IT Systems and Middle Managers Quiz
26 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a negative societal effect associated with the increased use of information technology?

  • IT can provide opportunities for people with disabilities.
  • IT can improve healthcare.
  • IT can provide flexibility in the workplace.
  • IT can place employees on constant call. (correct)
  • How does global outsourcing help an organization?

  • Find the best person for the job.
  • All of these (correct)
  • Implement spatial and temporal flexibility.
  • Find more economical resources.
  • What is an effect of IT on middle managers?

  • Increasing their opportunities for promotion.
  • Increasing the number of managers needed in a department.
  • Reducing the number of people who can report to them. (correct)
  • Increasing their productivity.
  • Why are systems critical to an organization's operations considered expensive?

    <p>They require high acquisition, operating, and maintenance costs.</p> Signup and view all the answers

    What is a potential downside of increased reliance on information technology in organizations?

    <p>Dependence on technology leading to reduced critical thinking skills.</p> Signup and view all the answers

    If an employer reads all the emails you send and receive despite the handbook stating work emails are for official business only, is this a legal violation?

    <p>No, it is not a legal violation.</p> Signup and view all the answers

    Is an employer legally allowed to read electronic mail and other electronic documents according to the law?

    <p>Yes, an employer has full legal rights to read all electronic communications.</p> Signup and view all the answers

    Does tagging your friends' pictures on Facebook compromise their privacy even if you have their permission?

    <p>Yes, it always compromises their privacy.</p> Signup and view all the answers

    Is using apps on your smartphone that broadcast your location to others considered a harmless act?

    <p>No, it can pose risks to privacy and security.</p> Signup and view all the answers

    Are privacy regulations consistent across different countries around the world?

    <p>No, privacy regulations vary between countries.</p> Signup and view all the answers

    What legal concept grants individuals the right to recover damages caused by other individuals, organizations, or systems?

    <p>Liability</p> Signup and view all the answers

    Which authentication method is considered less reliable and less expensive?

    <p>Multifactor authentication</p> Signup and view all the answers

    What encryption standard is commonly used for secure transactions like credit card processing and online banking?

    <p>TLS</p> Signup and view all the answers

    Which site option is the most expensive?

    <p>Hot</p> Signup and view all the answers

    What does auditing the computer involve?

    <p>Verifying processing by checking for known outputs using specific inputs</p> Signup and view all the answers

    Which relationship type exists when two entities are associated?

    <p>Binary</p> Signup and view all the answers

    In the KMS cycle, at which knowledge stage is Laurie's team when demonstrating the new process to all shipping department employees?

    <p>Disseminate</p> Signup and view all the answers

    What distinct characteristic of Big Data is NOT listed among the three mentioned?

    <p>Viscous</p> Signup and view all the answers

    Which term describes the updating of data warehouses and data marts by users?

    <p>Self-service data management</p> Signup and view all the answers

    Which action might organizations need to take to encourage employees to contribute their expertise to a KMS?

    <p>Offering rewards</p> Signup and view all the answers

    What role did Laurie play in the creation of a new process for the shipping department?

    <p>Project manager</p> Signup and view all the answers

    Which ethical approach emphasizes that an ethical action is one that best protects and respects the moral rights of affected parties?

    <p>Utilitarian</p> Signup and view all the answers

    What term describes the harm, loss, or damage that can occur if a threat compromises an information resource?

    <p>Vulnerability</p> Signup and view all the answers

    Which concept involves the collection, storage, and dissemination of information about individuals?

    <p>Accessibility</p> Signup and view all the answers

    Which approach underscores the importance of interlocking relationships in all societies?

    <p>Fairness</p> Signup and view all the answers

    When you open a suspicious email from a friend assuming it is safe, this is an example of ________ and is ________.

    <p>A human error; intentional</p> Signup and view all the answers

    More Like This

    Messages and IT Systems Quiz
    10 questions
    IT Systems and Message Exchange Quiz
    5 questions
    IT Systems and Their Flexibility
    5 questions
    Use Quizgecko on...
    Browser
    Browser