MIS Exam 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

The term ________ is used to describe an extremely rare event that is difficult or nearly impossible to predict, but which can have an immense impact in areas such as technology, finance, andscience. A) Trojan horse B) black swan C) honeypot D) long tail

B) black swan

An early form of business process management (BPM) that was developed as a means to make sweeping changes to eliminate all processes that did not add value was known as ________. A) business process modeling B) business process reengineering C) business process mapping D) business process automation

B) business process reengineering

The ________ refers to a process organizations put into place to manage and prioritize requests to add new features to an information system. A) requirements analysis B) change control process C) conformity assessment D) calibration process

B) change control process

The term ________ refers to a common human tendency to make systematic mistakes when processing information or making judgments. A) error of omission B) cognitive bias C) negativity effect D) fuzzy-trace theory

B) cognitive bias

Info Labs Inc., a marketing communications company, launches a project at a fixed cost of $180,000. \ What is the amount of savings earned from the project per month if it returns the investment in 3years? A) $5,000 B) $9,000 C) $10,000 D) $7,000

A) $5,000

Which of the laws stipulates how financial institutions are required to protect the privacy of consumers' personal financial information and notify them of their privacy policies annually? A) the State Security Breach Notification Laws B) the Gramm-Leach-Bliley Act C) the Privacy Act of 1974 D) the CAN-SPAM Act

B) the Gramm-Leach-Bliley Act

A(n) ________ is an orderly listing of actual tasks that a project team must complete to produce the project's deliverables. A) mission statement C) business case B) work breakdown structure D) executive summary

B) work breakdown structure

________ refers to an approach in which organizations strongly prefer systems that are offered by a A) Unified procurement B) Ad-hoc procurementC) Best-of-breed procurement D) Green public procurement

A) Unified procurement

________ is a widely accepted ethical system that considers the greatest good for the greatest 87) number and considers the consequences of an action, weighing its positive effects against its harmful ones. A) Utilitarianism B) Structuralism C) Individualism D) Libertarianism

A) Utilitarianism

Which of the following is an example of a systems integrator? A) a consultant who ensures that the hardware and software components of an IS work together B) a manager who, through leadership, prepares the organization for change to become dynamic C) a consultant who ensures that employees are making the best use of information systems D) a manager who inspires employees to work together and provide resources the project team needs

A) a consultant who ensures that the hardware and software components of an IS work together

Which of the following best describes a project charter? A) a key document that authorizes a project B) an informal document that assesses the effectiveness of a project C) a document that tracks the progress of a project D) a document which lists the outcomes of a project

A) a key document that authorizes a project

Which of the following is an accurate definition of a project? A) a temporary activity to carry out a particular objective B) an undertaking with a general objective of improving an organization C) a recurring sequence of events that facilitate the creation of a service D) a series of events that continually replicate a product

A) a temporary activity to carry out a particular objective

The human tendency to choose information to examine and support a view they already hold and 177) ignore data that might refute their hypothesis is known as a(n) ________. A) confirmation bias B) choice-supportive bias C) optimism bias D) distinction bias

A) confirmation bias

Which of the following is the primary goal of the development phase of the systems development life cycle (SDLC)? A) converting a design into a fully operational information system B) translating the requirements definition document into a workable design C) analyzing and documenting what a system should do for a business D) calculating the return on investment for a business project

A) converting a design into a fully operational information system

The ________ refers to the longest course through the project, which identifies those tasks that cannot be delayed without affecting the finish date. A) critical path C) degree sequence B) long tail D) graph bandwidth

A) critical path

_______ refers to maintaining an organization's business operations to avoid a devastating revenue loss and damaged reputation A) Business incubation B) First-order resolution C) Business continuity D) Escalation of commitment

C) Business continuity

Which of the following is an example of the security requirements included in a requirements definition document (RDD)? A) response timeC) encryption B) user navigationD) screen attractiveness

C) encryption

A real estate developer in the New Jersey area purchases a large tract of land and plans to build an 178) apartment complex equipped with a golf course and other amenities. The developer is targeting the affluent software engineers from Manhattan who are looking for second homes. Halfway throughthe process of construction, recession hits the nation and many people lose their jobs. There are no takers for the apartments the developer is building, as homebuyers look for less expensive options. The developer, dismayed at the huge investment he has already made in the project, decides that it would be unwise to stop the project and plans to go ahead with it. The developer's reasoning is consistent with the idea of ________. A) progress trap B) buyer's remorseC) escalation of commitment D) post-purchase rationalization

C) escalation of commitment

A distinguishing feature of ________ is that developers work in pairs, reviewing one another's work, providing each other with feedback, and testing the code as it is written. A) metaprogramming B) incremental modeling C) extreme programming D) Scrum programming

C) extreme

Which of the following features is most likely an example of the usability requirements included in 41) a requirements definition document (RDD)? A) complex navigation B) high accessibility for people with disabilities C) high task efficiency D) bright, flashy graphics

C) high task efficiency

A(n) ________ bias refers to a belief that an actual event was predictable even if it was not. A) confirmation B) anchoring C) hindsight D) distinction

C) hindsight

Organizations use a(n) ________ to categorize a security threat, determine its cause, preserve any 217) evidence, and get systems back online so they can resume business. A) total quality management program B) vulnerability assessment scheme C) incidence response plan D) risk matrix

C) incidence response plan

Digital rights management (DRM) offers IP holders the benefit of ________. A) offering technological protection for their products B) preventing loss of critical organization data C) collaborating online to create open source products D) adding visual appeal to their digital products

A) offering technological protection for their products

Which of the following best describes legacy systems? A) old systems which are built on aging or obsolete architectures B) old systems that are no longer in use C) new systems which are unable to replace old systems D) new systems which are replicas of old regal systems

A) old systems which are built on aging or obsolete architectures

Which of the following disasters is most likely to cause massive absenteeism in organizations? A) pandemics B) unauthorized break-insC) denial of service attacks D) information leaks

A) pandemics

A disadvantage of a ________ is that the new system's modules may be tightly integrated, so implementing one without the others may create some confusion and require temporary interfacesto the old systems. A) phased implementation B) parallel implementation C) direct implementation D) pilot implementation

A) phased implementation

A ________ oversees all the projects going on throughout the organization and provides project 112) management training, software, and support. A) program management office B) document management office C) business process management office D) records management office

A) program management office

A ________ is an important part of the planning stage of the systems development life cycle (SDLC) 117) and examines whether an initiative is viable from technical, financial, and legal standpoints. A) Market share analysis B) Feasibility study C) Procurement analysis D) Brand assessment

B) Feasibility study

Which of the following tools helps keep a project on track to meet its deadlines by listing tasks on a 23) work breakdown schedule? A) Nolan chart B) Gantt chart C) PERT network chart D) Smith chart

B) Gantt char

An ________ bias refers to the tendency to judge the probability of an event based on how easily examples come to mind. A) overconfidence B) availability C) optimism D) anchoring

B) availability

How does a project charter help in managing a project? A) helps make the project management process more informal and fosters greater collaboration B) avoids unexpected surprises and leaves room for changes to meet organization's needs C) tracks the progress of the project and sets benchmarks for the project team to achieve D) defines project metrics clearly so there is no need to change the scope midway through a project

B) avoids unexpected surprises and leaves room for changes to meet organization's needs

Which of the following functions does a project charter perform? A) measuring the outcomes of the project B) assessing the progress of the project C) stating the reasoning behind initiating the project D) estimating start and end dates for the project

D) estimating start and end dates for the project

________ is a process which transforms data using mathematical formulas, so that no one can read the data unless they know the key to unscrambling it. A) Wear leveling B) Write amplification C) Decipherment D) Encryption

D) Encryption

The stage at which early phase managers identify the major players in the project, including the sponsor, the project manager, the team members, and other stakeholders, is known as the ________. A) monitoring process C) initiating process B) controlling process D) executing process

