Question
Indicate the answer choice that best completes the statement or answers the question. 1. The _____ describes a system at the beginning of system operation
Indicate the answer choice that best completes the statement or answers the question. |
1. The _____ describes a system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system.
|
2. _____ analyzes an organization's assets, threats, and vulnerabilities.
|
3. In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version _____.
|
4. Corrective maintenance _____.
|
5. When comparing search engines, it is important to know the companys policy toward allowing commercial sites to boost their ranking in a _____ arrangement.
|
6. The _____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features.
|
7. To avoid problems, preventive maintenance _____.
|
8. _____ measures the time between submitting a request for information and the fulfillment of the request.
|
9. A collection of related webpages is called a _____.
|
10. A _____ is the main line of defense between a local network, or intranet, and the Internet.
|
11. In addition to benchmark testing, performance measurements, called _____, can monitor the number of transactions processed in a given time period, the number of records accessed, and the volume of online data.
|
Critical Thinking Questions As another one of his responsibilities, George captures information from clients about attacks they have borne and from their description, he identifies the kind of attack they have experienced. |
12. Another of George's clients describes a situation in which a caller to their service desk pretended to be a legitimate user and requested that his password to his company account be changed. How does George categorize this incident?
|
13. Many IT departments also use a job title of _____ to designate positions that require a combination of systems analysis and programming skills.
|
14. When the _____ logical operator is used to combine keywords, a search engine will retrieve all results containing either keyword.
|
15. A _____ is a formal reference point that measures system characteristics at a specific time.
|
16. _____ ensures that authorized users have timely and reliable access to necessary information.
|
17. As shown in the accompanying figure, near the end of a systems useful life, _____ when it becomes clear that a company plans to replace the system.
|
18. As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by _____.
|
19. Typically, an intruder accesses a system using a compromised account, and may attempt a(n) _____, which is an unauthorized attempt to increase permission levels.
|
20. Search engines use a specialized computer program called a _____ that travels from site to site indexing, or cataloging, the contents of the pages based on keywords.
|
|
Identify the letters of the choices that best match the phrases or definitions.
|
21. An asymmetric kind of encryption |
22. A risk control strategy that shifts risks to another asset or party |
23. Hostile act that targets systems or a company itself |
24. Protects the system and keeps it safe, free from danger, and reliable |
25. Combination of hardware and software that allows computers to interact with a network |
26. A risk control strategy that reduces the impact of a risk by careful planning and preparation |
27. Uses a single key to encrypt and decrypt information |
28. Uses analytical techniques to identify potential quality and performance improvements in an information system |
29. Might include company hardware, software, data, networks, people, or procedures |
30. Records everything that is typed into the keyboard, including passwords, while the system continues to function normally |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started