Information Systems Mid Term Study Questions

In: Business and Management

Submitted By dbnolimit
Words 652
Pages 3
Information Systems Mid Term Study
Questions



1.
Discuss the changes in the business environment brought about by technology in the last five years.
Use Table 1-1 and your own personal experiences to formulate your answer. 2.
Discuss the tools and technologies for collaboration and teamwork that are available and how they provide value to an organization. 3.
Discuss the personal and professional implications of so much individual data being gathered, stored, and sold. Should businesses be allowed to gather as much as they want?
Should individuals have more control over their data that are gathered? 4.
Describe the five technology drivers of the infrastructure evolution. Which do you think has been the most influential in helping us achieve the level of technology we enjoy today? 5.
Use your imagination and come up with ideas of how your organization or company can use a wireless network. What current processes will you have to change to incorporate your idea? 6.
Discuss the elements of a good security policy that every business should have.

The elements of a good security policy that every business should cover are acceptable use, user authorization, and authorization management systems. The security policy should include statements ranking information risks, identify acceptable security goals, and identify mechanisms for achieving the goals. The policy should describe who generates and controls information, what existing security policies are in place to protect information, what level of risk is management willing to accept for each asset, and estimates of how much it will cost to achieve an acceptable level of risk.

* Acceptable Use Policy: defines acceptable uses of the company’s information resources and computing equipment, networks, telephone, and associated resources.…...

Similar Documents

Health Care Information Systems Terms

...Health Care Information Systems Terms Define the following terms. Your definitions must be in your own words; do not copy them from the textbook. After you define each term, describe in 40 to 60 words the health care setting in which each term would be applied. Include at least two research sources to support your position—one from the University Library and the other from the textbook. Cite your sources in the References section consistent with APA guidelines. |Term |Definition |How Used in Healthcare | |Health Insurance Portability and |Sets of establish guidelines and |It is used in health care organizations to | |Accountability Act (HIPAA) |limitations to prevent personal and health |assist on the safe guarding of patient | | |information from being openly disclosed to |information and assuring confidentiality by| | |unauthorized individuals. It was |implementing rules and regulations in how | | |established in 1996 to accommodate and |to properly handle patient’s medical and | | |regulate the unprecedented growth in the |personal records. | | |use of medical digital information.......

Words: 1126 - Pages: 5

Health Care Information System Terms

...Health Care Information Systems Terms Define the following terms. Your definitions must be in your own words; do not copy them from the textbook. After you define each term, describe in 40 to 60 words the health care setting in which each term would be applied. Include at least two research sources to support your position—one from the University Library and the other from the textbook. Cite your sources in the References section consistent with APA guidelines. |Term |Definition |How It Is Used in Health Care | |Health Insurance Portability and |The Health Insurance Portability and |Health Insurance Portability and | |Accountability Act |Accountability Act (HIPAA) was put into |Accountability Act (HIPAA) is used to | | |place in 1996 to protect patient's medical |protect patient's medical records orally | | |information whether in oral form or written|and verbally as well as protects their | | |form. HIPAA does not only protect patients'|information from being used without their | | |medical information but it also ensures |consent. HIPAA also protects individuals in| | |that their information is not used......

Words: 894 - Pages: 4

Health Care Information Systems Terms

...Health Care Information Systems Terms HCS/483 June 3, 2013 University of Phoenix Health Care Information Systems Terms Health Insurance Portability and Accountability Act (HIPAA) - HIPAA is the federal legislation signed in 1996 to protect all patients’ medical records with privacy guidelines that are seen by health care professionals. It also gives patients more control over their medical records. The Health Insurance Portability and Accountability Act are used mainly to protect patient information in a health care setting. HIPAA is also used to reduce fraud and abuse from health care professionals. If HIPAA regulations are not met the consequences could be great. Electronic medical record (EMR) – An EMR is an electronic record of an individual’s health information that is generated, assembled, and managed by those who are authorized physicians and other staff from a health care facility. Electronic medical records are used in a health care facility to record patient information such as patient identification, insurance information, visits, diagnosis, and labs. EMR’s can be accessed easily, and there is no need for paper files. EMR’s can be accessed by portable devices like a tablet. Electronic health record (HER) – An electronic record of an individual’s health information that is generated, assembled, and managed by authorized physicians and other health care professionals between several health care facilities. Electronic health care are used in......

