Preview

It/205 Week 9 Quiz

Satisfactory Essays
Open Document
Open Document
596 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It/205 Week 9 Quiz
Week Nine – Summary of MIS Concepts Quiz

Instructions: Please place your name and the name of the class where indicated and place your answers where required. Once completed the Quiz should be uploaded to your Assignment Forum. Please make every effort not to change the formatting of this Quiz. Thank you.

Name__

Class _____IT/205 Management of Information Systems_

TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false

1) The dimensions of information systems are people, organizations, and information technology. 1) ___T____

2) Decision-support systems help managers make decisions that are unique, rapidly changing, and not easily specified in advance. 2) ___T____

3) IT infrastructure
…show more content…
4) ____T___

5) Enterprise systems are typically built around one or two major business workflows. 5) ___F____

6) Software localization refers to the entire process of converting software to operate in a second language. 6) __T_____

7) Implementing a Web interface for a database requires changes to the database itself. 7) __F_____

8) An acceptable use policy defines the acceptable level of access to information assets for different users. 8) __T_____

9) Executive support systems focus on using OLAP and data mining to analyze large pools of data in major corporate systems. 9) ___F____

10) Failure to address properly the organizational changes surrounding the introduction of a new system can cause the demise of an otherwise good system. 10) ___T___

11) A cookie is a small file containing information about you and your Web activities that is deposited on your hard disk by a Web site. 11) ___T___

12) Spyware is software that comes hidden in downloaded applications and can track your online movements. 12)

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Xacc/280 Week 3 Quiz

    • 826 Words
    • 4 Pages

    A physical count of merchandise inventory on November 30 reveals that there are 90 units on hand. Assume a periodic inventory system is used. Ending inventory under LIFO is…

    • 826 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Explain some of the graphical user interfaces (GUIs) and communications messages that occur during the operation of a microwave…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The credit card data theft at TJX Companies is considered one of the worst ever. The case is significant because of a lack of appropriate security and control.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Cis 207 Week 2/3 Quiz

    • 383 Words
    • 2 Pages

    Registers are used to store data in RAM, the control unit, and the arithmetic logic unit. True…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It 205 Week 3 Assignment

    • 667 Words
    • 2 Pages

    The TJX was still using the old wired equivalent Privacy (WEP) encryption system, which is relatively easy for hackers to crack. An auditor also later found the company had neglected to install firewalls and data encryption, on many of the computers using the wireless network,…

    • 667 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 204 Quiz

    • 2478 Words
    • 10 Pages

    You follow certain step’s to access the supplementary readings for a course when u sing your organizations library management system. These steps that you follow are examples of the _________ components of an information system.…

    • 2478 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Itm/6015 Week 3 Quiz

    • 806 Words
    • 4 Pages

    3. All of the following led to an unprecedented level of IT investments in the 1990s…

    • 806 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Their main features will be the process carried out, for example if you wanted to save a file;…

    • 1346 Words
    • 6 Pages
    Good Essays
  • Good Essays

    It/205 Week 8 Checkpoint

    • 339 Words
    • 2 Pages

    A census is the process of acquiring and recording information from the general public to determine population or housing numbers. For the 2010 census, the United States Census Bureau decided to implement a program called Field Data Collection Automation (FDCA). The program was intended to improve the data collection process by using handheld electronic devices. The mobile handhelds were to canvass addresses during the initial stage of the census.The FDCA program was important to the U.S. Census Bureau because it would replace the millions of paper forms and maps that were previously required to complete the census (Laudon&Laudon, 2011, p413). It was also important because it was meant to reduce costs, improve data quality, improve data collection efficiency, and encourage people to participate. Unfortunately, the FDCA program had problems.…

    • 339 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 3 Quiz

    • 2621 Words
    • 11 Pages

    Student Answer: If the price of X falls then the quantity demanded for A would fall because since they are substitutes the consumer will go for the lower price item. The quantity demanded for X would increase as consumers move toward the lower priced item. This would cause a shift up and to the right for Brand X.…

    • 2621 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    1 What is the purpose of a CIRT plan? Describe what this plan does and what other plan it ties into.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Week 2 Quiz

    • 599 Words
    • 5 Pages

    What would you most commonly do to reduce the potential risk from a threat/vulnerability pair?…

    • 599 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 4 quiz

    • 604 Words
    • 3 Pages

    7. When the researcher measures a behavior that needs to be changed, applies therapy and measures the behavior again, and then removes the treatment and measures the behavior again, this is referred to as ABA design.…

    • 604 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Document Object Model

    • 455 Words
    • 2 Pages

    The cookie object returns the current document’s cookie string (Gosselin, n.d.). This is small bits of information that is stored on the user’s computer by a Web site or Web server about the user in a text file. These small bits of information stored are usually for identification purposes such as “remember me” on a website or for remembering a logged in user as the user travels from page to page within a web site that was initially logged in with user name and password.…

    • 455 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Student

    • 678 Words
    • 3 Pages

    While most cookies appear to be used solely for the purpose of enhancing the user’s web browsing experience, cookies can be used for other purposes including adware or spyware if they contain active code. Adware is used to automatically download or display advertisements on a person’s computer. Spyware is technology used to gather information about a person or organization without their consent or knowledge and relay that…

    • 678 Words
    • 3 Pages
    Good Essays