Preview

It/205 Week 9 Quiz

Satisfactory Essays
Open Document
Open Document
596 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It/205 Week 9 Quiz
Week Nine – Summary of MIS Concepts Quiz

Instructions: Please place your name and the name of the class where indicated and place your answers where required. Once completed the Quiz should be uploaded to your Assignment Forum. Please make every effort not to change the formatting of this Quiz. Thank you.

Name__

Class _____IT/205 Management of Information Systems_

TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false

1) The dimensions of information systems are people, organizations, and information technology. 1) ___T____

2) Decision-support systems help managers make decisions that are unique, rapidly changing, and not easily specified in advance. 2) ___T____

3) IT infrastructure
…show more content…

4) ____T___

5) Enterprise systems are typically built around one or two major business workflows. 5) ___F____

6) Software localization refers to the entire process of converting software to operate in a second language. 6) __T_____

7) Implementing a Web interface for a database requires changes to the database itself. 7) __F_____

8) An acceptable use policy defines the acceptable level of access to information assets for different users. 8) __T_____

9) Executive support systems focus on using OLAP and data mining to analyze large pools of data in major corporate systems. 9) ___F____

10) Failure to address properly the organizational changes surrounding the introduction of a new system can cause the demise of an otherwise good system. 10) ___T___

11) A cookie is a small file containing information about you and your Web activities that is deposited on your hard disk by a Web site. 11) ___T___

12) Spyware is software that comes hidden in downloaded applications and can track your online movements. 12)


You May Also Find These Documents Helpful

  • Satisfactory Essays

    Xacc/280 Week 3 Quiz

    • 826 Words
    • 4 Pages

    A physical count of merchandise inventory on November 30 reveals that there are 90 units on hand. Assume a periodic inventory system is used. Ending inventory under LIFO is…

    • 826 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Explain some of the graphical user interfaces (GUIs) and communications messages that occur during the operation of a microwave…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The credit card data theft at TJX Companies is considered one of the worst ever. The case is significant because of a lack of appropriate security and control.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Cis 207 Week 2/3 Quiz

    • 383 Words
    • 2 Pages

    Registers are used to store data in RAM, the control unit, and the arithmetic logic unit. True…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It 205 Week 3 Assignment

    • 667 Words
    • 2 Pages

    The TJX was still using the old wired equivalent Privacy (WEP) encryption system, which is relatively easy for hackers to crack. An auditor also later found the company had neglected to install firewalls and data encryption, on many of the computers using the wireless network,…

    • 667 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 204 Quiz

    • 2478 Words
    • 10 Pages

    You follow certain step’s to access the supplementary readings for a course when u sing your organizations library management system. These steps that you follow are examples of the _________ components of an information system.…

    • 2478 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Itm/6015 Week 3 Quiz

    • 806 Words
    • 4 Pages

    3. All of the following led to an unprecedented level of IT investments in the 1990s…

    • 806 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Their main features will be the process carried out, for example if you wanted to save a file;…

    • 1346 Words
    • 6 Pages
    Good Essays
  • Good Essays

    It/205 Week 1 Check Point

    • 509 Words
    • 3 Pages

    The three dimensions of business problems are Organizations, Technology, and People. An example of organizations would be the rules and regulations that are set forth from within the company from the higher ups. If organizations did not set up these rules and regulations then the employee’s would just do what they thought was correct and everyone would be going in different directions and not working as a team to accomplish the same goals FedEx’s organization is set up so when they receive a package, everyone will follow specific procedures to ensure the information about the package is loaded into the system correctly so the package can to get to its final destination on time. Technology is anything from computer hardware to software to networking to the World Wide Web. Companies such as FedEx use technology to their advantage to keep track of all the packages and provide status checks with all of these forms of technology. They can now pinpoint potential delays or misdirection of packages and get it corrected sooner by using computer systems that talk to each other. The people are skilled in what their specific job is within a company to ensure that the overall goals are met. With FedEx there are hundreds if not thousands of different jobs that all have to be accomplished just for someone to send a package and it to get the destination on time. If FedEx did not have drivers, pilots, IT personnel, then the packages would go nowhere and they would be out of business. All companies must be set up with these three dimensions and a full understanding of each dimension to be successful.…

    • 509 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It/205 Week 8 Checkpoint

    • 339 Words
    • 2 Pages

    A census is the process of acquiring and recording information from the general public to determine population or housing numbers. For the 2010 census, the United States Census Bureau decided to implement a program called Field Data Collection Automation (FDCA). The program was intended to improve the data collection process by using handheld electronic devices. The mobile handhelds were to canvass addresses during the initial stage of the census.The FDCA program was important to the U.S. Census Bureau because it would replace the millions of paper forms and maps that were previously required to complete the census (Laudon&Laudon, 2011, p413). It was also important because it was meant to reduce costs, improve data quality, improve data collection efficiency, and encourage people to participate. Unfortunately, the FDCA program had problems.…

    • 339 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    1 What is the purpose of a CIRT plan? Describe what this plan does and what other plan it ties into.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Week 2 Quiz

    • 599 Words
    • 5 Pages

    What would you most commonly do to reduce the potential risk from a threat/vulnerability pair?…

    • 599 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 4 quiz

    • 604 Words
    • 3 Pages

    7. When the researcher measures a behavior that needs to be changed, applies therapy and measures the behavior again, and then removes the treatment and measures the behavior again, this is referred to as ABA design.…

    • 604 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Document Object Model

    • 455 Words
    • 2 Pages

    The cookie object returns the current document’s cookie string (Gosselin, n.d.). This is small bits of information that is stored on the user’s computer by a Web site or Web server about the user in a text file. These small bits of information stored are usually for identification purposes such as “remember me” on a website or for remembering a logged in user as the user travels from page to page within a web site that was initially logged in with user name and password.…

    • 455 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Student

    • 678 Words
    • 3 Pages

    While most cookies appear to be used solely for the purpose of enhancing the user’s web browsing experience, cookies can be used for other purposes including adware or spyware if they contain active code. Adware is used to automatically download or display advertisements on a person’s computer. Spyware is technology used to gather information about a person or organization without their consent or knowledge and relay that…

    • 678 Words
    • 3 Pages
    Good Essays