MIS 330 Exam 2
Which of the following is a type of guided media? A. Fiber optic B. Radio C. Microwave D. Satellite
A. Fiber optic
(1)_____ is performed by the end users of the software. They can be the customers themselves or the customers' customer. (2)_____ is performed by members of the organization that developed the software but who are not directly involved in the project. A. 1 - Beta Testing; 2 - Alpha Testing B. 1 - Alpha Testing; 2 - Bravo Testing C. 1 - Alpha Testing; 2 - Beta Testing D. 1 - Internal Acceptance Testing; 2 - User Acceptance Testing E. 1 - Bravo Testing; 2 - Alpha Testing
A. 1 - Beta Testing; 2 - Alpha Testing
A large company has decided to use Microsoft 365 and Saleforce CRM, which are hosted on the cloud as a SaaS (Software as a Service) application. Because SaaS was chosen in this scenario, the (1)_____ is responsible for the maintenance of the Applications, and the (2)_____ is responsible for the middleware's maintenance. A. 1 - Cloud Service Provider; 2 - Cloud Service Provider B. 1 - Software Development Company; 2 - Software Development Company C. 1 - Cloud Service Provider; 2 - Managed Security Service Provider D. 1 - Software Development Company; 2 - Cloud Service Provider E. 1 - Cloud Service Provider; 2 - Software Development Company
A. 1 - Cloud Service Provider; 2 - Cloud Service Provider
A software development company has decided to use the cloud for all of its application development work. Because of the nature of their work, the company chooses to use Platform as a Service (PaaS) through a Cloud Service Provider. Because PaaS was chosen in this scenario, the (1)_____ is responsible for the maintenance of the Applications, and the (2)_____ is responsible for the Middleware's maintenance. A. 1 - Software Development Company; 2 - Cloud Service Provider B. 1 - Software Development Company; 2 - Software Development Company C. 1 - Cloud Service Provider; 2 - Software Development Company D. 1 - Cloud Service Provider; 2 - Managed Security Service Provider E. 1 - Cloud Service Provider; 2 - Cloud Service Provider
A. 1 - Software Development Company; 2 - Cloud Service Provider
In terms of documentation: (1)_____ allows software developers to remember/understand how the system works - usually for troubleshooting, maintaining, and upgrading later, while (2)_____ allows users to understand what they need to do when interacting with the system. A. 1 - System Documentation; 2 - User Documentation B. 1 - User Documentation; 2 - User Documentation C. 1 - System Documentation; 2 - System Documentation D. 1 - User Documentation; 2 - System Documentation
A. 1 - System Documentation; 2 - User Documentation
(1) ______ is a cloud service where the hardware operating system and apps are responsibilities of CSP. (2) ______ is a cloud service where Hardware is responsibility of CSP in the software operating system and apps are responsibilities of the non CSP organization A. (1) - IaaS; (2) - IaaS B. (1) - SaaS; (2) - IaaS C. (1) - SaaS; (2) - PaaS D. (1) - IaaS; (2) - SaaS E. (1) - PaaS; (2) - IaaS
B. (1) - SaaS; (2) - IaaS
Besides the executives who has the responsibility and is in charge of leading the change effort for an organization A. Configuration Manager B. Change Agent C. Change Control Analyst D. Project Sponsor E. Project Manager
B. Change Agent
Which of the following is done to verify that changes to a system/software did not impact the existing functionality of the product, and ensures the product continues to work as intended with the new changes? A. Stress Testing B. Regression Testing C. Reliability Testing D. System Testing E. Software Testing
B. Regression Testing
Purchasing a home security system to reduce the risk of an intruder entering the home is an example of what type of risk response? A. Ignore B. Avoid C. Mitigate D. Transfer E. Accept
C. Mitigate
Which of the following management activities deal with purchasing of resources and materials? A. Communication Management B. Stakeholder Management C. Procurement Management D. Human Resource Management E. Configuration Control Management
C. Procurement Management
When developing strategies to motivate adoption of change, which group(s) of people should you focus on supporting and encouraging to be on your side? In other words, don't ignore this/ these group(s). A. Reluctant Adopters B. Resistant Adopters C. Ready Adopters
C. Ready Adopters
During the implementation phase, the motivation adoption strategies should be focused on supporting and encouraging the (1)_____ to help and flip the (2)_____ to the side of the solution's adoption. A. 1 - ready adopters; 2 - resistant adopters B. 1 - reluctant adopters; 2 - ready adopters C. 1 - reluctant adopters; 2 - resistant adopters D. 1 - ready adopters; 2 - reluctant adopters E. 1 - resistant adopters; 2 - reluctant adopters
D. 1 - ready adopters; 2 - reluctant adopters
Why does resistance to change exist: A. Changes that are implemented may benefit the organization, but may not benefit certain individuals B. Changes require workers to adapt to new processes and provide more effort - which may take more time without additional compensation C. Changes excites people and everybody will want to be potential adopters, especially when everyone gets a raise D. B & C E. A & B F. All of the Above (A, B, & C)
E. A & B
Which of the following is not an acceptable way to respond to an identified risk? A. Avoid B. Mitigate C. Transfer D. Accept E. Ignore
