Exam 3 Quizlet

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/105

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

106 Terms

1
New cards
You are involved in an Information Systems project. The project's scope has widened, but there is no change in cost, quality, and user expectations. This will result in an increase in time taken to complete the project.
True
2
New cards
​Experienced project managers would manage risk by \______.
Preparing alternative courses of action
3
New cards
Organic strategic planning defines the organization's vision and values and then identifies projects and initiatives that will achieve the vision while adhering to the values.
True
4
New cards
​\_________ involves the generation, collection, dissemination, and storage of project information in a timely and effective manner.
Communication management
5
New cards
​Suppose the industry your business is in has 10 buyers but 50 sellers. This means there is a low bargaining power of buyers.
False
6
New cards
Which of the following is considered an "expense" among typical IS project-related costs?
Consultant charges
7
New cards
Suppose Task C has Task A and Task B as its predecessor tasks. Task A ends on May 10th and Task B ends on May 12th. When can Task C begin?
May 13th
8
New cards
​The organization's \_____ is stated in a challenging manner to inspire employees, customers, and shareholders.
​Mission statement
9
New cards
​Suppose the 'User interface design' phase of the project has a high probability of not meeting the quality requirements; however, it has significant potential impact on the overall project. It is advisable to find and assign a risk owner for this part of the project.
True
10
New cards
​The probability that your employer's IS strategy is inward focused to deliver the services cheaper, faster, and better is \________.
0.11 to 0.40
11
New cards
This type of strategic planning defines the organization's vision and values and then identifies projects and initiatives to achieve the vision while adhering to the values.
Organic strategic planning
12
New cards
​If an organization considers its IS organization as a cost center or service provider, then its strategic planning would be inward focused.
True
13
New cards
​If an organization considers its IS organization as a cost center or service provider, then its IS goals would be to \_______.
Reduce IS costs
14
New cards
​A useful model to describe how teams develop is the forming-storming-norming-performing-\___________ model.
Adjourning
15
New cards
​A senior manager from the business unit most affected by a project and who ensures the project will indeed meet the needs of his or her organization is known as the project sponsor.
True
16
New cards
The use of so-called SMART goals has long been advocated by management consultants. What does the M in SMART stand for​?
Measurable
17
New cards
A CEO must be heavily involved in setting high-level business objectives and defining strategies.
True
18
New cards
Activities related to the acquisition of goods and/or services for a project from sources outside the organization make up \_______.
​Procurement management
19
New cards
Organic strategic planning defines the organization's vision and values and then identifies projects and initiatives that will achieve the vision while adhering to the values.
True
20
New cards
​The business unit most affected by the project and the one whose budget will cover the project costs is known as the \_____.
Sponsoring business unit
21
New cards
​Which of the following is considered an "expense" among typical IS project-related costs?
Consultant charges
22
New cards
​As a project manager, you would use the stakeholder analysis matrix to manage communications with external entities such as customers, vendors, and regulatory bodies.
False
23
New cards
​Strategic planning has a clearly defined direction to guide decision making at all levels throughout the organization.
True
24
New cards
\_______ is a set of activities that includes defining an achievable completion date that is acceptable to the project stakeholders, developing a workable project schedule, and ensuring the timely completion of the project.
Time management
25
New cards
​Your new employer wishes to use strategic planning to grow the business. Which of the following would you advise is the most essential task?
Create vision/Mission statement
26
New cards
Organic strategic planning defines the organization's vision and values and then identifies projects and initiatives that will achieve the vision while adhering to the values.
True
27
New cards
A senior manager from the business unit most affected by a project and who ensures the project will indeed meet the needs of his or her organization is known as the project sponsor.
True
28
New cards
Unit testing uncovers any defects in the interface between individual components of an information system.
False
29
New cards
The primary outcome of systems analysis is a prioritized list of system requirements and a recommendation of how to proceed with a project.
True
30
New cards
Once new software has been selected, implementation will include all of these tasks EXCEPT \_________.
consulting with stakeholders to establish future needs
31
New cards
Monitoring is the process of analyzing systems to make sure they are operating as intended.
False
32
New cards
\_____ creates a complete set of technical specifications that can be used to construct an information system.
​Systems design
33
New cards
\_____ determines whether the expected benefits associated with a project outweigh the expected costs sufficiently to make the project financially attractive.
​Economic feasibility
34
New cards
A data flow diagram (DFD) does not provide any information about process timing.
True
35
New cards
You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing \_____ testing.
Volume testing
36
New cards
​A \_____ is a description of the logical and physical structure of data and the relationships among the data for each user.
Schema
37
New cards
Tara and Zach are leading a systems development project and they want the investigation phase to go smoothly and quickly. They decide to use \_____ because it will also help with the analysis and design phases.
​Joint application development
38
New cards
The process of switching from an old information system to a replacement system is called \_____.
Cutover
39
New cards
Which of the following statements is true of user acceptance testing (UAT)?
UAT must be completed successfully before newly developed software can be rolled out to the market.
40
New cards
Waterfall and agile are the two types of software development processes available to organizations.
False
41
New cards
Perceived usefulness and perceived ease of use do not have any influence in determining whether someone will use an information system.
False
42
New cards
Suppose your business is using software that was written using FORTRAN 77. They wish to modify it to accommodate new requirements. It is a sound advice to suggest that they consider switching to a new application using newer technologies (e.g. Microsoft ASP.Net), rather than modify the current software.
True
43
New cards
Even if unit testing is successful, developers cannot assume they can combine individual components into a working system without any problems.
True
44
New cards
A new \_____ is a major program change, typically encompassing many new features.
Version
45
New cards
The goals of \_____ are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance.
volume testing
46
New cards
While discussing the preliminary feasibility of a project, your colleague insists that figures used in economic feasibility be very accurate down to the last cent. His claim is appropriate and not uncommon.
False
47
New cards
A \_____ is a description of the logical and physical structure of data and the relationships among the data for each user.
​Schema
48
New cards
\_____ involves running a complete new system for one group of users rather than all users.
Pilot start-up
49
New cards
For a small system, site preparation can be as simple as rearranging the furniture in an office to make room for a computer.
True
50
New cards
One of the significant drawbacks to building a custom system is the high cost compared to off-the-shelf software.
True
51
New cards
​In the context of data-flow diagrams (DFDs), the \_____ includes arrows that show the direction of data movement.
Data-flow line
52
New cards
All members of a system investigation team must be co-located to ensure a successful start to a project.
False
53
New cards
\_____ involves using a new or modified system under all kinds of operating conditions.
Systems operation
54
New cards
​Operational feasibility takes into account the need to meet certain system performance requirements that are considered important to system users and stakeholders.
True
55
New cards
​Downloading games from unknown websites can be risky. The software may be a Trojan horse.
True
56
New cards
Which of these organizations offers guidelines on developing security policies?
SANS
57
New cards
​A strong security program begins by assessing the backgrounds of the employees in the organization.
False
58
New cards
​Your business has a web server that has suddenly become unresponsive. When you study the server's logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of \_____.
A denial-of-service attack
59
New cards
There are laws that require businesses to prove that their data is secure.
True
60
New cards
​The second phase of an Advanced Persistent Threat attack is \_____.
Incursion
61
New cards
These days, the biggest threats to IT security are from \________.
organized groups that have ample resources, including money and sophisticated tools, to support their efforts
62
New cards
On the back of a credit card the three-digit number above the signature panel is used to \_____.
​Verify the card is legitimate and not a stolen card number
63
New cards
Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n) \_______.
Black hat hacker
64
New cards
Transmitting a program, code, or command that causes harm to a computer is a crime.
True
65
New cards
You had used an online service to apply for a credit card. As part of the process, you submitted your personal information such as SSN, date of birth, employer information, etc. Soon after you started receiving bills for items you did not purchase. You have become a victim of \________.
Identity theft
66
New cards
Which of the following is NOT a popular vendor of firewall software?
Red Hat
67
New cards
​The US-CERT incident reporting system is used to \____.
​Alert the Department of Homeland Security about information security incidents
68
New cards
In a denial-of-service (DDoS) attack, the perpetrator \____.
