Information Systems Chapter 11 Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following is not a general approach to acquiring information processing functionalities?

  • System selection and acquisition
  • Custom design and development
  • End-user development
  • Open source development (correct)

What are the key steps during the implementation phase of the Systems Development Life Cycle (SDLC)?

  • Programming, Testing, Installation
  • Investigation, Installation, Operations
  • Installation, Operations, Maintenance (correct)
  • Design, Development, Deployment

Which phases of the systems development life cycle (SDLC) differ most substantially from the system selection process?

  • Build
  • Testing
  • Definition
  • A and B (correct)

What is one of the principal risks associated with information system outsourcing?

<p>Hidden coordination costs (C)</p> Signup and view all the answers

How does technology change influence an organization over time?

<p>It impacts structure and strategy. (D)</p> Signup and view all the answers

What is an overlooked aspect that can critically affect business success?

<p>Information systems functionality (C)</p> Signup and view all the answers

Which is a challenge typically faced in coordinating with an outsourced provider?

<p>Hidden coordination costs (B)</p> Signup and view all the answers

What is one key benefit of purchasing off-the-shelf software?

<p>Faster roll-out and implementation process (A)</p> Signup and view all the answers

Which phase follows the definition phase in the software selection process?

<p>Build phase (A)</p> Signup and view all the answers

In the parallel installation approach, how are the old and new systems managed?

<p>They are run simultaneously for a limited time (B)</p> Signup and view all the answers

What is the main goal of knowledge infusion by software vendors?

<p>To incorporate best practices into application code (A)</p> Signup and view all the answers

What is true about the pilot installation approach?

<p>It involves a test run in a single business unit before wider rollout (A)</p> Signup and view all the answers

What approach is described as the most radical during software installation?

<p>Direct (D)</p> Signup and view all the answers

Which term refers to creating a model to gather user input for interface design?

<p>Prototyping (C)</p> Signup and view all the answers

One significant benefit of end-user development is:

<p>Increased speed of development (C)</p> Signup and view all the answers

What is one benefit of end-user development for end-users?

<p>They can be more satisfied with the results. (B)</p> Signup and view all the answers

Which risk is associated with unreliable quality standards in end-user development?

<p>Inexperienced end-users might not follow rigorous development stages. (C)</p> Signup and view all the answers

What is meant by the term 'make and buy' in software development?

<p>Configuring or customizing off-the-shelf software before implementation. (A)</p> Signup and view all the answers

How can end-user development increase the pressure on the IS function?

<p>End-users create more requests for development support. (C)</p> Signup and view all the answers

What is the primary goal of technical feasibility analysis?

<p>To ensure the system's viability from a technology standpoint. (D)</p> Signup and view all the answers

Which analysis ensures that a proposed new system is justifiable based on a cost benefit analysis?

<p>Economic feasibility analysis. (A)</p> Signup and view all the answers

What is a risk associated with the high incidence of errors in end-user developed applications?

<p>End-users may overlook documentation and testing. (A)</p> Signup and view all the answers

What is a potential continuity risk in end-user development?

<p>The original developer may be the only one capable of maintaining the software. (A)</p> Signup and view all the answers

What is the primary goal of Customer Relationship Management (CRM)?

<p>To analyze customer behavior using data (A)</p> Signup and view all the answers

What advantage does open source software have regarding costs?

<p>Lower switching costs compared to proprietary software (A)</p> Signup and view all the answers

Which of the following is a disadvantage of open source applications?

<p>Security vulnerabilities due to open access to the code (D)</p> Signup and view all the answers

What does behavioral feasibility assess in a new system?

<p>The likelihood of user adoption and acceptance (A)</p> Signup and view all the answers

What characteristic commonly associated with enterprise systems could pose challenges?

<p>Complex integration processes (B)</p> Signup and view all the answers

Why should security be a consideration for managers?

<p>Is likely to remain underfunded (A)</p> Signup and view all the answers

What does the term 'Robustness' mean in the context of open source applications?

<p>Refers to enhancements made by individual developers (D)</p> Signup and view all the answers

What is a potential issue with the support of open source software?

<p>Support quality can vary significantly (D)</p> Signup and view all the answers

What distinguishes a Trojan Horse from other types of malware?

<p>It delivers a hidden, malicious payload after installation. (A)</p> Signup and view all the answers

Which principle of Fair Information Practices emphasizes the right of individuals to know how their data is used?

<p>Notice (D)</p> Signup and view all the answers

What is the primary function of worms in the context of computer security?

<p>To replicate themselves and overwhelm network resources. (C)</p> Signup and view all the answers

Which of the following best describes spyware?

<p>Software that monitors behavior and may transfer personal information. (B)</p> Signup and view all the answers

What is the goal of a Denial-of-Service Attack?

<p>To overwhelm an online service and force it offline. (C)</p> Signup and view all the answers

The principle of harm minimization in an Ethics Code of Conduct is primarily focused on which aspect?

<p>Reducing potential negative impacts on stakeholders. (B)</p> Signup and view all the answers

Which principle of Fair Information Practices relates to individuals’ ability to correct their records?

<p>Access (C)</p> Signup and view all the answers

What is a key characteristic of an Information Systems Ethics Code of Conduct?

<p>It identifies ethical principles relevant to the firm. (D)</p> Signup and view all the answers

What is the primary purpose of firewalls in an organization?

<p>To control access to and from the company network (D)</p> Signup and view all the answers

Which of the following is a typical use of encryption in organizations?

<p>Securing sensitive data like financial transactions (C)</p> Signup and view all the answers

What challenge is often faced regarding information system ethics?

<p>Determining ownership of digital data (C)</p> Signup and view all the answers

Which of the following correctly describes the role of IT and IS?

<p>IT is a technological infrastructure, while IS is a sociotechnical system (A)</p> Signup and view all the answers

Moore’s Law states that the cost of storage continues to increase by what percentage?

<p>25% (B)</p> Signup and view all the answers

What is an example of a first degree change associated with the introduction of new technology?

<p>Replacing an existing technology with a new one (C)</p> Signup and view all the answers

What level of organizational change does automating processes represent?

<p>First order change (B)</p> Signup and view all the answers

Which of the following is a consequence of outsourcing call center operations?

<p>Potential job loss for local employees (A)</p> Signup and view all the answers

Flashcards

IS Outsourcing Risks

Outsourcing information systems can present challenges like hidden coordination costs and a deceptive underestimation of its importance.

System Acquisition Approaches

Acquiring information systems can use custom design, selecting existing systems, or end-user development.

SDLC Implementation Steps

The implementation phase of the system development life cycle (SDLC) includes installation, operations, and maintenance.

Manager Involvement in SDLC

During the system development life cycle (SDLC), managers are most involved in the definition and implementation phases.

Signup and view all the flashcards

Difference Between SDLC & System Selection

System selection and the system development life cycle (SDLC) differ most noticeably during the definition and build phases.

Signup and view all the flashcards

Steering Committee and TCO

The relationship between the steering committee and the total cost of ownership (TCO) of an IS project is significant.

Signup and view all the flashcards

IS Funding Methods

Methods for funding information systems include various approaches with varying advantages and disadvantages.

Signup and view all the flashcards

SDLC phases

The general phases of a system life-cycle process include definition, build, and implementation.

Signup and view all the flashcards

Faster Roll-Out

Software that dramatically reduces the time to obtain and implement software.

Signup and view all the flashcards

Knowledge Infusion

Software vendors incorporating best practices into their applications.

Signup and view all the flashcards

Economically Attractive

Purchasing pre-built applications to benefit from vendor's economies of scale.

Signup and view all the flashcards

High Quality

Software from large companies, tested extensively, likely with many users.

Signup and view all the flashcards

Software Installation Approaches

Parallel, Direct, Phased, Pilot are different ways to replace old systems with new ones.

Signup and view all the flashcards

Prototyping in SDLC

Using prototypes to gather user feedback and design user interfaces during the SDLC.

Signup and view all the flashcards

Off-the-Shelf Application Selection

A selection process similar to the SDLC, with an additional vendor selection phase after definition and before build.

Signup and view all the flashcards

Behavioral Feasibility

Evaluates the likelihood of users accepting and using a new system. It assesses the impact on employees, work processes, and overall acceptance.

Signup and view all the flashcards

CRM (Customer Relationship Management)

A strategic approach to managing customer interactions, using data to understand customer needs and behaviors. It aims to improve customer satisfaction and loyalty.

Signup and view all the flashcards

Open Source Applications Advantages

Offer flexibility, cost savings, community support, and security due to open code review and contributions.

Signup and view all the flashcards

Open Source Applications Disadvantages

Potential for compatibility issues, unpredictable costs, and varying levels of support due to community-driven development.