E. Ignore
We perform ___________ in order to ensure all unacceptable characters are stripped out of user's input before it's sent to the database and saved. A. Data Entry Automation B. Input Automation C. Input Verification D. Input Validation E. Input Sanitization
E. Input Sanitization
Risk Management involves three activities which are: A. Risk Identification, Cost benefit Analysis, & Risk Response B. Secondary Risk, Residual Risk, & Total Risk C. Cyber Risk, Business Risk, & Operational Risk D. Risk Assessment, Risk Determination, Risk Mitigation E. Risk Assessment, Risk Analysis, & Risk Response
E. Risk Assessment, Risk Analysis, & Risk Response
*Match the following scenario to its corresponding implementation plan* A. Transistion Plan B. Training Plan C. Testing Plan D. Development Plan E. Acquisition Plan - A. B. C. D. E. The project team is looking for a technical solution to procure from a list of available vendors - A. B. C. D. E. The project team is looking to build a technical solution to address their business challenge - A. B. C. D. E. The project team is looking to perform activities to verify that a system they will use in the production environment, will actually perform as intended - A. B. C. D. E. The project team is looking at how they will prepare affected users of the new system - A. B. C. D. E. The project team is looking to determine the process of phasing out the old system while phasing in the new system
E. The project team is looking for a technical solution to procure from a list of available vendors D. The project team is looking to build a technical solution to address their business challenge C. The project team is looking to perform activities to verify that a system they will use in the production environment, will actually perform as intended B. The project team is looking at how they will prepare affected users of the new system A. The project team is looking to determine the process of phasing out the old system while phasing in the new system
*Match the following terms with their definitions.* 1. Challenge 2. Risk 3. Risk Response A. A constraint you must operate within, or one that impacts your available actions B. How we can reduce the probability and or impact of the risk C. The probability and impact of something occurring
1. A 2. C 3. B
*Match the different systems migration styles, locations, and modules with their correct definition* 1. Parallel Migration 2. Direct Migration 3. Whole System Migration 4. Phased Migration 5. Modular Migration 6. Pilot Migration 7. Simultaneous Migration A. The new system instantly replaces the old B. The new and old system run concurrently until the new system is proven fully capable. Then the old system is taken down C. Particular components of the new system are migrated one at a time. D. All components of the new system are migrated at the same time E. The new system is migrated in location sets. For example: the new system is migrated in the eastern US, and then the Western US F. One or a few locations are migrated to the new system first. These locations are used to detect and fix errors/anomalies. G. The new system is migrated to all locations at the same time
1. B 2. A 3. G 4. E 5. C 6. F 7. D
*Match the following terms with their definitions.* 1. Risk Management 2. Risk Assessment 3. Risk Analysis 4. Risk Response A. The process of putting a value on each potential and existing risk to determine what is the proper way to respond. This is where cost/benefit analysis happens. B. The practice of identifying, analyzing, monitoring, and responding to risk. C. The process to determine how to react to the risks so that business operations and goals can still happen. D. The process of identifying assets, threats, and vulnerabilities.
1. B 2. D 3. A 4. C
*Match the following terms with their definitions.* 1. Risk Register 2. Secondary Risk 3. Residual Risk 4. Total Risk A. When a new risk is introduced or created as a result of a risk response implementation. For example, you decide to install a home security system to protect your house from the risk of burglars and intruders. However, this may introduce a new risk of a cyber intruder hacking your home security system and watching you through your security cameras B. The amount of risk before any risk response has been implemented.This is usually calculated as Threats x Vulnerability x Asset Value. C. The amount of risk left over after a risk response has been implemented. For example, you install the home security system to protect your house from the risk of burglars and intruders. D. A list of all the risks that have been identified.
1. D 2. A 3. C 4. B
_____ documents are documentation that is collected and given to your client at the end of the project. This includes design documents, source code, training manuals, user guides, points of contacts, and customer sign-off. A. Turnover B. System review C. Architecture D. Lessons learned E. Project team review
A. Turnover
If you wanted to minimize time during system translation, what conversation strategy can you adopt?
A. Use the direct conversation style, a simultaneous conversion for all locations, and conversation of the whole system.
Which testing method is used when the internal structure, design, and implementation of the system/ software being tested is known to the tester?
