ISDS 361B FInal
__ is a project type that upgrades an existing system to provide new capabilities that meet new business needs
enhancement
John, a lawyer, defends his client, who is accused of murder, to the best of his ability while conforming to the __ of his profession
ethics
To __ one or more slices on a pie chart means to pull the slice (s) away from the rest of the chart
explode
Identify theft and Assumption Deterrence Act (U.S Code Title 18, Section 1028) addresses activities relating to the trafficking of computer passwords
false
If the cost performance index is less than one or less than 100 percent, the project is under budget
false
Internal dependencies in project activities are inherent to the nature of the work being performed on a project. They are sometimes referred to as hard logic
false
which of the following statements best defines cyberterrorism
intimidation of a government by using information tech
identify a true statement about drill down analysis
invoices interactive examination of high-level summary data
which of the following is true of the hosted software model
it aims to help customers benefit
which of the following defines computer forensics
it is a discipline
which of the following defines law
it is a system of rules
Which intrusion detection system (IDS) contains information about specific attacks and system vulnerabilities
knowledge based ids
Which of the following is a feature of internet censorship
monitoring the internet activity of individuals
is the principle that requires internet services providers to treat all internet traffic from various sources in an unbiased manner
net neutrality
identify a component of platform as a service (PaaS) in a cloud computing environment
operating system
in ms access, a _ prompts you for criteria before running
parameter query
Which of the following exploits when downloaded onto a smartphone takes control of the device and its data until the owner agrees to pay a sum of money to the attacker
ransomware
Which of the following enables end users to make their own data requests and format the results without the need for additional help from the information technology organization
reporting and querying tools
a _ provides an estimate of what a project will cost
rough order
a key feature of a customer relationship management system, is the ability to organize data about customers and sales leads, prioritize potential sales opportunities, and identify appropriate next steps
sales management
A ___ policy defines an organization's security requirements, as well as the controls and sanctions needed to meet those requirements
security
__ involves identifying and documenting the relationships between project activities
sequencing activities
which of the following is a component used by a cloud user in a cloud computing environment
smartphone
Many people are familiar with SWOT analysis-analyzing Strengths, weaknesses, opportunities and threats- which is used to aid in
strategic planning
Tasks in a WBS that are decomposed into smaller tasks are called _____ tasks.
summary
cost is money that has been spent in the past. Consider it gone!
sunk cost
includes the planning, execution, and control of all activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and warehousing and delivery of finished products to customers
supply chain management
Which of the following policies often contains clauses that permit a social networking operator to collect and store data on users or even share it with third parties
terms of use policy
Fly thermostat, an automatic temperature controller for homes, learns the patterns of raising and lowering the temperature in a house after a week of use. It then adjusts the temperature automatically based on the observed patterns. This is an application of
the internet of things
which of the following best describes morals
they are a set of beliefs about right and wrong
which of the following best describes late majority
they are skeptical to change and new ideas
The question, " What is the project's schedule?" is an example of a(n) __ constraint
time
The USA PATRIOT Act protects the interests of investors and consumers by requiring that the annual reports of public companies include an evaluation of the effectiveness of internal control over financial reporting (
true
Identify an advantage of the software as a service (SaaS) approach in public cloud computing
user does not need to purchase and install
Goal Seek is an example of a ________ tool.
what-if analysis
The attack that takes place before a software developer knows about the vulnerability is known as a(n
zero day attack
the _ represent the international consensus regarding the collection and management of personal information
1980 organization for economic corporation
The __ is the ratio of earned value to actual cost and can be used to estimate the projected cost of completing a project
CPI
The __ is an estimate of what it will cost to complete the project based on performance to date
EAC
Variance are calculated by subtracting the actual cost or planned value from __
EV
the _ is an estimate of the value of the work actually completed
EV
To make milestones meaningful, some people use the ___ criteria to help define them.
SMART
a _ is used for the analysis of the internal and external environment of the firm
SWOT
The ability of information technology (IT) systems to manage themselves and adapt to changes in the computing environment, business policies and operating objectives is known as
autonomic computing
_ includes the processes required to ensure that a project team completes a project within an approved budget
project cost management
Activity information is not a required input to the other time management processes
false
It only takes one activity to complete a milestone
false
Net present value and cash flow mean the same thing
false
The ROI is always positive
false
The WBS is not a required input when developing a cost estimate
false
The computer Fraud and Abuse Act (U.S Code Title 18, Section 1030) covers false claims regarding unauthorized use of credit cards
false
The first step in creating a weighted scoring model is to assign a weight for each criterion
false
The objective of the foreign account tax compliance act is to prevent certain classes of persons and entities from making payments to foreign government officials
false
In a __ relationship, one task cannot finish before another finishes
finish to finish
In a __ relationship, the "from" activity must finish before the "to" activity can start
finish to start
Which of the following limits network access based on an organization's access policy
firewall
In M.S Project placing the schedule of tasks on the __ shows the start and finish time of a project in a calendar format
gantt chart
Excel's ________ finds the input needed in one cell for another cell to have a desired value
goal seek
Identify a project type that generates substantial new revenue or profits for the firm
growth
By providing a secure repository, tracking and audit trails, change and document management controls, workflow and communication and improved security PLM systems provide this benefit __
help reduce manufacturing cost
identify a true statement about bring your own device business policy
improve employee productivity
identify the factor that has forced employers to monitor workers to ensure compliance with the corporate information technology usage policy
increases legal liabilities
which of the following services is used to track the whereabouts of an individual
location based service
The critical path is the __ path through a network diagram, and it is represents the __ time it takes to complete a project
longest, shortest
A(n) ___ on a project is a significant event that normally has no duration
milestone
Which of the following enables global organizations to work as a single team to design, produce, support and retire products, while capturing best practices learned along the way
product life cycle management system
Using the following expression: Cost:[price]+[tax], which of the following statements is true?
The value in price will be added to the value in tax and display the result in cost
an _ refers to a cell by its fixed position in the worksheet
absolute cell reference
who is appointed by an organization to define, implement and oversee a set of data privacy policies
chief privacy officer (CPO)
Administrative activities, such as archiving project files, closing and contracts, documenting lessons learned and receiving formal acceptance of the delivered work as part of the phase or project, are often involved in __ processes
closing
The ___ process involves gaining stakeholder and customer acceptance of the final products and services and bringing the project, or project phase, to an orderly end
closing
_ is the use of software to assist in the creation, analysis and modification of the design of a component or a product
computer aided design
is the use of software to assist in the creation, analysis,and modification of the design of a component or a product
computer aided design
Pindcart, an online retailer, places a small file on the computer hard drive of its visitors to recognize them when they revisit their website. The company uses this file to generate a personalized welcome message to its visitors. This small file is called a __
cookie
Subdividing the project deliverables into smaller pieces is known as _____.
creating the WBS
computing is a method of computing that delivers secure, private and reliable computing experiences based on sound business practices
cyberespionage
create profiles on people based on aggregated data from public records such as business directories and social media networks
data brokers
involves the overall management of the availability, usability, integrity, and security of data used in an organization
data governance
Using hotel booking data to adjust room rates so as to maximize revenue is an example of using Data ___ tool
data mining?
The learning curve theory states that when many items are produced repetitively, the unit cost of those items __ in a regular pattern as more units are produced
decrease
The goal of __ is to ensure that the project team has complete understanding of all the work they must do part of the project scope so they can start scheduling the work
defining activities
is responsible for providing a safer, more secure america which is resilient against terrorism and other threats
dept of homeland security
the first step in determining the NPV is to
determine estimated costs
The ultimate goal of __ is to create a realistic project schedule that provides a basis for monitoring project progress for the time dimension of the project
developing the schedule
Consider a country with a law stating that citizens below the age of 25 must not have access to the internet. This type of law creates a
digital divide
is the number of workdays or work hours required to complete a task
effort
is the actual amount of time worked on an activity plus elapsed time
duration
Which program was designed to eliminate the digital divide in the United States
education rate
Which of the following is created and issued by software engineers to remove a system vulnerability
patch
The project cost management knowledge area maps to the __ process group through the activities of estimating costs and budget determination
planning
Identify the goal of an enterprise resource planning (ERP) system
to enable easy access
which of the following is the goal of supply chain management
to reduce overall investment
A tracking Gantt chart is based on the percentage of work completed for project tasks or the actual start and finish dates
true
In a Gantt chart created in Microsoft project, a black diamond symbol represents a milestone
true
Payback period is the amount of time it will take to recoup, in the form of net cash inflows, the total dollars invested in a project
true