Itm 6015 Final Exam Practice

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Bz4934
B
Bz4934
Community Contributor
Quizzes Created: 1 | Total Attempts: 435
| Attempts: 435
SettingsSettings
Please wait...
  • 1/222 Questions

    According to the Federal Trade Commission (FTC), identify theft is "someone appropriating your personal information without your knowledge to commit fraud or theft."

    • True
    • False
Please wait...
Itm 6015 Final Exam Practice - Quiz
About This Quiz

The ITM 6015 Final Exam Practice quiz assesses key competencies in developing and managing reliable information systems, documenting systems, understanding system components, and the significance of system testing in organizational contexts.


Quiz Preview

  • 2. 

    The project champion is a business manager who has high credibility as an organizational spokesperson among the user community, and is successful at communicating the business vision and project benefits.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    The project champion is someone who holds a high position in the organization and is seen as a credible spokesperson. They are able to effectively communicate the business vision and the benefits of the project to the user community. This role is crucial in gaining support and buy-in from stakeholders and ensuring the success of the project. Therefore, the statement is true.

    Rate this question:

  • 3. 

    Electronic Records management (ERM) practices became a more important information security management issue in the U.S. in 2006 when new legislation established new rules for timely information gathering in response to potential litigation.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    The statement is true because in 2006, new legislation was established in the U.S. that introduced new rules for timely information gathering in response to potential litigation. This legislation made electronic records management (ERM) practices even more important as they became a crucial aspect of information security management.

    Rate this question:

  • 4. 

    Some consultants have claimed that up to one-third of all spreadsheets contain errors, which can include mechanical errors (typos), errors in logic, as well as errors in omission.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    The statement is true because consultants have claimed that up to one-third of all spreadsheets contain errors. These errors can include mechanical errors like typos, errors in logic, and errors in omission. This suggests that a significant number of spreadsheets have mistakes in them, highlighting the importance of double-checking and verifying the accuracy of spreadsheet data.

    Rate this question:

  • 5. 

    For large enterprise system packages, it is common for companies to contract with a consulting firm, called a third-party implementation partner, to provide installation and maintenance support.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Large enterprise system packages often require specialized knowledge and expertise to install and maintain. Companies may not have the necessary resources or expertise in-house, so they contract with a third-party implementation partner, typically a consulting firm, to handle these tasks. This allows the company to benefit from the partner's experience and ensures smooth implementation and ongoing support for the system package. Therefore, the statement that it is common for companies to contract with a third-party implementation partner for installation and maintenance support is true.

    Rate this question:

  • 6. 

    Agile methodologies are especially useful for developing smaller systems rather than largescale transaction processing applications.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Agile methodologies are particularly beneficial for developing smaller systems rather than large-scale transaction processing applications because they prioritize flexibility, adaptability, and iterative development. Smaller systems often require quicker response times, frequent changes, and a higher degree of collaboration between team members. Agile methodologies, such as Scrum or Kanban, allow for continuous improvement, regular feedback, and incremental development, making them well-suited for smaller projects where requirements may evolve rapidly. In contrast, large-scale transaction processing applications often involve complex and rigid processes, making traditional waterfall methodologies more appropriate.

    Rate this question:

  • 7. 

    A company that elects to use a "hosted" application rather than to purchase the software application and host it on its own equipment, is making use of a(n) application service provider (or ASP).

    • True

    • False

    Correct Answer
    A. True
    Explanation
    When a company chooses to use a "hosted" application instead of buying and hosting the software on its own equipment, it is utilizing an application service provider (ASP). This means that the company is outsourcing the hosting and maintenance of the software to a third-party provider, who delivers the application over the internet. This allows the company to access and use the software without the need for extensive hardware and infrastructure investments. Therefore, the statement is true.

    Rate this question:

  • 8. 

    Some organizations have found the use of red-yellow-green (traffic light) symbols effective in communicating problem areas to project oversight committees.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    The statement suggests that organizations have found the use of red-yellow-green symbols effective in communicating problem areas to project oversight committees. This implies that these symbols are able to convey information about problem areas in a clear and understandable way, making it easier for project oversight committees to identify and address issues. Therefore, the answer is true.

    Rate this question:

  • 9. 

    A patent gives its creator the exclusive right to the manufacture and use of a new design or method for a limited period of time.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    A patent is a legal protection granted to inventors or creators of a new design or method. This protection gives them exclusive rights to manufacture and use their invention for a specific period of time. During this time, others are prohibited from using or manufacturing the patented invention without the creator's permission. Therefore, the statement that a patent gives its creator the exclusive right to the manufacture and use of a new design or method for a limited period of time is true.

    Rate this question:

  • 10. 

    A type of testing where the objective is to make sure that the system performs reliably and does what it is supposed to do in a user environment is referred to as user acceptance testing.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    User acceptance testing is a type of testing that focuses on ensuring that the system functions reliably and meets the requirements of the end users. It involves testing the system in a real-world user environment to validate its performance and functionality. This testing phase allows users to provide feedback and verify that the system meets their needs and expectations before it is deployed. Therefore, the given statement is true.

    Rate this question:

  • 11. 

    Choosing between building a custom application and purchasing a software package is called a make-or-buy decision.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    A make-or-buy decision refers to the process of deciding whether to develop a custom application or purchase a software package. This decision involves evaluating the costs, benefits, and risks associated with each option. Therefore, the statement that choosing between building a custom application and purchasing a software package is called a make-or-buy decision is true.

    Rate this question:

  • 12. 

    A denial of service attack is implemented by simultaneously sending a large number of messages to a target computer to create a computer or communications overload, so that legitimate users cannot obtain access.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    A denial of service attack involves flooding a target computer with a high volume of messages, causing it to become overloaded and unable to handle legitimate user requests. This prevents legitimate users from accessing the computer or its communications. Therefore, the statement is true.

    Rate this question:

  • 13. 

    Some ethical issues are viewed differently depending upon the culture in which they arise.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Ethical issues are subjective and can vary across different cultures. What may be considered ethical in one culture may be viewed differently in another. This is because cultural norms, values, and beliefs shape individuals' perspectives on what is right or wrong. Therefore, it is true that some ethical issues are viewed differently depending upon the culture in which they arise.

    Rate this question:

  • 14. 

    Additional project management skills are needed when using offsite and offshore resources for new application development.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    When using offsite and offshore resources for new application development, additional project management skills are needed. This is because managing a project with resources located in different locations requires effective communication, coordination, and collaboration. Offsite and offshore resources may have different time zones, cultural norms, and work practices, which need to be considered and managed. Additionally, there may be language barriers and challenges in aligning the project goals and expectations. Therefore, having additional project management skills is essential to ensure successful development and delivery of the new application.

    Rate this question:

  • 15. 

    Using a payroll system as an example, paychecks and W-2 forms are examples of which of the following system elements?

    • Outputs

    • Inputs

    • Storage

    • Memory

    Correct Answer
    A. Outputs
    Explanation
    Paychecks and W-2 forms are examples of outputs in a payroll system. Outputs refer to the information or results that are produced by a system and are provided to the users or other systems. In this case, paychecks and W-2 forms are the final results of the payroll system that are generated and given to the employees.

    Rate this question:

  • 16. 

    In general, the term "system" is defined as a set of interrelated components that must work together to achieve some common purpose.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    The given statement is true. A system is indeed defined as a collection of interconnected components that collaborate to achieve a shared objective. These components, whether they are physical or abstract, interact and depend on each other to function effectively. By working together, they accomplish a common purpose or goal.

    Rate this question:

  • 17. 

    U.S. copyright laws make it illegal to copy software and use it without the software vendor's permission.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    U.S. copyright laws prohibit the unauthorized copying and use of software without permission from the software vendor. This means that individuals or organizations cannot make copies of software or use it without obtaining proper authorization.

    Rate this question:

  • 18. 

    The requirements definition for a purchased system is ________ detailed than the requirements used to build a prototype, and ________ detailed than the requirements needed to design a custom system.

    • More, less

    • Less, more

    • More, more

    • Less, less

    Correct Answer
    A. More, less
    Explanation
    The requirements definition for a purchased system is more detailed than the requirements used to build a prototype because purchased systems are typically already developed and have a set of predefined features that need to be clearly defined. On the other hand, the requirements for a purchased system are less detailed than the requirements needed to design a custom system because custom systems are built from scratch and require a more thorough understanding of the specific needs and functionalities of the organization.

    Rate this question:

  • 19. 

    A worm is a virus that has the ability to copy itself from machine to machine, usually over a network.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    A worm is a type of malicious software that can replicate itself and spread from one computer to another, typically through a network. Unlike viruses, worms do not require a host program to spread. They can exploit vulnerabilities in computer systems to gain access and then use that access to propagate themselves. This makes them capable of rapidly infecting multiple machines and causing widespread damage. Therefore, the statement that a worm is a virus that can copy itself from machine to machine over a network is true.

    Rate this question:

  • 20. 

    Primary sources of thefts of intellectual property rights, trade secrets, and research and development knowledge are employees.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    The statement is true because employees have direct access to sensitive information and are often familiar with the company's intellectual property, trade secrets, and research and development knowledge. This insider knowledge makes them more likely to be involved in thefts of these assets. It is important for companies to have proper security measures in place to protect against such thefts and to educate employees about the importance of intellectual property rights.

    Rate this question:

  • 21. 

    One of the fundamental principles of systems analysis and design (SA&D) is that the logical system should be described before the physical system.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    The explanation for the given correct answer is that in systems analysis and design, it is important to first define and describe the logical system before moving on to the physical system. This is because the logical system represents the conceptual and functional aspects of the system, including the processes, data flows, and relationships, while the physical system deals with the actual implementation and hardware/software components. By starting with the logical system, it ensures that the requirements and functionality of the system are properly understood and defined before moving on to the physical implementation.

    Rate this question:

  • 22. 

    When a change made to one part of a system results in unexpected changes to another part of the system, it is commonly referred to as a ripple effect.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    When a change made to one part of a system causes unexpected changes in another part, it is known as a ripple effect. This term is commonly used to describe the way in which modifications or alterations in one area can have unintended consequences in other areas of a system. The ripple effect is often seen in complex systems where various components are interconnected and interdependent. It highlights the interconnected nature of systems and the potential for changes to have broader impacts beyond the immediate area of modification.

    Rate this question:

  • 23. 

    Employee training is part of the installation step of the SDLC.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Employee training is an essential part of the installation step of the SDLC. During the installation phase, employees are trained on how to use and operate the new system or software that is being implemented. This training ensures that employees have the necessary skills and knowledge to effectively utilize the new system and perform their job responsibilities efficiently. Without proper training, employees may struggle to adapt to the new system, leading to inefficiencies and potential errors. Therefore, employee training is crucial during the installation step of the SDLC to ensure a smooth transition and successful implementation of the new system.

    Rate this question:

  • 24. 

    Open source software is well-suited for very specialized applications and business processes.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    Generic applications that are common to many organizations are the most viable applications because they will attract a large community of developers.

    Rate this question:

  • 25. 

    System testing only occurs when systems are initially developed.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    Testing also occurs when systems are modified.

    Rate this question:

  • 26. 

    The parallel strategy of installing a new system is the riskiest method of installation because the old system is abandoned as soon as the new system is implemented.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    The cutover (or cold turkey) strategy is riskiest.

    Rate this question:

  • 27. 

    A physical system description depicts ________ the system operators, while a logical system description depicts ________ the system does.

    • How; what

    • How; why

    • What; how

    • Why; what

    Correct Answer
    A. How; what
    Explanation
    A physical system description depicts how the system operators, while a logical system description depicts what the system does. This means that a physical system description focuses on the mechanics and processes involved in operating the system, while a logical system description focuses on the functionality and outcomes of the system.

    Rate this question:

  • 28. 

    A conversion strategy whereby the new system is first implemented in only part of the organization to solve any problems before implemented in the rest of the organization is called a:

    • Pilot strategy.

    • Phased strategy.

    • Cutover strategy.

    • Parallel strategy.

    Correct Answer
    A. Pilot strategy.
    Explanation
    A pilot strategy is a conversion strategy where the new system is initially implemented in only a part of the organization. This allows any problems or issues to be identified and resolved before the system is implemented in the rest of the organization. This approach helps to minimize risks and ensure a smooth transition to the new system.

    Rate this question:

  • 29. 

    Greater changes in business processes are associated with "vanilla" implementations of software packages.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Greater changes in business processes are associated with "vanilla" implementations of software packages because "vanilla" implementations refer to using the software package as it is, without any customization or modifications to fit specific business needs. Therefore, since "vanilla" implementations do not accommodate specific business processes, organizations often need to make significant changes to their existing processes in order to align with the software package. This is in contrast to customized implementations, where the software is tailored to fit the organization's existing processes, resulting in fewer changes needed.

    Rate this question:

  • 30. 

    Which of the following is NOT one of the nine project management competencies certified by the Project Management Institute?

    • Conflict management

    • Managing project communications

    • Risk management

    • Integration management

    Correct Answer
    A. Conflict management
    Explanation
    The correct answer is conflict management. The question asks for the competency that is NOT certified by the Project Management Institute (PMI). The PMI is a renowned organization that provides certifications in project management. Among the given options, conflict management is not listed as one of the nine competencies certified by the PMI. This suggests that conflict management may not be considered as a specific competency that the PMI focuses on in their certification programs.

    Rate this question:

  • 31. 

    Which of the following graphically depicts the estimated times (and later, the actual times) for each project task against a horizontal timescale?

    • Gantt chart

    • PERT chart

    • Work breakdown

    • Project charter

    Correct Answer
    A. Gantt chart
    Explanation
    A Gantt chart is a type of bar chart that visually represents the estimated and actual times for each project task. It is plotted against a horizontal timescale, allowing for easy visualization of the project timeline. The chart shows the start and end dates of each task, as well as the duration. This allows project managers to track progress, identify dependencies, and allocate resources effectively. The other options, PERT chart, work breakdown, and project charter, do not specifically depict times against a horizontal timescale, making them incorrect answers.

    Rate this question:

  • 32. 

    The ________ approach to systems development has often been referred to as the "waterfall" model.

    • SDLC

    • Prototyping

    • RAD

    • XP

    Correct Answer
    A. SDLC
    Explanation
    The correct answer is SDLC (Systems Development Life Cycle). The SDLC approach to systems development is often referred to as the "waterfall" model because it follows a linear and sequential process. This means that each phase of the development cycle (such as planning, analysis, design, implementation, and maintenance) is completed before moving on to the next phase. This approach is characterized by its structured and systematic nature, with each phase building upon the previous one.

    Rate this question:

  • 33. 

    An RFP should be sent to as many vendors as possible.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    An RFP should only be sent to a short list of vendors that produce suitable software packages.

    Rate this question:

  • 34. 

    The organizational unit responsible for ensuring that standard approaches to project management are utilized across projects is called the:

    • Program Management Office.

    • PMI.

    • Portfolio Management Team.

    • Project Oversight Committee.

    Correct Answer
    A. Program Management Office.
    Explanation
    The Program Management Office (PMO) is responsible for ensuring that standard approaches to project management are utilized across projects. The PMO provides guidance, support, and oversight to project managers and teams, helping them adhere to best practices, processes, and methodologies. The PMO also helps in coordinating resources, managing risks, and monitoring project progress. By establishing and enforcing consistent project management practices, the PMO helps improve project success rates and ensures alignment with organizational goals and objectives. PMI is a professional association for project management, while the Portfolio Management Team and Project Oversight Committee may have different responsibilities within an organization.

    Rate this question:

  • 35. 

    Research has shown that an organization's inability to return to normal business activities after a major disruption is a key predictor of:

    • Business survival.

    • Business renewal.

    • Business growth.

    • Business start.

    Correct Answer
    A. Business survival.
    Explanation
    The correct answer is business survival. Research has shown that when an organization is unable to return to normal business activities after a major disruption, it is more likely to struggle and potentially even fail. This suggests that the ability to recover and resume operations is crucial for the survival of a business. It highlights the importance of having effective crisis management and contingency plans in place to minimize the impact of disruptions and ensure the organization can continue to operate successfully.

    Rate this question:

  • 36. 

    The SDLC methodology is the best methodology when an application needs to be quickly developed.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    The SDLC is a very time-consuming process.

    Rate this question:

  • 37. 

    Which position is responsible for continually assessing an organization's information security risks and developing and implementing effective countermeasures?

    • CSO or CISO

    • CEO

    • COSO

    • All of the above

    Correct Answer
    A. CSO or CISO
    Explanation
    The correct answer is CSO or CISO. The CSO (Chief Security Officer) or CISO (Chief Information Security Officer) is responsible for continually assessing an organization's information security risks and developing and implementing effective countermeasures. They are in charge of ensuring that the organization's information and data are protected from potential threats and vulnerabilities. This includes identifying and analyzing risks, implementing security measures, and monitoring and responding to security incidents. The CSO or CISO plays a crucial role in maintaining the overall security posture of the organization.

    Rate this question:

  • 38. 

    The Sarbanes-Oxley act requires officers of publicly traded companies in the U.S. to certify that:

    • The organization has a CIO.

    • They are responsible for establishing and maintaining internal financial controls.

    • The organization has a CSO.

    • All email over one year old has been securely deleted.

    Correct Answer
    A. They are responsible for establishing and maintaining internal financial controls.
    Explanation
    The Sarbanes-Oxley act requires officers of publicly traded companies in the U.S. to certify that they are responsible for establishing and maintaining internal financial controls. This means that the officers must ensure that the company has effective systems and processes in place to accurately record and report financial information, prevent fraud, and comply with applicable laws and regulations. By certifying this, the officers are taking personal responsibility for the financial integrity of the company and providing assurance to shareholders and the public that the company's financial statements are reliable.

    Rate this question:

  • 39. 

    According to the Federal Trade Commission, "someone appropriating your personal information without your knowledge to commit fraud or theft" is called:

    • An identity theft.

    • A credit information theft.

    • An intellectual property theft.

    • Internet file sharing.

    Correct Answer
    A. An identity theft.
    Explanation
    The term "someone appropriating your personal information without your knowledge to commit fraud or theft" is commonly known as identity theft. This refers to the act of someone stealing another person's personal information, such as their name, social security number, or financial details, with the intention of using it for fraudulent purposes. It is a serious crime that can lead to financial loss and damage to an individual's reputation.

    Rate this question:

  • 40. 

    The U.S. has much stronger privacy laws and practices than Europe.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    This statement is false. Europe has much stronger privacy laws and practices compared to the U.S. The European Union has implemented the General Data Protection Regulation (GDPR), which provides comprehensive regulations for the protection of personal data. The GDPR grants individuals more control over their personal information and imposes strict penalties for non-compliance. In contrast, the U.S. has a more fragmented approach to privacy laws, with various federal and state regulations that are generally considered less stringent than the GDPR.

    Rate this question:

  • 41. 

    Which of the following accurately describes the order in which a system is tested?

    • Module testing, subsystem testing, integration testing, acceptance testing

    • Subsystem testing, acceptance testing, integration testing, module testing

    • Acceptance testing, integration testing, subsystem testing, module testing

    • Module testing, integration testing, subsystem testing, acceptance testing

    Correct Answer
    A. Module testing, subsystem testing, integration testing, acceptance testing
    Explanation
    The correct order in which a system is tested is module testing, subsystem testing, integration testing, and acceptance testing. Module testing involves testing individual components or modules of the system to ensure they function correctly. Subsystem testing involves testing a group of related modules together to ensure they work together properly. Integration testing involves testing the integration of different subsystems to ensure they work together seamlessly. Finally, acceptance testing involves testing the entire system to ensure it meets the requirements and is ready for deployment.

    Rate this question:

  • 42. 

    The most common approach to defining data elements in a DFD is to create a(n):

    • Data at rest.

    • Data dictionary/directory.

    • Process.

    • External entity.

    Correct Answer
    A. Data dictionary/directory.
    Explanation
    In a Data Flow Diagram (DFD), the most common approach to defining data elements is to create a data dictionary/directory. A data dictionary/directory is a centralized repository that provides a comprehensive description of all data elements used in the system. It includes information such as data names, definitions, data types, and relationships between data elements. This helps in ensuring consistency and understanding of data throughout the system, making it easier to analyze, design, and maintain the system.

    Rate this question:

  • 43. 

    The following diagram depicts which of the following conversion strategies?

    • Parallel strategy

    • Phased strategy

    • Pilot strategy

    • Entrepreneurial strategy

    Correct Answer
    A. Phased strategy
    Explanation
    The diagram represents a phased strategy for conversion. This strategy involves implementing the conversion process in distinct phases or stages, with each phase building upon the previous one. It allows for a systematic and controlled approach to the conversion, ensuring that each phase is successfully completed before moving on to the next. This strategy is often used when the conversion process is complex or requires significant changes to be made.

