
EBK ESSENTIALS OF MIS
12th Edition
ISBN: 8220101459305
Author: LAUDON
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 12, Problem 4RQ
Explanation of Solution
Determining the project information system being good for the investment, it is required to calculate the benefits and costs.
Difference between tangible and intangible benefits:
The below is difference between the tangible and intangible benefits:
Tangible benefits | Intangible benefits |
Tangible benefits can be measured. | Intangible benefits cannot be measured. |
The benefit that is obtained can be estimated in an accurate way. | The benefit that is obtained cannot be estimated in an accurate way. |
They can be assigned with the monetary value. | They cannot be assigned with the monetary value. |
Six tangible benefits:
The below are the six tangible benefits:
- Productivity gets increased.
- Operational cost is lowered.
- Expenses of the computer get lowered.
- Outside vendor cost is being lowered.
- Professional and clerical costs get lowered.
- Increase in sales.
- Expenses get reduced.
- Cost of the facility gets reduced.
Six intangible benefits:
The below are the six intangible benefits:
- Utilization of the asset gets improved.
- Control over resources gets improved.
- Organization planning gets increased.
- Flexibility of the organization is improved.
- It is capable of getting timely information.
- Ability of learning the organization gets increased.
- Legal requirements are easily achievable.
- Employee’s good will is enhanced.
- Job satisfaction gets increased.
- Decision making and operation are improved.\
- Can obtain higher client satisfaction.
Major components of the information system plan:
- Information system plan is used to depict how the company’s business strategy and plan can be fit to match the overall business requirements of the company.
- The below are the major components of the information system plan and they are:
- Purpose of the plan:
- The overall plan structure based on the future needs with a strategic plan is being defined.
- Strategic business plan rationale:
- Based on the business needs of the current situation a plan is being designed.
- Current systems:
- The requirements that required for supporting the business process and functions are gathered.
- New development:
- Any new project that is required for the business and they infrastructure requirement capabilities are being satisfied.
- Management strategy:
- The strategies that are required to process the business is being developed.
- Plan Implementation:
- The difficulty that is faced in the implementation and how the process is done is being made.
- Budget requirement:
- The requirements, savings, financing and the acquisition cycle are being gathered.
- Purpose of the plan:
Usage of portfolio analysis and scoring model for establishing a worth system:
- Portfolio analysis and scoring models are utilized for evaluating the alternative information system projects.
- Alternative system projects are being evaluated with the help of portfolio analysis.
- It is used to account all the firm’s information system projects, assets that include infrastructures, contracts that get outsourced along with the licenses.
- The companies will be trying to improve information system portfolios by balancing the risk and return from their system investments.
- Using the analysis the management can determine the optimal mix of the investment risk and rewards obtained for their firm, risk gets balances, project that are high-reward are dealt safer and along with the lower reward projects...
Expert Solution & Answer

