Free Essay

1 and 3 in Chapter 5, and Questions 8 and 9 in Chapter 6.

In: Business and Management

Submitted By BunnyBB
Words 353
Pages 2
Do 1 and 3 in chapter 5, and questions 8 and 9 in chapter 6.
For Chapter 5 question 1: One of the potential problems mentioned in the chapter with gathering information requirements by observing potential system users is that people may change their behavior when observed. What could you do to overcome this potential confounding factor in accurately determining information requirements? (5 points)
There is no doubt that an employee may change their attitude or work behavior when they are being observed. One thing that I would do is keep observing the employee, however informing the employee before the observation would allow the employee to attempt to work with their best quality while being observe. This will allow the observer to identify the issues that the worker really has.
For Chapter 5 question 3: Suppose you were asked to lead a JAD session. List ten guidelines you would follow in playing the proper role of a JAD session leader. (5 points)
Chap 5, Question 3: Ten Guidelines listed
1. Limit the distraction to focus on meeting
2. Set an agenda and keep the session on track
3. Always remain neutral
4. Identify and address critical political and organizational issues early
5. Establish the executive sponsor as the tiebreaker
6. Facilitator should be train and be critically involved
7. Team attendance and participation are mandatory
8. Respond to ideas that relate to the project
9. Keep the team in check on topics that relate to the meeting
10. Involve all the team disregarding the department they may be from
For chapter 6 question 8: Consider the DFD in Figure 6–20. List three errors (rule violations) on this DFD. (5 points)
Process P1 only has inputs not outputs. Black hole
Data flow DF5 should not move directly from source E1 to data store DS1 without first going through a process.
Data flow DF1 should not move directly from source E1 to sink E2 without first going through a process.
For chapter 6, question 9: Consider the three DFDs in Figure 6–21. List three errors (rule violations) on these DFDs. (5 points)…...

Similar Documents

Premium Essay

Chapter 1 Questions Ans Application

...Eva Diaz Chapter 1 Questions and applications #1,2,3,5,6,7,10,15,16 1. a. Some of the agency problems encountered with the MNC come with the conflict of goals between a firm’s managers and shareholders when making decisions. Agency costs are larger for an MNC than for a purely domestic firm because managers of foreign subsidiaries may be tempted to focus on making decisions to serve their subsidiaries rather than the overall MNC. b. MNC’s with subsidiaries scattered around the world may experience more agency costs because it is much more difficult to monitor managers in foreign countries, foreign subsidiaries may not follow the same uniform goals, the size of the subsidiaries themselves leads to more conflicts, as well as the beliefs that employees should come first in decision making prior to shareholders. 2. a. Explain how the theory of comparative advantage relates to the need for international business. The theory of comparative advantage relates to the need for international business because it suggests that each country should use its comparative advantage to specialize in its production and rely on other countries to meet other needs. Therefore all countries would need to trade with each other competitively for the products they are not able to produce. b. Explain how the product cycle theory relates to the growth of the MNC. The product cycle theory suggests that after firms are established in their home......

Words: 858 - Pages: 4

Premium Essay

Chapter 4 Review Questions 1-5

...Chapter 4 “IT Infrastructure: Hardware and Software” Review Questions 1-5 1. What are the components of IT infrastructure? • Define information technology (IT) infrastructure and describe each of its components. IT infrastructure consists of the shared technology resources that provide the platform for the firm’s specific information system applications. Major IT infrastructure components include computer hardware, software, data management technology, networking and telecommunications technology, and technology services. 2. What are the major computer hardware, data storage, input, and output technologies used in business? * Computer Hardware: Mainframes, midrange computers, PC’s, workstations, and supercomputers. * Data Storage: Magnetic disk, optical disc, magnetic tape and storage networks. * Input devices: Keyboards, computer mice, touch screens (including those with multitouch), magnetic ink and optical character recognition devices, pen-based instruments, digital scanners, sensors, audio input devices, and radio-frequency identification devices. * Output devices: Display monitors, printers, and audio output devices. • List and describes the various type of computers available to businesses today. * Mainframes are a large-capacity, high-performance computer that can process large amounts of data very rapidly. * Midrange computers are servers computers are specifically optimized to support a computer network, enabling users to share......

