Info
Warning
Danger

Study Resources (Accounting)

91) ________ occurs when a person gains unauthorized access to a computer system. 92) By starting a computationally intense application at the wrong time, users can inadvertently shut down a network or web server resulting in a(n) ________. 93) A computer ________ is a program that infiltrates networks and generates so much.
5 Views
View Answer
41) During the maintenance phase, IS personnel may create A) service packs, new releases and patches. B) plans for database design and related structures. C) component design outlines. D) ways to motivate employees. E) cost and schedule feasibility studies. 42) The approach to system conversion whereby a new system that is to be used in more.
45 Views
View Answer
31) Be sure and purchase your antispyware program from a(n) ________ vendor, because some free programs in the past were actually malware programs in disguise. A) reasonable B) reputable C) entrepreneurial D) inexpensive E) illegitimate 32) Users should scan their computers with anti-malware programs at least A) once a year. B) biannually. C) once a week. D) daily. E) once a.
6 Views
View Answer
1) Competitive strategy is supported through activities in the value chain, which consist of collection of business processes supported by information systems. 2) Competitive strategy is supported by operational plans. 3) The triple bottom line for organizations includes measuring profitability, social performance and employee satisfaction. 4) The Zachman framework describes competitive forces in.
23 Views
View Answer
71) The single most important criterion for information systems success is for users to take ________ of their systems. A) on the success B) on the use C) on the task of development D) on the growth E) ownership 72) ________ is the second phase of the SDLC. A) Requirement analysis B) Component design C) Maintenance D) implementation E) System definition 73).
51 Views
View Answer
61) The result of combining outputs from two or more websites is called A) crowdsourcing. B) social networking. C) B2C ecommerce. D) data parsing. E) a mashup. 62) With Web 2.0 advertising rates can be changed A) hour by hour. B) weekly. C) monthly. D) every two months. E) when the contract is renewed. 63) With per click advertising the.
3 Views
View Answer
91) Online auctions are considered to be ________ ecommerce companies. 92) When a manufacturer decides to sell goods directly online, and "cuts out the middleman," the manufacturer will likely see an ________ in logistics and customer service costs. 93) ________ is the investment in social relations with the expectation of returns in.
3 Views
View Answer
31) The Zachman framework divides systems into two dimensions: one is based on reasons for communication and the other is based on ________. 32) Which of the following are in the stakeholder groups listed in the Zachman framework? A) Owner, planner, designer, government, worker B) Worker, government, designer, planner, owner C) Designer, the public,.
6 Views
View Answer
21) The need to report and disclose IS operational information will require all employees to become familiar with the issues facing IT management. 22) E-cycling is one of the most important issues in green IT. 23) Green IT means using information technology resources to better support the triple bottom line. 24) Whistle blowers.
31 Views
View Answer
101) In the SDLC, acquisition begins with a ________ process that identifies the need for a new system. 102) What are the steps to acquire information system? 1)System definition 2)Requirements analysis 3)Component design 4)Implementation 5)System maintenance 103) What is an IT project? 104) What are three areas that affect IT project risk? 105) What is ITPM? 106) Why are project.
14 Views
View Answer
61) One reason that governance is important is A) to ensure that an organization's internal processes can't be verified. B) to maintain the benefits of an organization's IT investments. C) to develop reporting structures and review processes. D) to develop inconsistent management policies. E) to ensure that an organization produces good results while working to.
5 Views
View Answer
1) Ecommerce is the buying and selling of goods and services over public and private computer networks. 2) Checking the weather on theweathernetwork.com or yahoo.ca is an example of ecommerce. 3) Modern consumers often know more about a product or service than does the person facilitating the sale. 4) Ecommerce may require interconnectedness.
20 Views
View Answer
1) Phishing is when someone sends an e-mail pretending to be a legitimate company and asking for confidential data, such as account numbers. 2) Spoofing is a technique for intercepting computer communications. 3) People who intentionally gain unauthorized access to computer systems are called hackers. 4) Drive-by sniffers take computers with wireless connections.
16 Views
View Answer
71) ISACA has become a leader in A) IT alignment. B) financial and accounting audits. C) developing new information systems. D) IT audits and IT governance. E) IS architecture development. 72) A financial audit can be defined as an examination and verification of a company's ________ and accounting records by an accredited professional. 73) The ________ framework.
6 Views
View Answer
21) Data flow diagrams are used by approximately ________ of all process modeling practitioners. A) 78% B) 55% C) 18% D) 42% E) 60% 22) Process modeling practitioners most often use A) Oracle Developer. B) Page Layout. C) Rational Rose. D) MS Visio. E) MS Excel. 23) DFD shapes include A) process, octagons and interface. B) interface, neural, and connector. C) connector, data store.
6 Views
View Answer
11) Many development methods exist, including rapid application development (RAD), object-oriented systems development (OOD), and extreme programming (XP). 12) The IT industry developed the SDLC in the school of hard knocks. 13) Feasibility has four dimensions: cost, schedule, technical, and organizational. 14) Commercial-off-the-shelf (COTS) software will never fit organizational requirements exactly. 15) A.
16 Views
View Answer
81) A firm that matches its organizational objectives with its IT architecture is said to be in ________. 82) To align organizational strategy with information systems, you need to match the IT ________ with organizational objectives. 83) Bill 198 is known as the ________. 84) The SOX act and Bill 198 both require.
7 Views
View Answer
131) Using specific examples, describe data granularity. 132) What are the three assumptions that Ackoff disagreed with? 133) What is a data mart? 134) Describe the data resource challenge. 135) Is it better to have data that is too fine or too coarse? Explain. 136) What is the purpose of business intelligence? What kind of.
10 Views
View Answer
51) Computing infrastructure should be located in ________ buildings designed to house expensive and critical equipment. A) central B) air-conditioned C) high-tech D) fire-resistant E) easily accessible 52) A ________ is a remote processing centre run by a commercial disaster-recovery service that provides all the equipment needed to continue operations after a disaster. A) web farm B) development.
7 Views
View Answer
71) Channel conflict, increased logistics expense, and showrooming are all possible drawbacks of A) ecommerce. B) social networking. C) licensed software. D) having a big store. E) price elasticity. 72) Business literature defines ________ types of capital. A) 2 B) 3 C) 4 D) 5 E) 6 73) Compared to traditional processing, Web 2.0 processing is characterized by A) software as a product,.
12 Views
View Answer
51) Senior management often justifies reducing the time schedules for system projects by A) saying that they want to reduce the budget. B) saying that the tighter schedules make workers work more efficiently. C) saying that they want to look good to their bosses. D) saying that the workers lack proper motivation. E) saying that.
23 Views
View Answer
81) ________ occurs when an intruder uses another site's IP address as if it were their own. 82) Unauthorized data disclosure can occur by simple human ________ when someone inadvertently releases data in violation of a policy. 83) Phishing is an example of unauthorized data ________. 84) A(n) ________ is an operation or.
5 Views
View Answer
31) If the proposed information system violated antitrust laws, this should be discovered in the ________ study of the system definition phase. A) technical feasibility B) regulatory feasibility C) schedule feasibility D) organizational feasibility E) cost feasibility 32) The primary purpose of the ________ phase of the SDLC approach is to manage the scope of the.
20 Views
View Answer
71) ________ is an organization-wide function that is in charge of developing data policies and enforcing data standards. A) Data contents protection B) Data safeguarding C) Data integrity D) Data administration E) Data rights administration 72) User accounts should be given (the) ________ to perform their jobs. A) least possible privileges needed B) most possible privileges needed C) administrator.
5 Views
View Answer
11) Dell Computer engages in B2B, B2C and B2G online commerce. 12) Online auctions such as e-Bay are the most common form of nonmerchant ecommerce. 13) Priceline.com is an example of an electronic exchange used by consumers. 14) Disintermediation is the elimination of sales taxes when selling on line. 15) Disintermediation can have the.
8 Views
View Answer
101) Explain the difference between merchant and nonmerchant companies and give an example of each. 102) List 5 issues facing manufacturers who wish to start selling directly to consumers via ecommerce. 1)Channel conflict 2)Price conflict 3)Logistics expense 4)Customer service expense 5)Taxation 103) What is showrooming and what is the danger of showrooming to retailers? 104) What is social.
7 Views
View Answer
121) ________ data mining happens when analysts create a data model or hypothesis before running the analysis. 122) ________ analysis that identifies groups of entities with similar characteristics is a common unsupervised data-mining technique. 123) ________ analysis is the most common kind of supervised data-mining technique. 124) ________ are another popular data-mining technique,.
