Deck 10: Implementing Information Security

ملء الشاشة (f)
exit full mode
سؤال
Each for-profit organization determines its capital budget and the rules for managing capital spending and expenses the same way.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The networks layer of the bull's-eye is the outermost ring of the bull's eye.
سؤال
The WBS can be prepared with a simple desktop PC word processing program.
سؤال
Weak management support,with overly delegated responsibility and no champion,sentences the project to almost-certain failure.
سؤال
Planning for the implementation phase of a security project requires the creation of a detailed project plan.
سؤال
All organizations should designate a champion from the general management community of interest to supervise the implementation of an information security project plan.
سؤال
Planners need to estimate the effort required to complete each task,subtask,or action step.
سؤال
The size of the organization and the normal conduct of business may preclude a single large training program on new security procedures or technologies.
سؤال
The project plan as a whole must describe how to acquire and implement the needed security controls and create a setting in which those controls achieve the desired outcomes.
سؤال
The budgets of public organizations are usually the product of legislation or public meetings.
سؤال
The first step in the WBS approach encompasses activities,but not deliverables.
سؤال
The bull's-eye model can be used to evaluate the sequence of steps taken to integrate parts of the information security blueprint into a project plan.
سؤال
DMZ is the primary way to secure an organization's networks.
سؤال
Every organization needs to develop an information security department or program of its own.
سؤال
Unfreezing in the Lewin change model involves thawing hard-and-fast habits and established procedures.
سؤال
Each organization has to determine its own project management methodology for IT and information security projects.
سؤال
When an estimate is flawed,as when the number of effort-hours required is underestimated,the plan should be corrected and downstream tasks updated to reflect the change.
سؤال
In general,the design phase is accomplished by changing the configuration and operation of the organization's information systems to make them more secure.
سؤال
The need for qualified,trained,and available personnel constrains the project plan.
سؤال
The primary drawback to the direct changeover approach is that if the new system fails or needs modification,users may be without services while the system's bugs are worked out.
سؤال
The date for sending the final RFP to vendors is considered a(n)____,because it signals that all RFP preparation work is complete.

A)intermediate step
B)resource
C)milestone
D)deliverable
سؤال
The task of creating a project plan is often assigned to either a project manager or the project leader._________________________
سؤال
If the task is to write firewall specifications for the preparation of a(n)____,the planner would note that the deliverable is a specification document suitable for distribution to vendors.

A)WBS
B)CBA
C)SDLC
D)RFP
سؤال
A task or subtask becomes an action step when it can be completed by one individual or skill set and when it includes a single deliverable._________________________
سؤال
The RFP determines the impact that a specific technology or approach can have on the organization's information assets and what it may cost._________________________
سؤال
Most information security projects require a trained project CEO._________________________
سؤال
The parallel implementation works well when an isolated group can serve as the "guinea pig," which prevents any problems with the new system from dramatically interfering with the performance of the organization as a whole._________________________
سؤال
The security systems implementation life cycle is a process for collecting information about an organization's objectives,its technical architecture,and its information security environment._________________________
سؤال
The tasks or action steps that come before the specific task at hand are called successors._________________________
سؤال
A direct changeover is also known as going "fast turnkey." _________________________
سؤال
In the early stages of planning,the project planner should attempt to specify completion dates only for major employees within the project._________________________
سؤال
An ideal organization fosters resilience to change._________________________
سؤال
The ____ involves collecting information about an organization's objectives,its technical architecture,and its information security environment.

A)SISC
B)SecSDLC
C)DLC
D)SIDLC
سؤال
Corrective action decisions are usually expressed in terms of trade-offs._________________________
سؤال
A proven method for prioritizing a program of complex change is the bull's-eye method._________________________
سؤال
The optimal time frame for training is usually one to three weeks before the new policies and technologies come online._________________________
سؤال
A cybernetic loop ensures that progress is measured periodically._________________________
سؤال
____ is a simple planning tool.

A)RFP
B)WBS
C)ISO 17799
D)SDLC
سؤال
Tasks or action steps that come after the task at hand are called ____.

A)predecessors
B)successors
C)children
D)parents
سؤال
The primary drawback to the direct changeover approach is that if the new system fails or needs modification,users may be without services while the system's bugs are worked out._________________________
سؤال
A(n)____________________ is a completed document or program module that can either serve as the beginning point for a later task or become an element in the finished project.
سؤال
A(n)____________________ is a specific point in the project plan when a task that has a noticeable impact on the progress of the project plan is complete.
سؤال
In the ____ process,measured results are compared to expected results.

