Shared Flashcard Set

Details

ISOM 135 Using MIS
Chapter 10-12
173
Business
Undergraduate 1
12/15/2008

Additional Business Flashcards

 


 

Cards

Term
As opposed to program development, system development is:
Definition
synonymous
Term
Information systems are never off-the-shelf because they involve:
Definition
People and Procedures
Term
the risk associatied with developing large, new information systems can e usually characterized as:
Definition
High
Term
As a system development team become larger, the average contribution per worker:
Definition
decreases
Term
the______approach is the oldest process used to develop information systems
Definition
Systems development life scycle (SDLC)
Term
Large complex information systems such as for order entry or inventory management were most likely to be development using the___approach.
Definition

systems development life cycle (SDLC)

Term
The four phases of the SDLC approach after the initial system definition phase are:
Definition
Requirements analysis, system design, implementation, and system maintenance
Term
the first stem of the system definition syage of the SDLC is to :
Definition
define the goals and scope of the new system
Term
the initial system definition document is the main input into the ____phase of the SDLC approach
Definition
requitements analysis
Term
Because it is defficult to estimate the time it will take to create and build a system, managemnt should consider the__
Definition
Schedule feasibility
Term
to determine if the proposed information system is justified economically, organizations must assess the:
Definition
cost feasibility
Term
a(n)____contract will require that the developer eat any additional expenses involved in the development of the system.
Definition
fixed cost
Term
____refers to whether existing information technology is likely to be able to meet the needs of the new system
Definition
techinical feasibility
Term
the primary purpose of the____phase of the SDLC approach is to determine and document the specific features and functions of the new system
Definition
requirements analysis
Term
____concerns whether the new information system will fit with the organization's culture, charter, or legal requirements
Definition
organization feasibility
Term
alternative system designs are evaluated against the system requirements in the____phase of the SDLC
Definition
system design
Term
Teams of systems analysts and users determine the job descriptions and functions of people who will use the new system in the____phase of the SDLC
Definition
system maintenance
Term
In a____installation, the new system runs alongside the olf one until it has been tested and is fully operational
Definition
parallel
Term
a___installation is the riskiest because the old system is turned off and the new system is turned on
Definition
plunge
Term
The approach to system conversion whereby a new system that is to be used in more than one business is first implemented in a single unit so that is may be tested and debugged byfore implementing it in the other business units is called:
Definition
pilot
Term
software vendors often bundle large bunvhes of fixes for low-priority problems into groups called:
Definition
service packs
Term
the problem with SDLC is with the___
Definition
waterfall nature
Term
The___approach is recommended if the system is complex and consists of many modules, becuase extra care must be applied in documenting requirements and the manner in which components will be integrated to ensure smooth and successful development
Definition
systems development life cycle (SDLC)
Term
the main problem of the SDLC approach to systems develpment is the____nature of the process. this refers to the fact that each phase is ment to be completed and not repeaed as the project moves on to the next phase.
Definition
waterfall
Term
if system requirements are vague or changing rapidly, it is not easy to adapt the project using the___approach
Definition
systems development life cycle (SDLC)
Term
a mock-up of an aspect of the new system is a___
Definition
prototype
Term
CASE tools have a___, which is a special database.
Definition
repository
Term
Many CASE products have a___program for commonly performed tasks
Definition
code generator
Term
___tools are used in RAD projects to improve developer productivity
Definition
visual development
Term
Typical problems faced by software developers when estimated project schedules include:
Definition

(all of the above)

Term
the CIO reports to the___
Definition
CEO
Term
___is another, more common title given to the VP of information systems
Definition
CIO
Term
the CTO often heads the___group
Definition
technology
Term
CTO stands for:
Definition
Chief Technology Officer
Term
The operations group usually reports to the:
Definition
CIO
Term
The purpose of the____group within the IS department is to manage the computing infrastructure
Definition
operations
Term
the purpose of the___group within the IS department is to manage the process of creating new information systems as will as maintaining existing ones
Definition
development
Term
Because of the movement towards outsourcing, some companies have started a separate group in the IS department for:
Definition
outsourcing relations
Term
though it may seem obviou, one of the hardest things to do when planning how your organization will use IT is to:
Definition
align IS with organizational strategy
Term
In a centralized IS infrastructure, it is likely that local managers will be___develop their own purchasing applications
Definition
not allowed to
Term
in order to install software upgrades, IS departments prefer to:
Definition
automate the process
Term
to accommodate the variations in users' needs, most IS departments will have a set of three or four different___computer configurations
Definition
standard
Term

because the IS department essentially finctions as a__organization, it must have a way of monitoring user problems and how they are resolved

