MANAGEMENT INFORMATION SYSTEMS LOOSELEAF
16th Edition
ISBN: 9780135205518
Author: LAUDON
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 8, Problem 3RQ
Explanation of Solution
General Controls:
- The general controls govern the security, design, computer program usage and data file security throughout Information Technology (IT) infrastructure of organization.
- It applies to all applications that are computerized, it consist of combination of software, hardware as well as manual procedures.
- It creates an overall environment of control.
Types of general control:
- Software controls:
- It monitors usage of system software.
- It prevents unauthorized access and usage of system software, software programs and computer programs.
- Hardware controls:
- It ensures physical security for computer hardware.
- It checks for any malfunction in equipment.
- It makes provision for back up as well as continued operation for maintaining constant service...
Explanation of Solution
Application Controls:
- Application controls denote specific controls that are exclusive to each application.
- It includes both manual as well as automated procedures.
- It ensures that authorized data is been processed by application.
Types of application control:
- Input controls:
- It checks data for correctness as well as completeness while they go in system...
Explanation of Solution
Risk assessment function:
- A risk assessment would determine risk level to firm if an explicit activity is not controlled properly.
- The information assets value, vulnerability point, likely problem frequency and damage potential can be determined by business managers.
- Controls could be added or adjusted to focus on greater risk areas.
- Security risk analysis would involve determination of what is needed to be protected and the manner to protect.
- It denotes an examining process for risks of firm and ranking for those risks by severity level...
Explanation of Solution
Security policy, Acceptable use policy and Identity management:
- A security policy denotes ranking of information risks, identification of acceptable goals of security as well as identification of
mechanism to achieve goals.- It drives policies that determine acceptable information resource usage of firm.
- It determines access details of company’s information assets.
- An acceptable use policy denotes acceptable uses of resources of firm and equipment for computing.
- It includes desktop, laptop, wireless devices, Internet and telephones.
- It clarifies privacy, responsibility of user as well as personal usage for company equipment policies...
Explanation of Solution
Information systems audit promoting control and security:
Information system auditing determines effectiveness of information system security as well as control.- A Management Information System (MIS) audit would ident...
Expert Solution & Answer

Want to see the full answer?
Check out a sample textbook solution
Students have asked these similar questions
Need help with this in python!
Need help with this in python!
Help! How do I turn the flowchart that searches for a name in an array of names into structured and spaced pseudocode?
Chapter 8 Solutions
MANAGEMENT INFORMATION SYSTEMS LOOSELEAF
Ch. 8.2 - Prob. 1.1CQCh. 8.2 - Prob. 1.2CQCh. 8.2 - Prob. 1.3CQCh. 8.4 - Prob. 2.1CQCh. 8.4 - Prob. 2.2CQCh. 8.4 - Prob. 2.3CQCh. 8.4 - Prob. 2.4CQCh. 8 - Prob. 1IQCh. 8 - Prob. 2IQCh. 8 - Prob. 3IQ
Ch. 8 - Prob. 4IQCh. 8 - Prob. 5IQCh. 8 - Prob. 1RQCh. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - Prob. 7DQCh. 8 - Prob. 8HMPCh. 8 - Prob. 9HMPCh. 8 - Prob. 11HMPCh. 8 - Prob. 12CTPCh. 8 - Prob. 13CSQCh. 8 - Prob. 14CSQCh. 8 - Prob. 15CSQCh. 8 - Prob. 16CSQCh. 8 - Prob. 17MLMCh. 8 - Prob. 18MLM
Knowledge Booster
Similar questions
- The mail merge process has ____ steps. Question 19Select one: a. five b. six c. seven d. eightarrow_forwardIf you created a main document based on an existing document entitled "Confirmation Letter," what default filename would Word give the main document? Question 14Select one: a. Confirmation Letter-1 b. Confirmation Letter-merge c. Document1 d. MergedDocument1arrow_forwardClick the ____ option button in the Mail Merge task pane to use an Outlook contact list as a data source for a merge. Question 11Select one: a. Use Outlook contacts list b. Select from Outlook contacts c. Select Contacts d. Mail Merge Recipientsarrow_forward
- A(n) ____ cannot be selected as the document type in the Mail Merge task pane. Question 9Select one: a. Letter b. Directory c. Fax d. E-mail messagearrow_forwardConsider a Superstore Database which consists of 3 tables, Orders, Returns, and Managers. The CSV files have been provided along with this DOC file in the Midterm 2 Link in the Moodle. Answer the questions as below: Use the created table as in the provided SQL query file, solve the problems as mentioned below. You will have to import the respective CSV files of the above created tables as without them, it is impossible to solve the questions below. If you are not able to upload the files successfully, do not leave the query questions. Just write the query to the best of your knowledge. Do not copy. To be graded for the screenshot answer, you must upload the CSV properly and paste the resulting screenshot of the queries as asked. Write Query to Find out which Product Sub-Category has a sum of Shipping Cost to sum of Sales ratio > 0.03.arrow_forwardI need to render an image of a car continuously for a smooth visual experience in C# WinForms. It gets the location array (that has all the x,y of the tiles it should visit) from another function - assume it is already written.arrow_forward
- write c program with features: Register a Bunny: Store the bunny's name, poem, and initialize the egg count to 0. Modify an Entry: Change the bunny's poem or update the egg count. Delete a Bunny: Remove a registered bunny from the list. List All Bunnies: Display all registered bunnies and their details. Save & Load Data: Store bunny data in a file to persist between runs. Use a struct to represent a bunny contestant. Store data in a binary file (bunnies.dat) for persistence. Use file I/O functions (fopen, fwrite, fread, etc.) to manage data. Implement a menu-driven interface for user interaction.arrow_forwardHelp, how do I write the pseudocode for the findMean function and flowchart for this?arrow_forwardNeed help drawing a flowchart for the findMax function herearrow_forward
- Need help writing the pseudocode for the findMin function with attachedarrow_forwardCreate a static function in C# where poachers appear and attempt to hunt animals. It gets the location of the closest animal to itself. Take account of that the animal also move too, so it should update the closest location (x, y) everytime it moves to a new location. Use winforms to show the movements of poachers.arrow_forwardCreate a static function in C# where poachers appear and attempt to hunt animals. It gets the location of the closest animal to itself. Take account of that the animal also moves too, so it should update the closest location (x, y) everytime it moves to a new location. Use winforms to show to movementsarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education

Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education

Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON

Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON

C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON

Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning

Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education