ISDS 3100 Exam 2 Questions With All Correct Answers AGraded
0 view 0 purchase
Course
ISDS 3100
Institution
ISDS 3100
ISDS 3100 Exam 2 Questions With All Correct Answers AGraded
Which of the following is not one of the advantages of custom development? - AnswerFaster roll-out
/.Security should be on managers; priority list because of peculiar characteristics that run the risk of leaving it what? - Answerunde...
ISDS 3100 Exam 2 Questions With All
Correct Answers AGraded
Which of the following is not one of the advantages of custom development? -
AnswerFaster roll-out
/.Security should be on managers; priority list because of peculiar characteristics that
run the risk of leaving it what? - Answerunderfunded
/.Which of the following is not an element of an information system? -
AnswerSubsystem
/.Price is the same as SOC - AnswerFalse
/.Why do we need to create an Information System Vision during the strategic
Information Systems planning process? - AnswerIt helps define that role that
information systems should play in the organization.
/.You are the CIO of Amazon. Your firm was attacked by hackers and customers' credit
card data was erased from your components. Customers are unable to make
purchases. This is an example of: - AnswerA direct negative effect of the attack.
/.You are the CIO of the restaurant chain Raising Cane's. By chance you discover that
your database administrator copied the list of approved vendors and negotiated prices
to sell it to a competitor. What kind of security is this? - AnswerIntentional malicious
behavior
/.Which stage of the SDLC typically results in a "go" or "no-go" decision? -
AnswerFeasibility Analysis
/.We identified four main eras of data processing in business, what characterizes the
'bath era'? - AnswerTransactions were batched and processed by a mainframe at
periodic intervals.
/.Your book describes the systems selection process in-depth. Which of the following is
not a step in the system selection process: - AnswerVisit vendor sites
/.The two major components of the IT resources barrier are: - AnswerIT assets and IT
capabilities
/.There are three general approached to the acquisition of information processing
functionalities and the introduction of IT-based information systems. Which of the
following is not one of them? - AnswerOpen development
, /.Which of the following terms is related to the ability to overlay information on top of a
photo? - AnswerAugmented Reality
/.Capability development refers to the firm's ability to design and develop effective
computer applications. - AnswerFalse
/.A gold standard set of training examples is typically used in: - Answersupervised
machine learning
/.In which of the following phases of the SDLC should you expect to be most involved as
a general or function manager? - AnswerDefinition
/.Which of the following questions is not used to evaluate the competitive sustainability
IT-dependent strategic initiatives? - AnswerIs the proposed initiative aligned with the
firm's strategy?
/.When an IT initiative is being developed as part of a consortium, the leader shares the
risks and costs associated with the initiative with competitors that are part of the
consortium. - AnswerTrue
/.We defined the concept of value appropriation as: - AnswerThe process by which the
total value created in the transaction is split among all the entities who contributed to
creating it.
/.Which of the following is an example of internal IT security threat? - AnswerCareless
behavior by employees, such as using simple passwords
/.Your company website is down. The IT department reports that the infrastructure
collapsed as it received millions of requests from a specific address in Russia. Your
company is a victim of : - AnswerA denial-of-service attack
/.Why is the SDLC methodology typically referred to as " the waterfall model"? -
AnswerTo stress the fact phases are sequential, and iteration should be avoided as
much as possible.
/.Information goods are not: - Answereasy to produce
/.You are the CEO of a dating company (e.g., LSUlovers.com). There was a security
failure last month and customer personal data was stolen. You just received a letter
informing you fo that a class action lawsuit was filed by a group of customers. This is an
example of: - AnswerAn indirect negative effect of the security failure
/.What are the three mitigation strategies in information systems security? -
AnswerAcceptance, reduction, and transference
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller kartelodoc. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.