Premium Essay

Cmgt 430

In:

Submitted By toyomirage07
Words 885
Pages 4
1. The part of the computer that stores data and program instructions that need to be instantly accessible to the CPU is the: a. Microprocessor b. RAM c. Hard Disk d. Peripheral

2. How many values can be represented by a single byte? a. 2 b. 8 c. 16 d. 64 e. 256

3. Which of the following statements is TRUE: a. Software is written to be compatible with different processor instruction sets b. The PowerPC CPU was designed to decipher computing instructions written for the Intel CPU c. Programs written in Linux will run on Windows as long as the CPU instruction set is the same d. None of the above are true.

4. What does the speed of a computer depend on? a. Clock speed b. Architecture c. Word size d. Number of processors e. All of the above

5. Which of the following is NOT an advantage of web applications over traditional PC applications? a. Web applications can be run on computers running different operating systems b. Web applications are more secure than traditional PC applications because they use Enterprise security features not available to most users c. Web applications allow users to start and save a job and restart the job from a different location and computer d. Web applications allow users to collaborate across diverse locations by storing and working on data from a central server e. All are advantages of web applications

6. What is the most common language used to extract information from a database? a. C++ b. SQL c. Java d. PERL e. Visual

Similar Documents

Premium Essay

Cmgt/430 Quiz

...1. The part of the computer that stores data and program instructions that need to be instantly accessible to the CPU is the: a. Microprocessor b. RAM c. Hard Disk d. Peripheral 2. How many values can be represented by a single byte? a. 2 b. 8 c. 16 d. 64 e. 256 3. Which of the following statements is TRUE: a. Software is written to be compatible with different processor instruction sets b. The PowerPC CPU was designed to decipher computing instructions written for the Intel CPU c. Programs written in Linux will run on Windows as long as the CPU instruction set is the same d. None of the above are true. 4. What does the speed of a computer depend on? a. Clock speed b. Architecture c. Word size d. Number of processors e. All of the above 5. Which of the following is NOT an advantage of web applications over traditional PC applications? a. Web applications can be run on computers running different operating systems b. Web applications are more secure than traditional PC applications because they use Enterprise security features not available to most users c. Web applications allow users to start and save a job and restart the job from a different location and computer d. Web applications allow users to collaborate across diverse locations by storing and working...

Words: 885 - Pages: 4

Free Essay

Cmgt 430 Version 4 Assignments

...CMGT 430 VERSION 4 ASSIGNMENTS To purchase this visit following link: http://www.activitymode.com/product/cmgt-430-version-4-assignments/ Contact us at: SUPPORT@ACTIVITYMODE.COM CMGT 430 VERSION 4 ASSIGNMENTS CMGT 430 Ver 4 Week 3 – The Importance of Controlling User Access (RBAC) CMGT 430 Ver.4 Week 4 – Organizational Website-based Data Management CMGT430 version 4 Individual Assignments CMGT 430 VERSION 4 ASSIGNMENTS To purchase this visit following link: http://www.activitymode.com/product/cmgt-430-version-4-assignments/ Contact us at: SUPPORT@ACTIVITYMODE.COM CMGT 430 VERSION 4 ASSIGNMENTS CMGT 430 Ver 4 Week 3 – The Importance of Controlling User Access (RBAC) CMGT 430 Ver.4 Week 4 – Organizational Website-based Data Management CMGT430 version 4 Individual Assignments CMGT 430 VERSION 4 ASSIGNMENTS To purchase this visit following link: http://www.activitymode.com/product/cmgt-430-version-4-assignments/ Contact us at: SUPPORT@ACTIVITYMODE.COM CMGT 430 VERSION 4 ASSIGNMENTS CMGT 430 Ver 4 Week 3 – The Importance of Controlling User Access (RBAC) CMGT 430 Ver.4 Week 4 – Organizational Website-based Data Management CMGT430 version 4 Individual Assignments CMGT 430 VERSION 4 ASSIGNMENTS To purchase this visit following link: http://www.activitymode.com/product/cmgt-430-version-4-assignments/ Contact us at: SUPPORT@ACTIVITYMODE.COM CMGT 430 VERSION 4 ASSIGNMENTS CMGT 430 Ver 4 Week 3 – The Importance of Controlling User Access (RBAC) ...

