CiS 336 STUDy Learn Do Live /cis336study.com CiS 336 STUDy Learn Do Live /cis336study.com | Page 31
5) All of the following are risks associated with IS otsourcing
EXCEPT:
6)
This project cycle plan tends to be used for projects
that have direct relationships between time and resources.
7) This is an IT governance framework that is consistent
with COSO controls.
8) The question “What information does a person or an
organization have a right or a privilege to obtain?” is part of
this ethical issue.
9) ________________ is the process of analyzing data
warehouses for “gems”.
10) Which normative theory of business ethics would TJX
have displayed if it had informed customers as soon as the
breach was corrected and told other retailers how to prevent
futue security breaches?
11) Scorecards provide a summary of information gathered
over a period of time. Another common IT monitoring tool is
the _____________.
12) The initial reason organizations outsourced IT was
which one of the following?
13) The project triangle includes 3 sides - time, scope and
________.