Exam 12: MIS Management Processes: Process Management, Systems Development, and Security
Exam 1: Introduction to MIS101 Questions
Exam 2: Business Processes, Information Systems, and Information109 Questions
Exam 3: Hardware, Software, and Networks124 Questions
Exam 4: Database Processing115 Questions
Exam 5: Using IS to Improve Processes120 Questions
Exam 6: Supporting Processes with ERP Systems117 Questions
Exam 7: Supporting the Procurement Process with SAP105 Questions
Exam 8: Supporting the Sales Process with SAP108 Questions
Exam 9: Collaboration Processes and Information Systems116 Questions
Exam 10: The Impact of Web 2.0 and Social Media on Business Processes116 Questions
Exam 11: Business Intelligence119 Questions
Exam 12: MIS Management Processes: Process Management, Systems Development, and Security119 Questions
Select questions type
Designing system components is the first step in the SDLC process.
(True/False)
4.7/5
(29)
A public key is used for decoding messages in asymmetric encryption.
(True/False)
4.8/5
(37)
Phishing is a social engineering technique for obtaining unauthorized data via e-mail pretexting.
(True/False)
4.9/5
(35)
A test plan is an informal description of how an information system's components should be tested.
(True/False)
4.8/5
(34)
Account administration and systems procedures are examples of ________ safeguards.
(Multiple Choice)
4.9/5
(35)
________ are viruses that masquerade as useful programs or files.
(Multiple Choice)
4.9/5
(35)
Which of the following is a disadvantage of building information systems before business processes?
(Multiple Choice)
4.8/5
(34)
BPM is a recurring process for systematically monitoring, modeling, creating, and implementing business processes.
(True/False)
4.8/5
(39)
________ refers to social engineering in which someone deceives by pretending to be someone else.
(Multiple Choice)
4.8/5
(37)
What is the difference between pilot installation and phased installation?
(Essay)
4.9/5
(40)
A(n)________ is a computer program that is surreptitiously installed and that takes actions unknown and uncontrolled by the computer's owner or administrator.
(Multiple Choice)
4.8/5
(38)
Dorex Manufacturing builds an ERP system to streamline its business activities. After being tested, the company implements the system only in the procurement department. This is an example of ________ installation.
(Multiple Choice)
4.7/5
(40)
A firewall is a computing device that prevents unauthorized network access.
(True/False)
4.9/5
(46)
A ________ is a computing device or a program that prevents unauthorized network access.
(Multiple Choice)
4.9/5
(40)
The work done during the maintenance activity of the SDLC process is either to fix the system or to adapt it to changes in requirements.
(True/False)
4.8/5
(31)
Showing 61 - 80 of 119
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)