Words: 549 - Pages: 3

Premium Essay

Cmgt 430 V4 Week2

...Applying Risk Management Table of Contents 1 Introduction 2 2 Aspect 1: Risk Analysis 2 3 Aspect 2: Risk Monitoring and Control Stage 3 4 Conclusion 5 5 Reference 6 1 Introduction In our attempt to cover all areas of the Risk Management process within such a small time frame, some areas of this Project Management principal were briefly covered or overlooked. In my opinion the following two key aspects could have been better managed by our group towards the contribution of the final presentation: • Risk Analysis Stage within the Risk Management Cycle (Refer to Figure 1 and 2) and, • Risk Monitoring and Control Stage (Refer to Figure 1 and 2). 2 Aspect 1: Risk Analysis In our final video submission we specifically focused on one of the two methods used to undertake Risk Analysis, which was qualitative. The qualitative approach is the most used method due to its usually rapid and cost effective means of establishing priorities for Risk Response Planning (PMBOK,2004), thus the reason for our focus. But there are two problems with this approach first their meaning can be widely interpreted and secondly you cannot do much with them except to have biased rules about combining them and taking this as an indicator of the overall significance of the risk.(Department of Commerce, 2004) The Quantitative method is the other technique used in Risk Analysis which was only briefly mentioned in the final presentation due to reasons discussed...

Words: 1364 - Pages: 6

Premium Essay

Enterprise Security Plan Cmgt/430

...Enterprise Security Plan CMGT/430 Enterprise Security Plan This Enterprise Security Plan (ESP) for Riordan Manufacturing employees the levels of security required to protect the network and resources utilized to communicate. It is intended purpose is to formulate a means to counterattack against security risk from potential threat. The ESP servers as a way to identify risks and to ensure a contingency plan is in place to protect the availability, integrity, and confidentiality of the Riordan organization's information technology (IT) system. The ESP benefits all employees however it is most beneficial to information resource managers, computer security officials, and administrators as it is a good tool to use for establishing computer security policies. The ESP in its basic form is a systematic approach to addressing the company’s network, its capability, the threats it is susceptible to and a mitigation strategy that addresses those threats if and should they occur. In addition to addressing the threats the ESP will also make provisions for establishing contingency plans in case of a disaster. The information covered by this plan includes all information systems, IT resources, and networks throughout the Riordan global organization owned or operated by employees in the performance of their job duties, whether written, oral, or electronic. Further it establishes an effective set of security policies and controls required to identify and mitigate vulnerabilities that...

Words: 2085 - Pages: 9

Premium Essay

Cmgt 430 Week 4 Learning Team Presentation

...CMGT 430 Week 4 Learning Team Presentation To Buy This material Click below link http://www.uoptutors.com/CMGT-430/CMGT-430-Week-4-Learning-Team-Presentation An enterprise security plan is more than just a list of vulnerabilities and risks. It must present them in a meaningful way along with suggestions for specific steps to mitigate each of the most important vulnerabilities or risk pairs it finds. Your task this week is to produce the basics of that full presentation. Part 1 Compile a full draft of the final Enterprise Security Plan document. This will not be complete, but will have at least a short paragraph about each major section of the paper, including the suggested controls. Use the introduction and conclusion as an executive summary of the entire paper’s content. Research at least eight sources that validate the choices made in the paper. This must go beyond basic definitions. The sources can be changed in the final week, if needed. Format your paper consistent with APA guidelines. Part 2 Create a Microsoft® PowerPoint® presentation on the findings in the Enterprise Security Plan to present to senior management at your chosen organization. Keep the slides uncluttered and concise. Include well-formatted speaker notes for the presentation. Finalize your presentation for the Enterprise Security Plan. The presentation should target senior leadership at the organization and should effectively cover the material in the paper. ·         No specific...

