IS exam 2 Flashcards

1
Q

The definition of efficient is?

A

Performing or functioning in the best possible manner with the least waste of time and effort.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The purpose of a KPI is?

A

To assess the performance of a process or resource against predefined measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

As-is and To-Be diagrams can be useful in the documentation and understanding of how a business process functions.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The definition of effective is?

A

Adequate to accomplish a purpose; producing the intended or expected result.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process concerned with seeking to resolve issues that have long-range impact on the organizations is?

A

Strategic processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Six Sigma has the goal of making sure process outputs will have mistakes less than

A

.0004% of the time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The process concerned with seeking to resolve issues that have long range impact on the organizations is?

A

Strategic processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A subset of activities is better known as…

A

role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When discussing system security, a threat is?

A

A person or org that seeks to obtain or alter data or other assets illegally, without the owner’s permission and often without the owner’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When discussing system security, a vulnerability is?

A

A weakness in the IS that provides an opportunity for a threat to exploit and gain acces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A firewall is?

A

a computing device that prevents unauthorized access to parts of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When discussing system security, risk is?

A

The chance of loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the 5 components of an information system is the hardest to secure from threats?

A

people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

5 components of an information system

A

Procedures
Software
Data
Hardware
People

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When discussing system security, risk is?

A

the chance of loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

All of the following are personal security safeguards except?

A

Install firewalls at the border of devices and networks.

17
Q

Encryption is

A

the process of transforming clear text into coded, unintelligible text for secure storage or communication.

18
Q

What is a DBMS?

A

Database Management System
software used to create, process, and administer databases. Ex. Microsoft Access

19
Q
A