Informed IT User & Business Process Reengineering
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following reflects the most comprehensive advantage of being an informed user of IT?

  • Staying updated on the latest technological advancements. (correct)
  • Participating in the selection process for new organizational applications.
  • Gaining a foundational understanding of the underlying mechanisms of workplace applications.
  • Contributing insights for improving organizational applications.

A professor provides a student the number 75, without context. What does this represent?

  • Information
  • Data
  • Knowledge
  • Wisdom (correct)

A customer completing their purchase at a grocery store checkout represents a ________ that is processed by a ________.

  • transaction; TPS
  • analysis; APS
  • analysis; TPS
  • transaction; APS (correct)

Which statement inaccurately portrays the impact of Information Technology (IT) on organizational management?

<p>IT facilitates a larger span of control, enabling managers to oversee more employees. (D)</p> Signup and view all the answers

Which of the following business process initiatives is often regarded as the most challenging and extensive to implement?

<p>BPC (D)</p> Signup and view all the answers

Information-based industries face heightened susceptibility to which of Porter's five competitive forces?

<p>Threat of substitute products (B)</p> Signup and view all the answers

The requirement for banks to offer online banking services exemplifies what concept?

<p>Entry barrier (D)</p> Signup and view all the answers

The ethical approach prioritizing the greatest benefit or least harm is known as ________.

<p>Common good (E)</p> Signup and view all the answers

A student sues their school after slipping on a wet floor that wasn't marked. This scenario highlights the concept of ________.

<p>Answerability (C)</p> Signup and view all the answers

Which of the following scenarios primarily pertains to a privacy concern?

<p>What information should individuals be required to disclose about themselves? (A)</p> Signup and view all the answers

A potential danger to which an information resource may be exposed is known as a(n) ________.

<p>Risk (C)</p> Signup and view all the answers

Leaving a laptop unattended in a public space exemplifies ________ and is classified as ________.

<p>social engineering; intentional (B)</p> Signup and view all the answers

Which type of cyberattack can be launched remotely without requiring any action from the user?

<p>DoS (B)</p> Signup and view all the answers

Which of the following options functions as a method of access control?

<p>A company gate (C)</p> Signup and view all the answers

From smallest to largest, which of the following accurately represents the data hierarchy?

<p>byte, bit, field, file, record, database (C)</p> Signup and view all the answers

In the context of databases, a ________ key is utilized to establish connections between two distinct tables.

<p>foreign (B)</p> Signup and view all the answers

Knowing you'll receive a 100% match on your 401k contributions after six years, as stated in your employee handbook, represents ________.

<p>explicit information (A)</p> Signup and view all the answers

The term ________ encompasses the tangible components employed for input, processing, output, and storage activities of a computer system.

<p>Hardware (B)</p> Signup and view all the answers

Which of the following is NOT a characteristic feature of secondary storage devices?

<p>It can utilize various storage mediums. (B)</p> Signup and view all the answers

Which technology allows users to work together regardless of their physical locations?

<p>Communications (B)</p> Signup and view all the answers

Flashcards

Benefits of being an informed user of IT?

Providing input, understanding applications, keeping abreast of new technologies, and helping select new applications.

Data

Elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning.

Transaction

A record of a business event. It is processed by a Transaction Processing System.

False Statement about IT

IT does NOT reduce stress nor decrease promotional opportunities.

Signup and view all the flashcards

Business Process Reengineering (BPR)

A radical redesign approach that is often too difficult, lengthy, and comprehensive for many organizations.

Signup and view all the flashcards

Porter's Five Forces: Information Industries

Information-based industries face a high threat of new competitors due to low barriers to entry and ease of information access.

Signup and view all the flashcards

Entry Barrier

A condition that must be met to enter a market.

Signup and view all the flashcards

Utilitarian Approach

The ethical action that provides the most good or does the least harm.

Signup and view all the flashcards

Liability

Being held responsible for actions.

Signup and view all the flashcards

Privacy

Privacy issue about revealing information of oneself to others.

Signup and view all the flashcards

Threat

Any danger to which a system may be exposed.

Signup and view all the flashcards

Human Error

An unintentional mistake by a person.

Signup and view all the flashcards

Denial of Service (DoS)

A remote attack requiring no user action.

Signup and view all the flashcards

Access Control

A security measure that controls who can access a system.

Signup and view all the flashcards

Data Hierarchy (Smallest to Largest)

Bit, Byte, Field, Record, File, Database.

Signup and view all the flashcards

Foreign Key

A field in one table that refers to the primary key of another table.

Signup and view all the flashcards

Explicit Knowledge

Objective, rational, and technical policies, procedures, documentation, reports, and so on.

Signup and view all the flashcards

Hardware

The physical components of a computer system.

Signup and view all the flashcards

NOT a Characteristic of Secondary Storage?

Secondary storage is nonvolatile.

Signup and view all the flashcards

Communications

Allows users to collaborate regardless of location.

Signup and view all the flashcards

Local Area Networks (LANs)

Connects employee computers and servers within an area.

Signup and view all the flashcards

Public Clouds

Shared, easily accessible IT infrastructures available to the general public.

Signup and view all the flashcards

Machine learning

Leverages data analysis to detect and forecast fraudulent activities.

Signup and view all the flashcards

Information Agent

Software that monitors and reports on items of interest.

Signup and view all the flashcards

Tesla

Have been blamed for several fatalities.

Signup and view all the flashcards

Managing Systems Development

A traditional function of the MIS department.

Signup and view all the flashcards

Dashboards

Display timely information and direct access to structured information.

Signup and view all the flashcards

MIS Department Function

Infrastructure planning, development, and control.

Signup and view all the flashcards

Expert Systems

Attempt to duplicate the work of human experts in a specific domain.

Signup and view all the flashcards

NOT a contributor to managing information systems complexity?

Technology is getting cheaper to acquire, operate, and maintain.

Signup and view all the flashcards

Study Notes

  • Being an informed user of IT allows you to provide input to enhance your organization's applications.
  • Being an informed user of IT helps one to understand what is behind the applications used in one's organization.
  • Being an informed IT user means keeping abreast of new technologies.
  • Being an informed IT user helps in selecting new applications.
  • A number, such as 75, presented on a piece of paper, constitutes data.
  • Going through the checkout line at a grocery store represents a transaction.
  • This transaction could be processed by a Transaction Processing System (TPS).
  • IT does not reduce stress by giving managers more time to make decisions.
  • IT decreases the number of promotional opportunities.
  • IT can ultimately decrease the number of managers and experts.
  • IT makes managers more productive.
  • IT increases the number of employees who can report to a single manager.
  • Business Process Reengineering (BPR) is often considered too difficult, radical, lengthy, and comprehensive for many organizations.
  • Information-based industries are most susceptible to the threat of entry of new competitors.
  • The need to offer online banking to operate a bank is an entry barrier.
  • The utilitarian approach states that an ethical action provides the most good or does the least harm.
  • Suing a school for not marking a wet spot that led to a fall is an example of liability.
  • A privacy issue involves determining what information about oneself an individual should be required to reveal to others.
  • A privacy issue involves determining what information a person/organization has a right to obtain, under what conditions, and with what safeguards.
  • A threat to an information resource is any danger to which a system may be exposed.
  • Leaving a laptop at a desk unattended is a human error and is considered an unintentional mistake.
  • A Denial of Service (DoS) attack is a remote attack requiring no user action.
  • A firewall is an access control.
  • The correct data hierarchy from smallest to largest is: bit, byte, field, record, file, database.
  • A foreign key creates links between two tables.
  • Knowing that a company matches 100% of a 6% 401K contribution after 6 years of service, as stated in the employee handbook, exemplifies explicit knowledge.
  • Hardware refers to the physical equipment used for input, processing, output, and storage activities of a computer system.
  • Being volatile is not a characteristic of secondary storage.
  • Secondary storage is cheaper than primary storage.
  • Secondary storage can use a variety of media.
  • It takes more time to retrieve data from secondary storage than from RAM.
  • Communications software allows users to collaborate with other people over any distance.
  • Local Area Networks (LANs) allow organizations to connect employee computers and servers onto one network.
  • Public clouds are shared, easily accessible, multicustomer IT infrastructures available nonexclusively to any entity in the general public.
  • Machine learning helps predict fraud.
  • An information agent constantly observes and reports on some item of interest.
  • Self-driving cars made by Tesla have been blamed for several fatalities.
  • Managing systems development is a traditional function of the Management Information Systems (MIS) department.
  • Dashboards support all managers by providing rapid access to timely information and direct access to structured reports.
  • Infrastructure planning, development, and control is a traditional function of the MIS (Management Information Systems) department.
  • Expert Systems attempt to duplicate the work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain.
  • Technology getting cheaper to acquire, operate, and maintain does NOT contribute to the difficulty and complexity of managing information systems in modern organizations.
  • Rapidly changing technology contributes to the difficulty and complexity of managing information systems in modern organizations.
  • Increasing data volume contributes to the difficulty and complexity of managing information systems in modern organizations.
  • Complexity of systems contributes to the difficulty and complexity of managing information systems in modern organizations.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Understanding IT helps improve organizational input and application selection. Data is represented by numbers like 75 on paper. Transaction Processing Systems (TPS) handle transactions such as grocery store checkouts.

More Like This

User Management in IT and Cybersecurity
5 questions
IT Capabilities Assessment Quiz
30 questions
Internal IT User Policy Quiz
10 questions
Introduction to IT Styles
15 questions

Introduction to IT Styles

NiftyXylophone1021 avatar
NiftyXylophone1021
Use Quizgecko on...
Browser
Browser