4

¡Supera tus tareas y exámenes ahora con Quizwiz!

50) Which of the following statements about a project WBS is NOT true?

A WBS should be limited to a hundred or fewer tasks to allow for easier management

46) ________ is an example of a data safeguard against security threats.

Backup and recovery

38) Which of the following statements about identification and authentication is NOT true?

Because many users have to sign on to different systems with different usernames and passwords, it is a good practice to write down all of one's username/password combinations and store them in a convenient place.

21) ________ is the process of allowing future system users to try out the new system on their own.

Beta testing

The five phases of the system development life cycle include all the following, EXCEPT

Business Planning

9) According to the textbook, ________ is another, more common title given to the vice president of information systems.

CIO

7) ______________ occurs when extensive traffic is launched against a web server or other IT infrastructure components either inadvertently or maliciously in a way that shuts down the infrastructure component.

Denial of Service

Sources of security threats can be categorized in the following areas, EXCEPT

Denial of Service

25) Which of the following statements is true regarding inherent processes?

Each software product assumes that the software will be used by people filling particular roles and performing their actions in a certain way.

24) Malware protection safeguards include all of the following, EXCEPT

Encrypt stored data and communications

22) The disadvantages of outsourcing include the following, EXCEPT __________.

Financial risk increase

42) The challenges for planning and managing a project include the following, EXCEPT

Finding effective project planning and management tools

45) Which of the following statements is NOT true regarding IS planning?

IS priorities are established by the IT department

Organizations should respond to security threats in the following ways, EXCEPT

Implement firewalls and other safeguards so that company applications and data can only be accessed from company premises

48) How does the global economy change the competitive environment?

It has intensified rivalry by increasing product and vendor choices.

31) The following are human safeguards against security threats, EXCEPT

Physical security of servers storing company data, including locked, controlled access facilities

12) Which of the following statements is true regarding the system conversion alternatives?

Plunge installations are generally the riskiest, and should be avoided where possible

10) Differences between traditional SDLC projects and those using agile development methodologies include the following, EXCEPT:

SDLC projects are estimated in terms of points (relative difficulty of tasks); whereas Agile projects are estimated in terms of schedule and workday budgets

33) When a company outsources an entire application - including hardware, software and data - what is the type of outsourcing they are utilizing?

Saas

5) Which of the following statements is NOT true regarding international IS management?

Scope and requirements definition is easier for international information systems due to the fact that you can look at each international unit's needs separately

36) The most important task for users on systems development projects is _______________.

Taking responsibility for the requirements

44) Which of the following statements about the SCRUM process is NOT true?

Teams of up to 20 members are ideal for SCRUM

35) Encryption is an example of which type(s) of safeguards against security threats?.

Technical and Data Safeguards

4) Which of the following is true for the various groups in an IS department?

The development group manages the process of creating new information systems.

47) Which of the following statements is NOT true regarding the SCRUM estimation process?

The number of points a team can accomplish each SCRUM period is called its capacity

20) Which of the following statements is NOT true regarding the rights and responsibilities for users of IT department service in general and information systems in particular?

Users have a responsibility to make hardware modifications to their computer on their own to increase its performance

39) Which of the following statements is NOT true regarding the responsibilities of job positions in the IS industry?

at the very end of the project

8) A plan, known as the ________, of a project stipulates the tasks to be accomplished, the labor and other resources assigned to those tasks, and the schedule for completion.

baseline

49) Which of the following components of an information system is least impacted by internationalization?

computer hardware

26) The ________ is the sequence of activities that determine the earliest date by which the project can be completed.

critical path

41) The primary purpose of the requirements analysis phase is to ________.

determine and document the specific features and functions of the new system

15) The primary responsibilities of the IS Department include all the following, EXCEPT___________.

determine business strategies and how to achieve competitive advantage

Which of the following is a technical safeguard against security threats?

identification and authorization

23) During the ________ phase of the SDLC process, developers construct, test, and install the components of the information system.

implementation

11) Mark recently received an email from what appeared to be a legitimate company, asking him to update and verify his credit card details. Unknowingly, he obliged and later realized that the information had been misused. Mark is a victim of ________.

phishing

17) According to scrum essentials, the first step of each work period is to ________.

select requirements to consider

43) The ________ approach is the classical process used to develop information systems.

systems development life cycle (SDLC)

13) In the near future, billions of devices from everyday appliances to smartphones to automobiles will be connected online. This concept is commonly called

the internet of things

32) The bigger the system and the longer the project, ________.

the more the requirements change

30) Systems development projects require the balancing of three critical drivers: requirements, cost, and

time

18) One of the reasons for SDLC problems is the ___________ nature of the SDLC, which requires projects to operate in a sequence of non-repetitive phases despite the fact that often there is a need to repeat work in prior phases.

waterfall

14) Brook's Law related to the difficulty of the information systems development process says that

Adding more people to a late project makes the project later

6) Which of the following is NOT likely to be true in the future?

Less data will be available on the Internet about individuals

37) Which of the following is true regarding localizing?

Localization of computer programs should be planned from the very beginning.

28) Key components of a good security incident response plan include the following, EXCEPT _______________.

Make it simple enough so that practice is not necessary

3) Which of the following statements is NOT true regarding the impact of globalization on databases

Mirroring refers to the processing of a single database that resides in multiple locations

27) The advantages of outsourcing include the following, EXCEPT:

More control over resources

34) Which of the following future trends is MOST likely to occur?

More employees will need to be skilled in social media applications and business intelligence tools

19) Which of the following statements is NOT true regarding the impact of technology on business operations in the future?

More mobile devices using business applications will mean fewer security issues

Make it simple enough so that practice is not necessary

Organizations more often will purchase licenses to use software as part of their operations.


Conjuntos de estudio relacionados

Gero Exam 3 NCLEX 11,12,13,14,15,22

View Set

What are the disadvantages to classification?

View Set

Chapter 6 - Normal Probability Distributions

View Set

Chapter 4 Accounting for Merchandising Operations

View Set

Chapter 25: Mechanical Immobilization

View Set

Organophosphate Insecticides - Toxicology

View Set

Chapter 44: Osmoregulation and Excretion

View Set