Words: 3229 - Pages: 13

Premium Essay

Chapter 7 Exercises 1, 6, 8, and 9 and Chapter 8 2a, 4, and 6a

...Week 4 Check Your Understanding Exercises July 22, 2013 Chapter 7 – 1, 6, 8 and 9 1. In the Deep Creek Mining Company example described in this chapter (Table 7.1), suppose again that labor is the variable input and capital is the fixed input. Specifically, assume that the firm owns a piece of equipment having a 500-bhp rating. a. Complete the following table: LABOR INPUT L (NO. OF WORKERS) | TOTAL PRODUCT TPL (= Q) | MARGINAL PRODUCT MPL | AVERAGE PRODUCT APL | 1 | 3 | - | 3 | 2 | 6 | 3 | 2 | 3 | 16 | 10 | 5.33 | 4 | 29 | 13 | 7.25 | 5 | 43 | 14 | 8.6 | 6 | 55 | 12 | 9.16 | 7 | 58 | 3 | 8.28 | 8 | 60 | 2 | 7.5 | 9 | 59 | -1 | 6.5 | 10 | 56 | -3 | 5.6 | b. Plot the (i) total product, (ii) marginal product, and (iii) average product functions. c. Determine the boundaries of the three stages of production. In Stage 1, both AP and MP are rising. MP Reaches its maximum point and starts falling. The point to note is that MP is always greater than AP in this stage. In stage 2, AP reaches its maximum point and starts falling. MP also falls and becomes zero. Here MP is always less than AP. In stage 3, MP becomes negative and AP decreases but remains positive. 6. Consider the following short-run production function (where L = variable input, Q = output): Q = 10L – 0.5L2 Suppose that output can be sold for $10 per unit. Also assume that the firm can obtain as much of the variable input (L) as it needs at $20 per......

Words: 1456 - Pages: 6

Premium Essay

Chapter 6 Review Questions

...Miguel Berrios July 28, 2013 Chapter 6 Review Questions 1. How does the WBS differ from the project network? The WBS differs from the project network in several ways. The WBS is hierarchical while the project network is sequential. The work packages of the WBS are identified independently of other work packages, have definite start and finish points, require specific resources, include technical specifications and have cost estimates. Networks provide the project schedule by identifying dependencies, sequencing, and timing of activities. 2. How are WBS and project networks linked? Project networks are developed from the WBS. Work packages from the WBS are used to build the activities found in the project network. The network uses the time estimates from the WBS to generate dates for the project. Integration of the WBS and project network is crucial to effective project management. 3. Why bother creating a WBS? Why not go straight to a project network and forget the WBS? Project networks depend on the WBS because work packages from the WBS are used to develop the project network. A network activity can include one or more work packages but all activity time estimates are derived from the task times in the work package. Unlike the project network, the WBS defines all the elements of the project in a hierarchical framework and establishes their relationships to project deliverables. 4. Why is slack important to the project......

Words: 541 - Pages: 3

Free Essay

Meteorology Chapter 5 Questions

...Chapter 5, Review Questions ________________________________________________________________________ 1. How does Dalton’s law apply to the atmosphere? 2. Provide a definition of air pressure that applies to Earth’s surface and any altitude within the atmosphere. 3. Compare the advantages and disadvantages of mercury barometer versus an aneroid barometer. 4. Explain how air pressure tendency can be a useful indicator of future weather. 5. Air is a compressible mixture of gases. How does this property of air affect the rate at which air pressure decreases with increasing altitude? 6. How does a change in temperature affect air density? How does a change in humidity affect air density? 7. Why does a cold, dry air mass exert a greater surface air pressure than an equally cold but more humid air mass? 8. Why are air pressure readings adjusted to what they would be if the weather station were actually located at sea level? 9. Distinguish between Charles’ law and Boyle’s law. 10. Why is the dry adiabatic lapse rate greater than the moist adiabatic lapse rate? Chapter 5, Critical Thinking Questions ________________________________________________________________________ 1. Is there some altitude which clearly marks the top of the atmosphere? Explain your response. 2. On televised weathercasts, air pressure is often reported in units of length (inches) rather than units of pressure (millibars). Explain why. 3. On a particularly warm...

Words: 423 - Pages: 2

Premium Essay

Chapter 1 Review Questions

...CHAPTER 1 REVIEW QUESTIONS 1. Define each of the following terms: a) Data: raw data not processed. This usually includes telephone numbers, a date of birth, customer name etc. It has little meaning until it is turned into information. b) Field: A character or group of characters that has a specific meaning. A field is used to define and store data. c) Record: A logically connected set of one or more fields that describes a person, place, or thing.  d) File: A collection of related records. 2. What is data redundancy, and which characteristics of the file system can lead to it? a. Data redundancy is when the same data are stored unnecessarily at different places. This can lead to poor data security, and data inconsistency. 3. What is data independence, and why is it lacking in file systems? b. Data independence is when you change the data storage characterizes and it doesn’t affect the program’s ability to access the data. 4. What is a DBMS, and what are its functions? c. A DBMS (database management system) is a collection of program that stores and manages data and control access to the data in the collection. It is responsible for creating, editing, deleting and maintain all the data inserted. 5. What is structural independence, and why is it important? d. Access to a file is dependent on the structure of the database. Without structural independence new changes such as adding a field, or a decimal in a......

Words: 1121 - Pages: 5

Premium Essay

Chapter 9 Question and Discussion

...Chapter 9 Review Question, Discussion Topic and Project Review Question 1: In the auto shop examples on page 348, what are some problems that might arise in Mario's system? Why won't Danica run into the same problems? Provide specific examples in your answer. Problems that would be exclusive to Mario’s Auto Shop are: increased time spent on entering in the same data, miscalculations could result from having two people entering in the same data and they would not be able to compare all of the data at once. Danica wouldn’t run into those problems because she only has one table and therefore doesn’t have to retype the same data into two different tables. Danica would also be able to compare all of her data on a single screen and would be able to organize the two categories at once. Having only one large table would also reduce time being spent on entering data as opposed to having two separate data tables. Discussion Topic 1: Are there ethical issues to consider when planning a database? For example, should sensitive personal data (such as medical information) be stored in the same DBMS that manages employee salary and benefits data? Why or why not? The main ethical issues of handling sensitive data would be privacy. Medical information should only be visible to doctors or health insurance providers. While employee salary and benefits should only be visible to management. Also all the data storage should comply with all laws of privacy including the HIPPA act and......

Words: 374 - Pages: 2

Free Essay

Crj 320 Wk 5 Quiz 5 Chapter 8 and 9

...CRJ 320 WK 5 QUIZ 5 CHAPTER 8 AND 9 To purchase this visit here: Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 320 WK 5 QUIZ 5 CHAPTER 8 AND 9 CRJ 320 WK 5 Quiz 5 Chapter 8,9 MULTIPLE CHOICE 1. Which of the following factors can assist in establishing time of death? a. victim’s clothing c. rigor mortis b. presence of weapons d. hair color 2. The type of “lust murderer” who is usually of above-average intelligence, methodical and cunning, and socially skilled, and who tricks victims into situations in which he can torture and then murder them, is called a(n), a. serial killer. c. disorganized offender. b. organized offender. d. mass murderer. 3. Which of the following statements is not true with regard to death investigations? a. Body temperature drops 2 to 3 degrees in the first hour after death. b. Rigor mortis appears first in the smaller muscles, such as those of the face. c. After about 36 hours, rigor mortis usually disappears in the same sequence as it appeared. d. Maximum lividity occurs within 15–20 hours after death. 4. Premeditation would be a requirement in which case? a. first-degree murder c. excusable homicide b. second-degree murder d. justifiable homicide 5. Rigor mortis is at its maximum at about ____________ hours after death. a. 6 to 8 hours c. 12 to 24 hours b. 8 to 9 hours d. 36 to 48 hours 6. Deaths are classified by type as a. natural, accidental......

Words: 1369 - Pages: 6

Premium Essay

Crj 105 Wk 8 Quiz 3 Chapter 9 to 11

...CRJ 105 WK 8 QUIZ 3 CHAPTER 9 TO 11 To purchase this visit here: Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 105 WK 8 QUIZ 3 CHAPTER 9 TO 11 CRJ 105 WK 8 Quiz 3 Chapter 9-11 1. A disgruntled employee opened fire at his job, killing two of his coworkers; he then proceeded directly home to kill his wife and child. This individual is best identified as a: a. Mass murderer b. Sadistic murderer c. Serial murderer d. Spree murderer 2. An upset student opens fire in a school cafeteria, killing 18 of his classmates. This student is best identified as a: a. Mass murderer b. Sadistic murderer c. Serial murderer d. Spree murderer 3. Which of the following crimes is usually sexual in nature? a. Domestic violence b. Elder abuse c. Robbery d. Serial murder 4. Most murders: a. Are premeditated b. Involve contract killers c. Result from aggravated assault d. Take place during robbery attempts 5. The "terrible triad" is considered predictive of which type of crime? a. Domestic violence b. Rape c. Robbery d. Serial murder 6. Which of the following refers to the victim's role in his or her own victimization? a. Victim blame b. Victim cause c. Victim complicity d. Victim precipitation 7. Offenders who commit "crimes of passion" would be identified as which of the following? a. Culturally violent offenders b. Criminally violent offenders c. Pathologically violent offenders d.......

