IT Systems and Middle Managers Quiz
26 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a negative societal effect associated with the increased use of information technology?

  • IT can provide opportunities for people with disabilities.
  • IT can improve healthcare.
  • IT can provide flexibility in the workplace.
  • IT can place employees on constant call. (correct)

How does global outsourcing help an organization?

  • Find the best person for the job.
  • All of these (correct)
  • Implement spatial and temporal flexibility.
  • Find more economical resources.

What is an effect of IT on middle managers?

  • Increasing their opportunities for promotion.
  • Increasing the number of managers needed in a department.
  • Reducing the number of people who can report to them. (correct)
  • Increasing their productivity.

Why are systems critical to an organization's operations considered expensive?

<p>They require high acquisition, operating, and maintenance costs. (D)</p> Signup and view all the answers

What is a potential downside of increased reliance on information technology in organizations?

<p>Dependence on technology leading to reduced critical thinking skills. (B)</p> Signup and view all the answers

If an employer reads all the emails you send and receive despite the handbook stating work emails are for official business only, is this a legal violation?

<p>No, it is not a legal violation. (D)</p> Signup and view all the answers

Is an employer legally allowed to read electronic mail and other electronic documents according to the law?

<p>Yes, an employer has full legal rights to read all electronic communications. (A)</p> Signup and view all the answers

Does tagging your friends' pictures on Facebook compromise their privacy even if you have their permission?

<p>Yes, it always compromises their privacy. (A)</p> Signup and view all the answers

Is using apps on your smartphone that broadcast your location to others considered a harmless act?

<p>No, it can pose risks to privacy and security. (A)</p> Signup and view all the answers

Are privacy regulations consistent across different countries around the world?

<p>No, privacy regulations vary between countries. (C)</p> Signup and view all the answers

What legal concept grants individuals the right to recover damages caused by other individuals, organizations, or systems?

<p>Liability (D)</p> Signup and view all the answers

Which authentication method is considered less reliable and less expensive?

<p>Multifactor authentication (C)</p> Signup and view all the answers

What encryption standard is commonly used for secure transactions like credit card processing and online banking?

<p>TLS (C)</p> Signup and view all the answers

Which site option is the most expensive?

<p>Hot (B)</p> Signup and view all the answers

What does auditing the computer involve?

<p>Verifying processing by checking for known outputs using specific inputs (B)</p> Signup and view all the answers

Which relationship type exists when two entities are associated?

<p>Binary (C)</p> Signup and view all the answers

In the KMS cycle, at which knowledge stage is Laurie's team when demonstrating the new process to all shipping department employees?

<p>Disseminate (C)</p> Signup and view all the answers

What distinct characteristic of Big Data is NOT listed among the three mentioned?

<p>Viscous (C)</p> Signup and view all the answers

Which term describes the updating of data warehouses and data marts by users?

<p>Self-service data management (C)</p> Signup and view all the answers

Which action might organizations need to take to encourage employees to contribute their expertise to a KMS?

<p>Offering rewards (C)</p> Signup and view all the answers

What role did Laurie play in the creation of a new process for the shipping department?

<p>Project manager (C)</p> Signup and view all the answers

Which ethical approach emphasizes that an ethical action is one that best protects and respects the moral rights of affected parties?

<p>Utilitarian (C)</p> Signup and view all the answers

What term describes the harm, loss, or damage that can occur if a threat compromises an information resource?

<p>Vulnerability (B)</p> Signup and view all the answers

Which concept involves the collection, storage, and dissemination of information about individuals?

<p>Accessibility (B)</p> Signup and view all the answers

Which approach underscores the importance of interlocking relationships in all societies?

<p>Fairness (B)</p> Signup and view all the answers

When you open a suspicious email from a friend assuming it is safe, this is an example of ________ and is ________.

<p>A human error; intentional (B)</p> Signup and view all the answers

More Like This

Messages and IT Systems Quiz
10 questions
IT Systems and Message Exchange Quiz
5 questions
IT Systems Management Overview
6 questions
IT Systems and Their Flexibility
5 questions
Use Quizgecko on...
Browser
Browser