Info Sys 3 Flashcards

1
Q

We have identified three general approaches to the acquisition of information processing
functionalities and the introduction of IT-based information systems. Which of the
following is not one of them?
A. Custom design and development
B. System selection and acquisition
C. End-user development
D. Open source development
E. None of the above

A

Open source development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three steps that occur during the implementation phase of the SDLC?
A. Programming, Testing, Installation
B. Investigation, Installation, Operations
C. Programming, Installation, Maintenance
D. Installation, Operations, Maintenance
E. Investigation, Testing, Installation

A

Installation, Operations, Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In which of the following phases should you expect to be most involved as a general or
functional manager?
A. Definition
B. Build
C. Implementation
D. A and B
E. A and C

A

A and C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In which phase(s) do the system development life cycle (SDLC) and the system selection
process differ most substantially?
A. Definition
B. Build
C. Implementation
D. A and B
E. A and C

A

A and B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The three generic phases of a system life-cycle process are:
A. Definition, Design, and Testing
B. Definition, Build, and Implementation
C. Planning, Testing, and Implementation
D. Build, Testing, and Deployment
E. None of the above

A

Definition, Build, and Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is the Systems development Life Cycle methodology typically referred to as “the
waterfall model”?
A. Because it was first popularized in a town with many waterfalls
B. To stress the fact that phases are sequential and iteration (or going back) should be
avoided as much as possible.
C. Because the SDLC, like prototyping, is not iterative.
D. To convey the notion that getting good user requirements is important and there
should be multiple opportunities to elicit user requirements.
E. B and D

A

To stress the fact that phases are sequential and iteration (or going back) should be avoided as much as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your book describes the systems selection process in-depth. Which of the following is
not a step in the system selection process?
A. Compile an RFP
B. Develop a vendor short list.
C. Solicit proposals.
D. Visit vendor sites.
E. Have vendors provide demonstrations.

A

Visit vendor sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following are not approaches to acquisition of information processing
functionalities?
A. Custom Design
B. Custom Development
C. System Selection and Acquisition
D. End-user Development
E. Open Source Development

A

Open Source Development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is not one of the advantages related to making your own systems?
A. Unique Tailoring
B. Flexibility
C. Control
D. Faster Roll-Out
E. All of these are advantages

A

Faster Roll-Out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is not one of the advantages related to purchasing an off-the-shelf
system?
A. Unique Tailoring
B. Faster Roll-Out
C. Knowledge Infusion
D. Economical Attractiveness
E. High Quality

A

Unique Tailoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Systems Development Life Cycle has three main phases. These are:
A. Definition, System Design, and Implementation
B. Feasibility Analysis, Programming, and Implementation
C. Definition, Build, and Implementation
D. Investigation, Feasibility Analysis, and System Analysis
E. Installation, Operations, and Maintenance

A

Definition, System Design, and Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The IS department workers that experts in both technology and the business processes are
called what?
A. Programmers
B. Analysts
C. Functional Managers
D. Help Desk Personnel
E. Technicians.

A

Analysts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which stage of the SDLS typically results in a “go” or “no-go” decision?
A. Feasibility Analysis
B. Systems Analysis
C. System Design
D. Programming
E. Testing

A

Feasibility Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A bank upgrades a computer system at one of its branches. If this works correctly, then
the upgraded system will be installed at the other branches. Which migration approach is
this most likely related to?
A. Parallel
B. Direct
C. Phased
D. Pilot
E. Traditional

A

Pilot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A bank upgrades the computer systems of its branches, one branch at a time. This is
most likely which of the following migration strategies?
A. Parallel
B. Direct
C. Phased
D. Pilot
E. Traditional

A

Phased

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The Build phase of the SDLC is used to ensure that the software is properly integrated
with the other components of the information system.

True or False?

A

False

17
Q

The SDLC and prototyping methodologies are one and the same.

True or False?

A

False

18
Q

Both the SDLC and prototyping methodologies are use d to create custom systems.

True or False?

A

True

19
Q

Off-the-shelf systems enable infusion of knowledge in the organization

True or False?

A

True

20
Q

End-user development: The process by which an organization’s non–IT specialists create
software applications.

True or False?

A

True

21
Q

Custom software development is a systems development approach predicated on the notion that it impossible to clearly estimate and plan in detail such complex endeavors as information systems design and development projects.

True or False?

A

False

22
Q

A system analyst is a highly skilled IT professional who takes the system requirements document (i.e., what the applications should do) and designs the structure of the system
(i.e., how the application will perform its tasks).

True or False?

A

False

23
Q

Risk Audit provides the basis for:
A. Risk Reduction
B. Risk Transference
C. Risk Analysis
D. Reward Mechanism
E. Risk increase

A

Risk Analysis

24
Q

Security should be on managers’ radar screens because of peculiar characteristics that run
the risk of leaving it what?
A. Underfunded
B. Overfunded
C. Overstaffed
D. Irrelevant
E. Neutralized

A

Underfunded

25
Q

Why is security considered a negative deliverable?
A. It costs money
B. It produces only tangible benefits
C. It does not affect profits whether it is done well or poorly
D. It is largely ignored
E. It produces no revenue or efficiency

A

It produces no revenue or efficiency

26
Q

Risk mitigation allows the organization to do what?
A. Devise optimal strategies
B. Prevent security issues from every happening in the first place
C. Keep both costs and risks at minimum levels
D. Maximize failure costs
E. Reward IT workers when no issues arise

A

Devise optimal strategies

27
Q

When a company is faced with a security threat, they have which three strategies available
to them?
A. Acceptance, avoidance, and transference
B. Acceptance, reduction, and transference
C. Avoidance, reduction, and transference
D. Acceptance, avoidance, and reduction
E. All of the above

A

B. Acceptance, reduction, and transference

28
Q

Which of the following strategies is associated with increased potential for failure?
A. Acceptance
B. Avoidance
C. Reduction
D. Transference
E. Analysis

A

Acceptance

29
Q

Insurance costs are most directly associated with which risk strategy?
A. Acceptance
B. Avoidance
C. Reduction
D. Transference
E. Analysis

A

Transference

30
Q

Increased anticipation costs are most directly associated with which risk strategy?
A. Acceptance
B. Avoidance
C. Reduction
D. Transference
E. Analysis

A

Reduction

31
Q

Which of the following is an example of an internal threat?
A. Viruses
B. Intrusions
C. Social Engineering
D. Backdoors
E. Angry Employees

A

Angry Employees

32
Q

Which of the following refers to code built into a program to allow the programmer a way
to bypass password protection?
A. Password Spoofing
B. Bugs
C. Viruses
D. Phishing
E. Backdoors

A

Backdoors

33
Q

Which of the following is an automated method of seeking passwords?
A. Phishing
B. Social Engineering
C. Software bugs
D. Backdoors
E. Careless behavior

A

Phishing

34
Q

Which of the following is not a form of malware?
A. Viruses
B. Spyware
C. Sniffers
D. Keyloggers
E. Worms

A

Sniffers

35
Q

Why is a Trojan horse not a virus?
A. It does not have a payload
B. It does not have a trigger event
C. It does not replicate
D. It is a legitimate form of security protection
E. It does not do anything harmful

A

It does not replicate

36
Q

Why is spyware usually not considered a virus?
A. It does not replicate
B. It does not have a payload
C. It does not do anything other than watch what the user does
D. It only shows advertisements
E. None of the above. They are always viruses

A

It does not replicate

37
Q

Which of the following is a viable method of dealing with internal security threats?
A. Antivirus software
B. Policies regarding what computing resources are accessible to whom
C. Firewalls
D. Policies that mandate frequent updates to programs and such
E. Not immediately deleting terminated employees

A

Policies regarding what computing resources are accessible to whom