• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

A decentralized organization requires ________ information systems; a centralized organization needs highly ________ information systems.


. controlled; centralized


. autonomous; controlled


. independent; controlled


. decentralized; controlled

autonomous; controlled

The purpose of an information system is to ________.


. develop new applications


. protect intellectual property of the organization


. help the organization accomplish its goals and objectives


. protect the users from security risks

help the organization accomplish its goals and objectives

Which group protects data and information assets by establishing data standards and management practices and policies?


. data administration


. operations


. technology


. development

data administration

One of the system analyst's main responsibilities is to ________.


. repair computer equipment and networks


. work with users to determine system requirements


. design and write computer programs


. write program documentation

work with users to determine system requirements

Which of the following individuals helps users to solve problems and provides training?




. system analyst


. network administrator


. user support representative


. PQA test engineer

user support representative

Which of the following tasks does a computer technician perform?


. designing and writing automated test scripts


. designing and writing computer programs


. writing program documentation


. repairing computer equipment and networks

repairing computer equipment and networks

The IS department must have a system to record user problems and monitor their resolution because it essentially functions as a ________ organization.


. volunteer


. for profit


. service


. product

service

Which of the following does the IS department manage?


. alignment of information systems with organizational strategy


. the development staff


. the executive group


. IS priorities within the IS department

the development staff

Which of the following members of the IS team works on existing applications?


. data administrators


. PQA engineers


. sustaining-application engineers


. new application developers

sustaining-application engineers

It may be necessary for IS departments to maintain ________ systems, even if they are old and out of date, because it may be too expensive to replace them.


. database


. enterprise


. knowledge management


. legacy

legacy

From a management standpoint, an advantage of outsourcing is that the company can ________.




. get remote support


. gain expertise


. have greater control over its operations


. have unattended installations

gain expertise

A company hires a human resources firm to take care of employee benefits and training. This is an example of ________.




. licensing


. outsourcing an entire system


. application outsourcing


. outsourcing an entire business function

outsourcing an entire business function

When an employer is trying to decide what kind of surveillance should be used on an employee, this is a matter of ________.




. privacy


. accuracy


. accessibility


. property

privacy

Use of corporate computers for private use is a(n) ________ issue.




. privacy


. accuracy


. accessibility


. property

property

Which of the following is a user right?




. protection of your password


. application of software patches and fixes


. attention to computer problems that is prompt and effective


. installation of only authorized programs

attention to computer problems that is prompt and effective

Because the outsourcing company and the vendor can become so tightly integrated, ________ of the agreement can be very costly and risky.




. extension


. initiation


. instillation


. termination

termination

Computer users have a right to ________.




. learn basic computer skills


. a secure computing environment


. apply software patches and fixes


. make hardware modifications



a secure computing environment

Computer users are expected to ________.




. apply software patches and fixes on their own


. install programs that they feel will help them in their jobs


. follow security and backup procedures


. report even trivial problems

follow security and backup procedures

IS infrastructure is ________.


. not malleable-making changes requires time and resources


. not adaptive at all to changing business requirements


. easily altered to accommodate all changes in the organization's strategy


. adaptable without any cost to the organization

not malleable-making changes requires time and resources

A disadvantage of outsourcing is that the company may lose control of ________ if proprietary trade secrets are revealed.




. intellectual capital


. market position


. employees


. market value

intellectual capital