Chapter 1 HW

.docx

School

Slippery Rock University of Pennsylvania *

*We aren’t endorsed by this school

Course

265

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

3

Uploaded by ghelt1001 on coursehero.com

Ginny Heltsley MIS265 Management Information Systems Chapter 1 Questions – Spring 2024 Answer the following. If an answer is not needed (for example #10), put in your initials to indicate that you did the activity. Make sure you put your answers in a different color font . Upload this file to the dropbox when done. 1. Identify 3 reasons as to why Introduction to MIS is an important course in the Business School. MIS is an important course in the Business School because it teaches you how technology fundamentally changes businesses, why executives try to find ways to use new technology to create a sustainable competitive advantage, and to assess, evaluate, and apply emerging information technology to business. 2. Identify and define 4 non-routine cognitive skills that are worthy of being developed. Abstract reasoning-the ability to make and manipulate models. Systems thinking-the ability to model system components, connect inputs and outputs among components to reflect structure and dynamics. Collaboration-people working together to achieve a common goal, result, or work product. Ability to experiment-make reasoned analysis of an opportunity; develop and evaluate possible solutions. 3. What is meant by the phrase ‘technology skills gap’? A technology skills gap is a high level of tech skills demanded by employers and low level of tech skills held by employees. 4. What is management information systems? Management information systems is the management and use of information systems that help organizations achieve their strategies. 5. What is an information system? An information system is an assembly of hardware, software, data, procedures, and people that produce information. 6. What is information technology? Information technology refers to products, methods, inventions, and standards used for the purpose of producing information. 7. What is a system? A system is a group of components that interact to achieve some purpose. 8. List the 5 components of an information system. The five components of an information system are hardware, software, data, procedures, people. 9. Who/what are the ‘Actors’ in the five-component model? The outermost components, hardware and people are both actors in the five-component model. 10. Where are the ‘Instructions’ in the five-component model? The software and procedure components are both sets of instructions (software for hardware and procedures for people). 11. What is the ‘Bridge’ in the five-component model? Data is the bridge in the five-component model. It is the bridge between the computer side and the human side of the components. 12. What is the most important component of an information system? Why? We are the most important component of every information system. The last component of the five-component model, people, includes me and others. Your mind and thinking are not merely a component of the information systems you use; they are the most important components. 13. What are some questions that need to be answered concerning the scope of new information systems? What new hardware will you need? What programs will you need to license? What databases and other data must you create? What procedures will need to be developed for both use and administration of the information system? What will be the impact of the new technology on
Ginny Heltsley people? Which jobs will change? Who will need training? How will the new technology affect morale? Will you need to hire new people? Will you need to reorganize? 14. What is meant when the author states that the components on page 19 are ordered by difficulty and disruption? They are ordered by ease of change and the amount of organizational disruption. 15. What is a good definition of information? Information is knowledge derived from data, or data presented in a meaningful context. 16. List the 5 characteristics of good information. The five characteristics of good information are accurate, timely, relevant, just sufficient, and worth its cost. 17. List some guesses about technology in the year 2029. Most computers will not look like computers, Smartphones will greatly advance, there will be a widespread use of AR, smart homes will be prominent, more people will work from home, knowledge and use of business information systems will be more important. 18. Read the Security Guide. List the characteristics of a good password. Identify some other concerns about passwords. 12+ characters (14 is better) Does not contain your username, real name, or company name. Does not contain a complete dictionary word in any language. Different from previous passwords used. Contains both upper and lower case letters, numbers and special characters. Never write down your password Never ask someone for their password Never give your password to someone “do-si-do” move-move away so another person can enter password privately. Answer questions 1,2,4,5 at the end of the Security Guide. 19. Q1: Here is a line from Shakespeare’s Macbeth: “Tomorrow and tomorrow and tomorrow, creeps in its petty pace.” Explain how to use these lines to create a password. How could you add numbers and special characters to the password in a way that you will be able to remember? I would create a password using the first letters of each of the words in the line from Macbeth. This would create a memorable password that is harder to guess. I would also add some numbers that maybe go with the lines like what line in the play it is and the scene number etc. 20. Q2: List two different phrases that you can use to create a strong password. Show the password created by each. I love cooking, dancing, and playing disc golf. 2024Ilc,d,apdg! The Big Bang Theory! : Amy, Burnadette, Howard, Leonard, Penny, Raj, Sheldon. TBBT!:abhlprs 21. Q4: Explain proper behavior when you are using your computer and you need to enter, for some valid reason, another person’s password. The proper behavior is the “do-si-do” move which is when you move away so another person can enter their password more privately. 22. Q5: Explain proper behavior when someone else is using her computer and that person needs to enter, for some valid reason, your password.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help