Expense Reimbursement Form
Date of Report
Attach any supporting receipts
Purpose and Description
Type of Expense
VIDEO Summary FORM
View the videos in the course this week. The purpose of videos is to allow you, the student, to be
aware of global and current issues and to encourage you to compare old/present ways of doing
business (textbook readings, PowerPoint Pres
Select a FEATURE SUMMARY reading from the chapters this week. The purpose of the FEATURE
SUMMARIES are to allow students to think critically, analyze, and evaluate writing and come to a
reasoned conclusion as well as enjoy the ideas.
Week 1 Global Issues Videos
Purpose of this lecture was: Values of Openness;
The Importance of learning about Science and Technology;
Important to educate MIT students;
Helping us to understand some implications and trends in the world.
First 3 m
Phone Order Form
Silver Knot Necklace
Unit 1: Activity Questions
Give an example of a database used (either manual - e.g. a hard copy phone book, or
automated/computer based) in your daily life (this can be an example of a database in your
home or work), and comment on its usability.
In my oc
Unit 2: Activity - Problems
Chapter 1, Review Questions #1-2: Match the following terms and definitions:
Database Management System
An example of an organizational complementary asset is (from Chapter 1 ref 54)
using the appropriate business model.
a collaborative work environment.
laws and regulations.
all of the above.
The three principal levels within a business organization hierarchy
are (from Chapter 1 ref 66)
senior management, operational management, and service
senior management, middle management, and operational
Which of the following statements best describes the business value
of improved decision making? (from Chapter 12 ref 21)
Improved decision making creates better products.
Improved decision making results in a large monetary
Exposing an individual to ads that are chosen and based on the
recorded and analyzed online behavior of the individual is referred
to as (from Chapter 10 ref 56)
A data mart usually can be constructed more rapidly and at lower
cost than a data warehouse because (from Chapter 6 ref 56)
a data mart typically focuses on a single subject area or line of
all the information is hi
A CSF approach to establishing an enterprise's information
requirements is especially suitable for (from Chapter 14 ref 28)
distinguishing between individual and organizational
identifying the key entities and att
"Look and feel" copyright infringement lawsuits are concerned with
(from Chapter 4 ref 54)
the distinction between tangible and intangible ideas.
the distinction between an idea and its expression.
using the graphical element
Quiz Chap 12
10 out of 10
Documentation procedures are not required for configuration and change management
Digital forensics helps the organization understand what happened and how.
In some instances, risk is acknowle
Unit 5 Quiz - Chapter 8
Current Score: 9 out of 10
The asymmetric encryption systems are based on using a single key to both encrypt
and decrypt a message.
The application header protocol provides secrecy for the content of a network
Unit 7 Quiz Chapter 11
10 out of 10
Information security should be visible to the users.
The general management community of interest must work with the information
security professionals to integrate solid information security concep
IS370 Final Exam Questions
Who should lead a security team? Should the approach to security be more managerial
Why do employees constitute one of the greatest threats to information security?
If you work for a financial service organization
Quiz Chap 10
10 out of 10
Planning for the implementation phase of a security project requires the creation of a
detailed project plan.
The networks layer of the bull's-eye model is the outermost ring of the bull's eye.
Quiz Chap 9
10 out of 10
The capacity of UPS devices is measured using the volt output rating.
Vibration sensors fall into the motion sensor category.
Keycard readers based on smart cards are often used to secure computer rooms,
Unit 6: Lecture A
Chapter 11 - Managing Knowledge
When people leave organizations today, they are potentially taking with them knowledge thats critical to the future of the business, says David
DeLong, a business consultant and author of Lost Knowledge: C
Unit 6: Lecture B
Chapter 12 - Enhancing Decision Making
Companies have been able to use technology to do some very cool stuff to reach customers in new ways, to automate operations. But one thing
many businesses havent been able to do easily is use the d
Unit 2: Lecture B
Chapter 4 Ethical and Social Issues in Information Systems
It probably goes without saying that the security and ethical issues raised by the Information Age, and specifically the Internet, are the most
explosive to face our society in d
Unit 4: Lecture A
Chapter 7 - Telecommunications, the Internet, and Wireless Technology
Anytime, anywhere, anyway, is the mantra of many computer users. Improved telecommunications technologies, the process of electronically
communicating information, are
Unit 4: Lecture B
Chapter 8 -Securing Information Systems
As our society and the world itself come to depend on computers and information systems more and more, firms must put forth a better effort in
making their systems less vulnerable and more reliable
Unit 3: Lecture B
Chapter 6 - Foundations of Business Intelligence: Databases and Information
Information is becoming as important a business resource as money, material, and people. Even though a company compiles millions of pieces of