
Application System: Risks and Control Quiz
Authored by Mylene Quiros
History
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common risk associated with End-User Development application systems?
Redundant systems
Effective implementations
Compatible systems
Low organizational costs
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a preventative measure for unauthorized access to programs or data?
Sharing sensitive information openly
Providing programmers with full access
Limiting users' access to a 'need-to-know' basis
Allowing unrestricted remote access
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a potential risk of unauthorized remote access to an organization's network?
Improved network performance
Introduction of computer viruses
Enhanced data security
Increased efficiency
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the consequence of inaccurate information being used by management?
Increased productivity
Enhanced communication
Improved decision-making
Waste of time in reconciling data
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the difference between erroneous data input and falsified data input?
Erroneous data input is due to system errors, falsified data input is due to human error
Erroneous data input is intentional, falsified data input is unintentional
Erroneous data input is unintentional, falsified data input is intentional
Erroneous data input is due to human error, falsified data input is due to system errors
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of incomplete processing in an application system?
Data transmission over untrusted networks
Transactions or files not processed due to errors
Delayed processing due to production problems
Executing transactions more than once
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a potential risk of communication system failure within an IT environment?
Potential interception of information by unauthorized parties
Increased data security
Improved network reliability
Enhanced communication services
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
14 questions
The Great War
Quiz
•
KG - University
15 questions
Cell Theory and Types of Cells
Quiz
•
3rd Grade - University
14 questions
Wojny z Rosja XVII wiek
Quiz
•
4th Grade - University
15 questions
Limited & Unlimited Government
Quiz
•
7th Grade - University
10 questions
Athens vs. Sparta
Quiz
•
KG - University
8 questions
APUSH Period 4
Quiz
•
9th Grade - University
10 questions
The Montgomery Bus Boycott
Quiz
•
10th Grade - Professi...
13 questions
Social Structures 1450-1750
Quiz
•
KG - University
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
Discover more resources for History
20 questions
Disney Trivia
Quiz
•
University
25 questions
Ancient China
Quiz
•
KG - University
5 questions
TED-ED: The history of chocolate - Deanna Pucciarelli
Interactive video
•
KG - University
5 questions
TED-Ed: The breathtaking courage of Harriet Tubman - Janell Hobson
Interactive video
•
KG - University