LAST TEST – Flashcard Answers

question
A ________ shows the tasks, start and finish dates, and dependencies for the tasks of a project.
answer
Gantt Chart
question
A business process that crosses into multiple companies is known as a(n) ________ business process.
answer
Interorganizational
question
A ________ is a network of activities, repositories, roles, resources, and data flows that interact to accomplish a business function.
answer
business process
question
Activities are ________.
answer
collections of related tasks that receive inputs and produce outputs
question
A(n) ________ is a physical repository.
answer
inventory
question
In a business process, a role is ________.
answer
a collection of procedures
question
Resources are ________.
answer
people or computer applications that are assigned to roles
question
An as-is model ________.
answer
documents the current situation of a business process
question
In business process management, once the as-is model is created, the team must ________.
answer
create system components
question
Which of the following is an accurate representation of the steps in the business process management cycle?
answer
model processes; create components; implement processes; assess results
question
The BPM process begins with the ________ stage.
answer
model processes
question
Which of the following is NOT one of the five components of an information system?
answer
policies
question
Fixing the system so that it works correctly or adapting it to changes in requirements occurs in the ________ phase of the information system development process.
answer
maintenance
question
A ________ installation is the riskiest because the old system is turned off and the new system is turned on.
answer
plunge
question
In a ________ installation, the new system runs alongside the old one until it has been tested and is fully operational.
answer
parallel
question
With ________ installation, the organization implements the entire system/business processes on a limited portion of the business.
answer
pilot
question
If the defined project is determined to be feasible, the next step is to ________.
answer
form the project team
question
Organizational feasibility ________.
answer
concerns whether the new system fits within the company's customs and culture
question
________ feasibility refers to whether existing information technology is likely to be able to meet the needs of the new system.
answer
technical
question
What are the four dimensions of feasibility?
answer
cost, schedule, technical, and organizational feasibility
question
Once we have defined the project's goals and scope, the next step is to ________.
answer
assess feasibility
question
The first step in the system definition phase of systems development is to ________.
answer
define the goals and scope
question
Which of the following terms refers to the process of creating and maintaining information systems?
answer
systems development
question
In BPMN, ________ depict the flow or sequence of the activities in the process.
answer
solid arrows
question
In a BPMN process diagram, dotted arrows depict the flow of ________.
answer
messages and data flows
question
A functional business process ________.
answer
resides within a single business function in a single company
question
In cross-functional business process management, ________.
answer
BPM authority is shared across several departments in a single company
question
Which of the following is not a functional process in an organization?
answer
customer relationship management
question
________ is a standard set of terms and graphical notations for documenting business processes.
answer
Business Process Modeling Notation
question
In a BPMN process diagram, a ________ represents the start of a process.
answer
circle
question
In a BPMN process diagram, a ________ represents an activity.
answer
rectangle with rounded corners
question
In BPMN notation, ________ represent decisions and usually contain a question that can be answered with yes or no.
answer
diamonds
question
Developing, operating, and maintaining the organization's computing infrastructure is a major function of the ________ department.
answer
information systems
question
In organizations that operate significant non-accounting information systems, the chief information officer reports to the ________.
answer
chief executive officer
question
If the primary information systems in an organization support only accounting and finance activities, the CIO should report to the ________.
answer
CFO
question
In the IS department, the ________ group manages the computing infrastructure, including individual computers, computer centers, networks, and communications media. This group includes system and network administrators.
answer
operations
question
An important function of the ________ group in an IS department is to monitor the user experience and respond to user problems.
answer
operations
question
Which of the following is true for the various groups in an IS department?
answer
The development group manages the process of creating new information systems.
question
Which of the following is true for the function of maintaining information systems?
answer
Maintenance means fixing problems or adapting existing information systems.
question
If the organization does not develop programs in-house, then the development group of the information system department will include ________.
answer
system analysts
question
Which of the following is NOT a responsibility of a systems analyst?
answer
writing programs
question
A ________ must work with users to determine system requirements and must also help determine system test plans.
answer
system analysis
question
The responsibilities of a computer technician include ________.
answer
installing software and repairing computer networks
question
Which of the following is true for changes in IS infrastructure?
answer
Changing IS systems is expensive and time-consuming.
question
Which of the following is NOT true for information systems?
answer
Information systems change only when organizations merge.
question
The ________ is the representative for IS and IT issues within the executive staff, providing the IS perspective during discussions of problem solutions, proposals, and new initiatives.
answer
CIO
question
A(n) ________ is a group of senior managers from the major business functions that works with the CIO to set the IS priorities and decide among major IS projects and alternatives.
answer
steering committee
question
Users' computing needs vary according to the work they do. In response, most IS departments ________.
answer
have developed a set of three or four different standard configurations
question
The IS department needs to work with the steering committee and ________ to ensure the standards are effective for most of the users.
answer
CIO
question
In a well-run IS department, when a user reports a problem the department assigns a tracking number and the problem enters a queue for service. Which of the following statements is true in this case?
answer
Problems are prioritized on the basis of how critical they are to the user's work.
question
In addition to managing the computing infrastructure, the ________ manages enterprise applications as well.
answer
IS department
question
A(n) ________ is a system that has outdated technologies and techniques but is still used, despite its age.
answer
legacy information system
question
Which of the following is an example of a sniffing technique?
answer
adware
question
When referring to security threats, pretexting, sniffing, IP spoofing, and phishing are all examples of ________.
answer
unauthorized data disclosure
question
________ occurs when a person gains unauthorized access to a computer system, invading a network to obtain critical data or to manipulate the system for financial gain.
answer
hacking
question
Which of the following could most likely be the result of hacking?
answer
an unexplained reduction in your account balance
question
Which of the following is an example of a human safeguard?
answer
procedure design
question
Which of the following is a critical security function of senior-management involvement?
answer
establishing the security policy and managing risk
question
Which of the following is the responsibility of senior management in an organization?
answer
managing risk by balancing the costs and benefits of the security program
question
A security policy covering personal use of computers at work would be an example of a(n) ________.
answer
issue-specific policy
question
Which element of the security policy specifies how the organization will ensure the enforcement of security programs and policies?
answer
the general statement of the security program
question
________ refers to things we do not know, while ________ is the likelihood of an adverse occurrence.
answer
Uncertainty; risk
question
Which of the following is the first step in risk management?
answer
assess what the threats are
question
Which of the following was passed to give individuals the right to access their own health data created by doctors and other health-care providers?
answer
HIPAA
question
The Privacy Act of 1974 covers ________.
answer
records held by the U.S. government
question
Which of the following is an example of a technical safeguard?
answer
firewall
question
Which of the following statements is true for biometric identification?
answer
Biometric authentication often faces resistance from users for its invasive nature.
question
The IEEE 802.11 Committee, the group that develops and maintains wireless standards, first developed a wireless security standard called ________.
answer
Wired Equivalent Privacy
question
________ eliminate(s) spoofing of public keys and requires browser to have a CA's public key.
answer
Digital certificates
question
Which of the following observations concerning Secure Socket Layer (SSL) is true?
answer
It is a useful hybrid of symmetric and asymmetric encryption techniques.
question
You are doing an online fund transfer through the Web site of a reputed bank. Which of the following displayed in your browser's address bar will let you know that the bank is using the SSL protocol?
answer
https
question
________ is a method of mathematically manipulating the message to create a string of bits that characterize the message.
answer
Hashing
question
Which of the following is a technique used to ensure that plaintext messages are received without alteration?
answer
digital signatures
question
________ is the term used to denote Trojan horses, spyware, and adware.
answer
Malware
question
A(n) ________ is a type of virus that propagates itself using the Internet or other computer networks.
answer
worm
question
________ are viruses that masquerade as useful programs or files.
answer
Trojan horses
question
Which of the following is considered malicious human activity?
answer
hacking of information systems
question
The ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.
answer
phisher
question
________ is a technique for intercepting computer communications, either through a physical connection to the network or, in the case of wireless networks, with no physical connection.
answer
sniffing
question
________ occurs when someone deceives by pretending to be someone else.
answer
pretexting
question
Email spoofing is a synonym for ________.
answer
phishing
question
________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.
answer
Drive-by sniffers
1 of

Unlock all answers in this set

Unlock answers
question
A ________ shows the tasks, start and finish dates, and dependencies for the tasks of a project.
answer
Gantt Chart
question
A business process that crosses into multiple companies is known as a(n) ________ business process.
answer
Interorganizational
question
A ________ is a network of activities, repositories, roles, resources, and data flows that interact to accomplish a business function.
answer
business process
question
Activities are ________.
answer
collections of related tasks that receive inputs and produce outputs
question
A(n) ________ is a physical repository.
answer
inventory
question
In a business process, a role is ________.
answer
a collection of procedures
question
Resources are ________.
answer
people or computer applications that are assigned to roles
question
An as-is model ________.
answer
documents the current situation of a business process
question
In business process management, once the as-is model is created, the team must ________.
answer
create system components
question
Which of the following is an accurate representation of the steps in the business process management cycle?
answer
model processes; create components; implement processes; assess results
question
The BPM process begins with the ________ stage.
answer
model processes
question
Which of the following is NOT one of the five components of an information system?
answer
policies
question
Fixing the system so that it works correctly or adapting it to changes in requirements occurs in the ________ phase of the information system development process.
answer
maintenance
question
A ________ installation is the riskiest because the old system is turned off and the new system is turned on.
answer
plunge
question
In a ________ installation, the new system runs alongside the old one until it has been tested and is fully operational.
answer
parallel
question
With ________ installation, the organization implements the entire system/business processes on a limited portion of the business.
answer
pilot
question
If the defined project is determined to be feasible, the next step is to ________.
answer
form the project team
question
Organizational feasibility ________.
answer
concerns whether the new system fits within the company's customs and culture
question
________ feasibility refers to whether existing information technology is likely to be able to meet the needs of the new system.
answer
technical
question
What are the four dimensions of feasibility?
answer
cost, schedule, technical, and organizational feasibility
question
Once we have defined the project's goals and scope, the next step is to ________.
answer
assess feasibility
question
The first step in the system definition phase of systems development is to ________.
answer
define the goals and scope
question
Which of the following terms refers to the process of creating and maintaining information systems?
answer
systems development
question
In BPMN, ________ depict the flow or sequence of the activities in the process.
answer
solid arrows
question
In a BPMN process diagram, dotted arrows depict the flow of ________.
answer
messages and data flows
question
A functional business process ________.
answer
resides within a single business function in a single company
question
In cross-functional business process management, ________.
answer
BPM authority is shared across several departments in a single company
question
Which of the following is not a functional process in an organization?
answer
customer relationship management
question
________ is a standard set of terms and graphical notations for documenting business processes.
answer
Business Process Modeling Notation
question
In a BPMN process diagram, a ________ represents the start of a process.
answer
circle
question
In a BPMN process diagram, a ________ represents an activity.
answer
rectangle with rounded corners
question
In BPMN notation, ________ represent decisions and usually contain a question that can be answered with yes or no.
answer
diamonds
question
Developing, operating, and maintaining the organization's computing infrastructure is a major function of the ________ department.
answer
information systems
question
In organizations that operate significant non-accounting information systems, the chief information officer reports to the ________.
answer
chief executive officer
question
If the primary information systems in an organization support only accounting and finance activities, the CIO should report to the ________.
answer
CFO
question
In the IS department, the ________ group manages the computing infrastructure, including individual computers, computer centers, networks, and communications media. This group includes system and network administrators.
answer
operations
question
An important function of the ________ group in an IS department is to monitor the user experience and respond to user problems.
answer
operations
question
Which of the following is true for the various groups in an IS department?
answer
The development group manages the process of creating new information systems.
question
Which of the following is true for the function of maintaining information systems?
answer
Maintenance means fixing problems or adapting existing information systems.
question
If the organization does not develop programs in-house, then the development group of the information system department will include ________.
answer
system analysts
question
Which of the following is NOT a responsibility of a systems analyst?
answer
writing programs
question
A ________ must work with users to determine system requirements and must also help determine system test plans.
answer
system analysis
question
The responsibilities of a computer technician include ________.
answer
installing software and repairing computer networks
question
Which of the following is true for changes in IS infrastructure?
