Exam 12: MIS Management Processes: Process Management, Systems Development, and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is the last activity in the SDLC process?

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

D

With ________ installation, organizations implement an entire system/business process on a limited portion of the business.

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

C

During the ________ activity of BPM, managers evaluate process measures against their objectives and respond to changes in the business climate.

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

B

________ feasibility concerns whether the new system fits within the customs, culture, charter, or legal requirements of a firm.

(Multiple Choice)
4.7/5
(37)

Organizational feasibility refers to whether a new information system is economically feasible for an organization.

(True/False)
4.9/5
(33)

Which of the following is NOT an element of computer security?

(Multiple Choice)
4.8/5
(37)

Switching between two passwords periodically will increase system security.

(True/False)
4.8/5
(33)

With HTTPS, data are encrypted using a protocol called the ________.

(Multiple Choice)
4.8/5
(38)

A number used to encrypt data is called a(n)________.

(Multiple Choice)
4.7/5
(39)

With regard to people, design involves developing role job descriptions.

(True/False)
4.8/5
(35)

A bot is a computer program that is surreptitiously installed and takes actions unknown and uncontrolled by the computer's owner or administrator.

(True/False)
4.8/5
(32)

IP spoofing is a situation in which a computer registers on a network without using an IP address.

(True/False)
4.8/5
(42)

Which of the following is the most important activity in the systems development process?

(Multiple Choice)
4.8/5
(35)

With ________ installation, an organization shuts off the old system/business process and starts the new one.

(Multiple Choice)
4.8/5
(42)

________ are installed on a user's computer without the user's knowledge or permission. They reside in the background and, unknown to the user, observe the user's actions and keystrokes and report the user's activities to sponsoring organizations.

(Multiple Choice)
4.7/5
(39)

A firm considers a proposal for the implementation of a supply chain management system. After evaluating the proposal, the directors of the firm conclude that the system is not in line with the firm's culture and customs. This system lacks ________ feasibility.

(Multiple Choice)
5.0/5
(38)

________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication.

(Multiple Choice)
4.9/5
(42)

Account management concerns the modification of existing account permissions and the removal of unneeded accounts.

(True/False)
4.8/5
(33)

Hacking occurs when a person gains unauthorized access to a computer system.

(True/False)
4.9/5
(39)

Organizations should not use security considerations as a criterion for hiring employees.

(True/False)
4.9/5
(33)
Showing 1 - 20 of 119
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)