Signup and view all the flashcards

Risk Audit

A systematic assessment of potential threats and vulnerabilities to identify risks and prioritize areas for improvement.

Signup and view all the flashcards

Security's Importance for Managers

Managers must prioritize security due to its potential impact on the organization's operations, reputation, and finances.

Signup and view all the flashcards

Enterprise Systems

Integrated software applications that support various business functions, such as finance, supply chain, and human resources.

Signup and view all the flashcards

Open Source Applications Defined

Software with publicly accessible source code, allowing users to modify and distribute it freely.

Signup and view all the flashcards

Trojan Horse

A program disguised as useful, but secretly contains harmful code that activates after installation.

Signup and view all the flashcards

Worm

Malicious code that spreads through network vulnerabilities to infect multiple computers, causing network overload.

Signup and view all the flashcards

Spyware

Software that secretly tracks computer activity, collects data, and sends it to others, often slowing down the computer.

Signup and view all the flashcards

Denial-of-Service Attack

An attack that floods a network with traffic, overwhelming it and making it unusable, often as a distraction for other attacks.

Signup and view all the flashcards

Notice (Fair Information Practice)

The right to be informed when personal data is collected and how it will be used.

Signup and view all the flashcards

Choice (Fair Information Practice)

The ability to be informed about and consent to data usage across different organizations.

Signup and view all the flashcards

Access (Fair Information Practice)

The right to access and correct personal information held by organizations.

Signup and view all the flashcards

Security (Fair Information Practice)

Organizations must protect personal information from unauthorized access and keep it safe.

Signup and view all the flashcards

End-User Development: Benefits

End-user development empowers users to build their desired functionalities, leading to higher satisfaction with the result as they can customize features according to their needs.

Signup and view all the flashcards

End-User Development: Reduced IS Burden

End-user development can limit the number of requests received by IT departments, allowing them to focus on projects that require their expertise.

Signup and view all the flashcards

Make or Buy vs. Make and Buy

Make and Buy refers to the modern approach of using readily available software and customizing it before implementation. It contrasts with the traditional 'make or buy' decision between building software in-house or purchasing a ready-made solution.

Signup and view all the flashcards

Risks of End-User Development: Quality

End-user development can lead to unreliable quality standards due to the lack of structured development processes, testing, and documentation that experienced developers follow.

Signup and view all the flashcards

Risks of End-User Development: Errors

End-user development is often focused on rapid implementation, which can increase the chances of errors due to the lack of rigorous testing and attention to detail.

Signup and view all the flashcards

Risks of End-User Development: Continuity

Lack of standardized documentation and development practices in end-user development can make it challenging to update, repair, or use the software for anyone other than the original developer.

Signup and view all the flashcards

Risks of End-User Development: IS Overburden

Even though end-user development aims to reduce IS burden, it can sometimes increase it as users may require assistance throughout the development process and for managing the software after release.

Signup and view all the flashcards

Feasibility Analysis: Purposes

Feasibility analysis evaluates the viability of an IT investment. Technical feasibility assesses the technical aspects, Economic feasibility analyzes cost-benefit, and Behavioral feasibility considers the user's acceptance and adoption of the proposed system.

Signup and view all the flashcards

Firewall

A security system that acts as a barrier between your computer network and the external world. It controls the flow of data in and out of your network, blocking unauthorized access.

Signup and view all the flashcards

Where Firewalls are used

Firewalls are typically placed at the edge of an organization's network, where it connects to the internet, to protect against external threats. They can also be installed on individual computers.

Signup and view all the flashcards

Encryption

The process of converting data into an unreadable format (ciphertext) that can only be accessed with a key. This helps protect sensitive information from unauthorized access.

Signup and view all the flashcards

Encryption Uses

Encryption is used in many ways, such as:

  • Secure communication: Encrypting emails, messages, and online transactions.
  • Data storage: Protecting sensitive databases and files at rest.
  • Online banking: Ensuring secure access to accounts and transactions.
Signup and view all the flashcards

Information System Ethics

The moral principles and guidelines that govern the use and development of information systems. It addresses issues like privacy, security, intellectual property, and accountability.

Signup and view all the flashcards

Challenges of IS Ethics

Examples of challenges include:

  • Privacy: Protecting personal data from unauthorized access and misuse.
  • Security: Ensuring systems are protected from hacking and data breaches.
  • Intellectual property: Protecting software, patents, and copyrights.
Signup and view all the flashcards

First Order Change

A minor change in how a task is performed, with minimal impact on the underlying process or system. It is often easier to manage and implement.