A. White Box
Which of the following is not a benefit of buying a solution?
A. May not work as advertised
Which of the following determines the speed, responsiveness, capacity, and stability of a system/ software when in operation? It is used, many to find bottlenecks, lags, and other efficiency issues within a system.
A. Performance Testing
Which of the following is defined as the profitability of failure-free software operation for a specified period of time in a particular environment?
A. Reliability Testing
When designing the architecture diagram for an organization, you realize that you need a device that allows organization to communicate out to the internet, as well as accept communications from the internet. What device do you need to accomplish this? A. Router B. Firewall C. Switch D. Client / End Node E. Server
A. Router
Which of the following is true about the Project Proposal Gantt chart in our course? *Select all that apply.* A. The goal is to show the executives the high-level estimated plan from beginning to end, so that they see how the plan is aligned with their vision and they get an idea of the high-level scope, schedule, and deliverables B. Unlike a project Gantt chart that you would create in Microsoft Project during project execution, you do not need to tie any resources to the activities because you do not have any resources yet C. It is not a "work breakdown structure" style gantt chart D. It is an estimated plan because (generally) we do not know the details of the project just yet since the project has not been approved or funded - so we do not need to show sub-tasks or specific dates
A. The goal is to show the executives the high-level estimated plan from beginning to end, so that they see how the plan is aligned with their vision and they get an idea of the high-level scope, schedule, and deliverables B. Unlike a project Gantt chart that you would create in Microsoft Project during project execution, you do not need to tie any resources to the activities because you do not have any resources yet C. It is not a "work breakdown structure" style gantt chart D. It is an estimated plan because (generally) we do not know the details of the project just yet since the project has not been approved or funded - so we do not need to show sub-tasks or specific dates
When training everyday users, what do you not need to provide/ cover in the training?
A. The systems architecture of the solution
Implementation is the development of the system's design, testing it, and putting it into the production environment successfully. This also includes administrative functions (non-technical) such as training, procedure rework, and document turnover. A. True B. False
A. True
Milestones are important dates or goals within your project proposal, which are shown in the Gantt chart. They are normally indicated with a diamond or a triangle, and are used to show an important accomplishment or deliverable has been completed for the project. A. True B. False
A. True
Which of the following shows the correct progression of test types when building and testing the components of a solution? A. 1 - Unit Testing, 2 - System Testing, 3 - Integration Testing, 4 - Acceptance Testing B. 1 - Unit Testing, 2 - Integration Testing, 3 - System Testing, 4 - Acceptance Testing C. 1 - Unit Testing, 2 - Integration Testing, 3 - Acceptance Testing, 4 - System Testing D. 1 - System Testing, 2 - Unit Testing, 3 - Integration Testing, 4 - Acceptance Testing E. 1 - System Testing, 2 - Integration Testing, 3 - Unit Testing, 4 - Acceptance Testing
B. 1 - Unit Testing, 2 - Integration Testing, 3 - System Testing, 4 - Acceptance Testing
Which of the following is the correct user interface diagram process discussed in lectures? A. 1 - Interface Design Finalization; 2 - Interface Standardization; 3 - Interface Design & Storyboarding; 4 - User Requirements (Points of View) B. 1 - User Requirements (Points of View); 2 - Interface Design & Storyboarding; 3 - Interface Standardization; 4 - Interface Design Finalization A. 1 - Interface Design & Storyboarding; 2 - Interface Standardization; 3 - User Requirements (Points of View); 4 - Interface Design Finalization
B. 1 - User Requirements (Points of View); 2 - Interface Design & Storyboarding; 3 - Interface Standardization; 4 - Interface Design Finalization
A LAN is a A. Large Area Network used for a large geographical area B. Local Area Network used for a small geographical area C. Large Area Network used for a small geographical area D. Local Area Network used for a large geographical area
B. Local Area Network used for a small geographical area
Which of the following is used to outline the looks/design of the different pages and views (the user interface) of your recommended solution? Hint: It is usually used to walk through the look and feel of the recommended solution. A. An IT Architecture Diagram B. A Storyboard C. A Project Proposal D. An IT Network Diagram E. A Website in the Production Environment
B. A Storyboard
A network that uses the internet technologies to share information within an organization, and is open only to those inside the organization is called a(n) _____. A. Extranet B. Intranet C. Internet D. PrivateNet
B. Intranet
The hardware or software that allows a virtual machine to talk to his house and vice-versa is called: A. NIC Translator B. Physical Computer C. Hypervisor D. Guest E. VM
C. Hypervisor
Once the project is completed and closed out following the turnover of the solution and the project's documentation, an important concept in post implementation activities is to review what was done during the project, determining what was done right and what was done wrong, and what was expected versus what we delivered... According to our lecture, this is commonly referred to as _____ A. System Review B. Submitted Change Requests C. Lessons Learned D. Sprint Meeting E. Team Reflections
