Term
As opposed to program development, system development is: |
|
Definition
|
|
Term
Information systems are never off-the-shelf because they involve: |
|
Definition
|
|
Term
the risk associatied with developing large, new information systems can e usually characterized as: |
|
Definition
|
|
Term
As a system development team become larger, the average contribution per worker: |
|
Definition
|
|
Term
the______approach is the oldest process used to develop information systems |
|
Definition
Systems development life scycle (SDLC) |
|
|
Term
Large complex information systems such as for order entry or inventory management were most likely to be development using the___approach. |
|
Definition
systems development life cycle (SDLC) |
|
|
Term
The four phases of the SDLC approach after the initial system definition phase are: |
|
Definition
Requirements analysis, system design, implementation, and system maintenance |
|
|
Term
the first stem of the system definition syage of the SDLC is to : |
|
Definition
define the goals and scope of the new system |
|
|
Term
the initial system definition document is the main input into the ____phase of the SDLC approach |
|
Definition
|
|
Term
Because it is defficult to estimate the time it will take to create and build a system, managemnt should consider the__ |
|
Definition
|
|
Term
to determine if the proposed information system is justified economically, organizations must assess the: |
|
Definition
|
|
Term
a(n)____contract will require that the developer eat any additional expenses involved in the development of the system. |
|
Definition
|
|
Term
____refers to whether existing information technology is likely to be able to meet the needs of the new system |
|
Definition
|
|
Term
the primary purpose of the____phase of the SDLC approach is to determine and document the specific features and functions of the new system |
|
Definition
|
|
Term
____concerns whether the new information system will fit with the organization's culture, charter, or legal requirements |
|
Definition
|
|
Term
alternative system designs are evaluated against the system requirements in the____phase of the SDLC |
|
Definition
|
|
Term
Teams of systems analysts and users determine the job descriptions and functions of people who will use the new system in the____phase of the SDLC |
|
Definition
|
|
Term
In a____installation, the new system runs alongside the olf one until it has been tested and is fully operational |
|
Definition
|
|
Term
a___installation is the riskiest because the old system is turned off and the new system is turned on |
|
Definition
|
|
Term
The approach to system conversion whereby a new system that is to be used in more than one business is first implemented in a single unit so that is may be tested and debugged byfore implementing it in the other business units is called: |
|
Definition
|
|
Term
software vendors often bundle large bunvhes of fixes for low-priority problems into groups called: |
|
Definition
|
|
Term
the problem with SDLC is with the___ |
|
Definition
|
|
Term
The___approach is recommended if the system is complex and consists of many modules, becuase extra care must be applied in documenting requirements and the manner in which components will be integrated to ensure smooth and successful development |
|
Definition
systems development life cycle (SDLC) |
|
|
Term
the main problem of the SDLC approach to systems develpment is the____nature of the process. this refers to the fact that each phase is ment to be completed and not repeaed as the project moves on to the next phase. |
|
Definition
|
|
Term
if system requirements are vague or changing rapidly, it is not easy to adapt the project using the___approach |
|
Definition
systems development life cycle (SDLC) |
|
|
Term
a mock-up of an aspect of the new system is a___ |
|
Definition
|
|
Term
CASE tools have a___, which is a special database. |
|
Definition
|
|
Term
Many CASE products have a___program for commonly performed tasks |
|
Definition
|
|
Term
___tools are used in RAD projects to improve developer productivity |
|
Definition
|
|
Term
Typical problems faced by software developers when estimated project schedules include: |
|
Definition
|
|
Term
the CIO reports to the___ |
|
Definition
|
|
Term
___is another, more common title given to the VP of information systems |
|
Definition
|
|
Term
the CTO often heads the___group |
|
Definition
|
|
Term
|
Definition
|
|
Term
The operations group usually reports to the: |
|
Definition
|
|
Term
The purpose of the____group within the IS department is to manage the computing infrastructure |
|
Definition
|
|
Term
the purpose of the___group within the IS department is to manage the process of creating new information systems as will as maintaining existing ones |
|
Definition
|
|
Term
Because of the movement towards outsourcing, some companies have started a separate group in the IS department for: |
|
Definition
|
|
Term
though it may seem obviou, one of the hardest things to do when planning how your organization will use IT is to: |
|
Definition
align IS with organizational strategy |
|
|
Term
In a centralized IS infrastructure, it is likely that local managers will be___develop their own purchasing applications |
|
Definition
|
|
Term