Words: 330 - Pages: 2

Premium Essay

University of Phoenix - Cmgt 430 - Week 2 Individual

...Week 2 Individual Assignment University of Phoenix – CMGT 430 In order to better serve Riordan Manufacturing’s information security infrastructure, a solid plan must be put in place to ensure that the approach to its implementation is logical, easy to follow, and effective. Many aspects must be considered when formulating an information security policy, including the needs of the company vs. best practice, thus striking a delicate balance between both variables. Therefore Smith Systems Consulting is dedicated to ensuring that a quality service is delivered that will meet these objectives. However, before a more comprehensive plan can be put into place, it is important that Smith Systems Consulting understands exactly how the security plan will be managed, and how to enforce it on the most basic level. It is therefore the opinion of our company to begin by defining a simple, yet utterly crucial part of Riordan’s base information security policy: separation of duties via the practice and implementation of role assignments. Separation of duties, in information technology, is the practice of dividing both IT staff and end users into managed groups, or roles. While users and IT staff, from an administrative level, may fall into several groups (ex., Accounting Department, Maintenance, Security, etc), these groups are not enough to enforce proper security policy. A more comprehensive approach is to define what the base access is for all of these groups, thus the use of roles....

Words: 1690 - Pages: 7

Premium Essay

Using Roles

...Using Roles March 21, 2013 CMGT/430 Using Roles The control of user access to a network is becoming one of the most important factors in maintaining a secure network and ensuring that the integrity of a company’s important data remains intact. Enterprise owners and upper-level management are relentlessly recognizing risks and taking the correct mitigation steps needed to maintain a secure business environment. Businesses have sensitive information that can be accessed by the owners and management, but all of the data does not need to be accessed by every employee, client, or associate of the company (Stallings & Brown, 2012). Businesses are implementing access control systems to ensure that every user that has access to the network only has access to the information, applications, documents, or areas of the network that he or she needs to perform the respective responsibilities that the job duty requires. Therefore, these access control systems also restrict access to the resources that are not relevant to the employee, client, or associate’s duties or needs (Stallings & Brown, 2012). The separation of duties within a business is one of the important factors of access control and can sometimes be the most difficult to achieve. The separation of duties means that no individual in the company can have control over more than one operation or transaction at a time, so that it will be more difficult for a biased occasion to occur between two or more people. This type...

Words: 873 - Pages: 4

Premium Essay

Separation of Duties

...Importance of Separation of Duties Student CMGT/430 Date Professor The Importance of Separation of Duties Introduction Riordan Manufacturing is one of the industry leaders in the field of plastic molding injection. The company headquarters office is in San Jose, California and has three other plants, including one international location. The list of locations includes Albany, Georgia, Pontiac, Michigan and Hangzhou, China. The San Jose, California, location serves as the company’s headquarters and the home of their research and development. The Albany, Georgia, plant produces beverage containers. The Pontiac, Michigan, location produces custom plastic parts. The international location in Hangzhou, China, produces custom plastic fan parts. Riordan employs 550 people and have projected annual earnings of $46 million. The purpose of this proposal, submitted by Smith Consulting, is to advise Riordan Manufacturing on the best practice to secure the company network after evaluating the company network and what steps are necessary to set forth enterprise security policies via segregating duties of employees by role assignments. Minimizing Risk The goal of any company should be to successfully minimize their risk and optimize their profitability. To accomplishing this progress is to examine their current network for shortfalls that allow security breaches, theft by client or employee and to minimized possible mistakes...

Words: 782 - Pages: 4

Premium Essay

Workers Safety and Health

...OSHA Workers Safety and Health CMGT 425 July 28, 2014 John Burwick OSHA Workers Safety and Health Business strategies for implementation - The features should include components that help young workers become aware about their rights in the workplace and their employer’s responsibility to ensure their health and safety on the job. In addition provide access to important data and resources; Apply to users with different skill sets and language preferences. Target the 16 to 24 age group, but may also cover a larger demographic as worker’s ages range from 13 to 65+. Both technology- and human-based safeguards used for information systems - eTools are electronic Compliance Assistance Tools that provide guidance information for developing a comprehensive safety and health program. Although Safety and Health Programs are required by some states, there is no general OSHA requirement for such a program. Therefore, this eTool includes elements that go beyond specific OSHA mandates, such as recommendations for good industry practice. Studies have shown that a direct correlation exists between a company’s performance in safety and its subsequent performance in productivity and financial results. Injury and Illness Prevention Programs will help American businesses remain competitive in a global market. Information comparing security requirements of out-sourcing and in-sourcing - Companies primarily outsource to avoid certain costs - such as peripheral or "non-core" business...

Words: 835 - Pages: 4

Premium Essay

Rights to Contemptment

...Risk Management Principles CMGT/430 INTRODUCTION Riordan Manufacturing is a company that is commited to handling their business in an ethical and logical manner. In order to provide the proper risk management plan for the company there needs to be a conference with all of management and stakeholders to get an oversight on the company and what it needs for mitigation control and risk management. The company needs to reconsider getting input from internal auditors, external auditors and outsources. Management will also need to get all of the department heads and key people together to discuss all of the initial assessments of the risk management capabilities and how effective it can be on the network/system. This assessment will be able to decide rather to have or continue with a more in tune risk management plan. There is also the need to discuss how to make the plan stronger for the company and how the analysts should focus on the risk management mitigation for Riordan manufacturing. Risk Management Principles Riordan Manufacturing is a corporation that is consistent of many different businesses. This new plan that needs to be implemented will help each business to deal with and handle their everyday risks and teach them how to make the proper decisions on what can or could be done. In order for this new plan to be implemented, eack business will have to be able to weigh out the risks with the strategies and be able to know and choose the proper decision when responding...

Words: 1084 - Pages: 5

Premium Essay

Risk Management

...Applying Risk Management Consulting Ricardo Jackson CMGT/430 April 28, 2015 Dr. Leandro Worrell Applying Risk Management Consulting According to (Whitman & Mattord, 2010) Risk Management is the process of discovering and assessing the risks to an organization’s operations and determining how those risks can be controlled or mitigated. Risk management tackles part of a law-abiding control program that organizations implement to monitor the business and make informed decisions. Most corporate leadership takes on this task while bridging together other departments within the organization requirements. While governance programs differ broadly, all programs require a well-thought-out security risk management component to arrange and mitigate security risks. The management of information systems relies heavily on risk management therefore certain fundamentals must be applied within an organization risk management plan. These principles include identification, assessment, and decision support/implementation control. Identification The risk identification process begins with the identification of information assets, including people, procedures, data, software, hardware, and networking elements. Risk Assessment Identify and prioritize risks to the business Assess Control. Assessing the relative risk for each vulnerability is accomplished via a process called risk assessment. Risk assessment assigns a risk rating or score to each specific vulnerability. This enables...

Words: 969 - Pages: 4

Premium Essay

Riordan Enterprise Security Policies

...Riordan Enterprise Security Policies Tim L. Robinson CMGT/430 September 12th, 2011 Instructor: Dave Fedorchak Riordan Enterprise Security Policies Because Riordan’s facilities include three locations in the United States and one in China Smith Systems Consulting views Riordan Manufacturing as an enterprise business. However, an unfortunate reality exists because Riordan’s existing security policies are either nonexistent or inadequate at best for an organization of this size. Consequently, Riordan should seriously consider implementing better security throughout the entire enterprise by defining and creating a Separation of Duties (SoD). In fact, many organizations including the Department of Defense use SoD to decrease security vulnerabilities and discourage collusion by employees for a number of reasons (Gligor, 1998). Therefore, Smith Systems Consulting provides the recommendations and reasoning herein to encourage Riordan to adopt the concepts of Role-Based Access Control (RBAC) to create a SoD throughout the enterprise to reduce risk exposure and enhance Riordan’s enterprise security. Role-Based Access Control Since 2010, research by the National Institute of Standards (NIST) provides indisputable evidence that RBAC has become an increasingly common choice of enterprises with 500 or more employees (National Institute...

