COMPLETE QUESTIONS AND ANSWERS
◉ In the systems design phase, the elements that must be designed
when building an information system include all of the following
except:
A. the human-computer interface
B. questionnaires
C. databases and files
D. processing and logic. Answer: B. questionnaires
◉ _________________ maintenance involves making enhancements to
improve processing performance or interface usability or adding
desired (but not necessarily required) system features (in other
words, "bells and whistles").
A. Preventive
B. Perfective
C. Corrective
D. Adaptive. Answer: B. Perfective
◉ Which of the following is NOT one of the three types of arguments
commonly made in the business case for an information system?
A. fear
,B. fact
C. faith
D. fiction. Answer: D. fiction
◉ A __________________ is a document that an organization uses to tell
vendors what its requirements are and to invite them to provide
information about how they might be able to meet those
requirements.
A. request letter
B. vendor request
C. request for proposal
D. requirements specification. Answer: C. request for proposal
◉ A user of proprietary software has the right to ______________________
the software.
A. copy
B. run
C. modify
D. redistribute. Answer: B. run
◉ Which of the following factors is a good reason to outsource?
A. problems in IS performance
B. supplier pressures
, C. financial factors
D. all of the above. Answer: D. all of the above
◉ Most competitive external acquisition processes have at least five
general steps. Which of the following is not one of those steps?
A. vendor selection
B. proposal evaluation
C. development of a request for proposal
D. implementation. Answer: D. implementation
◉ ___________ requires companies to maintain financial controls
(usually IS-based) and holds senior management responsible for
failures.
A. Arizona Corporation commission
B. HIPAA
C. Sarbanes-Oxley Act
D. FDIC
E. None of the above. Answer: C. Sarbanes-Oxley Act
◉ ______________ are reported by organizations as the most common
(computer crime) offenders.
A. Crackers
B. Hacktivists