in order to install software upgrades, IS departments prefer to: |
|
Definition
|
|
Term
to accommodate the variations in users' needs, most IS departments will have a set of three or four different___computer configurations |
|
Definition
|
|
Term
because the IS department essentially finctions as a__organization, it must have a way of monitoring user problems and how they are resolved |
|
Definition
|
|
Term
one key indicatior of the user help desk performance might be the number of___in the queue |
|
Definition
|
|
Term
the help desk function is usually part of the___group within the IS department |
|
Definition
|
|
Term
in order for IS personnel to remain up-to-date and perform well, it is crucial that they have the opportunity to get___as the industry keeps changing |
|
Definition
|
|
Term
Despite being old and out of date, it is often crucial for IS departments to maintain___systems because it is too expensive to replace them |
|
Definition
|
|
Term
because enterprices application___requires knowledge of many different systems including legacy systems, companies usually conduct this work in-house rather than outsource it. |
|
Definition
|
|
Term
Developers who work on maintaining existing applications typically have___years of experience than those who work on new applications |
|
Definition
|
|
Term
|
Definition
|
|
Term
____is not a risk associated with outsourcing |
|
Definition
obtaining needed expertise |
|
|
Term
an outsourcing alternative is: |
|
Definition
|
|
Term
Because the outsourcing company and the vendor can become so tightly integrated,____the agreement can be very costly and risky |
|
Definition
|
|
Term
a major concern with outsourcing is that ithe company may lose___by being forced to reveal proprietary trade secrets |
|
Definition
|
|
Term
a risk of oursourcing is that a problem may occur that is critical to the company, but which would be a(n)_____to the outsource vendor |
|
Definition
|
|
Term
outsourcing vendors have an advantage over in-house IS personnel in that it is easier for them to: |
|
Definition
say "no" to management demands |
|
|
Term
As a user you have a right to: |
|
Definition
|
|
Term
which of the following is a threat to security? |
|
Definition
|
|
Term
which of the following is NOT a human error or mistake? |
|
Definition
|
|
Term
which of the following is not considered malicious human activity? |
|
Definition
poorly written application programs |
|
|
Term
a____is someone who pretends to be a ligitimate company and sends email requesting confidential data |
|
Definition
|
|
Term
___is a techinique for intercepting computer communications |
|
Definition
|
|
Term
___is when someone deceives by pretendign to be someone else |
|
Definition
|
|
Term
soem unauthorized programs are able to____the ligitimate system and substitute their own processing |
|
Definition
|
|
Term
a hacker can launch a denial of service attack against a Web server by___it with millions of bogus service requests |
|
Definition
|
|
Term
security programs have___components |
|
Definition
|
|
Term
management should compose a security___in order to communicate the goals and specifications of the organization's security program |
|
Definition
|
|
Term
one of the most important security tasks for management is___management |
|
Definition
|
|
Term
___consequences of security attacks are those whose financial impacts can be measured |
|
Definition
|
|
Term
a weakness in a security system is known as a system: |
|
Definition
|
|
Term
a(n)____card has a microchip on it that is loaded with identify data |
|
Definition
|
|
Term
passwords have weaknesses because useres often choose simple passwords, which____systems can easily guess |
|
Definition
|
|
Term
in order to intercept communications on___networks, drive-by sneffers simply drive or walk around with computers with wireless connections |
|
Definition
|
|
Term
which of the following is a wireless security standard? |
|
Definition
|
|
Term
because they kept giving out passwords to users who claimed to have forgotten them,the___were a serious security risk in the organization |
|
Definition
|
|
Term
because encryption slows processing, most messages are sent over the internet as: |
|
Definition
|
|
Term
firewalls produce____of their activities, which include lists of all dropped packets, and attempts to gain unauthorized access |
|
Definition
|
|
Term
about ninety percent of all viruses are spread via___ |
|
Definition
|
|
Term
organizations should protect sensitive data by storing it in___form |
|
Definition
|
|
Term
computing infrastructure should be located in___buildings designed to house expensive and critical equipment |
|
Definition
|
|
Term
organizations should store at least some of the back ups of the database contents___, possibly in a remote location. |
|
Definition
|
|
Term
a____is a remore processing center run by a commercial disaster-recovery service that provides all the equipment needed to continue operations after a disaster. |
|
Definition
|
|
Term
T/f: Systems analysis and design is the process of creating information systems |
|
Definition
|
|
Term
T/F: Systems development involves four of the five components of information systems. |
|
|
Definition
|
|
Term
T/F: Information systems are never off-the-shelf, unlike software. |
|
|
Definition
|
|
Term
T/F: Systems development is primarily a technical task for programmers and hardware designers. |
|
|
Definition
|
|
Term
T/F: In most cases, companies will purchase off-the-shelf information systems. |
|
|
Definition
|
|
Term
T/F: Maintenance of the information system means adapting it to new requirements. |
|
|
Definition
|
|
Term
T/F: Maintenance of the information system means the same as operation. |
|
|
Definition
|
|
Term
T/F: It is not unusual for information system projects to be 200-300 percent over budget. |
|
|
Definition
|
|
Term
T/F: SDLC moves a project from systems definition through multiple phases until it reaches system maintenance. |
|
|
Definition
|
|
Term
T/F: It is not unusual for information system projects to be 200-300 percent over budget. |
|
|
Definition
|
|
Term
T/F: The three dimensions of feasibility are cost, schedule, and technical feasibility. |
|
|
Definition
|
|
Term
T/F: A project buy-in is limited to cost estimates and is not related to the project schedule. |
|
|
Definition
|
|
Term
T/F: Technical feasibility refers to the likelihood that existing technology will be able to meet the needs of the system. |
|
|
Definition
|
|
Term
T/F: Systems analysts are IT professionals who understand both business and technology. |
|
|
Definition
|
|
Term
T/F: The most important systems development task for future users is to communicate proper information requirements. |
|
|
Definition
|
|
Term
T/F: The basic idea of RAD is to break up the design and implementation phases of the SDLC into smaller chunks. |
|
|
Definition
|
|
Term
T/F: JAD stands for Joint Application Design. |
|
|
Definition
|
|
Term
T/F: CASE tools are good for creating prototypes. |
|
|
Definition
|
|
Term
T/F: CASE tools have a repository for system documentation, but cannot help with actually generating program code. |
|
|
Definition
|
|
Term
T/F: The basic idea of a CASE tool is to use a computer system to help develop other computer programs and systems. |
|
|
Definition
|
|
Term
T/F: It is usually not a good management practice to involve users in testing new systems. |
|
|
Definition
|
|
Term
T/F: It is very important that business users take responsibility for the success of new systems rather than IS personnel. |
|
|
Definition
|
|
Term
T/F: Managing outsourcing relationships is one of the major functions of the information systems department. |
|
|
Definition
|
|
Term
T/F: Downloading audio music files is one of the major functions of the information systems department. |
|
|
Definition
|
|
Term
T/F: A common title for the principal manager of the IS department is Chief Systems Officer. |
|
|
Definition
|
|
Term
T/F: In some organizations, the CIO reports to the COO, though most often directly to the CEO. |
|
|
Definition
|
|
Term
T/F: The responsibilities of the CIO are the same as the CTO. |
|
|
Definition
|
|
Term
T/F: It makes sense for the CIO to report to the CFO if the primary function of the IS department is to support accounting and finance activities. |
|
|
Definition
|
|
Term
T/F: The development group manages the process of creating and maintaining information systems. |
|
|
Definition
|
|
Term
T/F: The operations group exists in organizations that have negotiated outsourcing agreements with other IS companies. |
|
|
Definition
|
|
Term
T/F: IS departments have different goals and objectives than IT departments. |
|
|
Definition
|
|
Term
T/F: The most important planning issue for the IS department is to make sure that the systems are aligned with the organizational strategy. |
|
|
Definition
|
|
Term
T/F: IS infrastructures are easily changed as the organization’s strategy and needs change. |
|
|
Definition
|
|
Term
T/F: It is important that a company considering a merger or acquisition addresses the issues surrounding how the systems of each of the companies will be integrated. |
|
|
Definition
|
|
Term
T/F: The structure of the organization should be reflected in the structure of the IS infrastructure. |
|
|
Definition
|
|
Term
T/F: It is usually acceptable with the IS department if every computer user to have their own individual configuration for their hardware and software. |
|
|
Definition
|
|
Term
T/F: Most IS departments have developed three or four different standard system configurations for their users. |
|
|
Definition
|
|
Term
T/F: Good IS departments maintain a prioritized queue for resolving user problems. |
|
|
Definition
|
|
Term
T/F: A network manager is usually responsible for the help desk function. |
|
|
Definition
|
|
Term
T/F: A computer center manager is usually responsible for the network technicians. |
|
|
Definition
|
|
Term
T/F: All development processes are variations of the theme of requirements, design, and implementation. |
|
|
Definition
|
|
Term
T/F: Legacy systems usually require special maintenance teams and activities to keep them running. |
|
|
Definition
|
|
Term
T/F: A legacy system is one that uses the most up-to-date technology and provides a unique competitive advantage for the organization. |
|
|
Definition
|
|
Term
T/F: EAI requires that developers create primary layers of software. |
|
|
Definition
|
|
Term
T/F: Data administration and database administration are basically the same functions. |
|
|
Definition
|
|
Term
