The overriding, major reason for having information systems is to ____

a.
Increase managers’ confidence in their activities

b.
Make information more accessible to managers

c.
Make business decisions faster

d.
Process information faster and more accurately


a.
Increase managers’ confidence in their activities

Managers have to engage in many activities and most of them are subject to uncertainty and doubt, which increases anxiety and raises risk. Information systems make these activities more “data based”, more grounded in reality and in reason.

Computer Science & Information Technology

You might also like to view...

Consider a class that uses the following variables to implement an array-based stack:

``` String [] s = new String[100]; int top = 0; ``` a method that implements the String peek() operation can be written as A) return s[top]; B) if (top == 0) throw new RuntimeException("Underflow"); else return s[top]; C) if (top == 0) throw new RuntimeException("Underflow"); else return s[top-1]; D) return s[top-1];

Computer Science & Information Technology

An Excel ________ is a range of cells converted in Excel used to analyze a group of related data

Fill in the blank(s) with correct word

Computer Science & Information Technology

Virtually all operating systems come with tools to manage the hard disk. The vast majority of these tools are inable to read metafiles such as the $MFT file in Windows 7. Why is this?

a. The $MFT file is actually not part of the file system. b. Metafiles are database internal to the file system and are therefore locked out whenever the file system is mounted. c. While the metafiles are an integral part of the file system, the files themselves reside outside of the directory structure. d. Metafiles are protected system files and require access that user-level utilities are not granted by the OS.

Computer Science & Information Technology

____ is defined as the obligations that are imposed on owners and operators of assets to exercise reasonable care of the assets and take necessary precautions to protect them.

A. Due care B. Separation of duties C. Need to know D. Risk assessment

Computer Science & Information Technology