Info
Warning
Danger

Study Resources (Accounting)

31) Unless the contract requires otherwise, an outsource vendor can choose the technology that it wants to implement. 32) The potential loss of intellectual capital is a concern related to outsourcing. 33) When a company outsources a system, it has complete control over prioritizing software fixes. 34) Parting business with an outsource vendor.
10 Views
View Answer
True or False 1) Protection of information assets is a major function of the information systems department. 2) The structure of the IS department typically remains unchanged among organizations. 3) The responsibilities of the CIO are the same as those of the CTO. 4) It is the CTO's responsibility to identify new technologies.
9 Views
View Answer
11) A person should preferably use the same password for different sites so as to avoid confusion. 12) While making online purchases, a person should buy only from vendors who support https. 13) Risk management is a critical security function of an organization's senior management. 14) Financial institutions must invest heavily in security.
9 Views
View Answer
21) A criticism of biometric authentication is that it provides weak authentication. 22) With asymmetric encryption, two different keys are used for encoding and decoding a message. 23) The most secure communications over the Internet use a protocol called HTTP. 24) Packet-filtering firewalls sit outside an organizational network. 25) Packet-filtering firewalls examine each part.
10 Views
View Answer
Multiple Choice 1) A(n) ________ is a measure that individuals or organizations take to block a threat from obtaining an asset. A) Hadoop B) safeguard C) information silo D) third-party cookie 2) Which of the following types of security loss is WikiLeaks an example of? A) unauthorized data disclosure B) incorrect data modification C) faulty service D) denial of service 3).
19 Views
View Answer
Multiple Choice 1) ________ is defined as a group of people working together to achieve a common goal via a process of feedback and iteration. A) Cooperation B) Groupthink C) Collaboration D) Dissolution 2) Which of the following is true of collaboration? A) Iterations should be avoided for the smooth functioning of the collaborative process. B) Group members.
20 Views
View Answer
21) In a pilot installation, a new system is installed in phases across the organization. 22) Plunge installation is sometimes called direct installation. 23) The maintenance phase can start another cycle of the systems development life cycle. 24) The systems development life cycle process is supposed to operate in a sequence of nonrepetitive.
14 Views
View Answer
11) The cost feasibility of a systems development project depends on the scope of the project. 12) Organizational feasibility refers to estimating the time it will take to complete a project. 13) A development team's composition changes over time. 14) Business analysts integrate the work of the programmers, testers, and users. 15) Interviews.
11 Views
View Answer
31) The creation of backup copies of database contents ensures the protection of the database. 32) The loss of encryption keys by employees is referred to as key escrow. 33) In an organization, the security sensitivity for each position should be documented. 34) The existence of accounts that are no longer necessary.
8 Views
View Answer
21) Which of the following is true of the alignment between information systems and organizational strategies? A) Information systems must evolve with the changes made in the organizational strategies. B) The information systems infrastructure can be easily influenced by the strategic changes. C) Integrating different information systems applications with organizational strategies is.
10 Views
View Answer
11) ________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones. A) Usurpation B) Encryption C) Spoofing D) Sniffing 12) A(n) ________ is a sophisticated, possibly long-running, computer hack that is perpetrated by large, well-funded organizations like governments. A) Advanced Persistent Threat (APT) B) Advanced Volatile Threat (AVT) C) local.
11 Views
View Answer
11) Why is information considered the most fundamental collaboration purpose? A) Individuals can construct different perceptions of the same data. B) All the members of a team usually conceive information in the same way. C) Disclosing information may lead to unsuccessful collaboration. D) Being informed restricts communication between members of a group. 12) ________ decisions.
12 Views
View Answer
True or False 1) Information systems can be acquired off-the-shelf with adaptation. 2) Information systems involve people and procedures, so they can never be off-the-shelf. 3) Systems development is easy and risk-free. 4) It is essential to estimate a system's cost to calculate its rate of return. 5) One of the major challenges in systems.
13 Views
View Answer
11) IT must be placed into the structure of an IS before an organization can use it. 12) A technical writer writes program documentation, help-text, procedures, job descriptions, and training materials. 13) Large-scale project managers require deeper project management knowledge than small-scale managers. 14) A user support representative installs software and repairs computer.
