BUSI 3610 Ch 11-14

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Quality management is the set of activities designed to make the most effective use of the people involved with a project.

1 / 167

flashcard set

Earn XP

Description and Tags

168 Terms

1

Quality management is the set of activities designed to make the most effective use of the people involved with a project.

False

New cards
2

Experienced project managers would manage risk by ______.

preparing alternative courses of action

New cards
3

A senior manager from the business unit most affected by a project and who ensures the project will indeed meet the needs of his or her organization is known as the project sponsor.

True

New cards
4

What topics are considered so important that they are placed on top of the strategic planning pyramid?

Mission and vision

New cards
5

​The business unit most affected by the project and the one whose budget will cover the project costs is known as the _____.

sponsoring business unit

New cards
6

The use of so-called SMART goals has long been advocated by management consultants. What does the M in SMART stand for​?

measurable

New cards
7

Which Internet business has "Do the right thing; don't be evil." as one of its values?

Google

New cards
8

The degree of rivalry between competitors is low in industries with many equally sized competitors or little differentiation between products.

False

New cards
9

​If an organization considers its IS organization as a cost center or service provider, then its strategic planning would be inward focused.

True

New cards
10

A CEO must be heavily involved in setting high-level business objectives and defining strategies.

True

New cards
11

Typically, information systems planning is not tied to overall strategic planning.

False

New cards
12

​Which of the following steps is the first step in goals-based strategic planning?

Analyze situation

New cards
13

Money from the budget for one type of cost cannot be used to pay for an item associated with another type of cost.

True

New cards
14

As the ​CEO of an organization, it is acceptable for you to delegate long-term decisions about the organization to a subordinate.

False

New cards
15

Your new employer wishes to use strategic planning to grow the business. Which of the following would you advise is the most essential task?

create vision/mission statement

New cards
16

Which tool is useful in identifying the interests and information needs of the stakeholders?

Stakeholder analysis matrix

New cards
17

​Suppose Task C has Task A and Task B as its predecessor tasks. Task A ends on May 10th and Task B ends on May 12th. When can Task C begin?

May 13th

New cards
18

Which of the five forces in Michael Porter's model refers to entry barriers and the relative threat of new competitors?

Potential entrants

New cards
19

The probability that your employer's IS strategy is inward focused to deliver the services cheaper, faster, and better is ________.

0.11 to 0.40

New cards
20

Project management is the application of knowledge, skills, and techniques to project activities so that the allotted budget can be spent.

False

New cards
21

​If an organization considers its IS organization as a cost center or service provider, then its IS goals would be to _______.

reduce IS costs

New cards
22

Suppose your business has agreed to pay a vendor for his services using a cost-plus-fixed-fee contract. This means _____.

​the agreement is to reimburse the costs plus a fixed amount as fee

New cards
23

As a project manager, you would use the stakeholder analysis matrix to manage communications with external entities such as customers, vendors, and regulatory bodies.

False

New cards
24

​According to a study by the Standish Group, approximately 70% of the IS projects do not succeed.

True

New cards
25

The process of switching from an old information system to a replacement system is called _____.

cutover

New cards
26

_____ requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system.

Critical analysis

New cards
27

The goals of _____ are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance.

volume testing

New cards
28

The disaster recovery plan focuses on technology recovery and identifies the people or the teams that are responsible to take action in the event of a disaster, what exactly these people will do when a disaster strikes, and the information system resources required to support critical business processes.

True

New cards
29

Suppose your business is using software that was written using FORTRAN 77. They wish to modify it to accommodate new requirements. It is a sound advice to suggest that they consider switching to a new application using newer technologies (e.g. Microsoft ASP.Net), rather than modify the current software.

True

New cards
30

_____ explains the purpose of every major piece of computer code and also identifies and describes key variables.

Technical documentation

New cards
31

Security and control considerations are a negligible part of the entire system development process.

False

New cards
32

User acceptance testing (UAT) is a critical activity that must be completed successfully before newly developed software can be rolled out to the market.

True

New cards
33

The eventual success of any system solely depends on how users work with it.

False

New cards
34

​In the context of data-flow diagrams (DFDs), the _____ includes arrows that show the direction of data movement.

data-flow line

New cards
35

Tara and Zach are leading a systems development project and they want the investigation phase to go smoothly and quickly. They decide to use _____ because it will also help with the analysis and design phases.

joint application development

New cards
36

Laura is carefully estimating the time required for each phase of a proposed system development project to see if her company can meet the client's desired time for completion. Laura is checking on ___________.

schedule feasibility

New cards
37

Parallel start-up involves running a complete new system for one group of users while the rest of the users still run an old system.

