Premium Essay

Management Information System Practice Question and Answer

In: Business and Management

Submitted By shineguang
Words 2701
Pages 11
Chapter 1 + case study

1. How can information technology support a company's business processes and decision making and give it a competitive advantage? GIve examples to illustrate your answer.

The term information technology refers to the various hardware, software, networking, and data management parts that are a neccessity for the system to function (pg. 8). Businesses regularly utilize computer-based information systems in order to record customer purchases, keep track of inventory, pay employees, buy new merchandise, and evaluate sales trends. Without the support of information technology, businesses would ultimately fall apart. For example if a business did not choose to use computer-based information systems, they wouldn't be able to evaluate what items were selling better than others and ultimately lose valuable information for future success. Information technology can also aid in decision making for a business. Decisions are made based on analysis provided by computer-based information systems. For example a store manager may make the decision whether to discontinue an item for sale or keep it on the floor due to analysis of sales trends provided by computer-based systems. Lastly information technology helps business gain a competitive advantage. A competitive advantage is gained through computer-based information systems by applying innovative application of information technologies (pg. 9). For example a store manager installing touch screen kiosks throughout the organization could potentially attract the competitors customers.

2. How does the use of the Internet, intranets, and extranets by companies today support their business processes and activities?

Today businesses depend on the internet, intranets, and extranets to implement and manage innovative e-business applications (fig. 1.5, pg. 13). Companies are using the internet to web-enable

Similar Documents

Premium Essay

Management of Information Security

...Review Questions for Chapter 7 – Security Management Practices Read Chapter 7 in the text, Study the Power Point Presentation and answer these Review Questions 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. What is benchmarking? What is the standard of due care? How does it relate to due diligence? What is a recommended security practice? What is a good source for finding such best practices? What is a gold standard in information security practices? Where can you find published criteria for it? When selecting recommended practices, what criteria should you use? When choosing recommended practices, what limitations should you keep in mind? What is baselining? How does it differ from benchmarking? What are the NIST-recommended documents that support the process of baselining? What is a performance measure in the context of information security management? What types of measures are used for information security management measurement programs? According to Dr. Kovacich, what are the critical questions to be kept in mind when developing a measurements program? What factors are critical to the success of an information security performance program? What is a performance target, and how is it used in establishing a measurement program? Answer: Performance targets are values assigned to specific metrics that indicate acceptable levels of performance. They make it possible to define success in the security program. 14. 15. List and describe the fields found in a properly and fully...

Words: 1387 - Pages: 6

Premium Essay

Instructor’s Manual Erp

...Instructor’s Manual Enterprise Resource Planning, 1/E CHAPTER 1: A FOUNDATION FOR UNDERSTANDING ENTERPRISE RESOURCE PLANNING SYSTEMS CHAPTER OBJECTIVES 1. Develop an understanding of how ERP systems can improve the effectiveness of information systems in organizations. 2. Understand the business benefits of enterprise resource planning (ERP) systems. 3. Understand the history and evolution of ERP. CHAPTER OUTLINE 1. A Foundation for Understanding Enterprise Resource Planning Systems a. The Emergence of Enterprise Resource Planning Systems 1. What is ERP? 2. The Evolution of ERP 3. The Integrated Systems Approach b. Business Benefits of ERP c. ERP Modules d. ERP Design Alternatives e. The Business Case for ERP 1. Cost-Benefit Analysis for ERP 2. Can ERP Provide a Competitive Advantage? f. The Challenge of Implementing an ERP System g. Summary ANSWERS TO END-OF-CHAPTER QUESTIONS Questions for Discussion: 1. Use on-line library databases to identify articles in trade publications which provide case studies of ERP implementations. These articles may provide some insight into each of these questions. a. How widespread is the use of ERP across certain industries? b. What are the benefits reported from implementing ERP? c. What are its limitations? 2. Research and learn about the implementation of ERP. Use trade publications and on-line library databases (e.g. ABI Inform, ProQuest, First Search, Wilson Select Plus, available through...

Words: 8305 - Pages: 34

Premium Essay

Issc361 Quiz 1

...Question 1 of 20 2.0 Points Information Security is primarily a discipline to manage the behavior of: A.technology B.people C.processes D.organizations Answer Key: B Question 2 of 20 2.0 Points The three objectives of information security are: A.confidentiality, integrity, and availability. B.resilience, privacy, and safety. C.confidentiality, secrecy, and privacy. D.none of the above. Answer Key: A Question 3 of 20 2.0 Points Which of the following topics would not be part of a program in information security? A.laws and ethical practices B.file access control C.security architecture D.All of the above would be classes you would expect in an IS program. Answer Key: D Question 4 of 20 2.0 Points Defense in depth is needed to assure that which three mandatory activities are present in a security system? A.prevention, response, and prosecution B.response, collection of evidence, and prosecution C.prevention, detection, and response D.prevention, response, and management Answer Key: C Question 5 of 20 2.0 Points The three types of security controls are: A.people, functions, and technology. B.people, process, and technology. C.technology, roles, and separation of duties. D.separation of duties, processes, and people. Answer Key: B Question 6 of 20 2.0 Points The absence or weakness in a system that may possibly be exploited...

Words: 769 - Pages: 4

Premium Essay

Marketing and Exports Co-Ordinator

...Strategic component answers the question "why do security enterprise problems exist?" This question of security leads to developing security policies that deal with people issues, and evaluates internal/external risks. Organizations are urging top executives to make information security a priority. Therefore, quality and trustworthiness of information are becoming key business issues (Ezingeard et al, 2005). To better accomplish information security in an organization, a management level infrastructure approach is needed. Just as information and data characteristics are different at the different levels of management, information security has different characteristics at the different levels of management. These levels of management are strategic, tactical, and operational. At the operations level, transaction data is produced and serves as input to create information. Maintaining and monitoring of integrity, confidentiality, and availability of the transaction data are primary objectives which are supported by organizational procedures and guidelines. At the tactical level, information is interpreted and utilized in decision making. Implementations of preventative, detective, and responsive controls are a primary objective which is supported by organizational standards. Further analysis/aggregation of the information creates knowledge to help make strategic level decisions Information security policy provides a framework to ensure that systems are developed and operated in...

Words: 1173 - Pages: 5

Premium Essay

Strategic Change Management Questions

...Student Assignment Covering Form |Course/Unit Information | |Course |Pearson (Edexcel) BTEC Level 7 – Diploma / Extended Diploma in Strategic Management & | | |Leadership | |Unit No. |Unit 14 | |Unit Name |Strategic Supply Chain Management and Logistics | |Unit code |D/602/2357 | |Batch |I 1501 – SSCML - Sredharran | |Instructor Information | |Name |Sredharran Sampath | |Phone |0529059903 | |Skype | ...

Words: 1781 - Pages: 8

Premium Essay

Quiz 1

...0 Points Question 1 of 20 2.0 Points Information Security is primarily a discipline to manage the behavior of: A.technology Correct B.people C.processes D.organizations Answer Key: B Question 2 of 20 2.0 Points The three objectives of information security are: Correct A.confidentiality, integrity, and availability. B.resilience, privacy, and safety. C.confidentiality, secrecy, and privacy. D.none of the above. Answer Key: A Question 3 of 20 2.0 Points Which of the following topics would not be part of a program in information security? A.laws and ethical practices B.file access control C.security architecture Correct D.All of the above would be classes you would expect in an IS program. Answer Key: D Question 4 of 20 2.0 Points Defense in depth is needed to assure that which three mandatory activities are present in a security system? A.prevention, response, and prosecution B.response, collection of evidence, and prosecution Correct C.prevention, detection, and response D.prevention, response, and management Answer Key: C Question 5 of 20 2.0 Points The three types of security controls are: A.people, functions, and technology. Correct B.people, process, and technology. C.technology, roles, and separation of duties. D.separation of duties, processes, and people. Answer Key: B Question 6 of 20 2.0 Points The absence or weakness in a system that may possibly...

Words: 796 - Pages: 4

Free Essay

Week Five Knowledge Check Hrm

...requirements B. strategic imperatives C. pay grades D. affirmative action candidates Correct: The Correct Answer is: A. Human Resource requirements must be specified for the recruitment of potential candidates for any change in position or new hire. The Human Resource requirements are established to ensure policies and laws are followed correctly. 8. The step following recruitment is ________, which is basically a rapid, rough selection process. A. orientation B. initial screening C. performance management D. workforce planning Correct: The Correct Answer is: B. The initial screening is used to narrow the search down to the individuals who are best fit and qualified for the job requirements and needs. 9. Typically, the first step in an employee's introduction to company policies, practices, and benefits is a(n) _________ program. A. initial screening B. intensive training program C. team-building D. orientation Correct: The Correct Answer is: D. The first step for a new employee’s introduction into a company or organization is done through an orientation program. Orientation programs take a new employee through all of the company’s policies, benefits, requirements, and other practices. Concept: Four Types of Company Postures for Recruitment Mastery 100% Questions 2 3 4 2. Which of the following statements about a company using a passive nondiscrimination posture is true...

Words: 1325 - Pages: 6

Free Essay

Week Five Knowledge Check Hrm 531

...requirements B. strategic imperatives C. pay grades D. affirmative action candidates Correct: The Correct Answer is: A. Human Resource requirements must be specified for the recruitment of potential candidates for any change in position or new hire. The Human Resource requirements are established to ensure policies and laws are followed correctly. 8. The step following recruitment is ________, which is basically a rapid, rough selection process. A. orientation B. initial screening C. performance management D. workforce planning Correct: The Correct Answer is: B. The initial screening is used to narrow the search down to the individuals who are best fit and qualified for the job requirements and needs. 9. Typically, the first step in an employee's introduction to company policies, practices, and benefits is a(n) _________ program. A. initial screening B. intensive training program C. team-building D. orientation Correct: The Correct Answer is: D. The first step for a new employee’s introduction into a company or organization is done through an orientation program. Orientation programs take a new employee through all of the company’s policies, benefits, requirements, and other practices. Concept: Four Types of Company Postures for Recruitment Mastery 100% Questions 2 3 4 2. Which of the following statements about a company using a passive nondiscrimination posture is true...

Words: 1325 - Pages: 6

Premium Essay

Head First

...A Brain-Friendly Guide Head First PMP Project Management What will you learn from this book? Head First PMP offers complete coverage of The PMBOK® Guide principles in a way that’s engaging, not tedious. This book helps you prepare for the certification exam with a unique method that goes beyond answers to specific questions and makes you think about the big picture of project management. By putting project management concepts into context, you will be able to understand, remember, and apply them—not just on the exam, but on the job. Information about your company WEAK MATRIX BALANCED MATRIX STRONG MATRIX Projectized Pick up tips about the PMP Exam in the Question Clinic. Matrix Organizations Customer or company needs Develop Project Charter Learn the inputs to every PMP process, and what that process outputs. Scope Carol Steuer, PMP, PMBOK® Guide, Third Edition Leadership Team Quality Cost Time Project Charter Why does this book look so different? Using the latest research in neurobiology, cognitive science, and learning theory, Head First PMP employs a visually rich format designed for the way your brain works, not a text-heavy approach that puts you to sleep. US $49.99 Jack Dahlgren, Project Management Consultant CAN $64.99 www.oreilly.com hf_pmp_mech.indd 1 “Head First PMP attempts to educate potential project managers instead of being a mere ‘how to pass the PMP exam’ book...this is truly something that sets it apart.” Head First H d Head First PMP...

Words: 31385 - Pages: 126

Premium Essay

Ethics

...UNIT OF COMPETENCY BSBINM501A Manage an information or knowledge management system Student to complete |Student ID: |Date Submitted: | Given Name: | Family Name: | Course Name: |Diploma in Business | I declare that the answers provided are entirely my own work. I have provided full referencing to the work of others. The material in this paper has not been submitted for assessment in any other formal course of study. [pic] For office use only: |Marks: |      |Out of: |      | Trainer’s Comments: |      | | | | ...

Words: 1909 - Pages: 8

Premium Essay

Nice One

... Session 2010-2011 Rubric: Answer all questions from SECTION A, and two from the SECTION B. SECTION A (Answer all questions from this section) Question 1 (20 sub questions 2 marks each, total 40 marks) Select the correct answer (only one choice is correct) 1.1 The main purpose of a _______________ is to generate surpluses and use the wealth for social and community objectives. a. partnership b. sole proprietorship c. not-for-profit organisation d. private limited liability company 1.2 According to the Companies Act 2006, the _____________ are required to prepare a _____________ report. a. shareholders, business prospect b. auditors, business review c. stakeholders, business prospect d. directors, business review 1.3 In a partnership, the partners make decisions collectively and are accountable to one another. This is a form of ________________ accountability. a. hierarchical b. market c. legal d. participatory 1.4 The directors are responsible for filing the company’s accounts and reports with the International Accounting Standards Board (IASB). a. True b. False 1.5 ___________________ is a network-based organisation which develops the framework for voluntary sustainability reporting. a. Global Reporting Initiative b. Global Sustainability Reporting c. Global Environmental Reporting d. Global Voluntary Reporting Questions continued over… Page 1 of 5 1.6 Which of these are the qualitative characteristics of financial information? I. Comparability II. Consistency...

Words: 1259 - Pages: 6

Premium Essay

Nobody Say No to Other

...Question 1 a) What legal obligations do you have to ensure the health and safety of yourself and others at work? Answer: Under work health and safety legislation I have to make ensure of safe premises, safe machinery and materials, safe systems of work, information, instruction, training and supervision and also a suitable working environment and facilities for me as well as others at work.This means I have the responsibility of complying what regulations requires me to or adopt and follow policy which would not breech the act by selecting appropriate action with reasonable precautions. b) What are the consequences of breaching your duty-of-care obligations? Answer: Duty of care refers to the responsibility of each person to do everything within their power to ensure a safe and healthy environment at workplace. Disappointment to follow industry code of practice can be used as evidence in proceeding for an office under the act which led to heavy financial penalties or even imprisonment depending on the breaches under the law. c) What legal obligations does your employer have? Answer: Under the act, employers are accountable for the workplace heath, safety and welfare of those who work under their direction or guidance. This means company should organize an environment to cater employee’s welfare. This includes having policies and procedures, compliance with all polices and procedures and provides safe work system. Question 2 a) Discuss the purpose and scope of...