Words: 938 - Pages: 4

Acc543 Mid Term/Final Study Guide

...ACC/543 Sample Questions for Midterm and Final Examinations The sample exam below is a representation of the Midterm and Final Examinations your students will take in Weeks Three and Six of this course. As in the sample exam below, the Midterm and Final Examinations will include questions that assess the course objectives. Although the sample exam contains one question per objective, the Midterm and Final Examinations will contain three questions per course objective. Refer to the questions in the sample exam below as a representation of the type of questions your students will be asked in the Midterm and Final Examinations. Refer your students to the weekly readings and content outlines for each week as study references for the final exam. The questions contained in the Sample Examination, Midterm and Final Examinations were selected from Operations Management for Competitive Advantage, Fundamental Financial & Managerial Accounting Concepts, and Business Law: Legal Environment, Online Commerce, Business Ethics, and International Issues. Week One: Managerial Accounting and Capital Budgeting Objective: Determine the present value of future cash flows from an investment. 1. Torvald's Hardware paid a contractor $45,000 to expand the store. The investment increased annual cash inflows by $8,000 per year six years. Torvald's has a desired rate of return of 10%. The net present value of this investment is which of the following? (round to the nearest dollar) A) ......

Words: 2448 - Pages: 10

Information Systems Study Guide

...MIS535 Final Exam Study Guide YOU MAY WANT TO PRINT THIS GUIDE. 1. The final exam is "open book, open notes." The maximum time you can spend in the exam is 3 hours, 30 minutes. If you have not clicked the Submit For Grade button by then, you will be automatically exited from the exam. In the final exam environment, the Windows clipboard is disabled, and so you still will not be able to copy exam questions or answers to or from other applications. 2. You should click the Save Answers button in the exam frequently. This helps prevent connection timeouts that might occur with certain Internet Service Providers, and also minimizes lost answers in the event of connection problems. If your internet connection does break, when you reconnect you will normally be able to get back into your final exam without any trouble. Remember, though, that the exam timer continues to run while students are disconnected, so students should try to re-login as quickly as possible. The Help Desk cannot grant any student additional time on the exam. 3. See Syllabus "Due Dates for Assignments & Exams" for due date information. 4. Reminders: * You will only be able to enter your online Final Exam one time * Click the "Save Answers" button often * If you lose your Internet connection during your Final Exam, logon again and try to access your Final Exam. If you are unable to enter the Final Exam, contact first the help desk and then your instructor. * You will always be......

Words: 1170 - Pages: 5

Examples of Possible Mid-Term Questions

...EXAMPLES OF POSSIBLE MIDTERM QUESTIONS (These are not the actual midterm questions) 1. You would like to speculate on the rise in the price of a certain stock. The current stock price is $87 and a three month call with a strike price of $90 costs $8.70. You have $17,400 to invest. Identify two alternative strategies, one involving stocks, the other involving options. Briefly identify the advantages and disadvantages of each. (10 marks) 2. A US company expects to have to pay GBP sterling 1 million in six months. a. What are the advantages and disadvantages of hedging the exchange rate risk with forward contracts, futures contracts and options. (10 marks) b. If the value of the dollar falls rapidly over the next six months relative to GBP sterling, which one of these three would turn out to be better and best, and why? (10 marks) 3. Annualized U.S. and U.K. spot interest rates for a six-month horizon are 4.5% and 5.5% per annum respectively. The spot foreign exchange rate for converting pound sterling to dollars is $2.00 per pound sterling. What will be the forward exchange rate in dollars/pound for a forward contract maturing six months later? (10 marks) 4. Options Trading Strategies a. Explain how a long stock and long put strategy equals the cash flow from a long call strategy. (5 marks) b. Why is a straddle position considered a speculation on the asset’s volatility? (5 marks) c. Can a butterfly spread ever be constructed to have zero initial premium? Why or......

Words: 504 - Pages: 3

Nt1210 Mid-Term Study Guide

...1. nibble, byte, word, double word- define 2. how does the RAM know when its on and off, full and half 3. converting binary’s 4. how are the tracks and setctors separated on a hard drive 5. pg 12 adding binary 6. Read about file systems 7. Video compression and what is it for 8. 9. Internet core 10. How do you define a network (more than one computer) 11. Topologies (bus,ring,star,and mesh) 12. Networking standards 13. Defacto standards vs vendor standards vs vendor group standards 14. Tcp/ip 15. Open networking model and the osi model 16. Ip routing 17. Pg 136 authors note 18. Frame and packet 19. IP addressing 20. IP addressing 21. Physical layer, layer 1 of the OSI model 22. Lab 3.1.1 (wouldn’t be able to communicate) 23. Data link layer 24. LAN vs WAN 25. Different between ac and dc currents 26. Difference between the circitury and node 27. Full duplex vs half duplex 28. Sending data through electricity foucusing on sound waves 29. RJ 45 connectors 30. Fiber optics 31. The wireless standards 32. CSMA CSCA 33. When you have a fiber optic cable and two buildings, which would you use single mode or multi mode? Multi mode 34. Copper cable and standards. (EMI) 35. Two types of utp cable a and b, cross over and straight cable 36. Max distance for UTP cables (100M) 37. FORFIT! 38. What is trouble shooting bottom up......

