• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

Which of the following is an example of biometrics?




(a) DNA


(b) Fingerprints


(c) Voice prints


(d) All of the above



D

True or False: The government cannot monitor online activity of suspected hackers without a court order.

False

Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as:


(a) Honey pots


(b) Digital surveillance


(c) Computer entrapment


(d) Hacker crackdown

A

True or False: The Electronic Communications Privacy Act (ECPA) prohibits employers from intercepting and reading employees' stored email.

False

True or False: In the 1980's, the AFL-CIO advocated a government ban on all computer at-home work.

True

The practice of hiring companies or employees in other countries is known as:




(a) Offshoring


(b) Globalization


(c) Downsizing


(d) None of the above

A

True or False: Simplifications and assumptions are always made when designing a computer model.

True

True or False: Providing new technology to poor countries is a matter of having enough money to buy equipment.

False

Most of the delay in the opening of the Denver International Airport was because of problems with:




(a) The air traffic control system


(b) The environmental monitoring systems


(c) The baggage handling system


(d) The telephone and communications systems

C

True or False: Redundancy and self-checking are often present in safety-critical systems.

True

True or False: A feature of high reliability organizations is loose structure.

True

In Technology - Failures Causes Fixes, the phrase "All Dogs Bite" refers to:




A) Failures and errors in complex computer systems


B) The effect technology has on the work environment


C) Cybercrime and its effect on society


D) The philosophical difference between dogs and cats

A

True or False: In complex computer systems, the same input always produces the same output.

False

True or False: The same day hacking of United Airlines, the NYSE and WSJ.com on Jul 8 was the first multi-faceted cyber attack the FBI has seen from Russia and China.

False

True or False: The Galaxy IV communications satellite failure in May 1998 was exceptionally surprising because the U.S. satellite infrastructure is very robust and reliable.

True

What does the acronym TSA stand for in the context of systems design and development?




A) Transportation Security Assistance


B) The Same Approach


C) Total Systems Approach


D) Time Stands Alone

C

True or False: Legacy systems being morphed into completely different systems through continual enhancement and adding on of capability is a serious problem that can lead to increased probability of errors and failure.

True

Having an outside organization verify and validate the safety and reliability of a complex system is known as:




A) Independent Verification & Validation (IV&V) B) External Assessment & Validation (EAV)


C) Outsourcing


D) Alpha & Beta Testing (ABT)

A

According to Robert Charette, acknowledge authority on information technology and systems risk management, what percentage of information technology projects are abandoned before or soon after delivery?




A) 15 - 25%


B) 5 - 15%


C) 1 - 5%


D) 10 - 20%

B

What does the acronym KISS stand for in the context of systems design and development?




A) Keep Information Systems Safe


B) Keep It Simple Stupid


C) Key Industrial Safety Standards


D) Keep Important Subsystems Separate

B