C) initiating process

Which of the following systems are used to combat spam? A) expert systems B) conversational programming systems C) intrusion prevention systems D) executive information systems

C) intrusion prevention systems

Which of the following technologies serves as a biometric identifier for physical security? A) credit cardC) iris configuration B) user ID-password combination D) RFID chip

C) iris configuration

Enforcing intellectual property laws becomes difficult when ________. A) it comprises tangible assets B) it is used for commercial purposes C) it is digitized D) the protection of intellectual property involves immovable assets

C) it is digitized

Which of the following methods is often used for phishing purposes? A) monitoring a user's keystrokes B) infecting computers with self-replicating programs that slow down the systems C) soliciting personal information through emails D) posting harmless videos on websites

C) soliciting personal information through emails

The term ________ refers to software that monitors a user's activity on a computer and on the Internet, often installed without the user's knowledge. A) browser B) black swan C) spyware D) honeypot

C) spyware

What is the step involved in risk management after vulnerabilities of an organization have been examined? A) finalization of broadly defined goals B) determination of the source of threats C) assessment of threats D) evaluation of controls that fill in security gaps

D) evaluation of controls that fill in security gaps

An agile method that focuses on frequent releases of workable software and short time boxes for 146) development is known as ________. A) incremental modeling B) prototype modeling C) Scrum programming D) extreme programming

D) extreme programming

The term ________ refers to configured computers with specific vulnerabilities so they can attract different varieties of malware in the wild, study their properties, and find out who started them. A) expert systems B) web crawlers C) server farms D) honeypots

D) honeypots

The stage at which a project is conceived is known as the ________ process. A) monitoring B) controlling C) planning D) initiating

D) initiating

Which of the following sets of processes is carried out first in project management? A) monitoring process B) executing process C) implementing process D) initiating process

D) initiating process

The ________ process lays the groundwork for the project by clarifying the value it will bring to the 78) organization, setting its objectives, and estimating the project's length, scope, and cost. A) controlling B) executing C) planning D) initiating

D) initiatingA ________ refers to the tendency to underestimate the time it will take to complete a task.

Lee works for Pink Net Worldwide Inc., an advertising company in California. Lee is developing 137) software to improve the process of coordination with clients. Which of the following requirements is he concentrating on if he is interfacing the clients' software with a few of the information systems that are currently functioning within the company? A) compliance requirements B) performance requirements C) usability requirements D) integration requirements

D) integration requirements

The ________ compresses the time horizon for software development and focuses on the time available until the next release while the development team determines how many of therequirements it can deliver in that time frame. A) V-model B) agileC) waterfall method D) iterative method

D) iterative method

In the ________ phase, project managers pay close attention to reports and dashboards that might show early warning signs that some tasks have fallen behind. A) initiating B) executing C) planning D) monitoring

D) monitoring

Which of the following is the best example of a project? A) updating software programs regularly B) performing weekly information system maintenance C) backing up organizational data periodically D) opening a new branch office

D) opening a new branch office

A ________ of an information system launches the new system while the old one is still running 198) and employees either do their jobs twice or two separate teams handle the same processes. A) pilot implementation B) phased implementation C) direct implementation D) parallel implementation

D) parallel implementation

What of the following is a drawback of cloud computing? A) Data protection laws are not uniform across countries. B) Resources are difficult to share because information is maintained on a protected server. C) It delivers computing as a product rather than a service. D) It provides computation that requires end-user knowledge of the physical location and configuration of the system that delivers services.

A) Data protection laws are not uniform across countries

________ refers to all the procedures, documentation, and resources an organization puts into place to prepare for a crisis situation and recover technical infrastructure. A) Disaster recovery B) Data warehouse C) Data repository D) Business automation

A) Disaster recovery

________ refers to an attack in which computers in a botnet are directed to flood a single website server with rapid-fire page requests, causing it to slow down or crash. A) Distributed denial of service B) Social engineering C) Keylogging D) Phishing

A) Distributed denial of service

________ in project management include all the coordinating efforts that ensure that tasks on the work breakdown structure are carried out properly. A) Executing processes C) Planning processes B) Designing processes D) Initiating processes

A) Executing processes

A ________ lists tasks on the work breakdown structure, along with each task's projected start and finish dates, in graphical format. A) Gantt chart B) conceptual graph C) cluster diagram D) PERT network chart

A) Gantt chart

Which of the following statements is true of a project charter? A) It shows that the senior management support the project. B) It is a document prepared to monitor the progress of the project. C) It documents the experiences and knowledge gained during the project. D) It generally includes the work breakdown structure.

A) It shows that the senior management support the project.

________ is the first step in the systems development life cycle (SDLC), which defines the business need for a project, assesses its importance to the company, and determines whether the project is feasible. A) Planning B) Development C) Maintenance D) Testing

A) Planning

________ is a process in which stakeholders identify the features that a project will need and then 203) prioritize them as mandatory, preferred, or nonessential. A) Requirements analysis B) Informative modeling C) Acceptance testing D) A Feasibility study

A) Requirements analysis

_______ is one way of recovering systems in an incidence response plan. A) Restoring from media known to be good B) Prosecuting the offender for a security risk C) Restricting system access D) Reevaluating the risk matrix

A) Restoring from media known to be good

________ is a driver of information systems development that touches on security, privacy, safety, 130) and regulatory compliance. A) Risk management B) Competitive advantage C) Customer relationship management D) Return on investment

A) Risk management

________ is an agile method for software development that relies on tightly knit, cohesive teams 111) that do sprints of 2 to 4 weeks each. A) Scrum B) V-modelingC) Extreme programming D) Spiral modeling

A) Scrum

Which of the following is true of black swan events? A) The invention of the personal computer is an example of a black swan. B) Their occurrences can be anticipated with simple prediction models. C) They are the most frequently occurring disruptions in information systems. D) The term is exclusively used to describe malicious attacks on information systems.

A) The invention of the personal computer is an example of a black swan.

A major advantage of a ________ is that people whose roles span modules do not have to switch back and forth between old and new modules. A) direct implementation B) parallel implementation C) phased implementation D) pilot implementation

A) direct implementation

Which of the following challenges is typically a feature of the closing phase of a project? A) documenting lessons learned B) creating a work breakdown structure C) implementing mitigation strategies D) motivating project stakeholders

A) documenting lessons learned

Which of the following authentication strategies is the most difficult to forge, crack, or copy and is 160) hence used for physical security? A) fingerprint scanner B) password C) RFID chip D) credit card

A) fingerprint scanner

Which of the following occurs during a phased implementation? A) focusing on launching modules in steps rather than all at once B) launching the new system while the old one is still running C) launching all the modules of the new system on a single go-live date D) focusing on different departmental groups at a time

A) focusing on launching modules in steps rather than all at once

Testing is a part of the ________ phase of the systems development life cycle (SDLC). A) implementation B) planningC) analysis D) development

A) implementation

User navigation and data display are examples of the ________ included in a requirements 99) definition document RDD. A) interface requirements B) integration requirements C) security requirements D) compliance requirements

A) interface requirements

Which of the following should be undertaken during the design phase of the systems development life cycle (SDLC)? A) keeping in mind end users with disabilities B) estimating a project's likely return on investment C) defining the business need for a project D) conducting risk analysis for a project

A) keeping in mind end users with disabilities

A company requires its employees to include a certain disclaimer in their emails that states that the company is not responsible if recipients of emails rely on the advice provided by the employees.What potential threat does such a disclaimer protect the company from? A) negligent misstatements B) employee misuseC) implied contractual obligations D) transmission of viruses

A) negligent misstatements

Independent testers are critical in testing information systems mainly because ________. A) programmers are inept at testing their own code B) programmers are generally too busy to test their codes C) federal law mandates third-party feedback before a system is approved by an organization D) most state laws mandate third-party feedback before a system is approved by an organization