Words: 1218 - Pages: 5

Premium Essay

Cis511 – Enterprise Resource Planning – Mid-Term

...Mid-Term * Question 1 Needs Grading | | | List 2 advantages of using a vanilla ERP system.Answer | | | | | Selected Answer: | 1. Total integration and standardization 2. Re-engineering of business processes | Correct Answer: | 1. Less expensive2. More likely to come in under or on budget.3. Easier to implement.4. Uses industry best practices. |   | | Response Feedback: | [None Given] | | | | | * Question 2 Needs Grading | | | List 5 tangible benefits with an ERP.Answer | | | | | Selected Answer: | Tangible benefits: 3. Inventory reduction 4. Personnel reduction 5. Productivity improvement 6. Order management improvement 7. Financial close cycle reduction | Correct Answer: | 1. Inventory reduction.2. Personnel reduction.3. Productivity improvement.4. Order management improvement.5. Financial close cycle reduction.6. IT cost reduction.7. Procurement cost reduction.8. Cash management improvement.9. Revenue/profit increase.10. Transportation/logistics cost reduction.11. Maintenance reduction.12. On-line delivery improvement. |   | | Response Feedback: | [None Given] | | | | | * Question 3 Needs Grading | | | List 5 intangible benefits with an ERP.Answer | | | | | Selected Answer: | Intangible benefits: 8. Information/ visibility 9. New/ improved processes 10. Customer responsiveness 11. Integration 12. Standardization | Correct Answer: | 1. Information/visibility...

Words: 849 - Pages: 4

Premium Essay

Gscm326 Full Course Latest All Discussions All Quizzes and All Week Course Project

...GSCM326 full course latest all discussions all quizzes and all week Course Project Click Link Below To Buy: http://hwcampus.com/shop/gscm326-full-course-latest-discussions-quizzes-week-course-project/ GSCM326 Week 1 Discussion DQ1 & DQ 2 Latest DQ 1 Total Quality Management (graded) What is total quality management (TQM)? Is it something you can install, like a refrigerator? How do you know TQM when you see it? DQ 2 A System Perspective (graded) When we talk about a system view, what are we interested in and why? Why is a system view so important to have if you are going to implement TQM? GSCM326 Week 2 Discussion DQ1 & DQ 2 Latest 2016 Jan. DQ 1 Deming's 14 Points (graded) Are Dr. Deming’s 14 points clear, concise, and achievable? If not, what do you think he had in mind? In Deming’s view, who needs to do what and why? DQ 2 Quality Awards and Standards (graded) The authors of our text talk about the Baldrige Award throughout their book. In previous versions, they even designed their text around this award. Given that our course is about TQM, an in-depth discussion of the Deming Prize would seem to be appropriate since it is the framework of company-wide quality control in Japan, which embodies what we call TQM in the United States, but is hardly discussed in our text. So let's do some research. Put on your investigative hats and see what you can find about the Deming Prize. You...

Words: 5741 - Pages: 23

Premium Essay

Trying to Join Site

...IT1115 Introduction to Information Technology Syllabus Credit hours: 6.0 Contact/Instructional hours: 70 (50 Theory, 20 Lab) IT1115 Introduction to Information Technology Syllabus COURSE SUMMARY COURSE DESCRIPTION This course explores foundational topics related to information technology. Topics examined include computing devices, hardware, software, operating systems, computer networks, security, and computer programming. Logical problem solving, troubleshooting, and maintenance of computer systems are also introduced. MAJOR INSTRUCTIONAL AREAS 1. Computer History and Fundamentals 2. Hardware 3. Operating Systems 4. Basic Networking 5. Basic Security 6. Software 7. Basic Programming 8. Web Technologies 9. Troubleshooting COURSE LEARNING OBJECTIVES By the end of this course, you should be able to: 1. Identify the evolution of computers and different types of computers. 2. Convert numbers between binary, decimal, and hexadecimal number systems. 3. Explain the purpose, functions, and characteristics of a CPU. 4. Describe the physical components of a computer and various input and output devices, including storage and memory. 5. Describe the function of BIOS and the booting process of a computer. 6. Describe basic operating system architecture, its components, and storage management. © ITT Educational Services, Inc. All Rights Reserved. [2] 6/15/15 IT1115 Introduction to Information Technology Syllabus 7. Describe basic types of computer network topologies and connections...

Words: 12527 - Pages: 51