C. Lessons Learned
In this course, when we talk about User Interface Design, what is the focus of that? A. To show the client that your recommended solution will be advanced and complex to use, which is why the solution will cost a pretty penny. B. To show the current IT Infrastructure of the Organization and how it will be impacted by the recommended AS-IS solution C. To show the client that your recommended solution will be simple and easy to use, along with the power and capability that it will offer the business D. To show the current IT Infrastructure of the Organization and how it will be impacted by the recommended TO-BE solution
C. To show the client that your recommended solution will be simple and easy to use, along with the power and capability that it will offer the business
Purchasing home insurance to share the risk with the insurance company should a risk (like the house catches fire or is taken out by a tornado) becomes realized is an example of what type of risk response? A. Ignore B. Mitigate C. Transfer D. Avoid E. Accept
C. Transfer
_____ use radio waves to connect wireless clients to the wired network. Many of these use power over ethernet for electricity. A. Hubs B. Routers C. Wireless Access Points (WAPs) D. Switches
C. Wireless Access Points (WAPs)
As a small bakery business, you decide to adopt a Point of Sales System called SQUARE to process your customer's payments and manage your inventory. SQUARE would be considered _____. A. a first party product B. HIPPA compliant C. a third party product D. an internal research and development product E. a second party product
C. a third party product
A user device used to access the network and received data from the server is called a _____. These include desktops, laptops, tablets, phones, etc. A. Server B. Super Account C. Internet Browser D. Client
D. Client
Which of the following risk responses should you never use in the business world? A. Accept B. Mitigate C. Avoid D. Ignore E. Transfer
D. Ignore
When discussing Network mediums in architecture diagrams which of the following would not be considered a guided Network medium? A. CAT 6 B. Etnernet C. Fiber Optic D. Infrared E. Coaxal
D. Infrared
We perform ______ in order to ensure the accuracy of the users data entry: A. Data Entry Automation B. Input Automation C. Input Verification D. Input Validation E. Input Sanitization
D. Input Validation
When does the Lessons Learned activity take place during a project? A. System Transition B. Implementation C. Turnover D. Post Implementation E. Development
D. Post Implementation
Server virtualization involves: A. Partitioning a physical server into larger virtual servers B. Integrating AND partitioning all physical servers into the cloud C. Partitioning a physical server into the cloud servers D. Partitioning a physical server into smaller virtual servers E. Partitioning a physical server into smaller physical server
D. Partitioning a physical server into smaller virtual servers
While keeping the topic of User Interfaces in mind, match the following below to their respective categories. A. The Output B. The Navigation C. The Input D. The Interface A. B. C. D. The interaction medium between the users and the system A. B. C. D. The logical layout of the system showing how a user will move from one location to another A. B. C. D. The data given to the system by the user, or another system/process A. B. C. D. The information the system will show the users when requested
D. The interaction medium between the users and the system B. The logical layout of the system showing how a user will move from one location to another C. The data given to the system by the user, or another system/process A. The information the system will show the users when requested
The purpose of _____ design is to show how usable a system will be, and how easily it will be to learn. Many times, we can use a storyboard to demonstrate this. A. Database B. Application C. Network D. User Interface E. Architecture
D. User Interface
In this course, when we talk about IT Architecture Design, what is the focus of that? A. To show the client that your recommended solution will be simple and easy to use, along with the power and capability that it will offer the business B. To show the current IT Infrastructure of the Organization and how it will be impacted by the recommended AS-IS solution C. To show the client that your recommended solution will be advanced and complex to use, which is why the solution will cost a pretty penny. D. To show the current IT Infrastructure of the Organization and how it will be impacted by the recommended TO-BE solution
D. To show the current IT Infrastructure of the Organization and how it will be impacted by the recommended TO-BE solution
An organization has requested your team to create them a network that is specifically for the organization's employees, Partners, specific contractors. To fulfill your client's request, what kind of network do you need to design and implement? A. Internet B. Virtual Private Network (VPN) C. Intranet D. Extranet E. Wide Area Network (WAN)
E. Wide Area Network (WAN)
There are six steps to quantification according to the class slides. *Put them in the correct order beginning with step one.*
Step 1 - Understand the clients business environment Step 2 - Determine and quantify the current process Step 3 - Determine a case for change and quantify an estimated new process Step 4 - Receive approval and implement the new process Step 5 - Determine and quantify the impact of the new process Step 6 - Compare the old with the new process, and see if there is change