CIS 336 STUDY Great Stories/cis336study.com CIS 336 STUDY Great Stories/cis336study.com | Page 33
3) What is at the center of the project triangle?
4) This is a text message that is stored on a user’s computer
by a Web server that helps trace the user’s browsing habits.
5) All of the following are risks associated with IS
outsourcing EXCEPT:
6)
This project cycle plan tends to be used for projects
that have direct relationships between time and resources.
7) This is an IT governance framework that is consistent
with COSO controls.
8) The question “What information does a person or an
organization have a right or a privilege to obtain?” is part of
this ethical issue.
9) ________________ is the process of analyzing data
warehouses for “gems”.