Signup and view all the flashcards

Second Order Change

A significant change that affects the process or system itself. It requires a deeper understanding and more extensive effort to implement.

Signup and view all the flashcards

Study Notes

Change Requirements

  • Technological and business changes affect organizations over time.
  • Coordination efforts between firms and outsourced providers are costly.
  • Firms often underestimate the crucial role of information systems in business success.

Essay Questions

  • Describe the relationship between the steering committee and the total cost of ownership of an IS project.
  • Describe the drivers and risks of IS outsourcing.
  • Describe typical IS systems funding methods, including advantages and disadvantages of each method. Provide 2 examples.

Chapter Eleven: Creating Information Systems

Multiple Choice Questions

  • General approaches to acquiring information processing functionalities include: Custom design and development, System selection and acquisition, End-user development, Open source development.

  • Open source development is NOT one of these approaches.

  • Implementation phase steps of the Systems Development Life Cycle (SDLC) include Programming, Testing, and Installation

Additional Questions

  • General or functional managers are most involved in the implementation phase.

  • System selection and SDLC differ substantially during the implementation phase.

  • The three generic phases of a system life-cycle process are Definition, Design, and Implementation.

  • The Systems Development Life Cycle Methodology is often referred to as the waterfall model because phases are sequential and iteration (or going back) should be avoided.

  • System selection process involves compiling an RFP, developing a vendor short list, and soliciting proposals.

  • Approaches to acquiring information processing functionalities include: Custom Design, Custom Development, System Selection and Acquisition, End-user Development, and Open Source Development.

  • The advantages of making your own systems include: Unique Tailoring, Flexibility, Control, but not Faster Roll-Out.

  • The advantages of purchasing off-the-shelf systems include: Faster Roll-Out, Knowledge Infusion, Economical Attractiveness, and High Quality but not Unique Tailoring.

  • The Systems Development Life Cycle has three major phases: Definition, Build, and Implementation..

  • IS department workers who are experts in both technology and business processes are called IS specialists.

  • The SDLC stage where a "go" or "no-go" decision is made is Feasibility Analysis.

  • Migration approaches for upgrading computer systems include Parallel, Direct, Phased, and Pilot.

  • The Build phase of the SDLC isn't used to ensure software integration.

  • SDLC and Prototyping are not the same methodologies.

  • Off-the-shelf systems enhance organizational knowledge infusion.

  • End-user development is where non-IT specialists create applications.

  • Custom software development is a systems approach that emphasizes design and development projects.

  • System analysts create the structure of a system, based on requirements documents.

  • Two advantages of custom software development include Unique Tailoring and Flexibility and Control.

  • Two advantages of purchased software are Faster Roll-Out and reduced implementation time.

  • Principle phases of the SDLC include Definition, Build, and Implementation.

  • Software installation approaches include Parallel, Direct, Phased, and Pilot approaches.

  • Prototyping is used in an SDLC to get user requirements.

  • End-user development leads to increased speed of development due to faster independent completion.

  • End-user development risks include Unreliable Quality Standards, High Incidence of Errors, Continuity Risks, and Increased Pressure on the IS function.

  • End-user development can result in positive user satisfaction and reduces IS workload by letting users design their own features.

  • "Make or Buy" is the idea that off-the-shelf software is frequently configured and adjusted before deployment.

Chapter 12 (Irrelevant)

Chapter 13 (Security, Privacy, and Ethics)

  • Risk Audit is the basis for Risk Analysis.

  • Security is a concern for managers because of underfunding.

  • Security is a negative deliverable because it lacks revenue.

  • Mitigation strategies include Acceptance, Avoidance, Reduction, and Transference (with increased potential for failure associated with avoidance).

  • Insurance costs are most strongly associated with risk Transference.

  • Risk mitigation is about matching the appropriate response to security threats with a desired level of security and cost.

  • Strategies for security threats include Acceptance, Avoidance, Reduction, and Transference..

  • Internal security threats include disgruntled or negligent employees.

  • External threats include intrusion, social engineering, phishing, security weaknesses, backdoors, and malicious code.

  • Examples of malicious code include viruses, Trojan horses, and worms.

  • IT risk management involves identifying, measuring, and devising optimal mitigation strategies for information system security risks..

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Chapter 11 & 13 Test Bank PDF

More Like This

Use Quizgecko on...
Browser
Browser