Question: 27. A service desk is a highly effective replacement for traditional IT maintenance and support activities. T/F? 28. The systems support and security phase is
27. A service desk is a highly effective replacement for traditional IT maintenance and support activities. T/F?
28. The systems support and security phase is an important component of TCO (total cost of ownership) because ongoing maintenance expenses can determine the economic life of a system. T/F?
29. The procedure for minor adaptive maintenance is similar to routine corrective maintenance. T/F?
30. Although the procedures for corrective maintenance and adaptive maintenance are alike, minor corrective maintenance requires more IT department resources than minor adaptive maintenance. T/F?
31. Adaptive maintenance always is less difficult than new systems development because the enhancements need not work within the constraints of an existing system. T/F?
32. Requests for corrective and adaptive maintenance normally come from the IT department, while users usually initiate perfective maintenance.T/F?
33. Perfective maintenance can improve system reliability.T/F?
34. One technique that can be used in perfective maintenance is software reengineering.T/F?
35. When analysts learn different skills, the organization is more versatile and people can shift to meeting changing business needs. T/F?
36. Newly hired and recently promoted IT staff members often are assigned to maintenance projects because their managers believe that maintenance work offers a valuable learning experience. T/F?
37. Configuration management is sometimes referred to as change control.T/F?
38. When corrective action cannot occur immediately, users appreciate feedback from the system administrator and should be kept informed of any decisions or actions that affect their maintenance requests.T/F?
39. In many companies, the systems review committee separates maintenance requests from new systems development requests when evaluating requests and setting priorities.T/F?
40. As enterprise-wide information systems grow more complex, configuration management becomes less and less useful.T/F?
41. With a release methodology, even when changes would improve system efficiency or user productivity, the potential savings must wait until the next release date, which might increase operational costsT/F?
. 42. As the first step in capacity planning, analysts develop a current model based on the systems present workload and performance specifications.T/F?
43. In a PKE environment, each user on the network has a pair of keys: a public key and a private key. T/F?
44. Application security requires an understanding of services, hardening, application permissions, input validation techniques, software patches and updates, and software logs. T/F?
45. Retention periods can be a specific number of months or years, depending on legal requirements and company policy.T/F?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
