Info
Warning
Danger

Study Resources (Accounting)

31) ________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication. A) Inscription B) Etching C) Encryption D) Decryption 32) With ________ encryption, the sender and receiver transmit a message using the same key. A) asymmetric B) coaxial C) symmetric D) collinear 33) Secure Socket Layer is also known as ________. A) application security.
2 Views
View Answer
11) With the exception of system analyst, all the major job positions in the IS industry require business knowledge. 12) A business analyst works with business leaders and planners to develop processes and systems that implement business strategy and goals. 13) In the context of responsibilities involved in job positions in the.
7 Views
View Answer
True/False Questions 1) One of the major functions of the information systems department is to develop, operate, and maintain enterprise applications. 2) One of the common titles of the principal manager of the IS department is chief operating officer. 3) In all companies, the chief information officer reports directly to the chief financial.
10 Views
View Answer
41) What is a major difference between spyware and adware? A) Unlike spyware, adware does not perform malicious acts. B) Unlike spyware, adware steals data from users. C) Unlike spyware, adware is installed with the user's permission. D) Unlike spyware, adware does not observe user behavior. 42) ________ is similar to spyware but it watches.
2 Views
View Answer
21) ________ is the process of hiring another organization to perform a service. A) Merging B) Outsourcing C) Headhunting D) Diversifying 22) One of the reasons outsourcing is undertaken is to ________. A) reduce an organization's control over functions B) increase costs for the outsourcing vendor C) cap an organization's financial exposure D) enhance management's focus on nonessential functions 23).
2 Views
View Answer
21) Which of the following is a critical security function of senior management in an organization? A) safeguarding computer hardware and software B) developing IS security software C) establishing the security policy and managing risk D) managing security programs on a real-time basis 22) The Privacy Act of 1974 provides protection to individuals regarding.
2 Views
View Answer
Multiple Choice Questions 1) A ________ is a person or organization that seeks to obtain data or other assets illegally, without the owner's permission and often without the owner's knowledge. A) target B) vulnerability C) threat D) warning 2) Which of the following is considered a threat caused by human error? A) An employee inadvertently installs.
2 Views
View Answer
51) The final WBS plan is denoted as the ________ WBS, and it shows planned tasks, dependencies, durations, and resource assignments. A) test B) baseline C) standard D) benchmark 52) The term ________ refers to a set of management policies, practices, and tools that developers use to maintain control over the project's resources. A) workflow control B).
2 Views
View Answer
31) Once a company has chosen a vendor, further risk management is up to that vendor. 32) The acquisition and operation of hardware infrastructure cannot be outsourced. 33) Acquiring licensed software is a form of outsourcing. 34) In case of software as a service, hardware and both operating system and application software are.
2 Views
View Answer
21) It is the chief information officer's responsibility to establish and communicate IS priorities to the IS department, while the responsibility for enforcement rests with the chief executive officer. 22) A steering committee is a group of senior managers from the major business functions that works with the chief information officer.
3 Views
View Answer
1.1   Learning Objective 1-1 1) Accounting is an information system that measures business activities. 2) Bookkeeping is the mechanical part of accounting. 3) Accounting is often called the language of business. 4) Accounting produces financial statements, which report information about a business entity. 5) The accounting process begins and ends with people making decisions. 6) Accounting.
13 Views
View Answer
31) Cost feasibility involves an assessment of the amount of capital that is to be invested in the project. 32) Like cost feasibility, schedule feasibility is difficult to determine. 33) The process of assessing a project's feasibility occurs during the components design phase of the SDLC. 34) The four dimensions of feasibility are.
2 Views
View Answer
31) When a company outsources a system, control over prioritizing fixes for software failures and problems belongs to the ________. A) CTO B) vendor C) hiring organization D) CIO 32) Which of the following is a risk of outsourcing IS/IT functions? A) It gives undue authority to the CIO in the executive team. B) It provides the.
2 Views
View Answer
13) Accounting: A) measures business activities. B) processes data into reports and communicates the data to decision makers. C) is often called the language of business. D) is all of the above. 14) The two types of accounting are: A) profit and nonprofit. B) financial and managerial. C) internal and external. D) bookkeeping and decision-oriented. 15) The type of accounting.
5 Views
View Answer
51) ________ involve the people and procedure components of information systems. A) Firewalls B) Technical safeguards C) Human safeguards D) Payloads 52) Which of the following statements about human safeguards for employees is true? A) Security screening in an organization is a one-time process and applies only to new employees. B) Users' computer accounts should give users.
2 Views
View Answer
Multiple Choice Questions 1) Which of the following statements is true of the impact of globalization on value chains and business processes? A) Companies must develop a standardized global strategy irrespective of where they are operating from. B) Companies prefer to perform all their processes in-house as it is more cost-effective than outsourcing. C).
