Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. The most important thing for IS success is A) to ensure that the system definition phase is done correctly. B) to avoid waterfall SDLC

1. The most important thing for IS success is

A) to ensure that the system definition phase is done correctly.

B) to avoid waterfall SDLC situations.

C) for users to take ownership of their systems.

D) to make sure the system is feasible.

E) identify the gaps in the off-the-shelf- software.


2. Creating and ________ IS is what systems projects are all about.

A) maintaining

B) upgrading

C) analyzing

D) developing

E) designing


3. Business analysts and _________ lead the project through the development process.

A) designers

B) programmers

C) systems analysts

D) developers

E) managers


4. The governance of systems is mainly

A) information management of an organization.

B) legal compliance with the Budget Measures Act.

C) improving the benefits of an organization's IT investment in the long run.

D) social and environmental performance of an organization.

E) the key duty of the CIO.


5. Which is the best gauge of alignment?

A) Return on investment in IT

B) Investment level in IT

C) Communication among IT executives

D) Communication between IT and business executives

E) Funding of IT


6. Governance of systems should be of concern as

A) it is required by law.

B) it increases job performance.

C) it covers environmental issues.

D) it appeals to the board of directors.

E) it enhances firm reputation.

 

7. Viruses travel mostly by email since many companies have _______ protection.

A) data dictionary

B) antivirus program

C) biometric authentication device

D) firewall

E) white-hat hacker


8. ________ to (for) the computers that run the database management system and devices that contain data should be controlled.

A) References

B) Access

C) Design plans

D) Connections

E) Documentation

 

9. To safeguard from possible exposure, safety officers should record the position ________ of users.

A) riskiness

B) data access

C) controls

D) level

E) sensitivity

 

10. The ideal way to protect a website from external users is to ________ against an attack.

A) secure

B) prepare

C) defend

D) harden

E) update

Step by Step Solution

3.46 Rating (156 Votes )

There are 3 Steps involved in it

Step: 1

1 The most important thing for IS success is A to ensure that the system definition p... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Corporate Computer Security

Authors: Randy Boyle, Raymond Panko

4th edition

133545199, 978-0133545197

More Books

Students also viewed these Operating System questions