BCOR 330 Final Exam

Ace your homework & exams now with Quizwiz!

Which of the following is a computer user right?

Effective training

Identify the function of the outsourcing relations group in an IS department.

It negotiates the costs of hiring another organization to perform a service.

Identify the function of the data administration group in an IS department.

It protects the data and information assets of the company.

What can the development team do to reduce the amount of time needed to complete a project?

Simplify the requirements.

Which of the following is something the CIO does not need to worry about when developing priorities for the company?

Writing and implementing plans for all of the priorities

In​ today's environment, organizations frequently seek to develop systems using an alternative to the SDLC known as the​ __________ methodologies.

agile

The term​ ________ consists of one or more​ activities, some of which may involve an information system.

business process

Companies that outsource must accept some loss of control when hiring other organizations to perform certain services. A disadvantage related to the loss of control is that it __________.

isn't easy to part ways with the outsourcing company

Scrum developers do not design an entire system at one time. Instead, they use __________ to design only the part of the system to be worked on next.

just-in-time design

A __________ is a person or organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.

threat

Processes need to be managed for all of the following reasons EXCEPT​ __________.

to reduce process quality

In 10 years, artificial intelligence (AI), machine learning, and deep neural networks will make it appear that information systems are being developed by ________.

training

In 10 years, the development of software will be more like __________ as opposed to __________.

training; creating

The four dimensions of feasibility that are used to evaluate projects include all of the following except​ __________.

user involvement

If you fail at the responsibility of __________, you could cause major security problems for other employees, the company, and yourself.

protecting your password

A benefit of outsourcing to a provider who has more expertise is that it __________.

reduces the risk of failure

The first phase of the SDLC in which we begin to understand​ management's statement of the need for the new system is​ __________.

system definition

Which of the following are the inputs to the component design phase of the systems development life cycle?

Approved user requirements

Which of the following is true of outsourcing?

A decrease in communication costs has powered outsourcing of business processes on a global scale.

Which of the following best describes a threat?

A person or organization that seeks to obtain or alter data or other assets illegally

Which of the following is NOT one of the five phases in the SDLC process?

Approve user requirements

Which of the following will NOT help a development team reduce the amount of time needed to complete a project?

Add more people to the project team.

Which of the following is a best practice when planning information systems?

Aligning information technology with business goals and objectives

In a BPMN diagram, the horizontal rectangle represents which one of the following?

An activity with a subprocess

Which of the following is a computer user responsibility?

Applying software patches and fixes

Which of the following is an inappropriate business practice with respect to managing information systems?

Being selective of which employees can be utilized to shape the organization's information technology

Which of the following uses systems that read and interpret individual human traits, such as fingerprints, irises, and voices, in order to grant or deny access?

Biometric authentication

__________ is the standard that defines a set of terms and graphical notations for documenting business processes.

Business Process Modeling Notation (BPMN)

A company that wants to implement changes to improve its business will use which of the following?

Business process management (BPM)

Which of the following is a technique used to create new business processes and to manage changes in existing processes?

Business process management (BPM)

​_________ is a technique used to create new business processes and to manage changes to existing processes.

Business process management​ (BPM)

How do job descriptions safeguard information systems from threats?

By restricting information access under a need-to-know basis

The __________ is appointed by the Chief Executive Officer to represent the interests of information systems and technology employees in the firm.

CIO

Which of the following is NOT a principle of agile (Scrum) development?

Choose not to work with customers during the duration.

Which of the following is a way to prevent a hacker from using a brute force attack?

Create multiple, strong passwords.

Which of the following is NOT a recommended personal security safeguard?

Creating a password that is easy to remember and easy to figure out

In order to achieve success within a SDLC project, which activity should be completed early in the project?

Creating the work breakdown structure (WBS)

__________ protect databases and other organizational data.

Data safeguards

In a BPMN diagram, the diamond represents which one of the following?

Decision

Which of the following is the first step in the system definition phase of the systems development life cycle?

Define the system goals and scope.

Which of the following is NOT a measure which should be taken for "Personal Security Safeguards"?

Demonstrate security concerns to your competitors.

An online retail website sends a purchase confirmation email to the wrong customer. Which of the following types of security loss is being illustrated in this scenario?

Faulty service

Which of the following is true about faulty service?

Faulty service includes problems that result because of incorrect system operation.

