Final exam
docx
keyboard_arrow_up
School
Strathmore University *
*We aren’t endorsed by this school
Course
MISC
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
4
Uploaded by DukeMinkMaster907
1.
Why is a Business Continuity Plan needed? What are key components of a Business
Continuity Plan and what are the most important aspects?
Business continuity plan is a function that ensures that the company in question continues
operating in case a disaster occurs. The plan is important since without this critical
function, the business will close down. Some essential elements of the business
continuity plan includes the following:
Defined team
Detailed written plan
Effective testing
Crisis communications
Employee safety
Uninterrupted access to business resources
Continuous IT operations
2.
What is the difference between a fully functional 13 step Systems Development Life
Cycle (SDLC) and a fully functional 3 step SDLC?
The main difference between 13 step Systems Development Life Cycle (SDLC) and a
fully functional 3 step SDLC is number of phase to develop and achieve system
requirement. The 13 step system development life cycle need long time and the 3 - step
system development life cycle needs short period. Additionally, the 13 step SDLC is
traditional and very time taking but the new 3 step is modern SDLC and time saving.
3.
What is the process of Risk mitigation? Describe a minimum of 3 techniques used
for the management of risk?
Risk mitigation is the process of reducing the potential impact of risk on an organization's
operations or a project. There are a number of techniques used for the management of
risk, including risk avoidance, risk transfer, risk reduction, and risk acceptance. Risk
avoidance involves avoiding activities or situations that pose a risk. Risk transfer
involves transferring the risk to another party, such as through insurance. Risk reduction
involves reducing the potential impact of risk by taking proactive measures, such as
implementing safety protocols. Risk acceptance involves accepting that there are risks
associated with certain activities and taking steps to manage them.
4.
Why it is important to identify requirements for regulatory compliance? Identify
one governmental regulation as it relates to Information assurance
It is important to identify requirements for regulatory compliance because of the need to
manage risks related to the use, processing, storage, and transmission of information or
data. A government regulation relating to information assurance is HIPAA. HIPAA is a
government regulation which includes privacy and security rules governing the
collection, disclosure, and security of PHI.
5.
What is the difference between outsourcing and insourcing? Why are these different
sourcing models necessary?
Outsourcing refers to the process where an organization hires another party to complete
specific tasks from outside and the party is not affiliated with the organization. On the
other hand, insourcing is a business practice that an organization performs within its
operational infrastructure. The two are differentiated by the methods of working. An
organization needs both outsourcing and insourcing for the purpose of obtaining
something they do not have or a talent they may not have within the organization.
6.
Why is it important to use scholarly resources when researching a topic?
It is important to use scholarly resource when researching a topic because they are
authoritative and credible. With this authority and credibility, scholarly sources make
important contribution to the overall quality of a research paper. Additionally, such
sources are usually trustworthy because their publication also includes peer-review.
7.
Why do we use APA formatting when writing research papers?
APA formatting is used when writing research papers because the format provides
research writers with consistency in the writing format that they can use every time they
are writing. When research papers have consistency, they help researchers to efficiently
organize their arguments. From the first page, every section of a research paper has a
specific predetermined format which is easy to follow.
8.
Discuss some common IT metrics for strategic initiatives and how/why they are
measured.
Metrics are used for measuring any purpose such as, success or performance of an
organization. IT metrics are used for measuring the performance as well as the success of
the projects or the whole organization. Some IT metrics include performance.
Performance is measured by how well IT department can support an organization’s
technology needs. Another metric is organization which is measured by how healthy the
workplace environment is. There is also the cost metric which is measured by how well
financial metrics are tracked for regular reporting and measuring IT efficiency.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
9.
Provide 3 examples of policies that should be implemented to address an
organization's ethical compliance.
Describe each policy
.
code of conduct
Whistleblower policy
ethics officer responsible for overseeing the implementation of ethical policies
and ensuring compliance with them
10. Discuss the relationship between critical success factors and key performance
indicators in measuring success
Efficiency measures how well you use your resources to achieve a goal. It is about
getting the best results from what you have available. In the business environment, it's
essential to be efficient to maximize output with minimal costs. While Effectiveness is a
measure of how well something achieves its desired result. It's about getting the best
results possible, given what you have available. In the business environment, it's essential
to effectively meet desired goals within a specific time frame and budget constraints.