Answer:
It is true, that in a management information system, the quality of information is determined by its usefulness to users, and its usefulness determines the success of the information system.
Explanation:
A management information system (MIS) is a computerized and centralized database that collects data from many different resources in the organization. And, then processes and organized the data in a way that would be useful and helpful in making a business decision. These days, for both large and small organization, collection of data and use of technology are so prevalent and these organization collecting the data from their businesses resources daily even hourly such as daily sale, daily expense, hourly wages, etc, and then managing it in a way to make a right business decision. A good MIS in an organization gives a competitive advantage because it turns the data into usable and into helpful information that can be used in making business decisions and strategy and to increase profit.
However, the information quality is based on its usefulness to the user or to the organization. Because if the MIS produces the information that is not useful to the user, the information and use of MIS are useless in the organization because the information that is required in making a business decision is not useful.
If the MIS produces the quality information to its user in making the right business decision and organization or user take the right decision that brings profit to the organization. Then, this use of information determines the success of an information system in an organization.
For example:
In a Bakery, the MIS produce the right information in making decision e.g. MIS produce information to bakery owner that on valentine day, most people buy chocolate. Then, the owner tries to meet the demand for chocolate on valentine's day. Therefore, this is the quality of information and it is determined by its usefulness to the bakery owner and its usefulness determines the success of MIS.
Answer
1. Assemble his team
2. Find reason for breach
3. Evaluate what was lost
4. Ensure password change
Explanation:
In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.
Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.
In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.
The CISO has to ensure that all employees are trained properly on security and they comply to security policies.
Try downloading an app if the phone is not doing it.
Answer:
You can open a HTML document in internet explorer usually browsers can open HTML files.