A native app is one that is designed to run on a specific platform |
True |
Documentation reveals how well the system has met its original objectives |
False |
A new information system is not considered in productions until conversion is complete. |
True |
Failure to address properly the organizational changes surrounding the introduction of a new system can cause the demise of an otherwise good system |
True |
Gantt and PERT charts are two common formal planning tools for project management. |
True |
Prototyping is more iterative than the conventional life cycle |
True |
One problem with prototyping is that the systems constructed thereby may not be able to handle large quantities of data in a production environment |
True |
End-user-developed systems can be completed more rapidly than those developed through the conventional programming tools |
True |
Intangible benefits of an information systems are those that cannot be easily quantified |
True |
In one form of outsourcing, a company hires an external vendor to create the software for its system, but operates the software on its own computers |
True |
It is important that all systems development activities to be placed in sequential order |
False |
Object oriented development is more iterative and incremental than traditional structured development |
True |
Objects are grouped into hierarchies and hierarchies into classes. |
False |
Businesses can use component-based development to create their e-commerce applications. |
True |
Case tools facilitate the creation of clear documentation and the coordination of team development efforts |
True |
More timely information is a tangible benefit of information systems |
False |
An formation systems plan shows how specific information systems fit into a company’s overall business plan and business strategy |
True |
User concerns and designer concerns are usually the same at the beginning of the project. |
False |
Scope describes the full length of time required to complete a project |
False |
Successful implementation of an information system requires the participation of end users in the project |
True |
What was the primary problem facing the Girl Scouts regarding their supply chain problems? |
A) The ordering process was inefficient for a large volume of orders. |
Order the following steps in the systems development life cycle in the correct sequence. |
A) Systems analysis, systems design, programming, testing, conversion, production and maintenance |
Which of the following is not part of the implementation process? |
C) Systems analysis |
Which process develops a detailed description of the functions that a new information system must perform? |
B) Requirements analysis |
Developing an information system has been compared to the problem-solving process. Which one of the following problem-solving steps is not a part of systems analysis? |
A) Implement the solution |
The entire system-building effort is driven by: |
D) user information requirements. |
Systems design: |
B) specifies how the new system will fulfill the information requirements. |
In a data flow diagram, external entities are represented by: |
B) square boxes. |
Transferring data from a legacy system to the new system would be defined by which system design specification category? |
D) Conversion |
In object-oriented development: |
A) an object combines data and processes that act on the data into a single object. |
Which of the following is not one of the unique considerations in developing applications for a mobile platform? |
B) Keyboard configuration |
Unit testing: |
C) tests each individual program separately. |
System testing: |
B) tests the functioning of the system as a whole. |
Acceptance testing: |
D) provides the final certification that the system is ready to be used in a production setting. |
In a parallel conversion strategy, the new system: |
C) and the old are run together. |
In a direct cutover conversion strategy, the new system: |
B) replaces the old one at an appointed time. |
The Girl Scouts’ conversion strategy of first introducing the modules for ordering cookies and then introducing the modules for transmitting orders and instructions to the cookie factory and shipper, is called a(n) ________ strategy. |
A) phased approach |
Changes in hardware, software, documentation, or production to a production system to correct errors, meet new requirements, or improve processing efficiencies are termed: |
C) maintenance. |
The oldest method for building information systems is: |
D) the systems development lifecycle. |
In the traditional systems development lifecycle, end users: |
D) are limited to providing information requirements and reviewing the technical staff’s work. |
As a technical project manager you have decided to propose implementing a prototyping methodology for a small Web-based design project. What is the order of steps you will follow in this project? |
B) Identify user requirements, develop the prototype, use the prototype, revise and enhance the prototype. |
When systems are created rapidly, without a formal development methodology: |
D) testing and documentation may be inadequate. |
Of the following, which is the most important reason for creating a mobile version of a business’s Web site? |
A) Mobile devices provide access from anywhere. |
Management can control the development of end-user applications in part by: |
C) establishing standards for project requirements. |
If an organization’s requirements conflict with the software package chosen and the package cannot be customized, the organization should: |
A) change its procedures. |
"Hidden costs," such as ________ costs, can easily undercut anticipated benefits from outsourcing. |
A) vendor selection |
The process of creating workable information systems in a very short period of time is called: |
A) RAD Rapid Application Development |
This type of systems development is characterized by significantly speeding the generation of information requirements and involving users at an intense level in the systems design. |
B) JAD Joint Application Design |
The term structured, when discussing structured methodologies, refers to the fact that: |
C) the techniques are step by step, with each step building on the previous one. |
The primary tool for representing a system’s component processes and the flow of data between them is the: |
D) data flow diagram |