Words: 366 - Pages: 2

Mid Term Study Guide

...Midterm Study Guide Chapter 1 1. What is an action that could damage an asset? Threat 2. Which law requires all types of financial institutions to protect customers’ private financial information? 3. An AUP is part of a layered approach to security and it supports confidentiality. What else supports confidentiality? Data Classification Standards 4. A(n) _____________ is a detailed written definition of how software and hardware are to be used. standard 5. True or False: A guideline is a common type of data classification standard. False 6. A(n) __________ is the likelihood that something bad will happen to an asset. Risk 7. Which domain of a typical IT infrastructure includes cabling, servers, and wireless access points? LAN 8. Which domain of a typical IT infrastructure includes Wi-Fi hotspots, smartphones, and virtual private network connections? Remote Access 9. In which domain of a typical IT infrastructure do service level agreements (SLAs) figure prominently? WAN 10. A(n) _____________ is a weakness that allows a threat to be realized or to have an effect on an asset. Vulnerability 11. True or False: An earthquake is considered a threat rather than a risk. True 12. True or False: Losing Data is considered a threat rather than a risk. False 13. True or False: A financial organization failing to comply with federal regulations is considered a threat rather than a risk. False ...

Words: 4175 - Pages: 17

Accounting Information System Questions

...of custom menus and so you recommend using KDE, which does. 11 2. Once in a while after your system has been improperly shut down, such as during a power outage, it reboots into the command line. After you log in, what command can you use to start XWindow and your desktop? a. gui b. xwin c. startx d. run gui 3. You want to delete several old files in your home directory.Which of the following is a good tool to use for this purpose in GNOME? a. Nautilus b. System Tray c. My Computer d. GNUFile 4. Which of the following is a good tool to use for finding and deleting files in KDE? (Choose all that apply.) a. KFiler b. Kabinet c. Knop d. Konqueror 5. Which of the following areWindow Managers that can be used with XWindow? (Choose all that apply.) a. fvwm b. sawfish c. kwm d. Window Maker 6. A new inventory specialist in your company inherited a computer that has KDE installed, but the operating system boots into the command line instead of starting KDE automatically.What can the inventory specialist do to have her computer go into KDE automatically at startup? a. Press Ctrl+g while the system is booting. b. Press Alt+g while the system is booting. c. Change the .bashrc file to contain the ./KDE command. d. Edit the /etc/inittab file to have the line id:5:initdefault:. 7. Which of the following would you find in the Kicker in KDE by default? (Choose all that apply.) a. applets b. system monitor button c. network connect launcher d. K Menu 8. The colleague at the desk next to......

Words: 1397 - Pages: 6

Study Guide for Mid-Term

...A brief study guide for the final exam I. Week 2 (quizlet) 1. According to Michael Porter, * Why is operational effectiveness a necessary but insufficient condition for a firm’s superior performance? * What is strategic positioning? Performing different activities from rivals' or performing similar activities in different ways. * What are the three ways to position a firm? * Why is it not easy for a firm to switch strategic positions? 2. What are the two measures of a firm’s performance? 3. What is ROIC? * Equity & debt 4. What are the two components of a shareholder’s value? 5. Why is profit growth important to capital appreciation? 6. What is the definition competitive advantage? 7. What is strategic intent? * What are the layers of advantages accumulated by firms with strategic intent? * Who are to blame for the failures of some established firms? II. Week 3 (quizlet) 8. What is emergent strategy? 9. What is Autonomous Action? 10. According to Daniel Goleman, what are the three personal capabilities that affect managers’ performance? Which one is the most important? 11. What are the five components of Emotional Intelligence? 12. Questions from Jack Welch’s DVD: * What is the 20/70/10 annual evaluation rule? * What is the core competence......

Words: 536 - Pages: 3

Mktg Mid-Term Study Guide

...MKTG 6523 Mid-Term Exam Study Guide 9. Know the definition of a supply chain. A supply chain is a set of three or more organizations linked directly by one or more of the upstream or downstream flows of products, services, finances, and information from a source to a customer. It is important to acknowledge that anytime business is conducted a supply chain will exist. (The book says a supply chain is a subset of the value chain but the professor comments that he is not convinced that they are different) 10. Know the advantages and disadvantages of purchasing from overseas suppliers. * Advantages: Cost/Price Benefits, Access to Technology, Quality, Access to the Only Source Available, introduce competition to domestic suppliers, react to buying patterns of competitors, Establish a market presence in another country * Disadvantages: Lack of Skills, Resistance to change, Longer Lead times, Customs languages and culture, currency fluctuations, increased supply risk 11. Know what “sustainability” means in a business context. Business sustainability is often defined as managing the triple bottom line - a process by which companies manage their financial, social and environmental risks, obligations and opportunities. These three impacts are sometimes referred to as profits, people and planet. Building that strategy begins with looking closely and thoughtfully at the business, then using what is learned to operate for long-term success meeting the company's current......