3 Views
View Answer
11) Which of the following describes the bullwhip effect? A) The value of a telecommunications network is proportional to the square of the number of connected users of the system. B) The performance improvement to be gained from using some faster mode of execution is limited by the fraction of the time.
2 Views
View Answer
21) Business process management applies only to commercial, profit-making organizations. 22) BPMN is a standard set of terms and graphical notations for documenting business processes. 23) In BPMN, all activities for a given role are shown in that role's swim lane. 24) In a BPMN process diagram, the swim-lane layout is used to.
4 Views
View Answer
41) If a backup of the database contents is made, the database is protected. 42) Documenting position sensitivity enables security personnel to prioritize their activities in accordance with the possible risk and loss. 43) Employee termination is a potential security threat for an organization. 44) The existence of accounts that are no longer.
2 Views
View Answer
True/False Questions 1) As problems caused by human errors are accidental and not malicious, they are not considered as security threats to the information system. 2) A computer crime is committed if an employee who inadvertently installs an old database on top of the current one. 3) Unauthorized data disclosures are possible due.
5 Views
View Answer
31) Encryption is an example of a technical safeguard. 32) In symmetric encryption, two different keys are used to encode and decode a message. 33) Symmetric encryption is simpler and much faster than asymmetric encryption. 34) Secure Socket Layer (SSL) is a protocol that is restricted to asymmetric encryption. 35) Viruses and worms.
6 Views
View Answer
True/False Questions 1) The global economy has intensified rivalry by increasing product and vendor choices and by accelerating the flow of information about price, product, availability, and service. 2) Unlike business processes, information systems procedures need not reflect local cultural values and norms. 3) Distributed database processing refers to the processing of multiple.
7 Views
View Answer
31) If a defined project is determined to be feasible in the SDLC, the immediate next step is to ________. A) create and test components B) form the project team C) maintain the system D) assess process results 32) During the requirements definition stage of developing an information system, the project team will include mostly.
2 Views
View Answer
Multiple Choice Questions 1) Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ department. A) human resources B) information systems C) marketing D) manufacturing 2) Which of the following is NOT a function of the information systems department? A) conducting external audits B) developing applications C) protecting information assets D) managing outsourcing relationships 3) In.
2 Views
View Answer
Multiple Choice Questions 1) Which of the following is true of information systems? A) Information systems include all business process activities. B) Every information system has at least one application. C) Information systems should be bought off-the-shelf. D) Every business process must include at least one information system. 2) Which of the following is true for.
2 Views
View Answer
True/False Questions 1) Information systems and business processes are the same thing. 2) There are activities in business processes that do not involve an information system. 3) Business processes must include one or more information systems. 4) The actors or participants in the business process are the users of the information systems. 5) The term.
6 Views
View Answer
11) In business process management, once the as-is model is created, the very next step that a team must take is to ________. A) obtain feedback about implementation B) assess the results of the changes C) create system components D) implement changes in the organization 12) Which of the following is an accurate representation of.
2 Views
View Answer
11) The purpose of the ________ group is to protect data and information assets by establishing data standards and data management practices and policies. A) data administration B) data warehousing C) data mining D) data communication 12) A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps.
2 Views
View Answer
41) User involvement is critical throughout the system development process. 42) For off-the-shelf software, the project team produces design documentation for writing program code. 43) If a project involves off-the-shelf programs, then little database design needs to be done. 44) With pilot installation, the new system/business processes are installed in phases across an.
2 Views
View Answer
11) When a hacker floods a Web server with millions of bogus service requests so that it cannot service legitimate requests, it is called a denial-of-service attack. 12) Natural disasters present the largest risk for infrastructure loss. 13) In context of information security, safeguards increase work efficiency by making common tasks.
5 Views
View Answer
Essay Questions 1) List the major functions of the IS department. 2) Define CIO. Describe the CIO's typical reporting relationships. 3) Define CTO and describe the typical responsibilities of a CTO. 4) Name the four groups found in a typical IS department and explain the major responsibilities of each. .
2 Views
View Answer
11) In business processes, resources are collections of procedures. 12) In a business process, roles are collections of related tasks that receive inputs and produce outputs. 13) A data flow is the movement of data from one activity or another, or from an activity to a repository, or the reverse. 14) In a.
4 Views
View Answer
Essay Questions 1) Briefly explain the two major ways in which thinking about competitive strategies has changed in today's global economy. 2) List the issues that need to be addressed when localizing a computer program. 3) How are international business processes likely to be developed to overcome the present challenges of international cross-functional.
3 Views
View Answer
11) ________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. A) Pretexting B) Phishing C) Hacking D) Spoofing 12) Which of the following is most likely to be the result of hacking? A) certain Web sites being blocked.
2 Views
View Answer
Essay Questions 1) Describe the composition of a development team for an information system. 2) Define business process, roles, resources, and data flows. 3) Explain why process management is necessary for an organization. 4) Name the four stages of the BPM process and summarize the activities in each. .
3 Views
View Answer