    Rate this question:

  • 44. 

    Which of the following best describes the construction phase of the systems life cycle?

    • The system is functionally designed, and then its physical design is specified.

    • The new system is installed.

    • Business and systems professionals document systems needs and feasibility.

    • Data and procedures from the old system are converted.

    Correct Answer
    A. The system is functionally designed, and then its physical design is specified.
    Explanation
    During the construction phase of the systems life cycle, the system is functionally designed, which means that the overall structure and functionality of the system are planned and defined. Once the functional design is complete, the physical design of the system is specified, which involves determining the hardware, software, and other physical components required for the system. This phase focuses on translating the functional design into a detailed technical plan for implementation. The other options mentioned in the question, such as installing the new system, documenting system needs, and converting data and procedures from the old system, are not specific to the construction phase.

    Rate this question:

  • 45. 

    When considering the purchase of a major software application, managers need to also consider the following potential downside:

    • It is typically more expensive than custom development.

    • The package seldom totally fits the company's needs.

    • It takes much longer to implement because of the software's complexity.

    • There is no documentation.

    Correct Answer
    A. The package seldom totally fits the company's needs.
    Explanation
    When purchasing a major software application, managers need to consider the potential downside that the package seldom totally fits the company's needs. This means that the software may not have all the features and functionalities required by the company, and customization may be necessary. This can lead to additional costs and time spent on modifying the software to meet the company's specific requirements.

    Rate this question:

  • 46. 

    A change management program as part of an IT project is used to:

    • Convert data to useable form.

    • avoid resistance by business users to a new system being implemented.

    • Help with personnel shifts in a company.

    • Negotiate a contract.

    Correct Answer
    A. avoid resistance by business users to a new system being implemented.
    Explanation
    A change management program is implemented as part of an IT project to address and manage the resistance that may arise from business users when a new system is being implemented. This program aims to ensure a smooth transition and minimize any disruptions or pushback from the users. By involving and engaging the business users throughout the change process, the program helps to gain their buy-in, address their concerns, and ultimately reduce resistance to the new system.

    Rate this question:

  • 47. 

    Applying knowledge, skills, tools, and techniques to a broad range of activities in order to meet the requirement of a particular project is called:

    • Project management.

    • Life-cycle management.

    • Change management.

    • Program management.

    Correct Answer
    A. Project management.
    Explanation
    Project management involves applying knowledge, skills, tools, and techniques to various activities in order to meet the requirements of a specific project. It encompasses planning, organizing, and controlling resources to achieve project goals. Life-cycle management refers to managing the entire life cycle of a product or project, including development, launch, and disposal. Change management deals with managing changes within an organization. Program management involves managing multiple related projects to achieve strategic objectives. Therefore, the correct answer is project management as it aligns with the given description.

    Rate this question:

  • 48. 

    Hackers can be differentiated from crackers by:

    • The types of targets they select.

    • The tools that they use.

    • Their level of malicious intent.

    • Whether they are internal or external to the target organization.

    Correct Answer
    A. Their level of malicious intent.
    Explanation
    Hackers can be differentiated from crackers by their level of malicious intent. While both hackers and crackers engage in unauthorized access to computer systems, hackers typically have a curiosity and desire to explore and understand systems, often with no intention to cause harm. On the other hand, crackers have a malicious intent and aim to exploit vulnerabilities for personal gain or to cause damage. The level of malicious intent is what sets hackers and crackers apart from each other.

    Rate this question:

  • 49. 

    What is just beginning to be addressed in organizations' acceptable-use policies?

    • Usage of social media

    • Usage of emails

    • Usage of external websites

    • None of the above

    Correct Answer
    A. Usage of social media
    Explanation
    Organizations' acceptable-use policies are now starting to address the usage of social media. This suggests that organizations are recognizing the need to regulate and set guidelines for employees' use of social media platforms during work hours. As social media becomes increasingly prevalent in the workplace, organizations are realizing the importance of addressing potential risks and ensuring that employees use social media responsibly and in line with the organization's values and policies.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 15, 2012
    Quiz Created by
    Bz4934
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.