LEARNING OBJECTIVES After completing this chapter, you will be able to answer the following questions: 1. Why are information systems vulnerable to destruction, error, and abuse? What is the business value of security and control? What are the components of an organizational framework for security and control? What are the most important tools and technologies for safeguarding information resources? 2. 3. 4. ISBN 1-256-42913-9 232 Essentials of MIS, Ninth Edition, by Kenneth C. Laudon
Words: 21009 - Pages: 85
improved efficiency. Difficulty: Easy Reference: p. 6 Answer: b 3. Dell Computer's use of information systems to improve efficiency and implement "mass customization" techniques to maintain consistent profitability and an industry lead illustrates which business objective? a. b. c. d. Improved flexibility Improved business practices Competitive advantage Survival Difficulty: Hard Reference: p. 8 Answer: c 4. The use of information systems because of necessity is: a. b. c. d. survival improved business
Words: 34754 - Pages: 140
Exam Name___________________________________ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Dell Computer's use of information systems to improve efficiency and implement "mass customization" techniques to maintain consistent profitability and an industry lead illustrates which business objective? A) improved flexibility B) survival C) competitive advantage D) improved business practices 2) Tata Motor's new information system, enabling
Words: 8082 - Pages: 33
information systems transforming business, and what is their relationship to globalization? Why are information systems so essential for running and managing a business today? What exactly is an information system? How does it work? What are its people, organization, and technology components? How will a four-step method for business problem solving help you solve information system-related problems? How will information systems affect business careers, and what information systems skills and knowledge
Words: 15330 - Pages: 62
| | | | | | |Hyun Hwang, Rhett Kikuyama and Danny Zeng
Words: 3902 - Pages: 16
Windows Server® 2008 FOR DUMmIES ‰ by Ed Tittel and Justin Korelc Windows Server® 2008 For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical
Words: 139691 - Pages: 559
rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 70 CHAPTER 3 1. Describe the major ethical issues related to information technology and identify situations in which they occur. 2. Identify the many threats to information security. 3. Understand the various defense mechanisms used to protect information systems. 4. Explain IT auditing and planning for disaster recovery. Ethics, Privacy, and Information Security LEARNING OBJECTIVES rain_c03_070-121hr.qxd 28-09-2009 11:25
Words: 25389 - Pages: 102
eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The
Words: 185373 - Pages: 742
Windows Server® 2008 FOR DUMmIES ‰ by Ed Tittel and Justin Korelc Windows Server® 2008 For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical
Words: 139691 - Pages: 559
smaller domestic, academic, business, and government networks, which together carry various information and services, such as electronic mail, online chat, file transfer, and the interlinked Web pages and other documents of the World Wide Web. COMMON USES OF THE INTERNET - Email, Remote access, Collaboration, File sharing, Streaming media, Voice telephony, Leisure, and Marketing. VIDEOS SHARING SITES - Video sharing refers to websites or software where a user can distribute their video clips. Some
Words: 18981 - Pages: 76