Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 15 3 pts Which of the following is an example of an employee engaging in an intentional threat to information security? A programmer codes

Question 15 3 pts

Which of the following is an example of an employee engaging in an intentional threat to information security?

A programmer codes a backdoor in the timeclock program she is developing for her company so she can later access the program to adjust her clock-in and clock-out times.

The IT department creates a data entry procedure manual that inadvertently includes a procedural error which, if followed, will result in the deletion of customer data.

An HR manager searches the Internet for information on trends in hiring practices and downloads a PDF that contains a virus which turns her work computer into a bot.

An employee misses a training class on a new work process because of illness and as a result continues to use the old work process which results in some lost sales.

Question 5 3 pts

Delta Airlines needs to optimize the scheduling of airline crews to meet flight requirements, while minimizing total costs and staying within federal guidelines on maximum crew flight hours and required hours of rest. Which of the following is the best system for this task based on its "survival of the fittest" problem-solving strategy that enables the average fitness of a population of candidate solutions to increase over time and eventually produce a set of optimal solutions to the problem.

neural network

genetic algorithm

intelligent agent

expert system

Question 6 3 pts

Which of the following joint application development (JAD) participants would be the customers in a systems development process?

Users

Facilitator

Scribe

System developers

Question 7 3 pts

There are a number of different methodologies that can be used to develop information systems and each has its own set of characteristics and procedures. ________________ emphasizes the customer of the system with its focus on teamwork and interaction between developers, users, and other stakeholders.

Computer-aided systems engineering

Prototyping

Waterfall approach

Agile software development

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Professional Microsoft SQL Server 2014 Administration

Authors: Adam Jorgensen, Bradley Ball

1st Edition

111885926X, 9781118859261

More Books

Students also viewed these Databases questions

Question

is VPN a trusted network?

Answered: 1 week ago