Words: 1129 - Pages: 5

Premium Essay

Cmgt

...Boardman Management Group Securing External Elements Name CMGT/430 Date Instructor Name Boardman Management Group Securing External Elements The topic of managing networks and data security is a huge concern of organizations around the world. As a risk management consultation for the Boardman Management Group/Baderman Island Resort, it is necessary to help the organizations owner, and IT department understand the importance of the provisioning of data and access on their company website. The Boardman Group has updated their web interface. With the help of the consultants the group is currently preparing to assess the risks, vulnerabilities, and threats related to the upgrade as well as secure the enterprise from external threats. Because the upgrade to the web interface senior management, and the others are updating the policies and procedures to align with the mission of the organizations commitment to maintain confidentiality, integrity, and availability within the organizational structure. Modifications to the policies are often necessary whenever technology changes for the organization. As technology changes or advances organizations must realize that most often the policies, practices, and guidelines will change as well (Whitman, n.d.). The Baderman Island Resort is a growing establishment, which offers its customers a wealth of services. Many of the resorts services are offered through the company website. Customers...

Words: 1203 - Pages: 5

Free Essay

The Challenges of Trust Management

...The Challenges of Trust Management Your Name CMGT/430 July 10, 2011 Distributed Trust Management What is distributed trust management? Why do business-to-business (B2B) companies like EBay and PayPal have such profitable success with online transactions? Do people trust business-to-consumer (B2C) methods? Have intra-enterprise applications matured to the level of satisfaction that company executives come to expect? These questions are at the forefront of consumers and business minds alike. This paper will focus on the ideas and cornerstones that inter-organizational companies rely upon; namely, trust. All of these questions boil down to trust and the business models we, as a community, have come to expect. The definition of trust, as it relates to the enterprise, is explained this way: A type of expectation that alleviates the fear that one’s exchange partner will act opportunistically (Aoyama & Ratick, 2007). Ratnasingam & Phan define trust as “A psychological trait found in trading partners who are willing to pursue relationships or interdependencies to achieve a planned goal” (Ratnasingam & Phan, 2003). Trust within the business realm becomes something that is taken for granted if there are no checks and balances between both organizations. One has to be careful not to abuse the trust given to a specific company like Cisco Systems or Amazon. Maintaining a competitive and working relationship is paramount to the...

Words: 1312 - Pages: 6

Free Essay

Separation of Duties at Riordan Manufacturing

...Separation of Duties at Riordan Manufacturing James Shoemaker CMGT 430 August 20, 2012 Bradley Andrews   Separation of Duties at Riordan Manufacturing Identifying and managing risk is a key to the survival of every organization that has more than one or two people involved in the day-to-day activities. Anytime that an organization allows an opportunity for a single user to perform more than one task or function that requires checks and balances the opportunity for loss to the organization exists. The proper management of risk by the organization will at the very least minimize financial losses to the company and in most cases increase profits. A review of the current processed in place at Riordan Manufacturing’s different locations has led to the recommendation that Riordan Manufacturing needs to establish new policies that provide for Separation of duties within the different departments of the organization. By definition, separation of duties is a key concept of internal controls and is the most difficult and sometimes the most costly one to achieve. This objective is achieved by disseminating the tasks and associated privileges for a specific security process among multiple people (Coleman, 2008). Separation of duty, as it relates to security, has two primary objectives. The first is the prevention of conflict of interest, the appearance of conflict of interest, wrongful acts, fraud, abuse, and errors. The second is the detection of control failures that include...

Words: 1603 - Pages: 7