You are an IT project manager for an advertising firm. The firm wishes to create an online survey tool that will be used to survey focus group reactions to products in development. The most important consideration for the firm is being able to offer the tool as soon as possible as a new corporate service. However, you know that many of the senior managers that are business owners of this project have difficulty in understanding technical or software development issues, and are likely to change their requirements during the course of development. What development method would be most successful for this project? |
D) Prototyping |
To show each level of a system’s design, its relationship to other levels, and its place in the overall design structure, structured methodologies use: |
A) structure charts. |
An entire information system is broken down into its main subsystems by using: |
A) high-level data flow diagrams. |
In an object-oriented development framework for a university, how would the classes Degree, Mathematics, and Physics be related? |
B) Degree is a superclass to Mathematics and Physics. |
Object-oriented modeling is based on the concepts of: |
C) class and inheritance |
Object-oriented development could potentially reduce the time and cost of writing software because: |
C) objects are reusable |
Groups of objects are assembled into software components for common functions, which can be combined into large-scale business applications, in which type of software development? |
B) Component-based |
Which of the following is a technique used to create Web sites that will conform to the screen resolution of the user? |
B) Responsive design |
________ provides software tools to automate development methodologies and reduce the amount of repetitive work in systems development. |
A) CASE |
________ refers to the application of knowledge, skills, tools, and techniques to achieve specific targets within specified budget and time constraints. |
C) Project management |
A PERT chart: |
A) portrays a project as a network diagram consisting of numbered nodes that represent tasks. |
________ are tangible benefits of information systems. |
B) Reduced workforce, lower outside vendor costs, and increased productivity |
________ are intangible benefits of information systems. |
A) Improved asset utilization, increased organizational learning, and improved operations |
Which process is used to develop risk profiles for a firm’s information system projects and assets? |
C) Portfolio analysis |
You have been hired by a pharmaceutical company to evaluate its portfolio of systems and IT projects. Which types of projects would be best avoided? |
C) High-risk, low-benefit projects |
You would expect to find all of the following in an information systems plan except: |
C) portfolio analysis. |
The project risk will rise if the project team and the IS staff lack: |
C) the required technical expertise. |
Users prefer systems that: |
A) are oriented to facilitating organizational tasks and solving business problems. |
A ________ shows each task as a horizontal bar whose length is proportional to the time required to complete it. |
D) Gantt chart |
Which of the following tools may help identify risk areas associated with employee acceptance of a new information system? |
B) Organizational impact analysis |
A systems analysis includes a ________ that is used to determine whether the solution is achievable from a financial, technical, and organizational standpoint. |
C) feasibility study |
A test plan includes all the preparations for the series of tests to be performed on the system. |
True |
Which of the following Web development languages is used for mobile applications because it supports cross-platform mobile applications? |
D) HTML5 |
A prototype is the final working version of an information system. |
False |
A(n) ________ is a detailed list of questions submitted to external vendors to determine how well they meet the organization’s specific requirements. |
A) RFP |
PaaS are online development environments that enable developers to quickly write customer- or employee-facing Web applications. |
True |
________ describe the transformation occurring within the lowest level of the data flow diagrams. They express the logic of each process. |
A) Process specifications |
A reduced workforce is an example of a tangible benefit of an information system. |
True |
________ is a method for deciding among alternative systems based on a system of ratings for selected objectives. |
A) A scoring model |
Ergonomics is the interaction of people and machines in the work environment, including the design of jobs and legal issues. |
False |
Advances in data storage have made routine violation of individual privacy more difficult. |
False |
The last step in analyzing an ethical issue should be to identify the stakeholders – people who have a vested interest in the outcome of the decision. |
False |
Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect. |
True |
Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations. |
True |
Even in today’s legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm |
False |
Spyware is software that comes hidden in downloaded applications and can track your online movements. |
True |
Most Internet businesses do very little to protect the privacy of their customers. |
True |
The rate of global piracy is approximately 20%. |
False |
Trade secret law does not protect the actual ideas in a work product. |
False |
Copyright is the legal protection afforded intellectual property, such as a song, book, or video game. |
True |
The Copyright Office began registering software programs in the 1990s. |
False |
The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their reproduction in a product. |
True |
According to the courts, the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law. |
False |
The key concepts in patent law are originality, novelty, and value. |
False |
Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime. |
False |
Any unsolicited e-mail is legally considered spam |
False |
The European Parliament has passed a ban on unsolicited commercial messaging. |
True |
The most common type of computer-related RSI is CTS. |
True |
Technostress is a computer-related malady whose symptoms include fatigue. |
True |
Most American and European privacy law is based on a set of five principles called COPPA. |
False |
Which of the following best describes how new information systems result in legal gray areas? |
B) They result in new situations that are not covered by old laws. |
The introduction of new information technology has a: |
B) ripple effect, raising new ethical, social, and political issues. |
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of: |
A) property rights and obligations. |
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of: |
D) quality of life. |
All of the following are current key technology trends raising ethical issues except: |
C) increase in multimedia quality. |
