MIS Exam 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

68) One of the critical factors that contribute to the failure of projects is ________.

the lack of executive support for the project

59) Which of the following best defines a critical path in a project?

the longest project path that identifies tasks that cannot be delayed without affecting the finish date

57) Which of the following best defines predecessors in a work breakdown structure?

the tasks that need to be completed before a particular task can begin

92) Which of the following best describes confirmation bias?

the tendency to choose information that supports our existing position

69) Which of the following best defines escalation of commitment?

the tendency to continue to invest in a project despite mounting evidence that it is not succeeding

99) Which of the following best describes an availability bias?

the tendency to judge the probability of an event based on how easily examples come to mind

100) Which of the following best describes an anchoring bias?

the tendency to rely on one specific piece of information, irrespective of its irrelevance

95) Which of the following best describes a planning fallacy?

the tendency to underestimate the time it will take to complete a task

43) Which of the following best describes the term scope creep?

the way in which project features are added in an uncontrolled way

48) In which of the following project management areas is a Gantt chart most likely to be used?

time management

67) Which of the following is the most critical factor that contributes to failure of projects?

unrealistic time frames

34) Screen attractiveness is an example of the ________ included in a requirements definition document (RDD).

usability requirements

45) A(n) ________ is an orderly listing of actual tasks that a project team must complete to produce the project's deliverables.

work breakdown structure

32) Halcyon, an e-publisher, has recently decided to use an information system that administers the way its customers access its online publications. The system assigns each customer with a unique ID, maintains records of the books purchased by them, encrypts electronic documents for transmission, and includes options to order hard copies of the electronic documents they read online. Which of the following refers to the set of technologies used in this case?

Digital rights management (DRM)

71) A ________ switches off the old system and launches all the modules of the new one on a single, very hectic go-live date, sometimes called the "big bang."

Direct implementation

72) A major advantage of a ________ is that people whose roles span modules do not have to switch back and forth between old and new modules.

Direct implementation

85) ________ refers to all the procedures, documentation, and resources an organization puts into place to prepare for a crisis situation and recover technical infrastructure.

Disaster recovery

62) ________ refers to an attack in which computers in a botnet are directed to flood a single website server with rapid-fire page requests, causing it to slow down or crash.

Distributed denial of service

32) Which of the following is an example of the security requirements included in a requirements definition document (RDD)?

Encryption

81) ________ is a process which transforms data using mathematical formulas, so that no one can read the data unless they know the key to unscrambling it.

Encryption

________ refers to a system of moral principles that human beings use to judge right and wrong, and to develop rules of conduct.

Ethics

67) What is the step involved in risk management after vulnerabilities of an organization have been examined?

Evaluation of controls that fill in security gaps

52) ________ in project management include all the coordinating efforts that ensure that tasks on the work breakdown structure are carried out properly.

Executing processes

83) An agile method that focuses on frequent releases of workable software and short time boxes for development is known as ________.

Extreme programming

84) A distinguishing feature of ________ is that developers work in pairs, reviewing one another's work, providing each other with feedback, and testing the code as it is written.

Extreme programming

25) A ________ is an important part of the planning stage of the systems development life cycle (SDLC) and examines whether an initiative is viable from technical, financial, and legal standpoints.

Feasibility study

78) Which of the following authentication strategies is the most difficult to forge, crack, or copy and is hence used for physical security?

Fingerprint scanner

87) A ________ is a technical control that inspects a network's incoming and outgoing traffic and either blocks or permits it according to rules the organization establishes.

Firewall

26) Which of the following principles is consistent with the utilitarian ethical framework?

First, do no harm

47) A ________ lists tasks on the work breakdown structure, along with each task's projected start and finish dates, in graphical format.

Gantt chart

49) Which of the following tools helps keep a project on track to meet its deadlines by listing tasks on a work breakdown schedule?

Gantt chart

50) Which of the following is true about work breakdown structure?

Gantt charts are generally used to show work breakdown structures.

37) Which of the following features is most likely an example of the usability requirements included in a requirements definition document (RDD)?

High task efficiency

50) The term ________ refers to configured computers with specific vulnerabilities so they can attract different varieties of malware in the wild, study their properties, and find out who started them.

Honeypots

75) Organizations use a(n) ________ to categorize a security threat, determine its cause, preserve any evidence, and get systems back online so they can resume business.

Incidence response plan

30) The ________ process lays the groundwork for the project by clarifying the value it will bring to the organization, setting its objectives, and estimating the project's length, scope, and cost.

Initiating

32) The stage at which a project is conceived is known as the ________ process.

Initiating

31) Which of the following sets of processes is carried out first in project management?

Initiating process

38) Lee works for Pink Net Worldwide Inc., an advertising company in California. Lee is developing software to improve the process of coordination with clients. Which of the following requirements is he concentrating on if he is interfacing the clients' software with a few of the information systems that are currently functioning within the company?

Integration requirements

27) ________ consists of intangible assets which are expressions of the human mind that give the creator of the property the right to its commercial value.

Intellectual property

89) Which of the following systems are used to combat spam?

Intrusive prevention systems

72) ________ help(s) in determining the cause of a security threat in an incidence response plan.

Investigating system logs

79) Which of the following technologies serves as a biometric identifier for physical security?

Iris configuration

88) Which of the following functions does a firewall perform?

It defines which IP addresses or domain names should be blocked.

105) Which of the following is true of the European Union's Data Protection Directive?

It establishes privacy as a fundamental human right for EU citizens

99) Which of the following is an accurate description of the Privacy Act of 1974?

It establishes requirements that govern how personally identifiable information on individuals is collected, used, and disseminated by federal agencies.

86) Which of the following reasons explains why waterfall methods are still widely in use?

It has a logical and familiar structure which is comfortable to use.

97) Which of the following is an accurate definition of scareware?

It is a kind of social engineering used to persuade people that a computer is infected when it is not.

82) Which of the following statements is true of encryption?

It is a powerful technical control that protects sensitive data

51) Which of the following is an accurate definition of a computer virus?

It is a software program that can damage files or other programs

81) Why is it a challenging task to calculate a project's return on investment (ROI)?

It is difficult to estimate ROI for projects where costs rise unexpectedly and revenue increases are hard to predict.

29) Enforcing intellectual property laws becomes difficult when ________.

It is digitized

87) Which of the following is an advantage of custom system development?

It is tailored closely to an organization's needs.

63) Which of the following is true of phishing?

It is the process of stealing personal data from a victim by convincing him to disclose information

78) Which of the following is a drawback of the waterfall method?

It is unable to adapt to changes in the business landscape.

39) Which of the following is an advantage of online anonymity?

It protects corporate whistleblowers and political activists in oppressive regimes

30) Which of the following is an accurate definition of digital rights management?

It refers to technologies that intellectual property owners use to control access to their digital content.

36) Which of the following statements is true of information privacy?

It refers to the protection of data about individuals

89) Which of the following is an advantage of prepackaged software?

It requires a short implementation time.

90) Which of the following is a disadvantage of prepackaged software?

It requires an organization to change its business processes.

88) Which of the following is a disadvantage of custom system development?

It requires long periods of time before going live.

38) Which of the following statements is true of a project charter?

It shows that the senior management support the project.

100) Which of the following is a disadvantage of using consulting services?

It tends to make employees feel less ownership of a project and less committed to changes.

83) Which of the following is a feature of public key encryption?

It uses a pair of keys, one to encrypt the data and the other to decrypt data.

79) The ________ compresses the time horizon for software development and focuses on the time available until the next release while the development team determines how many of the requirements it can deliver in that time frame.

Iterative method

45) Which of the following is potentially a negative impact of surveillance in online communications?

Lowered productivity of employees

53) Botnets function with the use of ________.

Malware

55) ________ track progress from start to finish, pinpointing any deviations from the plan.

Monitoring and controlling processes

________ is an ethical framework that judges the morality of an action based on how well it adheres to broadly accepted rules, regardless of the action's actual consequences.

Natural laws and rights

Which of the following statements is true of natural laws and rights?

Natural laws and rights do not consider the actual consequences of an action when judging its morality.

33) Digital rights management (DRM) offers IP holders the benefit of ________.

Offering technological protection for their products

68) Escapade Inc., a travel agency in Sydney, is using a highly expensive implementation process for a short period of time. It launches the new system while the old one is still running and employees have to do their jobs twice, once on each system. Which of the following is the company using?

Parallel implementation

61) Which of the following is a type of testing for information systems where developers use the same input and compare the new system's output to the output generated by the system it is replacing?

Parallel testing

93) Which of the following precautions need to be taken in order to create a secure password?

