Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

A. When they build a new physical system to fill the gap of user behaviors. B. When they design a system based on best practices

  1. A.

    When they build a new physical system to fill the gap of user behaviors.

    B.

    When they design a system based on best practices in the industry

    C.

    When they benchmark the technology of a business process to other more advanced business processes

    D.

    When they compare how a business process works currently and how it should work

2. Complete this sentence with one of the following word pairs: Keeping an open mind is a____________ behavior of the _____________ of creativity?

A.

Moral, Value

B.

Valuable, Moral

C.

Valuable, Ethic

D.

Righteous, Moral

3.Which of these is an example of ethical action?

A.

None of these choices are examples of ethical action.

B.

White hat hackers hack into computer systems to search for system vulnerabilities.

C.

Individuals copy and distribute copyrighted software from the company's servers to friends.

D.

Employees search organizational databases to make a personal copy of other employees' medical information.

E.

All of these choices are examples of ethical action.

4.In systems development, when would you use the Agile approach over the Waterfall approach?

A.

When you are developing a system that is pretty common, like a payroll system

B.

When you want to take delivery of the entire system at once, and not in phased modules

C.

When your organization needs a simpler approach to development

D.

When your system solution involves dealing with new and not well-known technologies

5. What is creative work that is expressed in physical form and includes patents and trademarks?

A.

Intellectual Property

B.

Trade Secret

C.

Confidential Content

D.

Personal Information

6. What are two basic ways by which businesses keep their data and applications safe?

A.

Authorization and Applications

B.

Signatures and biometric measures

C.

Firewalls and Denial of Service Attacks

D.

Authentication and Authorization

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Auditing And GRC Automation In SAP

Authors: Maxim Chuprunov

2013 Edition

3642434525, 978-3642434525

More Books

Students also viewed these Accounting questions