Quiz 5

Ace your homework & exams now with Quizwiz!

In which of the following phases should you expect to be most involved as a general or functional manager? Select one: a. Definition b. Build c. Implementation d. A and B e. A and C

A and C

Which of the following is not one of the advantages related to making your own systems? Select one: a. Unique Tailoring b. Flexibility c. Control d. Faster Roll-Out e. All of these are advantages

Faster Roll-Out

Which stage of the SDLS typically results in a "go" or "no-go" decision? Select one: a. Feasibility Analysis b. Systems Analysis c. System Design d. Programming e. Testing

Feasibility Analysis

When a company is faced with a security threat, they have which three strategies available to them? Select one: a. Acceptance, avoidance, and transference b. Acceptance, reduction, and transference c. Avoidance, reduction, and transference d. Acceptance, avoidance, and reduction e. All of the above

Acceptance, reduction, and transference

The IS department workers that experts in both technology and the business processes are called what? Select one: a. Programmers b. Analysts c. Functional Managers d. Help Desk Personnel e. Technicians.

Analysts

Which of the following is an example of an internal threat? Select one: a. Viruses b. Intrusions c. Social Engineering d. Backdoors e. Angry Employees

Angry Employees

Which of the following terms is related to the ability to overlay information on top of a photograph? Select one: a. Location Based Social Networking b. Augmented Reality c. Green IS d. Online Analytical Processing (OLAP) e. Digital Data Genesis

Augmented Reality

Which of the following refers to code built into a program to allow the programmer a way to bypass password protection? Select one: a. Password Spoofing b. Bugs c. Viruses d. Phishing e. Backdoors

Backdoors

Which of the following are considered general classes of activities organizations adopt to exploit? Select one: a. Process-to-analyze b. Process-to-actuate c. Assimilate-to-analyze d. Both A and B e. Both B and C

Both B and C

Free software is always open source. Select one: True False

False

Function Creep, when used in terms of privacy risks, refers to new technological advances and devices that generate more data than ever.

False

Green IS initiatives are costly and hamper the firm's quest for profits and growth. Select one: True False

False

Malicious cyberactivity is decreasing due to improvements in software protection systems. Select one: True

False

Which of the following is not considered a basic elements describing an event? Select one: a. Who b. What c. When d. Where e. How much

How much

Why is security considered a negative deliverable? Select one: a. It costs money b. It produces only tangible benefits c. It does not affect profits whether it is done well or poorly d. It is largely ignored e. It produces no revenue or efficiency

It produces no revenue or efficiency

Which of the following terms relates to the ability to complete commercial transactions using mobile devices, such as smartphones and tablets? Select one: a. Machine commerce b. Context Aware commerce c. Portable commerce d. Ubiquitous commerce e. Mobile commerce

Mobile commerce

Which of the following are not approaches to acquisition of information processing functionalities? Select one: a. Custom Design b. Custom Development c. System Selection and Acquisition d. End-user Development e. Open Source Development

Open Source Development

A bank upgrades the computer systems of its branches, one branch at a time. This is most likely which of the following migration strategies? Select one: a. Parallel b. Direct c. Phased d. Pilot e. Traditional

Phased

Which of the following is an automated method of seeking passwords? Select one: a. Phishing b. Social Engineering c. Software bugs d. Backdoors e. Careless behavior

Phishing

A bank upgrades a computer system at one of its branches. If this works correctly, then the upgraded system will be installed at the other branches. Which migration approach is this most likely related to? Select one: a. Parallel b. Direct c. Phased d. Pilot e. Traditional

Pilot

Risk Audit provides the basis for: Select one: a. Risk Reduction b. Risk Transference c. Risk Analysis d. Reward Mechanism e. Risk increase

Risk Analysis

Why is the Systems development Life Cycle methodology typically referred to as "the waterfall model"? Select one: a. Because it was first popularized in a town with many waterfalls b. To stress the fact that phases are sequential and iteration (or going back) should be c. Because the SDLC, like prototyping, is not iterative. d. To convey the notion that getting good user requirements is important and there should be multiple opportunities to elicit user requirements e. B and D

To stress the fact that phases are sequential and iteration (or going back) should be

Which of the following terms relates to being able to use your device anywhere, at any time? Select one: a. Identifiability b. Context Awareness c. Portability d. Ubiquity e. Ruggedness

Ubiquity

Which of the following is not one of the advantages related to purchasing an off-the-shelf system? Select one: a. Unique Tailoring b. Faster Roll-Out c. Knowledge Infusion d. Economical Attractiveness e. High Quality

Unique Tailoring

Which of the following terms is NOT used to define smart devices capabilities? Select one: a. Control b. Monitoring c. Usability d. Autonomy e. Optimization

Usability


Related study sets

16 Types of Identification Methods

View Set

How to Cook Rice, Grains, and Beans

View Set

Explorers (john cabot, robert de la salle, samuel de champlain, & francisco coronado)

View Set

Tab Settings and Paragraph Formatting

View Set