A) programmers are inept at testing their own code

Which of the following administrative security controls is most likely to be adopted by a company which handles high-level sensitive information? A) prohibiting downloading data to USB drives B) restricting employee access to official mails C) prohibiting public access to the company's website D) prohibiting entry of employees into shared workspaces

A) prohibiting downloading data to USB drives

A drawback of online anonymity is that it ________. A) protects spammers and imposters B) protects whistleblowers and oppressive governments C) increases accountability of users D) increases inhibitions in online communication

A) protects spammers and imposters

Which of the following includes a high-level description of a system that an organization is on the lookout for? A) request for information B) request for quotation C) request for proposal D) request for tender

A) request for information

Mike, a research analyst, is in the analysis phase of a project, the goal of which is the development 195) of smile shutter technology in cameras. Mike first identifies and analyzes the integral elements thatneed to be included in the technology such as red eye removal, blink detection, and faceidentification and then prioritizes them as mandatory, preferred, or nonessential. Which of the following processes is being illustrated in the given scenario? A) requirements analysis B) competitive analysis C) probabilistic analysis D) amortized analysis

A) requirements analysis

A(n) ________ lists out and rates the vulnerabilities of an organization. A) risk matrix B) incidence response planC) public key encryption scheme D) social engineering plan

A) risk matrix

In Internet terminology, a worm refers to a(n) ________. A) self-replicating program that sends copies to other nodes on a computer network B) software program that attracts malicious attacks in order to study their properties and origins C) software tool used to inspect incoming and outgoing traffic to a computer network D) email program created not for communication but to lure spam

A) self-replicating program that sends copies to other nodes on a computer network

Which of the following is an example of intellectual property owned by an IT firm? A) software code B) legal documentsC) office stationery D) real estate

A) software code

Evelyn Birch is a freelance content writer whose desktop computer has been infected with a 182) software program that installed itself without her knowledge. The program monitors the websitesshe visits, her email communications, etc. Data gathered from the monitoring activity is sent to aremotely located hacker. Which of the following is most likely to have infected Evelyn's computer? A) spyware B) firewall C) black swan D) Web Crawler

A) spyware

Which of the following laws establishes requirements that govern how personally identifiable 29) information on individuals is collected, used, and disseminated by federal agencies? A) the Privacy Act of 1974 B) the CAN-SPAM Act C) the State Security Breach Notification Laws D) the Gramm-Leach-Bliley Act

A) the Privacy Act of 1974

Which of the following best defines a critical path in a project? A) the longest project path that identifies tasks that cannot be delayed without affecting the finish date B) the longest project path comprised of tasks that do not affect the finish date if they are delayed C) the shortest path undertaken in a monitoring process in which there is no fixed deadline D) the path obtained by adding the time required for tasks of the shortest duration

A) the longest project path that identifies tasks that cannot be delayed without affecting the finish date

Which of the following is a drawback of using a proxy server to ensure online anonymity? A) the need to rely on the promise of the company that operates the proxy to protect its customers' identities B) the lack of uniform and binding legislation across different countries that determines the legality of using proxy servers C) the parasitic and unauthorized use of hundreds of computer systems owned by individuals for masking online identity D) the inability to consistently ensure online anonymity, especially when government agencies are among the parties involved

A) the need to rely on the promise of the company that operates the proxy to protect its customers' identities

Which of the following is an element of privacy? A) the right to be left alone B) the right to view, correct, and edit private, protected information C) the right to demand information D) the right to withhold taxes

A) the right to be left alone

Which of the following best defines predecessors in a work breakdown structure? A) the tasks that need to be completed before a particular task can begin B) the tasks that are performed over a long period of time, side by side with new tasks C) the new tasks that are undertaken right after a long overdue task is completed D) the tasks that are undertaken as a continuation of older, incomplete tasks

A) the tasks that need to be completed before a particular task can begin

In which of the following project management areas is a Gantt chart most likely to be used? A) time management B) human resource managementC) scope assessment D) risk management

A) time management

Screen attractiveness is an example of the ________ included in a requirements definition document 226) (RDD). A) usability requirements B) security requirementsC) integration requirements D) compliance requirements

A) usability requirements

Under which of the following circumstances is information privacy most difficult to achieve? A) when information is stored on highly interconnected systems B) when information is maintained on isolated systems C) when information is converted to code form using mathematical equations D) when information is mainly on paper

A) when information is stored on highly interconnected systems

________ is a peer review process in which programmers familiar with the project and the development environment check over one another's work to ensure it is well documented and properly written. A) Adversarial review C) Single-blind review B) Code reviewD) Double-blind review

B) Code review

Which of the following is a drawback of digital rights management encountered by users today? A) DRM systems do not consistently manage the different formats of digital content. B) DRM systems prevent legitimate duplication of digital content in the event of hardware failure. C) DRM systems do not function efficiently across geographical borders. D) DRM systems often violate intellectual property rights of creators of IP.

B) DRM systems prevent legitimate duplication of digital content in the event of hardware failure.

________ refers to a system of moral principles that human beings use to judge right and wrong, and to develop rules of conduct. A) Religion B) Ethics C) Theology D) Creativity

B) Ethics

______ help(s) in determining the cause of a security threat in an incidence response plan. A) Taking systems offline B) Investigating system logsC) Reevaluating the risk matrix D) Restricting system access

B) Investigating system logs

Which of the following is an accurate definition of scareware? A) It is a type of software that prevents users from downloading malware by displaying warnings. B) It is a kind of social engineering used to persuade people that a computer is infected when it is not. C) It is a kind of anti-spam process which relies on the human desire to use malware. D) It is software which provides a shield against spam and mirrors it back into the network.

B) It is a kind of social engineering used to persuade people that a computer is infected when it is not.

Which of the following statements is true of encryption? A) It allows application of notification laws when an organization loses sensitive information. B) It is a powerful technical control that protects sensitive data. C) It increases the level of risk assessments when it is used for backup data. D) It helps recover encoded files through an image processor even if the user forgets the password.

B) It is a powerful technical control that protects sensitive data.

Why is it a challenging task to calculate a project's return on investment (ROI)? A) When project costs remain stable throughout the duration of the project, they become hard to keep track of. B) It is difficult to estimate ROI for projects where costs rise unexpectedly and revenue increases are hard to predict. C) It involves differentiating between the costs and savings, which are often hard to distinguish. D) Estimating ROI for projects that involve information systems involves specialized accounting knowledge

B) It is difficult to estimate ROI for projects where costs rise unexpectedly and revenue increases are hard to predict.

Which of the following is an advantage of online anonymity? A) It helps people participate in face-to-face meetings where they reveal personal details without fear of disclosure. B) It protects corporate whistleblowers and political activists in oppressive regimes. C) It helps in the prosecution of spammers, and other cyber criminals. D) It increases individuals' accountability and makes them feel responsible for their own actions.

B) It protects corporate whistleblowers and political activists in oppressive regimes.

Which of the following statements is true of information privacy? A) It emphasizes the importance of sharing data over protecting personally identifiable information. B) It refers to the protection of data about individuals. C) It is most easily achieved online and is impossible to maintain on paper. D) It is governed by laws that are universal in all countries

B) It refers to the protection of data about individuals.

Which of the following is a disadvantage of prepackaged software? A) It involves high costs and a long implementation time. B) It requires an organization to change its business processes. C) It does not work for applications that offer few competitive advantages. D) It does not employ an industry's best practices to handle the processes

B) It requires an organization to change its business processes.

Which of the following is a disadvantage of custom system development? A) It does not match an organization's requirements. B) It requires long periods of time before going live. C) It has no strategic value that can contribute to a company's competitive advantage. D) It requires employees to change their processes completely

B) It requires long periods of time before going live.

Which of the following statements is true of natural laws and rights? A) Natural laws and rights involve judging what action would create the greatest good for the greatest number of people. B) Natural laws and rights do not consider the actual consequences of an action when judging its morality. C) Natural laws and rights is a framework based on the central tenet that states, "The needs of the many outweigh the needs of the few." D) Natural laws and rights is an ethical framework that takes into account the effects of an action, weighing its good effects against its harmful ones.

B) Natural laws and rights do not consider the actual consequences of an action when judging its morality.

Which of the following precautions need to be taken in order to create a secure password? A) A single, memorable password should be used for all logins. B) Personal information should not be used in passwords. C) Passwords should rarely be changed. D) Consistently similar character types should be used.

B) Personal information should not be used in passwords.

________ refers to an attempt to steal passwords or other sensitive information by persuading the 206) victim to enter the information into a fraudulent website that masquerades as the authentic version. A) Egress filtering B) Phishing C) Keylogging D) Whitelisting

B) Phishing

is the art of manipulating people into breaking normal security procedures or divulging confidential information. A) Astroturfing B) Social engineering C) Password munging D) Shouldersurfing

B) Social engineering

Which of the following is a technical control that helps secure information flow in an organization? A) The information system enforces approved authorizations for access to the system. B) The information system enforces the organization's policy about human review. C) The information system defines the information to be encrypted or stored offline in a secure location. D) The information system automatically disables accounts after a time period defined by the organization.

B) The information system enforces the organization's policy about human review.

Which of the following administrative control actions helps enforce approved authorizations for access to systems in an organization? A) The organization separates duties of individuals as necessary to prevent malevolent activity without collusion. B) The organization defines the information to be encrypted or stored offline in a secure location. C) The organization requires appropriate approvals for requests to establish accounts. D) The organization defines the security policy that determines what events require human review.

B) The organization defines the information to be encrypted or stored offline in a secure location.

Which of the following is an advantage of a parallel implementation of an information system? A) The existing process is automatically switched off when new processes are running. B) There are two systems processing the same case, both of which should have the same output. C) The process is inexpensive and thus can be undertaken over a long period of time. D) The implementation makes each system process distinctly different cases.

B) There are two systems processing the same case, both of which should have the same output.

Which of the following statements is true of honeypots? A) They traverse available web links in an attempt to discover documents for indexing and retrieval. B) They have specific vulnerabilities that attract different varieties of malware in the wild. C) They are highly restrictive programs that permit communication only with approved entities and/or in an approved manner. D) They deny the entry or exit of specific IP addresses, products, Internet domains, and enforce other communication restrictions.

B) They have specific vulnerabilities that attract different varieties of malware in the wild.

Which of the following best defines agile methods? A) They involve developers who are resistant to changes in requirements. B) They involve characteristics of cohesiveness and trust .C) They stress agile teams undertaking sequenced tasks. D) They involve agile developers who are individually responsible for delivery.

B) They involve characteristics of cohesiveness and trust

_______ is a type of testing for information systems that involves programmers checking the 121) functionality of small modules of code during the development phase of the systems development life cycle (SDLC). A) Integration testing B) Unit testing C) Acceptance testing D) System testing

B) Unit testing

Which of the following is an accurate definition of a keylogger? A) a process which helps a user increase productivity by deleting spam emails before they reach him B) a monitoring software that records a user's keystrokes C) software that prevents fraudsters from hacking into email accounts D) a program that controls permissions for web traffic into and out of a computer network

B) a monitoring software that records a user's keystrokes

Which of the following best describes project portfolio management? A) a process that creates and visualizes projects from scratch B) a process that oversees all projects and selects which projects to pursue C) a process that tracks the progress of projects and adjusts their scope accordingly D) a process that integrates a company's project with a prospective external project

B) a process that oversees all projects and selects which projects to pursue

Which of the following is a critical success factor for projects? A) involvement and buy-in from a niche segment of end users B) a strategy to manage conflicts among stakeholders C) a design strategy that helps isolate existing and old legacy systems from new systems D) informal agreements with consultants and vendors to build trust

B) a strategy to manage conflicts among stakeholders

Service-oriented architecture is especially useful in ________ companies. A) slow-moving B) agile C) dying D) Static

B) agile

In the ________, tasks are not sequenced according to the systems development life cycle (SDLC) 44) and many activities occur simultaneously. A) waterfall method B) agile method C) V-model method D) iterated method

B) agile method

Which of the following is most likely to be a consequence of a security breach in an organization? A) electrical outages B) alteration of data C) massive absenteeism D) employee evacuations

B) alteration of data

A ________ is often the only logical implementation strategy for smaller systems. A) phased implementation B) direct implementation C) pilot implementation D) parallel implementation

B) direct implementation

A ________ switches off the old system and launches all the modules of the new one on a single, very hectic go-live date, sometimes called the "big bang." A) phased implementation B) direct implementation C) pilot implementation D) parallel implementation

B) direct implementation

What does the Family Educational Rights and Privacy Act (FERPA) stipulate? A) prohibiting educational institutes from sending misleading or deceptive commercial emails to prospective students B) establishing privacy rights over educational records C) protecting privacy rights of European students outside the continent D) permitting transfer of private data to third parties to contribute toward educational processes

B) establishing privacy rights over educational records

Which of the following do all types of information system tests mimic? A) problems the IT staff are likely to face while developing the system B) events the system is likely to handle when it goes live C) challenges advertisers are likely to face while promoting the system D) maintenance issues the users are likely to face while using the system

B) events the system is likely to handle when it goes live

Michael Hammer's business process reengineering was criticized because it ________. A) reiterated redesign as a major contributor to the failure of most business processes B) failed to realize that the human element is key to improving business processes C) emphasized the importance of processes that do not necessarily add value to business D) overemphasized the importance of people in business processes

B) failed to realize that the human element is key to improving business processes

A ________ is a technical control that inspects a network's incoming and outgoing traffic and either 179) blocks or permits it according to rules the organization establishes. A) botnet B) firewall C) Trojan horse D) keylogger

B) firewall

Designers use the unified modeling language (UML) to ________. A) design information systems using flashy graphics and multi-dimensional animations B) improve communication and clarity by using standardized graphics symbols and notations C) establish clarity in audio models of object-oriented and software-intensive systems D) test and repair implemented software systems and hence establish clarity in communication

B) improve communication and clarity by using standardized graphics symbols and notations

A(n) ________ is an initiating process where stakeholders meet one another, sometimes for the first and only time. A) pre-bid meeting B) kickoff meetingC) board meeting D) annual general meeting

B) kickoff meeting

Which of the following functions does a project-and issue-tracking software perform? A) enforcing checkout procedures to prevent developers from writing over another's files B) maintaining a complete history of project activity, including dates and tasks assigned C) comparing and analyzing a project with a competitor's project in the market D) allowing customers to estimate the sales of a product before its launch in the market

B) maintaining a complete history of project activity, including dates and tasks assigned

Components such as response time, availability, and scalability are examples of the ________ included in a requirements definition document (RDD). A) language requirements B) performance requirements C) security requirements D) accessibility requirements

B) performance requirements

Margaret O'Connor is an upcoming poet from Georgia who recently updated her blog with her piece of writing titled, "Shadows." One of her readers copied her piece onto his own blog andpassed it off as his original work. This is an example of ________. A) online identity theft B) plagiarism C) shadowing D) embezzlement

B) plagiarism

A ________ refers to the tendency to underestimate the time it will take to complete a task. A) regression fallacy B) planning fallacyC) deductive fallacy D) continuum fallacy

B) planning fallacy

An organization is using a unified procurement approach if it ________. A) sells systems to buyers from the same market B) prefers systems that are offered by a single vendor C) buys systems from different geographic markets D) creates the best systems with the latest technologies available

B) prefers systems that are offered by a single vendor

The major function of a process diagram is to trace ________. A) the maintenance cost of an initiative B) process operations from beginning to end clearly to all stakeholders C) the implementation cost of an initiative D) the errors that could possibly creep into the process during the analysis stage of the SDLC

B) process operations from beginning to end clearly to all stakeholders

Which of the following collects data from each project and aggregates it, building a larger picture of 211) the overall health of the organization's project portfolio? A) change management office B) program management office C) document management office D) records management office

B) program management office

The ________ offers customizable dashboards so that developers can see at a glance how a process 43) is coming along, what activities they need to complete in a day, and how they can keep abreast of all aspects of the process. A) keystroke logging software C) mind mapping software B) project- and issue-tracking software D) version control software

B) project- and issue-tracking software

Which of the following is a reason why humans are soft targets for social engineering? A) desire to be disconnected from others B) respect for authorityC) need for privacy D) need for anonymity

B) respect for authority

According to the incidence response plan, which of the following would be most useful in containing any damage caused by a security threat? A) investigate system logs for evidenceC) reevaluate risk matrix B) restrict system accessD) preserve evidence of damage done

B) restrict system access

Sam Torres, a security officer at a content management firm, is required to monitor the people coming in and going out of the organization and ensure data privacy through the process ofencryption. Which of the following types of requirements is Sam focusing on in the given scenario? A) usability requirements B) security requirements C) interface requirements D) language requirements

B) security requirements

Which of the following is a feature of a project's closing process? A) identifying deliverables and components needed to achieve success B) signing off by the sponsor that all deliverables have been accepted C) allocating work assignments and monitoring progress of the team D) negotiating contracts and conducting research to achieve results

B) signing off by the sponsor that all deliverables have been accepted

A general rule of thumb is that an organization should consider buying software rather than building it if the ________. A) software needs to fit enterprise architecture perfectly B) software can meet 75% to 80% of all business requirements C) existing software would require extensive customization D) organization needs to retain its business processes with only slight variations

B) software can meet 75% to 80% of all business requirements

Which of the following is a function of a requirements definition document (RDD)? A) emphasizing the impact that information systems have on business processes B) specifying the features that an information system should have C) estimating the maintenance cost of a business process D) conducting the S.W.O.T. analysis of the business' industry

B) specifying the features that an information system should have

Which of the following best describes service-oriented architecture (SOA)? A) systems with a single software component that handles all the service functions B) systems assembled from relatively independent software components C) systems created with mutually dependent software components D) systems with a single software component that handles one important service function

B) systems assembled from relatively independent software components

When does a computer become a zombie? A) when it is hidden behind a firewall C) when it enters a secure site B) when it is infected by malwareD) when it becomes immune to botnets

B) when it is infected by malware

Which of the following best describes a hindsight bias? A) the tendency to rely on one piece of information, however irrelevant B) the belief that an actual event was predictable even if it was not C) the tendency to claim more responsibility for successes than failures D) the tendency to choose information that supports our existing position

B) the belief that an actual event was predictable even if it was not

Which of the following is an accurate definition of multifactor authentication? A) the process of assessing authentication of reports and manuals to prevent duplication B) the process of combining two or more authentication strategies C) the process of assigning unique authentication information to copyrighted content in order to prevent resale D) the process of assessing authentication of multiple groups using a single strategy

B) the process of combining two or more authentication strategies

Which of the following best describes confirmation bias? A) the tendency of a person to overestimate how much other people agree with him or her B) the tendency to choose information that supports our existing position C) the tendency to view two options as more distinctive when evaluating them simultaneously than when evaluating them separately D) the tendency to claim more responsibility for successes than failures

B) the tendency to choose information that supports our existing position

Which of the following best defines escalation of commitment? A) the tendency of employees to increase productivity at work when provided with incentives B) the tendency to continue to invest in a project despite mounting evidence that it is not succeeding C) the tendency of employees to quit an organization when their needs are being disregarded D) the tendency to invest in a project when it offers increasing returns over a period of time

B) the tendency to continue to invest in a project despite mounting evidence that it is not succeeding

Which of the following best describes the term scope creep? A) the process through which a project's goals can be achieved much ahead of the deadline B) the way in which project features are added in an uncontrolled way C) a method of keeping track of a project's progress unobtrusively D) a method of assessing the resource requirements for a project

B) the way in which project features are added in an uncontrolled way

Which of the following is a reason why employers adopt surveillance technologies to track online communications? A) to facilitate faster communication B) to increase employee productivity C) to enable efficient data mining D) to prevent data redundancy

B) to increase employee productivity

Lora Jones is a security expert hired by a Manhattan-based law firm to perform a formal risk 233) assessment of the firm's data assets. Which of the following steps should she undertake first inorder to assess the firm's readiness to face any potential security breaches? A) evaluating controls and filling in security gaps B) understanding which information assets need protection C) predicting future risks and devising strategies to prevent them D) recovering existing assets from damage

B) understanding which information assets need protection

Which of the following technologies is most likely to be used by organizations as an authentication strategy? A) blood group recognition B) voice pattern recognitionC) optical mark recognition D) intelligent character recognition

B) voice pattern recognition

________ an information system is typically the best choice for a business when the available systems support common business functions, such as financial or human resource management. A) Selling B) Building C) Promoting D) Buying

B?

Which of the following best describes overconfidence bias? A) the tendency to choose information that supports our existing position and ignore conflicting evidence B) the tendency to judge the probability of an event based on how easily examples come to mind C) the act of having more faith in our own estimates than is realistically justified D) a tendency to overestimate the time it will take to complete a task

C or B?

Which of the following laws prohibits businesses from sending misleading or deceptive 18) commercial emails, but denies recipients any legal recourse on their own? A) State Security Breach Notification Law B) European Union's Data Protection Directive C) CAN-SPAM Act D) Gramm-Leach-Bliley Ac

C) CAN-SPAM Act

_______ is a structured approach that the transition employees must make as they switch from their existing work processes to new ones. A) Total quality management B) Project portfolio management C) Change management D) Knowledge management

C) Change management

Which of the following is an advantage of customizing a packaged solution? A) Vendors find it easier to upgrade customized systems than to upgrade noncustomized systems. B) Vendors will be responsible for any bugs that may arise due to customization. C) Customization adds competitive advantage to processes that an organization cannot alter. D) There is very little scope for errors, especially in large systems, due to integrated modules.

C) Customization adds competitive advantage to processes that an organization cannot alter.

Which of the following principles is consistent with the utilitarian ethical framework? A) Liberté, égalité, fraternité B) Protect free speech C) First, do no harm D) Thou shalt not kill

C) First, do no harm

________ consists of intangible assets which are expressions of the human mind that give the 39) creator of the property the right to its commercial value. A) Immovable property B) Freehold property C) Intellectual property D) Public property

C) Intellectual property

Which of the following functions does a firewall perform? A) It ensures security by using multiple authentication strategies for employees. B) It encodes sensitive data to ensure safe transmission across unsecured networks. C) It defines which IP addresses or domain names should be blocked. D) It attracts malicious attacks to study their properties and origins.

C) It defines which IP addresses or domain names should be blocked.

Which of the following is true of the European Union's Data Protection Directive? A) It requires fraudulent companies working for the European Union to maintain a do-not-spam list. B) The law is less restrictive than U.S. laws. C) It establishes privacy as a fundamental human right for EU citizens. D) It prohibits businesses from sending misleading or deceptive commercial emails, but denies recipients any legal recourse on their own.

C) It establishes privacy as a fundamental human right for EU citizens.

Which of the following is an accurate description of the Privacy Act of 1974? A) It stipulates how financial institutions are required to protect the privacy of consumers' personal financial information and notify them of their privacy policies annually. B) It requires organizations to notify state residents if sensitive data are released. C) It establishes requirements that govern how personally identifiable information on individuals is collected, used, and disseminated by federal agencies. D) It prohibits businesses from sending misleading or deceptive commercial emails but denies recipients any legal recourse on their own.

