Question: A. When they build a new physical system to fill the gap of user behaviors. B. When they design a system based on best practices
-
A. When they build a new physical system to fill the gap of user behaviors.
B. When they design a system based on best practices in the industry
C. When they benchmark the technology of a business process to other more advanced business processes
D. When they compare how a business process works currently and how it should work
2. Complete this sentence with one of the following word pairs: Keeping an open mind is a____________ behavior of the _____________ of creativity?
| A. | Moral, Value | |
| B. | Valuable, Moral | |
| C. | Valuable, Ethic | |
| D. | Righteous, Moral |
3.Which of these is an example of ethical action?
| A. | None of these choices are examples of ethical action. | |
| B. | White hat hackers hack into computer systems to search for system vulnerabilities. | |
| C. | Individuals copy and distribute copyrighted software from the company's servers to friends. | |
| D. | Employees search organizational databases to make a personal copy of other employees' medical information. | |
| E. | All of these choices are examples of ethical action. |
4.In systems development, when would you use the Agile approach over the Waterfall approach?
| A. | When you are developing a system that is pretty common, like a payroll system | |
| B. | When you want to take delivery of the entire system at once, and not in phased modules | |
| C. | When your organization needs a simpler approach to development | |
| D. | When your system solution involves dealing with new and not well-known technologies |
5. What is creative work that is expressed in physical form and includes patents and trademarks?
| A. | Intellectual Property | |
| B. | Trade Secret | |
| C. | Confidential Content | |
| D. | Personal Information |
6. What are two basic ways by which businesses keep their data and applications safe?
| A. | Authorization and Applications | |
| B. | Signatures and biometric measures | |
| C. | Firewalls and Denial of Service Attacks | |
| D. | Authentication and Authorization |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
