According to the Federal Trade Commission (FTC), identify theft is...
The project champion is a business manager who has high credibility as...
Electronic Records management (ERM) practices became a more important...
Some consultants have claimed that up to one-third of all spreadsheets...
For large enterprise system packages, it is common for companies to...
Some organizations have found the use of red-yellow-green (traffic...
Agile methodologies are especially useful for developing smaller...
A company that elects to use a "hosted" application rather...
A patent gives its creator the exclusive right to the manufacture and...
A type of testing where the objective is to make sure that the system...
Choosing between building a custom application and purchasing a...
A denial of service attack is implemented by simultaneously sending a...
Some ethical issues are viewed differently depending upon the culture...
Additional project management skills are needed when using offsite and...
Using a payroll system as an example, paychecks and W-2 forms are...
In general, the term "system" is defined as a set of...
U.S. copyright laws make it illegal to copy software and use it...
The requirements definition for a purchased system is ________...
A worm is a virus that has the ability to copy itself from machine to...
Primary sources of thefts of intellectual property rights, trade...
One of the fundamental principles of systems analysis and design...
When a change made to one part of a system results in unexpected...
Employee training is part of the installation step of the SDLC.
Open source software is well-suited for very specialized applications...
System testing only occurs when systems are initially developed.
The parallel strategy of installing a new system is the riskiest...
A physical system description depicts ________ the system operators,...
A conversion strategy whereby the new system is first implemented in...
Greater changes in business processes are associated with...
Which of the following graphically depicts the estimated times (and...
Which of the following is NOT one of the nine project management...
The ________ approach to systems development has often been referred...
An RFP should be sent to as many vendors as possible.
The organizational unit responsible for ensuring that standard...
Research has shown that an organization's inability to return to...
Which position is responsible for continually assessing an...
The Sarbanes-Oxley act requires officers of publicly traded companies...
According to the Federal Trade Commission, "someone appropriating...
The U.S. has much stronger privacy laws and practices than Europe.
The SDLC methodology is the best methodology when an application needs...
Which of the following accurately describes the order in which a...
The most common approach to defining data elements in a DFD is to...
The following diagram depicts which of the following conversion...
Which of the following best describes the construction phase of the...
Hackers can be differentiated from crackers by:
What is just beginning to be addressed in organizations'...
What effect does The PATRIOT Act passed by Congress have on the U.S....
Which of the following regions has the lowest rate of software piracy?
A change management program as part of an IT project is used to:
When considering the purchase of a major software application,...
Applying knowledge, skills, tools, and techniques to a broad range of...
As defined in the textbook, the generic systems development life cycle...
Which of the following is not typically the responsibility of an IT...
A "cookie" is:
The Construction phase of the SDLC involves installation and...
Which is a basic principle of business process reengineering (BPR)...
When a physical model of a system is depicted with a diagram,...
When developing a logical data flow diagram, a rectangle (or open...
Security measures that are concerned with whether or not users can run...
The acronym RFP stands for:
The goal of the IS manager responsible for information security is to...
Which of the following is true regarding personal financial credit...
In a recent survey, what percentage of students studying in a sample...
When there are discrepancies between a package's capabilities and...
According to Kappelman et al. (2006), which is one of the...
Being a Beta site usually means that the company:
According to the textbook, which of the following is also an ethical...
A common pitfall in developing a master schedule for a project is a...
Procedural-oriented approaches to systems design first involve the:
Testing a new custom system before implementation is the...
Which of the following is not graphically represented in a data flow...
All of the following are tools for representing the Logical To-Be...
When prototyping is incorporated into a traditional SDLC approach, it...
A contract with a vendor usually does not include:
The U.S. position on privacy can be characterized as being favorable...
Which of the following regions has the lowest rate of software piracy?
Which is not a potential disadvantage of purchasing packaged systems?
Why is it important for a system analyst to document formal as well as...
A numerical digit based on the other digits within a numerical...
During the feasibility analysis phase of the SDLC, which of the...
Which of the following is a risk management task?
The percentage of resources devoted to the maintenance of a system:
With a fixed-price contract, the greatest risk is typically assumed...
Which statement is true concerning privacy in the U.S.?
In the U.S., the only federal law that limits employer surveillance of...
The project managment chart that graphically models the sequence of...
Which is not a potential disadvantage of having an application...
A project sponsor usually participates in which of the following...
Which of the following system descriptions depicts the function and...
When planning projects, what is a recommended practice?
Determining a Return Benefit for a specific security action is based...
What are sources to use to calculate a single loss expectancy as part...
Which of the following is not an advantage of prototyping?
Which criterion should a firm consider when evaluating candidate...
Which of the following accurately describes the order in which a...
Software piracy:
The SDLC phase that typically requires the greatest percentage of the...
What major component belongs to project planning?
The SDLC phase that typically requires the greatest percentage of the...
The highest level of project risk typically occurs at what stage of a...
Which of the following is a major change management activity...
Virtual teamwork introduces IT project risk due to which of the...
In addition to evaluating the vendors' responses from the formal...
Which large Internet advertising company has caused concerns among...
Swapping or sharing music on the Internet:
What types of employees outside of an organization's IS department...
Which of the following is a long-term advantage of purchasing packaged...
Which is not an advantage of open source software?
Using a sales tracking system as an example, the customer orders and...
Which of the following is an example of a goal of hierarchical...
The process of identifying the phases and sequence of tasks that need...
Why is it difficult for companies to manage their e-mail on their own...
Which of the following statements about choosing alternative packages...
) Ethical problems associated with the use of IT may affect all of the...
What is a reason for including ethics discussions in an IT management...
What is a specific characteristic of an application that can be...
The project management chart that graphically models the sequence of...
When a web site mimics a legitimate site for the purpose of misleading...
Which of the following is one of the areas in which controls are...
What are some means to deal with key information security management...
BCP shortcomings recently identified during crises include:
Creating a BCP in the U.S. requires:
When matching a company's needs with the capabilities of a...
All of the following are considered advantages to using RAD...
With a cost-reimbursement type of contract, the greatest risk is...
Which of the following is true about investigations of identity theft...
Which of the following statements about having a vendor perform...
Which of the following is not a key guideline for managing day-to-day...
Which of the following is a type of control that is used to ensure the...
A key deliverable for the initiation phase of a project is the:
In basic systems terminology, the process of breaking down a system...
Which of the following is a typical statement included in an...
Which of the following is a common risk avoidance and mitigation...
Which of the following diagrams is not part of the Unified Modeling...
What are some of the benefits to organizations with written privacy...
Which of the following is the recommended means for disseminating an...
Advances in artificial intelligence can raise social and ethical...
The function of the project champion is usually held by:
A software tool used to automate one or more steps of a software...
Sending an e-mail that falsely claims to be a legitimate enterprise in...
Which of the following competencies certified by the Project...
Which of the following best describes the definition phase of the...
Which of the following must an organization's management do if...
When purchasing a software package, a successful definition phase ends...
Which of the following prevents someone else from creating another...
Options for modifying the code of a purchased package include:
Which of the following is a factor that can affect the success of the...
If extensive changes in business processes and procedures are needed...
Which statement is not true about using an ASP purchasing option?
Which of the following describes an early step in the implementation...
According to Frame (1994), which of the following is not a trap that...
A conversion strategy whereby an organization continues to operate the...
Which organizational position is directly responsible for the...
Which prototyping step is not the responsibility of the system...
A PERT (or CPM) chart graphically depicts the estimated times for each...
Which of the following best describes a common prototyping goal when...
Which of the following technique is most closely associated with the...
Which of the following is not one of the common policy areas generally...
Which of the following is typical for a pure prototyping approach?
Due to several recent laws regarding information security, it is a...
In the object-oriented (O-O) approach to software engineering, the...
What would not typically be a part of a business case for a new...
Which of the following is not one of the rules that the GLBA gives...
Which of the following best describes a responsibility of a systems...
When comparing a traditional SDLC and a purchasing life cycle...
Which is not a social problem that is perceived to have increased due...
Approximately what percentage of the U.S. public is quite sensitive to...
What three characteristics should be evaluated by organizations when...
Which of the following elements usually includes subcomponents to...
Which type of employee does not need to be aware of basic types of...
According to Markus (1983), resistance to the implementation of a new...
What set of international guidelines includes an extensive set for...
Which statement about computer crimes is not true?
Which is a potential advantage of having an application developed by a...
A common pitfall in developing a master schedule for a project is a...
Which of the following is not an example of a principal method for...
The following diagram depicts a cutover conversion strategy. Which of...
When a customer wants to "opt-out" from a U.S. company...
All the following are common risks of avoidance and mitigation...
Recent piracy rates for music CDs were highest in:
Amazon.com settled a lawsuit with Barnes and Noble in March 2002 that...
Using the scheme proposed by Denis et al (2004) for prioritizing...
Who usually takes primary responsibility for establishing the custom...
What is the best term to describe those who break into computers to...
Controls for the validity of data entered into an application program...
A common shortcoming of user-developed applications is:
Which of the following is not one of the three stages of the...
What should an ERM manager (or an ERM committee) be responsible for?
Which is not true about the impacts of identity theft today?
Which of the following is NOT one of the nine project management...
What would not typically be a part of a business case for a new...
The agile method that emphasizes independent project teams,...
A primary advantage of purchasing an existing software package rather...
When developing a logical data flow diagram, a circle indicates:
Which of the following statements is not true about system testing...
If an organization purchases a software package and does not modify or...
Being an Alpha site usually means that the client company:
Successful implementation of a purchased software package typically...
Deciding what hardware and systems software will be used to operate...
According to Keil and Robey (1999), a common pitfall in monitoring the...