Management Information Systems & Tech

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

XYZ Inc. scanned the fingerprints of all their employees and now uses these fingerprints to authenticate their employees and grant them access to different areas of the company's facilities. XYZ Inc. is utilizing which type of technology?

Biometrics

_______ is disadvantage of the fiber-optic cable.

Difficult to work with

_______ cables are made of glass

Fiber-optic

List and explain the three fundamental tenets of ethics.

Fundamental tenets of ethics include the following: Responsibility means that you accept the consequences of your decisions and actions.Accountability refers to determining who is responsible for actions that were taken.Liability is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. What is unethical is not necessarily illegal. For example, a bank's decision to foreclose on a home can be technically legal, but it can raise many ethical questions. In many instances, then, an individual or organization faced with an ethical decision is not considering whether to break the law. As the foreclosure example illustrates, however, ethical decisions can have serious consequences for individuals, organizations, and society at large.

________ defines how messages are formulated and how their receivers interpret them.

HTTP

A(n) _________ is a company that provides Internet connections for a fee.

ISP

IT services, IT personnel, and IT components make up the organization's __________.

IT infrastructure

__________ is the first step in the general framework for ethics.

Recognize an ethical issue

___________ are people and equipment that perform process activities.

Resources

______________ means that you accept the consequences of your decisions and actions.

Responsibility

_______ is the protocol of the Internet.

TCP/IP

Which of the following is an accessibility issue?

What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?

A(n) ________ is a software package that attempts to identify and eliminate viruses and worms.

anti-malware system

Your professor hands you a peice of paper with the number 75 on it. This is _____.

data

The __________ of an information resource is the harm, loss or damange that can result if a threat compromises that resource.

exposure

Supplier power is high when buyers have _______ choices from whom to buy and low when buyers have ______ choices.

few; many

The Internet backbone is a __________ network.

fiber-optic

A(n) ___________ is a system that prevents a specific type of information from moving between untrusted networks and private networks.

firewall

American companies can be easily do business with Chinese companies. This is phenomenon is called ____________.

globalization

Sarah received an email that claimed to be from her bank. The email asked her to provide her password. Sarah later found out that the email was not from her bank and that she had given sensitive information to someone who gained access to her accounts. This is an example of a _______________.

phishing attack

Intellectual property is NOT protected under ________ laws.

privacy

An employee at ABC Inc. downloaded an email and opened the attchment contain within the message. Shortly, afterwards all employees were blocked from accesing files on the company's servers and the criminals told ABC Inc. they would have to pay a large amount of Bitcoin to regain access to their files. ABC Inc. was a victim of ________.

ransomware

Suppose you only study two hours for your next test. If you understand that means you may not do well on that test and you are willing to accept the lower grade, it means you are taking ____________ for your actions.

responsibility

List three types of cable/wireline media and list all the advantages and disadvantages of each cable media.

short answer

To authenticate authorized personnel, an organization can use one or more of following methods: something the user is, something the user has, something the user does, or something the user knows. Give an example of each of these methods.

short answer

Globalization is a ___________ pressure.

societal

Keynote loggers and screen scrapers are examples of ___________.

spyware

A(n) ____________ is an interorganizational system.

supply chain system

A(n) ___________ to an information resource is any danger to which a system may be exposed.

threat

When you go through the checkout line at your local grocery store, this is a(n) __________ that could be processed by a(n) ___________.

transaction; TPS

The _______ layer of TCP/IP provides communication and packet services.

transport

____________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.

Espionage

BI systems provide the input data for corporate databases.

False

Everyone has access to the Internet in the United States

False

_____________ is organized so that it has meaning and value to the recipient.

Information

A network that is restricted to a single building is a _______.

LAN

_____________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

Liability

_______________ is the current strategy for many manufacturers where a company produces a large quantity of items but customizes them to match the needs and preferences of individual customers.

Mass customization

What do companies use Porter's model for? Is the bargaining power of customers high or low when they have few choices? Explain with an example.

The best-known framework for analyzing competitiveness is Michael Porter's competitive forces model. Companies use Porter's model to develop strategies to increase their competitive edge. Porter's model also demonstrates how IT can make a company more competitive. Porter's model identifies five major forces that can endanger or enhance a company's position in a given industry. Bargaining power of buyers is high when they have many choices and low when buyers have few choices. So companies can decides from many different models of laptops - could be Dell or Lenovo etc. Bargaining power of buyers is high when the product brand doesn't matter and it becomes a brand. Many companies make smart phones but people still spend a lot more money on iPhones - in this case the bargaining power of customer is lower because they want a certain brand. Another example; Customers who buy a plane ticket go by price if they don't have loyalty points, so they have more bargaining power. But to reel them airlines use services like loyalty points - frequent flier miles and the benefits that come with them like upgrades, lounges etc.

_______ is the slowest cable medium.

Twisted-pair

________ cables are made of copper.

Twisted-pair


संबंधित स्टडी सेट्स

Adaptive Quizzing Women's Health/Disorders and Childbearing Health Promotion

View Set

Exam 1 Review Questions MKT 3020

View Set

Stevenson, "The Nature of Ethical Disagreement"

View Set

Comptia A+ 1101 & 1102 practice questions official

View Set

LS7B Midterm 1 Meiosis and Genetics

View Set

HTTP (The Hypertext Transfer Protocol)

View Set

Chapter 22 Prep U- Parent/Child Nursing

View Set

Chordae Tendinae and Papillary Muscles

View Set