5 Views
View Answer
11) Biometric authentication has been around for some time, and because of weaknesses is not likely to see much usage in the future. 12) Technical safeguards involve the hardware and software components of an information system. 13) Malware protection is an example of a technical safeguard. 14) Encryption is one of several technical.
7 Views
View Answer
101) One aspect of security programs is how an organization establishes ________ that provide checks and balances for the people in charge of sensitive data and applications. 102) Enforcement consists of three interdependent factors: (1) responsibility, (2) accountability and (3) ________. 103) What is an unauthorized data disclosure? 104) What is pretexting? 105) What.
16 Views
View Answer
51) The value of a social capital varies depending on a network's A) number of relationships, the strength of those relationships and the resources controlled. B) average age of the members, the interests of the network and the physical location of members. C) relationship strengths, the physical location of members, the age of.
7 Views
View Answer
21) PMBOK was developed by the Project Management Institute. 22) The SDLC can be described as a 5-phase process. 23) Waterfall methods involve a sequence of non-repetitive tasks. 24) In an ASP agreement, an organization contracts a vendor to rent applications on a fee for service basis. 25) The ________ approach is the classic.
14 Views
View Answer
41) For the consumer, ecommerce improves the flow of A) price information. B) database structures. C) business intelligence. D) social capital. E) physical capital. 42) For the vendor ecommerce produces new information about A) manufacturer's profits. B) price elasticity. C) disintermediation. D) merchant companies. E) nonmerchant companies. 43) Economic factors to be considered by vendors who want to engage in ecommerce.
5 Views
View Answer
61) Users often resist biometric identification because they feel it is A) expensive. B) ineffective. C) too technical. D) invasive. E) hard to use. 62) The web site ________ lists simple things to do to lower your risk of identity theft. A) www.wordpress.com B) www.google.ca C) www.safecanada.com D) www.priv.gc.da E) www.equifax.com 63) PIPEDA stands for A) Personal Information Protection and Electronic Disclosure Act. B).
7 Views
View Answer
1) Information technology project management (ITPM) is the collection of techniques and methods that project managers use to plan, coordinate, and complete IT projects. 2) Business managers are most involved in SDLC during Phase 1 and Phase 2. 3) Systems development is primarily a technical task for programmers and hardware.
56 Views
View Answer
41) In order to prioritize their activities and protect an organization from possible risk and loss, security personnel must document the position ________ of all employees. A) riskiness B) data access C) controls D) level E) sensitivity 42) ________ considerations should be part of the hiring process. A) Weight B) Position C) Gender D) Age E) Security 43) A company should clearly.
6 Views
View Answer
31) Merchant companies A) sell goods and services on consignment. B) act as clearing houses or exchanges. C) are a throwback to the 1800s. D) own the goods they sell. E) sell goods only to government. 32) Nonmerchant companies A) usually don't need ERP applications. B) engage in disintermediation. C) arrange the sale of goods without actually.
4 Views
View Answer
61) Information Technology Project Management skills are central to the skills needed by organizations to ________ (to) an increasingly complex business environment. A) keep up B) manage C) adapt D) remain competitive in E) forge ahead in 62) Organizations that understand the ________ before acquiring new applications are more likely to be successful in integrating software.
19 Views
View Answer
31) MS Visio files have the file extension A) (.exe). B) (.osd). C) (.vsd). D) (.DFD). E) (.doc). 32) Every process should have at least one data flow ________ coming into it and out of it. A) diagram B) entity C) positive D) connector E) MS Visio file 33) Data stores cannot be directly connected to an external A) data store. B) entity. C).
11 Views
View Answer
11) The Certified Information Systems Auditor (CISA) certification is recognized globally and has been earned by more than 90 000 professionals. 12) The purpose of an information systems audit is to verify organizations' information systems policies and procedures. 13) An IT architecture is like a plan for a city that lays out.
11 Views
View Answer
41) What is the relationship between an organization's competitive strategy and information system planning? 42) The IT structure is like a A) city building. B) city plan. C) enterprise project. D) enterprise design. E) governmental design. 43) What is information technology architecture? A) A set of photographs of all an organization's existing hardware B) A basic framework for all.
6 Views
View Answer