ISDS 351 Exam #3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

_____ is a program in which malicious code is hidden inside a seemingly harmless program.

A Trojan horse

Which of the following is created and issued by software engineers to remove a system vulnerability?

A patch

With a(n) _____ contract, the buyer pays the supplier for allowable performance costs plus a fixed fee payment usually based on a percentage of estimated costs.

CPFF

From the buyer's perspective, the _____ is the least desirable among all contracts because the supplier has no incentive to decrease costs.

CPPC

_____ contracts involve payment to the supplier for direct and indirect actual costs and often include fees.

Cost-reimbursable

Which of the following statements is true of a cookie?

Data about user preferences and activity is captured and stored under a cookie on a company's Web server.

Identify the tactic through which an individual obtains information about an individual from data brokers and threatens to expose the victim's personal details unless a ransom is paid.

Doxing

Which of the following can result in effective knowledge management?

Enabling employees to share and build on one another's experience and expertise so that mistakes are not repeated

Which of the following has caused organizations to establish knowledge management programs in their information technology (IT) or human resource management departments?

Globalization

Social networking users are prone to _____.

Identity Theft

Which of the following is a reason for the rapid growth of the Internet of Everything?

Increased availability of network access

Which costs are difficult to measure in monetary terms?

Intangible costs

Identify a true statement about the bring your own device (BYOD) business policy.

It can improve employee productivity.

Which of the following is true of a cookie?

It captures browsing history for Web site customization and personalization purposes.

Which of the following is a drawback of the bring your own device (BYOD) business policy?

It exposes a company's data to malware.

Which of the following is true of stingray?

It impersonates a cell tower and forces all mobile phones within range to connect to it.

Which of the following is a technical description of a virus?

It is a piece of code that causes a computer to behave in an unexpected and usually undesirable manner.

Which is true of earned value?

It is an estimate of the value of the physical work actually completed.

Which of the following is true of an enterprise search software?

It matches a user's query to many sources of information.

_____ is a process in which a novice and an expert work side-by-side to solve a problem so that the expert's approach is slowly revealed to the observant novice.

Joint problem solving

_____ comprises a range of practices concerned with increasing awareness, fostering learning, speeding collaboration and innovation, and exchanging insights of individuals, teams, or entire organizations.

Knowledge management

Which reserves allow for future situations that are unpredictable?

Management reserves

Which of the following is a feature of Internet censorship?

Monitoring the Internet activity of individuals

Which analysis technique simulates a model's outcome many times to provide a statistical distribution of the calculated results?

Monte Carlo

_____ is the principle that requires Internet Service providers to treat all Internet traffic from various sources in an unbiased manner.

Net neutrality

Which of the following is true of knowledge management?

Organizations implement knowledge management projects to foster innovation by encouraging the free flow of ideas.

Which chart helps users identify the vital few contributors that account for most quality problems in a system?

Pareto

Which of the following can result in a significant damage to productivity and a decrease in the quality of service in an organization?

Permanent loss of expertise related to core operations

_____ is the act of fraudulently using email to try to get the recipient to reveal personal data.

Phishing

A document used to solicit quotes or bids from prospective suppliers is known as a(n) _____.

RFQ

Which of the following exploits when downloaded onto a smartphone takes control of the device and its data until the owner agrees to pay a sum of money to the attacker?

Ransomware

The _____ is a description of the work required for a procurement.

SOW

Which of the following systems is used by law enforcement agencies to snap photos and document the location of vehicles?

Secure flight program

_____ involves a novice observing an expert executing his or her job to learn how he or she performs.

Shadowing

_____ is the abuse of email systems to send unsolicited email to large numbers of people.

Spam

Which statement is true of contingency reserves?

They allow for future situations that can be partially planned for.

Which of the following is true of white hat hackers?

They are hired by an organization to test the security of its information systems.

Which statement is true of analogous estimates?

They are most reliable when previous projects are similar in fact with current projects

Which statement is true of bottom-up estimates?

They are time-intensive and expensive to develop.

Identify the goal of knowledge management.

To improve the creation, retention, sharing, and reuse of an individual's or a team's knowledge

_____ is a qualitative risk analysis tool that maintains an awareness of risks throughout the life of a project in addition to identifying risks.

Top Ten Risk Item Tracking

What do people who seek to excel and tend to avoid both low-risk and high-risk situations to improve their chances for achieving something worthwhile have a high need for?

achievement

An example of pull communication is _____.

blogs

What is e-mail communication is most suited for?

communicating simple information

Validated changes and validated deliverables are the outputs of the ____ subprocess of project quality management.

controlling

In project procurement management, which process involves completion and settlement of each contract, including resolution of any open items?

controlling procurements

ZoomMe is a company that accumulates data on people from various sources such as online product registration forms, credit card purchases, and other public records. It then uses these data to create profiles on people and sell them to advertisers. ZoomMe comes under the category of _____.

data brokers

What term is used for any instance where the product or service fails to meet customer requirements?

defect

According to the guidelines provided by Practical Communications, Inc., a(n) _____ is a medium that is "excellent" for encouraging creative thinking.

e-mail

In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability.

exploit

What are the system's special characteristics that appeal to users?

features

Which document predicts future project status and progress based on past information and trends?

forecasts

In order to evolve, grow, and prosper, an organization must _____.

foster innovation by encouraging the free flow of ideas

Which term is used for the degree to which a system performs its intended function?

functionality

Most organizations are not in business to provide information technology services, yet many have spent valuable time and resources on information technology functions when they should have instead worked on important competencies such as marketing, customer service, and new product design. Outsourcing helps tackle this problem. Which benefit does outsourcing primarily provide in such a scenario?

helps focus on an organization's core business

Which type of intelligence involves the capacity to understand the motivations, intentions and desires of others?

interpersonal

What is one drawback of outsourcing?

it can make an organization become overly dependent on particular suppliers.

The items discussed in a(n) _____ include reflections on whether project goals were met, whether the project was successful or not, causes of variances on the project, reasoning behind corrective actions chosen, use of different project management tools and techniques, and personal words of wisdom based on team members' experiences.

lessons-learned report

What does the process of controlling costs primarily involve?

managing changes to the project budget

Which process involves tracking team member performance, motivating team members, providing timely feedback, resolving issues and conflicts, and coordinating changes to help enhance project performance?

managing the project team

According to the guidelines provided by Practical Communications, Inc., which is the most appropriate medium for giving complex instructions?

meeting

Which process involves monitoring identified and residual risks, identifying new risks, carrying out risk response plans, and evaluating the effectiveness of risk strategies throughout the life of the project?

monitoring risk

Which statement is true regarding indirect costs?

not directly related to the products or services of a project.

Which addresses how well a product or service performs the customer's intended use?

performance

In the Tuckman model, what occurs when the emphasis is on reaching the team goals, rather than working on team process?

performing

Which process involves prioritizing risks based on their probability and impact of occurrence?

performing qualitative risk analysis

What is another term used for budget?

planned value

In project procurement management, which process involves determining what to procure, when, and how?

planning procurement management

Which process involves taking steps to enhance opportunities and reduce threats to meeting project objectives?

planning risk responses

According to McClelland's acquired-needs theory, what do people who want to direct others, and can be seen as bossy, have a need for?

power

Unenforceable conditions or contract clauses and adversarial relations are risk conditions associated with the project _____ management knowledge area.

procurement

What documents include a complete set of organized project records that provide an accurate history of the project?

project archives

What type of management includes the processes required to ensure that a project team completes a project within an approved budget?

project cost management

A shortage of qualified personnel is one of the main reason that companies outsource. A project may require experts in a particular field for several months and planning for this procurement ensures that the needed services will be available for the project. Which benefit does this characteristic of outsourcing provide an organization?

provides access to specific skills

Which process is often associated with the technical tools and techniques of quality management, such as Pareto charts, quality control charts, and statistical sampling?

quality control

What term is used for the relation of harmony, conformity, accord, or affinity?

rapport

Which type of power is based on an individual's personal charisma?

referent

What term is used for the ability of a product or service to perform as expected under normal conditions?

reliability

Which technique is used for resolving resource conflicts by delaying tasks?

resource leveling

Which term refers to the amount of individual resources an existing schedule requires during specific time periods?

resource loading

Which action applies to positive risks when the project team cannot or chooses not to take any actions toward a risk?

risk acceptance

Which action involves reducing the impact of a risk event by reducing the probability of its occurrence?

risk mitigation

Which action involves allocating ownership of the risk to another party?

risk sharing

What is at the top of Maslow's hierarchy of needs?

self-actualization

Which technique is used to show the effects of changing one or more variables on an outcome?

sensitivity analysis

Which method of communication is likely to be most effective for conveying sensitive or important information?

short face-to-face meetings

Which process involves choosing part of a population of interest for inspection?

statistical sampling

Which document describes where the project stands at a specific point in time?

status reports

The _____ line for any e-mail messages you write should clearly state the intention of the e-mail.

subject

Which testing involves an independent test performed by end users prior to accepting the delivered system?

user acceptance


Set pelajaran terkait

Chapter Quiz: Labor and Financial Markets

View Set

Chapter 12: Production and Growth

View Set