Personal information should not be used in passwords

64) Janet received an email that contained a link to a website that imitated the authentic website of her bank. The email requested her to key in her credit card number, her Social Security number, and her date of birth. She later found that her credit card was fraudulently charged for transactions she never made. It is inferred from this case that Janet is a victim of ________.

Phishing

66) ________ refers to an attempt to steal passwords or other sensitive information by persuading the victim to enter the information into a fraudulent website that masquerades as the authentic version.

Phishing

34) ________ is a type of intellectual property theft that involves reproducing the words of another and passing them off as one's own original work, without crediting the source.

Plagiarism

35) Margaret O'Connor is an upcoming poet from Georgia who recently updated her blog with her piece of writing titled, "Shadows." One of her readers copied her piece onto his own blog and passed it off as his original work. This is an example of ________.

Plagiarism

21) ________ is the first step in the systems development life cycle (SDLC), which defines the business need for a project, assesses its importance to the company, and determines whether the project is feasible.

Planning

22) Jonathan has joined a new software company in Manhattan and has been assigned the task of developing an internal communications system. He begins the task by assessing how the system will help in efficiently coordinating the projects that the company handles and in determining the feasibility of the system. In the given scenario, Jonathan is in the ________ step of the systems development life cycle (SDLC).

Planning

51) The ________ process in project management focuses on devising how the project will be executed.

Planning

26) A ________ is a series of events designed to deliver a product or service that is recurring in nature.

Process

69) Which of the following administrative security controls is most likely to be adopted by a company which handles high-level sensitive information?

Prohibiting downloading data to USB drives

24) A ________ is a temporary activity that is launched for a specific purpose, to carry out a particular objective.

Project

79) ________ is a continuous process that oversees all the projects for an organization, selecting which projects to pursue and culling those projects that have a poor prognosis.

Project portfolio management

25) Which of the following is a difference between projects and processes?

Projects are unique and one of a kind, whereas processes are recurring.

40) A drawback of online anonymity is that it ________.

Protects spammers and imposters

41) A ________ is an intermediary server that receives and analyzes requests from clients and then directs them to their destinations.

Proxy

80) ________ refers to the creation of software prototypes that can be shared with users for receiving feedback, so that developers can make improvements before a lot of effort is spent building a fully functioning version.

Rapid application development

27) Which of the following is a characteristic of a process?

Recurring in nature

77) Which of the following authentication strategies is the easiest to compromise or crack?

Reliance on user knowledge

26) ________ is a process in which stakeholders identify the features that a project will need and then prioritize them as mandatory, preferred, or nonessential.

Requirements analysis

27) Mike, a research analyst, is in the analysis phase of a project, the goal of which is the development of smile shutter technology in cameras. Mike first identifies and analyzes the integral elements that need to be included in the technology such as red eye removal, blink detection, and face identification and then prioritizes them as mandatory, preferred, or nonessential. Which of the following processes is being illustrated in the given scenario?

Requirements analysis

96) Which of the following is a reason why humans are soft targets for social engineering?

Respect for authority

73) ________ is one way of recovering systems in an incidence response plan.

Restoring from media known to be good

71) According to the incidence response plan, which of the following would be most useful in containing any damage caused by a security threat?

Restrict system access

24) ________ is a driver of information systems development that touches on security, privacy, safety, and regulatory compliance.

Risk management

68) A(n) ________ lists out and rates the vulnerabilities of an organization.

Risk matrix

82) ________ is an agile method for software development that relies on tightly knit, cohesive teams that do sprints of 2 to 4 weeks each.

Scrum

39) Sam Torres, a security officer at a content management firm, is required to monitor the people coming in and going out of the organization and ensure data privacy through the process of encryption. Which of the following types of requirements is Sam focusing on in the given scenario?

Security requirements

61) In Internet terminology, a worm refers to a(n) ________.

Self-replicating program that sends copies to other nodes on a computer network

92) A ________ is a gateway service that permits users to log in once, with one specific user ID and password, to gain access to multiple software applications.

Single sign-on

95) ________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.

Social engineering

28) Which of the following is an example of intellectual property owned by an IT firm?

Software code

49) Which of the following is an accurate definition of malware?

Software designed to attack computer systems

65) Which of the following methods is often used for phishing purposes?

Soliciting personal information through emails

57) The term ________ refers to software that monitors a user's activity on a computer and on the Internet, often installed without the user's knowledge.

