LAST TEST – Flashcard Answers

question

A ________ shows the tasks, start and finish dates, and dependencies for the tasks of a project.
answer

Gantt Chart
question

A business process that crosses into multiple companies is known as a(n) ________ business process.
answer

Interorganizational
question

A ________ is a network of activities, repositories, roles, resources, and data flows that interact to accomplish a business function.
answer

business process
question

Activities are ________.
answer

collections of related tasks that receive inputs and produce outputs
question

A(n) ________ is a physical repository.
answer

inventory
question

In a business process, a role is ________.
answer

a collection of procedures
question

Resources are ________.
answer

people or computer applications that are assigned to roles
question

An as-is model ________.
answer

documents the current situation of a business process
question

In business process management, once the as-is model is created, the team must ________.
answer

create system components
question

Which of the following is an accurate representation of the steps in the business process management cycle?
answer

model processes; create components; implement processes; assess results
question

The BPM process begins with the ________ stage.
answer

model processes
question

Which of the following is NOT one of the five components of an information system?
answer

policies
question

Fixing the system so that it works correctly or adapting it to changes in requirements occurs in the ________ phase of the information system development process.
answer

maintenance
question

A ________ installation is the riskiest because the old system is turned off and the new system is turned on.
answer

plunge
question

In a ________ installation, the new system runs alongside the old one until it has been tested and is fully operational.
answer

parallel
question

With ________ installation, the organization implements the entire system/business processes on a limited portion of the business.
answer

pilot
question

If the defined project is determined to be feasible, the next step is to ________.
answer

form the project team
question

Organizational feasibility ________.
answer

concerns whether the new system fits within the company’s customs and culture
question

________ feasibility refers to whether existing information technology is likely to be able to meet the needs of the new system.
answer

technical
question

What are the four dimensions of feasibility?
answer

cost, schedule, technical, and organizational feasibility
question

Once we have defined the project’s goals and scope, the next step is to ________.
answer

assess feasibility
question

The first step in the system definition phase of systems development is to ________.
answer

define the goals and scope
question

Which of the following terms refers to the process of creating and maintaining information systems?
answer

systems development
question

In BPMN, ________ depict the flow or sequence of the activities in the process.
answer

solid arrows
question

In a BPMN process diagram, dotted arrows depict the flow of ________.
answer

messages and data flows
question

A functional business process ________.
answer

resides within a single business function in a single company
question

In cross-functional business process management, ________.
answer

BPM authority is shared across several departments in a single company
question

Which of the following is not a functional process in an organization?
answer

customer relationship management
question

________ is a standard set of terms and graphical notations for documenting business processes.
answer

Business Process Modeling Notation
question

In a BPMN process diagram, a ________ represents the start of a process.
answer

circle
question

In a BPMN process diagram, a ________ represents an activity.
answer

rectangle with rounded corners
question

In BPMN notation, ________ represent decisions and usually contain a question that can be answered with yes or no.
answer

diamonds
question

Developing, operating, and maintaining the organization’s computing infrastructure is a major function of the ________ department.
answer

information systems
question

In organizations that operate significant non-accounting information systems, the chief information officer reports to the ________.
answer

chief executive officer
question

If the primary information systems in an organization support only accounting and finance activities, the CIO should report to the ________.
answer

CFO
question

In the IS department, the ________ group manages the computing infrastructure, including individual computers, computer centers, networks, and communications media. This group includes system and network administrators.
answer

operations
question

An important function of the ________ group in an IS department is to monitor the user experience and respond to user problems.
answer

operations
question

Which of the following is true for the various groups in an IS department?
answer

The development group manages the process of creating new information systems.
question

Which of the following is true for the function of maintaining information systems?
answer

Maintenance means fixing problems or adapting existing information systems.
question

If the organization does not develop programs in-house, then the development group of the information system department will include ________.
answer

system analysts
question

Which of the following is NOT a responsibility of a systems analyst?
answer

writing programs
question

A ________ must work with users to determine system requirements and must also help determine system test plans.
answer

system analysis
question

The responsibilities of a computer technician include ________.
answer

installing software and repairing computer networks
question

Which of the following is true for changes in IS infrastructure?
answer

Changing IS systems is expensive and time-consuming.
question

Which of the following is NOT true for information systems?
answer

Information systems change only when organizations merge.
question

The ________ is the representative for IS and IT issues within the executive staff, providing the IS perspective during discussions of problem solutions, proposals, and new initiatives.
answer

CIO
question

A(n) ________ is a group of senior managers from the major business functions that works with the CIO to set the IS priorities and decide among major IS projects and alternatives.
answer

steering committee
question

Users’ computing needs vary according to the work they do. In response, most IS departments ________.
answer

have developed a set of three or four different standard configurations
question

The IS department needs to work with the steering committee and ________ to ensure the standards are effective for most of the users.
answer

CIO
question

In a well-run IS department, when a user reports a problem the department assigns a tracking number and the problem enters a queue for service. Which of the following statements is true in this case?
answer

Problems are prioritized on the basis of how critical they are to the user’s work.
question

In addition to managing the computing infrastructure, the ________ manages enterprise applications as well.
answer

IS department
question

A(n) ________ is a system that has outdated technologies and techniques but is still used, despite its age.
answer

legacy information system
question

Which of the following is an example of a sniffing technique?
answer

adware
question

When referring to security threats, pretexting, sniffing, IP spoofing, and phishing are all examples of ________.
answer

unauthorized data disclosure
question

________ occurs when a person gains unauthorized access to a computer system, invading a network to obtain critical data or to manipulate the system for financial gain.
answer

hacking
question

Which of the following could most likely be the result of hacking?
answer

an unexplained reduction in your account balance
question

Which of the following is an example of a human safeguard?
answer

procedure design
question

Which of the following is a critical security function of senior-management involvement?
answer

establishing the security policy and managing risk
question

Which of the following is the responsibility of senior management in an organization?
answer

managing risk by balancing the costs and benefits of the security program
question

A security policy covering personal use of computers at work would be an example of a(n) ________.
answer

issue-specific policy
question

Which element of the security policy specifies how the organization will ensure the enforcement of security programs and policies?
answer

the general statement of the security program
question

________ refers to things we do not know, while ________ is the likelihood of an adverse occurrence.
answer

Uncertainty; risk
question

Which of the following is the first step in risk management?
answer

assess what the threats are
question

Which of the following was passed to give individuals the right to access their own health data created by doctors and other health-care providers?
answer

HIPAA
question

The Privacy Act of 1974 covers ________.
answer

records held by the U.S. government
question

Which of the following is an example of a technical safeguard?
answer

firewall
question

Which of the following statements is true for biometric identification?
answer

Biometric authentication often faces resistance from users for its invasive nature.
question

The IEEE 802.11 Committee, the group that develops and maintains wireless standards, first developed a wireless security standard called ________.
answer

Wired Equivalent Privacy
question

________ eliminate(s) spoofing of public keys and requires browser to have a CA’s public key.
answer

Digital certificates
question

Which of the following observations concerning Secure Socket Layer (SSL) is true?
answer

It is a useful hybrid of symmetric and asymmetric encryption techniques.
question

You are doing an online fund transfer through the Web site of a reputed bank. Which of the following displayed in your browser’s address bar will let you know that the bank is using the SSL protocol?
answer

https
question

________ is a method of mathematically manipulating the message to create a string of bits that characterize the message.
answer

Hashing
question

Which of the following is a technique used to ensure that plaintext messages are received without alteration?
answer

digital signatures
question

________ is the term used to denote Trojan horses, spyware, and adware.
answer

Malware
question

A(n) ________ is a type of virus that propagates itself using the Internet or other computer networks.
answer

worm
question

________ are viruses that masquerade as useful programs or files.
answer

Trojan horses
question

Which of the following is considered malicious human activity?
answer

hacking of information systems
question

The ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.
answer

phisher
question

________ is a technique for intercepting computer communications, either through a physical connection to the network or, in the case of wireless networks, with no physical connection.
answer

sniffing
question

________ occurs when someone deceives by pretending to be someone else.
answer

pretexting
question

Email spoofing is a synonym for ________.
answer

phishing
question

________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.
answer

Drive-by sniffers

Get instant access to
all materials

Become a Member