Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

12. A feasibility study is a preliminary study to investigate the information ne

ID: 3575634 • Letter: 1

Question

12. A feasibility study is a preliminary study to investigate the information needs of prospective users and is used to determine the proposed system's _______________.

A. resource requirements

B. costs and benefits

C. feasibility

D. All of the choices are correct.

13. All of the following are done during the systems implementation stage of application development, except:    

A. Develop logical models of the current system

B. Acquire or develop hardware and software

C. Convert to the new business system

D. Manage the effects of system changes on end users

14. Determining whether expected cost savings, increased profits, and other benefits exceed the cost of developing and operating a system is related to _______________ feasibility.

A. economic

B. functional

C. operational

D. system

15. One of the major principles of technology ethics is that even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk. This principle is:      

A. Informed consent

B. Justice

C. Minimized risk

D. Proportionality

16. All of the following are AITP standards of professional conduct related to a person's obligation to society except:

A. Protect the privacy and confidentiality of all information entrusted to me

B. To the best of my ability, ensure that the products of my work are used in a socially responsible way

C. Never misrepresent or withhold information that is germane to a problem or a situation of public concern

D. Do not use knowledge of a confidential or personal nature in any unauthorized manner to achieve personal gain

17. Hammering a Web site's equipment with too many requests for information, slowing performance or even crashing the site is called:    

A. A logic bomb

B. Denial of service

C. A back door

D. Social engineering

18. To use public domain software legally, a company:

A. Must purchase individual copies or a site license for a certain number of copies

B. Can examine a single copy of the software for 30 days and then purchase as many copies as needed

C. Can make as many copies as desired because the software is not copyrighted

D. None of the choices are correct.

19. What is the purpose of external firewalls?

A. To prevent users from accessing sensitive human resource or financial data

B. To limit access of intranet resources to specific users

C. To avoid creating security holes to back-end resources

D. To keep out unauthorized Internet users from intranet networks

20. Which of the following is a method used to defend against denial of service attacks at the victim's website?    

A. Create backup servers and network connections

B. Limit connections to each server

C. Install multiple intrusion-detection systems and multiple routers for incoming traffic to reduce choke points

D. All of the choices are correct.

21. The decentralization of information services within an organization was prompted by which of the following?

A. The development of supercomputers

B. The development of microcomputers and distributed client/server networks at the corporate, department, and workgroup level

C. The development of mainframe computers and centralized computer centers

D. The development of telecommunications

22. The decentralization of information services within an organization was prompted by which of the following?

A. The development of supercomputers

B. The development of microcomputers and distributed client/server networks at the corporate, department, and workgroup level

C. The development of mainframe computers and centralized computer centers

D. The development of telecommunications

23. A chief information officer (CIO):

A. Directs day-to-day information services activities

B. Develops and administers training programs for information services personnel and computer users

C. Is expected to closely supervise the internal operations of the information services department, but has limited responsibility for interfacing with other departments

D. Has major responsibility for long-term information system planning and strategy

24. The _______________ has problem-solving skills and a degree in information systems, excellent interpersonal skills, good technical skills, and an ability to apply problem-solving and critical-thinking skills to the design of new systems.

A. Systems analyst

B. Practice manager

C. CIO

D. Team leader

25. Which of the following is the number one reason that companies outsource?

A. Reduce and control operating costs

B. Accelerate re-engineering benefits

C. Gain access to world-class capabilities

D. Share risks

50. Many companies have policies that require managers to be involved in IT decisions that

affect their business units. This helps managers:

A. Improve the strategic customer value of information technology

B. Avoid IS performance problems in their business units and development projects

C. Monitor the problems of employee resistance and poor user interface design

D. See other opportunities for IT development

Explanation / Answer

12. A feasibility study is a preliminary study to investigate the information needs of prospective users and is used to determine the proposed system's

answer is :-resource requirements, costs and benefits and feasibility

answer is all of the above (D)

13. All of the following are done during the systems implementation stage of application development, except:

Answer is:-Develop logical models of the current system (A)

14. Determining whether expected cost savings, increased profits, and other benefits exceed the cost of developing and operating a system is related to economic feasibility.

answer is:-economic (A)

15. One of the major principles of technology ethics is that even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk. This principle is:Proportionality

answer is:-Proportionality (D)

16. All of the following are AITP standards of professional conduct related to a person's obligation to society except:

answer is :-A

-> Protect the privacy and confidentiality of all information entrusted to me.

17. Hammering a Web site's equipment with too many requests for information, slowing performance or even crashing the site is called: Denial of service

answer is:-B

18. To use public domain software legally, a company:

answer is :- C

->Can make as many copies as desired because the software is not copyrighted.

20. Which of the following is a method used to defend against denial of service attacks at the victim's website?

answer is :- D

->All of the choices are correct.

21. The decentralization of information services within an organization was prompted by which of the following?

answer is:- B

->The development of microcomputers and distributed client/server networks at the corporate, department, and workgroup level.

22. The decentralization of information services within an organization was prompted by which of the following?

answer is:- B

->The development of microcomputers and distributed client/server networks at the corporate, department, and workgroup level.

24. The Systems analyst has problem-solving skills and a degree in information systems, excellent interpersonal skills, good technical skills, and an ability to apply problem-solving and critical-thinking skills to the design of new systems.

answer is :- Systems analyst (A)

25. Which of the following is the number one reason that companies outsource?

answer is:-Reduce and control operating costs (A).

50. Many companies have policies that require managers to be involved in IT decisions that

affect their business units. This helps managers:

answer is:-Avoid IS performance problems in their business units and development projects (B).