14 Views
View Answer
31) In a ________ installation, the new system runs alongside the old one until it has been tested and is fully operational. A) pilot B) parallel C) phased D) plunge 32) Olive Inc., a chain of retail outlets, is converting its existing billing systems to a more robust online tool. In this process, the organization.
45 Views
View Answer
11) Team rules are established during the planning phase of project management. 12) Most collaboration systems are hosted on client computers. 13) Schedules, tasks, budgets, and other managerial data are examples of project metadata. 14) The primary function of a collaboration information system is information security. .
7 Views
View Answer
11) Which of the following sentences is true for the development group of an IS department? A) The size and structure of the group depends on whether programs are developed in-house or outsourced. B) An important function of this group is to monitor user experience and respond to user problems. C) This group.
12 Views
View Answer
21) The membership of a steering committee is determined by the CEO and other members of the executive staff. 22) Organizations outsource projects to engage its management team in their free time. 23) Gaining economies of scale is an advantage of outsourcing. 24) Implementation risk is increased by outsourcing IS services. 25) Acquiring.
8 Views
View Answer
Multiple Choice 1) The process of creating and maintaining information systems is called ________. A) systems development B) systems acquisition C) systems definition D) systems design 2) When compared to program development, systems development is ________. A) narrower in focus B) less comprehensive C) broader in scope D) more technical 3) Which of the following is true of systems development? A).
19 Views
View Answer
11) In which of the following phases of the systems development life cycle do developers identify the particular features and functions of a new system? A) system definition B) requirement analysis C) component design D) implementation 12) The first step in defining a new information system is to ________. A) assess the feasibility of the project B).
11 Views
View Answer
1) A cooperative result is usually better in quality than the result of someone working alone. 2) Multiple versions of a document are created when a group of people collaborate. 3) An extremely critical group cannot collaborate effectively. 4) It is essential for team members to express any differences in perceptions of.
9 Views
View Answer
31) With HTTPS, data are encrypted using the Secure Socket Layer (SSL) protocol, which is also known as ________. A) File Transfer Protocol (FTP) B) Simple Mail Transfer Protocol (SMTP) C) Secure Shell (SSH) D) Transport Layer Security (TLS) 32) A(n) ________ sits outside an organizational network and is the first device that Internet traffic.
4 Views
View Answer
21) The easiest and cheapest time to alter the information system is in the ________ phase of the systems development life cycle. A) requirements analysis B) system definition C) component design D) implementation 22) While designing ________, a development team must produce design documentation for writing computer code. A) off-the-shelf-with-alteration software B) custom-developed programs C) off-the-shelf software D) cloud-based.
16 Views
View Answer
Multiple Choice 1) ________ is another, more common title given to the director of computer services. A) CEO B) CTO C) CIO D) COO 2) Which of the following staff functions is at the top most of a typical senior-level reporting relationship? A) Chief Information Officer B) Chief Operating Officer C) Chief Technology Officer D) Chief Financial Officer 3) The.
17 Views
View Answer
21) The purpose of the ________ phase of project management is to ensure that tasks are accomplished on time. A) finalizing B) starting C) doing D) planning 22) Rochelle, a senior program analyst in Levy, Inc., reschedules various tasks assigned to her subordinates in order to meet a project's new guidelines. In this case, Rochelle.
17 Views
View Answer
1) A threat is a person or an organization that seeks to obtain or alter data illegally, without the owner's permission or knowledge. 2) Pretexting occurs when someone deceives by pretending to be someone else. 3) Spoofing is a technique for intercepting computer communications. 4) Email spoofing is a synonym for phishing. 5) Drive-by.
17 Views
View Answer
21) Backup and physical security are ________ against computer security threats. A) technical safeguards B) data safeguards C) human safeguards D) procedural safeguards 22) A user name ________ a user. A) authenticates B) identifies C) conceals D) encrypts 23) A password ________ a user. A) authenticates B) identifies C) conceals D) encrypts 24) Users of smart cards are required to enter a ________ to be.
7 Views
View Answer
41) The enforcement of security procedures and policies consists of three interdependent factors: ________. A) centralized reporting, preparation, and practice B) account administration, systems procedures, and security monitoring C) separation of duties, provision of least privilege, and position sensitivity D) responsibility, accountability, and compliance 42) In terms of password management, when an account is created,.
7 Views
View Answer