Using MIS (10th Edition)
Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 11.5, Problem 11.4ARQ

Explanation of Solution

User rights:

  • Computer hardware and programs that are required to perform your job proficiently.
    • User has the right to access all the resources like computer hardware and programs required, to complete his/her tasks successfully.
  • Reliable network and internet connections:
    • Users have the right to use the reliable network connection which means there will be no problems while using it.
  • A secure computing environment:
    • Organization should take care about the security issues of the user’s computer and files. It should ask users to take the actions required to protect the files, if required.
  • Protection from viruses, worms, and other threats:
    • It’s the organization’s duty to take care about the safety of the user’s files and computer. Thus, it is user’s right to have their files and computer protected from the viruses, worms, and other threats.
  • Contribution to requirements for new system, features and functions:
    • Users have the right to participate in the meetings conducted to discuss about the new system requirements. If not directly then through a delegate.
  • Reliable systems development and maintenance:
    • Users have a right to have reliable systems development and maintenance. They can experience schedule slippage for a month or 2 but need not face it for 6 months or more. This shows the incompetent systems development.
  • Prompt attention to problems, concerns, and complaints:
    • Users have the right to receive immediate response towards the problems and concerns from the organization. If not directly, then the users should be provided with some means through which they can report the issues or at least get their complaints registered in IS department.
  • Properly prioritized problem fixes and resolutions:
    • Users can have their problems get resolved with established priorities.
  • Effective training:
    • Users have the right to get trained in the organization so that they can perform the particular task they want to do. Organization should train the users in a format and on a schedule that is suitable for the user.

User responsibilities:

  • Learn basic computer skills:
    • Users have the responsibility to have the basic computer skills. They cannot expect hand-holding for basic operations.
  • Learn standard techniques and procedures for the applications and use:
    • Users should learn the techniques and procedures required to use the applications...

Blurred answer
Students have asked these similar questions
If a UDP datagram is sent from host A, port P to host B, port Q, but at host B there is no process listening to port Q, then B is to send back an ICMP Port Unreachable message to A. Like all ICMP messages, this is addressed to A as a whole, not to port P on A. (a)  Give an example of when an application might want to receive such ICMP messages. (b)  Find out what an application has to do, on the operating system of your choice, to receive such messages. (c)  Why might it not be a good idea to send such messages directly back to the originating port P on A?
Discuss how business intelligence and data visualization work together to help decision-makers and data users. Provide 2 specific use cases.
This week we will be building a regression model conceptually for our discussion assignment. Consider your current workplace (or previous/future workplace if not currently working) and answer the following set of questions. Expand where needed to help others understand your thinking:  What is the most important factor (variable) that needs to be predicted accurately at work? Why? Justify its selection as your dependent variable.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781285196145
Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos Coronel
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Text book image
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning