Exam 12: Mis Management Processes: Process Management, systems Development, and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Charko Chemicals is a firm that supplies chemicals to pharmaceutical companies in the United States.The company implements SCM to reduce its operational costs.Even after the implementation of the SCM system,the company does not shut down the old system and runs both the systems simultaneously.This is an example of ________ installation.

(Multiple Choice)
4.9/5
(28)

Unlike ATM cards,a smart card has a magnetic strip.

(True/False)
4.9/5
(35)

Natural disasters present the largest risk for infrastructure loss.

(True/False)
4.9/5
(39)

Which of the following is the most important activity in the systems development process?

(Multiple Choice)
4.9/5
(39)

A(n)________ is a virus that propagates using the Internet or other computer networks and is specifically programmed to spread.

(Multiple Choice)
4.9/5
(30)

In the BPM activity of creating process components,the team designs changes to the business process at a depth sufficient for implementation.

(True/False)
4.8/5
(32)

One technique to safeguard against cross site scripting is to design Web sites to accept only text-based replies.

(True/False)
4.8/5
(29)

The effectiveness objective of an organization determines how well a process uses its resources.

(True/False)
4.8/5
(28)

Systems use user names to authenticate users.

(True/False)
4.8/5
(42)

Account management concerns the modification of existing account permissions and the removal of unneeded accounts.

(True/False)
4.9/5
(33)

What is BPM? What are the basic activities in BPM?

(Essay)
4.8/5
(41)

Describe how SSL/TLS works when a system communicates securely with a Web site.

(Essay)
4.7/5
(33)

Describe the modeling activity of BPM.

(Essay)
4.7/5
(30)

What are the stipulations that an organization's security policy must typically make to protect against security threats?

(Essay)
4.7/5
(37)

With HTTPS,data are encrypted using a protocol called the ________.

(Multiple Choice)
4.9/5
(37)

What are the principles of agile development methodologies?

(Essay)
4.8/5
(39)

Why is it essential to assess the feasibility of a new information system?

(Multiple Choice)
4.7/5
(35)

________ are viruses that masquerade as useful programs or files.

(Multiple Choice)
4.9/5
(28)

With ________ installation,a new system/business process is installed and operated alongside the old system until the new system is tested and fully operational.

(Multiple Choice)
4.8/5
(38)

Which of the following is the last activity in the SDLC process?

(Multiple Choice)
4.9/5
(33)
Showing 81 - 100 of 112
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)