Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1. In automation:
A) more manual steps are required.
B) business processes are reorganized to cut waste and eliminate repetitive, paper-intensive
tasks.
C) the nature of the business is rethought.
D) employees are enabled to perform their tasks more efficiently.
E) business processes are added.
2. The four kinds of structural organizational change enabled by IT, in order from least to most
risky, are:
A) rationalization, automation, reengineering, and redesigning.
B) rationalization, automation, reengineering, and paradigm shift.
C) automation, rationalization, redesigning, and paradigm shift.
D) automation, redesigning, restructuring, and paradigm shift.
E) paradigm shift, reengineering, rationalization, and automation.
3. The idea that the achievement of quality control is an end in itself describes a main concept of:
A) BPM.
B) BPR.
C) six sigma.
D) TQM.
E) systems analysis and design.
4. ________ provide(s) a methodology and tools for dealing with the organization's ongoing need
to revise and optimize its numerous business processes.
A) Business process redesign
B) Business process management
C) CASE tools
D) TQM
E) Systems analysis and design
5. Which process develops a detailed description of the functions that a new information system
must perform?
A) Feasibility study
B) Requirements analysis
C) Systems design
D) Test plan development
E) Management plan
6. Transferring data from a legacy system to the new system would be defined by which category
of system design specifications?
A) Input
B) Database
C) Manual procedures
D) Conversion
E) Implementation
7. The primary tool for representing a system's component processes and the flow of data between
them is the:
A) data dictionary.
B) process specifications diagram.
C) structure chart.
D) data flow diagram.
E) object-oriented chart.
8. Object-oriented development could potentially reduce the time and cost of writing software
because:
A) object-oriented programming requires less training.
B) iterative prototyping is not required.
C) objects are reusable.
D) a single user interface object can be used for the entire application.
E) it's not necessary to use a formal methodology to design a system.
10. Compared to the use of proprietary components, web services promise to be less expensive and
less difficult to implement because of:
A) their ability to integrate seamlessly with legacy systems.
B) their ability to enable communication among different systems using universal standards.
C) the ubiquity of the Internet.
D) the ability to reuse web services components.
E) their use of custom programming.
Chapter 7 : Telecommunications, the Internet, and Wireless Technology
1. Which of the following involves slicing digital messages into parcels, transmitting them
along different communication paths, and reassembling them at their destinations?
A) Multiplexing
B) Packet shifting
C) Packet routing
D) ATM
E) Packet switching
10. Which of the following pulls content from websites and feeds it automatically to a user's
computers?
A) FTP
B) RSS
C) HTTP
D) Bluetooth
E) IPv6
Chapter 8 : Securing Information Systems
1. Which of the following refers to all of the methods, policies, and organizational
procedures that ensure the safety of the organization's assets, the accuracy and reliability
of its accounting records, and operational adherence to management standards?
A) Legacy systems
B) SSID standards
C) Vulnerabilities
D) Security policy
E) Controls
3. All of the following are specific security challenges that threaten corporate servers in a
client/server environment except:
A) hacking.
B) malware.
C) denial-of-service attacks.
D) sniffing.
E) vandalism.
4. ________ is malware that hijacks a user's computer and demands payment in return for
giving back access.
A) A Trojan horse
B) Ransomware
C) Spyware
D) A virus
E) Malware
7. Which of the following focuses primarily on the technical issues of keeping systems up
and running?
A) Business continuity planning
B) Security policies
C) Disaster recovery planning
D) An AUP
E) An information systems audit
9. In which method of encryption is a single encryption key sent to the receiver so both
sender and receiver share the same key?
A) SSL/TLS
B) Symmetric key encryption
C) Public key encryption
D) Private key encryption
E) Distributed encryption
10. Comprehensive security management products, with tools for firewalls, VPNs, intrusion
detection systems, and more, are called ________ systems.
A) DPI
B) MSSP
C) NSP
D) PKI
E) UTM