Definition
service
Term
one key indicatior of the user help desk performance might be the number of___in the queue
Definition
unresolved problems
Term
the help desk function is usually part of the___group within the IS department
Definition

operations

Term
in order for IS personnel to remain up-to-date and perform well, it is crucial that they have the opportunity to get___as the industry keeps changing
Definition
trained
Term
Despite being old and out of date, it is often crucial for IS departments to maintain___systems because it is too expensive to replace them
Definition
legacy
Term
because enterprices application___requires knowledge of many different systems including legacy systems, companies usually conduct this work in-house rather than outsource it.
Definition
integration
Term
Developers who work on maintaining existing applications typically have___years of experience than those who work on new applications
Definition
fewer
Term
Data___vary in scope
Definition
policies
Term
____is not a risk associated with outsourcing
Definition
obtaining needed expertise
Term
an outsourcing alternative is:
Definition
all of the above
Term
Because the outsourcing company and the vendor can become so tightly integrated,____the agreement can be very costly and risky
Definition
ending
Term
a major concern with outsourcing is that ithe company may lose___by being forced to reveal proprietary trade secrets
Definition
intelectual capital
Term
a risk of oursourcing is that a problem may occur that is critical to the company, but which would be a(n)_____to the outsource vendor
Definition
low priority
Term
outsourcing vendors have an advantage over in-house IS personnel in that it is easier for them to:
Definition
say "no" to management demands
Term
As a user you have a right to:
Definition
all of the above
Term
which of the following is a threat to security?
Definition
all of the above
Term
which of the following is NOT a human error or mistake?
Definition
Hacking
Term
which of the following is not considered malicious human activity?
Definition
poorly written application programs
Term
a____is someone who pretends to be a ligitimate company and sends email requesting confidential data
Definition
phisher
Term
___is a techinique for intercepting computer communications
Definition
sniffing
Term
___is when someone deceives by pretendign to be someone else
Definition
spoofing
Term
soem unauthorized programs are able to____the ligitimate system and substitute their own processing
Definition
usurp
Term
a hacker can launch a denial of service attack against a Web server by___it with millions of bogus service requests
Definition

flooding

Term
security programs have___components
Definition
three
Term
management should compose a security___in order to communicate the goals and specifications of the organization's security program
Definition
policy
Term

one of the most important security tasks for management is___management

Definition
Risk
Term
___consequences of security attacks are those whose financial impacts can be measured
Definition
tangible
Term
a weakness in a security system is known as a system:
Definition

vulnerability

Term
a(n)____card has a microchip on it that is loaded with identify data
Definition
smart
Term
passwords have weaknesses because useres often choose simple passwords, which____systems can easily guess
Definition
intrusion
Term
in order to intercept communications on___networks, drive-by sneffers simply drive or walk around with computers with wireless connections
Definition
wireless
Term
which of the following is a wireless security standard?
Definition
all of the above
Term
because they kept giving out passwords to users who claimed to have forgotten them,the___were a serious security risk in the organization
Definition
help-desks
Term
because encryption slows processing, most messages are sent over the internet as:
Definition
plaintext
Term
firewalls produce____of their activities, which include lists of all dropped packets, and attempts to gain unauthorized access
Definition
logs
Term
about ninety percent of all viruses are spread via___
Definition
email
Term
organizations should protect sensitive data by storing it in___form
Definition
encrypted
Term
computing infrastructure should be located in___buildings designed to house expensive and critical equipment
Definition
fire-resistant
Term
organizations should store at least some of the back ups of the database contents___, possibly in a remote location.
Definition
off site
Term
a____is a remore processing center run by a commercial disaster-recovery service that provides all the equipment needed to continue operations after a disaster.
Definition
hot site
Term

T/f: Systems analysis and design is the process of creating information systems

Definition
True
Term

 

T/F: Systems development involves four of the five components of information systems.

Definition

FALSE

Term
T/F:

 

Information systems are never off-the-shelf, unlike software.

Definition
TRUE
Term
T/F:

 

Systems development is primarily a technical task for programmers and hardware designers.

Definition

FALSE

Term
T/F:

 

In most cases, companies will purchase off-the-shelf information systems.

Definition

FALSE

Term
T/F:

 

Maintenance of the information system means adapting it to new requirements.

Definition
TRUE
Term
T/F:

 

Maintenance of the information system means the same as operation.

Definition
FALSE
Term
T/F:

 

It is not unusual for information system projects to be 200-300 percent over budget.

Definition
TRUE
Term
T/F:

 

SDLC moves a project from systems definition through multiple phases until it reaches system maintenance.

