Information Systems Chapter 11 Quiz
47 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is not a general approach to acquiring information processing functionalities?

  • System selection and acquisition
  • Custom design and development
  • End-user development
  • Open source development (correct)
  • What are the key steps during the implementation phase of the Systems Development Life Cycle (SDLC)?

  • Programming, Testing, Installation
  • Investigation, Installation, Operations
  • Installation, Operations, Maintenance (correct)
  • Design, Development, Deployment
  • Which phases of the systems development life cycle (SDLC) differ most substantially from the system selection process?

  • Build
  • Testing
  • Definition
  • A and B (correct)
  • What is one of the principal risks associated with information system outsourcing?

    <p>Hidden coordination costs (C)</p> Signup and view all the answers

    How does technology change influence an organization over time?

    <p>It impacts structure and strategy. (D)</p> Signup and view all the answers

    What is an overlooked aspect that can critically affect business success?

    <p>Information systems functionality (C)</p> Signup and view all the answers

    Which is a challenge typically faced in coordinating with an outsourced provider?

    <p>Hidden coordination costs (B)</p> Signup and view all the answers

    What is one key benefit of purchasing off-the-shelf software?

    <p>Faster roll-out and implementation process (A)</p> Signup and view all the answers

    Which phase follows the definition phase in the software selection process?

    <p>Build phase (A)</p> Signup and view all the answers

    In the parallel installation approach, how are the old and new systems managed?

    <p>They are run simultaneously for a limited time (B)</p> Signup and view all the answers

    What is the main goal of knowledge infusion by software vendors?

    <p>To incorporate best practices into application code (A)</p> Signup and view all the answers

    What is true about the pilot installation approach?

    <p>It involves a test run in a single business unit before wider rollout (A)</p> Signup and view all the answers

    What approach is described as the most radical during software installation?

    <p>Direct (D)</p> Signup and view all the answers

    Which term refers to creating a model to gather user input for interface design?

    <p>Prototyping (C)</p> Signup and view all the answers

    One significant benefit of end-user development is:

    <p>Increased speed of development (C)</p> Signup and view all the answers

    What is one benefit of end-user development for end-users?

    <p>They can be more satisfied with the results. (B)</p> Signup and view all the answers

    Which risk is associated with unreliable quality standards in end-user development?

    <p>Inexperienced end-users might not follow rigorous development stages. (C)</p> Signup and view all the answers

    What is meant by the term 'make and buy' in software development?

    <p>Configuring or customizing off-the-shelf software before implementation. (A)</p> Signup and view all the answers

    How can end-user development increase the pressure on the IS function?

    <p>End-users create more requests for development support. (C)</p> Signup and view all the answers

    What is the primary goal of technical feasibility analysis?

    <p>To ensure the system's viability from a technology standpoint. (D)</p> Signup and view all the answers

    Which analysis ensures that a proposed new system is justifiable based on a cost benefit analysis?

    <p>Economic feasibility analysis. (A)</p> Signup and view all the answers

    What is a risk associated with the high incidence of errors in end-user developed applications?

    <p>End-users may overlook documentation and testing. (A)</p> Signup and view all the answers

    What is a potential continuity risk in end-user development?

    <p>The original developer may be the only one capable of maintaining the software. (A)</p> Signup and view all the answers

    What is the primary goal of Customer Relationship Management (CRM)?

    <p>To analyze customer behavior using data (A)</p> Signup and view all the answers

    What advantage does open source software have regarding costs?

    <p>Lower switching costs compared to proprietary software (A)</p> Signup and view all the answers

    Which of the following is a disadvantage of open source applications?

    <p>Security vulnerabilities due to open access to the code (D)</p> Signup and view all the answers

    What does behavioral feasibility assess in a new system?

    <p>The likelihood of user adoption and acceptance (A)</p> Signup and view all the answers

    What characteristic commonly associated with enterprise systems could pose challenges?

    <p>Complex integration processes (B)</p> Signup and view all the answers

    Why should security be a consideration for managers?

    <p>Is likely to remain underfunded (A)</p> Signup and view all the answers

    What does the term 'Robustness' mean in the context of open source applications?

    <p>Refers to enhancements made by individual developers (D)</p> Signup and view all the answers

    What is a potential issue with the support of open source software?

    <p>Support quality can vary significantly (D)</p> Signup and view all the answers

    What distinguishes a Trojan Horse from other types of malware?

    <p>It delivers a hidden, malicious payload after installation. (A)</p> Signup and view all the answers

    Which principle of Fair Information Practices emphasizes the right of individuals to know how their data is used?

    <p>Notice (D)</p> Signup and view all the answers

    What is the primary function of worms in the context of computer security?

    <p>To replicate themselves and overwhelm network resources. (C)</p> Signup and view all the answers

    Which of the following best describes spyware?

    <p>Software that monitors behavior and may transfer personal information. (B)</p> Signup and view all the answers

    What is the goal of a Denial-of-Service Attack?

    <p>To overwhelm an online service and force it offline. (C)</p> Signup and view all the answers

    The principle of harm minimization in an Ethics Code of Conduct is primarily focused on which aspect?

    <p>Reducing potential negative impacts on stakeholders. (B)</p> Signup and view all the answers

    Which principle of Fair Information Practices relates to individuals’ ability to correct their records?

    <p>Access (C)</p> Signup and view all the answers

    What is a key characteristic of an Information Systems Ethics Code of Conduct?

    <p>It identifies ethical principles relevant to the firm. (D)</p> Signup and view all the answers

    What is the primary purpose of firewalls in an organization?

    <p>To control access to and from the company network (D)</p> Signup and view all the answers

    Which of the following is a typical use of encryption in organizations?

    <p>Securing sensitive data like financial transactions (C)</p> Signup and view all the answers

    What challenge is often faced regarding information system ethics?

    <p>Determining ownership of digital data (C)</p> Signup and view all the answers

    Which of the following correctly describes the role of IT and IS?

    <p>IT is a technological infrastructure, while IS is a sociotechnical system (A)</p> Signup and view all the answers

    Moore’s Law states that the cost of storage continues to increase by what percentage?

    <p>25% (B)</p> Signup and view all the answers

    What is an example of a first degree change associated with the introduction of new technology?

    <p>Replacing an existing technology with a new one (C)</p> Signup and view all the answers

    What level of organizational change does automating processes represent?

    <p>First order change (B)</p> Signup and view all the answers

    Which of the following is a consequence of outsourcing call center operations?

    <p>Potential job loss for local employees (A)</p> Signup and view all the answers

    Flashcards

    IS Outsourcing Risks

    Outsourcing information systems can present challenges like hidden coordination costs and a deceptive underestimation of its importance.

    System Acquisition Approaches

    Acquiring information systems can use custom design, selecting existing systems, or end-user development.

    SDLC Implementation Steps

    The implementation phase of the system development life cycle (SDLC) includes installation, operations, and maintenance.

    Manager Involvement in SDLC

    During the system development life cycle (SDLC), managers are most involved in the definition and implementation phases.

    Signup and view all the flashcards

    Difference Between SDLC & System Selection

    System selection and the system development life cycle (SDLC) differ most noticeably during the definition and build phases.

    Signup and view all the flashcards

    Steering Committee and TCO

    The relationship between the steering committee and the total cost of ownership (TCO) of an IS project is significant.

    Signup and view all the flashcards

    IS Funding Methods

    Methods for funding information systems include various approaches with varying advantages and disadvantages.

    Signup and view all the flashcards

    SDLC phases

    The general phases of a system life-cycle process include definition, build, and implementation.

    Signup and view all the flashcards

    Faster Roll-Out

    Software that dramatically reduces the time to obtain and implement software.

    Signup and view all the flashcards

    Knowledge Infusion

    Software vendors incorporating best practices into their applications.

    Signup and view all the flashcards

    Economically Attractive

    Purchasing pre-built applications to benefit from vendor's economies of scale.

    Signup and view all the flashcards

    High Quality

    Software from large companies, tested extensively, likely with many users.

    Signup and view all the flashcards

    Software Installation Approaches

    Parallel, Direct, Phased, Pilot are different ways to replace old systems with new ones.

    Signup and view all the flashcards

    Prototyping in SDLC

    Using prototypes to gather user feedback and design user interfaces during the SDLC.

    Signup and view all the flashcards

    Off-the-Shelf Application Selection

    A selection process similar to the SDLC, with an additional vendor selection phase after definition and before build.

    Signup and view all the flashcards

    Behavioral Feasibility

    Evaluates the likelihood of users accepting and using a new system. It assesses the impact on employees, work processes, and overall acceptance.

    Signup and view all the flashcards

    CRM (Customer Relationship Management)

    A strategic approach to managing customer interactions, using data to understand customer needs and behaviors. It aims to improve customer satisfaction and loyalty.

    Signup and view all the flashcards

    Open Source Applications Advantages

    Offer flexibility, cost savings, community support, and security due to open code review and contributions.

    Signup and view all the flashcards

    Open Source Applications Disadvantages

    Potential for compatibility issues, unpredictable costs, and varying levels of support due to community-driven development.

    Signup and view all the flashcards

    Risk Audit

    A systematic assessment of potential threats and vulnerabilities to identify risks and prioritize areas for improvement.

    Signup and view all the flashcards

    Security's Importance for Managers

    Managers must prioritize security due to its potential impact on the organization's operations, reputation, and finances.

    Signup and view all the flashcards

    Enterprise Systems

    Integrated software applications that support various business functions, such as finance, supply chain, and human resources.

    Signup and view all the flashcards

    Open Source Applications Defined

    Software with publicly accessible source code, allowing users to modify and distribute it freely.

    Signup and view all the flashcards

    Trojan Horse

    A program disguised as useful, but secretly contains harmful code that activates after installation.

    Signup and view all the flashcards

    Worm

    Malicious code that spreads through network vulnerabilities to infect multiple computers, causing network overload.

    Signup and view all the flashcards

    Spyware

    Software that secretly tracks computer activity, collects data, and sends it to others, often slowing down the computer.

    Signup and view all the flashcards

    Denial-of-Service Attack

    An attack that floods a network with traffic, overwhelming it and making it unusable, often as a distraction for other attacks.

    Signup and view all the flashcards

    Notice (Fair Information Practice)

    The right to be informed when personal data is collected and how it will be used.

    Signup and view all the flashcards

    Choice (Fair Information Practice)

    The ability to be informed about and consent to data usage across different organizations.

    Signup and view all the flashcards

    Access (Fair Information Practice)

    The right to access and correct personal information held by organizations.

    Signup and view all the flashcards

    Security (Fair Information Practice)

    Organizations must protect personal information from unauthorized access and keep it safe.

    Signup and view all the flashcards

    End-User Development: Benefits

    End-user development empowers users to build their desired functionalities, leading to higher satisfaction with the result as they can customize features according to their needs.

    Signup and view all the flashcards

    End-User Development: Reduced IS Burden

    End-user development can limit the number of requests received by IT departments, allowing them to focus on projects that require their expertise.

    Signup and view all the flashcards

    Make or Buy vs. Make and Buy

    Make and Buy refers to the modern approach of using readily available software and customizing it before implementation. It contrasts with the traditional 'make or buy' decision between building software in-house or purchasing a ready-made solution.

    Signup and view all the flashcards

    Risks of End-User Development: Quality

    End-user development can lead to unreliable quality standards due to the lack of structured development processes, testing, and documentation that experienced developers follow.

    Signup and view all the flashcards

    Risks of End-User Development: Errors

    End-user development is often focused on rapid implementation, which can increase the chances of errors due to the lack of rigorous testing and attention to detail.

    Signup and view all the flashcards

    Risks of End-User Development: Continuity

    Lack of standardized documentation and development practices in end-user development can make it challenging to update, repair, or use the software for anyone other than the original developer.

    Signup and view all the flashcards

    Risks of End-User Development: IS Overburden

    Even though end-user development aims to reduce IS burden, it can sometimes increase it as users may require assistance throughout the development process and for managing the software after release.

    Signup and view all the flashcards

    Feasibility Analysis: Purposes

    Feasibility analysis evaluates the viability of an IT investment. Technical feasibility assesses the technical aspects, Economic feasibility analyzes cost-benefit, and Behavioral feasibility considers the user's acceptance and adoption of the proposed system.

    Signup and view all the flashcards

    Firewall

    A security system that acts as a barrier between your computer network and the external world. It controls the flow of data in and out of your network, blocking unauthorized access.

    Signup and view all the flashcards

    Where Firewalls are used

    Firewalls are typically placed at the edge of an organization's network, where it connects to the internet, to protect against external threats. They can also be installed on individual computers.

    Signup and view all the flashcards

    Encryption

    The process of converting data into an unreadable format (ciphertext) that can only be accessed with a key. This helps protect sensitive information from unauthorized access.

    Signup and view all the flashcards

    Encryption Uses

    Encryption is used in many ways, such as:

    • Secure communication: Encrypting emails, messages, and online transactions.
    • Data storage: Protecting sensitive databases and files at rest.
    • Online banking: Ensuring secure access to accounts and transactions.
    Signup and view all the flashcards

    Information System Ethics

    The moral principles and guidelines that govern the use and development of information systems. It addresses issues like privacy, security, intellectual property, and accountability.

    Signup and view all the flashcards

    Challenges of IS Ethics

    Examples of challenges include:

    • Privacy: Protecting personal data from unauthorized access and misuse.
    • Security: Ensuring systems are protected from hacking and data breaches.
    • Intellectual property: Protecting software, patents, and copyrights.
    Signup and view all the flashcards

    First Order Change

    A minor change in how a task is performed, with minimal impact on the underlying process or system. It is often easier to manage and implement.

