TCO 1 - Given a company or company division with multiple departments, multiple locations, and a centralized IT department, develop job descriptions for a CIO, a mid-level IT manager, and technical IT staff personnel that itemizes the major responsibilities and skills for each position.

 

Explain the differences in skill sets required for IT technical personnel and IT managers. (TCO 1)

 

What is the 50%/50% management model?  What would a manager be able to accomplish by using this model? (TCO 1)

 

Identify three IT management positions and describe their responsibilities. (TCO 1)

 

Explain the POLC management model. (TCO 1)

 

Explain how upper management views the IT department, specifically telecommunications? (TCO 1)

 

What are three skills needed by IT managers and what comprises each skill set? (TCO 1)

 


 

TCO 2 - Given a company as described in TCO 1, write a memo to senior management describing a plan for establishing and maintaining relationships with other business units within the company, and tightly integrating the IT function with other business units within the company.

 

What is the business system used to measure business success, who uses it, and how do they use this system? (TCO 2)

 

List and briefly describe the IT management keys to personal success. (TCO 2)

 

How would you establish and maintain relationships with other business units within the company? (TCO 2)

 

List and briefly describe the major parts of managerial communication. (TCO 2)

 

Explain business communication and briefly describe the major attributes of business communication. (TCO 2)

 

Explain the purpose of an IT Steering Committee, briefly describe its members, and list the benefits of the committee. (TCO 2)

 

Explain why the IT department, including telecommunications, is a strategic and operational asset for a company.  (TCO 2)

 


 

TCO 3 - Given an installed network for the company described in TCO1, create a network maintenance plan that lists the process, procedures, and resources necessary for asset identification, asset cataloging, network performance measurement, end user support, and license management.

 

Describe the major technology components that should be included in business telecommunications planning. (TCO 3)

 

Give an overview of the three step enterprise telecommunications planning model. (TCO 3)

 

Provide an overview of the X.700 Network Management Standard and describe the five areas that are addressed by this framework. (TCO 3)

 

Analyze the advantages and disadvantages of one automated tool for cataloging IT assets and one manual tool for cataloging IT assets. (TCO 3)

 

What is the difference between general business assets and IT supported assets? (TCO 3)

 

List four parameters that are measured in a network baseline.  Describe the parameters and explain how the information they provide is used. (TCO 3)

 

Compare the advantages and disadvantages of two methods of end-user support. (TCO 3)

 

Describe a method for documenting, tracking, and updating software licenses. (TCO 3)

 


 

TCO 4 - Given a case study that identifies a need to modify current telecommunication services, use feasibility analysis to compare different solutions and select a recommended solution.  Design a vendor management process that uses Request for Proposals (RFP) and RFP response evaluation.  All written documents should meet the stated technical requirements, as well as the legal/business components required in such a document, and be professional and written in the appropriate style.

 

List and explain ten "keys" for a successful IT business case. (TCO 4)

 

List and explain the four areas of project feasibility. (TCO 4)

 

Compare the advantages and disadvantages of the following financial metrics for feasibility analysis: NPV, IRR, ROI, Payback Period(TCO 4)

 

Explain the purpose of an RFI, an RFQ, and an RFP.  How are these documents used in a vendor management process? (TCO 4)

 

List the major sections of a business case and describe the purpose of each section. (TCO 4)

 

Explain the Life Cycle Analysis process and how it applies to project justification. (TCO 4)

 

List and explain the seven steps in the telecommunications acquisition process. (TCO 4)

 

Compare the advantages and disadvantages of outsourced and in-house solutions. (TCO 4)

 

List the sections contained in a generic RFP.  Describe the purpose of each section. (TCO 4)

 

Explain step five (Evaluate vendor responses) of the seven step acquisition model presented in the text. (TCO 4)

 

Explain step six (Select a winner) of the seven step acquisition model presented in the text. (TCO 4)

 

Briefly describe each step of the seven step telecommunications acquisition model. (TCO 4)

 

 


 

TCO 5 - Given the mission statement and business goals of a company, a set of reports outlining the costs and benefits of the IT related activities or services, and a set of proposals (pre-RFP or with bid responses) and a limited budget amount (less than the total amount of detailed services and requests),  analyze the costs and benefits of each item using various, appropriate financial measures, prioritize each item, determine where scaling or cut-off points can be made, and propose a budget plan that best supports the mission statement and goals of the organization while remaining within the overall budget amount.

 

Explain the incremental budgeting process and the zero-based budgeting process. (TCO 5)

 

Explain the difference between capital budgets and operating budgets. (TCO 5)

 

What is the long-term effect on a company of consistently underfunding IT projects or the IT capital budget? (TCO 5)

 

Discuss the advantages and disadvantages of one financial project prioritization metric and one non-financial project prioritization metric. (TCO 5)

 

 


 

TCO 6 - Given a case study that details installed telecommunications hardware and software, outline the processes and procedures for an overall security plan that includes security risk identification, security risk mitigation, backup and restore, disaster recovery, and identification of U.S. and International legislation that has a direct affect on network security

 

Explain the difference between disaster prevention and disaster recovery. (TCO 6)

 

Describe the major steps contained in a comprehensive backup and recovery plan. (TCO 6)

 

What are three areas addressed by a comprehensive security plan and how do they affect security? (TCO 6)

 

How do state legislation, federal legislation, and international legislation affect IT security planning? (TCO 6)

 


0 comments:

Post a Comment

 
Top