Question
1. The most important thing for IS success is A) to ensure that the system definition phase is done correctly. B) to avoid waterfall SDLC
1. The most important thing for IS success is
A) to ensure that the system definition phase is done correctly.
B) to avoid waterfall SDLC situations.
C) for users to take ownership of their systems.
D) to make sure the system is feasible.
E) identify the gaps in the off-the-shelf- software.
2. Creating and ________ IS is what systems projects are all about.
A) maintaining
B) upgrading
C) analyzing
D) developing
E) designing
3. Business analysts and _________ lead the project through the development process.
A) designers
B) programmers
C) systems analysts
D) developers
E) managers
4. The governance of systems is mainly
A) information management of an organization.
B) legal compliance with the Budget Measures Act.
C) improving the benefits of an organization's IT investment in the long run.
D) social and environmental performance of an organization.
E) the key duty of the CIO.
5. Which is the best gauge of alignment?
A) Return on investment in IT
B) Investment level in IT
C) Communication among IT executives
D) Communication between IT and business executives
E) Funding of IT
6. Governance of systems should be of concern as
A) it is required by law.
B) it increases job performance.
C) it covers environmental issues.
D) it appeals to the board of directors.
E) it enhances firm reputation.
7. Viruses travel mostly by email since many companies have _______ protection.
A) data dictionary
B) antivirus program
C) biometric authentication device
D) firewall
E) white-hat hacker
8. ________ to (for) the computers that run the database management system and devices that contain data should be controlled.
A) References
B) Access
C) Design plans
D) Connections
E) Documentation
9. To safeguard from possible exposure, safety officers should record the position ________ of users.
A) riskiness
B) data access
C) controls
D) level
E) sensitivity
10. The ideal way to protect a website from external users is to ________ against an attack.
A) secure
B) prepare
C) defend
D) harden
E) update
Step by Step Solution
3.46 Rating (156 Votes )
There are 3 Steps involved in it
Step: 1
1 The most important thing for IS success is A to ensure that the system definition p...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started