Quality management is the set of activities designed to make the most effective use of the people involved with a project.
False
Experienced project managers would manage risk by ______.
preparing alternative courses of action
A senior manager from the business unit most affected by a project and who ensures the project will indeed meet the needs of his or her organization is known as the project sponsor.
True
What topics are considered so important that they are placed on top of the strategic planning pyramid?
Mission and vision
The business unit most affected by the project and the one whose budget will cover the project costs is known as the _____.
sponsoring business unit
The use of so-called SMART goals has long been advocated by management consultants. What does the M in SMART stand for?
measurable
Which Internet business has "Do the right thing; don't be evil." as one of its values?
The degree of rivalry between competitors is low in industries with many equally sized competitors or little differentiation between products.
False
If an organization considers its IS organization as a cost center or service provider, then its strategic planning would be inward focused.
True
A CEO must be heavily involved in setting high-level business objectives and defining strategies.
True
Typically, information systems planning is not tied to overall strategic planning.
False
Which of the following steps is the first step in goals-based strategic planning?
Analyze situation
Money from the budget for one type of cost cannot be used to pay for an item associated with another type of cost.
True
As the CEO of an organization, it is acceptable for you to delegate long-term decisions about the organization to a subordinate.
False
Your new employer wishes to use strategic planning to grow the business. Which of the following would you advise is the most essential task?
create vision/mission statement
Which tool is useful in identifying the interests and information needs of the stakeholders?
Stakeholder analysis matrix
Suppose Task C has Task A and Task B as its predecessor tasks. Task A ends on May 10th and Task B ends on May 12th. When can Task C begin?
May 13th
Which of the five forces in Michael Porter's model refers to entry barriers and the relative threat of new competitors?
Potential entrants
The probability that your employer's IS strategy is inward focused to deliver the services cheaper, faster, and better is ________.
0.11 to 0.40
Project management is the application of knowledge, skills, and techniques to project activities so that the allotted budget can be spent.
False
If an organization considers its IS organization as a cost center or service provider, then its IS goals would be to _______.
reduce IS costs
Suppose your business has agreed to pay a vendor for his services using a cost-plus-fixed-fee contract. This means _____.
the agreement is to reimburse the costs plus a fixed amount as fee
As a project manager, you would use the stakeholder analysis matrix to manage communications with external entities such as customers, vendors, and regulatory bodies.
False
According to a study by the Standish Group, approximately 70% of the IS projects do not succeed.
True
The process of switching from an old information system to a replacement system is called _____.
cutover
_____ requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system.
Critical analysis
The goals of _____ are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance.
volume testing
The disaster recovery plan focuses on technology recovery and identifies the people or the teams that are responsible to take action in the event of a disaster, what exactly these people will do when a disaster strikes, and the information system resources required to support critical business processes.
True
Suppose your business is using software that was written using FORTRAN 77. They wish to modify it to accommodate new requirements. It is a sound advice to suggest that they consider switching to a new application using newer technologies (e.g. Microsoft ASP.Net), rather than modify the current software.
True
_____ explains the purpose of every major piece of computer code and also identifies and describes key variables.
Technical documentation
Security and control considerations are a negligible part of the entire system development process.
False
User acceptance testing (UAT) is a critical activity that must be completed successfully before newly developed software can be rolled out to the market.
True
The eventual success of any system solely depends on how users work with it.
False
In the context of data-flow diagrams (DFDs), the _____ includes arrows that show the direction of data movement.
data-flow line
Tara and Zach are leading a systems development project and they want the investigation phase to go smoothly and quickly. They decide to use _____ because it will also help with the analysis and design phases.
joint application development
Laura is carefully estimating the time required for each phase of a proposed system development project to see if her company can meet the client's desired time for completion. Laura is checking on ___________.
schedule feasibility
Parallel start-up involves running a complete new system for one group of users while the rest of the users still run an old system.
False
Pressure to increase profitability and improve operational efficiencies often drives organizations to implement new approaches and technology.
True
After the software is implemented, some modification is done on the software during maintenance. Suppose the customer data analysis software used by ABC Bank was significantly changed, but no new features were added. This type of maintenance is called a _______.
release
Phil has been working on a new version of his company's best-selling sales management software and now he'd like to ask several co-workers and a handful of the existing version's top users to perform an acceptance test. Phil is preparing for _________.
alpha testing
Agile is better suited for developing larger information systems than smaller ones.
False
_____ involves using a new or modified system under all kinds of operating conditions.
Systems operation
Even if unit testing is successful, developers cannot assume they can combine individual components into a working system without any problems.
True
Once new software has been selected, implementation will include all of these tasks EXCEPT _________.
consulting with stakeholders to establish future needs
A scrum team usually consists of _________.
less than a dozen people
The Pareto principle is also known as the _____.
80-20 rule
Perceived usefulness and perceived ease of use do not have any influence in determining whether someone will use an information system.
False
You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing.
volume testing
The primary outcome of systems analysis is a prioritized list of system requirements and a recommendation of how to proceed with a project.
True
Which of the following is a vendor of popular anti-virus software?
Symantec
A virus can reside in a file (or many files) on the hard drive, but it would not be active in memory. As such, it is not as important to scan live memory as it is to scan the hard drive.
False
Macro viruses are called so because they are written using a macro language.
True
If an attack is dangerous enough, it may warrant shutting down or disconnecting critical systems from the network.
True
An attack that takes place before the security community and/or software developers become aware of and fix a security vulnerability is called the 'zero-day attack.'
True
On the back of a credit card the three-digit number above the signature panel is used to _____.
verify the card is legitimate and not a stolen card number
As the complexity of a network increases, the possibility of security breaches decreases.
False
There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events?
activate the forensics analysis team and prepare documentation
There are laws that require businesses to prove that their data is secure.
True
The US-CERT incident reporting system is used to ____.
alert the Department of Homeland Security about information security incidents
Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n) _______.
black hat hacker
This harmful malware is triggered by a specific event, such as Friday the 13th.
Logic bomb
A zombie computer would send requests to access to the target site again and again.
True
You see a deceptive pop-up that says your computer is infected and that you must visit a compromised web site where you pay them to clean your computer. You have just become a victim of ransomware.
True
The computer is running, but not responding to your keyboard inputs. You find that the network activities are running very slowly. You have probably been hit by a rootkit.
True
Spam emails make up only a small proportion (<10%) of emails.
False
Once a _____ is installed, the attacker can gain full access to the computer.
botnet
A botnet is a ____.
network of computers that send out access requests to servers repeatedly
You had used an online service to apply for a credit card. As part of the process, you submitted your personal information such as SSN, date of birth, employer information, etc. Soon after you started receiving bills for items you did not purchase. You have become a victim of ________.
identity theft
An employee who is marked for a lay-off sent threatening emails to his boss, stating that he is going to delete sensitive data. This employee can be charged under the Computer Fraud and Abuse Act.
True
During a recent brainstorming session, one of Franklin's co-workers suggested that their company could sell some of the data contained in its customer databases to earn extra revenue for the business. As a long-time member of the ACM (Association for Computing Machinery), Franklin is opposed to the idea because it violates which of the following imperatives in the ACM code of ethics?
Respect the privacy of others
Suppose you have been receiving unsolicited phone calls from telemarketers. Which agency should you contact to prevent these 'junk' calls?
The Federal Trade Commission
Laws and regulations have thoroughly addressed concerns about privacy and data management in private organizations and federal agencies.
False
The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation.
USA Patriot Act of 2001
Computer-related mistakes include organizations operating unintegrated information systems and acquiring redundant systems.
False
Never send sensitive personal data such as credit card numbers, bank account numbers, or passwords via text or IM; only send them by email.
False
In a recent survey of 2100 human resource professionals, which two activities were listed as the biggest "productivity killers" in the workplace?
personal cell phone use and Internet surfing
The term "ethics" refers to an individual's personal beliefs about right and wrong, whereas the term "morals" describes standards or codes of behavior expected of an individual by a group, such as a nation, organization, or profession.
False
Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon?
weighing options
It is illegal for companies to buy and sell personal data collected through marketing and sales efforts.
False
The pages on a university's website are maintained by individual departments and organizational units. It is a useful policy to require that every change a user makes to his department pages be reviewed and approved.
True
Many workers claim their right to privacy trumps their employers' right to monitor employee use of IS resources.
True
While giving her students a physics exam, Professor Thompson noticed that Jack, one of her students who has been struggling with the course material, appeared to be copying answers from Graydon, one of the best students in the class. She decides that she should compare their answers when the class period is over before deciding what to do about the situation. In which phase of the ethical decision-making process is Professor Thompson?
gathering information
U.S. federal law permits employers to monitor email sent and received by employees.
True
If an activity is defined as legal then it is ethical.
False
A job that requires sitting at a desk and using a computer for many hours a day qualifies as a sedentary job.
True
A recent study conducted by the University of Nevada revealed that cyberloafing (wasting time online) costs U.S. businesses more than _____ annually.
$85 billion
The use of computers in the workplace is a double-edged sword for workers. While they help to increase productivity and efficiency, they can also raise concerns about privacy and health issues.
True
Organizations continue to operate their businesses using integrated information systems that lead to missed opportunities, increased costs, and lost sales.
False
RFID chips embedded in objects generate radio transmissions that allow people to track the location and other associated data of those objects. It's been suggested that RFID chips be implanted ________.
in all humans to give medical professionals instant access to medical records and conditions
in children to enable parents to find them if lost
in criminals to allow law enforcement agents to find them if needed All of the above
Heavy computer users who experience red, dry, itchy eyes should _____.
consider the use of artificial tears
The use of e-mail among public officials might violate "open meeting" laws.
True
As a Google user, your search history data can be accessed by the NSA and the FBI without obtaining court orders.
True
If a worker is seated at a desk using a keyboard, the height of the surface holding the keyboard and mouse should be 1 or 2 inches above the worker's thighs so that his or her wrists are nearly straight.
True
_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior.
Code of ethics
In order to protect the privacy of employees, email messages that have been erased from hard disks cannot be retrieved.
False
In one court case, a hospital employee, who had been fired for showing coworkers sexually explicit photos on a hospital computer, sued his former employer for wrongful termination. What did the court rule and why?
The hospital won the case because the court stated that the employee did not have a reasonable expectation of privacy when using the hospital's computer at work
You are involved in an Information Systems project. The project's scope has widened, but there is no change in cost, quality, and user expectations. This will result in an increase in time taken to complete the project.
True
Project integration management is perhaps the most important knowledge area because it requires the assimilation of all eight other project management knowledge areas.
True
Which type of IS project has the highest risk of failure?
Breakthrough
Suppose the 'User interface design' phase of the project has a high probability of not meeting the quality requirements; however, it has significant potential impact on the overall project. It is advisable to find and assign a risk owner for this part of the project.
True