C) It establishes requirements that govern how personally identifiable information on individuals is collected, used, and disseminated by federal agencies.

Which of the following is an advantage of custom system development? A) It has low overall costs and is inexpensive to run. B) It does not require in-house maintenance and upgrades. C) It is tailored closely to an organization's needs. D) It requires less time to go live.

C) It is tailored closely to an organization's needs.

Which of the following is a drawback of the waterfall method? A) Several activities occur at the same time, which makes it hard to monitor them. B) Its SDLC tasks occur in a nonsequential manner. C) It is unable to adapt to changes in the business landscape. D) Once a task is completed, it cannot be changed.

C) It is unable to adapt to changes in the business landscape.

Which of the following is an advantage of prepackaged software? A) It has high overall costs. B) It includes new features that a company requires. C) It requires a short implementation time. D) It is always well-fitted to enterprise architecture.

C) It requires a short implementation time.

Which of the following is a disadvantage of using consulting services? A) It tends to make employees get too involved in the development tasks. B) It gives an organization access to people who do not know the software well. C) It tends to make employees feel less ownership of a project and less committed to changes. D) It tends to assign a large number of people to a project in addition to the consultants.

C) It tends to make employees feel less ownership of a project and less committed to changes.

_______ track progress from start to finish, pinpointing any deviations from the plan. A) Executing and coordinating processes B) Initiating processesC) Monitoring and controlling processes D) Planning processes

C) Monitoring and controlling processes

________ refers to the creation of software prototypes that can be shared with users for receiving 200) feedback, so that developers can make improvements before a lot of effort is spent building a fully functioning version. A) Social engineering B) Incremental development C) Rapid application development D) Agile software development

C) Rapid application development

A ________ is a gateway service that permits users to log in once, with one specific user ID and 174) password, to gain access to multiple software applications. A) Pre-shared key B) Canonical account C) Single sign-on D) Shadow password

C) Single sign-on

________ are used to monitor email, web surfing, and other online communications in organizations A) Trojan horses B) Proxy servers C) Surveillance technologies D) Subnetworks

C) Surveillance technologies

Which of the following statements is true about acceptable-use policies? A) Policies are restricted to the organization's resources and do not concern personally-owned devices. B) Penalties for violating a policy are decided by the organization, and will not be a legal issue. C) The surveillance and monitoring processes that are in place are also included in the policy. D) Employees agree to the policy after accessing the organization's IT resources.

C) The surveillance and monitoring processes that are in place are also included in the policy.

The term ________ refers to a seemingly harmless or useful program that installs malicious code allowing remote access to a computer, as for a botnet. A) black swan B) firewall C) Trojan horse D) honeypot

C) Trojan horse

Which of the following disclaimers would protect a firm from implied contract obligations in the 85) event of an employee's email containing wording that implies a firm contract? A) a disclaimer warning recipients that they are responsible for checking the message for malicious content B) a disclaimer that includes wording that the message is intended only for the addressee C) a disclaimer stating that any contract must be confirmed by the employee's manager D) a disclaimer warning recipients against disclosing information contained in the email

C) a disclaimer stating that any contract must be confirmed by the employee's manager

The ________ encompasses services each employee will be provided, whether and how much they 77) can utilize company resources for personal use, the kinds of surveillance that are in place, and reinforce legal requirements, such as prohibitions against unauthorized copying. A) project charter B) executive summary C) acceptable-use policy D) project proposal

C) acceptable-use policy

The ________ lays out rules about what employees are allowed to do with IT resources and what 180) activities are disallowed. A) project charter B) project proposalC) acceptable-use policy D) executive summary

C) acceptable-use policy

The type of testing that involves end users performing final testing to determine whether a project 116) is complete as specified is known as ________. A) parallel testing B) unit testing C) acceptance testing D) stress testing

C) acceptance testing

Which of the following best defines change management? A) an approach that familiarizes new employees in an organization with work processes B) an approach to streamlining work processes to maintain universal codes C) an approach to the transition employees make as they switch from existing work to new processes D) an approach to project management that ensures that project stakeholders do not deviate from the defined project objectives

C) an approach to the transition employees make as they switch from existing work to new processes

The ________ phase of the waterfall method involves nailing down requirements, at which point the developers estimate the time and resources needed to complete a project. A) development B) testingC) analysis D) implementation

C) analysis

An incidence response plan is created for the purpose of ________. A) improving communication modes B) managing discussion forums efficiently C) avoiding chaos and missteps D) responding to customers' feedback

C) avoiding chaos and missteps

The term ________ refers to a collection of computers that have been compromised by malware, 107) often through some vulnerability in their software or operating system. A) Trojan horse B) honeypot C) botnet D) black swan

C) botnet

For which of the following purposes are botnets most likely to be used? A) attracting different types of malware to track their origins B) tracking and eliminating computer worms and viruses C) capturing Internet users' sensitive information D) encrypting critical information to protect it from loss or corruption

C) capturing Internet users' sensitive information

The ________ phase ideally involves wrapping up a project in an orderly way and a sponsor 119) signing off that all deliverables have been received and accepted. A) planning B) executing C) closing D) implementing

C) closing

The ________ phase in a project involves documenting lessons learned from the project, so that the 197) experience is useful to other project teams and adds to the organization's knowledge base. A) planning B) initiating C) closing D) executing

C) closing

One way to identify a threat in an incident response plan is to ________. A) preserve evidence of security breach B) improve system efficiency C) communicate with a crisis management team D) prosecute the offender for security risk

C) communicate with a crisis management team

Johanna Taylor, a creative developer at Leo Technologies Inc., is developing a website for the company. To address the usability needs of website visitors, she ensures that visitors would be ableto easily locate what they need on the website. She avoids flashy graphics and chooses a font withhigh readability. Joanna is most likely in the ________ stage of the SDLP. A) testing B) implementation C) design D) maintenance

C) design

Joshua Lee, an engineer at Footprints Inc., is provided with a design by the creative team in his company for creating a software that would help travel agents answer and track traveler requests efficiently. He is now converting the design into an operational information system. Which of the following phases of the SDLC is the software currently in? A) implementation phase C) development phase B) planning phase D) analysis phase

C) development phase

Halcyon, an e-publisher, has recently decided to use an information system that administers the 245) way its customers access its online publications. The system assigns each customer with a uniqueID, maintains records of the books purchased by them, encrypts electronic documents fortransmission, and includes options to order hard copies of the electronic documents they read online. Which of the following refers to the set of technologies used in this case? A) online identity management (OIM) B) Internet resource management (IRM) C) digital rights management (DRM) D) inventory management (IM)

C) digital rights management (DRM)

Which of the following will take place in a parallel implementation of an information system? A) launching two similar systems with different outputs at the same time B) switching off the old system when new processes are running C) launching the new system while the old one is still running D) launching modules of the new system in phases rather than all at once

C) launching the new system while the old one is still running

Which of the following is potentially a negative impact of surveillance in online communications? A) compromised company security B) increased pressure on corporate email systems C) lowered productivity of employees D) increased levels of confidentiality

C) lowered productivity of employees

Botnets function with the use of ________. A) firmware C) malware B) middleware D) application software

C) malware

Which of the following is a type of testing for information systems where developers use the same input and compare the new system's output to the output generated by the system it is replacing? A) unit testing B) stress testingC) parallel testing D) acceptance testing

C) parallel testing

Janet received an email that contained a link to a website that imitated the authentic website of her 94) bank. The email requested her to key in her credit card number, her Social Security number, andher date of birth. She later found that her credit card was fraudulently charged for transactions shenever made. It is inferred from this case that Janet is a victim of ________. A) distributed denial of service B) keylogging C) phishing D) cache poisoning

C) phishing

The ________ process in project management focuses on devising how the project will be executed. A) monitoring B) closing C) planning D) controlling

