Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
A decentralized organization requires ________ information systems; a centralized organization needs highly ________ information systems. . controlled; centralized . autonomous; controlled . independent; controlled . decentralized; controlled |
autonomous; controlled
|
|
The purpose of an information system is to ________. . develop new applications . protect intellectual property of the organization . help the organization accomplish its goals and objectives . protect the users from security risks |
help the organization accomplish its goals and objectives
|
|
Which group protects data and information assets by establishing data standards and management practices and policies? . data administration . operations . technology . development |
data administration
|
|
One of the system analyst's main responsibilities is to ________. . repair computer equipment and networks . work with users to determine system requirements . design and write computer programs . write program documentation |
work with users to determine system requirements
|
|
Which of the following individuals helps users to solve problems and provides training? . system analyst . network administrator . user support representative . PQA test engineer |
user support representative
|
|
Which of the following tasks does a computer technician perform? . designing and writing automated test scripts . designing and writing computer programs . writing program documentation . repairing computer equipment and networks |
repairing computer equipment and networks
|
|
The IS department must have a system to record user problems and monitor their resolution because it essentially functions as a ________ organization. . volunteer . for profit . service . product |
service
|
|
Which of the following does the IS department manage? . alignment of information systems with organizational strategy . the development staff . the executive group . IS priorities within the IS department |
the development staff
|
|
Which of the following members of the IS team works on existing applications? . data administrators . PQA engineers . sustaining-application engineers . new application developers |
sustaining-application engineers
|
|
It may be necessary for IS departments to maintain ________ systems, even if they are old and out of date, because it may be too expensive to replace them. . database . enterprise . knowledge management . legacy |
legacy
|
|
From a management standpoint, an advantage of outsourcing is that the company can ________. . get remote support . gain expertise . have greater control over its operations . have unattended installations |
gain expertise
|
|
A company hires a human resources firm to take care of employee benefits and training. This is an example of ________. . licensing . outsourcing an entire system . application outsourcing . outsourcing an entire business function |
outsourcing an entire business function
|
|
When an employer is trying to decide what kind of surveillance should be used on an employee, this is a matter of ________. . privacy . accuracy . accessibility . property |
privacy
|
|
Use of corporate computers for private use is a(n) ________ issue. . privacy . accuracy . accessibility . property |
property
|
|
Which of the following is a user right? . protection of your password . application of software patches and fixes . attention to computer problems that is prompt and effective . installation of only authorized programs |
attention to computer problems that is prompt and effective
|
|
Because the outsourcing company and the vendor can become so tightly integrated, ________ of the agreement can be very costly and risky. . extension . initiation . instillation . termination |
termination
|
|
Computer users have a right to ________. . learn basic computer skills . a secure computing environment . apply software patches and fixes . make hardware modifications |
a secure computing environment
|
|
Computer users are expected to ________. . apply software patches and fixes on their own . install programs that they feel will help them in their jobs . follow security and backup procedures . report even trivial problems |
follow security and backup procedures
|
|
IS infrastructure is ________. . not malleable-making changes requires time and resources . not adaptive at all to changing business requirements . easily altered to accommodate all changes in the organization's strategy . adaptable without any cost to the organization |
not malleable-making changes requires time and resources
|
|
A disadvantage of outsourcing is that the company may lose control of ________ if proprietary trade secrets are revealed. . intellectual capital . market position . employees . market value |
intellectual capital
|