Search
Info
Warning
Danger

Study Resources (Accounting)

True or False 1) Pretexting occurs when someone deceives by pretending to be someone else. 2) Sniffing is usually initiated via email. 3) Incorrectly increasing a customer's discount is an example of incorrect data modification. 4) System errors are not caused by human error. 5) Denial-of-service attacks are caused by human error, not malicious intent. 6).
0 Views
View Answer
31) ________ is an example of a data safeguard against security threats. A) Application design B) Backup and recovery C) Accountability D) Procedure design 32) Organizations should protect sensitive data by storing it in ________ form. A) digital B) standardized C) encrypted D) authenticated 33) Because encryption keys can be lost or destroyed, a copy of the key should be.
0 Views
View Answer
11) A Google account is not essential to edit Google Docs. 12) Version management systems provide version control. 13) In version-control systems, shared documents are often placed in shared directories called libraries. 14) Workflows cannot be defined for multistage business processes. 15) With SharePoint, it is possible to filter task lists to show only.
0 Views
View Answer
  Multiple Choice 1) A ________ is a table of data having rows and columns. A) spreadsheet B) matrix C) gridline D) library 2) In Excel, the rows are identified by ________. A) letters B) numbers C) Roman numerals D) symbols 3) In Excel, the columns are identified by ________. A) letters B) numbers C) Roman numerals D) symbols 4) In Excel, the term ________ refers to.
4 Views
View Answer
11) Maximum cardinality in an E-R diagram refers to ________. A) the maximum number of relationships possible in a diagram B) the maximum number of entities that can be involved in a relationship C) the maximum number of constraints possible for a particular relationship D) the maximum number of attributes an entity can have 12).
1 Views
View Answer
  Multiple Choice 1) An employee carelessly releases proprietary data to the media. This is a case of ________. A) loss of infrastructure resulting from human error B) unauthorized data disclosure resulting from human error C) loss of infrastructure resulting from malicious activity D) unauthorized data disclosure resulting from malicious activity 2) Which of the.
3 Views
View Answer
11) What is the first and most fundamental collaborative purpose? A) make decisions B) become informed C) manage projects D) solve problems 12) ________ decisions are those that support day-to-day activities, such as how many widgets to order from a particular vendor. A) Managerial B) Critical C) Strategic D) Operational 13) ________ decisions are decisions about the allocation and utilization.
1 Views
View Answer
21) The purpose of the ________ phase of project management is to ensure that tasks are accomplished on time. A) finalizing B) starting C) doing D) planning 22) Which of the following tasks is performed during the doing phase of project management? A) establish team rules B) document and report progress C) revise budget D) prepare archival documents 23) The.
0 Views
View Answer
21) Which of the following would be the responsibilities of a small-scale project manager? A) initiate, plan, manage, monitor, and close down projects B) develop test plans, design and write automated test scripts, and perform testing C) advise CIO, executive group, and project managers on emerging technologies D) help users solve problems, provide training 22).
0 Views
View Answer
11) Technical safeguards include passwords and encryption. 12) Technical safeguards involve just the software components of an information system. 13) Smart cards are convenient and easy to use since they don't require a PIN number for authentication. 14) A criticism against biometric authentication is that it provides weak authentication. 15) Most secure communication over.
0 Views
View Answer
31) It is expensive and risky to change vendors. 32) For service oriented outsourcing, the vendor is in the driver's seat. 33) The potential loss of intellectual capital is a concern related to outsourcing. 34) Exiting from an outsourcing agreement is extremely easy. 35) One of the responsibilities of the IT department is to.
0 Views
View Answer
21) A(n) ________ card has a microchip on it that is loaded with identifying data. A) USB B) biometric C) smart D) encryption 22) ________ use(s) personal physical characteristics such as fingerprints, facial features, and retinal scans to verify users. A) Passwords B) Smart cards C) Biometric authentication D) Personal identification numbers 23) ________ is the process.
0 Views
View Answer
Essay 1) Describe the IS department's responsibility to plan for information systems and IT infrastructure. 2) Explain the IS department's responsibility to develop and adapt information systems and IT infrastructure. 3) Compare the role of the chief information officer (CIO) and the role of the chief technology officer (CTO). .
1 Views
View Answer
Multiple Choice 1) ________ is another, more common title given to the vice president of information systems. A) CEO B) CTO C) CIO D) COO 2) Other titles for the ________ include director of information services and director of computer services. A) CTO B) CFO C) CEO D) CIO 3) The IS department's principal manager is the ________. A) CIO B) CEO C) CTO D).
2 Views
View Answer
21) In a pilot installation, a new system is installed in phases across the organization. 22) In a plunge installation, the organization shuts off the old system and starts the new system. 23) All commercial software products are shipped with known failures. 24) Projects that spend little time documenting requirements are sometimes said.
0 Views
View Answer
True or False 1) Protection of information assets is a major function of the information systems department. 2) A common title for the principal manager of the IT department is Chief Development Officer. 3) The responsibilities of the CIO are the same as those of the CTO. 4) In some organizations, the CIO reports.
0 Views
View Answer
  Multiple Choice 1) ________ is defined as a group of people working together to achieve a common goal via a process of feedback and iteration. A) Cooperation B) Groupthink C) Collaboration D) Brainstorming 2) Which of the following is true of collaboration? A) Iterations should be avoided for the smooth functioning of the collaborative process. B) Group members.
3 Views
View Answer
11) The size and structure of the development group depends on whether programs are developed in-house. 12) A technical writer writes program documentation, help-text, procedures, job descriptions, and training materials. 13) Small-scale project managers and large-scale project managers do the same jobs, but on projects with varying complexity. 14) A user support representative.
0 Views
View Answer
11) The cost feasibility of a systems development project is usually expressed in exact figures or terms. 12) Organizational feasibility concerns how long it will take to complete the project. 13) Systems analysts are IT professionals who understand both business and technology. 14) User involvement is redundant throughout the systems development process. 15) Interviews.
0 Views
View Answer
11) The ________ group within the IS department manages the process of creating new information systems as well as maintaining existing information systems. A) technology B) operations C) development D) data administration 12) Which of the following sentences is true for the development group of an IS department? A) The development group manages the process of.
0 Views
View Answer
11) ________ occurs when a person gains unauthorized access to a computer system. A) Usurpation B) Spoofing C) Hacking D) Phishing 12) A problem in a customer billing system that occurs due to errors made during software installation is a case of ________. A) faulty service resulting from human error B) distributed denial of service resulting from.
0 Views
View Answer
  Multiple Choice 1) ________ are useful when the team needs to meet on some topic, but not everyone can meet at the same time. A) Blogs B) Discussion forums C) Wikis D) Surveys 2) Synchronous communication is defined as ________. A) communication between similar people and groups in an organization B) communication between people working in the same.
4 Views
View Answer
11) The crow's-foot notation shows the minimum number of entities that can be involved in a relationship. 12) The maximum number of entities that can be involved in a relationship is known as maximum cardinality. 13) Normalization is the process of converting poorly structured tables into two or more well-structured tables. 14) The.
0 Views
View Answer
True or False 1) Discussion forums are useful when the team needs to meet on some topic, but not everyone can meet at the same time. 2) Asynchronous communication occurs when team members do not meet at the same time. 3) A face-to-face meeting is an example of asynchronous communication. 4) Virtual meetings can.
0 Views
View Answer