False

New cards
38

Pressure to increase profitability and improve operational efficiencies often drives organizations to implement new approaches and technology.

True

New cards
39

After the software is implemented, some modification is done on the software during maintenance. Suppose the customer data analysis software used by ABC Bank was significantly changed, but no new features were added. This type of maintenance is called a _______.

release

New cards
40

Phil has been working on a new version of his company's best-selling sales management software and now he'd like to ask several co-workers and a handful of the existing version's top users to perform an acceptance test. Phil is preparing for _________.

alpha testing

New cards
41

Agile is better suited for developing larger information systems than smaller ones.

False

New cards
42

_____ involves using a new or modified system under all kinds of operating conditions.

Systems operation

New cards
43

Even if unit testing is successful, developers cannot assume they can combine individual components into a working system without any problems.

True

New cards
44

Once new software has been selected, implementation will include all of these tasks EXCEPT _________.

consulting with stakeholders to establish future needs

New cards
45

A scrum team usually consists of _________.

less than a dozen people

New cards
46

The Pareto principle is also known as the _____.

80-20 rule

New cards
47

Perceived usefulness and perceived ease of use do not have any influence in determining whether someone will use an information system.

False

New cards
48

You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing.

volume testing

New cards
49

The primary outcome of systems analysis is a prioritized list of system requirements and a recommendation of how to proceed with a project.

True

New cards
50

Which of the following is a vendor of popular anti-virus software?

Symantec

New cards
51

A virus can reside in a file (or many files) on the hard drive, but it would not be active in memory. As such, it is not as important to scan live memory as it is to scan the hard drive.

False

New cards
52

Macro viruses are called so because they are written using a macro language.

True

New cards
53

If an attack is dangerous enough, it may warrant shutting down or disconnecting critical systems from the network.

True

New cards
54

​An attack that takes place before the security community and/or software developers become aware of and fix a security vulnerability is called the 'zero-day attack.'

True

New cards
55

On the back of a credit card the three-digit number above the signature panel is used to _____.

verify the card is legitimate and not a stolen card number

New cards
56

As the complexity of a network increases, the possibility of security breaches decreases.

False

New cards
57

There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events?

activate the forensics analysis team and prepare documentation

New cards
58

There are laws that require businesses to prove that their data is secure.

True

New cards
59

​The US-CERT incident reporting system is used to ____.

alert the Department of Homeland Security about information security incidents

New cards
60

Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n) _______.

black hat hacker

New cards
61

​This harmful malware is triggered by a specific event, such as Friday the 13th.

Logic bomb

New cards
62

A zombie computer would send requests to access to the target site again and again.

True

New cards
63

You see a deceptive pop-up that says your computer is infected and that you must visit a compromised web site where you pay them to clean your computer. You have just become a victim of ransomware.

True

New cards
64

The computer is running, but not responding to your keyboard inputs. You find that the network activities are running very slowly. You have probably been hit by a rootkit.

True

New cards
65

Spam emails make up only a small proportion (<10%) of emails.

False

New cards
66

Once a _____ is installed, the attacker can gain full access to the computer.

botnet

New cards
67

A botnet is a ____.

​network of computers that send out access requests to servers repeatedly

New cards
68

You had used an online service to apply for a credit card. As part of the process, you submitted your personal information such as SSN, date of birth, employer information, etc. Soon after you started receiving bills for items you did not purchase. You have become a victim of ________.

identity theft

New cards
69

​An employee who is marked for a lay-off sent threatening emails to his boss, stating that he is going to delete sensitive data. This employee can be charged under the Computer Fraud and Abuse Act.

True

New cards
70

During a recent brainstorming session, one of Franklin's co-workers suggested that their company could sell some of the data contained in its customer databases to earn extra revenue for the business. As a long-time member of the ACM (Association for Computing Machinery), Franklin is opposed to the idea because it violates which of the following imperatives in the ACM code of ethics?

Respect the privacy of others

New cards
71

Suppose you have been receiving unsolicited phone calls from telemarketers. Which agency should you contact to prevent these 'junk' calls?

​The Federal Trade Commission

New cards
72

Laws and regulations have thoroughly addressed concerns about privacy and data management in private organizations and federal agencies.​

False

New cards
73

The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation.

USA Patriot Act of 2001

New cards
74

Computer-related mistakes include organizations operating unintegrated information systems and acquiring redundant systems.

False

New cards
75

Never send sensitive personal data such as credit card numbers, bank account numbers, or passwords via text or IM; only send them by email.​

False

New cards
76

In a recent survey of 2100 human resource professionals, which two activities were listed as the biggest "productivity killers" in the workplace?​

personal cell phone use and Internet surfing

New cards
77

The term "ethics" refers to an individual's personal beliefs about right and wrong, whereas the term "morals" describes standards or codes of behavior expected of an individual by a group, such as a nation, organization, or profession.​

False

New cards
78

Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend​ and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon?

weighing options

New cards
79

It is illegal for companies to buy and sell personal data collected through marketing and sales efforts.​

False

New cards
80

The pages on a university's website are maintained by individual departments and organizational units. It is a useful policy to require that every change a user makes to his department pages be reviewed and approved.

True

New cards
81

Many workers claim their right to privacy trumps their employers' right to monitor employee use of IS resources.

True

New cards
82

While giving her students a physics exam, Professor Thompson noticed that Jack, one of her students who has been struggling with the course material, appeared to be copying answers from Graydon, one of the best students in the class. She decides that she should compare their answers when the class period is over before deciding what to do about the situation. In which phase of the ethical decision-making process is Professor Thompson?

​gathering information

New cards
83

U.S. federal law permits employers to monitor email sent and received by employees.

True

New cards
84

If an activity is defined as legal then it is ethical.

False

New cards
85

A job that requires sitting at a desk and using a computer for many hours a day qualifies as a sedentary job.

True

New cards
86

A recent study conducted by the University of Nevada revealed that cyberloafing (wasting time online) costs U.S. businesses more than _____ annually.

$85 billion

New cards
87

The use of computers in the workplace is a double-edged sword for workers. While they help to increase productivity and efficiency, they can also raise concerns about privacy and health issues.​

True

New cards
88

Organizations continue to operate their businesses using integrated information systems that lead to missed opportunities, increased costs, and lost sales.

False

New cards
89

RFID chips embedded in objects generate radio transmissions that allow people to track the location and other associated data of those objects. It's been suggested that RFID chips be implanted ________.

  • ​in all humans to give medical professionals instant access to medical records and conditions

  • in children to enable parents to find them if lost

  • in criminals to allow law enforcement agents to find them if needed All of the above

New cards
90

Heavy computer users who experience red, dry, itchy eyes should _____.

consider the use of artificial tears

New cards
91

The use of e-mail among public officials might violate "open meeting" laws.

True

New cards
92

As a Google user, your search history data can be accessed by the NSA and the FBI without obtaining court orders.

True

New cards
93

If a worker is seated at a desk using a keyboard, the height of the surface holding the keyboard and mouse should be 1 or 2 inches above the worker's thighs so that his or her wrists are nearly straight.

True

New cards
94

_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior.

Code of ethics

New cards
95

In order to protect the privacy of employees, email messages that have been erased from hard disks cannot be retrieved.

False

New cards
96

In one court case, a hospital employee, who had been fired for showing coworkers sexually explicit photos on a hospital computer, sued his former employer for wrongful termination. What did the court rule and why?​

The hospital won the case because the court stated that the employee did not have a reasonable expectation of privacy when using the hospital's computer at work

New cards
97

You are involved in an Information Systems project. The project's scope has widened, but there is no change in cost, quality, and user expectations. This will result in an increase in time taken to complete the project.

True

New cards
98

Project integration management is perhaps the most important knowledge area because it requires the assimilation of all eight other project management knowledge areas.

True

New cards
99

Which type of IS project has the highest risk of failure?

Breakthrough

New cards
100

Suppose the 'User interface design' phase of the project has a high probability of not meeting the quality requirements; however, it has significant potential impact on the overall project. It is advisable to find and assign a risk owner for this part of the project.

True

New cards

Explore top notes

note Note
studied byStudied by 38 people
... ago
4.0(1)
note Note
studied byStudied by 652 people
... ago
5.0(2)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 63 people
... ago
5.0(1)
note Note
studied byStudied by 15 people
... ago
5.0(1)
note Note
studied byStudied by 10 people
... ago
5.0(1)
note Note
studied byStudied by 1 person
... ago
5.0(1)
note Note
studied byStudied by 132 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (312)
studied byStudied by 9 people
... ago
5.0(1)
flashcards Flashcard (156)
studied byStudied by 20 people
... ago
5.0(2)
flashcards Flashcard (68)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (24)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 22 people
... ago
5.0(1)
flashcards Flashcard (47)
studied byStudied by 14 people
... ago
5.0(1)
flashcards Flashcard (58)
studied byStudied by 8 people
... ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 5 people
... ago
5.0(1)
robot