answer
Changing IS systems is expensive and time-consuming.
question
Which of the following is NOT true for information systems?
answer
Information systems change only when organizations merge.
question
The ________ is the representative for IS and IT issues within the executive staff, providing the IS perspective during discussions of problem solutions, proposals, and new initiatives.
answer
CIO
question
A(n) ________ is a group of senior managers from the major business functions that works with the CIO to set the IS priorities and decide among major IS projects and alternatives.
answer
steering committee
question
Users' computing needs vary according to the work they do. In response, most IS departments ________.
answer
have developed a set of three or four different standard configurations
question
The IS department needs to work with the steering committee and ________ to ensure the standards are effective for most of the users.
answer
CIO
question
In a well-run IS department, when a user reports a problem the department assigns a tracking number and the problem enters a queue for service. Which of the following statements is true in this case?
answer
Problems are prioritized on the basis of how critical they are to the user's work.
question
In addition to managing the computing infrastructure, the ________ manages enterprise applications as well.
answer
IS department
question
A(n) ________ is a system that has outdated technologies and techniques but is still used, despite its age.
answer
legacy information system
question
Which of the following is an example of a sniffing technique?
answer
adware
question
When referring to security threats, pretexting, sniffing, IP spoofing, and phishing are all examples of ________.
answer
unauthorized data disclosure
question
________ occurs when a person gains unauthorized access to a computer system, invading a network to obtain critical data or to manipulate the system for financial gain.
answer
hacking
question
Which of the following could most likely be the result of hacking?
answer
an unexplained reduction in your account balance
question
Which of the following is an example of a human safeguard?
answer
procedure design
question
Which of the following is a critical security function of senior-management involvement?
answer
establishing the security policy and managing risk
question
Which of the following is the responsibility of senior management in an organization?
answer
managing risk by balancing the costs and benefits of the security program
question
A security policy covering personal use of computers at work would be an example of a(n) ________.
answer
issue-specific policy
question
Which element of the security policy specifies how the organization will ensure the enforcement of security programs and policies?
answer
the general statement of the security program
question
________ refers to things we do not know, while ________ is the likelihood of an adverse occurrence.
answer
Uncertainty; risk
question
Which of the following is the first step in risk management?
answer
assess what the threats are
question
Which of the following was passed to give individuals the right to access their own health data created by doctors and other health-care providers?
answer
HIPAA
question
The Privacy Act of 1974 covers ________.
answer
records held by the U.S. government
question
Which of the following is an example of a technical safeguard?
answer
firewall
question
Which of the following statements is true for biometric identification?
answer
Biometric authentication often faces resistance from users for its invasive nature.
question
The IEEE 802.11 Committee, the group that develops and maintains wireless standards, first developed a wireless security standard called ________.
answer
Wired Equivalent Privacy
question
________ eliminate(s) spoofing of public keys and requires browser to have a CA's public key.
answer
Digital certificates
question
Which of the following observations concerning Secure Socket Layer (SSL) is true?
answer
It is a useful hybrid of symmetric and asymmetric encryption techniques.
question
You are doing an online fund transfer through the Web site of a reputed bank. Which of the following displayed in your browser's address bar will let you know that the bank is using the SSL protocol?
answer
https
question
________ is a method of mathematically manipulating the message to create a string of bits that characterize the message.
answer
Hashing
question
Which of the following is a technique used to ensure that plaintext messages are received without alteration?
answer
digital signatures
question
________ is the term used to denote Trojan horses, spyware, and adware.
answer
Malware
question
A(n) ________ is a type of virus that propagates itself using the Internet or other computer networks.
answer
worm
question
________ are viruses that masquerade as useful programs or files.
answer
Trojan horses
question
Which of the following is considered malicious human activity?
answer
hacking of information systems
question
The ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.
answer
phisher
question
________ is a technique for intercepting computer communications, either through a physical connection to the network or, in the case of wireless networks, with no physical connection.
answer
sniffing
question
________ occurs when someone deceives by pretending to be someone else.
answer
pretexting
question
Email spoofing is a synonym for ________.
answer
phishing
question
________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.
answer
Drive-by sniffers
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New