Want to see the full answer?
Check out a sample textbook solution
Students have asked these similar questions
# Find the error# Why will the following code not print out a list of contact namesphoneBook = {'Doe, Jane' : '843-000-0000' ,'Doe, John' : '843-111-1111' ,'Smith, Adam' : '843-222-2222' ,'Jobs, Steve' : '999-333-3333' ,}for contact in phoneBook.values():print(contact)
# Find the error:# The following code creates an empty dictionary and attempts to add a record# Why will the following code not create a new dictionary entry as intended?phoneBook = {}phoneBook{'Jobs, Steve'} = '999-111-1111'
Select all the possible polar representations of the vector
that is obtained from rotating
where
by
Zrot
Ź
x =
3e²
T=
3п
8
Hint: Consider the negative angle that is equivalent to the positive angle of the rotated vector.
0
Chapter 12 Solutions
EBK ESSENTIALS OF MIS
Ch. 12.2 - Prob. 1CQ1Ch. 12.2 - Prob. 2CQ1Ch. 12.2 - Prob. 3CQ1Ch. 12.4 - Prob. 1CQ2Ch. 12.4 - Prob. 2CQ2Ch. 12.4 - Prob. 3CQ2Ch. 12.4 - Prob. 4CQ2Ch. 12 - What are the core problem-solving steps for...Ch. 12 - Prob. 2RQCh. 12 - Prob. 3RQ
Ch. 12 - 12-4 How should information systems projects be...Ch. 12 - Prob. 5DQCh. 12 - Prob. 6DQCh. 12 - Prob. 7DQCh. 12 - The Warm and Toasty Heating Oil Company used to...Ch. 12 - Prob. 9HMPCh. 12 - Prob. 11HMPCh. 12 - Prob. 13CSQCh. 12 - Prob. 14CSQCh. 12 - Prob. 15CSQCh. 12 - Prob. 16CSQCh. 12 - Prob. 17CSQCh. 12 - Prob. 18MLMCh. 12 - Prob. 19MLM
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Character Analysis If you have downloaded the source code you will find a file named text.txt on the Chapter 08 folder. Write a program that reads the file's contents and determines the following: The number of uppercase letters in the file The number of lowercase letter in the file The number of digits in the file The number of whitespace characters in the filearrow_forwardWrite a program that reads the text file's contents and calculates and outputs the following in this order: • The number of words in the file • The number of lines in the file • The number of uppercase letters in the file • The number of lowercase letters in the file • The number of digits in the file • The number of letter H's in the file • The number of whitespace characters in the file NOTE: Your program should include at least one try-except error handling statement block. Your program should also validate any input that could cause your program to crash. I'm Henery The Eighth, I Am! Henery The Eighth, I Am, I am!I got married to the widow next door,She's been married seven times before.And ev'ryone was a Henery,She wouldn't have Willie or a Sam.I'm her eighth old man named Henery,Henery the Eighth, I Am!Second verse same as the first!I'm Henery The Eighth, I Am! Henery The Eighth, I Am, I am!I got married to the widow next door,She's been married seven times before.And…arrow_forwardFigure 4-40 Modern Database Management, 13th edition, question 4-53arrow_forward
- Which of the following needs improvement in the dashboard shown? A. Instructional clarity missing for the views B. Filter placed at the top of the dashboard C. Inconsistent use of colors to represent missed goals D. Dashboard title too largearrow_forwardIf we click Show dashboard title in this dashboard, what will the title be?arrow_forwardPlease draw the diagram where it is asked to be drawn. Don't just describe how to do it.arrow_forward
- C. Homework Assignment Task: Write a one-page CV using the provided template. Steps: 1. Use the CV guide to structure your CV. 2. Fill in each section with real information about yourself. 3. Format your CV neatly and use professional language. 4. Submit to the instructor before the next classarrow_forwardSimulate on a vertical time axis (with events labeled with the senders names A-D) the contention period of FOUR equally distanced Ethernet stations that all attempt to transmit at T=0 a minimally sized frame, in the style of the binary Exponential Backoff Algorithm. Assume that time is measured in slot times, and that exactly one slot time is needed to detect a collision (so that if two stations transmit at T=1 and collide, and one of them chooses a backoff time k=0, then that station will transmit again at T=2). Use as coin flip (source of randomness) an ID written in binary. use the bits in order from the least significant to the most significant. If for a given coin throw you need k bits, use the least significant ID bit extracted in the corresponding group of bits, as the least significant bit of the coin thrown. Start be writing the ID, which is 904012207 As example of the expected answer format, with the random sequence R: 100101010101001011001010 01 01011 10010 1010 1010 010…arrow_forwardBig State University The Big State University course catalog reads as follows: "To enroll in MIS 260, which is an advanced course, a student must complete two prerequisites: MIS 120 and MIS 222. A student who completes either one of these prerequisites and obtains the instructor's permission, however, will be allowed to take MIS 260." Tasks 1. Create a decision table that describes the Big State University course catalog regarding eligibility for MIS 260. Show all possible rules. 2. Simplify the table you just created. Describe the results. 3. Draw a simplified decision tree to represent the Big State University catalog. Describe the results. 4. Why might you use a decision tree rather than a decision table?arrow_forward
- What is the ALU result if the 4-bit ALU Control signal is 0100? What happens if the ALU Control signal is 0101?arrow_forward#include int main (void) { int i, *p, count } p = &count; = 10%; for (i = 5; i >= 0; i--) { count++; (*p) ++; } printf("count return 0; = %d, Have a wonderful day.\n", count); 1. [20 pts] What is the output of the program? Please explain why. 2. [15 pts] What is the gdb command to set a breakpoint in line 6 (p = &count;)? 3. [15 pts] Explain in your own words how the [break. need to use such command? ... if expr] command works. When might youarrow_forwardPlease run and debug the following program and answer the questions.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education

Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education

Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON

Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON

C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON

Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning

Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
9.1.2 Software Development Approaches; Author: EIToppo;https://www.youtube.com/watch?v=Z9znuSQ7Sz8;License: Standard YouTube License, CC-BY