Spyware

58) Evelyn Birch is a freelance content writer whose desktop computer has been infected with a software program that installed itself without her knowledge. The program monitors the websites she visits, her email communications, etc. Data gathered from the monitoring activity is sent to a remotely located hacker. Which of the following is most likely to have infected Evelyn's computer?

Spyware

60) Which of the following types of testing for information systems is conducted to assess how well a system performs under peak loads?

Stress testing

44) ________ are used to monitor email, web surfing, and other online communications in organizations.

Surveillance technologies

57) Which of the following types of testing involves both end users and IT staff testing the functionality of an entire IS?

System testing

102) Which of the laws stipulates how financial institutions are required to protect the privacy of consumers' personal financial information and notify them of their privacy policies annually?

The Gramm-Leach-Bliley Act

86) Which of the following is true of public key encryption?

The encryption key is widely shared with everyone, while the decryption key is known only to the recipient.

84) Which of the following is a technical control that helps secure information flow in an organization?

The information system enforces the organization's policy about human review.

103) Which of the following is true of black swan events?

The invention of the personal computer is an example of a black swan.

42) Which of the following is a drawback of using a proxy server to ensure online anonymity?

The need to rely on the promise of the company that operates the proxy to protect its customers' identities

Which of the following administrative control actions helps enforce approved authorizations for access to systems in an organization?

The organization defines the information to be encrypted or stored offline in a secure location.

98) Which of the following laws establishes requirements that govern how personally identifiable information on individuals is collected, used, and disseminated by federal agencies?

The privacy act of 1974

67) Which of the following is a disadvantage of a parallel implementation of an information system?

The process is expensive in nature and is usually in place for only a short period.

80) Which of the following is an accurate definition of multifactor authentication?

The process of combining two or more authentication strategies

37) Which of the following is an element of privacy?

The right to be left alone

76) Which of the following statements is true about acceptable-use policies?

The surveillance and monitoring processes that are in place are also included in the policy.

66) Which of the following is an advantage of a parallel implementation of an information system?

There are two systems processing the same case, both of which should have the same output.

48) Which of the following statements is true of honeypots?

They have specific vulnerabilities that attract different varieties of malware in the wild.

85) Which of the following best defines agile methods?

They involve characteristics of cohesiveness and trust.

104) Which of the following is a provision of the State Security Breach Notification Laws?

They require organizations to inform state residents if sensitive data are released.

Which of the following principles is consistent with the natural laws and rights ethical framework?

Thou shalt not kill

43) Which of the following is a reason why employers adopt surveillance technologies to track online communications?

To increase employee productivity

52) The term ________ refers to a seemingly harmless or useful program that installs malicious code allowing remote access to a computer, as for a botnet.

Trojan horse

46) What is the first step involved in risk management?

Understanding what information assets need protection

47) Lora Jones is a security expert hired by a Manhattan-based law firm to perform a formal risk assessment of the firm's data assets. Which of the following steps should she undertake first in order to assess the firm's readiness to face any potential security breaches?

Understanding which information assets need protection

97) ________ refers to an approach in which organizations strongly prefer systems that are offered by a single vendor, which also supplies the ERP.

Unified procurement

56) ________ is a type of testing for information systems that involves programmers checking the functionality of small modules of code during the development phase of the systems development life cycle (SDLC).

Unit testing

35) Tom Daniels, an employee of a telecommunications company, is developing software that would enable customers to activate value-added services in a matter of seconds. Which of the following requirements is Tom developing if he is working to improve the visual appeal of the interface and to enhance the ease of learning the software?

Usability requirements

________ is a widely accepted ethical system that considers the greatest good for the greatest number and considers the consequences of an action, weighing its positive effects against its harmful ones.

Utilitarianism

76) Which of the following technologies is most likely to be used by organizations as an authentication strategy?

Voice pattern recognition

76) The ________ involves the sequential occurring of systems development life cycle tasks, with one activity starting only after the previous one has been completed.

Waterfall method

38) Under which of the following circumstances is information privacy most difficult to achieve?

When information is stored on highly interconnected systems

56) When does a computer become a zombie?

When it is infected by malware

60) A ________ is a self-replicating program that sends copies to other nodes on a computer network and may contain malicious code intended to cause damage.

