for? A. Confidentiality: Information should only be accessible to its intended recipients. B. Integrity: Information should arrive the same as it was sent. C. Availability: Information should be available to those authorized to use it. 6. If the C.I.A. triangle is incomplete, why is it so commonly used in security? A. The triangle would still be used because it addresses the major concerns with the vulnerability of information systems. 7. Describe the critical characteristics of information. How are they used in the study of computer security? A. Availability: Authorized users......

Words: 855 - Pages: 4

Chapter 1 Review Questions

...CHAPTER 1 REVIEW QUESTIONS 1. Define each of the following terms: a) Data: raw data not processed. This usually includes telephone numbers, a date of birth, customer name etc. It has little meaning until it is turned into information. b) Field: A character or group of characters that has a specific meaning. A field is used to define and store data. c) Record: A logically connected set of one or more fields that describes a person, place, or thing.  d) File: A collection of related records. 2. What is data redundancy, and which characteristics of the file system can lead to it? a. Data redundancy is when the same data are stored unnecessarily at different places. This can lead to poor data security, and data inconsistency. 3. What is data independence, and why is it lacking in file systems? b. Data independence is when you change the data storage characterizes and it doesn’t affect the program’s ability to access the data. 4. What is a DBMS, and what are its functions? c. A DBMS (database management system) is a collection of program that stores and manages data and control access to the data in the collection. It is responsible for creating, editing, deleting and maintain all the data inserted. 5. What is structural independence, and why is it important? d. Access to a file is dependent on the structure of the database. Without structural independence new changes such as adding a field, or a decimal in a......

Words: 1121 - Pages: 5

Chapter 1 Review Questions

...CHAPTER 1 SOLUTIONS 1-2 There is a demand for auditing in a free-market economy because in the agency relationship there is a natural conflict of interest between an absentee owner and a manager and due to the information asymmetry that exists between the owner and manager. As a result, the agent agrees to be monitored as part of his/her employment contract. Auditing appears to be a cost-effective form of monitoring. The empirical evidence suggests auditing was demanded prior to government regulation such as statutory audit requirements. Additionally, many private companies and other entities not subject to government auditing regulations also purchase various forms of auditing and assurance services. 1-3 There is a natural conflict of interest in the agency relationship between an owner and manager because of differences in the two parties’ goals. For example, the manager may spend funds on excessive personal benefits or favour entity growth at the expense of stockholders values. If both parties seek to maximize their own self-interest, it is likely that the manager will not act in the best interest of the owner and may manipulate the information provided to the owner accordingly. 1-7 Audit risk is defined as the risk that ‘the auditor expresses an inappropriate audit opinion when the financial statements are materially misstated’ (ISA 200). Materiality: ‘Misstatements, including omissions, are considered to be material if they, individually or in the......

Words: 857 - Pages: 4

Chapter 1 Question

...Chapter 1 Problems 1, 2, 3 = straightforward, intermediate, challenging Section 1.2 Matter and Model-Building Note: Consult the endpapers, appendices, and tables in the text whenever necessary in solving problems. For this chapter, Appendix B.3 may be particularly useful. Answers to odd-numbered problems appear in the back of the book. 1. A crystalline solid consists of atoms stacked up in a repeating lattice structure. Consider a crystal as shown in Figure P1.1a. The atoms reside at the corners of cubes of side L = 0.200 nm. One piece of evidence for the regular arrangement of atoms comes from the flat surfaces along which a crystal separates, or cleaves, when it is broken. Suppose this crystal cleaves along a face diagonal, as shown in Figure P1.1b. Calculate the spacing d between two adjacent atomic planes that separate when the crystal cleaves. [pic] Figure P1.1 Section 1.3 Density and Atomic Mass 2. Use information on the endpapers of this book to calculate the average density of the Earth. Where does the value fit among those listed in Tables 1.5 and 14.1? Look up the density of a typical surface rock like granite in another source and compare also to it. 3. The standard kilogram is a platinum-iridium cylinder 39.0 mm in height and 39.0 mm in diameter. What is the density of the material? 4. A major motor company displays a die-cast model of its first automobile, made from 9.35 kg of iron. To celebrate its......

Words: 4296 - Pages: 18

Assistir Todas as Cheerleaders Devem Morrer Dublado | Het familiefeest | Ten Days in a Madhouse