Words: 683 - Pages: 3

Premium Essay

Mkt 305 Wk 6 Quiz 5 Chapter 8 & 9

...MKT 305 WK 6 QUIZ 5 CHAPTER 8 & 9 To purchase this visit here: Contact us at: SUPPORT@ACTIVITYMODE.COM MKT 305 WK 6 QUIZ 5 CHAPTER 8 & 9 MKT 305 WK 6 Quiz 5 Chapter 8,9 TRUE/FALSE 1. Consumer culture is commonly held societal beliefs that define what is socially gratifying. 2. The primary function of culture is to facilitate communication among members of that culture. 3. Rules that specify the appropriate behavior in a given situation within a specific culture are called cultural standards. 4. Cultural sanction refers to the penalties associated with performing a nongratifying or culturally inconsistent behavior. 5. Role expectations are the specific expectations that are associated with each type of person. 6. Role expectations for a given role, such as a student or service provider, appear to be universal across cultures. 7. Environmental factors are the physical characteristics that describe the physical environment and habitat of a particular place. 8. Eating turkey on Thanksgiving in the United States is an example of a tradition. 9. Core societal values (CSV) represent a commonly agreed upon consensus about the most preferable ways of living within a society. 10. Responsibility as a CSV means the extent to which people are expected to take care of themselves and their immediate family. MKT 305 WK 6 QUIZ 5 CHAPTER 8 & 9 To......

Words: 688 - Pages: 3

Free Essay

Mkt 315 Wk 6 Quiz 4 Chapters 8 & 9

...MKT 315 WK 6 QUIZ 4 CHAPTERS 8 & 9 To purchase this visit here: Contact us at: SUPPORT@ACTIVITYMODE.COM MKT 315 WK 6 QUIZ 4 CHAPTERS 8 & 9 MKT 315 WK 6 Quiz 4 Chapters 8,9 MULTIPLE CHOICE 1. Why does it make sense to sell high-priced and exclusive merchandise such as diamonds, rare Cognac, or Waterford Crystal, through warehouse club channels? a. The warehouse clubs attract thousands of customers each year. b. Companies can sell last year’s style/model easily at the warehouse club. c. Two-thirds of the shoppers at a warehouse club are business owners, many of whom are successful and affluent. d. These types of manufacturers are changing their distribution channels to include mass merchandisers, discount stores, and warehouse clubs in order to reach more potential buyers. e. It makes no sense for these manufacturers to sell products at a warehouse club and diminish the image of their brand or product name. 2. The emphasis on channel design strategy is to help the firm gain ___________. a. lower variable costs b. a more efficient operation c. strong channel members that will help the firm gain sales d. a recognizable name and image among buyers e. a competitive sustainable advantage 3. The market constructs used in the text to analyze markets in relation to channel design strategy consists of all of the following dimensions except: a. Market density. b. Market behavior. c. Market...

Words: 1266 - Pages: 6

Free Essay

Mkt 475 Wk 6 Quiz 5 Chapter 8 & 9

...MKT 475 WK 6 QUIZ 5 CHAPTER 8 & 9 To purchase this visit here: Contact us at: SUPPORT@ACTIVITYMODE.COM MKT 475 WK 6 QUIZ 5 CHAPTER 8 & 9 MKT 475 WK 6 Quiz 5 Chapter 8,9 All Questions Included... Activity Mode aims to provide quality study notes and tutorials to the students of MKT 475 WK 6 Quiz 5 Chapter 8 & 9 in order to ace their studies. MKT 475 WK 6 QUIZ 5 CHAPTER 8 & 9 To purchase this visit here: Contact us at: SUPPORT@ACTIVITYMODE.COM MKT 475 WK 6 QUIZ 5 CHAPTER 8 & 9 MKT 475 WK 6 Quiz 5 Chapter 8,9 All Questions Included... Activity Mode aims to provide quality study notes and tutorials to the students of MKT 475 WK 6 Quiz 5 Chapter 8 & 9 in order to ace their studies. MKT 475 WK 6 QUIZ 5 CHAPTER 8 & 9 To purchase this visit here: Contact us at: SUPPORT@ACTIVITYMODE.COM MKT 475 WK 6 QUIZ 5 CHAPTER 8 & 9 MKT 475 WK 6 Quiz 5 Chapter 8,9 All Questions Included... Activity Mode aims to provide quality study notes and tutorials to the students of MKT 475 WK 6 Quiz 5 Chapter 8 & 9 in order to ace their studies. MKT 475 WK 6 QUIZ 5 CHAPTER 8 & 9 To purchase this visit here: Contact us at: SUPPORT@ACTIVITYMODE.COM MKT 475 WK 6 QUIZ 5 CHAPTER 8 & 9 MKT......

Words: 589 - Pages: 3

Premium Essay

Week 3 Chapter 5

...Chapter: Chapter 5: IT Security, crime, Compliance, and Continuity Multiple Choice 1. ______ refers to viruses, Trojan horses, spyware, and other types of disruptive, destructive, or unwanted programs. a) Bad program b) Hacking c) Malware d) Zombie computer 2. Social networks and cloud computing increase vulnerabilities by providing _____. a) a single point of failure b) an easy way to steal data c) an easier way for data to be read over networks d) extra security over a network 3. _______ is a deceptive attempt to steal a person’s confidential information by pretending to be a legitimate organization such as PayPal. a) Inquiry b) Lying c) Phishing d) Polling 4. Some essential defenses against malware and botnet defenses include all of the following except: a) antivirus software b) constant monitoring by a human c) intrusion detection systems d) intrusion prevention systems 5. ______ fraud refers to the deliberate misuse of the assets on one’s employer for personal gain. a) Occupational b) Human c) Malicious d) Accidental 6. One of the worst and most prevalent crimes is/are _____. a) phishing b) viruses c) identity theft d) malware 7. Physical control is an example of what category of control? a) Application b) Basic c) Major d) General 8. Network Security measures involve ___ types of defenses referred to as layers. a) 4 b) 3 c) 10 d) 5 9. _____ is a......

Words: 399 - Pages: 2

Free Essay

Chapter 6 Questions

...Alex Viger Chapter 6 Questions: 1,4,5,7,10-12,17,18,20,22 1.) When a parcel of air expands and cools or compresses and warms with no interchange of heat. 4.) The dry adiabatic rate is the rate of cooling or warming of unsaturated air. The environmental lapse rate is the rate of change in temperature with altitude. 5.) By releasing a radiosonde which is a balloon shaped instrument that sends back temperature data. 7.) Clouds formed in stable conditions will have usually form relatively thin layers and have flat tops and bases. Clouds formed in unstable conditions will be more vertically developed and will not always have smooth tops and bottoms. 10.) The air over the cold water will be relatively stable. 11.) This is when the air will be the most unstable and will have a lifting action. 12.) There is no mixing present. If there were, there wouldn’t be an inversion. 17.) Surface heating and free convection, uplift along topography, widespread ascent do to convergence of surface air, uplift along weather fronts. 18.) a. They appear to be motionless when viewed form the ground, b. leeward side 20.) If the top of the cloud deck cools while the bottom warms an altostratus cloud can turn into an altocumulus cloud. 22.) a. when stable air flows over a mountain and the air condenses as it rises and evaporates as it sinks b. when a rotating eddy forms c. along a region of rapidly changing wind speed d. when rising air currents within the cloud extend into......

Words: 268 - Pages: 2

Premium Essay

Chapter 18 Question 3 and Chapter 23 Question 1 and 5 of the Legal Environment of Business in the Information Age

...Chapter 18 The federal government regulates labels, warranties, and consumer products. Without government regulation, what abuses are likely to occur? The abuses that are likely to occur without government regulation are more illnesses, deaths and allergic reactions from not knowing what is in the product. If companies were not regulated by the government then you would have mislabeling. By this I mean you could have items that are marked low fat or low sodium when that is not the case. They would not have to include whether or not it was made with or surrounding peanuts and we all know the consequences of that. Having the government regulate labels, warranties and consumer products is very beneficial to the consumers as they are able to make more educated decisions by knowing what they are selecting. Chapter 23 Compare the minimum contacts test, as it is applied to the bricks-and-mortar activity of businesses, to their cyberspace activity. If you were a small business, seeking to sell to customers located in other states, what are some things you could do to avoid having states where these customers live require you to collect sales tax? Some of the things you could do to avoid having to pay taxes to states where the customers live is by not receiving the benefits from that state. You could also use mail-order catalog sales. If the business only sends the catalog to residents of a particular state that is not sufficient enough to subject the company......

Words: 390 - Pages: 2