Question: 27. A service desk is a highly effective replacement for traditional IT maintenance and support activities. T/F? 28. The systems support and security phase is

27. A service desk is a highly effective replacement for traditional IT maintenance and support activities. T/F?

28. The systems support and security phase is an important component of TCO (total cost of ownership) because ongoing maintenance expenses can determine the economic life of a system. T/F?

29. The procedure for minor adaptive maintenance is similar to routine corrective maintenance. T/F?

30. Although the procedures for corrective maintenance and adaptive maintenance are alike, minor corrective maintenance requires more IT department resources than minor adaptive maintenance. T/F?

31. Adaptive maintenance always is less difficult than new systems development because the enhancements need not work within the constraints of an existing system. T/F?

32. Requests for corrective and adaptive maintenance normally come from the IT department, while users usually initiate perfective maintenance.T/F?

33. Perfective maintenance can improve system reliability.T/F?

34. One technique that can be used in perfective maintenance is software reengineering.T/F?

35. When analysts learn different skills, the organization is more versatile and people can shift to meeting changing business needs. T/F?

36. Newly hired and recently promoted IT staff members often are assigned to maintenance projects because their managers believe that maintenance work offers a valuable learning experience. T/F?

37. Configuration management is sometimes referred to as change control.T/F?

38. When corrective action cannot occur immediately, users appreciate feedback from the system administrator and should be kept informed of any decisions or actions that affect their maintenance requests.T/F?

39. In many companies, the systems review committee separates maintenance requests from new systems development requests when evaluating requests and setting priorities.T/F?

40. As enterprise-wide information systems grow more complex, configuration management becomes less and less useful.T/F?

41. With a release methodology, even when changes would improve system efficiency or user productivity, the potential savings must wait until the next release date, which might increase operational costsT/F?

. 42. As the first step in capacity planning, analysts develop a current model based on the systems present workload and performance specifications.T/F?

43. In a PKE environment, each user on the network has a pair of keys: a public key and a private key. T/F?

44. Application security requires an understanding of services, hardening, application permissions, input validation techniques, software patches and updates, and software logs. T/F?

45. Retention periods can be a specific number of months or years, depending on legal requirements and company policy.T/F?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!