Definition
TRUE
Term
T/F:

 

It is not unusual for information system projects to be 200-300 percent over budget.

Definition
TRUE
Term
T/F:

 

The three dimensions of feasibility are cost, schedule, and technical feasibility.

Definition
FALSE
Term
T/F:

 

A project buy-in is limited to cost estimates and is not related to the project schedule.

Definition
FALSE
Term
T/F:

 

Technical feasibility refers to the likelihood that existing technology will be able to meet the

needs of the system.

Definition
TRUE
Term
T/F:

 

Systems analysts are IT professionals who understand both business and technology.

Definition
TRUE
Term
T/F:

 

The most important systems development task for future users is to communicate proper information requirements.

Definition
TRUE
Term
T/F:

 

The basic idea of RAD is to break up the design and implementation phases of the SDLC into smaller chunks.

Definition
TRUE
Term
T/F:

 

JAD stands for Joint Application Design.

Definition
TRUE
Term
T/F:

 

CASE tools are good for creating prototypes.

Definition
TRUE
Term
T/F:

 

CASE tools have a repository for system documentation, but cannot help with actually generating program code.

Definition
FALSE
Term
T/F:

 

The basic idea of a CASE tool is to use a computer system to help develop other computer programs and systems.

Definition
TRUE
Term
T/F:

 

It is usually not a good management practice to involve users in testing new systems.

Definition
FASLE
Term
T/F:

 

It is very important that business users take responsibility for the success of new systems rather than IS personnel.

Definition
TRUE
Term
T/F:

 

Managing outsourcing relationships is one of the major functions of the information systems department.

Definition
TRUE
Term
T/F:

 

Downloading audio music files is one of the major functions of the information systems department.

Definition
FALSE
Term
T/F:

 

A common title for the principal manager of the IS department is Chief Systems Officer.

Definition
FALSE
Term
T/F:

 

In some organizations, the CIO reports to the COO, though most often directly to the CEO.

Definition
TRUE
Term
T/F:

 

The responsibilities of the CIO are the same as the CTO.

Definition
FALSE
Term
T/F:

 

It makes sense for the CIO to report to the CFO if the primary function of the IS department is to support accounting and finance activities.

Definition
TRUE
Term
T/F:

 

The development group manages the process of creating and maintaining information systems.

Definition
tRUE
Term
T/F:

 

The operations group exists in organizations that have negotiated outsourcing agreements with other IS companies.

Definition
FALSE
Term
T/F:

 

IS departments have different goals and objectives than IT departments.

Definition
TRUE
Term
T/F:

 

The most important planning issue for the IS department is to make sure that the systems are aligned with the organizational strategy.

Definition
TRUE
Term
T/F:

 

IS infrastructures are easily changed as the organization’s strategy and needs change.

Definition
FALSE
Term
T/F:

 

It is important that a company considering a merger or acquisition addresses the issues surrounding how the systems of each of the companies will be integrated.

Definition
TRUE
Term
T/F:

 

The structure of the organization should be reflected in the structure of the IS infrastructure.

Definition
TRUE
Term
T/F:

 

It is usually acceptable with the IS department if every computer user to have their own individual configuration for their hardware and software.

Definition
FALSE
Term
T/F:

 

Most IS departments have developed three or four different standard system configurations for their users.

Definition
TRUE
Term
T/F:

 

Good IS departments maintain a prioritized queue for resolving user problems.

Definition
TRUE
Term
T/F:

 

A network manager is usually responsible for the help desk function.

Definition
FALSE
Term
T/F:

 

A computer center manager is usually responsible for the network technicians.

Definition
FALSE
Term
T/F:

 

All development processes are variations of the theme of requirements, design, and

implementation.

Definition
TRUE
Term
T/F:

 

Legacy systems usually require special maintenance teams and activities to keep them running.

Definition
TRUE
Term
T/F:

 

A legacy system is one that uses the most up-to-date technology and provides a unique competitive advantage for the organization.

Definition
FALSE
Term
T/F:

 

EAI requires that developers create primary layers of software.

Definition
FALSE
Term
T/F:

 

Data administration and database administration are basically the same functions.

Definition
FALSE
Term
T/F:

 

Sustaining-application developers work on new applications.

Definition
FALSE
Term
T/F:

 

Data standards, such as the name, official definition, usage, version, and format are part of the metadata.

Definition
TRUE
Term
T/F:

 

Data standards are definitions for items stored in your computer.

Definition
FALSE
Term
T/F:

 

A data dictionary is a database of data definitions.

Definition
TRUE
Term
T/F:

 

Data policies are almost all the same at every company.