T/F: Sustaining-application developers work on new applications. |
|
|
Definition
|
|
Term
T/F: Data standards, such as the name, official definition, usage, version, and format are part of the metadata. |
|
|
Definition
|
|
Term
T/F: Data standards are definitions for items stored in your computer. |
|
|
Definition
|
|
Term
T/F: A data dictionary is a database of data definitions. |
|
|
Definition
|
|
Term
T/F: Data policies are almost all the same at every company. |
|
|
Definition
|
|
Term
T/F: One of the most common reasons to outsource is cost reduction. |
|
|
Definition
|
|
Term
T/F: Acquiring licensed software is a form of outsourcing. |
|
|
Definition
|
|
Term
T/F: When outsourcing, a company does not have to worry about loss of proprietary information. |
|
|
Definition
|
|
Term
T/F: Your organization cannot be held responsible for mismanagement by a company that you outsourced work to. |
|
|
Definition
|
|
Term
T/F: Employers cannot monitor your Web surfing and email activity while you are at work. |
|
|
Definition
|
|
Term
T/F: Outsourcing IS functions usually solves all the prior IS problems. |
|
|
Definition
|
|
Term
T/F: When you outsource your IS functions, the firm that was hired frequently turns around and hires many of your former IS department employees to staff the outsourcing contract. |
|
|
Definition
|
|
Term
T/F: An example of a human mistake is an employee entering the wrong data into an account. |
|
|
Definition
|
|
Term
T/F: A driver loses control of his vehicle, slamming it into and through the building, destroying the server room, destroying the computer equipment. This is an example of human error. |
|
|
Definition
|
|
Term
T/F: A forest fire burns through your building, destroying everything. This is an example of human mistakes. |
|
|
Definition
|
|
Term
T/F: Unauthorized data disclosures can occur from malicious human activity. |
|
|
Definition
|
|
Term
T/F: Phishing is when someone sends an email pretending to be a legitimate company and asking for confidential data, such as account numbers. |
|
|
Definition
|
|
Term
T/F: Spoofing is a technique for intercepting computer communications. |
|
|
Definition
|
|
Term
T/F: Drive-by spoofers take computers with wireless connections through an area and search for unprotected wireless networks. |
|
|
Definition
|
|
Term
T/F: Phishers will copy almost all of a legitimate Web site in order to make their email seem real. |
|
|
Definition
|
|
Term
T/F: People who intentionally gain unauthorized access to computer systems are called hackers. |
|
|
Definition
|
|
Term
T/F: Denial of service always occurs because of malicious attacks on the system. |
|
|
Definition
|
|
Term
T/F: When a hacker floods a Web server with millions of bogus service requests so that it cannot service legitimate requests, this is called a denial of service attack. |
|
|
Definition
|
|
Term
T/F: Any action, device, procedure, technique, or other measure that reduces a system’s vulnerability to a threat is a safeguard. |
|
|
Definition
|
|
Term
T/F: The IT department sets the security policy for an organization. |
|
|
Definition
|
|
Term
T/F: Uncertainty is the likelihood of an adverse occurrence. |
|
|
Definition
|
|
Term
T/F: Risk management can only be approximated because of uncertainty. |
|
|
Definition
|
|
Term
T/F: The Privacy Act of 1974 gives individuals the right to access health data. |
|
|
Definition
|
|
Term
T/F: Vulnerabilities in a security system are weaknesses. |
|
|
Definition
|
|
Term
T/F: Biometric authentication has been around for some time, and because of weaknesses are not likely to see much usage in the future. |
|
|
Definition
|
|
Term
T/F: Technical safeguards involve the hardware and software components of an information system. |
|
|
Definition
|
|
Term
T/F: Despite warnings, users have a tendency to write their passwords on sticky notes next to the computer. |
|
|
Definition
|
|
Term
T/F: Encryption is one of several technical safeguards. |
|
|
Definition
|
|
Term
T/F: You should never send sensitive data over the Internet unless you see https:// in the browser’s address bar. |
|
|
Definition
|
|
Term
T/F: A perimeter firewall sits inside the organizational network. |
|
|
Definition
|
|
Term
T/F: A firewall is a computing device that prevents unauthorized access to a network. |
|
|
Definition
|
|
Term
T/F: Viruses and worms are malware. |
|
|
Definition
|
|
Term
T/F: Most anti-malware programs check email attachments for malware code. |
|
|
Definition
|
|
Term
T/F: Care must be taken when terminating employees because they may take harmful and malicious actions. |
|
|
Definition
|
|
Term
T/F: Following a disaster, hot sites provide office space, but customers themselves must come and provide and install the equipment needed to continue operations. |
|
|
Definition
|
|
Term
T/F: Backup facilities are inexpensive, so every company should have one. |
|
|
Definition
|
|
Term
T/F: Organizations need a rehearsed incident-response plan in place. |
|
|
Definition
|
|
Term
T/F: Viruses and worms don’t spread very quickly so it is essential to move cautiously when one is discovered by someone in your organization. |
|
|
Definition
|
|
Term
T/F: the database administratior will administer data standards for the entire company |
|
|
Definition
|
|