With scrum, what does velocity measure?

How many system requirements the team can accomplish in a time period

Which of the following is the part of a security plan that stipulates what an employee should do when a security problem occurs?

Incident response plan

Tulips Retail-Comm Inc., a retail company, has formed a new team to manage the company's online retail business. This team creates a website through which users can place orders for a wide variety of products. The team accidentally lists the products available for online purchase using an outdated database. This results in customers placing orders for products that are no longer available in the company's inventories. Which type of security loss is being illustrated in this scenario?

Incorrect data modification

To maintain a safe environment at work, users should use strong passwords. Users also have other responsibilities when maintaining a secure environment. Which of the following is another responsibility a user has?

Installing only authorized programs

Amazon.com operates customer service centers in the United States, India, and Ireland. During the evening hours in the United States, customer service reps in India, where it is daytime, handle the calls. When night falls in India, customer service reps in Ireland handle the early morning calls from the east coast of the United States. In this way, companies can provide 24/7 service without requiring employees to work night shifts. Which of the following best explains the scenario described?

International outsourcing

Which of the following is an example of a physical repository?

Inventory

Identify the function of the technology office in an IS department.

It determines the effect of the implementation of new information systems.

Annie, a member of an ongoing systems development project team, is an information systems manager who reports to Jake, the head of the information systems department. From the given scenario, it can be inferred that __________.

Jake belongs to the information systems steering committee.

Which of the following is the computer crime type with the highest average cost?

Malicious Insiders

Which of the following describes the development group?

Manages the process of creating new information systems as well as maintaining existing ones, and solves problems or adapts existing information systems to support new features and functions

Which of the following is expected to be a normal aspect of the work environment in 2029?

Mixed-reality devices will be commonplace.

__________ is the process of hiring another organization to perform a service.

Outsourcing

Regarding security in the future, which of the following statements is NOT correct about cloud vendors and major organizations?

They will stop investing in security measures.

What are resources

People or computer applications that are assigned to roles

Which of the following is a similar technique to pretexting, but attempts to obtain unauthorized data via email?

Phishing

In the context of information security management, which of the following occurs when someone deceives by pretending to be someone else?

Pretexting

Which of the following is defined as collections of activities?

Roles

Which of the following is used to develop business processes, information systems, and applications?

Scrum

__________ is a development process used for the development of business processes, information systems, and applications.

Scrum

Which of the following is NOT a major function of the IS department?

Sharing and communicating information assets

Which of the following statements is true about assessing the feasibility of projects?

Technical feasibility refers to whether existing information technology is likely to be able to meet the needs of the new system.

Which of the following best defines outsourcing?

The process of hiring another organization to perform a service

Which of the following statements is true about the role of prototypes?

They provide evidence to assess the system's technical and organizational feasibility.

Which term is used to describe the hierarchy of tasks to be done to complete a project?

Work breakdown structure (WBS)

__________ measures how many system requirements the team can accomplish in a scrum time period.

Velocity

In the​ swim-lane business process model​ format, rectangle symbols in the model represent​ a(n) ______.

activity

The __________ is the representative for IS and IT issues on the executive staff.

chief information officer (CIO)

According to the Ponemon Institute's 2017 Cost of Cyber Crime Study, value lies in _____ and not in _____.

data; hardware

Which of the following are data repositories?

databases

The transformation of clear text into coded, unintelligible text for secure storage or communication is accomplished by applying _________.

encryption algorithms

The most important stage of BPM is​ __________.

model business processes

Which of the following correctly depicts the sequence of stages of the business process management​ (BPM) cycle?

model​ processes; create​ components; implement​ processes; assess results

Adjustments to a systems development project plan come about by making​ trade-offs between​ time, cost, and​ __________.

scope

A company-wide security policy should include all of the following EXCEPT ________

the company-wide password(s)

A key to successfully bringing a systems development project to conclusion that involves creating a hierarchy of the tasks required to complete the project is​ __________.

the work breakdown structure


Related study sets

Module 04 - Operating Systems & File Management

View Set

Chapter 1, Overview of a Financial Plan

View Set

Chapter 7 - Skeletal System: Bone Structure and Function

View Set

A&P 2 Lab: Ex 4 White blood cells

View Set

Viruses and Needs of life quiz review

View Set

Nursing Assisting Chapter 5 - Diversity and Human Needs and Development

View Set