21. The traditional process for developing information systems is a. b. c. d. e.
ID: 3718673 • Letter: 2
Question
21. The traditional process for developing information systems is a. b. c. d. e. product life cycle the systems development life cycle the rapid prototyping exercise the software testing life cycle systems designation likelihood conference 22. Walmart's automatic replenishment system, which enables the company to reduce inventory storage requirements, is an example of which competitive strategy? a. product differentiation b. innovation c. cost leadership d. focused differentiation e operational efficiency 23. Which of these is NOT an inherent risk for a company using social media? The company's business model may ultimately fail, because it's difficult to sustain from social media Loss of privacy when personal information is made public Productívity may be reduced if employees spend too much time on it Information may go viral and/or be misinterpreted, leading to embarrassment a. b. c. d. 24. A is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. a. threat b. key escrow c. cipher d. target e. vulnerability Bridget was recently hired by a large consulting firm to advise clients on business process management and business strategies. Bridget's job title would most likely be: 25. a. Systems analyst b. CIO ?. ??? d. Database administrator e. Business analyst Which of the following is a critical security function that should be addressed by the senior management of an organization? 26. a. b. c. d. Establishing a security policy for the organization Buying whatever IT needs for security purposes Monitoring employee use of the Internet Creating a technical password policyExplanation / Answer
Question 21
The traditional model for software development is systems development life cycle.
Hence, option B)
Question 22
It is an example of operational efficiency.
Hence, option E)
Question 23
The first statement is incorrect.
Hence, option A)
Question 24
The first statement is correct.
Hence, option A)
Question 25
Option E)
Question 26
A security policy may encompass other policies.
Option A)
Related Questions
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.