Itm 6015 Final Exam Practice

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Bz4934
B
Bz4934
Community Contributor
Quizzes Created: 1 | Total Attempts: 438
| Attempts: 438 | Questions: 200
Please wait...
Question 1 / 200
0 %
0/100
Score 0/100
1. According to the Federal Trade Commission (FTC), identify theft is "someone appropriating your personal information without your knowledge to commit fraud or theft."

Explanation

According to the Federal Trade Commission (FTC), identity theft refers to someone using your personal information without your knowledge to commit fraud or theft. This means that they are taking your personal information, such as your name, social security number, or credit card details, and using it for their own gain without your permission. Therefore, the statement "True" is accurate as it aligns with the definition provided by the FTC.

Submit
Please wait...
About This Quiz
Itm 6015 Final Exam Practice - Quiz

The ITM 6015 Final Exam Practice quiz assesses key competencies in developing and managing reliable information systems, documenting systems, understanding system components, and the significance of system testing... see morein organizational contexts. see less

2. The project champion is a business manager who has high credibility as an organizational spokesperson among the user community, and is successful at communicating the business vision and project benefits.

Explanation

The project champion is someone who holds a high position in the organization and is seen as a credible spokesperson. They are able to effectively communicate the business vision and the benefits of the project to the user community. This role is crucial in gaining support and buy-in from stakeholders and ensuring the success of the project. Therefore, the statement is true.

Submit
3. Electronic Records management (ERM) practices became a more important information security management issue in the U.S. in 2006 when new legislation established new rules for timely information gathering in response to potential litigation.

Explanation

The statement is true because in 2006, new legislation was established in the U.S. that introduced new rules for timely information gathering in response to potential litigation. This legislation made electronic records management (ERM) practices even more important as they became a crucial aspect of information security management.

Submit
4. Some consultants have claimed that up to one-third of all spreadsheets contain errors, which can include mechanical errors (typos), errors in logic, as well as errors in omission.

Explanation

The statement is true because consultants have claimed that up to one-third of all spreadsheets contain errors. These errors can include mechanical errors like typos, errors in logic, and errors in omission. This suggests that a significant number of spreadsheets have mistakes in them, highlighting the importance of double-checking and verifying the accuracy of spreadsheet data.

Submit
5. For large enterprise system packages, it is common for companies to contract with a consulting firm, called a third-party implementation partner, to provide installation and maintenance support.

Explanation

Large enterprise system packages often require specialized knowledge and expertise to install and maintain. Companies may not have the necessary resources or expertise in-house, so they contract with a third-party implementation partner, typically a consulting firm, to handle these tasks. This allows the company to benefit from the partner's experience and ensures smooth implementation and ongoing support for the system package. Therefore, the statement that it is common for companies to contract with a third-party implementation partner for installation and maintenance support is true.

Submit
6. Some organizations have found the use of red-yellow-green (traffic light) symbols effective in communicating problem areas to project oversight committees.

Explanation

The statement suggests that organizations have found the use of red-yellow-green symbols effective in communicating problem areas to project oversight committees. This implies that these symbols are able to convey information about problem areas in a clear and understandable way, making it easier for project oversight committees to identify and address issues. Therefore, the answer is true.

Submit
7. Agile methodologies are especially useful for developing smaller systems rather than largescale transaction processing applications.

Explanation

Agile methodologies are particularly beneficial for developing smaller systems rather than large-scale transaction processing applications because they prioritize flexibility, adaptability, and iterative development. Smaller systems often require quicker response times, frequent changes, and a higher degree of collaboration between team members. Agile methodologies, such as Scrum or Kanban, allow for continuous improvement, regular feedback, and incremental development, making them well-suited for smaller projects where requirements may evolve rapidly. In contrast, large-scale transaction processing applications often involve complex and rigid processes, making traditional waterfall methodologies more appropriate.

Submit
8. A company that elects to use a "hosted" application rather than to purchase the software application and host it on its own equipment, is making use of a(n) application service provider (or ASP).

Explanation

When a company chooses to use a "hosted" application instead of buying and hosting the software on its own equipment, it is utilizing an application service provider (ASP). This means that the company is outsourcing the hosting and maintenance of the software to a third-party provider, who delivers the application over the internet. This allows the company to access and use the software without the need for extensive hardware and infrastructure investments. Therefore, the statement is true.

Submit
9. A patent gives its creator the exclusive right to the manufacture and use of a new design or method for a limited period of time.

Explanation

A patent is a legal protection granted to inventors or creators of a new design or method. This protection gives them exclusive rights to manufacture and use their invention for a specific period of time. During this time, others are prohibited from using or manufacturing the patented invention without the creator's permission. Therefore, the statement that a patent gives its creator the exclusive right to the manufacture and use of a new design or method for a limited period of time is true.

Submit
10. A type of testing where the objective is to make sure that the system performs reliably and does what it is supposed to do in a user environment is referred to as user acceptance testing.

Explanation

User acceptance testing is a type of testing that focuses on ensuring that the system functions reliably and meets the requirements of the end users. It involves testing the system in a real-world user environment to validate its performance and functionality. This testing phase allows users to provide feedback and verify that the system meets their needs and expectations before it is deployed. Therefore, the given statement is true.

Submit
11. Choosing between building a custom application and purchasing a software package is called a make-or-buy decision.

Explanation

A make-or-buy decision refers to the process of deciding whether to develop a custom application or purchase a software package. This decision involves evaluating the costs, benefits, and risks associated with each option. Therefore, the statement that choosing between building a custom application and purchasing a software package is called a make-or-buy decision is true.

Submit
12. A denial of service attack is implemented by simultaneously sending a large number of messages to a target computer to create a computer or communications overload, so that legitimate users cannot obtain access.

Explanation

A denial of service attack involves flooding a target computer with a high volume of messages, causing it to become overloaded and unable to handle legitimate user requests. This prevents legitimate users from accessing the computer or its communications. Therefore, the statement is true.

Submit
13. Some ethical issues are viewed differently depending upon the culture in which they arise.

Explanation

Ethical issues are subjective and can vary across different cultures. What may be considered ethical in one culture may be viewed differently in another. This is because cultural norms, values, and beliefs shape individuals' perspectives on what is right or wrong. Therefore, it is true that some ethical issues are viewed differently depending upon the culture in which they arise.

Submit
14. Additional project management skills are needed when using offsite and offshore resources for new application development.

Explanation

When using offsite and offshore resources for new application development, additional project management skills are needed. This is because managing a project with resources located in different locations requires effective communication, coordination, and collaboration. Offsite and offshore resources may have different time zones, cultural norms, and work practices, which need to be considered and managed. Additionally, there may be language barriers and challenges in aligning the project goals and expectations. Therefore, having additional project management skills is essential to ensure successful development and delivery of the new application.

Submit
15. Using a payroll system as an example, paychecks and W-2 forms are examples of which of the following system elements?

Explanation

Paychecks and W-2 forms are examples of outputs in a payroll system. Outputs refer to the information or results that are produced by a system and are provided to the users or other systems. In this case, paychecks and W-2 forms are the final results of the payroll system that are generated and given to the employees.

Submit
16. In general, the term "system" is defined as a set of interrelated components that must work together to achieve some common purpose.

Explanation

The given statement is true. A system is indeed defined as a collection of interconnected components that collaborate to achieve a shared objective. These components, whether they are physical or abstract, interact and depend on each other to function effectively. By working together, they accomplish a common purpose or goal.

Submit
17. U.S. copyright laws make it illegal to copy software and use it without the software vendor's permission.

Explanation

U.S. copyright laws prohibit the unauthorized copying and use of software without permission from the software vendor. This means that individuals or organizations cannot make copies of software or use it without obtaining proper authorization.

Submit
18. The requirements definition for a purchased system is ________ detailed than the requirements used to build a prototype, and ________ detailed than the requirements needed to design a custom system.

Explanation

The requirements definition for a purchased system is more detailed than the requirements used to build a prototype because purchased systems are typically already developed and have a set of predefined features that need to be clearly defined. On the other hand, the requirements for a purchased system are less detailed than the requirements needed to design a custom system because custom systems are built from scratch and require a more thorough understanding of the specific needs and functionalities of the organization.

Submit
19. A worm is a virus that has the ability to copy itself from machine to machine, usually over a network.

Explanation

A worm is a type of malicious software that can replicate itself and spread from one computer to another, typically through a network. Unlike viruses, worms do not require a host program to spread. They can exploit vulnerabilities in computer systems to gain access and then use that access to propagate themselves. This makes them capable of rapidly infecting multiple machines and causing widespread damage. Therefore, the statement that a worm is a virus that can copy itself from machine to machine over a network is true.

Submit
20. Primary sources of thefts of intellectual property rights, trade secrets, and research and development knowledge are employees.

Explanation

The statement is true because employees have direct access to sensitive information and are often familiar with the company's intellectual property, trade secrets, and research and development knowledge. This insider knowledge makes them more likely to be involved in thefts of these assets. It is important for companies to have proper security measures in place to protect against such thefts and to educate employees about the importance of intellectual property rights.

Submit
21. One of the fundamental principles of systems analysis and design (SA&D) is that the logical system should be described before the physical system.

Explanation

The explanation for the given correct answer is that in systems analysis and design, it is important to first define and describe the logical system before moving on to the physical system. This is because the logical system represents the conceptual and functional aspects of the system, including the processes, data flows, and relationships, while the physical system deals with the actual implementation and hardware/software components. By starting with the logical system, it ensures that the requirements and functionality of the system are properly understood and defined before moving on to the physical implementation.

Submit
22. When a change made to one part of a system results in unexpected changes to another part of the system, it is commonly referred to as a ripple effect.

Explanation

When a change made to one part of a system causes unexpected changes in another part, it is known as a ripple effect. This term is commonly used to describe the way in which modifications or alterations in one area can have unintended consequences in other areas of a system. The ripple effect is often seen in complex systems where various components are interconnected and interdependent. It highlights the interconnected nature of systems and the potential for changes to have broader impacts beyond the immediate area of modification.

Submit
23. Employee training is part of the installation step of the SDLC.

Explanation

Employee training is an essential part of the installation step of the SDLC. During the installation phase, employees are trained on how to use and operate the new system or software that is being implemented. This training ensures that employees have the necessary skills and knowledge to effectively utilize the new system and perform their job responsibilities efficiently. Without proper training, employees may struggle to adapt to the new system, leading to inefficiencies and potential errors. Therefore, employee training is crucial during the installation step of the SDLC to ensure a smooth transition and successful implementation of the new system.

Submit
24. Open source software is well-suited for very specialized applications and business processes.

Explanation

Generic applications that are common to many organizations are the most viable applications because they will attract a large community of developers.

Submit
25. System testing only occurs when systems are initially developed.

Explanation

Testing also occurs when systems are modified.

Submit
26. The parallel strategy of installing a new system is the riskiest method of installation because the old system is abandoned as soon as the new system is implemented.

Explanation

The cutover (or cold turkey) strategy is riskiest.

Submit
27. A physical system description depicts ________ the system operators, while a logical system description depicts ________ the system does.

Explanation

A physical system description depicts how the system operators, while a logical system description depicts what the system does. This means that a physical system description focuses on the mechanics and processes involved in operating the system, while a logical system description focuses on the functionality and outcomes of the system.

Submit
28. A conversion strategy whereby the new system is first implemented in only part of the organization to solve any problems before implemented in the rest of the organization is called a:

Explanation

A pilot strategy is a conversion strategy where the new system is initially implemented in only a part of the organization. This allows any problems or issues to be identified and resolved before the system is implemented in the rest of the organization. This approach helps to minimize risks and ensure a smooth transition to the new system.

Submit
29. Greater changes in business processes are associated with "vanilla" implementations of software packages.

Explanation

Greater changes in business processes are associated with "vanilla" implementations of software packages because "vanilla" implementations refer to using the software package as it is, without any customization or modifications to fit specific business needs. Therefore, since "vanilla" implementations do not accommodate specific business processes, organizations often need to make significant changes to their existing processes in order to align with the software package. This is in contrast to customized implementations, where the software is tailored to fit the organization's existing processes, resulting in fewer changes needed.

Submit
30. Which of the following graphically depicts the estimated times (and later, the actual times) for each project task against a horizontal timescale?

Explanation

A Gantt chart is a type of bar chart that visually represents the estimated and actual times for each project task. It is plotted against a horizontal timescale, allowing for easy visualization of the project timeline. The chart shows the start and end dates of each task, as well as the duration. This allows project managers to track progress, identify dependencies, and allocate resources effectively. The other options, PERT chart, work breakdown, and project charter, do not specifically depict times against a horizontal timescale, making them incorrect answers.

Submit
31. Which of the following is NOT one of the nine project management competencies certified by the Project Management Institute?

Explanation

The correct answer is conflict management. The question asks for the competency that is NOT certified by the Project Management Institute (PMI). The PMI is a renowned organization that provides certifications in project management. Among the given options, conflict management is not listed as one of the nine competencies certified by the PMI. This suggests that conflict management may not be considered as a specific competency that the PMI focuses on in their certification programs.

Submit
32. The ________ approach to systems development has often been referred to as the "waterfall" model.

Explanation

The correct answer is SDLC (Systems Development Life Cycle). The SDLC approach to systems development is often referred to as the "waterfall" model because it follows a linear and sequential process. This means that each phase of the development cycle (such as planning, analysis, design, implementation, and maintenance) is completed before moving on to the next phase. This approach is characterized by its structured and systematic nature, with each phase building upon the previous one.

Submit
33. An RFP should be sent to as many vendors as possible.

Explanation

An RFP should only be sent to a short list of vendors that produce suitable software packages.

Submit
34. The organizational unit responsible for ensuring that standard approaches to project management are utilized across projects is called the:

Explanation

The Program Management Office (PMO) is responsible for ensuring that standard approaches to project management are utilized across projects. The PMO provides guidance, support, and oversight to project managers and teams, helping them adhere to best practices, processes, and methodologies. The PMO also helps in coordinating resources, managing risks, and monitoring project progress. By establishing and enforcing consistent project management practices, the PMO helps improve project success rates and ensures alignment with organizational goals and objectives. PMI is a professional association for project management, while the Portfolio Management Team and Project Oversight Committee may have different responsibilities within an organization.

Submit
35. Research has shown that an organization's inability to return to normal business activities after a major disruption is a key predictor of:

Explanation

The correct answer is business survival. Research has shown that when an organization is unable to return to normal business activities after a major disruption, it is more likely to struggle and potentially even fail. This suggests that the ability to recover and resume operations is crucial for the survival of a business. It highlights the importance of having effective crisis management and contingency plans in place to minimize the impact of disruptions and ensure the organization can continue to operate successfully.

Submit
36. Which position is responsible for continually assessing an organization's information security risks and developing and implementing effective countermeasures?

Explanation

The correct answer is CSO or CISO. The CSO (Chief Security Officer) or CISO (Chief Information Security Officer) is responsible for continually assessing an organization's information security risks and developing and implementing effective countermeasures. They are in charge of ensuring that the organization's information and data are protected from potential threats and vulnerabilities. This includes identifying and analyzing risks, implementing security measures, and monitoring and responding to security incidents. The CSO or CISO plays a crucial role in maintaining the overall security posture of the organization.

Submit
37. The Sarbanes-Oxley act requires officers of publicly traded companies in the U.S. to certify that:

Explanation

The Sarbanes-Oxley act requires officers of publicly traded companies in the U.S. to certify that they are responsible for establishing and maintaining internal financial controls. This means that the officers must ensure that the company has effective systems and processes in place to accurately record and report financial information, prevent fraud, and comply with applicable laws and regulations. By certifying this, the officers are taking personal responsibility for the financial integrity of the company and providing assurance to shareholders and the public that the company's financial statements are reliable.

Submit
38. According to the Federal Trade Commission, "someone appropriating your personal information without your knowledge to commit fraud or theft" is called:

Explanation

The term "someone appropriating your personal information without your knowledge to commit fraud or theft" is commonly known as identity theft. This refers to the act of someone stealing another person's personal information, such as their name, social security number, or financial details, with the intention of using it for fraudulent purposes. It is a serious crime that can lead to financial loss and damage to an individual's reputation.

Submit
39. The U.S. has much stronger privacy laws and practices than Europe.

Explanation

This statement is false. Europe has much stronger privacy laws and practices compared to the U.S. The European Union has implemented the General Data Protection Regulation (GDPR), which provides comprehensive regulations for the protection of personal data. The GDPR grants individuals more control over their personal information and imposes strict penalties for non-compliance. In contrast, the U.S. has a more fragmented approach to privacy laws, with various federal and state regulations that are generally considered less stringent than the GDPR.

Submit
40. The SDLC methodology is the best methodology when an application needs to be quickly developed.

Explanation

The SDLC is a very time-consuming process.

Submit
41. Which of the following accurately describes the order in which a system is tested?

Explanation

The correct order in which a system is tested is module testing, subsystem testing, integration testing, and acceptance testing. Module testing involves testing individual components or modules of the system to ensure they function correctly. Subsystem testing involves testing a group of related modules together to ensure they work together properly. Integration testing involves testing the integration of different subsystems to ensure they work together seamlessly. Finally, acceptance testing involves testing the entire system to ensure it meets the requirements and is ready for deployment.

Submit
42. The most common approach to defining data elements in a DFD is to create a(n):

Explanation

In a Data Flow Diagram (DFD), the most common approach to defining data elements is to create a data dictionary/directory. A data dictionary/directory is a centralized repository that provides a comprehensive description of all data elements used in the system. It includes information such as data names, definitions, data types, and relationships between data elements. This helps in ensuring consistency and understanding of data throughout the system, making it easier to analyze, design, and maintain the system.

Submit
43. The following diagram depicts which of the following conversion strategies?

Explanation

The diagram represents a phased strategy for conversion. This strategy involves implementing the conversion process in distinct phases or stages, with each phase building upon the previous one. It allows for a systematic and controlled approach to the conversion, ensuring that each phase is successfully completed before moving on to the next. This strategy is often used when the conversion process is complex or requires significant changes to be made.

Submit
44. Which of the following best describes the construction phase of the systems life cycle?

Explanation

During the construction phase of the systems life cycle, the system is functionally designed, which means that the overall structure and functionality of the system are planned and defined. Once the functional design is complete, the physical design of the system is specified, which involves determining the hardware, software, and other physical components required for the system. This phase focuses on translating the functional design into a detailed technical plan for implementation. The other options mentioned in the question, such as installing the new system, documenting system needs, and converting data and procedures from the old system, are not specific to the construction phase.

Submit
45. Hackers can be differentiated from crackers by:

Explanation

Hackers can be differentiated from crackers by their level of malicious intent. While both hackers and crackers engage in unauthorized access to computer systems, hackers typically have a curiosity and desire to explore and understand systems, often with no intention to cause harm. On the other hand, crackers have a malicious intent and aim to exploit vulnerabilities for personal gain or to cause damage. The level of malicious intent is what sets hackers and crackers apart from each other.

Submit
46. What is just beginning to be addressed in organizations' acceptable-use policies?

Explanation

Organizations' acceptable-use policies are now starting to address the usage of social media. This suggests that organizations are recognizing the need to regulate and set guidelines for employees' use of social media platforms during work hours. As social media becomes increasingly prevalent in the workplace, organizations are realizing the importance of addressing potential risks and ensuring that employees use social media responsibly and in line with the organization's values and policies.

Submit
47. What effect does The PATRIOT Act passed by Congress have on the U.S. government's ability to access an individual's personal information?

Explanation

The correct answer is "significantly strengthens." The PATRIOT Act passed by Congress enhances the U.S. government's ability to access an individual's personal information. This act grants broader surveillance powers to intelligence agencies, allowing them to collect and analyze data related to national security threats. It expands the scope of information that can be obtained through various means such as wiretapping, monitoring financial transactions, and accessing electronic communications. As a result, the government's ability to access personal information is significantly strengthened under the PATRIOT Act.

Submit
48. Which of the following regions has the lowest rate of software piracy?

Explanation

North America has the lowest rate of software piracy compared to Western Europe, Asia/Pacific, and Latin America. This can be attributed to stricter copyright laws and enforcement, as well as a higher level of awareness and education regarding the importance of intellectual property rights in the region. Additionally, North America has a more mature and developed software industry, which may contribute to a lower rate of piracy as legitimate software options are readily available to consumers.

Submit
49. A change management program as part of an IT project is used to:

Explanation

A change management program is implemented as part of an IT project to address and manage the resistance that may arise from business users when a new system is being implemented. This program aims to ensure a smooth transition and minimize any disruptions or pushback from the users. By involving and engaging the business users throughout the change process, the program helps to gain their buy-in, address their concerns, and ultimately reduce resistance to the new system.

Submit
50. When considering the purchase of a major software application, managers need to also consider the following potential downside:

Explanation

When purchasing a major software application, managers need to consider the potential downside that the package seldom totally fits the company's needs. This means that the software may not have all the features and functionalities required by the company, and customization may be necessary. This can lead to additional costs and time spent on modifying the software to meet the company's specific requirements.

Submit
51. Applying knowledge, skills, tools, and techniques to a broad range of activities in order to meet the requirement of a particular project is called:

Explanation

Project management involves applying knowledge, skills, tools, and techniques to various activities in order to meet the requirements of a specific project. It encompasses planning, organizing, and controlling resources to achieve project goals. Life-cycle management refers to managing the entire life cycle of a product or project, including development, launch, and disposal. Change management deals with managing changes within an organization. Program management involves managing multiple related projects to achieve strategic objectives. Therefore, the correct answer is project management as it aligns with the given description.

Submit
52. As defined in the textbook, the generic systems development life cycle consists of the following three phases:

Explanation

The correct answer is "definition, construction, and implementation." This is because the generic systems development life cycle typically begins with the definition phase, where the requirements and objectives of the system are identified. This is followed by the construction phase, where the system is designed and developed based on the defined requirements. Finally, the implementation phase involves deploying the system and making it operational. The other options mentioned in the question do not accurately represent the phases of the systems development life cycle.

Submit
53. Which of the following is not typically the responsibility of an IT project manager?

Explanation

An IT project manager is typically responsible for overseeing multiple project phases, determining the duration of each development task, and forming a project team with the necessary knowledge and skills. However, approving funds for the project is not typically within their responsibilities. This task is usually handled by higher-level management or finance departments who have the authority and expertise to allocate and approve funds for various projects.

Submit
54. A "cookie" is:

Explanation

A "cookie" is a small record stored on the user's computer that identifies the user to a Web site. This record contains information such as user preferences, login credentials, and browsing activity. Cookies are used by websites to provide a personalized experience for the user, remember their preferences, and track their behavior. They are not worms or harmful to personal computers. Therefore, the correct answer is a small record stored on the user's computer that identifies the user to a Web site.

Submit
55. The Construction phase of the SDLC involves installation and operations of the new system.

Explanation

These steps are part of the Implementation phase.

Submit
56. Which is a basic principle of business process reengineering (BPR) suggested by Hammer ?

Explanation

Hammer suggests that a basic principle of business process reengineering (BPR) is integrating information processing into the work that produces the information. This means that instead of having separate departments or individuals solely responsible for processing information, the information processing should be integrated into the actual work processes. By doing so, organizations can streamline their operations, reduce inefficiencies, and improve overall productivity. This principle emphasizes the importance of eliminating unnecessary steps and bottlenecks in information processing, ultimately leading to more effective and efficient business processes.

Submit
57. When a physical model of a system is depicted with a diagram, cylinders are used to represent:

Explanation

In the context of depicting a physical model of a system with a diagram, cylinders are commonly used to represent databases. Databases are used to store and organize large amounts of data, and the cylindrical shape is often used to symbolize this storage. The use of cylinders as a representation for major modules, data flows, or processes is not as common or widely recognized in this context.

Submit
58. When developing a logical data flow diagram, a rectangle (or open rectangle) indicates:

Explanation

In a logical data flow diagram, a rectangle (or open rectangle) is used to represent data at rest. This means that the data is stored or held in a static state, and is not currently being transferred or processed. The rectangle symbolizes a data entity or data store within the system.

Submit
59. Security measures that are concerned with whether or not users can run an application, read a file, or change data in a database, or can change who can access to data that others have created are referred to as:

Explanation

Logical access controls are security measures that determine whether users can run an application, read a file, change data in a database, or modify access permissions for others' data. These controls are designed to restrict and manage user access to sensitive information and resources within a system. Unlike physical access controls, which focus on securing the physical environment and infrastructure, logical access controls specifically address the authorization and authentication mechanisms that govern user access to digital assets. Backup procedures and audit trails, although important for overall security, do not directly relate to the specific concern of controlling user access rights.

Submit
60. The acronym RFP stands for:

Explanation

RFP stands for "request for proposal." This acronym is commonly used in business and government sectors to solicit proposals from potential vendors or contractors. It is a formal document that outlines the requirements, specifications, and objectives of a project or initiative, and invites interested parties to submit their proposals for consideration. The purpose of an RFP is to gather competitive bids and select the best solution or provider that meets the organization's needs. Therefore, "request for proposal" accurately describes the meaning and purpose of RFP.

Submit
61. The goal of the IS manager responsible for information security is to eliminate all information risk.

Explanation

The goal of the IS manager responsible for information security is not to eliminate all information risk, but rather to manage and mitigate it. It is practically impossible to completely eliminate all information risk as there will always be potential vulnerabilities and threats. The role of the IS manager is to identify and assess risks, implement appropriate security measures, and develop strategies to minimize the impact of any potential risks.

Submit
62. Which of the following is true regarding personal financial credit reports?

Explanation

Many individuals do not regularly review their personal financial credit reports, which is why inaccuracies are not usually spotted. This suggests that there is a lack of awareness or importance placed on reviewing these reports, leading to potential errors going unnoticed.

Submit
63. In a recent survey, what percentage of students studying in a sample of U.S. colleges and universities said it is always wrong to pirate music and movies?

Explanation

The correct answer is "more than 10% but less than 25%". This answer suggests that a significant portion of students studying in U.S. colleges and universities believe that it is wrong to pirate music and movies, but it is not a majority opinion. It implies that there is a range of perspectives on this issue among students, with a sizeable minority holding this belief.

Submit
64. When there are discrepancies between a package's capabilities and a company's needs, the only way to deal with the discrepancies is by modifying the package.

Explanation

A company can change procedures to match those of the package, or implement the package "as is" and work around the differences.

Submit
65. According to Kappelman et al. (2006), which is one of the people-related early warning signs of IT project failure?

Explanation

According to Kappelman et al. (2006), inadequate business stakeholder involvement or participation in the project and subject matter experts (SMEs) in the business being overscheduled are both people-related early warning signs of IT project failure. These factors indicate a lack of key personnel involvement and availability, which can lead to miscommunication, delays, and ultimately project failure.

Submit
66. Being a Beta site usually means that the company:

Explanation

Being a Beta site means that the company is involved in user acceptance testing for the vendor. Beta testing is the phase in software development where the product is tested by real users in a real environment before its official release. The company acts as a testing ground for the vendor to gather feedback, identify bugs, and make necessary improvements to the software. This involvement allows the company to provide valuable insights and influence the functionality of the package.

Submit
67. According to the textbook, which of the following is also an ethical behavior that is recognized by most world religions?

Explanation

Treating others as you would like them to treat you is recognized as an ethical behavior by most world religions because it promotes empathy, respect, and fairness. This principle, often referred to as the Golden Rule, encourages individuals to consider the impact of their actions on others and to treat them with kindness and compassion. By treating others in a manner that we would want to be treated ourselves, we uphold the values of empathy and fairness, which are central to many religious teachings.

Submit
68. A common pitfall in developing a master schedule for a project is a failure to:

Explanation

A common pitfall in developing a master schedule for a project is a failure to understand the interdependencies among project tasks and subtasks. This means that when creating a schedule, it is important to consider how different tasks and subtasks are related to each other and how they may impact the overall timeline of the project. Failing to understand these interdependencies can result in a schedule that is unrealistic or does not accurately reflect the necessary sequence of tasks.

Submit
69. Procedural-oriented approaches to systems design first involve the:

Explanation

Procedural-oriented approaches to systems design first involve analyzing and documenting the existing system, known as the As-Is model. This step helps in understanding the current processes, data flow, and functionalities of the system. By examining the As-Is model, designers can identify areas for improvement and develop a clear understanding of the system's strengths and weaknesses. Once the As-Is model is established, designers can then move on to creating a Logical To-Be model, which outlines the desired future state of the system. The Physical To-Be model represents the implementation of the Logical To-Be model, while the Want-To-Be model is not a recognized term in systems design.

Submit
70. Testing a new custom system before implementation is the responsibility of:

Explanation

Testing a new custom system before implementation is the responsibility of both users and IS analysts because both parties have unique roles to play in the testing process. Users are responsible for testing the system from a functional perspective, ensuring that it meets their specific requirements and performs as expected. On the other hand, IS analysts are responsible for testing the system from a technical perspective, checking for any bugs, errors, or compatibility issues. By involving both users and IS analysts in the testing process, a comprehensive evaluation of the system can be conducted, addressing both user needs and technical aspects.

Submit
71. Which of the following is not graphically represented in a data flow diagram (DFD)?

Explanation

A data flow diagram (DFD) is a graphical representation of the flow of data within a system. It shows how data is input, processed, and output in a system. In a DFD, the sender is not graphically represented because it is not a component or element that directly interacts with the flow of data. The sender is typically considered as an external entity or a source of data inputs to the system, but it is not visually depicted in a DFD.

Submit
72. All of the following are tools for representing the Logical To-Be model of an information system except a(n):

Explanation

The program chart is not a tool for representing the Logical To-Be model of an information system. The other options listed - data dictionary, entity-relationship diagram, and data flow diagram - are commonly used tools for representing different aspects of the logical model. A program chart, on the other hand, is typically used to represent the flow and organization of program code, rather than the logical structure of an information system.

Submit
73. When prototyping is incorporated into a traditional SDLC approach, it is most commonly included as part of which of the following steps?

Explanation

When prototyping is incorporated into a traditional SDLC approach, it is most commonly included as part of the requirements definition step. This is because prototyping allows for the creation of a working model or prototype of the system, which can help stakeholders better understand and refine their requirements. By incorporating prototyping at this early stage, potential issues or misunderstandings can be identified and addressed before moving on to the next steps of the SDLC.

Submit
74. A contract with a vendor usually does not include:

Explanation

A contract with a vendor typically includes details about the number of licenses required, the payment schedule, and the software specifications. However, it usually does not include a feasibility analysis. Feasibility analysis is a separate process that assesses the practicality and viability of a project or solution, and is typically conducted before entering into a contract with a vendor.

Submit
75. The U.S. position on privacy can be characterized as being favorable toward:

Explanation

The U.S. position on privacy is characterized as being favorable toward consumer data being viewed as a saleable, usable asset that belongs to the corporation that collected the data. This suggests that in the U.S., there is a tendency to prioritize the interests of corporations over the control and protection of personal data by individuals.

Submit
76. Which of the following regions has the lowest rate of software piracy?

Explanation

North America has the lowest rate of software piracy compared to Western Europe, Asia/Pacific, and Latin America. This could be due to stricter copyright laws and enforcement, higher purchasing power, and a strong culture of respecting intellectual property rights in the region. Additionally, the presence of major software companies and a well-developed technology industry in North America may contribute to a lower rate of software piracy.

Submit
77. Which is not a potential disadvantage of purchasing packaged systems?

Explanation

One potential disadvantage of purchasing packaged systems is that they can cost more than if they were custom developed in-house or by a contractor. This is because packaged systems often come with additional features and functionalities that may not be necessary for the specific needs of the organization, leading to higher costs. Additionally, customization options may be limited in packaged systems, requiring the organization to pay for additional modifications or workarounds.

Submit
78. Why is it important for a system analyst to document formal as well as informal systems within an organization?

Explanation

It is important for a system analyst to document formal as well as informal systems within an organization because the usage of an informal system by users indicates that the formal system is lacking in some aspect, and users have found alternative ways to overcome these deficiencies. By documenting both formal and informal systems, the analyst can identify areas where the formal system needs improvement or modification to better meet the needs of the users. This documentation also helps in understanding the workarounds and processes that users have developed, which can provide valuable insights for system enhancements and optimization.

Submit
79. A numerical digit based on the other digits within a numerical identifier is referred to as a:

Explanation

A check digit is a numerical digit that is calculated based on the other digits within a numerical identifier. It is used to verify the accuracy and integrity of the identifier. It is commonly used in various systems such as barcodes, credit card numbers, and identification numbers to prevent errors during data entry or transmission. Therefore, the correct answer is check digit.

Submit
80. During the feasibility analysis phase of the SDLC, which of the following types of feasibility is not assessed?

Explanation

During the feasibility analysis phase of the SDLC, the types of feasibility that are assessed include economic feasibility, operational feasibility, and technical feasibility. Time-driven feasibility, on the other hand, is not assessed during this phase. Time-driven feasibility refers to the assessment of whether the project can be completed within the given time constraints. While it is an important consideration, it is typically evaluated during the project planning and scheduling phase rather than the feasibility analysis phase.

Submit
81. Which of the following is a risk management task?

Explanation

All of the options listed - risk identification, risk assessment, and risk monitoring - are tasks that fall under the umbrella of risk management. Risk identification involves identifying potential risks that may impact a project or organization. Risk assessment involves analyzing and evaluating the identified risks to determine their likelihood and impact. Risk monitoring involves continuously monitoring and tracking the identified risks to ensure that appropriate actions are taken to mitigate or manage them. Therefore, all of these tasks are essential in effectively managing risks.

Submit
82. The percentage of resources devoted to the maintenance of a system:

Explanation

The percentage of resources devoted to the maintenance of a system generally increases over time. This is because as a system ages, it becomes more prone to issues and requires more frequent repairs and updates. Additionally, as technology advances, new features and functionalities are introduced, which require additional maintenance efforts. As a result, the proportion of resources allocated to maintenance gradually increases to ensure the system's smooth operation and to address any potential problems that may arise.

Submit
83. With a fixed-price contract, the greatest risk is typically assumed by:

Explanation

In a fixed-price contract, the vendor assumes the greatest risk. This is because the vendor agrees to provide the goods or services at a fixed price, regardless of any increase in costs or unforeseen circumstances. If the costs of production or delivery exceed the agreed-upon price, the vendor absorbs the additional expenses. On the other hand, if the costs are lower than expected, the vendor still receives the fixed price, resulting in potential profit for them. Therefore, the vendor bears the risk of potential financial loss or gain in a fixed-price contract.

Submit
84. Which statement is true concerning privacy in the U.S.?

Explanation

In the U.S., there is a significant amount of legislation that claims to provide some level of privacy protection. This suggests that there are laws in place that aim to safeguard individuals' privacy rights. However, the statement does not imply that these laws are comprehensive or fully effective in protecting privacy.

Submit
85. In the U.S., the only federal law that limits employer surveillance of its workers is related to:

Explanation

The correct answer is eavesdropping on spoken personal conversation. This is because the only federal law in the U.S. that limits employer surveillance of its workers specifically pertains to eavesdropping on spoken personal conversations. While there may be other laws or regulations that address privacy concerns in the workplace, this particular law focuses on protecting the privacy of conversations that are not work-related and are conducted in private areas.

Submit
86. The project managment chart that graphically models the sequence of project tasks and their interrelationships using a flowchart diagram is called a Gantt Chart.

Explanation

PERT chart

Submit
87. Which is not a potential disadvantage of having an application developed by a business user, rather than an IS professional?

Explanation

When an application is developed by a business user rather than an IS professional, users typically pay more attention to system controls for ensuring data quality and security. This means that they are likely to invest more in developing robust security measures and implementing data quality checks, which can increase the development costs. This is not a potential disadvantage of having an application developed by a business user, rather it is a benefit as it ensures better data quality and security.

Submit
88. A project sponsor usually participates in which of the following activities associated with a new project?

Explanation

A project sponsor typically participates in the development of the initial project proposal, as they are responsible for identifying and defining the project's objectives and scope. They also ensure that resources, such as funding and personnel, are available for the project team to successfully execute the project. Therefore, the correct answer is both A and C.

Submit
89. Which of the following system descriptions depicts the function and purpose (the what) of the system without reference to, or implications for, the actual way in which the system will be implemented?

Explanation

A logical system description focuses on describing the function and purpose of the system without specifying how it will be implemented. It provides a high-level overview of the system's behavior, structure, and interactions, without getting into the details of the physical components or network connections. This type of description helps to understand the system conceptually and is often used during the initial stages of system design and requirements gathering.

Submit
90. When planning projects, what is a recommended practice?

Explanation

A recommended practice when planning projects is to use conservative estimates to ensure that enough time, resources, and budget are allocated. Additionally, control mechanisms should be implemented to address the greatest project uncertainties, such as risks and potential issues. These control mechanisms should also focus on organizational vulnerabilities, such as weaknesses in processes or resources. Therefore, the answer "all of the above" is correct as it encompasses all the recommended practices mentioned.

Submit
91. Determining a Return Benefit for a specific security action is based on which of the following?

Explanation

Determining a Return Benefit for a specific security action is based on annualized Expected Losses and Annualized Cost of Actions. This means that in order to determine the return benefit of a security action, one needs to consider the expected losses that could occur if the action is not taken, as well as the cost of implementing the action. By comparing these two factors, one can assess whether the potential benefits outweigh the costs, and thus determine the return benefit of the security action. The other options mentioned, such as benefits of remote PC access and electronic records management, are not relevant to determining the return benefit of a security action.

Submit
92. What are sources to use to calculate a single loss expectancy as part of a risk assessment?

Explanation

Both historical experiences of the organization and industry averages are sources that can be used to calculate a single loss expectancy as part of a risk assessment. By considering the organization's past experiences and industry-wide data, a more accurate estimation of potential losses can be made. This allows for a comprehensive assessment of risks and helps in developing effective risk management strategies.

Submit
93. Which of the following is not an advantage of prototyping?

Explanation

Prototyping is a development approach that involves creating a working model of a system before fully developing it. One advantage of prototyping is that only basic system requirements are needed at the front-end of the project, allowing for flexibility and adaptability during the development process. Another advantage is that strong top-down commitment may be less necessary at the outset of the project, as prototyping allows for iterative feedback and adjustments. Additionally, user acceptance is likely to be higher with prototyping compared to a system developed using a traditional SDLC process. However, the given statement suggests that an end-prototype typically has more security and control features than a system developed with an SDLC process, which is not an advantage of prototyping.

Submit
94. Which criterion should a firm consider when evaluating candidate software packages?

Explanation

When evaluating candidate software packages, a firm should consider all of the above criteria. The functional capabilities of the packaged system are important to ensure that it meets the specific needs and requirements of the firm. The technical requirements that the software must satisfy are crucial to ensure compatibility and integration with existing systems. Additionally, considering the business characteristics of the vendor firm is essential to evaluate their reputation, reliability, and long-term viability. Therefore, all of these criteria should be taken into account when evaluating candidate software packages.

Submit
95. Which of the following accurately describes the order in which a system is tested?

Explanation

The correct order in which a system is tested is module testing, subsystem testing, integration testing, and finally acceptance testing. Module testing involves testing individual components or modules of the system to ensure they function correctly. Subsystem testing involves testing a group of related modules to ensure they work together properly. Integration testing involves testing the entire system to ensure all the modules and subsystems integrate seamlessly. Finally, acceptance testing is conducted to verify that the system meets the requirements and is ready for deployment.

Submit
96. Software piracy:

Explanation

Software piracy typically is not rigorously deterred by governments in less developed countries. This is because these countries may have limited resources and priorities, making it difficult for them to allocate resources to enforce copyright laws and combat piracy effectively. Additionally, there may be a lack of awareness or understanding of the negative impact of piracy on the software industry. As a result, piracy rates tend to be higher in these countries compared to more developed nations where governments have the means and motivation to enforce anti-piracy measures.

Submit
97. The SDLC phase that typically requires the greatest percentage of the total cost for a custom development project is the implementation phase.

Explanation

The explanation for the answer being False is that the implementation phase of the SDLC (Software Development Life Cycle) is not typically the phase that requires the greatest percentage of the total cost for a custom development project. The implementation phase involves actually building and coding the software, which may require resources and effort, but other phases like planning, requirements gathering, and testing can also incur significant costs. Therefore, it is not accurate to say that the implementation phase always requires the greatest percentage of the total cost.

Submit
98. What major component belongs to project planning?

Explanation

Project planning involves various components, including project scheduling, project budgeting, and project staffing. Project scheduling involves creating a timeline and determining the sequence of activities to be completed. Project budgeting involves estimating and allocating resources and costs for the project. Project staffing involves identifying and assigning the necessary personnel and resources for the project. Therefore, all of the above options are major components of project planning.

Submit
99. The SDLC phase that typically requires the greatest percentage of the total cost for a custom development project is the ________ phase.

Explanation

The construction phase of the SDLC typically requires the greatest percentage of the total cost for a custom development project. This phase involves the actual coding and development of the software, which can be time-consuming and resource-intensive. It requires skilled developers, project management, and testing efforts. The cost of hiring developers and allocating resources for this phase can significantly contribute to the overall cost of the project.

Submit
100. The highest level of project risk typically occurs at what stage of a project's life?

Explanation

The highest level of project risk typically occurs during the beginning of a project because this is when there is the most uncertainty and ambiguity. During this stage, project objectives and requirements may not be fully defined, and there may be limited information available to make informed decisions. Additionally, there may be a lack of clear roles and responsibilities, and potential risks and obstacles may not have been identified or addressed yet. As the project progresses and moves into the planning and execution stages, more information becomes available, risks are identified and managed, and the project team gains experience and knowledge, reducing the overall level of risk.

Submit
101. Which of the following is a major change management activity associated with successful IT projects?

Explanation

All of the above options are major change management activities associated with successful IT projects. Communication about the project to all affected employees is crucial to ensure everyone is informed and on board with the changes. Training on the system and process changes is necessary to ensure employees have the necessary skills and knowledge to adapt to the new technology. Incentives to key team members can help motivate and reward their efforts during the project. All three activities play a significant role in managing change effectively in IT projects.

Submit
102. Virtual teamwork introduces IT project risk due to which of the following factors?

Explanation

Virtual teamwork introduces IT project risk due to differences in communication norms across working groups, unfamiliarity with a team member's culture, and lack of trusting relationships across team members. These factors can hinder effective communication, collaboration, and coordination among team members, leading to misunderstandings, delays, and conflicts. It is important for virtual teams to address these challenges through clear communication channels, cultural awareness and sensitivity, and building trust among team members to mitigate project risks.

Submit
103. In addition to evaluating the vendors' responses from the formal RFP process, what other type of data collection for a leading candidate package is recommended?

Explanation

In addition to evaluating the vendors' responses from the formal RFP process, it is recommended to collect data through a software demonstration of the package. This will allow the evaluators to see the features and functionalities of the package in action and assess its suitability for their needs. Additionally, references from users of the software package in other companies should be collected to gather insights about their experience with the package, its performance, and any potential issues they encountered. Collecting both types of data will provide a comprehensive understanding of the leading candidate package.

Submit
104. Which large Internet advertising company has caused concerns among privacy organizations due to its purchase or alliance with other companies?

Explanation

DoubleClick is the correct answer because it is a large Internet advertising company that has caused concerns among privacy organizations due to its purchase or alliance with other companies. DoubleClick's acquisition by Google in 2007 raised concerns about the potential for data collection and privacy violations, as DoubleClick had access to a vast amount of user information through its advertising services. This acquisition prompted privacy organizations to voice their concerns and advocate for stricter regulations to protect user privacy in online advertising.

Submit
105. Swapping or sharing music on the Internet:

Explanation

The correct answer is "first gained widespread popularity with the advent of Napster." This is because Napster was one of the first widely used platforms for sharing music on the internet. It allowed users to share and download music files for free, which led to its widespread popularity and sparked a significant shift in the music industry. While Napster faced legal challenges and was eventually shut down, its influence on the music-sharing culture cannot be denied.

Submit
106. What types of employees outside of an organization's IS department may be involved in a purchased software project?

Explanation

All of the above types of employees may be involved in a purchased software project. Business unit representatives who will use the system may provide input on the requirements and functionality needed. Attorneys may be involved in reviewing and negotiating contracts related to the software purchase. Purchasing specialists may handle the procurement process and ensure compliance with organizational policies and procedures.

Submit
107. Which of the following is a long-term advantage of purchasing packaged systems?

Explanation

Purchasing packaged systems provides a long-term advantage by offering an infusion of external expertise. This means that the organization can benefit from the knowledge and experience of the vendors who developed the packaged systems. Additionally, purchasing packaged systems also leads to higher application quality. This implies that the systems are likely to be more reliable, efficient, and effective in meeting the organization's needs. Therefore, both A and C are correct as they explain the long-term advantages of purchasing packaged systems.

Submit
108. Which is not an advantage of open source software?

Explanation

Open source software typically has the advantage of complete documentation being freely available. This means that users can easily access and understand how the software works, facilitating its use and troubleshooting. However, the given answer states that this is not an advantage of open source software, suggesting that complete documentation may not be freely available for open source software.

Submit
109. Using a sales tracking system as an example, the customer orders and customer returns of goods are examples of which type of system components?

Explanation

The customer orders and customer returns of goods are examples of inputs in a sales tracking system. Inputs refer to the data or information that is entered into a system for processing. In this case, the customer orders and returns are the data that are received by the system to track and manage the sales process.

Submit
110. Which of the following is an example of a goal of hierarchical decomposition?

Explanation

Hierarchical decomposition involves breaking down a complex system into smaller, more manageable subsystems. One of the goals of this approach is to analyze or change only part of the system. By decomposing the system into smaller components, it becomes easier to focus on specific areas for analysis or modification without affecting the entire system. This goal helps in achieving a better understanding of the system and enables targeted improvements or changes to be made efficiently.

Submit
111. The process of identifying the phases and sequence of tasks that need to be accomplished to meet a project's goals is known as:

Explanation

Work breakdown analysis is the correct answer because it refers to the process of breaking down a project into smaller, manageable tasks or activities. It involves identifying the phases, tasks, and sub-tasks required to complete the project successfully. This analysis helps in understanding the scope of work, estimating resources and time required for each task, and determining the sequence in which tasks should be executed. Timeboxing is a technique used for managing time in Agile project management. Project scheduling involves creating a timeline and assigning resources to tasks. Milestone analysis focuses on identifying key milestones or significant events in a project.

Submit
112. Why is it difficult for companies to manage their e-mail on their own private subnets?

Explanation

It is difficult for companies to manage their e-mail on their own private subnets because individuals within the organization can make copies and save them, they can forward copies to others, and they do not completely remove them from their storage devices. These actions make it challenging for companies to control and monitor the dissemination and storage of sensitive information, potentially leading to security breaches and unauthorized access to confidential data.

Submit
113. Which of the following statements about choosing alternative packages is false?

Explanation

Modifications made to a package will indeed impact what modifications may need to be made when the vendor releases an upgraded version of the package. This is because any modifications made to the package will need to be re-implemented or re-integrated when the upgraded version is released. Therefore, the statement that modifications to a package will not impact future modifications is false.

Submit
114. ) Ethical problems associated with the use of IT may affect all of the following except:

Explanation

Ethical problems associated with the use of IT can affect managers, stockholders, and customers. This means that all of the options listed are potentially affected by ethical issues. Therefore, the correct answer is "all of the above."

Submit
115. What is a reason for including ethics discussions in an IT management forum?

Explanation

Ethics discussions are important in an IT management forum because IT is having a growing impact on people's lives. As technology becomes more integrated into society, it is crucial for managers to consider the ethical implications of their decisions regarding IT usage within an organization and in interactions with suppliers and customers. By including ethics discussions, IT managers can ensure that their actions align with ethical standards and address potential concerns related to privacy, security, and social impact.

Submit
116. What is a specific characteristic of an application that can be important for determining the potential risks of developing a new business application by an employee with no professional IS training?

Explanation

Both the number of users of the application and the potential impact on operations or decisions based on the application are important characteristics for determining the potential risks of developing a new business application by an employee with no professional IS training. The number of users can indicate the scale and complexity of the application, which can affect its stability and security. The potential impact on operations or decisions can determine the level of criticality and sensitivity of the application, which can impact the overall success and reputation of the business. Therefore, considering both A and B is crucial for assessing the risks involved in this scenario.

Submit
117. The project management chart that graphically models the sequence of project tasks and their interrelationships using a flowchart diagrams is called a:

Explanation

A PERT chart is a project management chart that graphically models the sequence of project tasks and their interrelationships using flowchart diagrams. It stands for Program Evaluation and Review Technique and is commonly used in project management to analyze and plan the tasks involved in a project. The PERT chart helps to identify the critical path, dependencies, and time estimates for each task, allowing project managers to effectively schedule and allocate resources.

Submit
118. When a web site mimics a legitimate site for the purpose of misleading or defrauding an Internet user, it is called:

Explanation

Spoofing refers to the act of creating a website that imitates a legitimate site with the intention of deceiving or defrauding internet users. This can involve copying the design, layout, and content of the original site to make it appear authentic. Spoofing is a form of cybercrime where the attacker aims to trick users into providing sensitive information such as passwords, credit card details, or personal information. Unlike identity theft, which involves stealing someone's personal information, spoofing specifically targets the act of creating fake websites to deceive users. Phishing is a type of spoofing attack commonly used to trick users into revealing their sensitive information.

Submit
119. Which of the following is one of the areas in which controls are assessed by auditors using the COSO framework?

Explanation

The correct answer is "all of the above" because the COSO framework is a comprehensive framework that covers all areas of controls assessment. The framework includes principles and components for evaluating the control environment, risk assessment, and monitoring. Therefore, auditors assess controls in all of these areas when using the COSO framework.

Submit
120. What are some means to deal with key information security management issues?

Explanation

The given answer "all of the above" is correct because it encompasses all the means to deal with key information security management issues mentioned in the previous statements. Managers need to identify and assign values to their information assets, determine the organization's ability to function without specific assets, and collaborate with departmental managers and asset owners to implement security procedures. By considering all of these factors, organizations can effectively manage information security risks and protect their valuable assets.

Submit
121. BCP shortcomings recently identified during crises include:

Explanation

The correct answer is "all of the above". This means that all of the mentioned BCP (Business Continuity Planning) shortcomings have been identified during recent crises. The backup IT sites being too close to data centers can pose a risk as both locations may be affected by the same disaster. Plans for alternative workplaces for human resources are necessary to ensure business operations can continue even if the primary workplace is inaccessible. Evacuation plans should be practiced to ensure that employees know what to do in case of an emergency.

Submit
122. Creating a BCP in the U.S. requires:

Explanation

Creating a Business Continuity Plan (BCP) in the U.S. requires identifying interdependencies between critical business processes and business units. This is because a BCP aims to ensure that essential functions can continue during and after a disruption. By identifying interdependencies, organizations can determine which processes and units are crucial for their operations and prioritize them accordingly in the BCP. This helps in developing strategies to mitigate risks and ensure the continuity of critical business functions.

Submit
123. When matching a company's needs with the capabilities of a software package, an alternative to address a mismatch is:

Explanation

When matching a company's needs with the capabilities of a software package, if there is a mismatch, the company can choose to modify the software package or change their business procedures to align with the software. This means that both options A and B are viable alternatives to address the mismatch. The company can either make changes to the software to meet their needs or adapt their business procedures to fit the capabilities of the software.

Submit
124. All of the following are considered advantages to using RAD methodology, except:

Explanation

The given correct answer is "system quality much higher than with SDLC." This means that using RAD methodology does not necessarily result in higher system quality compared to using SDLC. RAD methodology is known for its focus on rapid development and flexibility to accommodate changes in system design at user request. It emphasizes on delivering a functional system quickly by focusing on essential system requirements. However, it does not guarantee a higher system quality compared to SDLC, which is a more structured and rigorous approach to software development.

Submit
125. With a cost-reimbursement type of contract, the greatest risk is assumed by:

Explanation

In a cost-reimbursement type of contract, the purchasing company assumes the greatest risk. This is because the purchasing company agrees to reimburse the vendor for all allowable costs incurred during the project, regardless of the outcome. This means that if the project ends up exceeding the budget or if the vendor incurs unforeseen expenses, the purchasing company is responsible for covering these costs. On the other hand, the vendor is not at risk as they are guaranteed reimbursement for their expenses. Therefore, the purchasing company bears the greatest risk in this type of contract.

Submit
126. Which of the following is true about investigations of identity theft in the U.S. today?

Explanation

Both A and C are true about investigations of identity theft in the U.S. today. Banks often do not pursue all potential cases due to the high cost involved in investigating these crimes. Additionally, identity theft is indeed considered a U.S. federal crime, making it subject to federal investigation and prosecution.

Submit
127. Which of the following statements about having a vendor perform package maintenance is false?

Explanation

While it is ideal for vendors to continue supporting all prior versions of a package, it is not always the case. Vendors may choose to discontinue support for older versions, especially if they have released newer versions with significant changes or improvements. Therefore, the statement that vendors continue to support all prior versions of a package is false.

Submit
128. Which of the following is not a key guideline for managing day-to-day interactions with outsourced staff?

Explanation

The correct answer is "hire offshore legal expertise for writing contracts." This option is not a key guideline for managing day-to-day interactions with outsourced staff. It is important to communicate frequently, create a centralized project management office, and closely monitor and manage the work of the outsourcer's staff to ensure effective management and successful outcomes. However, hiring offshore legal expertise for writing contracts is not directly related to day-to-day interactions with outsourced staff but rather a separate aspect of managing outsourcing contracts.

Submit
129. Which of the following is a type of control that is used to ensure the development of a high quality, reliable information system?

Explanation

The correct answer is "all of the above" because all three options - methodology standards, system testing, and system backup - are types of controls that contribute to the development of a high quality, reliable information system. Methodology standards provide a framework and guidelines for developing the system, system testing ensures that the system functions properly and meets the required standards, and system backup helps in protecting and recovering the data in case of any failures or disasters. Together, these controls work together to ensure the overall quality and reliability of the information system.

Submit
130. A key deliverable for the initiation phase of a project is the:

Explanation

The initiation phase of a project involves defining the project's objectives, scope, and stakeholders. A project charter is a document that formally authorizes the project and provides a clear understanding of its purpose, goals, and key stakeholders. It outlines the project's objectives, scope, deliverables, and constraints. Therefore, a project charter is a key deliverable for the initiation phase as it serves as a foundation for the project, ensuring that all stakeholders are aligned and have a common understanding of the project's purpose and goals.

Submit
131. In basic systems terminology, the process of breaking down a system into successive levels of subsystems is called:

Explanation

Hierarchical decomposition refers to the process of breaking down a system into successive levels of subsystems. This approach allows for a systematic and organized analysis of the system, where each subsystem is analyzed and designed separately. By breaking down the system into smaller components, it becomes easier to understand and manage the system as a whole. The term "hierarchical" implies that the subsystems are organized in a hierarchical structure, with higher-level subsystems encompassing lower-level ones. Therefore, hierarchical decomposition is the correct term for this process in basic systems terminology.

Submit
132. Which of the following is a typical statement included in an organization's acceptable use policy?

Explanation

The organization's acceptable use policy typically includes all of the statements mentioned. The first statement establishes that the organization's computing resources are considered company property. The second statement clarifies that employees do not have privacy rights over their usage of these resources. Lastly, the third statement states that specific types of computing behavior are prohibited by federal or state laws. Therefore, the correct answer is "all of the above."

Submit
133. Which of the following is a common risk avoidance and mitigation strategies?

Explanation

The correct answer is "all of the above" because assigning the best human resources available to reduce a specific type of project risk, choosing an alternative technical approach to avoid risk exposure, and subcontracting a specific deliverable to a third-party are all common strategies used to avoid and mitigate risks in a project. These strategies help in minimizing the impact of potential risks and ensuring the successful completion of the project.

Submit
134. Which of the following diagrams is not part of the Unified Modeling Language for O-O modeling?

Explanation

A context diagram is not part of the Unified Modeling Language (UML) for object-oriented (O-O) modeling. UML is a standardized modeling language used to visualize, specify, construct, and document the artifacts of a software system. It primarily focuses on the structure and behavior of the system, represented by class diagrams, sequence diagrams, and use case diagrams. However, a context diagram is a high-level diagram used in systems engineering to depict the interactions between a system and its external entities, providing an overview of the system's boundaries and interfaces.

Submit
135. What are some of the benefits to organizations with written privacy policies?

Explanation

Having written privacy policies in organizations provides several benefits. Firstly, it helps in quickly removing employees who behave improperly by providing clear guidelines and standards for acceptable behavior. Secondly, it ensures compliance with one part of the Sarbanes-Oxley Act (SOX), which requires companies to establish and maintain internal controls, including privacy policies. Lastly, having written privacy policies improves the organization's ability to be insured by demonstrating that they have taken steps to protect sensitive information and mitigate potential risks. Therefore, all of the given options are correct and provide benefits to organizations with written privacy policies.

Submit
136. Which of the following is the recommended means for disseminating an organization's information security policy?

Explanation

The recommended means for disseminating an organization's information security policy is through all of the above methods. Hardcopy distributions ensure that all employees, including new ones, receive a physical copy of the policy. Email distributions allow for easy and efficient dissemination to all employees. Posting the policy on the organization's intranet ensures that it is easily accessible to all employees at any time. Using all of these methods together ensures that the policy reaches all employees and increases the likelihood of awareness and compliance.

Submit
137. Advances in artificial intelligence can raise social and ethical issues because:

Explanation

Advances in artificial intelligence can raise social and ethical issues because computers have the ability to sift through vast amounts of data more efficiently than humans, which can lead to concerns about privacy, security, and the potential for bias. Additionally, computers can be programmed to replace human experts in certain job roles, raising questions about unemployment and the impact on the workforce. Lastly, the ethical behavior of a robot depends on its programming, highlighting the need for careful consideration and regulation to ensure that AI systems act ethically and responsibly.

Submit
138. The function of the project champion is usually held by:

Explanation

The project champion is typically a person within the company who takes on the responsibility of advocating for and driving a specific project forward. This individual is usually someone with influence and power within the organization, such as an influential business manager. They play a crucial role in securing resources, gaining support, and overcoming obstacles for the project's success. The CIO, CSO, and outside consultants may also play important roles in projects, but the project champion is specifically responsible for leading and championing the project from within the company.

Submit
139. A software tool used to automate one or more steps of a software development methodology is referred to as:

Explanation

A software tool used to automate one or more steps of a software development methodology is referred to as CASE (Computer-Aided Software Engineering). CASE tools assist in various activities such as requirements gathering, design, coding, testing, and maintenance. These tools help streamline the software development process, improve productivity, and ensure better quality control. They provide functionalities like code generation, documentation generation, project management, and version control. Therefore, CASE is the correct answer as it specifically refers to the automation of software development steps.

Submit
140. Sending an e-mail that falsely claims to be a legitimate enterprise in an attempt to scam the user into providing private information is called:

Explanation

Phishing is the correct answer because it refers to the act of sending deceptive emails that appear to be from a trusted source, with the intention of tricking the recipient into revealing personal or sensitive information. This is typically done by impersonating a legitimate enterprise, such as a bank or an online service provider, and requesting the user to provide confidential data like passwords or credit card details. Spoofing, cracking, and hacking are related terms but do not specifically involve the act of luring users into sharing private information through deceptive emails.

Submit
141. Which of the following competencies certified by the Project Management Institute has been developed recently?

Explanation

The correct answer is procurement (including contract management). This competency has been developed recently by the Project Management Institute.

Submit
142. Which of the following best describes the definition phase of the systems life cycle?

Explanation

During the definition phase of the systems life cycle, business and systems professionals document the needs and feasibility of the system. This involves gathering requirements, understanding the goals and objectives of the system, and assessing whether it is technically and economically feasible to develop and implement the system. This phase sets the foundation for the rest of the life cycle by ensuring that the system is aligned with the organization's needs and can be successfully implemented.

Submit
143. Which of the following must an organization's management do if HIPAA applies to its activities?

Explanation

An organization's management must assign a person or persons to be responsible for HIPAA compliance if it applies to its activities. This is necessary to ensure that the organization understands and follows the regulations set forth by HIPAA. This individual or team will be responsible for implementing policies and procedures, training employees, conducting audits, and handling any breaches or violations of HIPAA regulations. By assigning someone to be responsible for HIPAA compliance, the organization demonstrates its commitment to protecting patient privacy and maintaining the security of health information.

Submit
144. When purchasing a software package, a successful definition phase ends with a(n):

Explanation

In the context of purchasing a software package, a successful definition phase refers to the stage where the requirements and specifications of the software are clearly defined. At the end of this phase, a vendor contract is typically established. This contract outlines the terms and conditions of the agreement between the purchaser and the vendor, including the scope of the software package, pricing, support services, and any other relevant details. Therefore, a vendor contract is the appropriate outcome of a successful definition phase in software package procurement.

Submit
145. Which of the following prevents someone else from creating another computer program that does the same thing as a copyrighted program?

Explanation

Patents prevent someone else from creating another computer program that does the same thing as a copyrighted program. Patents provide legal protection for inventions, including software, and grant exclusive rights to the inventor to prevent others from making, using, or selling the patented invention without permission. Copyrights, on the other hand, protect original works of authorship, such as literary, musical, and artistic works, but do not prevent others from creating similar programs. Therefore, the correct answer is patents.

Submit
146. Options for modifying the code of a purchased package include:

Explanation

The correct answer is "all of the above" because when modifying the code of a purchased package, options include having a contract with the vendor, having a contract with a third party, or obtaining the source code from the vendor. These options cover all possible ways to modify the code of a purchased package.

Submit
147. Which of the following is a factor that can affect the success of the installation plan for a purchased package?

Explanation

The success of an installation plan for a purchased package can be affected by various factors. One such factor is the level of vendor support before the installation. If the vendor provides adequate support and guidance during the planning phase, it increases the chances of a successful installation. Similarly, vendor support after Go Live is crucial as it ensures any issues or problems that arise post-installation are promptly addressed. Additionally, the number of different business units implementing the software and their locations can also impact the success of the installation plan, as it introduces complexity and coordination challenges. Therefore, all of the above factors can affect the success of the installation plan.

Submit
148. If extensive changes in business processes and procedures are needed to effectively implement the purchased software, business managers are typically asked to take the role of:

Explanation

When extensive changes in business processes and procedures are required to effectively implement purchased software, the role of a project manager is typically assigned to business managers. A project manager is responsible for planning, organizing, and overseeing the implementation of a project, ensuring that it is completed successfully within the defined scope, budget, and timeline. In this case, the business managers are asked to take on the role of a project manager to ensure that the necessary changes are implemented smoothly and efficiently.

Submit
149. Which statement is not true about using an ASP purchasing option?

Explanation

An ASP (Application Service Provider) purchasing option involves the purchasing organization paying upfront costs for software licenses for all potential users. The software is typically already installed on the ASP's host computer, which makes the implementation faster. However, the statement that a third-party organization delivers the software functionality via the internet is not true. In an ASP purchasing option, the software functionality is delivered by the ASP itself, not a third-party organization.

Submit
150. Which of the following describes an early step in the implementation phase of the systems life cycle?

Explanation

During the implementation phase of the systems life cycle, one of the early steps is to convert the data and procedures from the old system. This involves transferring the existing data and procedures from the old system to the new system in order to ensure continuity and functionality. This step is crucial as it allows for a smooth transition from the old system to the new system without losing any important data or procedures.

Submit
151. According to Frame (1994), which of the following is not a trap that inexperienced cost estimators fall into?

Explanation

Inexperienced cost estimators often fall into traps that can lead to inaccurate estimations. One common trap is being too optimistic about what is needed to do the job. This can result in underestimating the costs and resources required. Another trap is leaving out components that should be estimated, which can lead to incomplete and unreliable estimates. Additionally, not using a consistent estimation methodology can introduce inconsistencies and errors in the estimation process. However, relying on historical project costs is not mentioned as a trap that inexperienced cost estimators fall into. Historical project costs can provide valuable insights and benchmarks for estimating future projects.

Submit
152. A conversion strategy whereby an organization continues to operate the old system together with the new one for one or more cycles, until the new system is working properly and the old system can be discontinued, is called a:

Explanation

A parallel strategy is a conversion strategy where an organization operates both the old and new systems simultaneously for a period of time. This allows for a gradual transition and testing of the new system while still relying on the old system for backup and comparison. Once the new system is functioning properly, the old system can be discontinued.

Submit
153. Which organizational position is directly responsible for the balancing of an organization's security risks with the costs to avoid them?

Explanation

The CSO, or Chief Security Officer, is directly responsible for balancing an organization's security risks with the costs to avoid them. This role involves assessing potential threats, implementing security measures, and making decisions on resource allocation to mitigate risks effectively. The CSO works closely with other executives, such as the CEO, CFO, and CIO, to ensure that security measures align with the organization's overall goals and financial capabilities.

Submit
154. Which prototyping step is not the responsibility of the system builders?

Explanation

The system builders are responsible for developing the initial prototype, revising and enhancing the prototype, and assisting with converting the prototype to an operational system. However, the step of using the prototype and noting desired changes is not their responsibility. This step typically involves the end-users or stakeholders who test the prototype and provide feedback on any necessary modifications or improvements.

Submit
155. A PERT (or CPM) chart graphically depicts the estimated times for each project task against a horizontal time line, for displaying a project schedule and for tracking the progress of a set of tasks against the project plan.

Explanation

This is a description of a Gantt chart.

Submit
156. Which of the following best describes a common prototyping goal when it is used as part of a prototyping/piloting approach?

Explanation

The correct answer is both A and B. When prototyping is used as part of a prototyping/piloting approach, a common goal is to establish and demonstrate basic concepts of the new system, as well as to get buy-in from key stakeholders. Additionally, prototyping is also used to demonstrate the technical feasibility of the new system. Therefore, both goals A and B are applicable in this context.

Submit
157. Which of the following technique is most closely associated with the Logical To-Be model?

Explanation

The data flow diagram is most closely associated with the Logical To-Be model. This technique visually represents how data flows through a system, showing the processes, data stores, and external entities involved. The Logical To-Be model focuses on the current state of the system and how it can be improved, and the data flow diagram helps to analyze and understand the flow of data within the system. It helps to identify inefficiencies, redundancies, and areas for improvement in the system's data flow.

Submit
158. Which of the following is not one of the common policy areas generally included in an information security policy?

Explanation

The correct answer is "Usage of Social Security Number Policies. (e.g., whether it is an identifier)". This is not one of the common policy areas generally included in an information security policy because it specifically focuses on the usage of social security numbers as identifiers, which is more specific and narrow in scope compared to the other policy areas mentioned. Access Control Policies, External Access Policies, and Acceptable Use Policies are all common policy areas that are typically included in an information security policy.

Submit
159. Which of the following is typical for a pure prototyping approach?

Explanation

A pure prototyping approach is typically characterized by firms using it to explore the use of newer technologies. In this approach, documentation is less complete compared to traditional systems development approaches. Additionally, less emphasis is placed on incorporating security and control features compared to the traditional SDLC approach. Therefore, the correct answer is "all of the above."

Submit
160. Due to several recent laws regarding information security, it is a good practice to provide existing civil and criminal laws rather than have a company-specific information security policy.

Explanation

The statement suggests that it is not a good practice to provide existing civil and criminal laws rather than having a company-specific information security policy. This implies that having a company-specific policy is preferred over relying on general laws.

Submit
161. In the object-oriented (O-O) approach to software engineering, the term "encapsulation" refers to:

Explanation

In the object-oriented approach to software engineering, encapsulation refers to storing data and related operations together within objects. This means that an object contains both the data it needs to represent and the methods or functions that operate on that data. Encapsulation allows for the data to be protected and accessed only through the defined methods, ensuring data integrity and promoting modular and reusable code. This approach helps in organizing and structuring the code, making it easier to understand, maintain, and modify.

Submit
162. What would not typically be a part of a business case for a new systems project?

Explanation

A business case for a new systems project typically includes expected business benefits, initial development costs, and ongoing costs for operations and maintenance. Therefore, "all of the above" would not typically be excluded from a business case for a new systems project.

Submit
163. Which of the following is not one of the rules that the GLBA gives federal agencies and states the ability to enforce?

Explanation

The GLBA (Gramm-Leach-Bliley Act) gives federal agencies and states the ability to enforce rules related to financial privacy, safeguards, and credit information. Therefore, the correct answer is "none of the above" because all of the listed options are rules that the GLBA gives the ability to enforce.

Submit
164. Which of the following best describes a responsibility of a systems analyst?

Explanation

A responsibility of a systems analyst is to develop detailed system requirements. This involves gathering and analyzing information from users and stakeholders to understand their needs and translate them into specific technical specifications for the system. By doing so, the systems analyst ensures that the system is designed and developed according to the desired functionality and objectives. This step is crucial in the system development life cycle as it lays the foundation for successful system implementation and helps in achieving the desired outcomes.

Submit
165. When comparing a traditional SDLC and a purchasing life cycle methodology, which step is found in a modified SDLC approach but not in a traditional SDLC?

Explanation

In a modified SDLC approach, the step of establishing evaluation criteria is included, whereas it is not typically found in a traditional SDLC. This step involves determining the specific criteria that will be used to evaluate the success and effectiveness of the project. It helps to ensure that the project meets the desired objectives and aligns with the organization's goals. By establishing evaluation criteria, the project team can measure and assess the project's progress and make informed decisions throughout the development process.

Submit
166. Which is not a social problem that is perceived to have increased due to information technology?

Explanation

The given answer, "difficulties in connecting with people in other regions of the world," is not a social problem that is perceived to have increased due to information technology. Information technology has actually made it easier for people to connect with others in different regions of the world through various communication platforms and social media. Therefore, this option does not align with the other three options, which highlight negative consequences of information technology such as theft of personal information, exploitation of children, and theft of intellectual property.

Submit
167. Approximately what percentage of the U.S. public is quite sensitive to the loss of privacy of their personal information?

Explanation

Approximately 25% of the U.S. public is quite sensitive to the loss of privacy of their personal information. This means that a significant portion of the population is concerned about their personal information being compromised or misused. This sensitivity may stem from various factors such as the increasing number of data breaches and privacy scandals, growing awareness about online privacy, and the potential consequences of identity theft or unauthorized access to personal data. Overall, this percentage indicates a substantial level of concern among the U.S. public regarding the privacy of their personal information.

Submit
168. What three characteristics should be evaluated by organizations when choosing whether or not to have a non-IS professional develop a new application?

Explanation

Organizations should evaluate the application, development tool, and developer characteristics when deciding whether or not to have a non-IS professional develop a new application. The application characteristics are important to ensure that the application meets the organization's requirements and objectives. The development tool characteristics are crucial to determine if the tool is suitable for the development process and if it provides the necessary features and functionalities. Lastly, the developer characteristics are essential to assess the skills, experience, and expertise of the individual who will be responsible for developing the application.

Submit
169. Which of the following elements usually includes subcomponents to filter, translate, store, and correct data that flows through it

Explanation

The interface is the element that usually includes subcomponents to filter, translate, store, and correct data that flows through it. An interface acts as a bridge between different components or systems, allowing them to communicate and exchange data. It often includes various subcomponents or modules that are responsible for tasks such as data filtering, translation, storage, and data correction. These subcomponents ensure that the data flowing through the interface is processed and manipulated correctly before being passed on to the intended destination.

Submit
170. Which type of employee does not need to be aware of basic types of information security technologies?

Explanation

All employees, including business managers and managers who only work on IT applications, need to be aware of basic types of information security technologies. This is because information security is a collective responsibility and every employee plays a role in protecting sensitive data and preventing security breaches. The CSO (Chief Security Officer) is particularly expected to have a deep understanding of information security technologies and should be well-versed in implementing and managing them. Therefore, none of the above options can be considered as employees who do not need to be aware of basic types of information security technologies.

Submit
171. According to Markus (1983), resistance to the implementation of a new information system is commonly due to:

Explanation

Resistance to the implementation of a new information system is commonly due to changes in the managerial power structure due to the new system. This means that employees may resist the new system because it could potentially change their roles and responsibilities within the organization. They may fear losing power or control over certain tasks or processes, which can lead to resistance. This resistance can be seen as a natural reaction to the potential disruption that the new system may cause to the existing power dynamics within the organization.

Submit
172. What set of international guidelines includes an extensive set for implementation management practices against which firms can benchmark their own practices?

Explanation

ITIL stands for Information Technology Infrastructure Library. It is a set of international guidelines that provides a comprehensive framework for implementing and managing IT services. ITIL includes a wide range of practices and processes that organizations can use to benchmark their own practices and improve their IT service management. It covers areas such as service strategy, service design, service transition, service operation, and continual service improvement. Therefore, the correct answer is ITIL.

Submit
173. Which statement about computer crimes is not true?

Explanation

not-available-via-ai

Submit
174. Which is a potential advantage of having an application developed by a business user, rather than an IS professional?

Explanation

Having an application developed by a business user rather than an IS professional has several potential advantages. Firstly, the system requirements do not have to be explained to an IS analyst, as the business user already understands the specific needs and goals of the application. Secondly, if the system is a high priority for a business unit, it does not have to compete with other business units for IS personnel to work on it, ensuring dedicated attention and resources. Lastly, business managers have more control over the development costs for the application, allowing them to manage the budget and expenses more effectively. Therefore, all of the above options are potential advantages of having an application developed by a business user.

Submit
175. A common pitfall in developing a master schedule for a project is a failure to:

Explanation

A common pitfall in developing a master schedule for a project is failing to estimate task completion times based on a level of expertise associated with an experienced worker. This means that the project schedule may not accurately reflect the time it will take to complete tasks, leading to potential delays and inefficiencies. It is important to consider the expertise and skill level of the workers involved in order to make realistic estimates and create an effective master schedule.

Submit
176. Which of the following is not an example of a principal method for system decoupling?

Explanation

Benchmarking is not an example of a principal method for system decoupling because it is a process of comparing and measuring the performance of a system or component against established standards or competitors. It does not involve separating or decoupling system components or processes.

Submit
177. The following diagram depicts a cutover conversion strategy. Which of the following best characterizes this type of conversion strategies?

Explanation

A cutover conversion strategy is characterized as risky because it involves transitioning from an old system to a new one in a single, abrupt switch. This approach carries a higher level of risk as it leaves little room for error or fallback options. Any issues or problems that arise during the conversion can have significant consequences on the operation and functionality of the new system. Therefore, it is important to carefully plan and execute a cutover conversion strategy to mitigate potential risks and ensure a smooth transition.

Submit
178. When a customer wants to "opt-out" from a U.S. company sharing his or her information with third parties:

Explanation

When a customer wants to "opt-out" from a U.S. company sharing his or her information with third parties, it often takes a lot of effort and time for customers to understand how to accomplish it. This suggests that the process of opting out is not straightforward and may involve complex procedures or unclear instructions. It implies that customers may face difficulties in navigating the necessary steps to ensure their information is not shared with third parties.

Submit
179. All the following are common risks of avoidance and mitigation strategies except:

Explanation

The correct answer is "more will be lost if things go wrong so just ignore negative feedback." This statement goes against the principles of risk management, as it suggests ignoring negative feedback, which can be valuable in identifying and addressing potential risks. Effective risk management involves actively seeking and addressing feedback to mitigate risks and improve project outcomes. The other options provided are common strategies for risk avoidance and mitigation, such as assigning skilled resources, choosing alternative approaches, and subcontracting to third parties.

Submit
180. Recent piracy rates for music CDs were highest in:

Explanation

Recent piracy rates for music CDs were highest in Indonesia and Paraguay. This can be attributed to several factors such as weak copyright enforcement, lack of awareness about intellectual property rights, and the availability of counterfeit goods in these countries. Additionally, high poverty rates and limited access to affordable legal alternatives may also contribute to the prevalence of piracy in these regions.

Submit
181. Amazon.com settled a lawsuit with Barnes and Noble in March 2002 that centered on the infringement of what patent?

Explanation

Amazon.com settled a lawsuit with Barnes and Noble in March 2002 regarding the infringement of its "one-click-ordering" process patent. This suggests that Barnes and Noble was accused of copying or using a similar process for ordering products with just one click, which Amazon had patented. The settlement indicates that both parties reached an agreement to resolve the dispute related to this specific patent infringement.

Submit
182. Using the scheme proposed by Denis et al (2004) for prioritizing systems projects, which statement is true?

Explanation

According to the scheme proposed by Denis et al (2004) for prioritizing systems projects, projects that are classified as "Wanted" and have a return on investment (ROI) greater than 12 months are never funded. This means that these projects are not considered a priority and are not allocated funding. This is the only statement that aligns with the proposed scheme, so the correct answer is "Wanted projects with an ROI greater than 12 months are never funded."

Submit
183. Who usually takes primary responsibility for establishing the custom development costs for an SDLC project?

Explanation

The IS analyst usually takes primary responsibility for establishing the custom development costs for an SDLC project. This is because the IS analyst is responsible for analyzing the project requirements, estimating the resources needed, and determining the associated costs. They have the expertise and knowledge to assess the technical aspects of the project and provide accurate cost estimates. The end user and business manager may provide input and requirements, but the IS analyst is the one who ultimately determines the custom development costs.

Submit
184. What is the best term to describe those who break into computers to steal information, wipe out hard drives, or do others harm?

Explanation

The term "crackers" is the best term to describe those who break into computers to steal information, wipe out hard drives, or do others harm. "Crackers" refers specifically to individuals who engage in malicious activities such as hacking into computer systems with malicious intent. This term differentiates them from "hackers," who are generally associated with ethical hacking and security testing.

Submit
185. Controls for the validity of data entered into an application program (such as ensuring that only numbers are entered into a numeric field) are referred to as:

Explanation

Edit rules are controls that are used to ensure the validity and accuracy of data entered into an application program. These rules enforce specific formats, data types, and ranges for input fields. In this case, the edit rules would be responsible for ensuring that only numbers are entered into a numeric field, making it the correct answer. Batch totals refer to the sum or count of a specific field in a batch of data, encryption rules are used to protect data during transmission or storage, and access privileges determine who can access certain data or perform specific actions.

Submit
186. A common shortcoming of user-developed applications is:

Explanation

User-developed applications are often created by individuals who may not have a deep understanding of the specific business problem they are trying to solve. This lack of knowledge can result in applications that do not effectively address the needs of the business or fail to provide the desired functionality. Inadequate knowledge of the business problem can lead to applications that are inefficient, ineffective, or even completely irrelevant to the organization's needs.

Submit
187. Which of the following is not one of the three stages of the Lewin/Schein change model?

Explanation

The Lewin/Schein change model consists of three stages: unfreezing, moving, and refreezing. These stages represent the process of initiating and implementing change within an organization. The transitioning stage is not included in this model. Therefore, the correct answer is transitioning stage.

Submit
188. What should an ERM manager (or an ERM committee) be responsible for?

Explanation

An ERM manager or committee should be responsible for classifying specific records based upon their importance, regulatory requirements, and duration. This involves determining the significance of different records, understanding the regulations that apply to them, and determining how long they need to be retained. This responsibility is crucial in ensuring that records are properly managed and compliant with applicable regulations.

Submit
189. Which is not true about the impacts of identity theft today?

Explanation

The impacts of identity theft today are significant and all of the statements provided are true. The number of Americans affected by identity theft is indeed increasing, as is the financial loss experienced by individuals due to identity theft. Additionally, credit card companies have seen an increase in losses because they are often responsible for absorbing the costs of fraudulent charges. Therefore, the correct answer is "none of the above" because all of the statements are true.

Submit
190. Which of the following is NOT one of the nine project management competencies certified by the project managment institute?

Explanation

Conflict management is not one of the nine project management competencies certified by the Project Management Institute. The other options, such as time and cost management, managing project communications, risk management, and integration management, are all recognized competencies in project management. Conflict management, although an important skill in project management, is not specifically listed as one of the certified competencies by the Project Management Institute.

Submit
191. What would not typically be a part of a business case for a new systems project?

Explanation

All of the options mentioned (expected business benefits, initial development costs, ongoing costs for operations and maintenance, and review an initial return on investment analysis) are typically included in a business case for a new systems project. A business case is a document that justifies the need for the project and outlines its expected benefits, costs, and potential return on investment. Therefore, all of these factors are important to consider when making a decision about the project.

Submit
192. The agile method that emphasizes independent project teams, coordination and communication between and within teams with lots of team meetings, iterative and continuous monitoring of work, team ownership of the final product is called:

Explanation

Scrum is the correct answer because it is an agile method that emphasizes independent project teams, coordination and communication between and within teams, with lots of team meetings. It also involves iterative and continuous monitoring of work and team ownership of the final product. XML, RAD, and JAD are not agile methods and do not have the same characteristics as Scrum.

Submit
193. A primary advantage of purchasing an existing software package rather than developing a custom application is:

Explanation

Purchasing an existing software package instead of developing a custom application allows IS (Information Systems) people resources to be allocated to projects for systems that cannot be purchased. This means that the IS department can focus on creating and implementing unique solutions that are specific to the organization's needs, rather than spending time and resources on developing a custom application. By utilizing existing software packages, the organization can save time and effort in the implementation phase, as well as benefit from the expertise and support provided by the software vendor.

Submit
194. When developing a logical data flow diagram, a circle indicates:

Explanation

In a logical data flow diagram, a circle represents a process component. This means that the circle indicates a specific task or action that is performed within the system. It represents a step in the data flow where data is transformed or manipulated in some way. The circle does not indicate an element in the environment that sends or receives data, data in motion, or data at rest. Instead, it represents a process component that is responsible for processing the data within the system.

Submit
195. Which of the following statements is not true about system testing controls in the construction phase of the systems life cycle?

Explanation

In the construction phase of the systems life cycle, users are typically not involved in system testing. System testing is performed by the development team to ensure that the individual programs and their combinations work correctly. Users are usually involved in acceptance testing, which occurs after system testing is completed.

Submit
196. If an organization purchases a software package and does not modify or add to the package in-house, the construction phase then is often limited to which step?

Explanation

If an organization purchases a software package and does not modify or add to the package in-house, the construction phase is often limited to system testing. This is because system testing is the phase where the software package is tested to ensure that it meets the organization's requirements and functions correctly. Since the organization did not modify or add to the package, there is no need for additional steps such as system design or system building. Feasibility analysis is also not relevant in this scenario as it typically occurs before the construction phase.

Submit
197. Being an Alpha site usually means that the client company:

Explanation

Being an Alpha site means that the client company plays a significant role in determining the functionality of the package. This suggests that the client has a say in what features and capabilities the package should have, and their input is considered when designing and developing the software. This allows the client to customize the package according to their specific needs and requirements.

Submit
198. Successful implementation of a purchased software package typically depends upon:

Explanation

The successful implementation of a purchased software package typically depends on how well the Definition phase was conducted. This phase involves clearly defining the requirements and objectives of the software implementation project. If this phase is conducted effectively, it ensures that the software package meets the specific needs of the organization and aligns with its goals. The cost of the package and being a Beta site for the vendor may have some impact, but they are not the primary factors that determine the success of the implementation.

Submit
199. Deciding what hardware and systems software will be used to operate the system and defining the processing modules that will comprise the system are part of which SDLC step?

Explanation

System design is the correct answer because it involves determining the hardware and systems software that will be used to operate the system, as well as defining the processing modules that will make up the system. This step is crucial in planning and creating the overall structure and architecture of the system before moving on to the next stages of the SDLC.

Submit
200. According to Keil and Robey (1999), a common pitfall in monitoring the risks of a project already underway is:

Explanation

Ignoring negative feedback is a common pitfall in monitoring the risks of a project already underway, according to Keil and Robey (1999). This means that when negative feedback or warning signs are received, they are not taken seriously or are disregarded altogether. This can be detrimental to the project as it may lead to the escalation of risks and issues that could have been addressed earlier. It is important to actively listen to and address negative feedback in order to effectively monitor and manage project risks.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 15, 2012
    Quiz Created by
    Bz4934
Cancel
  • All
    All (200)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
According to the Federal Trade Commission (FTC), identify theft is...
The project champion is a business manager who has high credibility as...
Electronic Records management (ERM) practices became a more important...
Some consultants have claimed that up to one-third of all spreadsheets...
For large enterprise system packages, it is common for companies to...
Some organizations have found the use of red-yellow-green (traffic...
Agile methodologies are especially useful for developing smaller...
A company that elects to use a "hosted" application rather...
A patent gives its creator the exclusive right to the manufacture and...
A type of testing where the objective is to make sure that the system...
Choosing between building a custom application and purchasing a...
A denial of service attack is implemented by simultaneously sending a...
Some ethical issues are viewed differently depending upon the culture...
Additional project management skills are needed when using offsite and...
Using a payroll system as an example, paychecks and W-2 forms are...
In general, the term "system" is defined as a set of...
U.S. copyright laws make it illegal to copy software and use it...
The requirements definition for a purchased system is ________...
A worm is a virus that has the ability to copy itself from machine to...
Primary sources of thefts of intellectual property rights, trade...
One of the fundamental principles of systems analysis and design...
When a change made to one part of a system results in unexpected...
Employee training is part of the installation step of the SDLC.
Open source software is well-suited for very specialized applications...
System testing only occurs when systems are initially developed.
The parallel strategy of installing a new system is the riskiest...
A physical system description depicts ________ the system operators,...
A conversion strategy whereby the new system is first implemented in...
Greater changes in business processes are associated with...
Which of the following graphically depicts the estimated times (and...
Which of the following is NOT one of the nine project management...
The ________ approach to systems development has often been referred...
An RFP should be sent to as many vendors as possible.
The organizational unit responsible for ensuring that standard...
Research has shown that an organization's inability to return to...
Which position is responsible for continually assessing an...
The Sarbanes-Oxley act requires officers of publicly traded companies...
According to the Federal Trade Commission, "someone appropriating...
The U.S. has much stronger privacy laws and practices than Europe.
The SDLC methodology is the best methodology when an application needs...
Which of the following accurately describes the order in which a...
The most common approach to defining data elements in a DFD is to...
The following diagram depicts which of the following conversion...
Which of the following best describes the construction phase of the...
Hackers can be differentiated from crackers by:
What is just beginning to be addressed in organizations'...
What effect does The PATRIOT Act passed by Congress have on the U.S....
Which of the following regions has the lowest rate of software piracy?
A change management program as part of an IT project is used to:
When considering the purchase of a major software application,...
Applying knowledge, skills, tools, and techniques to a broad range of...
As defined in the textbook, the generic systems development life cycle...
Which of the following is not typically the responsibility of an IT...
A "cookie" is:
The Construction phase of the SDLC involves installation and...
Which is a basic principle of business process reengineering (BPR)...
When a physical model of a system is depicted with a diagram,...
When developing a logical data flow diagram, a rectangle (or open...
Security measures that are concerned with whether or not users can run...
The acronym RFP stands for:
The goal of the IS manager responsible for information security is to...
Which of the following is true regarding personal financial credit...
In a recent survey, what percentage of students studying in a sample...
When there are discrepancies between a package's capabilities and...
According to Kappelman et al. (2006), which is one of the...
Being a Beta site usually means that the company:
According to the textbook, which of the following is also an ethical...
A common pitfall in developing a master schedule for a project is a...
Procedural-oriented approaches to systems design first involve the:
Testing a new custom system before implementation is the...
Which of the following is not graphically represented in a data flow...
All of the following are tools for representing the Logical To-Be...
When prototyping is incorporated into a traditional SDLC approach, it...
A contract with a vendor usually does not include:
The U.S. position on privacy can be characterized as being favorable...
Which of the following regions has the lowest rate of software piracy?
Which is not a potential disadvantage of purchasing packaged systems?
Why is it important for a system analyst to document formal as well as...
A numerical digit based on the other digits within a numerical...
During the feasibility analysis phase of the SDLC, which of the...
Which of the following is a risk management task?
The percentage of resources devoted to the maintenance of a system:
With a fixed-price contract, the greatest risk is typically assumed...
Which statement is true concerning privacy in the U.S.?
In the U.S., the only federal law that limits employer surveillance of...
The project managment chart that graphically models the sequence of...
Which is not a potential disadvantage of having an application...
A project sponsor usually participates in which of the following...
Which of the following system descriptions depicts the function and...
When planning projects, what is a recommended practice?
Determining a Return Benefit for a specific security action is based...
What are sources to use to calculate a single loss expectancy as part...
Which of the following is not an advantage of prototyping?
Which criterion should a firm consider when evaluating candidate...
Which of the following accurately describes the order in which a...
Software piracy:
The SDLC phase that typically requires the greatest percentage of the...
What major component belongs to project planning?
The SDLC phase that typically requires the greatest percentage of the...
The highest level of project risk typically occurs at what stage of a...
Which of the following is a major change management activity...
Virtual teamwork introduces IT project risk due to which of the...
In addition to evaluating the vendors' responses from the formal...
Which large Internet advertising company has caused concerns among...
Swapping or sharing music on the Internet:
What types of employees outside of an organization's IS department...
Which of the following is a long-term advantage of purchasing packaged...
Which is not an advantage of open source software?
Using a sales tracking system as an example, the customer orders and...
Which of the following is an example of a goal of hierarchical...
The process of identifying the phases and sequence of tasks that need...
Why is it difficult for companies to manage their e-mail on their own...
Which of the following statements about choosing alternative packages...
) Ethical problems associated with the use of IT may affect all of the...
What is a reason for including ethics discussions in an IT management...
What is a specific characteristic of an application that can be...
The project management chart that graphically models the sequence of...
When a web site mimics a legitimate site for the purpose of misleading...
Which of the following is one of the areas in which controls are...
What are some means to deal with key information security management...
BCP shortcomings recently identified during crises include:
Creating a BCP in the U.S. requires:
When matching a company's needs with the capabilities of a...
All of the following are considered advantages to using RAD...
With a cost-reimbursement type of contract, the greatest risk is...
Which of the following is true about investigations of identity theft...
Which of the following statements about having a vendor perform...
Which of the following is not a key guideline for managing day-to-day...
Which of the following is a type of control that is used to ensure the...
A key deliverable for the initiation phase of a project is the:
In basic systems terminology, the process of breaking down a system...
Which of the following is a typical statement included in an...
Which of the following is a common risk avoidance and mitigation...
Which of the following diagrams is not part of the Unified Modeling...
What are some of the benefits to organizations with written privacy...
Which of the following is the recommended means for disseminating an...
Advances in artificial intelligence can raise social and ethical...
The function of the project champion is usually held by:
A software tool used to automate one or more steps of a software...
Sending an e-mail that falsely claims to be a legitimate enterprise in...
Which of the following competencies certified by the Project...
Which of the following best describes the definition phase of the...
Which of the following must an organization's management do if...
When purchasing a software package, a successful definition phase ends...
Which of the following prevents someone else from creating another...
Options for modifying the code of a purchased package include:
Which of the following is a factor that can affect the success of the...
If extensive changes in business processes and procedures are needed...
Which statement is not true about using an ASP purchasing option?
Which of the following describes an early step in the implementation...
According to Frame (1994), which of the following is not a trap that...
A conversion strategy whereby an organization continues to operate the...
Which organizational position is directly responsible for the...
Which prototyping step is not the responsibility of the system...
A PERT (or CPM) chart graphically depicts the estimated times for each...
Which of the following best describes a common prototyping goal when...
Which of the following technique is most closely associated with the...
Which of the following is not one of the common policy areas generally...
Which of the following is typical for a pure prototyping approach?
Due to several recent laws regarding information security, it is a...
In the object-oriented (O-O) approach to software engineering, the...
What would not typically be a part of a business case for a new...
Which of the following is not one of the rules that the GLBA gives...
Which of the following best describes a responsibility of a systems...
When comparing a traditional SDLC and a purchasing life cycle...
Which is not a social problem that is perceived to have increased due...
Approximately what percentage of the U.S. public is quite sensitive to...
What three characteristics should be evaluated by organizations when...
Which of the following elements usually includes subcomponents to...
Which type of employee does not need to be aware of basic types of...
According to Markus (1983), resistance to the implementation of a new...
What set of international guidelines includes an extensive set for...
Which statement about computer crimes is not true?
Which is a potential advantage of having an application developed by a...
A common pitfall in developing a master schedule for a project is a...
Which of the following is not an example of a principal method for...
The following diagram depicts a cutover conversion strategy. Which of...
When a customer wants to "opt-out" from a U.S. company...
All the following are common risks of avoidance and mitigation...
Recent piracy rates for music CDs were highest in:
Amazon.com settled a lawsuit with Barnes and Noble in March 2002 that...
Using the scheme proposed by Denis et al (2004) for prioritizing...
Who usually takes primary responsibility for establishing the custom...
What is the best term to describe those who break into computers to...
Controls for the validity of data entered into an application program...
A common shortcoming of user-developed applications is:
Which of the following is not one of the three stages of the...
What should an ERM manager (or an ERM committee) be responsible for?
Which is not true about the impacts of identity theft today?
Which of the following is NOT one of the nine project management...
What would not typically be a part of a business case for a new...
The agile method that emphasizes independent project teams,...
A primary advantage of purchasing an existing software package rather...
When developing a logical data flow diagram, a circle indicates:
Which of the following statements is not true about system testing...
If an organization purchases a software package and does not modify or...
Being an Alpha site usually means that the client company:
Successful implementation of a purchased software package typically...
Deciding what hardware and systems software will be used to operate...
According to Keil and Robey (1999), a common pitfall in monitoring the...
Alert!

Advertisement