Definition
FALSE
Term
T/F:

 

One of the most common reasons to outsource is cost reduction.

Definition
TRUE
Term
T/F:

 

Acquiring licensed software is a form of outsourcing.

Definition
TRUE
Term
T/F:

 

When outsourcing, a company does not have to worry about loss of proprietary information.

Definition
FALSE
Term
T/F:

 

Your organization cannot be held responsible for mismanagement by a company that you

outsourced work to.

Definition
FALSE
Term
T/F:

 

Employers cannot monitor your Web surfing and email activity while you are at work.

Definition
FALSE
Term
T/F:

 

Outsourcing IS functions usually solves all the prior IS problems.

Definition
FALSE
Term
T/F:

 

When you outsource your IS functions, the firm that was hired frequently turns around and hires many of your former IS department employees to staff the outsourcing contract.

Definition
TRUE
Term
T/F:

 

An example of a human mistake is an employee entering the wrong data into an account.

Definition
TRUE
Term
T/F:

 

A driver loses control of his vehicle, slamming it into and through the building, destroying

the server room, destroying the computer equipment. This is an example of human error.

Definition
TRUE
Term
T/F:

 

A forest fire burns through your building, destroying everything. This is an example of

human mistakes.

Definition
FALSE
Term
T/F:

 

Unauthorized data disclosures can occur from malicious human activity.

Definition
TRUE
Term
T/F:

 

Phishing is when someone sends an email pretending to be a legitimate company and asking for confidential data, such as account numbers.

Definition
TRUE
Term
T/F:

 

Spoofing is a technique for intercepting computer communications.

Definition
FALSE
Term
T/F:

 

Drive-by spoofers take computers with wireless connections through an area and search for unprotected wireless networks.

Definition
FALSE
Term
T/F:

 

Phishers will copy almost all of a legitimate Web site in order to make their email seem real.

Definition
TRUE
Term
T/F:

 

People who intentionally gain unauthorized access to computer systems are called hackers.

Definition
TRUE
Term
T/F:

 

Denial of service always occurs because of malicious attacks on the system.

Definition
FALSE
Term
T/F:

 

When a hacker floods a Web server with millions of bogus service requests so that it cannot service legitimate requests, this is called a denial of service attack.

Definition
FALSE
Term
T/F:

 

Any action, device, procedure, technique, or other measure that reduces a system’s vulnerability to a threat is a safeguard.

Definition
TRUE
Term
T/F:

 

The IT department sets the security policy for an organization.

Definition
FALSE
Term
T/F:

 

Uncertainty is the likelihood of an adverse occurrence.

Definition
FALSE
Term
T/F:

 

Risk management can only be approximated because of uncertainty.

Definition
TRUE
Term
T/F:

 

The Privacy Act of 1974 gives individuals the right to access health data.

Definition
FALSE
Term
T/F:

 

Vulnerabilities in a security system are weaknesses.

Definition
TRUE
Term
T/F:

 

Biometric authentication has been around for some time, and because of weaknesses are not likely to see much usage in the future.

Definition
FALSE
Term
T/F:

 

Technical safeguards involve the hardware and software components of an information system.

Definition
TRUE
Term
T/F:

 

Despite warnings, users have a tendency to write their passwords on sticky notes next to the computer.

Definition
TRUE
Term
T/F:

 

Encryption is one of several technical safeguards.

Definition
TRUE
Term
T/F:

 

You should never send sensitive data over the Internet unless you see https:// in the browser’s address bar.

Definition
TRUE
Term
T/F:

 

A perimeter firewall sits inside the organizational network.

Definition
FALSE
Term
T/F:

 

A firewall is a computing device that prevents unauthorized access to a network.

Definition
TRUE
Term
T/F:

 

Viruses and worms are malware.

Definition
TRUE
Term
T/F:

 

Most anti-malware programs check email attachments for malware code.

Definition
TRUE
Term
T/F:

 

Care must be taken when terminating employees because they may take harmful and malicious actions.

Definition
TRUE
Term
T/F:

 

Following a disaster, hot sites provide office space, but customers themselves must come and provide and install the equipment needed to continue operations.

Definition
FALSE
Term
T/F:

 

Backup facilities are inexpensive, so every company should have one.

Definition
FALSE
Term
T/F:

 

Organizations need a rehearsed incident-response plan in place.

Definition
TRUE
Term
T/F:

 

Viruses and worms don’t spread very quickly so it is essential to move cautiously when one is discovered by someone in your organization.

Definition
FALSE
Term
T/F:

the database administratior will administer data standards for the entire company

Definition

FALSE

Supporting users have an ad free experience!