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called: |
A) profiling. |
Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise? |
D) Information rights and obligations |
NORA is a: |
C) new data analysis technology that finds hidden connections between data in disparate sources. |
Accepting the potential costs, duties, and obligations for the decisions you make is referred to as: |
A) responsibility. |
Which of the following is not one of the practices added in 2010 by the FTC to its framework for privacy? |
D) Firms should limit the length of time that any personal data is stored to six months or less. |
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called: |
B) accountability. |
The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called: |
B) due process. |
Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue? |
A) Assign responsibility. |
A colleague of yours frequently takes, for his own personal use, small amounts of office supplies noting that the loss to the company is minimal. You counter that if everyone were to take office supplies the loss would no longer be minimal. Your rationale expresses which historical ethical principle? |
A) Kant’s Categorical Imperative |
A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is: |
B) acceptable, because the higher value is the survival of the family. |
Immanuel Kant’s Categorical Imperative states that: |
D) if an action is not right for everyone to take, it is not right for anyone to take. |
The ethical "no free lunch" rule states that: |
D) everything is owned by someone else, and that the creator wants compensation for this work. |
According to the ________, you should take the action that produces the least harm. |
B) Risk Aversion Principle |
Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information? |
A) Privacy Act of 1974 |
FIP principles are based on the notion of the: |
C) mutuality of interest between the record holder and the individual. |
The Federal Trade Commission FIP principle of Notice/Awareness states that: |
D) Web sites must disclose their information practices before collecting data. |
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? |
A) HIPAA |
European privacy protection is ________ than in the United States. |
D) much more stringent |
U.S. businesses are allowed to use personal data from EU countries if they: |
C) develop equivalent privacy protection policies. |
When a cookie is created during a Web site visit, it is stored: |
B) on the visitor’s computer. |
The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries. |
D) safe-harbor |
The Online Privacy Alliance: |
A) encourages self regulation to develop a set of privacy guidelines for its members. |
A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected. |
B) opt-out |
Types of information gathered by Web site tracking tools include all of the following except: |
B) birthplace. |
Which of the following statements does not describe a key difference between software and books? |
C) Software products are more easily compared to each other than books. |
The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when: |
C) the software is widely distributed. |
Intellectual property can best be described as: |
A) intangible property created by individuals or corporations. |
What legal mechanism protects the owners of intellectual property from having their work copied by others? |
C) Copyright law |
"Look and feel" copyright infringement lawsuits are concerned with: |
B) the distinction between an idea and its expression. |
The strength of patent protection is that it: |
D) grants a monopoly on underlying concepts and ideas. |
One of the drawbacks of patent protection is: |
D) the years of waiting to receive it. |
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? |
A) Digital Millennium Copyright Act |
In general, it is very difficult to hold software producers liable for their software products when those products are considered to be: |
B) similar to books. |
________ are not held liable for the messages they transmit. |
A) Regulated common carriers |
It is not feasible for companies to produce error-free software because: |
B) it is too expensive to create perfect software. |
The most common source of business system failure is: |
D) data quality. |
Flash cookies are different from ordinary cookies in that they: |
C) cannot be easily detected or deleted. |
The "do anything anywhere" computing environment can: |
D) blur the traditional boundaries between work and family time. |
The practice of spamming has been growing because: |
D) it is so inexpensive and can reach so many people. |
The U.S. CAN-SPAM Act of 2003: |
B) requires spammers to identify themselves. |
Which of the five moral dimensions of the information age does spamming raise? |
A) Quality of life |
Re-designing and automating business processes can be seen as a double-edged sword because: |
A) increases in efficiency may be accompanied by job losses. |
The term "________ divide" refers to large disparities in access to computers and the Internet among different social groups and different locations. |
C) digital |
CVS refers to: |
A) eyestrain related to computer display screen use. |
________ can be induced by tens of thousands of repetitions under low-impact loads. |
C) RSI |
The principles of right and wrong that can be used by individuals to make choices to guide their behavior are called morals. |
False |
Advertisers use ________ in order to display more relevant ads based on user’s search and browsing history. |
A) behavioral targeting |
Descartes’ rule of change, that if an action cannot be taken repeatedly, it is not right to take at all, is also known as: |
A) the slippery-slope rule. |
Liability refers to the existence of laws that permit individuals to recover damages done to them by other actors, systems, or organizations. |
True |
The Utilitarian Principle asks you to put yourself in the place of others, and think of yourself as the object of the decision. |
False |
Safe harbor is informal permission to reuse data, given with knowledge of all the facts needed to make a rational decision. |
False |
A Web beacon is a tiny object embedded in e-mail messages and Web pages that is designed to monitor online Internet user behavior. |
True |
The ________ model prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use. |
B) opt-in |
A(n) ________ grants the owner an exclusive monopoly on the ideas behind an invention for 20 years. |
C) patent |
The commission of acts involving the computer that may not be illegal but are considered unethical is called computer abuse. |
True |
mis test 4
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price