IS Exam 3 Ch. 8-10, End of book questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Wasting time online costs U.S. businesses more than ____________ annually

$85 billion

The Children's Online Privacy Protection Act (COPPA) was passed by congress in Oct. 1998. This act directed at websites catering to children requires site owners to post comprehensive privacy policies and to obtain parental consent before they collect any personal information from children under ____________ years of age

13 years

____________ is a business policy that permits and in some cases encourages, employees to use their own mobile devices to access company computing resources and applications

Bring your own device (BYOD)

____________ is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer system, networks, and storage devices in a manner that preserves the integrity of data gathered so that it is admissible as evidence in a court of law

Computer forensics

Many organizations use a waterfall approach with six phases, including investigation, analysis, design, _____________, integration, and testing and implementation

Construction

___________software can provide a better match to the current work processes of the organization and may provide a potential competitive advantage; however software development can be extremely costly, and it can take months or even years to complete

Custom

____________ involves secretly stealing data in the computer systems of organizations

Data breach

___________is a diagram used to document the process of the current system or to provide a model of a proposed new system

Data flow diagram

____________ is the practice of blending the tasks performed by the development and IT operations groups to enable faster and more reliable software releases

DevOps

The study of designing and postions computer equipment is called ____________

Ergonomics

A ____________ stands guard between an organization internal network and the internet and it limits network access based on the organization's access policy

Firewall

The purpose of the system investigation phase is to ___________

Gain a clear understanding of the specifics of the problem to solve or the opportunity to address

A ____________ instruction detection system contains information about specific attacks and system vulnerabilities and watches for attempts to exploit these vulnerabilities

Knowledge based

___________software is less risky and leads to quicker deployment; however, maintenance and support costs may become expensive

Off the shelf

____________ is a tool used by the NSA and FBI to access the servers of major internet services such as facebook, google, youtube and others to collect the contet of emails, video, photos, file transfers, and live chats

PRISM

The primary tool fro assessing the software marketplace to determine whether existing packages can meet the organization's needs is the ___________

RFI

The concept of ____________ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.

Reasonable assurance

Preventing waste and mistakes involves establishing, implementing, monitoring and ____________ policies and procedures

Reviewing

____________ is the process of assessing security related risks to an organization's computers and networks from both internal and external threats

Risk assessment

A ____________ is a set of programs that enables a user to gain administrative access to the computer without the end user's consent or knowledge

Rootkit

______________ is an agile development framework that uses a team-based approach in order to keep the development effort focused and moving quickly

Scrum

A preliminary evaluation of software packages and vendors begins during the ____________ phase when the two or three strongest contenders are identified

System analysis

A ____________ is a form of malware that fools its victims into think that it is useful software from a legitimate source

Trojan horse

The ____________ imposes limitations on the bulk collection of the telecommunications metadata of U.S. citizens; prohibits large scale indiscriminate data collection and requires the NSA to obtain permission from FISC to access metadata records which are now held by telecommunication companies rather than by the government

USA Freedom Act (2015)

____________ is an exploit in which victim receive a voicemail message telling them to call a phone number or access a website

Vishing

Two primary causes of computer related health problems are a poorly designed ____________ and failure to take regular breaks to stretch the muscles and rest the eyes

Work environment

The overall emphasis of the _____________ phase is on gathering data on the existing system determining the requirement of the new system, considering alternatives within identified constraints and investigating the feasibility of alternative solutions

analysis

A ____________ is someone who attacks a computer system or network for financial gain

cybercriminal

Morals are one's personal beliefs about right and wrong whereas the term ____________ describes standards or codes of behavior expected of an individual by a group to which an individual belongs

ethics

A ____________ is an attack on an information system that takes advantage of a particular system vulnerability

exploit

In the scrum framework, the ____________ is a person who represents the project stakeholders and is responsible for communicating and aligning project priorities between stakeholders and the development team

product owner

Which of the following is not a common computer related mistake a. Programming errors b. Shopping online while at work c. Data entry or data capture erros d. Errors in handling files

shopping online while at work

The __________ phase converts the system design into an operational system by coding and testing software programs, creating and loading data into databases and performing initial program testing

system construction


Set pelajaran terkait

Digital App: Binary Numbers, Bits and Bytes

View Set

Delgado-Econ 201 Chapter 1 Questions

View Set

Pharmacology Ch. 19 Introduction to Nerves and the Nervous System

View Set