ACC 576 TUTOR Great Stories /acc576tutor.com ACC 576 TUTOR Great Stories /acc576tutor.com | Page 51
that time. Which of the following situations represents the greatest
security risk?
37. In a large firm, the custody of an entity's data is most
appropriately maintained by which of the following personnel?
38. In which of the following stages of computer system
development would training occur?
39. Which of the following roles is responsible for prioritizing
systems development proposals?
40. At this stage, we purchase hardware:
41. Which of the following is responsible for overall program logic
and functionality?
42. Data conversion occurs at this stage:
43. Which of the following implementation approaches has been
described as "sink or swim?"
44. Which of the following is responsible for identifying problems
and proposing initial solutions?
45. Which of the following is responsible for designing, creating,
and testing programs?
46. In which of the following implementation approaches is the
system divided into modules for implementation?
47. In which of the following implementation approaches do the
new and old systems run concurrently until it is clear that the new
system is working properly?
48. In which of the following implementation approaches are users
divided into smaller groups and trained on the new system, one
group at a time?
49. The requirements definition document is signed at this stage: