
Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 11.5, Problem 11.4ARQ
Explanation of Solution
User rights:
- Computer hardware and
programs that are required to perform your job proficiently.- User has the right to access all the resources like computer hardware and programs required, to complete his/her tasks successfully.
- Reliable network and internet connections:
- Users have the right to use the reliable network connection which means there will be no problems while using it.
- A secure computing environment:
- Organization should take care about the security issues of the user’s computer and files. It should ask users to take the actions required to protect the files, if required.
- Protection from viruses, worms, and other threats:
- It’s the organization’s duty to take care about the safety of the user’s files and computer. Thus, it is user’s right to have their files and computer protected from the viruses, worms, and other threats.
- Contribution to requirements for new system, features and functions:
- Users have the right to participate in the meetings conducted to discuss about the new system requirements. If not directly then through a delegate.
- Reliable systems development and maintenance:
- Users have a right to have reliable systems development and maintenance. They can experience schedule slippage for a month or 2 but need not face it for 6 months or more. This shows the incompetent systems development.
- Prompt attention to problems, concerns, and complaints:
- Users have the right to receive immediate response towards the problems and concerns from the organization. If not directly, then the users should be provided with some means through which they can report the issues or at least get their complaints registered in IS department.
- Properly prioritized problem fixes and resolutions:
- Users can have their problems get resolved with established priorities.
- Effective training:
- Users have the right to get trained in the organization so that they can perform the particular task they want to do. Organization should train the users in a format and on a schedule that is suitable for the user.
User responsibilities:
- Learn basic computer skills:
- Users have the responsibility to have the basic computer skills. They cannot expect hand-holding for basic operations.
- Learn standard techniques and procedures for the applications and use:
- Users should learn the techniques and procedures required to use the applications...
Expert Solution & Answer

Want to see the full answer?
Check out a sample textbook solution
Students have asked these similar questions
using r language
show all the work
answer question 3
Chapter 11 Solutions
Using MIS (10th Edition)
Ch. 11.2 - Prob. 1MDQCh. 11.2 - Prob. 2MDQCh. 11.2 - Prob. 3MDQCh. 11.2 - Prob. 4MDQCh. 11.2 - Prob. 5MDQCh. 11.3 - Prob. 1EGDQCh. 11.3 - Prob. 2EGDQCh. 11.3 - Prob. 3EGDQCh. 11.3 - Prob. 4EGDQCh. 11.5 - Prob. 1SGDQ
Ch. 11.5 - Prob. 2SGDQCh. 11.5 - Prob. 3SGDQCh. 11.5 - Prob. 4SGDQCh. 11.5 - Prob. 11.1ARQCh. 11.5 - How do organizations plan the use of IS? Explain...Ch. 11.5 - Prob. 11.3ARQCh. 11.5 - Prob. 11.4ARQCh. 11.5 - Prob. 11.5ARQCh. 11 - Prob. 11.1UYKCh. 11 - Prob. 11.2UYKCh. 11 - Prob. 11.3UYKCh. 11 - Prob. 11.8CE11Ch. 11 - Prob. 11.11CS11Ch. 11 - Prob. 11.12CS11Ch. 11 - Prob. 11.13CS11Ch. 11 - Prob. 11.14CS11Ch. 11 - Prob. 11.15CS11Ch. 11 - Prob. 11.16CS11Ch. 11 - Prob. 11.17CS11Ch. 11 - Prob. 11.18MML
Knowledge Booster
Similar questions
- List down the strenghts and weaknesses of your team project for Capsim Simulation? Explan.arrow_forwardCapsim Team PowerPoint Presentations - Slide Title: Key LearningsWhat were the key learnings that you discovered as a team through your Capsim simulation?arrow_forwardWrite the SQL code that permits to implement the tables: Student and Transcript. NB: Add the constraints on the attributes – keys and other.arrow_forward
- Draw an ERD that will involve the entity types: Professor, Student, Department and Course. Be sure to add relationship types, key attributes, attributes and multiplicity on the ERD.arrow_forwardDraw an ERD that represents a book in a library system. Be sure to add relationship types, key attributes, attributes and multiplicity on the ERD.arrow_forward2:21 m Ο 21% AlmaNet WE ARE HIRING Experienced Freshers Salesforce Platform Developer APPLY NOW SEND YOUR CV: Email: hr.almanet@gmail.com Contact: +91 6264643660 Visit: www.almanet.in Locations: India, USA, UK, Vietnam (Remote & Hybrid Options Available)arrow_forward
- Provide a detailed explanation of the architecture on the diagramarrow_forwardhello please explain the architecture in the diagram below. thanks youarrow_forwardComplete the JavaScript function addPixels () to calculate the sum of pixelAmount and the given element's cssProperty value, and return the new "px" value. Ex: If helloElem's width is 150px, then calling addPixels (hello Elem, "width", 50) should return 150px + 50px = "200px". SHOW EXPECTED HTML JavaScript 1 function addPixels (element, cssProperty, pixelAmount) { 2 3 /* Your solution goes here *1 4 } 5 6 const helloElem = document.querySelector("# helloMessage"); 7 const newVal = addPixels (helloElem, "width", 50); 8 helloElem.style.setProperty("width", newVal); [arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781305627482Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781285196145Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos CoronelPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage LearningA+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning

Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning

Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781285196145
Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos Coronel
Publisher:Cengage Learning

Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,

Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning

A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,

Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning