Solution Manual for Using MIS, 12th edition By David M. Kroenke, Randall J.
l l l l l l l l l l l l
Boyle Chapter 1-12 l l l
1.TheImportanceofMIS l l l l
LEARNING OBJECTIVES l
Q1-1 Why is Introduction to MIS the most important class in the business school? Q1-
l l l l l l l l l l l l l
2 How MIS will affect you?
l l l l l
Q1-3 What is MIS? l l
Q1-4 How can you use the five-component model?
l l l l l l
Q1-5
l What is information? l l
Q1-6 What are necessary data characteristics?
l l l l
Q1-7
l 2031?
CHAPTER OUTLINE l
Q1-1 Why is Introduction to MIS the most important class in the business school?
l l l l l l l l l l l l
• The Digital Revolution
l l
• Evolving capabilities l
• Moore’s Law l
• Metcalfe’s Law l
• Other forces pushing digital change
l l l l
• This is the most important class in the school of business
l l l l l l l l l l
Q1-2
l How will MIS affect you?
l l l l
• How can you attain job security?
l l l l l
• How can Intro to MIS help you learn nonroutine skills?
l l l l l l l l l
o Abstract Reasoning l
o Systems Thinking l
o Collaboration
o Ability to Experiment l l
o Jobs
• What is the bottom line?l l l l
Q1-3
l What is MIS? l l
• Components of an information system l l l l
• Management and use of information systems l l l l l
• Achieving strategies l
Q1-4 How can you use the five-component model?
l l l l l l
• The most important component—You
l l l
• All components must work
l l l
• High-tech versus low-tech information systems l l l l
• Understanding the scope of new information systems l l l l l l
• Components ordered by difficulty and disruption l l l l l
Q1-5
l What is information? l l
• Definitions vary l
• Where is information? l l
Q1-6 What are necessary data characteristics?
l l l l
, Kroenke - Using MIS 12th Ed - Instructor’s Manual l l l l l l l l
1-2
• Accurate
• Timely
• Relevant
• Just barely sufficient l l
• Worthitscost l l
l Q1-7 2031?
SECURITY GUIDE l
Passwords and Password Etiquette l l l
1. Here is a line from Shakespeare’s Macbeth: “Tomorrow and tomorrow and
l l l l l l l l l l
tomorrow, creeps in its petty pace.” Explain how to use these lines to create a password. l l l l l l l l l l l l l l l
How could you add numbers and special characters to the password in a way that you will
l l l l l l l l l l l l l l l l l
be able to remember?
l l l l
There are several correct ways to create a password from this line. One way might be to
l l l l l l l l l l l l l l l l
take the first letters from each word. The password would then be “tatatciipp.” You could
l l l l l l l l l l l l l l l
then capitalize a couple of the letters and add in a special character or numbers. The
l l l l l l l l l l l l l l l l
resulting password could be “T&2morrow&tciiPP.” This would be a very secure
l l l l l l l l l l l
password.
l
2. List two different phrases that you can use to create a strong password. Show the
l l l l l l l l l l l l l l
password created by each.
l l l l
There will be many correct answers to this question. Using a passphrase to create a
l l l l l l l l l l l l l l
password is done by using the first letters in the phrase, then changing some of the
l l l l l l l l l l l l l l l l
letters by substituting in special characters, numbers, or changes of case. For example,
l l l l l l l l l l l l l
the phrase, “I never count my chickens before the eggs have hatched!” could create the
l l l l l l l l l l l l l l l
password “iNcmCHKNSb4t3ggsHH!” This would be a great password.
l l l l l l l l
3. One of the problems of life in the cyberworld is that we all are required to have multiple
l l l l l l l l l l l l l l l l l
passwords—one for work or school, one for bank accounts, another for eBay or other
l l l l l l l l l l l l l l
auction sites, and so forth. Of course, it is better to use different passwords for each. But
l l l l l l l l l l l l l l l l l
in that case, you have to remember three or four different passwords. Think of different
l l l l l l l l l l l l l l l
phrases you can use to create a memorable, strong password for each of these different
l l l l l l l l l l l l l l l
accounts. Relate the phrase to the purpose of the account. Show the passwords for each.
l l l l l l l l l l l l l l l
There will be many correct answers to this question. For example, a passphrase for a
l l l l l l l l l l l l l l
university account may look something like, “I will graduate from state university before
l l l l l l l l l l l l l
2020 or bust!” This could yield a password that would look like “IwgfSUb42020ORB!”
l l l l l l l l l l l l l
4. Explain proper behavior when you are using your computer and you need to enter, for
l l l l l l l l l l l l l l
some valid reason, another person’s password.
l l l l l l
, Kroenke - Using MIS 12th Ed - Instructor’s Manual l l l l l l l l
1-3
In this case, say to the other person, “We need your password,” and then get out of your
l l l l l l l l l l l l l l l l l
chair, offer your keyboard to the other person, and look away while she enters the
l l l l l l l l l l l l l l l
password. Among professionals working in organizations that take security seriously,
l l l l l l l l l l
this little “do-si-do” move—one person getting out of the way so another person can
l l l l l l l l l l l l l l
enter her password—is common and accepted.
l l l l l l
5. Explain proper behavior when someone else is using her computer and that person
l l l l l l l l l l l l
needs to enter, for some valid reason, your password.
l l l l l l l l l
If someone asks for your password, do not give it out. Instead, get up, go over to that
l l l l l l l l l l l l l l l l l
person’s machine, and enter your own password yourself. Stay present while your
l l l l l l l l l l l l
password is in use, and ensure that your account is logged out at the end of the activity. No
l l l l l l l l l l l l l l l l l l l
one should mind or be offended in any way when you do this. It is the mark of a
l l l l l l l l l l l l l l l l l l l
professional.
l
SO WHAT?l
IOTrends
1. People often use the terms Web and Internet interchangeably, but they are not the same.
l l l l l l l l l l l l l l
Do your best to define each and identify exactly how they are different. Student answers
l l l l l l l l l l l l l l l
will vary but a good explanation can be found at the website
l l l l l l l l l l l l
https://www.geeksforgeeks.org/whats-difference-internet-
l
web/#:~:text=The%20Internet%20is%20a%20global,on%20top%20of%20that%20in
l
frastructure. It states: “The Internet is a global network of networks while the Web, also
l l l l l l l l l l l l l l l
referred formally as World Wide Web (www) is collection of information which is
l l l l l l l l l l l l l
accessed via the Internet. Another way to look at this difference is; the Internet is
l l l l l l l l l l l l l l l
infrastructure while the Web is service on top of that infrastructure.”
l l l l l l l l l l l
2. The article talks about Web 1.0 and Web 2.0. You may be wondering if Web 2.0 is the end
l l l l l l l l l l l l l l l l l l
of the line. What do you think—will there be a Web 3.0, and if so, what would it entail?
l l l l l l l l l l l l l l l l l l l
Student responses will vary, but should cover some ideas and concepts that are not already
l l l l l l l l l l l l l l
part of Web 1.0 or Web 2.0 specifically.
l l l l l l l l
3. While IoT is clearly having an impact on businesses (e.g., tracking manufacturing
l l l l l l l l l l l
using sensors in production lines) and cities (e.g., tracking traffic flows, lighting,
l l l l l l l l l l l l
public transportation), how has IoT impacted your life? Do you have any IoT devices
l l l l l l l l l l l l l l
in your apartment or home? If not, which IoT devices would you be interested in
l l l l l l l l l l l l l l l
owning? l
Student answers will vary, btu some devices could include Amazon Echo, Google Nest,
l l l l l l l l l l l l
and similar devices.
l l l
4. Do you think IoT devices feature the newest and most advanced security
l l l l l l l l l l l
measures, or could there be potential security risks from using IoT devices?
l l l l l l l l l l l l
, Kroenke - Using MIS 12th Ed - Instructor’s Manual l l l l l l l l
1-4
Student answers will vary, but should point out that often times upon release new
l l l l l l l l l l l l l
products do not have all their security holes covered so users should be aware and
l l l l l l l l l l l l l l l
proceed with caution.
l l l
COLLABORATIONEXERCISE 1 l l
This chapter discussed why collaboration is a key skill for maintaining job security. In this
l l l l l l l l l l l l l l
exercise, you will build a collaboration IS and then use that IS to answer the questions
l l l l l l l l l l l l l l l l
below in a collaborative fashion. You might want to read the four questions below before
l l l l l l l l l l l l l l l
you build your IS.
l l l l
Until you answer question 1-5, you’ll have to make do with email or face-to-face
l l l l l l l l l l l l l
meetings. Once you’ve answered that question, use your communication method to answer
l l l l l l l l l l l l
question 1-6. Once you’ve answered question 1-6, use your communication method and your
l l l l l l l l l l l l l
content-sharing method to answer question 1-7. Then use the full IS to answer questions 1-8
l l l l l l l l l l l l l l l
and 1-9.
l l
1-5 Build a communication method: l l l
a. Meet with your team and decide how you want to meet in the future.
l l l l l l l l l l l l l
Student decisions will vary. (LO: 2, Learning Outcome: Explain how IS can enhancel l l l l l l l l l l l
systems of collaboration and teamwork, AACSB: Interpersonal Relations and
l l l l l l l l l
Teamwork) l
b. From the discussion in step a, list the requirements for your communication
l l l l l l l l l l l
system. l
Student answers will vary. Expect students to include requirements in terms of ease of
l l l l l l l l l l l l l
use, availability, and features that support the way the team wants to work. (LO: 2,
l l l l l l l l l l l l l l l
Learning Outcome: Explain how IS can enhance systems of collaboration and
l l l l l l l l l l l
teamwork, AACSB: Interpersonal Relations and Teamwork)
l l l l l l
c. Select and implement a communication tool. It could be Skype, Google Meet,
l l l l l l l l l l l
Zoom, or Skype for Business.
l l l l l
Student choices will vary depending on decision from step b above. (LO: 2, Learning
l l l l l l l l l l l l l
Outcome: Explain how IS can enhance systems of collaboration and teamwork,
l l l l l l l l l l l
AACSB: Interpersonal Relations and Teamwork)
l l l l l
d. Write procedures for the team to use when utilizing your new communication tool.
l l l l l l l l l l l l
Student answers will vary. Look for students to include procedures regarding
l l l l l l l l l l l
meeting notifications, tardiness and missing meetings, and designating a team
l l l l l l l l l l
member to send out reminders. (LO: 2, Learning Outcome: Explain how IS can
l l l l l l l l l l l l l
enhance systems of collaboration and teamwork,AACSB: Interpersonal Relations
l l l l l l l l l
and Teamwork)l l
1-6 Build a content sharing method: l l l l
a. Meet with your team and decide the types of content that you will be creating.
l l l l l l l l l l l l l l