Enterprise Information System Quiz
16 Questions
0 Views

Enterprise Information System Quiz

Created by
@DiversifiedFern

Questions and Answers

What is the primary purpose of protocols in an enterprise information system (EIS)?

  • To store data safely and securely.
  • To dictate who has access to data.
  • To provide step-by-step instructions for implementing rules. (correct)
  • To determine the responsibilities of data privacy.
  • Which of the following is NOT a rule that should be established for an enterprise information system?

  • How will data be visually represented in reports? (correct)
  • How will the data be protected from unauthorized access?
  • How should data be used?
  • Who will be responsible for ensuring data protection?
  • Which type of protocol defines how computers and digital devices communicate with each other?

  • Access control protocols.
  • Data storage protocols.
  • Communication protocols. (correct)
  • Step-by-step protocols.
  • In an EIS, what role do managers primarily serve?

    <p>Part of the data-driven strategy and decision-making process.</p> Signup and view all the answers

    Which of the following best describes the role of human beings in an EIS?

    <p>Stakeholders and decision-makers involved in information flow.</p> Signup and view all the answers

    What kind of risks might protocols help to identify in data storage?

    <p>Operational and compliance risks.</p> Signup and view all the answers

    What is an example of a protocol that facilitates data exchange between devices?

    <p>HTML.</p> Signup and view all the answers

    Which statement about the role of protocols in an EIS is accurate?

    <p>Protocols can include technical specifications for device communication.</p> Signup and view all the answers

    What does hardware refer to in the context of an Enterprise Information System?

    <p>Any physical object that collects, creates, uses and/or distributes data</p> Signup and view all the answers

    What is the primary purpose of a private network within an organization?

    <p>To allow computers to share data directly with each other</p> Signup and view all the answers

    Why do some experts argue about what constitutes hardware in an EIS?

    <p>Some devices may not have a digital component</p> Signup and view all the answers

    How do organizations typically handle numerous workstations to facilitate data sharing?

    <p>By creating a private network for interconnected devices</p> Signup and view all the answers

    Which of the following is NOT considered hardware in the context of an EIS?

    <p>A database management software</p> Signup and view all the answers

    What is a misunderstanding regarding the definition of hardware in an EIS?

    <p>All physical objects can be classified as hardware</p> Signup and view all the answers

    What may lead to the obsolescence of debates about hardware definitions in the future?

    <p>Integration of digital elements in almost all physical objects</p> Signup and view all the answers

    What is one of the main characteristics of computers in an organization’s EIS?

    <p>Computers are part of a larger network for data access and sharing</p> Signup and view all the answers

    Study Notes

    Enterprise Information System (EIS) Rules

    • Access management is crucial: Define who will receive access to the data and how it will be accessed.
    • Guidelines on data usage must be established.
    • Implement protections against unauthorized access to data.
    • Ensure data privacy by outlining specific measures.
    • Assign responsibility for data protection and privacy to designated individuals or groups.

    Protocols in EIS

    • Protocols provide a step-by-step guide on implementing EIS rules, akin to a cooking recipe.
    • They detail the procedure for tasks such as data storage, including initial steps, precautions, and communication requirements.
    • Second meaning of protocols involves standardized instructions for digital devices to communicate and exchange data effectively.
    • Common examples include protocols like HTTP, FTP, and TCP/IP, used for web and network communications.

    Human Roles in EIS

    • Stakeholders include customers, employees, suppliers, and investors, all of whom are integral to the system.
    • Managers utilize data-driven strategies and decisions within the EIS framework.
    • Specific roles focus on planning, designing, maintaining, and controlling the EIS.

    Hardware in EIS

    • Definition: Hardware includes any physical component that collects, creates, uses, and/or distributes data within an EIS.
    • There is debate on whether certain non-digital objects (like ovens or cars) qualify as EIS hardware.
    • With the rise of the Internet of Things, most physical objects are expected to have digital capabilities, rendering the distinction less relevant.

    Computer Networks in EIS

    • Organizations typically operate multiple computers, requiring effective data sharing and resource usage.
    • Workstations need regular file sharing, shared resource access (like printers), and continuous data updates.
    • Establishing a private network allows organizations to connect their computers directly, facilitating internal data sharing without public internet dependency.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on the rules and protocols of Enterprise Information Systems (EIS). This quiz covers crucial aspects such as data access, usage, and protection measures. Ensure you're familiar with the best practices in data privacy and responsibility within EIS frameworks.

    More Quizzes Like This

    Use Quizgecko on...
    Browser
    Browser