Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 15 3 pts Which of the following is an example of an employee engaging i

ID: 3905675 • Letter: Q

Question

Question 15 3 pts

Which of the following is an example of an employee engaging in an intentional threat to information security?

              A programmer codes a backdoor in the timeclock program she is developing for her company so she can later access the program to adjust her clock-in and clock-out times.

              The IT department creates a data entry procedure manual that inadvertently includes a procedural error which, if followed, will result in the deletion of customer data.

              An HR manager searches the Internet for information on trends in hiring practices and downloads a PDF that contains a virus which turns her work computer into a bot.

              An employee misses a training class on a new work process because of illness and as a result continues to use the old work process which results in some lost sales.

Question 5 3 pts

Delta Airlines needs to optimize the scheduling of airline crews to meet flight requirements, while minimizing total costs and staying within federal guidelines on maximum crew flight hours and required hours of rest. Which of the following is the best system for this task based on its "survival of the fittest" problem-solving strategy that enables the average fitness of a population of candidate solutions to increase over time and eventually produce a set of optimal solutions to the problem.

              neural network

              genetic algorithm

              intelligent agent

              expert system

Question 6 3 pts

Which of the following joint application development (JAD) participants would be the customers in a systems development process?

              Users

              Facilitator

              Scribe

              System developers

Question 7 3 pts

There are a number of different methodologies that can be used to develop information systems and each has its own set of characteristics and procedures. ________________ emphasizes the customer of the system with its focus on teamwork and interaction between developers, users, and other stakeholders.

              Computer-aided systems engineering

              Prototyping

              Waterfall approach

              Agile software development

Explanation / Answer

Question 15:Answer

A programmer codes a backdoor in the timeclock program she is developing for her company so she can later access the program to adjust her clock-in and clock-out times.

Question 5 : Answer

Genetic Algorithm

Question 6 : Answer

Users

Question 7 : Answer

Agile software development

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote