Vous êtes sur la page 1sur 1

Name must be located at the header

Font Type : Times New Roman


Size: 12
Line Spacing: 1.5
Margins for Multiple page: 1st page – Top=2”, LR=1”, Bottom=1”
succeeding pages – Top=1.5”, LR=1”, Bottom=1”

1. What is IT governance?
2. What are the objectives of IT governance?
3. What is distributed data processing?
4. What are the advantages and disadvantages of distributed data processing?
5. What types of tasks become redundant in a distributed data processing system?
6. Explain why certain duties that are deemed in- compatible in a manual system may be combined in a
CBIS computer-based information system environment. Give an example.
7. What are the three primary CBIS functions that must be separated?
8. What exposures do data consolidation in a CBIS environment pose?
9. What problems may occur as a result of combining applications programming and maintenance tasks into
one position?
11. Why is poor-quality systems documentation a prevalent problem?
12. What is data conversion?
13. What may be contained in the data library?
14. What is an ROC?
15. What is a cold site?
16. What is fault tolerance?
17. What are the often-cited benefits of IT outsourcing?
18. Define commodity IT asset.
19. Define specific asset.
20. List five risks associated with IT outsourcing.
21. List the control features that directly contribute to the security of the computer center environment.
22. What are the five risks associated with of distributed data processing?
23. What is the role of a corporate computer services department? How does this differ from other
configurations?
24. What is RAID?
25. What is the role of a data librarian?
26. Although IT governance is a broad area, only three aspects of IT governance are discussed in the chapter.
Name them and explain why these topics were chosen.
27. How can data be centralized in a distributed data processing system?
28. How can human behavior be considered one of the biggest potential threats to operating system integrity?
29. Explain how IT outsourcing can lead to loss of strategic advantage.
30. Explain the role of a SAS 70 report in reviewing internal controls.
31. Compare and contrast the following disaster recovery options: mutual aid pact, empty shell, recovery
operations center, and internally provided backup. Rank them from most risky to least risky, as well as
from most costly to least costly.
32. Why should an organization centralize the acquisition, testing, and implementation of software and hardware
within the corporate IT function?
33. Discuss a potential problem with ROCs.
34. Discuss two potential problems associated with a cold site.
35. Explain vendor exploitation.

Vous aimerez peut-être aussi