ACC 576 TUTOR Great Stories /acc576tutor.com ACC 576 TUTOR Great Stories /acc576tutor.com | Page 51

that time. Which of the following situations represents the greatest security risk? 37. In a large firm, the custody of an entity's data is most appropriately maintained by which of the following personnel? 38. In which of the following stages of computer system development would training occur? 39. Which of the following roles is responsible for prioritizing systems development proposals? 40. At this stage, we purchase hardware: 41. Which of the following is responsible for overall program logic and functionality? 42. Data conversion occurs at this stage: 43. Which of the following implementation approaches has been described as "sink or swim?" 44. Which of the following is responsible for identifying problems and proposing initial solutions? 45. Which of the following is responsible for designing, creating, and testing programs? 46. In which of the following implementation approaches is the system divided into modules for implementation? 47. In which of the following implementation approaches do the new and old systems run concurrently until it is clear that the new system is working properly? 48. In which of the following implementation approaches are users divided into smaller groups and trained on the new system, one group at a time? 49. The requirements definition document is signed at this stage: