ISDS 361B FInal

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

__ is a project type that upgrades an existing system to provide new capabilities that meet new business needs

enhancement

John, a lawyer, defends his client, who is accused of murder, to the best of his ability while conforming to the __ of his profession

ethics

To __ one or more slices on a pie chart means to pull the slice (s) away from the rest of the chart

explode

Identify theft and Assumption Deterrence Act (U.S Code Title 18, Section 1028) addresses activities relating to the trafficking of computer passwords

false

If the cost performance index is less than one or less than 100 percent, the project is under budget

false

Internal dependencies in project activities are inherent to the nature of the work being performed on a project. They are sometimes referred to as hard logic

false

which of the following statements best defines cyberterrorism

intimidation of a government by using information tech

identify a true statement about drill down analysis

invoices interactive examination of high-level summary data

which of the following is true of the hosted software model

it aims to help customers benefit

which of the following defines computer forensics

it is a discipline

which of the following defines law

it is a system of rules

Which intrusion detection system (IDS) contains information about specific attacks and system vulnerabilities

knowledge based ids

Which of the following is a feature of internet censorship

monitoring the internet activity of individuals

is the principle that requires internet services providers to treat all internet traffic from various sources in an unbiased manner

net neutrality

identify a component of platform as a service (PaaS) in a cloud computing environment

operating system

in ms access, a _ prompts you for criteria before running

parameter query

Which of the following exploits when downloaded onto a smartphone takes control of the device and its data until the owner agrees to pay a sum of money to the attacker

ransomware

Which of the following enables end users to make their own data requests and format the results without the need for additional help from the information technology organization

reporting and querying tools

a _ provides an estimate of what a project will cost

rough order

a key feature of a customer relationship management system, is the ability to organize data about customers and sales leads, prioritize potential sales opportunities, and identify appropriate next steps

sales management

A ___ policy defines an organization's security requirements, as well as the controls and sanctions needed to meet those requirements

security

__ involves identifying and documenting the relationships between project activities

sequencing activities

which of the following is a component used by a cloud user in a cloud computing environment

smartphone

Many people are familiar with SWOT analysis-analyzing Strengths, weaknesses, opportunities and threats- which is used to aid in

strategic planning

Tasks in a WBS that are decomposed into smaller tasks are called _____ tasks.

summary

cost is money that has been spent in the past. Consider it gone!

sunk cost

includes the planning, execution, and control of all activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and warehousing and delivery of finished products to customers

supply chain management

Which of the following policies often contains clauses that permit a social networking operator to collect and store data on users or even share it with third parties

terms of use policy

Fly thermostat, an automatic temperature controller for homes, learns the patterns of raising and lowering the temperature in a house after a week of use. It then adjusts the temperature automatically based on the observed patterns. This is an application of

the internet of things

which of the following best describes morals

they are a set of beliefs about right and wrong

which of the following best describes late majority

they are skeptical to change and new ideas

The question, " What is the project's schedule?" is an example of a(n) __ constraint

time

The USA PATRIOT Act protects the interests of investors and consumers by requiring that the annual reports of public companies include an evaluation of the effectiveness of internal control over financial reporting (

true

Identify an advantage of the software as a service (SaaS) approach in public cloud computing

user does not need to purchase and install

Goal Seek is an example of a ________ tool.

what-if analysis

The attack that takes place before a software developer knows about the vulnerability is known as a(n

zero day attack

the _ represent the international consensus regarding the collection and management of personal information

1980 organization for economic corporation

The __ is the ratio of earned value to actual cost and can be used to estimate the projected cost of completing a project

CPI

The __ is an estimate of what it will cost to complete the project based on performance to date

EAC

Variance are calculated by subtracting the actual cost or planned value from __

EV

the _ is an estimate of the value of the work actually completed

EV

To make milestones meaningful, some people use the ___ criteria to help define them.

