Describe the major functions of the is department

Assignment Help Management Information Sys
Reference no: EM131503922

Course eTextbook Kroenke, D. (2015). Using MIS 2014 [VitalSource Bookshelf version] (7th ed.).

Discussion VII need asap late 200 words min

Outsourcing can appear too good to be true, and some of the benefits of outsourcing can be outweighed by its long-term costs. Conduct some research on the advantages and disadvantages of outsourcing. Using what you learned from your research, discuss an example of how the benefits of outsourcing are outweighed by its long-term costs.

Reply to below 200 words min

The benefits of outsourcing are outweighed by its long-term costs. An example of how benefits of outsourcing are outweighed by its long-term costs is the outsourcing of iPhone to South Asian countries. The main benefit was a lower cost of manufacturing but the long-term cost was that the technology of iPhone was exposed to foreign manufacturers.

These companies made similar products that were comparable to the iPhone. A large part of the market for smartphones was appropriated by foreign companies. Further, when a product manufacturing is outsourced, hidden costs creep in. In the case of iPhone, the result is.

Unit VII Assessment late need asap

Question 1 : In an IS department, the ____________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media.

operations

technology

development

manufacturing

Question 2 : Every IS user has a right to a secure computing environment. This means that:

The organization should protect his/her computer and its files

The user should solely be in charge of protecting the organization's computers and files

The user should inform the IS about software upgrades

The user will never face a network problem

Question 3 : The responsibilities of a ____________ include advising the chief information officer, executive group, and project managers on emerging technologies.

technical writer

chief financial officer

system analyst

chief technology officer

Question 4 :  A ____________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans.

system analyst

business analyst

user support representative

systems auditor

Question 5 : The purpose of the ____________ group is to protect data and information assets by establishing data standards and data management practices and policies.

data administration

data warehousing

data mining

data communication

Question 6 : Describe the major functions of the IS department.

Your response should be at least 200 words in length.

Question 7 : Describe any four rights of users of information systems.

Your response should be at least 200 words in length.

Unit VIII Discussion Board

Reply with min 200 words

Identify an assignment in this course that had a positive impact on you. How will you be able to apply the skills you learned from it to gain life and/or career success?

Respond to below min 200 words

An assignment in this course that had a positive impact on me would be the last assessments regarding safety policies and security incidents. Being in human resources and being responsible for creating and implementing policies, having a better understanding on how to protect the information system as well as give direction to users is very useful.

Also, having knowledge of how information systems work and would could affect them, I can create policies and procedures to help the organization. In addition, having a better understanding of how implementing a new system works, I can assist with the staffing to help make it successful.

Unit VIII Assessment

Question 1 : A ____________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.

target

vulnerability

threat

key escrow

Question 2 : ____________ is the term used to denote viruses, worms, and Trojan horses.

Malware

Cookie

Firewall

Spam

Question 3 : Which of the following is an example of a sniffing technique?

IP spoofing

Caches

Denial of service

Adware

Question 4 : A(n) ____________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

intrusion detection system

keylogger

botnet

access control system

Question 5 : When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ____________ .

unauthorized data disclosure

incorrect data modification

faulty services

loss of infrastructure

Question 6 : Define threat, vulnerability, safeguard, and target. Support your answer with examples.

Your response should be at least 200 words in length.

Question 7 : Explain what is meant by security policy and describe the basic information that a security policy must stipulate.

Your response should be at least 200 words in length.

Unit VIII Research Paper

Utilizing the unit lessons, textbook, Online Library, and other outside sources, write a two-page (not including title and reference pages) Research Paper identifying the key components of information systems management discussed throughout this course.

Provide a description of an organization you are familiar with (possibly a company you have worked for in the past or are currently working for) and describe briefly what services they contribute.

Then, select three out of the six questions below, and provide detailed answers, supporting those answers by referencing any sources used. Be sure to use examples from your research to strengthen your argument as needed.

• What personal knowledge management tools does this organization utilize?

• What steps has this organization taken in securing their information and knowledge?

• What has this organization done to gain and sustain an advantage over their competitors?

• Describe in detail how this organization manages the components of its IT infrastructure.

• In what ways does the organization demonstrate successful collaboration?

• Identify at least two types of hardware and two types of software used by this organization.

APA rules for formatting, quoting, paraphrasing, citing, and listing of sources are to be followed.

Reference no: EM131503922

Questions Cloud

Personal and professional development goals : How will this (MBA) degree assist you in reaching your personal and professional development goals?
Basic organizational behavior models of individual : Analyze the relationship between the basic organizational behavior models of individual, group, and organizational processes, and the productivity.
Would you place emphasis on particular financial statement : If you were an investor, would you place more emphasis on any one particular financial statement? Explain your answer.
Assignment-transfer pricing decisions : As a manager, you may be tasked with making recommendations as to how your organization should structure its transfer pricing.
Describe the major functions of the is department : xplain what is meant by security policy and describe the basic information that a security policy must stipulate. Describe the major functions of the IS dept.
Explain how hr function relate to organizational development : Create a 400-500-word paper that explains how human resource functions relate to organizational development.
Calculating variances and analyzing the results : While many organizational costs can be planned for, the actual results may vary from the initial projections.
Evaluation of macroeconomic performance of australia : Critically analyse and evaluate the macroeconomic performance of Australia - Evaluation of Macroeconomic performance of Australia.
Identify empirical research studies in area of leadership : Assignment: Empirical Research- This assignment will help you locate and identify empirical research studies in the area of leadership ethics.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd