A general rule of thumb is that an organization should consider buying software rather than building it if the ________.
A) software can meet 75 to 80 of all business requirements
B) existing software would require extensive customization
C) organization needs to retain its business processes with only slight variations
D) software needs to fit enterprise architecture perfectly
Q. 2Which of the following best describes support activities?
A) It refers to activities directly related to the process by which products and services are created, marketed, sold, and delivered.
B) It refers to activities that help the transformation of raw materials to finished products.
C) It refers to processes including administration and management, human resources, procurement, and technology assistance.
D) It refers to activities that comprise multiple tasks and are performed by one person or department.
Q. 3________ is a mentoring strategy in which a new employee works side-by-side for a few weeks or months with one who is leaving, allowing the veteran to impart knowledge in the context of the actual work.
A) Shadowing
B) Frontal instruction
C) Delegation
D) Direct instruction
Q. 4A firm that must invest in new information systems capabilities in order to comply with federal legislation can be said to be investing to achieve which business objective?
A) customer intimacy
B) operational excellence
C) survival
D) improved reporting
E) improved decision making
Q. 5Batch processing is defined as ________.
A) the sequential execution of operations on each record in a large set
B) the arrangement of data in a table as records and fields
C) the removal of duplicates from a set of data
D) the strategy of defining and linking records
Q. 6Which of the following statements is true about administrating user accounts to safeguard against threats?
A) When an account is created, users must immediately change their passwords.
B) All users should have the rights to create accounts and modify their permissions.
C) Every employee in an organization should be granted equal account permissions.
D) Help desk information systems should avoid requesting authentication for in-house users.