Instructs the zombie computers to send simple access requests to target computers
69
New cards
​You have been hired as the new Information Security consultant at XYZ Inc. Which of these employee behaviors would be a top security concern?
Leaving laptop computers unattended in public spaces
70
New cards
A botnet is a \____.
Network of computers that send out access requests to servers repeatedly
71
New cards
​Discovery of a vulnerability in a software program can potentially be sold to the government.
True
72
New cards
​The computer is running, but not responding to your keyboard inputs. You find that the network activities are running very slowly. You have probably been hit by a rootkit.
True
73
New cards
Spear-phishing is when the phisher sends fraudulent emails to a certain organization's employees.
True
74
New cards
A strong security program begins by assessing the backgrounds of the employees in the organization.
False
75
New cards
​There are laws that require businesses to prove that their data is secure.
True
76
New cards
There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events?
Activate the forensics analysis team and prepare documentation
77
New cards
Which of the following is the correct description of a firewall?
It is a software and hardware combination that limits the incoming and outgoing Internet traffic.
78
New cards
​If an attack is dangerous enough, it may warrant shutting down or disconnecting critical systems from the network.
True
79
New cards
​You see a deceptive pop-up that says your computer is infected and that you must visit a compromised web site where you pay them to clean your computer. You have just become a victim of ransomware.
True
80
New cards
Miranda works at a small-batch soda pop manufacturing plant. For eight hours a day, she uses her right hand to lift individual bottles of soda pop off the production line and place them in packing crates. Lately her right elbow has been hurting, so she visited her doctor, who diagnosed her with \_______.
A repetitive strain injury.
81
New cards
Which of the following statements is true of the E-Government Act of 2002?
It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people.
82
New cards
If a worker is seated at a desk using a keyboard, the height of the surface holding the keyboard and mouse should be 1 or 2 inches above the worker's thighs so that his or her wrists are nearly straight.
True
83
New cards
IS professionals believe that their field offers few opportunities for unethical behavior.
False
84
New cards
The \_____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation.
USA Patriot Act of 2001
85
New cards
It is illegal for companies to buy and sell personal data collected through marketing and sales efforts.
False
86
New cards
\_____ involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation.
Libel
87
New cards
Which of the following is a useful policy to minimize waste and mistakes?
Users should implement proper procedures to ensure correct input data.
88
New cards
Which of the following is a computer-related mistake?
Mishandling computer outputs.
89
New cards
U.S. federal law permits employers to monitor email sent and received by employees.
True
90
New cards
Federal law permits employers to monitor their employees' use of company-owned computer equipment, specifically \_______.
all of these answers
91
New cards
Two primary causes of computer-related health problems are a poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes.
True
92
New cards
As a Google user, your search history data can be accessed by the NSA and the FBI without obtaining court orders.
True
93
New cards
In today's workplace, most employers issue a policy stating that they will monitor employees' use of any company-owned computer, server, or email system, thus eliminating any expectation of privacy. How many organizations actually monitor, retain, and review employees' emails?​
About half
94
New cards
​The pages on a university's website are maintained by individual departments and organizational units. It is a useful policy to require that every change a user makes to his department pages be reviewed and approved.
True
95
New cards
Training and incentives are the keys to the successful acceptance and implementation of policies and procedures governing waste and error prevention.​
False
96
New cards
In a recent survey of 2100 human resource professionals, which two activities were listed as the biggest "productivity killers" in the workplace?​
Personal cell phone use and Internet surfing
97
New cards
\_____ is is an inflammation of the nerve that connects the forearm to the palm of the wrist.
Carpal tunnel syndrome (CTS)
98
New cards
In the U.S., there is some debate over privacy between those who favor data collection as a means to increase national security and those who view such programs as a violation of rights guaranteed by the Constitution and the Bill of Rights.​
True
99
New cards
Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend​ and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon?
Weighing options
100
New cards
​Suppose you have been receiving unsolicited phone calls from telemarketers. Which agency should you contact to prevent these 'junk' calls?
​The Federal Trade Commission