Worm

99) Which of the following is an example of a systems integrator?

a consultant who ensures that the hardware and software components of an IS work together

77) Which of the following disclaimers would protect a firm from implied contract obligations in the event of an employee's email containing wording that implies a firm contract?

a disclaimer stating that any contract must be confirmed by the employee's manager

34) Which of the following best describes a project charter?

a key document that authorizes a project

80) Which of the following best describes project portfolio management?

a process that oversees all projects and selects which projects to pursue

73) Which of the following is a critical success factor for projects?

a strategy to manage conflicts among stakeholders

23) Which of the following is an accurate definition of a project?

a temporary activity to carry out a particular objective

95) The ________ procures the finest systems for each application, regardless of the vendor.

best-of-breed approach

The term ________ is used to describe an extremely rare event that is difficult or nearly impossible to predict, but which can have an immense impact in areas such as technology, finance, and science.

black swan

29) An early form of business process management (BPM) that was developed as a means to make sweeping changes to eliminate all processes that did not add value was known as ________.

business process reengineering

33) The stage at which early phase managers identify the major players in the project, including the sponsor, the project manager, the team members, and other stakeholders, is known as the ________.

initiating process

36) User navigation and data display are examples of the ________ included in a requirements definition document RDD.

interface requirements

48) Which of the following should be undertaken during the design phase of the systems development life cycle (SDLC)?

keeping in mind end users with disabilities

40) A(n) ________ is an initiating process where stakeholders meet one another, sometimes for the first and only time.

kickoff meeting

64) Which of the following will take place in a parallel implementation of an information system?

launching the new system while the old one is still running

51) Which of the following functions does a project-and issue-tracking software perform?

maintaining a complete history of project activity, including dates and tasks assigned

56) In the ________ phase, project managers pay close attention to reports and dashboards that might show early warning signs that some tasks have fallen behind.

monitoring

78) A company requires its employees to include a certain disclaimer in their emails that states that the company is not responsible if recipients of emails rely on the advice provided by the employees. What potential threat does such a disclaimer protect the company from?

negligent misstatements

75) Which of the following best describes legacy systems?

old systems which are built on aging or obsolete architectures

28) Which of the following is the best example of a project?

opening a new branch office

87) Which of the following disasters is most likely to cause massive absenteeism in organizations?

pandemics

65) A ________ of an information system launches the new system while the old one is still running and employees either do their jobs twice or two separate teams handle the same processes.

parallel implementation

33) Components such as response time, availability, and scalability are examples of the ________ included in a requirements definition document (RDD).

performance requirements

69) A disadvantage of a ________ is that the new system's modules may be tightly integrated, so implementing one without the others may create some confusion and require temporary interfaces to the old systems.

phased implementation

54) Which of the following activities should project managers spend more time on?

planning and team building

96) A ________ refers to the tendency to underestimate the time it will take to complete a task.

planning fallacy

104) Black swan events ________.

pose difficult challenges for strategic planners

58) The term ________ refers to a task in the work breakdown structure that needs to be completed before a particular task can begin.

predecessor

96) An organization is using a unified procurement approach if it ________.

prefers systems that are offered by a single vendor

28) The major function of a process diagram is to trace ________.

process operations from beginning to end clearly to all stakeholders

94) An organization is using the best-of-breed approach if it ________.

procures the best systems, regardless of the vendor

41) Which of the following best describes deliverables in a project?

products, documents, or services that will be handed over to the sponsor

82) A ________ oversees all the projects going on throughout the organization and provides project management training, software, and support.

program management office

83) Which of the following collects data from each project and aggregates it, building a larger picture of the overall health of the organization's project portfolio?

program management office

63) Independent testers are critical in testing information systems mainly because ________.

programmers are inept at testing their own code

35) A ________ is a document that authorizes a project and includes a clear statement of objectives, estimated start and end dates, the names of the relevant people and their roles, a tentative budget, criteria for success, and other pertinent information.

project charter

39) A kick-off meeting involves ________.

project stakeholders meeting one another to review the project charter

52) The ________ offers customizable dashboards so that developers can see at a glance how a process is coming along, what activities they need to complete in a day, and how they can keep abreast of all aspects of the process.

project- and issue-tracking software

94) A single sign-on is implemented by organizations for the purpose of ________.

reducing the cognitive load associated with multiple passwords

91) A ________ is a request sent to software vendors describing a new system that an organization requires in broad, high-level terms, to which interested vendors can respond by describing the products and services that could fit the requirement.

