Hardware Based Security Controls Include
Question: Most large companies rely on one person to evaluate systems requests instead of relying on a systems review committee.
true or false
Answer: false
Question: Economic activity has a negligible influence on corporate information management.
true or false
Answer: false
Question: Systems requests seldom are aimed at improving service to users within a company.
true or false
Answer: false
Question: As users rely more heavily on information systems to perform their jobs, they are likely to request even more IT services and support.
true or false
Answer: true
Question: Feasibility analysis is an ongoing task that must be performed throughout the systems development process.
true or false
Answer: true
Question: A SWOT (Strength, Weakness, Opportunities, and Threats) analysis contributes to the strategic planning process by examining a firm’s _____ resources.
financial
b.
technical
c.
human
d.
logistical
Answer: a.
financial
b.
technical
c.
human
Question: When assessing _____, a systems analyst must consider the interaction between time and costs.
resource feasibility
b.
market feasibility
c.
technical feasibility
d.
schedule feasibility
Answer: d.
schedule feasibility
Question: Hardware-based security controls include _____.
biometric devices
b.
online forms
c.
system patterns
d.
password fields
Answer: a.
biometric devices
Question: The _____, named after a nineteenth-century economist, is a widely used tool for visualizing issues that need attention and is drawn as a vertical bar graph.
Gantt chart
b.
XY chart
c.
Pareto chart
d.
Scatter chart
Answer: c.
Pareto chart
Question: _____ technology uses radio frequency identification (RFID) tags to identify and monitor the movement of each individual product, from a factory floor to the retail checkout counter.
EPC (Electronic product code)
b.
RTPD (Real-time product delivery)
c.
EPOD (Electronic proof of delivery)
d.
MCC (Magnetic character code)
Answer: a.
EPC (Electronic product code)