Info
Warning
Danger

Study Resources (Accounting)

11) What are the three interdependent factors involved in the enforcement of security policies and procedures? 12) Explain account management. 13) What is the difference between a hot site and a cold site? 14) Describe an incident-response plan. 15) What should an organization do when a security breach occurs in its information .
6 Views
View Answer
11) Collaboration always involves feedback and iteration. 12) The team members' formative environments influence their ability to collaborate. 13) A team leader who expects and welcomes conflict can reduce collaboration within a team. 14) Conflict can be a productive and positive factor for a team's performance. 15) Personal attacks are a part of feedback.
5 Views
View Answer
1) Distinguish between phishing, spoofing, and sniffing. 2) Explain denial of service (DOS) in information management. 3) Discuss in brief the pros and cons of biometric authentication. 4) Differentiate between symmetric and asymmetric encryption. 5) What are firewalls? What types of firewalls are commonly used? .
4 Views
View Answer
1) Pretexting occurs when someone deceives by pretending to be someone else. 2) Sniffing is usually initiated via email. 3) Incorrectly increasing a customer's discount is an example of incorrect data modification. 4) System errors are not caused by human error. 5) Denial-of-service attacks are caused by human error, not malicious intent. 6) Senior management.
5 Views
View Answer
21) ________ data is highly summarized. A) Coarse B) Missing C) Clickstream D) Dirty 22) Clickstream data is ________. A) inconsistent B) too coarse C) too fine D) dirty data 23) Generally, it is better to have data that is ________ than data that is ________. A) random; specific B) inconsistent; unintegrated C) too fine; too coarse D) problematic; dirty 24) The more attributes there.
5 Views
View Answer
1) What is the difference between a megabyte and a gigabyte? 2) What is a business intelligence system? 3) Describe the characteristics and advantages of reporting systems. 4) Explain the characteristics and advantages of data mining systems. 5) What are the characteristics and advantages of knowledge management systems? .
5 Views
View Answer
11) Smart cards are convenient and easy to use since they don't require a PIN number for authentication. 12) A criticism against biometric authentication is that it provides weak authentication. 13) Most secure communication over the Internet uses a protocol called HTTP. 14) Viruses, worms, and Trojan horses are types of firewalls..
6 Views
View Answer
31) A ________ monitors, maintains, fixes, and tunes computer networks. A) technical writer B) network programmer C) PQA test engineer D) network administrator 32) A ________ performs a wide range of activities such as programming, testing, database design, communications and networks, project management, and so on, and is required to have an entrepreneurial attitude. A) system.
4 Views
View Answer
31) The advantage of ________ installation is that if the system fails, the failure is contained within a limited boundary. A) phased B) parallel C) pilot D) plunge 32) In a ________ installation, the new system runs alongside the old one until it has been tested and is fully operational. A) pilot B) parallel C) phased D) plunge 33).
5 Views
View Answer
21) ________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication. A) Usurpation B) Authentication C) Standardization D) Encryption 22) Which of the following steps of the Secure Socket Layer is NOT true? A) The computer obtains the public key of the website to which it will connect. B).
3 Views
View Answer
1) Collaboration takes place when two or more people ________. A) cooperate with each other to integrate individual efforts B) communicate their views about a subject C) work together to achieve a common goal D) coordinate to accomplish their individual tasks on time 2) Which of the following statements about collaboration is true? A) Iterations should.
9 Views
View Answer
1) 1,000,000 bytes equal one gigabyte. 2) One kilobyte consists of 1,000 bytes. 3) A terabyte is larger than a petabyte in terms of computer storage. 4) A typical low-resolution photograph is equal to 1 terabyte. 5) Data-mining systems integrate data from multiple sources, processing it by sorting, grouping, and averaging, and delivering reports.
4 Views
View Answer
31) Because encryption keys can get lost or destroyed, a copy of the key should be stored with a trusted third party. This safety procedure is sometimes called ________. A) key escrow B) white hat C) key encryption D) biometric authentication 32) Which of the following is an example of a data safeguard? A) application.
5 Views
View Answer
1) The process of creating and maintaining information systems is called ________. A) systems development B) program development C) systems definition D) computer design 2) Compared to program development, systems development is ________. A) narrower in focus B) less comprehensive C) broader in scope D) mostly technical in nature 3) Which of the following is true of systems development? A).
22 Views
View Answer
1) A successful collaborative team will not have conflicts. 2) Collaboration occurs when two or more people communicate with each other. 3) Collaboration is a process that takes place at the end of a project. 4) In a collaborative team, group members review each others' work product and revise that product as a.
7 Views
View Answer
11) The IT department's principal manager is the ________. A) CIO B) CEO C) CTO D) COO 12) In organizations where primary information systems support accounting and finance activities, a reporting arrangement wherein the CIO reports to the ________ is practical. A) CEO B) COO C) CFO D) CTO 13) In organizations that operate significant nonaccounting information systems, such.
