Question
A. When they build a new physical system to fill the gap of user behaviors. B. When they design a system based on best practices
-
A. When they build a new physical system to fill the gap of user behaviors.
B. When they design a system based on best practices in the industry
C. When they benchmark the technology of a business process to other more advanced business processes
D. When they compare how a business process works currently and how it should work
2. Complete this sentence with one of the following word pairs: Keeping an open mind is a____________ behavior of the _____________ of creativity?
A. | Moral, Value | |
B. | Valuable, Moral | |
C. | Valuable, Ethic | |
D. | Righteous, Moral |
3.Which of these is an example of ethical action?
A. | None of these choices are examples of ethical action. | |
B. | White hat hackers hack into computer systems to search for system vulnerabilities. | |
C. | Individuals copy and distribute copyrighted software from the company's servers to friends. | |
D. | Employees search organizational databases to make a personal copy of other employees' medical information. | |
E. | All of these choices are examples of ethical action. |
4.In systems development, when would you use the Agile approach over the Waterfall approach?
A. | When you are developing a system that is pretty common, like a payroll system | |
B. | When you want to take delivery of the entire system at once, and not in phased modules | |
C. | When your organization needs a simpler approach to development | |
D. | When your system solution involves dealing with new and not well-known technologies |
5. What is creative work that is expressed in physical form and includes patents and trademarks?
A. | Intellectual Property | |
B. | Trade Secret | |
C. | Confidential Content | |
D. | Personal Information |
6. What are two basic ways by which businesses keep their data and applications safe?
A. | Authorization and Applications | |
B. | Signatures and biometric measures | |
C. | Firewalls and Denial of Service Attacks | |
D. | Authentication and Authorization |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started