Quiz 5
In which of the following phases should you expect to be most involved as a general or functional manager? Select one: a. Definition b. Build c. Implementation d. A and B e. A and C
A and C
Which of the following is not one of the advantages related to making your own systems? Select one: a. Unique Tailoring b. Flexibility c. Control d. Faster Roll-Out e. All of these are advantages
Faster Roll-Out
Which stage of the SDLS typically results in a "go" or "no-go" decision? Select one: a. Feasibility Analysis b. Systems Analysis c. System Design d. Programming e. Testing
Feasibility Analysis
When a company is faced with a security threat, they have which three strategies available to them? Select one: a. Acceptance, avoidance, and transference b. Acceptance, reduction, and transference c. Avoidance, reduction, and transference d. Acceptance, avoidance, and reduction e. All of the above
Acceptance, reduction, and transference
The IS department workers that experts in both technology and the business processes are called what? Select one: a. Programmers b. Analysts c. Functional Managers d. Help Desk Personnel e. Technicians.
Analysts
Which of the following is an example of an internal threat? Select one: a. Viruses b. Intrusions c. Social Engineering d. Backdoors e. Angry Employees
Angry Employees
Which of the following terms is related to the ability to overlay information on top of a photograph? Select one: a. Location Based Social Networking b. Augmented Reality c. Green IS d. Online Analytical Processing (OLAP) e. Digital Data Genesis
Augmented Reality
Which of the following refers to code built into a program to allow the programmer a way to bypass password protection? Select one: a. Password Spoofing b. Bugs c. Viruses d. Phishing e. Backdoors
Backdoors
Which of the following are considered general classes of activities organizations adopt to exploit? Select one: a. Process-to-analyze b. Process-to-actuate c. Assimilate-to-analyze d. Both A and B e. Both B and C
Both B and C
Free software is always open source. Select one: True False
False
Function Creep, when used in terms of privacy risks, refers to new technological advances and devices that generate more data than ever.
False
Green IS initiatives are costly and hamper the firm's quest for profits and growth. Select one: True False
False
Malicious cyberactivity is decreasing due to improvements in software protection systems. Select one: True
False
Which of the following is not considered a basic elements describing an event? Select one: a. Who b. What c. When d. Where e. How much
How much
Why is security considered a negative deliverable? Select one: a. It costs money b. It produces only tangible benefits c. It does not affect profits whether it is done well or poorly d. It is largely ignored e. It produces no revenue or efficiency
It produces no revenue or efficiency
Which of the following terms relates to the ability to complete commercial transactions using mobile devices, such as smartphones and tablets? Select one: a. Machine commerce b. Context Aware commerce c. Portable commerce d. Ubiquitous commerce e. Mobile commerce
Mobile commerce
Which of the following are not approaches to acquisition of information processing functionalities? Select one: a. Custom Design b. Custom Development c. System Selection and Acquisition d. End-user Development e. Open Source Development
Open Source Development
A bank upgrades the computer systems of its branches, one branch at a time. This is most likely which of the following migration strategies? Select one: a. Parallel b. Direct c. Phased d. Pilot e. Traditional
Phased
Which of the following is an automated method of seeking passwords? Select one: a. Phishing b. Social Engineering c. Software bugs d. Backdoors e. Careless behavior
Phishing
A bank upgrades a computer system at one of its branches. If this works correctly, then the upgraded system will be installed at the other branches. Which migration approach is this most likely related to? Select one: a. Parallel b. Direct c. Phased d. Pilot e. Traditional
Pilot
Risk Audit provides the basis for: Select one: a. Risk Reduction b. Risk Transference c. Risk Analysis d. Reward Mechanism e. Risk increase
Risk Analysis
Why is the Systems development Life Cycle methodology typically referred to as "the waterfall model"? Select one: a. Because it was first popularized in a town with many waterfalls b. To stress the fact that phases are sequential and iteration (or going back) should be c. Because the SDLC, like prototyping, is not iterative. d. To convey the notion that getting good user requirements is important and there should be multiple opportunities to elicit user requirements e. B and D
To stress the fact that phases are sequential and iteration (or going back) should be
Which of the following terms relates to being able to use your device anywhere, at any time? Select one: a. Identifiability b. Context Awareness c. Portability d. Ubiquity e. Ruggedness
Ubiquity
Which of the following is not one of the advantages related to purchasing an off-the-shelf system? Select one: a. Unique Tailoring b. Faster Roll-Out c. Knowledge Infusion d. Economical Attractiveness e. High Quality
Unique Tailoring
Which of the following terms is NOT used to define smart devices capabilities? Select one: a. Control b. Monitoring c. Usability d. Autonomy e. Optimization
Usability