    Signup and view all the flashcards

    Second Order Change

    A significant change that affects the process or system itself. It requires a deeper understanding and more extensive effort to implement.

    Signup and view all the flashcards

    Study Notes

    Change Requirements

    • Technological and business changes affect organizations over time.
    • Coordination efforts between firms and outsourced providers are costly.
    • Firms often underestimate the crucial role of information systems in business success.

    Essay Questions

    • Describe the relationship between the steering committee and the total cost of ownership of an IS project.
    • Describe the drivers and risks of IS outsourcing.
    • Describe typical IS systems funding methods, including advantages and disadvantages of each method. Provide 2 examples.

    Chapter Eleven: Creating Information Systems

    Multiple Choice Questions

    • General approaches to acquiring information processing functionalities include: Custom design and development, System selection and acquisition, End-user development, Open source development.

    • Open source development is NOT one of these approaches.

    • Implementation phase steps of the Systems Development Life Cycle (SDLC) include Programming, Testing, and Installation

    Additional Questions

    • General or functional managers are most involved in the implementation phase.

    • System selection and SDLC differ substantially during the implementation phase.

    • The three generic phases of a system life-cycle process are Definition, Design, and Implementation.

    • The Systems Development Life Cycle Methodology is often referred to as the waterfall model because phases are sequential and iteration (or going back) should be avoided.

    • System selection process involves compiling an RFP, developing a vendor short list, and soliciting proposals.

    • Approaches to acquiring information processing functionalities include: Custom Design, Custom Development, System Selection and Acquisition, End-user Development, and Open Source Development.

    • The advantages of making your own systems include: Unique Tailoring, Flexibility, Control, but not Faster Roll-Out.

    • The advantages of purchasing off-the-shelf systems include: Faster Roll-Out, Knowledge Infusion, Economical Attractiveness, and High Quality but not Unique Tailoring.

    • The Systems Development Life Cycle has three major phases: Definition, Build, and Implementation..

    • IS department workers who are experts in both technology and business processes are called IS specialists.

    • The SDLC stage where a "go" or "no-go" decision is made is Feasibility Analysis.

    • Migration approaches for upgrading computer systems include Parallel, Direct, Phased, and Pilot.

    • The Build phase of the SDLC isn't used to ensure software integration.

    • SDLC and Prototyping are not the same methodologies.

    • Off-the-shelf systems enhance organizational knowledge infusion.

    • End-user development is where non-IT specialists create applications.

    • Custom software development is a systems approach that emphasizes design and development projects.

    • System analysts create the structure of a system, based on requirements documents.

    • Two advantages of custom software development include Unique Tailoring and Flexibility and Control.

    • Two advantages of purchased software are Faster Roll-Out and reduced implementation time.

    • Principle phases of the SDLC include Definition, Build, and Implementation.

    • Software installation approaches include Parallel, Direct, Phased, and Pilot approaches.

    • Prototyping is used in an SDLC to get user requirements.

    • End-user development leads to increased speed of development due to faster independent completion.

    • End-user development risks include Unreliable Quality Standards, High Incidence of Errors, Continuity Risks, and Increased Pressure on the IS function.

    • End-user development can result in positive user satisfaction and reduces IS workload by letting users design their own features.

    • "Make or Buy" is the idea that off-the-shelf software is frequently configured and adjusted before deployment.

    Chapter 12 (Irrelevant)

    Chapter 13 (Security, Privacy, and Ethics)

    • Risk Audit is the basis for Risk Analysis.

    • Security is a concern for managers because of underfunding.

    • Security is a negative deliverable because it lacks revenue.

    • Mitigation strategies include Acceptance, Avoidance, Reduction, and Transference (with increased potential for failure associated with avoidance).

    • Insurance costs are most strongly associated with risk Transference.

    • Risk mitigation is about matching the appropriate response to security threats with a desired level of security and cost.

    • Strategies for security threats include Acceptance, Avoidance, Reduction, and Transference..

    • Internal security threats include disgruntled or negligent employees.

    • External threats include intrusion, social engineering, phishing, security weaknesses, backdoors, and malicious code.

    • Examples of malicious code include viruses, Trojan horses, and worms.

    • IT risk management involves identifying, measuring, and devising optimal mitigation strategies for information system security risks..

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Chapter 11 & 13 Test Bank PDF

    Description

    This quiz covers Chapter Eleven on Creating Information Systems, focusing on the relationship between information systems, business success, and outsourcing. It includes essay and multiple-choice questions that explore key concepts like the total cost of ownership, funding methods for IS projects, and various approaches to information processing functionalities.

    More Like This

    Use Quizgecko on...
    Browser
    Browser