A)negative feedback loop
B)wrap-up
C)direct changeover
D)turnover
سؤال
The ____ methodology has been used by many organizations,requires that issues be addressed from the general to the specific,and that the focus be on systematic solutions instead of individual problems.

A)parallel
B)direct changeover
C)bull's-eye
D)wrap-up
سؤال
The ____ layer of the bull's-eye model receives attention last.

A)Policies
B)Networks
C)Systems
D)Applications
سؤال
The goal of the ____ is to resolve any pending issues,critique the overall effort of the project,and draw conclusions about how to improve the process for the future.

A)direct changeover
B)wrap-up
C)phased implementation
D)pilot implementation
سؤال
The ____ layer of the bull's-eye model includes computers used as servers,desktop computers,and systems used for process control and manufacturing systems.

A)Policies
B)Networks
C)Systems
D)Applications
سؤال
Public organizations often have "____" to spend all their remaining funds before the end of the fiscal year.

A)end-of-fiscal-year spending-sprees
B)end-of-year spend-a-thons
C)end-of-fiscal spending-sprees
D)end-of-fiscal-year spend-a-thons
سؤال
A ____ is usually the best approach to security project implementation.

A)direct changeover
B)phased implementation
C)pilot implementation
D)parallel operation
سؤال
Technology ____ guides how frequently technical systems are updated,and how technical updates are approved and funded.

A)wrap-up
B)governance
C)turnover
D)changeover
سؤال
During the implementation phase,the organization translates its blueprint for information security into a concrete project ____________________.
سؤال
Management should coordinate the organization's information security vision and objectives with the communities of ____________________ involved in the execution of the plan.
سؤال
Some cases of ____ are simple,such as requiring employees to use a new password beginning on an announced date.

A)phased implementation
B)direct changeover
C)pilot implementation
D)wrap-up
سؤال
A(n)____,typically prepared in the analysis phase of the SecSDLC,must be reviewed and verified prior to the development of the project plan.

A)RFP
B)WBS
C)SDLC
D)CBA
سؤال
The Lewin change model consists of ____.

A)unfreezing
B)moving
C)refreezing
D)All of the above
سؤال
Project managers can reduce resistance to change by involving employees in the project plan.In systems development,this is referred to as ____.

A)DMZ
B)SDLC
C)WBS
D)JAD
سؤال
____________________ is a phenomenon in which the project manager spends more time documenting project tasks,collecting performance measurements,recording project task information,and updating project completion forecasts than in accomplishing meaningful project work.
سؤال
By managing the ____,the organization can reduce unintended consequences by having a process to resolve potential conflict and disruption that uncoordinated change can introduce.

A)changeover
B)wrap-up
C)process of change
D)governance
سؤال
The ____ level of the bull's-eye model establishes the ground rules for the use of all systems and describes what is appropriate and what is inappropriate,it enables all other information security components to function correctly.

A)Policies
B)Networks
C)Systems
D)Applications
سؤال
In a ____ implementation,the entire security system is put in place in a single office,department,or division,and issues that arise are dealt with before expanding to the rest of the organization.

A)loop
B)direct
C)parallel
D)pilot
سؤال
What are the major steps in executing the project plan?
سؤال
Project ____________________ describes the amount of time and effort-hours needed to deliver the planned features and quality level of the project deliverables.
سؤال
The project planner should describe the skill set or person,often called a(n)____________________,needed to accomplish a task.
سؤال
Once a project is underway,it is managed to completion using a process known as a negative ____________________ loop.
سؤال
What major project tasks does the WBS document?
سؤال
A(n)____________________ implementation is the most common conversion strategy and involves a measured rollout of the planned system with a part of the whole being brought out and disseminated across an organization before the next piece is implemented.
سؤال
The tasks or action steps that come before the specific task at hand are called ____________________.
سؤال
Technology ____________________ is a complex process that organizations use to manage the affects and costs of technology implementation,innovation,and obsolescence.
سؤال
ERP stands for enterprise ____________________ planning.
سؤال
One of the oldest models of change is the ____________________ change model.
سؤال
A direct ____________________ involves stopping the old method and beginning the new.
سؤال
What can the organization do by managing the process of change?
سؤال
The ____________________ operations strategy involves running the new methods alongside the old methods.
سؤال
Tasks or action steps that come after the task at hand are called ____________________.
سؤال
Medium- and large-sized organizations deal with the impact of technical change on the operation of the organization through a(n)____________________ control process.
سؤال
Regardless of where in the budget information security items are located,monetary ____________________ determine what can (and cannot)be accomplished.
سؤال
The level of resistance to ____________________ impacts the ease with which an organization is able to implement the procedural and managerial changes.
سؤال
JAD stands for ____________________ application development.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/78
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Implementing Information Security
1
Each for-profit organization determines its capital budget and the rules for managing capital spending and expenses the same way.
False
2
The networks layer of the bull's-eye is the outermost ring of the bull's eye.
False
3
The WBS can be prepared with a simple desktop PC word processing program.
False
4
Weak management support,with overly delegated responsibility and no champion,sentences the project to almost-certain failure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
5
Planning for the implementation phase of a security project requires the creation of a detailed project plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
6
All organizations should designate a champion from the general management community of interest to supervise the implementation of an information security project plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
7
Planners need to estimate the effort required to complete each task,subtask,or action step.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
8
The size of the organization and the normal conduct of business may preclude a single large training program on new security procedures or technologies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
9
The project plan as a whole must describe how to acquire and implement the needed security controls and create a setting in which those controls achieve the desired outcomes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
10
The budgets of public organizations are usually the product of legislation or public meetings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
11
The first step in the WBS approach encompasses activities,but not deliverables.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
12
The bull's-eye model can be used to evaluate the sequence of steps taken to integrate parts of the information security blueprint into a project plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
13
DMZ is the primary way to secure an organization's networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
14
Every organization needs to develop an information security department or program of its own.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
15
Unfreezing in the Lewin change model involves thawing hard-and-fast habits and established procedures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
16
Each organization has to determine its own project management methodology for IT and information security projects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
17
When an estimate is flawed,as when the number of effort-hours required is underestimated,the plan should be corrected and downstream tasks updated to reflect the change.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
18
In general,the design phase is accomplished by changing the configuration and operation of the organization's information systems to make them more secure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
19
The need for qualified,trained,and available personnel constrains the project plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
20
The primary drawback to the direct changeover approach is that if the new system fails or needs modification,users may be without services while the system's bugs are worked out.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
21
The date for sending the final RFP to vendors is considered a(n)____,because it signals that all RFP preparation work is complete.

A)intermediate step
B)resource
C)milestone
D)deliverable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
22
The task of creating a project plan is often assigned to either a project manager or the project leader._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
23
If the task is to write firewall specifications for the preparation of a(n)____,the planner would note that the deliverable is a specification document suitable for distribution to vendors.

A)WBS
B)CBA
C)SDLC
D)RFP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
24
A task or subtask becomes an action step when it can be completed by one individual or skill set and when it includes a single deliverable._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
25
The RFP determines the impact that a specific technology or approach can have on the organization's information assets and what it may cost._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
26
Most information security projects require a trained project CEO._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
27
The parallel implementation works well when an isolated group can serve as the "guinea pig," which prevents any problems with the new system from dramatically interfering with the performance of the organization as a whole._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
28
The security systems implementation life cycle is a process for collecting information about an organization's objectives,its technical architecture,and its information security environment._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
29
The tasks or action steps that come before the specific task at hand are called successors._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
30
A direct changeover is also known as going "fast turnkey." _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
31
In the early stages of planning,the project planner should attempt to specify completion dates only for major employees within the project._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
32
An ideal organization fosters resilience to change._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
33
The ____ involves collecting information about an organization's objectives,its technical architecture,and its information security environment.

A)SISC
B)SecSDLC
C)DLC
D)SIDLC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
34
Corrective action decisions are usually expressed in terms of trade-offs._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
35
A proven method for prioritizing a program of complex change is the bull's-eye method._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
36
The optimal time frame for training is usually one to three weeks before the new policies and technologies come online._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
37
A cybernetic loop ensures that progress is measured periodically._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
38
____ is a simple planning tool.

A)RFP
B)WBS
C)ISO 17799
D)SDLC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
39
Tasks or action steps that come after the task at hand are called ____.

A)predecessors
B)successors
C)children
D)parents
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
40
The primary drawback to the direct changeover approach is that if the new system fails or needs modification,users may be without services while the system's bugs are worked out._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
41
A(n)____________________ is a completed document or program module that can either serve as the beginning point for a later task or become an element in the finished project.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
42
A(n)____________________ is a specific point in the project plan when a task that has a noticeable impact on the progress of the project plan is complete.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
43
In the ____ process,measured results are compared to expected results.

A)negative feedback loop
B)wrap-up
C)direct changeover
D)turnover
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
44
The ____ methodology has been used by many organizations,requires that issues be addressed from the general to the specific,and that the focus be on systematic solutions instead of individual problems.

A)parallel
B)direct changeover
C)bull's-eye
D)wrap-up
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
45
The ____ layer of the bull's-eye model receives attention last.

A)Policies
B)Networks
C)Systems
D)Applications
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
46
The goal of the ____ is to resolve any pending issues,critique the overall effort of the project,and draw conclusions about how to improve the process for the future.

A)direct changeover
B)wrap-up
C)phased implementation
D)pilot implementation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
47
The ____ layer of the bull's-eye model includes computers used as servers,desktop computers,and systems used for process control and manufacturing systems.

A)Policies
B)Networks
C)Systems
D)Applications
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
48
Public organizations often have "____" to spend all their remaining funds before the end of the fiscal year.

A)end-of-fiscal-year spending-sprees
B)end-of-year spend-a-thons
C)end-of-fiscal spending-sprees
D)end-of-fiscal-year spend-a-thons
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
49
A ____ is usually the best approach to security project implementation.

A)direct changeover
B)phased implementation
C)pilot implementation
D)parallel operation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
50
Technology ____ guides how frequently technical systems are updated,and how technical updates are approved and funded.

A)wrap-up
B)governance
C)turnover
D)changeover
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
51
During the implementation phase,the organization translates its blueprint for information security into a concrete project ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
52
Management should coordinate the organization's information security vision and objectives with the communities of ____________________ involved in the execution of the plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
53
Some cases of ____ are simple,such as requiring employees to use a new password beginning on an announced date.

A)phased implementation
B)direct changeover
C)pilot implementation
D)wrap-up
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
54
A(n)____,typically prepared in the analysis phase of the SecSDLC,must be reviewed and verified prior to the development of the project plan.

A)RFP
B)WBS
C)SDLC
D)CBA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
55
The Lewin change model consists of ____.

A)unfreezing
B)moving
C)refreezing
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
56
Project managers can reduce resistance to change by involving employees in the project plan.In systems development,this is referred to as ____.

A)DMZ
B)SDLC
C)WBS
D)JAD
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
57
____________________ is a phenomenon in which the project manager spends more time documenting project tasks,collecting performance measurements,recording project task information,and updating project completion forecasts than in accomplishing meaningful project work.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
58
By managing the ____,the organization can reduce unintended consequences by having a process to resolve potential conflict and disruption that uncoordinated change can introduce.

A)changeover
B)wrap-up
C)process of change
D)governance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
59
The ____ level of the bull's-eye model establishes the ground rules for the use of all systems and describes what is appropriate and what is inappropriate,it enables all other information security components to function correctly.

A)Policies
B)Networks
C)Systems
D)Applications
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
60
In a ____ implementation,the entire security system is put in place in a single office,department,or division,and issues that arise are dealt with before expanding to the rest of the organization.

A)loop
B)direct
C)parallel
D)pilot
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
61
What are the major steps in executing the project plan?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
62
Project ____________________ describes the amount of time and effort-hours needed to deliver the planned features and quality level of the project deliverables.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
63
The project planner should describe the skill set or person,often called a(n)____________________,needed to accomplish a task.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
64
Once a project is underway,it is managed to completion using a process known as a negative ____________________ loop.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
65
What major project tasks does the WBS document?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
66
A(n)____________________ implementation is the most common conversion strategy and involves a measured rollout of the planned system with a part of the whole being brought out and disseminated across an organization before the next piece is implemented.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
67
The tasks or action steps that come before the specific task at hand are called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
68
Technology ____________________ is a complex process that organizations use to manage the affects and costs of technology implementation,innovation,and obsolescence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
69
ERP stands for enterprise ____________________ planning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
70
One of the oldest models of change is the ____________________ change model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
71
A direct ____________________ involves stopping the old method and beginning the new.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
72
What can the organization do by managing the process of change?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
73
The ____________________ operations strategy involves running the new methods alongside the old methods.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
74
Tasks or action steps that come after the task at hand are called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
75
Medium- and large-sized organizations deal with the impact of technical change on the operation of the organization through a(n)____________________ control process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
76
Regardless of where in the budget information security items are located,monetary ____________________ determine what can (and cannot)be accomplished.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
77
The level of resistance to ____________________ impacts the ease with which an organization is able to implement the procedural and managerial changes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
78
JAD stands for ____________________ application development.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.