Chapter 11: Computer Science

Ace your homework & exams now with Quizwiz!

1/1 In an information systems (IS) department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media. (1pts) operations technology development maintenance

operations

________ is a form of outsourcing. (1pts) Buying off-the-shelf software Customizing information systems Acquiring licensed software Updating data standards

Acquiring licensed software

1/1 Which of the following is a limitation of aligning information systems (IS) with organizational strategy? (1pts) Adapting the IS to new versions of business processes is complex and time-consuming. Aligning the IS direction with the organizational strategy occurs only when organizations merge. Aligning the IS direction with the organizational strategy occurs only when the divisions are sold. The steering committee provides a forum for the IS department to voice its complaints about the users.

Adapting the IS to new versions of business processes is complex and time-consuming

Which of the following statements is true of information systems? (1pts) Information systems include all business process activities. Every information system has at least one application. Information systems should be bought entirely off-the-shelf. Every business process should include at least one information system.

Every information system has at least 1 application

________ a Web site means to take extraordinary measures to reduce a system's vulnerability using special versions of the operating system. (1pts) Pretexting Hardening Phishing Spoofing

Hardening

Which of the following is a form of outsourcing hardware infrastructure in the cloud? (1pts) acquiring licensed products Infrastructure as a service (IaaS) cloud hosting Software as a Service (SaaS) Platform as a Service (PaaS)

Infrastructure as a service (IaaS) cloud hosting

1/1 Which of the following statements is true about the maintenance group of information systems (IS)? (1pts) It is undertaken by the business analysts. It is overseen by the chief technology officer. It involves adapting existing systems to support new features. It comprises developing test plans and designing automated test scripts.

It involves adapting existing systems to support new features

Which of the following statements is true about the maintenance group of information systems (IS)? (1pts) It is undertaken by the business analysts. It is overseen by the chief technology officer. It involves adapting existing systems to support new features. It comprises developing test plans and designing automated test scripts.

It involves adapting existing systems to support new features

Which of the following is a risk of outsourcing information systems (IS)/information technology (IT) functions? (1pts) It is easier to end an agreement between a vendor and an organization that hired the vendor. B. It provides the hiring organization with too many choices. It involves the potential loss of intellectual capital. It invariably results in diseconomies of scale.

It involves the potential loss of intellectual capital

Which of the following statements is true about outsourcing? (1pts) It increases budgetary instability due to the level of risk involved. It saves both direct and indirect management time. It invariably leads to diseconomies of scale. It guarantees a higher level of quality than that provided in-house.

It saves both direct and indirect management time

What are three reasons to outsource?

Management advantages Cost reduction Risk reduction

1/1 Which of the following statements is true about information systems (IS) planning functions? (1pts) The chief operating officer (COO) is the sole representative for IS and IT issues within the executive staff. The steering committee represents the IS department exclusively in high-level discussions. The information systems (IS) department's priorities are developed by the chief executive officer (CEO). The chief executive officer (CEO) and other executive staff decide the membership of the steering committee.

The chief executive officer (CEO) and other executive staff decide the membership of the steering committee.

Which of the following statements is true about a data administration staff function? (1pts) The chief technology officer (CTO) heads the data administration staff function. The group establishes standards to protect information assets. This group includes system and network administrators exclusively. This group manages the process of creating new information systems.

The group establishes standards to protect information assets

Which of the following statements is true about users of information systems? (1pts) They have a responsibility to protect their computers from viruses by installing their choice of antivirus software. They can avoid security and backup procedures. They should learn standard techniques and procedures for the applications they use. They should learn to install hardware and software on their own.

They should learn standard techniques and procedures for the applications they use

Which of the following statements is a characteristic of outsourcing? (1pts) Management should have expertise on a subject before it can decide to outsource. An outsource vendor transfers the responsibility of risk management to the development group. To achieve quality, it is easier to hire another vendor than it is to fire and rehire internal staff. Outsourcing leads to increased financial risk.

To achieve quality, it is easier to hire another vendor than it is to fire and rehire internal staff

In a business process, a role refers to ________. (1pts) a physical repository the movement of data a collection of data a collection of activities

a collection of activities

If an organization does not develop programs in-house, then the development group of the information system (IS) department will be staffed primarily by ________ who work with users, operations, and vendors to acquire and install licensed software and to set up the system components around that software. (1pts) programmers and development personnel PQA test engineers business and systems analysts technical writers

business and systems analysts

In 2005, Marrion International chose a human resources consulting agency to handle its human resource needs for the next 7 years. This is an example of ________ outsourcing. (1pts) network software business function application

business function

Outsourcing is done to ________. (1pts) diversify the business portfolio increase costs for outsourcing vendors cap an organization's financial exposure enhance management's focus on nonessential functions

cap an organization's financial exposure

The purpose of a ________ group is to protect data and information assets by establishing data standards and data management practices and policies. (1pts) data administration data warehousing data mining data communication

data administration

Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ department. (1pts) human resources information systems marketing manufacturing

information systems

1/1 Users should not bother the information systems (IS) personnel for trivial issues, instead they should fulfill their responsibilities by ________. (1pts) learning basic computer skills sharing their passwords with others to use their help in solving those trivial issues installing security programs by themselves making hardware modifications

learning basic computer skills

An outsource vendor changes its strategic direction. Under which of the following outsourcing risks can this be associated? (1pts) de facto sole source superfluous chief information officer (CIO) diseconomies of scale loss of control

loss of control

What are the three risks to outsourcing?

loss of control benefits outweighed by long-term costs no easy exit

1/1 Every information systems (IS) user has the right to a secure computing environment. This means that the ________. (1pts) organization should protect his/her computer and its files user should solely be in charge of protecting the organization's computers and files user should inform the IS about software upgrades user will never face a network problem

organization should protect his/her computer and its files

Which of the following is an example of outsourcing an entire business function? (1pts) acquiring licensed security software instead of developing it in-house making customizations to licensed software outsourcing the function of arranging employee travel acquiring virtualization technologies

outsourcing the function of arranging employee travel

When an employee is terminated, IS administrators should receive advance notice so that they can ________. (1pts) destroy the employee's records plan the recruitment of their positions. disseminate information remove the user account and password

remove the user account and password

Which of the following is a right of users of information systems? (1pts) right to install programs and applications of their choice right to make hardware modifications when desired right to receive effective training right to obtain the configuration of their choice

right to receive effective training

Which of the following is a responsibility of a chief information officer (CIO)? (1pts) serving as the principal manager of the IS department heading the technology group evaluating new technologies that are relevant to the organization developing processes and information systems (IS) that implement business strategy

serving as the principal manager of the IS department

Which of the following is a function of the steering committee for the information systems (IS) department? (1pts) writing program code imparting training adapting software setting IS priorities

setting IS priorities

A ________ prepares program documentation, help-text, procedures, job descriptions, and training materials. (1pts) system analyst consultant programmer technical writer

technical writer


Related study sets

Lab 5 Review Flashcards (w/ exercise and module)

View Set

Chapter 13: Labor and Birth Process (Prep U)

View Set

Chapter 1 Financial and Managerial Accounting

View Set

6. Python AI Development: Practice

View Set