chapter 8
_________ defines acceptable uses of the firm's information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet, and it specifies consequences for noncompliance.
An acceptable use policy (AUP)
Information systems controls are both manual and automated and consist of general and application controls. Which of the following best describes application controls?
Application controls include both automated and manual procedures that ensure that only authorized data are completely and accurately processed.
Which of the following best describes encryption?
Encryption is the process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver.
Which of the following statement best describes a pull-based model?
In a pull-based model, production master schedules are based on forecasts or best guesses of demand for products, and products are `pushed` to customers.
Which of the following statements best defines an acceptable use policy (AUP)?
It defines acceptable uses of the firm's information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet, and it specifies consequences for noncompliance.
Which of the following statements about an enterprise system is true?
It helps find ways to increase accurate on-time shipments of a company.
Which of the following statements best describes the Sarbanes-Oxley Act?
It imposes responsibility on companies and their management to protect investors by safeguarding the accuracy and integrity of financial information that is used internally and released externally.
Which of the following statements is true of an enterprise system?
It provides a central information repository common to all corporate users.
Which of the following statements about an enterprise system is true?
It provides firmwide information to help managers make better decisions.