C) planning

Which of the following activities should project managers spend more time on? A) delegating very few tasks to subordinates B) focusing on project execution C) planning and team building D) communicating with shareholders

C) planning and team building

The term ________ refers to a task in the work breakdown structure that needs to be completed before a particular task can begin. A) successor B) subtask C) predecessor D) subroutine

C) predecessor

A ________ is a series of events designed to deliver a product or service that is recurring in nature A) milestone B) task C) process D) project

C) process

A ________ is a document that authorizes a project and includes a clear statement of objectives, 164) estimated start and end dates, the names of the relevant people and their roles, a tentative budget, criteria for success, and other pertinent information. A) business caseC) project charter B) project proposal D) burn down chart

C) project charter

A kick-off meeting involves ________. A) project stakeholders meeting before the executing process is started B) the project team convening together to submit a proposal for a project C) project stakeholders meeting one another to review the project charter D) the project manager assessing the outcomes of the project and measuring its effectiveness

C) project stakeholders meeting one another to review the project charter

A ________ is an intermediary server that receives and analyzes requests from clients and then 115) directs them to their destinations. A) firewall B) captive portal C) proxy D) keylogger

C) proxy

Which of the following authentication strategies is the easiest to compromise or crack? A) iris configuration B) fingerprint analysisC) reliance on user knowledge D) voice pattern recognition

C) reliance on user knowledge

A ________ is a request sent to software vendors describing a new system that an organization 154) requires in broad, high-level terms, to which interested vendors can respond by describing theproducts and services that could fit the requirement. A) request for quotation B) request for proposal C) request for information D) request for tender

C) request for information

The term ________ refers to the way in which features are added in an uncontrolled way, often without considering the impact on the budget or timeline. A) cone of uncertainty B) risk appetiteC) scope creep D) conceptual fusion

C) scope creep

A(n) ________ is a document that clarifies which features are included in a project. A) executive summary B) business case C) scope statement D) mission statement

C) scope statement

Which of the following provisions does the Gramm-Leach-Bliley Act make? A) establishing provisions to protect the privacy and security of individually identifiable health information B) prohibiting businesses from sending misleading or deceptive commercial emails but denying recipients any legal recourse on their own C) stipulating how financial institutions are required to protect the privacy of consumers' financial information and notify them of their privacy policies D) limiting the disclosure of personally identifiable information that is maintained by state departments of motor vehicles

C) stipulating how financial institutions are required to protect the privacy of consumers' financial information and notify them of their privacy policies

Which of the following is involved in the integration testing process for information systems? A) determining whether a project is complete as specified by the end user B) conducting tests to assess how well a system performs under peak loads C) testing a new system's interfaces with other software components it links to D) checking the functionality of small modules of code during the development phase

C) testing a new system's interfaces with other software components it links to

One of the critical factors that contribute to the failure of projects is ________. A) the limited scope of the project B) the low requirement for customization C) the lack of executive support for the project D) the high stakeholder involvement in the project

C) the lack of executive support for the project

Which of the following best describes an availability bias? A) the tendency of people to do or believe things because many others hold the same views B) the tendency to draw different conclusions from a wide range of information C) the tendency to judge the probability of an event based on how easily examples come to mind D) the tendency of people to have a stronger preference for immediate gains rather than long term effects

C) the tendency to judge the probability of an event based on how easily examples come to mind

Which of the following best describes an anchoring bias? A) the tendency to draw different conclusions from a wide range of information B) the tendency to underestimate the time it will take to complete a task C) the tendency to rely on one specific piece of information, irrespective of its irrelevance D) the tendency to judge the probability of an event based on how easily examples come to mind

C) the tendency to rely on one specific piece of information, irrespective of its irrelevance

Which of the following is the most critical factor that contributes to failure of projects? A) high stakeholder involvement B) low customization C) unrealistic time frames D) limited scope

C) unrealistic time frames

The ________ involves the sequential occurring of systems development life cycle tasks, with one activity starting only after the previous one has been completed. A) Gauss-Seidel method B) agile methodC) waterfall method D) iterative method

C) waterfall method

Which of the following is an accurate definition of "black swans"? A) malicious software programs with the potential to disable enormous networks B) stages along the project management process at which regular progress checks are made C) events that occur very rarely and are difficult or nearly impossible to predict D) software programs that are designed to attract malicious attacks to study their properties

C?

Which of the following is true of the triple constraint in projects? A) The three fundamental project constraints are insulated from each other. B) Cost constraints take precedence over time and scope constraints in all projects. C) The time constraint is the most critical of the three constraints in projects. D) Changes in one fundamental constraint affect the other constraints as well.

D) Changes in one fundamental constraint affect the other constraints as well.

__ makes it more difficult for a hacker to break into passwords. A) Maintaining a single, secure password for all accounts B) Creating easy to remember passwords C) Reusing the same password in news and games sites through multiple systems D) Creating passwords with symbols, mixed cases, and characters

D) Creating passwords with symbols, mixed cases, and characters

Which of the following is true about work breakdown structure? A) Work breakdown structures are used only to plan and list the tasks a team must complete. B) It is generally created during the executing process of a project. C) A word processor is the best software package to create work breakdown structures. D) Gantt charts are generally used to show work breakdown structures.

D) Gantt charts are generally used to show work breakdown structures.

Which of the following reasons explains why waterfall methods are still widely in use? A) It is cheap and takes very little time to rework a project using this method. B) It does not handle any changes in a project C) Its goals are more focused than those of agile and iterative methods. D) It has a logical and familiar structure which is comfortable to use.

D) It has a logical and familiar structure which is comfortable to use.

Which of the following is an accurate definition of a computer virus? A) It is a software program that inspects incoming or outgoing traffic to a computer network. B) It is a software program that attracts potentially malicious attacks to study their origin. C) It is a software program that masks the browsing history and preferences of Internet users. D) It is a software program that can damage files or other programs.

D) It is a software program that can damage files or other programs.

Which of the following is true of phishing? A) It is useful in monitoring the web traffic into and out of an unsecured computer network. B) It uses small pieces of code inserted into a browser that track an Internet user's activity and transmit the data to third parties. C) It involves the use of several thousand computers to launch malicious attacks that can cripple websites. D) It is the process of stealing personal data from a victim by convincing him to disclose information.

D) It is the process of stealing personal data from a victim by convincing him to disclose information.

Which of the following is an accurate definition of digital rights management? A) It establishes privacy rights over educational records. B) It deals with provisions that protect the privacy and security of individually identifiable health information. C) It prohibits businesses from sending misleading or deceptive commercial emails, but denies recipients any legal digital recourse on their own. D) It refers to technologies that intellectual property owners use to control access to their digital content.

D) It refers to technologies that intellectual property owners use to control access to their digital content.

_______ is an ethical framework that judges the morality of an action based on how well it adheres to broadly accepted rules, regardless of the action's actual consequences. A) Rationalism B) UtilitarianismC) Legal positivism D) Natural laws and rights

D) Natural laws and rights

________ is a type of intellectual property theft that involves reproducing the words of another and passing them off as one's own original work, without crediting the source. A) Incitement B) Embezzlement C) Shadowing D) Plagiarism

D) Plagiarism

_______ is a continuous process that oversees all the projects for an organization, selecting which 196) projects to pursue and culling those projects that have a poor prognosis. A) Total quality management B) Business process outsourcing C) Change management D) Project portfolio management

D) Project portfolio management

Which of the following is a difference between projects and processes? A) Projects need to be tweaked so that the underlying activities are streamlined, whereas processes involve uncertainty. B) Project durations can be predicted easily, whereas process durations are difficult to predict. C) Projects are permanent in nature, whereas processes are temporary. D) Projects are unique and one of a kind, whereas processes are recurring.

D) Projects are unique and one of a kind, whereas processes are recurring.

Which of the following is true of public key encryption? A) The encryption formulas used for creating the keys are simple in nature and identical at both ends. B) The public key encryption scheme uses a single key to encrypt data that can later be decrypted by using the encrypted data as the key. C) The private key is used for encryption and is known only to the sender, while the public key is freely distributed among everyone and is used for decryption. D) The encryption key is widely shared with everyone, while the decryption key is known only to the recipient.

D) The encryption key is widely shared with everyone, while the decryption key is known only to the recipient.

Which of the following is a disadvantage of a parallel implementation of an information system? A) The process switches off the old system when two new processes are running. B) The process cannot provide the same result that is produced by the existing system. C) The process can run only old systems as it does not have the setup to operate on new systems. D) The process is expensive in nature and is usually in place for only a short period.

D) The process is expensive in nature and is usually in place for only a short period.

Which of the following is a provision of the State Security Breach Notification Laws? A) They include provisions to protect the privacy and security of individually identifiable health information. B) They require companies to provide "opt out" choices before transferring personal data to third parties. C) They prohibit businesses from sending misleading or deceptive commercial emails to representatives of the state. D) They require organizations to inform state residents if sensitive data are released.

D) They require organizations to inform state residents if sensitive data are released.

Which of the following principles is consistent with the natural laws and rights ethical framework? A) First, do no harm B) The greatest good for the greatest number C) The needs of the many outweigh the needs of the few D) Thou shalt not kill

D) Thou shalt not kill

Which of the following is an example of an executing process? A) identifying deliverables B) defining milestones and goals C) fixing project schedules D) allocating work assignments

D) allocating work assignments

Which of the following functions does the version control software perform? A) allowing developers to write over one another's files to efficiently integrate data B) allowing developers to track different versions of news feeds once they are put on networks C) allowing developers to interact with different versions of a system simultaneously D) allowing developers to track versions of the source code during development

D) allowing developers to track versions of the source code during development

The term ________ refers to the tendency for people to rely too heavily on one piece of information to adjust their estimates, even if it is irrelevant. A) availability bias B) predecessors C) confirmation bias D) anchoring

D) anchoring

The ________ procures the finest systems for each application, regardless of the vendor. A) ad-hoc approach B) integrated approach C) unified approach D) best-of-breed approach

D) best-of-breed approach

Which among the following is the hardest task for an organization's program management office? A) resolving conflicts between project managers B) providing project management training C) offering software and support to different projects D) collecting consistent data from projects

D) collecting consistent data from projects

A use case diagram is used to indicate how ________. A) users can switch from one operating system to another B) direct implementation is carried out in companies C) database tables are interconnected with one another D) different types of users will interact with a system

D) different types of users will interact with a system

Which of the following should a project manager ideally do to efficiently manage a project? A) avoid making unpopular decisions that might dismay the clients B) commit to delivering features that stakeholders are expecting even if timelines are narrow C) allow end-users to learn from their mistakes instead of hand-holding after launch D) communicate the time, cost, and scope constraints clearly as the project unfolds

D) communicate the time, cost, and scope constraints clearly as the project unfolds

The term ________ refers to products, documents, or services that will be handed over to the sponsor during the course of the project. A) standards B) benchmarks C) resources D) deliverables

D) deliverables

The ________ phase is a technical blueprint for a whole system which captures all aspects of how the system's components will function together to accomplish goals, using descriptions, diagrams and models. A) maintenance B) implementation C) testing D) designThe

D) design

The tendency to continue investing in a project, despite mounting evidence that it is not succeeding, often comes about because people mistakenly let sunk costs affect decision making rather than weighing the value of further investment. This tendency is known as ________. A) zero-sum game B) progress trapC) zero-profit condition D) escalation of commitment

D) escalation of commitment

Escapade Inc., a travel agency in Sydney, is using a highly expensive implementation process for a 13) short period of time. It launches the new system while the old one is still running and employeeshave to do their jobs twice, once on each system. Which of the following is the company using? A) pilot implementation B) direct implementation C) phased implementation D) parallel implementation

D) parallel implementation

Jonathan has joined a new software company in Manhattan and has been assigned the task of 153) developing an internal communications system. He begins the task by assessing how the systemwill help in efficiently coordinating the projects that the company handles and in determining the feasibility of the system. In the given scenario, Jonathan is in the ________ step of the systems development life cycle (SDLC). A) maintenance B) testing C) design D) planning

D) planning

Black swan events ________. A) occur frequently in the information technology field B) are usually easy to predict C) have minimal impact in areas such as technology, finance, and science D) pose difficult challenges for strategic planners

D) pose difficult challenges for strategic planners?

An organization is using the best-of-breed approach if it ________. A) procures whatever systems are offered by the best vendors in the market B) creates the best systems with the latest technologies available C) outsources the implementation to the best implementation partners in the market D) procures the best systems, regardless of the vendor

D) procures the best systems, regardless of the vendor

Which of the following best describes deliverables in a project? A) guidelines that a manager formulates for a team to follow B) resources needed for smooth execution of a project C) standards expected by a client from the project team D) products, documents, or services that will be handed over to the sponsor

D) products, documents, or services that will be handed over to the sponsor

A ________ is a temporary activity that is launched for a specific purpose, to carry out a particular objective. A) milestone B) process C) system D) project

D) project

Which of the following is a characteristic of a process? A) elements of uncertainty C) temporary endeavor B) a specific, unique purpose D) recurring in nature

D) recurring in nature

A single sign-on is implemented by organizations for the purpose of ________. A) ensuring that unique passwords are used to securely access single software applications any number of times B) defining which IP addresses and domain names can be accessed from an organization's computers C) helping a user sign on through the process of fingerprint identification D) reducing the cognitive load associated with multiple passwords

D) reducing the cognitive load associated with multiple passwords

A ________ is an invitation to software companies to submit a formal bid, including a detailed 50) description of their products, services, and costs. A) request for quotation B) request for tender C) request for application D) request for proposal

D) request for proposal

Which of the following is an accurate definition of malware? A) software used to track and prevent malicious attacks on systems B) software used to test a hardware or software package C) software for end-user applications such as word processors and ERP software D) software designed to attack computer systems

D) software designed to attack computer systems

Which of the following types of testing for information systems is conducted to assess how well a 144) system performs under peak loads? A) parallel testing B) system testing C) unit testing D) stress testing

D) stress testing

Which of the following types of testing involves both end users and IT staff testing the functionality 149) of an entire IS? A) unit testingC) parallel testing B) acceptance testing D) system testing

D) system testing

Which of the following best describes a planning fallacy? A) the tendency to rely on one piece of information, however irrelevant B) the tendency to choose information supporting our existing position and ignore conflicting evidence C) the tendency to believe that an actual event was predictable even if it was not D) the tendency to underestimate the time it will take to complete a task

D) the tendency to underestimate the time it will take to complete a task

What is the first step involved in risk management? A) evaluating controls and filling in security gaps B) recovering the system from damage C) determining the cause of damage D) understanding what information assets need protection

D) understanding what information assets need protection

Tom Daniels, an employee of a telecommunications company, is developing software that would 143) enable customers to activate value-added services in a matter of seconds. Which of the following requirements is Tom developing if he is working to improve the visual appeal of the interface andto enhance the ease of learning the software A) security requirements B) integration requirements C) compliance requirements D) usability requirements

D) usability requirements

A ________ is a self-replicating program that sends copies to other nodes on a computer network 40) and may contain malicious code intended to cause damage. A) cookie B) Trojan horse C) honeypot D) worm

D) worm


Conjuntos de estudio relacionados

Computer Information Systems - Exam 3

View Set

SOC 265- Mamma Might Be Better off Dead

View Set

Chapter 25-Estate and Gift taxes

View Set

Chapter 36: Drugs Affecting the Upper Gastrointestinal Tract

View Set

AP Biology: Photosynthesis, Chapter 5 - The Calvin Cycle

View Set