Words: 1069 - Pages: 5

Nt2670 Mid Term Study

...NT2670 Midterm Study Two basic types of computers that can be on an enterprise network are ____________. Which of the following roles enables users working at another computer on the company network or on the Internet to establish a connection to a server and open an application or desktop session there? Terminal Services By using the Server Core installation option of Windows Server 2008, you get a stripped-down version of the operating system that shows a single window with a command prompt. The ServerManagerCmd.exe utility provides a command prompt alternative to Server Manager and can be used to install roles and features from scripts or batch files. You must activate Windows Server 2008 computers within 30 days of installing them. The Add Roles Wizard provides roles that fall into three basic categories: Directory services, Application services, and Infrastructure services. Which of the following correctly identifies the HTTP binding options available? IP address, Port Number, Host Header What is the original default filename for the Web? Index.html FTP7 can use SSL to encrypt its authentication traffic before transmission. IIS7 uses a generic request pipeline that is modular in nature. The component that manages the request pipeline, the server’s application pools, and the worker processes is called WPAS-Windows Process Activation Service. Which feature of IIS7 enables you to publish content found on different drives or different computers on a network,......

Words: 868 - Pages: 4

Health Care Information Systems Terms

...Post Week 1 Health Care Information Systems Terms HCS/483 Healthcare Information Systems - Week 1 Name: Guidelines: Please use this form to submit your assignment and NOT the one on the UOPX website. Define the following terms. Your definitions must be in your own words; do not copy them from the textbook. After you have defined each term in your own words, describe in at least 50 words the health care setting in which each term would be applied. Utilize a minimum of two research sources to support your claims—one from the University Library and the other from the textbook. Be sure to cite your sources in the References section consistent with APA guidelines. This assignment is due Week One. 1. Health Insurance Portability and Accountability Act (HIPAA) Definition This was a federal law placed to protect patient information. How Used in Healthcare HIPAA is used to safeguard and protect patient information and without the use of HIPAA, private patient information could be exposed. HIPAA is critical because it could have an effect on health care workers, patients and the health care facility as well. Violation of HIPAA laws could cause a health care worker to lose their job, it could violate a patient’s rights, and it could damage the facility’s credibility. 2. Electronic medical record Definition An electronic medical record is a computerized medical record used to store patient information. How Used in Healthcare Electronic medical......

Words: 1063 - Pages: 5

Information Systems Study

...Running Head : Information Systems Study Bandon Group, Inc. name CIS 511 – Enterprise Resource Planning February 1, 2012 Bandon Group, Inc. is currently attempting to discover how Information Technology can better support the overall missions, goals and objectives of the organization. Data is not currently integrated across the various divisions, which causes a duplication of effort, sub optimized effort and additional expense to the organization (Sumner, 2005). Company has a relatively small information Technology department. With the range of various technical solutions that have been implemented across the divisions it has become very difficult to provide data migrations, network support, and technical support and training (Sumner, 2005). Management has also determined that technical solutions need to be implemented in order to stay competitive. Several of their competitors have implemented ERP with integrated CRM solutions. Additionally their competitors have begun to implement e-Business solutions which allow for web based supply ordering, service call entry and meter click reporting (Sumner, 2005). The current technological environment of Bandon Group, Inc. is severely fragmented, which makes it virtually impossible to migrate towards an e-Business solution An ERP system facilitates database control in a company, which allows the data transfer process to be uniform and united throughout the various divisions and departments. The foremost...

Words: 742 - Pages: 3

Health Care Information System Terms

...University of Phoenix Material Health Care Information Systems Terms Define the following terms. Your definitions must be in your own words; do not copy them from the textbook. After you have defined each term in your own words, describe in 40 to 60 words the health care setting in which each term would be applied. Utilize a minimum of two research sources to support your claims—one from the University Library and the other from the textbook. Be sure to cite your sources in the References section consistent with APA guidelines. |Term |Definition |How Used in Healthcare | |Health Insurance Portability and | | According to "U.s Department Of Health And| |Accountability Act (HIPAA) |According to "What Does Hippa Stand For" |Human Services" (n.d.), the Office for | | |(2012), HIPPA stands for the Health |Civil Rights enforces the HIPAA Privacy | | |Insurance Portability and Accountability |Rule, which protects the privacy of | | |Act, enacted by the US Congress in in 1996.|individually identifiable health | | | |information; the HIPAA Security Rule, which| | ......

Words: 1436 - Pages: 6

Season 1 Episode 4 Callisto | New Amsterdam 2018 HDTV 720p AC3 5.1 | Ee Ma Yau