SMART

a _ is used for the analysis of the internal and external environment of the firm

SWOT

The ability of information technology (IT) systems to manage themselves and adapt to changes in the computing environment, business policies and operating objectives is known as

autonomic computing

_ includes the processes required to ensure that a project team completes a project within an approved budget

project cost management

Activity information is not a required input to the other time management processes

false

It only takes one activity to complete a milestone

false

Net present value and cash flow mean the same thing

false

The ROI is always positive

false

The WBS is not a required input when developing a cost estimate

false

The computer Fraud and Abuse Act (U.S Code Title 18, Section 1030) covers false claims regarding unauthorized use of credit cards

false

The first step in creating a weighted scoring model is to assign a weight for each criterion

false

The objective of the foreign account tax compliance act is to prevent certain classes of persons and entities from making payments to foreign government officials

false

In a __ relationship, one task cannot finish before another finishes

finish to finish

In a __ relationship, the "from" activity must finish before the "to" activity can start

finish to start

Which of the following limits network access based on an organization's access policy

firewall

In M.S Project placing the schedule of tasks on the __ shows the start and finish time of a project in a calendar format

gantt chart

Excel's ________ finds the input needed in one cell for another cell to have a desired value

goal seek

Identify a project type that generates substantial new revenue or profits for the firm

growth

By providing a secure repository, tracking and audit trails, change and document management controls, workflow and communication and improved security PLM systems provide this benefit __

help reduce manufacturing cost

identify a true statement about bring your own device business policy

improve employee productivity

identify the factor that has forced employers to monitor workers to ensure compliance with the corporate information technology usage policy

increases legal liabilities

which of the following services is used to track the whereabouts of an individual

location based service

The critical path is the __ path through a network diagram, and it is represents the __ time it takes to complete a project

longest, shortest

A(n) ___ on a project is a significant event that normally has no duration

milestone

Which of the following enables global organizations to work as a single team to design, produce, support and retire products, while capturing best practices learned along the way

product life cycle management system

Using the following expression: Cost:[price]+[tax], which of the following statements is true?

The value in price will be added to the value in tax and display the result in cost

an _ refers to a cell by its fixed position in the worksheet

absolute cell reference

who is appointed by an organization to define, implement and oversee a set of data privacy policies

chief privacy officer (CPO)

Administrative activities, such as archiving project files, closing and contracts, documenting lessons learned and receiving formal acceptance of the delivered work as part of the phase or project, are often involved in __ processes

closing

The ___ process involves gaining stakeholder and customer acceptance of the final products and services and bringing the project, or project phase, to an orderly end

closing

_ is the use of software to assist in the creation, analysis and modification of the design of a component or a product

computer aided design

is the use of software to assist in the creation, analysis,and modification of the design of a component or a product

computer aided design

Pindcart, an online retailer, places a small file on the computer hard drive of its visitors to recognize them when they revisit their website. The company uses this file to generate a personalized welcome message to its visitors. This small file is called a __

cookie

Subdividing the project deliverables into smaller pieces is known as _____.

creating the WBS

computing is a method of computing that delivers secure, private and reliable computing experiences based on sound business practices

cyberespionage

create profiles on people based on aggregated data from public records such as business directories and social media networks

data brokers

involves the overall management of the availability, usability, integrity, and security of data used in an organization

data governance

Using hotel booking data to adjust room rates so as to maximize revenue is an example of using Data ___ tool

data mining?

The learning curve theory states that when many items are produced repetitively, the unit cost of those items __ in a regular pattern as more units are produced

decrease

The goal of __ is to ensure that the project team has complete understanding of all the work they must do part of the project scope so they can start scheduling the work

defining activities

is responsible for providing a safer, more secure america which is resilient against terrorism and other threats

dept of homeland security

the first step in determining the NPV is to

determine estimated costs

The ultimate goal of __ is to create a realistic project schedule that provides a basis for monitoring project progress for the time dimension of the project

developing the schedule

Consider a country with a law stating that citizens below the age of 25 must not have access to the internet. This type of law creates a

digital divide

is the number of workdays or work hours required to complete a task

effort

is the actual amount of time worked on an activity plus elapsed time

duration

Which program was designed to eliminate the digital divide in the United States

education rate

Which of the following is created and issued by software engineers to remove a system vulnerability

patch

The project cost management knowledge area maps to the __ process group through the activities of estimating costs and budget determination

planning

Identify the goal of an enterprise resource planning (ERP) system

to enable easy access

which of the following is the goal of supply chain management

to reduce overall investment

A tracking Gantt chart is based on the percentage of work completed for project tasks or the actual start and finish dates

true

In a Gantt chart created in Microsoft project, a black diamond symbol represents a milestone

true

Payback period is the amount of time it will take to recoup, in the form of net cash inflows, the total dollars invested in a project

true


Ensembles d'études connexes

Chapter 8 & 9 - Key terms, Review Quiz, Quiz, etc.

View Set

Adaptive follow up Anatomy ch.9 Muscles

View Set

Care of Patients with Problems of the CNS: Brain

View Set