Access to different levels of an information system should first be established through a user's a.Authorization b.Definition c.Identification d.Status

Understanding Business
12th Edition
ISBN:9781259929434
Author:William Nickels
Publisher:William Nickels
Chapter1: Taking Risks And Making Profits Within The Dynamic Business Environment
Section: Chapter Questions
Problem 1CE
icon
Related questions
Question
  1. Access to different levels of an information system should first be established through a user's

a.Authorization

b.Definition

c.Identification

d.Status

 

2.Predicting the future of the organization and its environment and matching thecharacteristics of the organization to the environment is associated with which decision-making level?

a.Knowledge

b.Operational

c.Strategic

d.Tactic

3.An analytics dashboard report for the next meeting was saved in Microsoft Excel 2013.However, the secretary has Microsoft Excel 2010 on her computer system. The only Excelversion that can easily open this analytics dashboard report is

a.2003

b.2007

c.2010

d.201

3.A manager urgently requested information on a customer's payment status. The followinginformation was received:

Customer First Name: Jonathan

Customer Last Name:?

Amount Due:?

Amount Paid: $1,500.00

Last Payment Date: July 15, 2016 Date of Request: September 22, 2016 Date Returned: December 6, 2016

4.Which characteristics of information are lacking in the report

a.Clarity and completeness

b.Completeness and timeliness

c.Conciseness and timeliness.,

d.Clarity and availability

5. specialists who are already within the organization and are capable of developing thevrequired information system are using

a.Insourcing

b.Outsourcing

c.Self-Sourcing

d.Team_Sourcing

 
   
   

6.Which of the following are included in the office automation systems?

(i) Word processing

(ii) Electronic mail

(iii) Voice mail

(iv) Audio conferencing

(a) (i), (ii), and (iii) only

(b) (ii), (iii) and (iv) only

(c) (i), (iii) and (iv) only

(d) (i), (ii), (iii), and (iv)

7.Outsourcing of information technology can encompass all of the following EXCEPT:

a.Having end users customize certain features thus allowing the software to be modified as necessary

b.Purchasing software and pay its owner to make certain modifications,

c.Purchasing software and pay the owner for the right to make modifications as necessary )

d.Having a third-party develop an entirely new and unique system for which no software exists.

8.The type of conversion that can last for weeks or months, duplicating tasks for that timeframe, causing stress on resources and personnel is called

a.Direct conversion

b.Parallel conversion ‘7

c.Pilot conversion

d.Phased conversion

9.A service where an agent visits the customer to sell a product or service is referred to as

a.Automated

b.Impersonalized

c.Manual

d.Personalize

10. Procedures to follow for the restoration of computing and communication services afterthey have been disrupted are known as

a.Business continuity planning

b.Disaster recovery planning

c.High-availability computing

d.Recovery-oriented computing

11.Which of the following is an example of an accident or malfunction of an InformationSystem?

a.Inadequate system performance

b.Internet hoaxes for illegal gain

c.Theft by entering fraudulent transaction data

d.Unauthorized use of access codes and financial passwords

12.Non-routine decisions in which the manager must provide judgment, evaluation andinsights into the problem definition best describes which types of decisions?

a.Operational

b.Semi-structured

c.Structured

d.Unstructured

13. The ethical principal 'If an action is not right for everyone to take,  then it is not right foranyone' is referred to as:

a.The Golden Rule

b.Immanuel Kant's Categorical Imperative

c. Utilitarian Principle

d. Risk Aversion Principle

14. International Information Systems that are developed at the local organization but operations are conducted through independent businesses located in foreign countries are

a.Centralized

b.Decentralized

c.Duplicated

d.Networked

15. A primary key that contains two or more fields is called a(n)

a.Entity key

b. Composite key

c. Candidate key

d.Foreign key

Expert Solution
steps

Step by step

Solved in 4 steps

Blurred answer
Knowledge Booster
Introduction to Forecasting
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, management and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Understanding Business
Understanding Business
Management
ISBN:
9781259929434
Author:
William Nickels
Publisher:
McGraw-Hill Education
Management (14th Edition)
Management (14th Edition)
Management
ISBN:
9780134527604
Author:
Stephen P. Robbins, Mary A. Coulter
Publisher:
PEARSON
Spreadsheet Modeling & Decision Analysis: A Pract…
Spreadsheet Modeling & Decision Analysis: A Pract…
Management
ISBN:
9781305947412
Author:
Cliff Ragsdale
Publisher:
Cengage Learning
Management Information Systems: Managing The Digi…
Management Information Systems: Managing The Digi…
Management
ISBN:
9780135191798
Author:
Kenneth C. Laudon, Jane P. Laudon
Publisher:
PEARSON
Business Essentials (12th Edition) (What's New in…
Business Essentials (12th Edition) (What's New in…
Management
ISBN:
9780134728391
Author:
Ronald J. Ebert, Ricky W. Griffin
Publisher:
PEARSON
Fundamentals of Management (10th Edition)
Fundamentals of Management (10th Edition)
Management
ISBN:
9780134237473
Author:
Stephen P. Robbins, Mary A. Coulter, David A. De Cenzo
Publisher:
PEARSON