8 Views
View Answer
11) The cost feasibility of a systems development project is usually expressed in exact figures or terms. 12) Organizational feasibility concerns how long it will take to complete the project. 13) Systems analysts are IT professionals who understand both business and technology. 14) User involvement is redundant throughout the systems development process. 15) Interviews.
6 Views
View Answer
31) ________ is the application of statistical techniques to find patterns and relationships among data and to classify and predict. A) Data encryption B) Data warehousing C) Data mining D) Data compression 32) Which term is used as a synonym for data mining? A) OLAP B) neural networks C) market-basket analysis D) knowledge discovery in databases 33) In unsupervised data.
4 Views
View Answer
21) Data warehouses and data marts are expensive to create, staff, and operate. 22) KDD is synonymous with data mining. 23) With unsupervised data mining, analysts do not create a model or hypothesis before running the analysis. 24) Regression analysis is used to find groups of similar customers from customer order and demographic.
5 Views
View Answer
1) What is collaboration? What are the critical drivers of collaboration? 2) What are the two key elements of communication and how do they improve collaboration? 3) What is the importance of having a good content management system? 4) Describe the role of workflow control in achieving collaboration. .
9 Views
View Answer
1) Asynchronous communication occurs when team members do not meet at the same time. 2) A face-to-face meeting is an example of asynchronous communication. 3) Virtual meetings can be synchronous or asynchronous. 4) Email is a tool used for asynchronous communication. 5) The use of discussion forums is a form of synchronous communication. 6) Videoconferencing.
4 Views
View Answer
21) In a pilot installation, a new system is installed in phases across the organization. 22) In a direct installation, the organization shuts off the old system and starts the new system. 23) All commercial software products are shipped with known failures. 24) Projects that spend little time documenting requirements are sometimes said.
5 Views
View Answer
11) Which of the following is true for shared content with version management? A) Content sharing methods that provide version management cannot accommodate concurrent work. B) Version management systems provide version control. C) Version management makes it impossible to know who changed the document and when. D) Systems that provide version management track changes.
5 Views
View Answer
1) Systems development has a broader scope than computer program development. 2) Information systems involve people and procedures, so they can never be off-the-shelf. 3) Systems development is easy and risk-free. 4) The bigger the system and the longer the project, the more the requirements change. 5) One of the major challenges in systems.
10 Views
View Answer
11) ________ occurs when a person gains unauthorized access to a computer system. A) Usurpation B) Spoofing C) Hacking D) Phishing 12) A problem in a customer billing system that occurs due to errors made during software installation is a case of ________ resulting from ________. A) faulty service; human error B) distributed denial of service; malicious.
7 Views
View Answer
21) If a company's IS-related programs are not developed in-house, then the development group within its IT department will be staffed primarily by ________. A) test engineers B) systems analysts C) technical writers D) programmers 22) The development group in a company's IT department is staffed primarily by programmers, test engineers, technical writers, and.
3 Views
View Answer
21) The easiest and cheapest time to alter the information system is in the ________  phase of the SDLC. A) requirements analysis B) system definition C) component design D) implementation 22) In terms of software design, for ________, the team must determine candidate products and evaluate them against the requirements while for ________, the team.
8 Views
View Answer
11) The ________ approach is the classical process used to develop information systems. A) rapid application development (RAD) B) object-oriented design (OOD) C) systems development life cycle (SDLC) D) extreme programming (XP) 12) The initial step in the first phase of the SDLC is to ________. A) assess the feasibility of the project B) define the goals.
10 Views
View Answer
1) Decisions concerned with day-to-day activities are termed ________. A) operational decisions B) managerial decisions C) unstructured decisions D) strategic decisions 2) Which of the following is true for decisions made at various organizational levels? A) Operational decisions concern the allocation and utilization of resources. B) Managerial decisions concern broader-scope, organizational issues and can use executive information.
12 Views
View Answer
1) Synchronous communication is defined as ________. A) communication between similar people and groups in an organization B) communication between people working in the same department C) internal communication between the members of a specific group D) communication that occurs when all team members meet at the same time 2) Which of the following is.
17 Views
View Answer
11) Which of the following is the LEAST important collaborative driver for one-time, ad hoc workgroups? A) content management B) communication C) workflow control D) iterations 12) Which of the following is true about collaborative teams? A) Team members must come to respect and trust each other. B) Enjoyment is essential to successful teamwork. C) Members in a.
5 Views
View Answer
11) Which of the following is true for structured and unstructured decisions in an organization? A) A structured decision is one for which there is an accepted method for making the decision within the organization. B) A structured decision is a decision made when the nature of the underlying problem is predictable.
6 Views
View Answer
1) Which of the following is an example of a security threat resulting from malicious human activity? A) an employee who misunderstands operating procedures B) an employee who accidentally deletes customer records C) an employee who inadvertently installs an old database on top of the current one D) an employee who intentionally destroys.
12 Views
View Answer