Quality management is the set of activities designed to make the most effective use of the people involved with a project.
False
2
New cards
Experienced project managers would manage risk by ______.
preparing alternative courses of action
3
New cards
A senior manager from the business unit most affected by a project and who ensures the project will indeed meet the needs of his or her organization is known as the project sponsor.
True
4
New cards
What topics are considered so important that they are placed on top of the strategic planning pyramid?
Mission and vision
5
New cards
The business unit most affected by the project and the one whose budget will cover the project costs is known as the _____.
sponsoring business unit
6
New cards
The use of so-called SMART goals has long been advocated by management consultants. What does the M in SMART stand for?
measurable
7
New cards
Which Internet business has "Do the right thing; don't be evil." as one of its values?
Google
8
New cards
The degree of rivalry between competitors is low in industries with many equally sized competitors or little differentiation between products.
False
9
New cards
If an organization considers its IS organization as a cost center or service provider, then its strategic planning would be inward focused.
True
10
New cards
A CEO must be heavily involved in setting high-level business objectives and defining strategies.
True
11
New cards
Typically, information systems planning is not tied to overall strategic planning.
False
12
New cards
Which of the following steps is the first step in goals-based strategic planning?
Analyze situation
13
New cards
Money from the budget for one type of cost cannot be used to pay for an item associated with another type of cost.
True
14
New cards
As the CEO of an organization, it is acceptable for you to delegate long-term decisions about the organization to a subordinate.
False
15
New cards
Your new employer wishes to use strategic planning to grow the business. Which of the following would you advise is the most essential task?
create vision/mission statement
16
New cards
Which tool is useful in identifying the interests and information needs of the stakeholders?
Stakeholder analysis matrix
17
New cards
Suppose Task C has Task A and Task B as its predecessor tasks. Task A ends on May 10th and Task B ends on May 12th. When can Task C begin?
May 13th
18
New cards
Which of the five forces in Michael Porter's model refers to entry barriers and the relative threat of new competitors?
Potential entrants
19
New cards
The probability that your employer's IS strategy is inward focused to deliver the services cheaper, faster, and better is ________.
0.11 to 0.40
20
New cards
Project management is the application of knowledge, skills, and techniques to project activities so that the allotted budget can be spent.
False
21
New cards
If an organization considers its IS organization as a cost center or service provider, then its IS goals would be to _______.
reduce IS costs
22
New cards
Suppose your business has agreed to pay a vendor for his services using a cost-plus-fixed-fee contract. This means _____.
the agreement is to reimburse the costs plus a fixed amount as fee
23
New cards
As a project manager, you would use the stakeholder analysis matrix to manage communications with external entities such as customers, vendors, and regulatory bodies.
False
24
New cards
According to a study by the Standish Group, approximately 70% of the IS projects do not succeed.
True
25
New cards
The process of switching from an old information system to a replacement system is called _____.
cutover
26
New cards
_____ requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system.
Critical analysis
27
New cards
The goals of _____ are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance.
volume testing
28
New cards
The disaster recovery plan focuses on technology recovery and identifies the people or the teams that are responsible to take action in the event of a disaster, what exactly these people will do when a disaster strikes, and the information system resources required to support critical business processes.
True
29
New cards
Suppose your business is using software that was written using FORTRAN 77. They wish to modify it to accommodate new requirements. It is a sound advice to suggest that they consider switching to a new application using newer technologies (e.g. Microsoft ASP.Net), rather than modify the current software.
True
30
New cards
_____ explains the purpose of every major piece of computer code and also identifies and describes key variables.
Technical documentation
31
New cards
Security and control considerations are a negligible part of the entire system development process.
False
32
New cards
User acceptance testing (UAT) is a critical activity that must be completed successfully before newly developed software can be rolled out to the market.
True
33
New cards
The eventual success of any system solely depends on how users work with it.
False
34
New cards
In the context of data-flow diagrams (DFDs), the _____ includes arrows that show the direction of data movement.
data-flow line
35
New cards
Tara and Zach are leading a systems development project and they want the investigation phase to go smoothly and quickly. They decide to use _____ because it will also help with the analysis and design phases.
joint application development
36
New cards
Laura is carefully estimating the time required for each phase of a proposed system development project to see if her company can meet the client's desired time for completion. Laura is checking on ___________.
schedule feasibility
37
New cards
Parallel start-up involves running a complete new system for one group of users while the rest of the users still run an old system.
