0% found this document useful (0 votes)
7 views3 pages

Sti - Esra Helena - 2002112125

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 3

FINAL EXAMINATION

MANAGEMENT DEPARTMENT
THE FACULTY OF ECONOMICS AND BUSINESS
UNIVERSITY OF RIAU
YEAR OF 2021/2022

Subject : Information Technology System


Date : Wednesday, 29 June 2021
Time : 80 Minutes
Lecturers : Hafiza Oktasia Nst, B.B.A. (Hons), M.Ec.

Please answer the question below with your own words.

1. Explain the role of information technology systems.


The role of information technology is to capture, process, generate, store and retrieve
data. And the role of information technology is operational function, supervisory and
control function, planning and decision function, and communication function.

2. Explain the concept of information technology systems at the organizational level.


The application of technology in organizations can have a significant impact on
effectiveness and efficiency as well as increase competitiveness because information
technology provides a number of data about the running of the organization so that
organizations can obtain the data needed as their basis for making strategic decisions.

3. What are the unintentional disturbances in the information system and how to overcome
or improve the information system?
a. Technical errors:
- Hardware errors
- Syntax errors
- Logical errors
b. Environmental disturbances:
- Electric current error due to lightning
c. Human errors:
- Data entry error.
- Data deletion error.
- Operator error (wrong labeling of magnetic tape)
-
How to overcome :

 Access control.
Access control can be achieved in three steps, namely user identification, user
authentication and user authorization.
 Monitor for attacks on the system.
The monitoring system is used to detect any intruders who enter the system
(intruders) or an attack (attack) from hackers. This system is commonly called an
“intruder detection system” (IDS)
 Use of Encryption.
One of the mechanisms to improve system security is by using data encryption
technology. The data sent is modified in such a way that it is not easily known by
other unauthorized persons.

4. Explain the difference between systems, information, and information technology system.
The system is a collection or set of elements, components, or variables that are organized,
interact with each other, depend on each other and are integrated.
Information is data that has been processed into a form that is meaningful to the recipient
and useful in current or future decision making.
While an information technology system is a combination of information technology and
the activities of people who use that technology to support operations and management.

5. What are the challenges that arise from the information systems strategy and how these
challenges should be resolved?
- Existing competitors
- The threat of new competitors
- Threat of substitute/substitute products
- Bargaining power of customers
- Bargaining power of suppliers

How to resolved:

- The company management must always make changes in the implementation of


information technology systems in line with the current direction of the
company's development to help achieve success in accordance with company
goals.
- The company must provide training related to Information Technology and
Systems for the Information Technology Division and other divisions within the
company that act as brainware so that the Information System implemented by the
company can help the company.
-

You might also like