request for information

92) Which of the following includes a high-level description of a system that an organization is on the lookout for?

request for information

93) A ________ is an invitation to software companies to submit a formal bid, including a detailed description of their products, services, and costs.

request for proposal

44) The term ________ refers to the way in which features are added in an uncontrolled way, often without considering the impact on the budget or timeline.

scope creep

46) A(n) ________ is a document that clarifies which features are included in a project.

scope statement

61) Which of the following is a feature of a project's closing process?

signing off by the sponsor that all deliverables have been accepted

41) A general rule of thumb is that an organization should consider buying software rather than building it if the ________.

software can meet 75% to 80% of all business requirements

31) Which of the following is a function of a requirements definition document (RDD)?

specifying the features that an information system should have

103) Which of the following provisions does the Gramm-Leach-Bliley Act make?

stipulating how financial institutions are required to protect the privacy of consumers' financial information and notify them of their privacy policies

42) Which of the following best describes service-oriented architecture (SOA)?

systems assembled from relatively independent software components

59) Which of the following is involved in the integration testing process for information systems?

testing a new system's interfaces with other software components it links to

90) Which of the following best describes overconfidence bias?

the act of having more faith in our own estimates than is realistically justified

94) Which of the following best describes a hindsight bias?

the belief that an actual event was predictable even if it was not

37) How does a project charter help in managing a project?

avoids unexpected surprises and leaves room for changes to meet organization's needs

47) Designers use the unified modeling language (UML) to ________.

improve communication and clarity by using standardized graphics symbols and notations

55) Joshua Lee, an engineer at Footprints Inc., is provided with a design by the creative team in his company for creating a software that would help travel agents answer and track traveler requests efficiently. He is now converting the design into an operational information system. Which of the following phases of the SDLC is the software currently in?

Development phase

23) Info Labs Inc., a marketing communications company, launches a project at a fixed cost of $180,000. What is the amount of savings earned from the project per month if it returns the investment in 3 years?

$5,000

59) Which of the following is an accurate definition of a keylogger?

A monitoring software that records a user's keystrokes

58) The type of testing that involves end users performing final testing to determine whether a project is complete as specified is known as ________.

Acceptance testing

43) Service-oriented architecture is especially useful in ________ companies.

Agile

81) In the ________, tasks are not sequenced according to the systems development life cycle (SDLC) and many activities occur simultaneously.

Agile method

77) The ________ phase of the waterfall method involves nailing down requirements, at which point the developers estimate the time and resources needed to complete a project.

Analysis

45) A use case diagram is used to indicate how ________.

Different types of users will interact with a system

74) An incidence response plan is created for the purpose of ________.

Avoiding chaos and missteps

54) The term ________ refers to a collection of computers that have been compromised by malware, often through some vulnerability in their software or operating system.

Botnet

86) ________ refers to maintaining an organization's business operations to avoid a devastating revenue loss and damaged reputation.

Business continuity

40) ________ an information system is typically the best choice for a business when the available systems support common business functions, such as financial or human resource management.

Buying

101) Which of the following laws prohibits businesses from sending misleading or deceptive commercial emails, but denies recipients any legal recourse on their own?

CAN-SPAM Act

55) For which of the following purposes are botnets most likely to be used?

Capturing Internet users' sensitive information

65) ________ is a structured approach that the transition employees must make as they switch from their existing work processes to new ones.

Change management

29) Which of the following is true of the triple constraint in projects?

Changes in one fundamental constraint affect the other constraints as well.

62) The ________ phase in a project involves documenting lessons learned from the project, so that the experience is useful to other project teams and adds to the organization's knowledge base.

Closing

63) The ________ phase ideally involves wrapping up a project in an orderly way and a sponsor signing off that all deliverables have been received and accepted.

Closing

53) ________ is a peer review process in which programmers familiar with the project and the development environment check over one another's work to ensure it is well documented and properly written.

Code review

70) One way to identify a threat in an incident response plan is to ________.

Communicate with a crisis management team

91) ________ makes it more difficult for a hacker to break into passwords.

Creating passwords with symbols, mixed cases, and characters

98) Which of the following is an advantage of customizing a packaged solution?

Customization adds competitive advantage to processes that an organization cannot alter.

50) Which of the following functions does the version control software perform?

D) allowing developers to track versions of the source code during development

31) Which of the following is a drawback of digital rights management encountered by users today?

DRM systems prevent legitimate duplication of digital content in the event of hardware failure.

90) What of the following is a drawback of cloud computing?

Data protection laws are not uniform across countries.

42) The term ________ refers to products, documents, or services that will be handed over to the sponsor during the course of the project.

Deliverables

44) The ________ phase is a technical blueprint for a whole system which captures all aspects of how the system's components will function together to accomplish goals, using descriptions, diagrams and models.

Design

46) Johanna Taylor, a creative developer at Leo Technologies Inc., is developing a website for the company. To address the usability needs of website visitors, she ensures that visitors would be able to easily locate what they need on the website. She avoids flashy graphics and chooses a font with high readability. Joanna is most likely in the ________ stage of the SDLP.

Design

54) Testing is a part of the ________ phase of the systems development life cycle (SDLC).

Development

98) An ________ bias refers to the tendency to judge the probability of an event based on how easily examples come to mind.

availability

74) The ________ lays out rules about what employees are allowed to do with IT resources and what activities are disallowed.

acceptable-use policy

75) The ________ encompasses services each employee will be provided, whether and how much they can utilize company resources for personal use, the kinds of surveillance that are in place, and reinforce legal requirements, such as prohibitions against unauthorized copying.

acceptable-use policy

53) Which of the following is an example of an executing process?

allocating work assignments

88) Which of the following is most likely to be a consequence of a security breach in an organization?

alteration of data

66) Which of the following best defines change management?

an approach to the transition employees make as they switch from existing work to new processes

97) The term ________ refers to the tendency for people to rely too heavily on one piece of information to adjust their estimates, even if it is irrelevant.

anchoring

74) The ________ refers to a process organizations put into place to manage and prioritize requests to add new features to an information system.

change control process

89) The term ________ refers to a common human tendency to make systematic mistakes when processing information or making judgments.

cognitive bias

84) Which among the following is the hardest task for an organization's program management office?

collecting consistent data from projects

72) Which of the following should a project manager ideally do to efficiently manage a project?

communicate the time, cost, and scope constraints clearly as the project unfolds

91) The human tendency to choose information to examine and support a view they already hold and ignore data that might refute their hypothesis is known as a(n) ________.

confirmation bias

49) Which of the following is the primary goal of the development phase of the systems development life cycle (SDLC)?

converting a design into a fully operational information system

60) The ________ refers to the longest course through the project, which identifies those tasks that cannot be delayed without affecting the finish date.

critical path

73) A ________ is often the only logical implementation strategy for smaller systems.

direct implementation

64) Which of the following challenges is typically a feature of the closing phase of a project?

documenting lessons learned

70) The tendency to continue investing in a project, despite mounting evidence that it is not succeeding, often comes about because people mistakenly let sunk costs affect decision making rather than weighing the value of further investment. This tendency is known as ________.

escalation of commitment

71) A real estate developer in the New Jersey area purchases a large tract of land and plans to build an apartment complex equipped with a golf course and other amenities. The developer is targeting the affluent software engineers from Manhattan who are looking for second homes. Halfway through the process of construction, recession hits the nation and many people lose their jobs. There are no takers for the apartments the developer is building, as homebuyers look for less expensive options. The developer, dismayed at the huge investment he has already made in the project, decides that it would be unwise to stop the project and plans to go ahead with it. The developer's reasoning is consistent with the idea of ________.

escalation of commitment

100) What does the Family Educational Rights and Privacy Act (FERPA) stipulate?

establishing privacy rights over educational records

36) Which of the following functions does a project charter perform?

estimating start and end dates for the project

101) Which of the following is an accurate definition of "black swans"?

events that occur very rarely and are difficult or nearly impossible to predict

62) Which of the following do all types of information system tests mimic?

events the system is likely to handle when it goes live

30) Michael Hammer's business process reengineering was criticized because it ________.

failed to realize that the human element is key to improving business processes

70) Which of the following occurs during a phased implementation?

focusing on launching modules in steps rather than all at once

93) A(n) ________ bias refers to a belief that an actual event was predictable even if it was not.

hindsight


संबंधित स्टडी सेट्स

MTLE Pedagogy-Learning Environment

View Set

N431: FEMA -Incident Command System

View Set

Chapter 6: Consumer Choice and Utility Maximization

View Set