False
38
New cards
Pressure to increase profitability and improve operational efficiencies often drives organizations to implement new approaches and technology.
True
39
New cards
After the software is implemented, some modification is done on the software during maintenance. Suppose the customer data analysis software used by ABC Bank was significantly changed, but no new features were added. This type of maintenance is called a _______.
release
40
New cards
Phil has been working on a new version of his company's best-selling sales management software and now he'd like to ask several co-workers and a handful of the existing version's top users to perform an acceptance test. Phil is preparing for _________.
alpha testing
41
New cards
Agile is better suited for developing larger information systems than smaller ones.
False
42
New cards
_____ involves using a new or modified system under all kinds of operating conditions.
Systems operation
43
New cards
Even if unit testing is successful, developers cannot assume they can combine individual components into a working system without any problems.
True
44
New cards
Once new software has been selected, implementation will include all of these tasks EXCEPT _________.
consulting with stakeholders to establish future needs
45
New cards
A scrum team usually consists of _________.
less than a dozen people
46
New cards
The Pareto principle is also known as the _____.
80-20 rule
47
New cards
Perceived usefulness and perceived ease of use do not have any influence in determining whether someone will use an information system.
False
48
New cards
You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing.
volume testing
49
New cards
The primary outcome of systems analysis is a prioritized list of system requirements and a recommendation of how to proceed with a project.
True
50
New cards
Which of the following is a vendor of popular anti-virus software?
Symantec
51
New cards
A virus can reside in a file (or many files) on the hard drive, but it would not be active in memory. As such, it is not as important to scan live memory as it is to scan the hard drive.
False
52
New cards
Macro viruses are called so because they are written using a macro language.
True
53
New cards
If an attack is dangerous enough, it may warrant shutting down or disconnecting critical systems from the network.
True
54
New cards
An attack that takes place before the security community and/or software developers become aware of and fix a security vulnerability is called the 'zero-day attack.'
True
55
New cards
On the back of a credit card the three-digit number above the signature panel is used to _____.
verify the card is legitimate and not a stolen card number
56
New cards
As the complexity of a network increases, the possibility of security breaches decreases.
False
57
New cards
There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events?
activate the forensics analysis team and prepare documentation
58
New cards
There are laws that require businesses to prove that their data is secure.
True
59
New cards
The US-CERT incident reporting system is used to ____.
alert the Department of Homeland Security about information security incidents
60
New cards
Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n) _______.
black hat hacker
61
New cards
This harmful malware is triggered by a specific event, such as Friday the 13th.
Logic bomb
62
New cards
A zombie computer would send requests to access to the target site again and again.
True
63
New cards
You see a deceptive pop-up that says your computer is infected and that you must visit a compromised web site where you pay them to clean your computer. You have just become a victim of ransomware.
True
64
New cards
The computer is running, but not responding to your keyboard inputs. You find that the network activities are running very slowly. You have probably been hit by a rootkit.
True
65
New cards
Spam emails make up only a small proportion (
False
66
New cards
Once a _____ is installed, the attacker can gain full access to the computer.
botnet
67
New cards
A botnet is a ____.
network of computers that send out access requests to servers repeatedly
68
New cards
You had used an online service to apply for a credit card. As part of the process, you submitted your personal information such as SSN, date of birth, employer information, etc. Soon after you started receiving bills for items you did not purchase. You have become a victim of ________.
identity theft
69
New cards
An employee who is marked for a lay-off sent threatening emails to his boss, stating that he is going to delete sensitive data. This employee can be charged under the Computer Fraud and Abuse Act.
True
70
New cards
During a recent brainstorming session, one of Franklin's co-workers suggested that their company could sell some of the data contained in its customer databases to earn extra revenue for the business. As a long-time member of the ACM (Association for Computing Machinery), Franklin is opposed to the idea because it violates which of the following imperatives in the ACM code of ethics?
Respect the privacy of others
71
New cards
Suppose you have been receiving unsolicited phone calls from telemarketers. Which agency should you contact to prevent these 'junk' calls?
The Federal Trade Commission
72
New cards
Laws and regulations have thoroughly addressed concerns about privacy and data management in private organizations and federal agencies.
False
73
New cards
The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation.
USA Patriot Act of 2001
74
New cards
Computer-related mistakes include organizations operating unintegrated information systems and acquiring redundant systems.
False
75
New cards
Never send sensitive personal data such as credit card numbers, bank account numbers, or passwords via text or IM; only send them by email.
False
76
New cards
In a recent survey of 2100 human resource professionals, which two activities were listed as the biggest "productivity killers" in the workplace?
personal cell phone use and Internet surfing
77
New cards
The term "ethics" refers to an individual's personal beliefs about right and wrong, whereas the term "morals" describes standards or codes of behavior expected of an individual by a group, such as a nation, organization, or profession.
False
78
New cards
Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon?
weighing options
79
New cards
It is illegal for companies to buy and sell personal data collected through marketing and sales efforts.
False
80
New cards
The pages on a university's website are maintained by individual departments and organizational units. It is a useful policy to require that every change a user makes to his department pages be reviewed and approved.
True
81
New cards
Many workers claim their right to privacy trumps their employers' right to monitor employee use of IS resources.
True
82
New cards
While giving her students a physics exam, Professor Thompson noticed that Jack, one of her students who has been struggling with the course material, appeared to be copying answers from Graydon, one of the best students in the class. She decides that she should compare their answers when the class period is over before deciding what to do about the situation. In which phase of the ethical decision-making process is Professor Thompson?
gathering information
83
New cards
U.S. federal law permits employers to monitor email sent and received by employees.
True
84
New cards
If an activity is defined as legal then it is ethical.
False
85
New cards
A job that requires sitting at a desk and using a computer for many hours a day qualifies as a sedentary job.
True
86
New cards
A recent study conducted by the University of Nevada revealed that cyberloafing (wasting time online) costs U.S. businesses more than _____ annually.
$85 billion
87
New cards
The use of computers in the workplace is a double-edged sword for workers. While they help to increase productivity and efficiency, they can also raise concerns about privacy and health issues.
True
88
New cards
Organizations continue to operate their businesses using integrated information systems that lead to missed opportunities, increased costs, and lost sales.
False
89
New cards
RFID chips embedded in objects generate radio transmissions that allow people to track the location and other associated data of those objects. It's been suggested that RFID chips be implanted ________.
- in all humans to give medical professionals instant access to medical records and conditions - in children to enable parents to find them if lost - in criminals to allow law enforcement agents to find them if needed All of the above
90
New cards
Heavy computer users who experience red, dry, itchy eyes should _____.
consider the use of artificial tears
91
New cards
The use of e-mail among public officials might violate "open meeting" laws.
True
92
New cards
As a Google user, your search history data can be accessed by the NSA and the FBI without obtaining court orders.
True
93
New cards
If a worker is seated at a desk using a keyboard, the height of the surface holding the keyboard and mouse should be 1 or 2 inches above the worker's thighs so that his or her wrists are nearly straight.
True
94
New cards
_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior.
Code of ethics
95
New cards
In order to protect the privacy of employees, email messages that have been erased from hard disks cannot be retrieved.
False
96
New cards
In one court case, a hospital employee, who had been fired for showing coworkers sexually explicit photos on a hospital computer, sued his former employer for wrongful termination. What did the court rule and why?
The hospital won the case because the court stated that the employee did not have a reasonable expectation of privacy when using the hospital's computer at work
97
New cards
You are involved in an Information Systems project. The project's scope has widened, but there is no change in cost, quality, and user expectations. This will result in an increase in time taken to complete the project.
True
98
New cards
Project integration management is perhaps the most important knowledge area because it requires the assimilation of all eight other project management knowledge areas.
True
99
New cards
Which type of IS project has the highest risk of failure?
Breakthrough
100
New cards
Suppose the 'User interface design' phase of the project has a high probability of not meeting the quality requirements; however, it has significant potential impact on the overall project. It is advisable to find and assign a risk owner for this part of the project.