100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Solution Manual for Using MIS, 12th edition By David M. Kroenke, Randall J. Boyle Chapter 1-12 $18.49   Add to cart

Exam (elaborations)

Solution Manual for Using MIS, 12th edition By David M. Kroenke, Randall J. Boyle Chapter 1-12

 2 views  0 purchase
  • Course
  • Solution Manual for Using MIS, 12th edition By Dav
  • Institution
  • Solution Manual For Using MIS, 12th Edition By Dav

Solution Manual for Using MIS, 12th edition By David M. Kroenke, Randall J. Boyle Chapter 1-12

Preview 4 out of 104  pages

  • October 12, 2024
  • 104
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
book image

Book Title:

Author(s):

  • Edition:
  • ISBN:
  • Edition:
  • Solution Manual for Using MIS, 12th edition By Dav
  • Solution Manual for Using MIS, 12th edition By Dav
avatar-seller
WhiteHouseTutor
Solution Manual for Using MIS, 12th edition By David M. Kroenke, Randall J.
l l l l l l l l l l l l




Boyle Chapter 1-12 l l l




1.TheImportanceofMIS l l l l




LEARNING OBJECTIVES l




Q1-1 Why is Introduction to MIS the most important class in the business school? Q1-
l l l l l l l l l l l l l



2 How MIS will affect you?
l l l l l



Q1-3 What is MIS? l l



Q1-4 How can you use the five-component model?
l l l l l l



Q1-5
l What is information? l l



Q1-6 What are necessary data characteristics?
l l l l



Q1-7
l 2031?

CHAPTER OUTLINE l




Q1-1 Why is Introduction to MIS the most important class in the business school?
l l l l l l l l l l l l



• The Digital Revolution
l l



• Evolving capabilities l



• Moore’s Law l



• Metcalfe’s Law l



• Other forces pushing digital change
l l l l



• This is the most important class in the school of business
l l l l l l l l l l



Q1-2
l How will MIS affect you?
l l l l



• How can you attain job security?
l l l l l



• How can Intro to MIS help you learn nonroutine skills?
l l l l l l l l l



o Abstract Reasoning l



o Systems Thinking l



o Collaboration
o Ability to Experiment l l



o Jobs
• What is the bottom line?l l l l



Q1-3
l What is MIS? l l



• Components of an information system l l l l



• Management and use of information systems l l l l l



• Achieving strategies l



Q1-4 How can you use the five-component model?
l l l l l l



• The most important component—You
l l l



• All components must work
l l l



• High-tech versus low-tech information systems l l l l



• Understanding the scope of new information systems l l l l l l



• Components ordered by difficulty and disruption l l l l l



Q1-5
l What is information? l l



• Definitions vary l



• Where is information? l l



Q1-6 What are necessary data characteristics?
l l l l

, Kroenke - Using MIS 12th Ed - Instructor’s Manual l l l l l l l l
1-2

• Accurate
• Timely
• Relevant
• Just barely sufficient l l



• Worthitscost l l



l Q1-7 2031?


SECURITY GUIDE l




Passwords and Password Etiquette l l l




1. Here is a line from Shakespeare’s Macbeth: “Tomorrow and tomorrow and
l l l l l l l l l l



tomorrow, creeps in its petty pace.” Explain how to use these lines to create a password. l l l l l l l l l l l l l l l



How could you add numbers and special characters to the password in a way that you will
l l l l l l l l l l l l l l l l l



be able to remember?
l l l l



There are several correct ways to create a password from this line. One way might be to
l l l l l l l l l l l l l l l l



take the first letters from each word. The password would then be “tatatciipp.” You could
l l l l l l l l l l l l l l l



then capitalize a couple of the letters and add in a special character or numbers. The
l l l l l l l l l l l l l l l l



resulting password could be “T&2morrow&tciiPP.” This would be a very secure
l l l l l l l l l l l



password.
l




2. List two different phrases that you can use to create a strong password. Show the
l l l l l l l l l l l l l l



password created by each.
l l l l



There will be many correct answers to this question. Using a passphrase to create a
l l l l l l l l l l l l l l



password is done by using the first letters in the phrase, then changing some of the
l l l l l l l l l l l l l l l l



letters by substituting in special characters, numbers, or changes of case. For example,
l l l l l l l l l l l l l



the phrase, “I never count my chickens before the eggs have hatched!” could create the
l l l l l l l l l l l l l l l



password “iNcmCHKNSb4t3ggsHH!” This would be a great password.
l l l l l l l l




3. One of the problems of life in the cyberworld is that we all are required to have multiple
l l l l l l l l l l l l l l l l l



passwords—one for work or school, one for bank accounts, another for eBay or other
l l l l l l l l l l l l l l



auction sites, and so forth. Of course, it is better to use different passwords for each. But
l l l l l l l l l l l l l l l l l



in that case, you have to remember three or four different passwords. Think of different
l l l l l l l l l l l l l l l



phrases you can use to create a memorable, strong password for each of these different
l l l l l l l l l l l l l l l



accounts. Relate the phrase to the purpose of the account. Show the passwords for each.
l l l l l l l l l l l l l l l



There will be many correct answers to this question. For example, a passphrase for a
l l l l l l l l l l l l l l



university account may look something like, “I will graduate from state university before
l l l l l l l l l l l l l



2020 or bust!” This could yield a password that would look like “IwgfSUb42020ORB!”
l l l l l l l l l l l l l




4. Explain proper behavior when you are using your computer and you need to enter, for
l l l l l l l l l l l l l l



some valid reason, another person’s password.
l l l l l l

, Kroenke - Using MIS 12th Ed - Instructor’s Manual l l l l l l l l
1-3

In this case, say to the other person, “We need your password,” and then get out of your
l l l l l l l l l l l l l l l l l



chair, offer your keyboard to the other person, and look away while she enters the
l l l l l l l l l l l l l l l



password. Among professionals working in organizations that take security seriously,
l l l l l l l l l l



this little “do-si-do” move—one person getting out of the way so another person can
l l l l l l l l l l l l l l



enter her password—is common and accepted.
l l l l l l




5. Explain proper behavior when someone else is using her computer and that person
l l l l l l l l l l l l



needs to enter, for some valid reason, your password.
l l l l l l l l l



If someone asks for your password, do not give it out. Instead, get up, go over to that
l l l l l l l l l l l l l l l l l



person’s machine, and enter your own password yourself. Stay present while your
l l l l l l l l l l l l



password is in use, and ensure that your account is logged out at the end of the activity. No
l l l l l l l l l l l l l l l l l l l



one should mind or be offended in any way when you do this. It is the mark of a
l l l l l l l l l l l l l l l l l l l



professional.
l




SO WHAT?l




IOTrends

1. People often use the terms Web and Internet interchangeably, but they are not the same.
l l l l l l l l l l l l l l



Do your best to define each and identify exactly how they are different. Student answers
l l l l l l l l l l l l l l l



will vary but a good explanation can be found at the website
l l l l l l l l l l l l



https://www.geeksforgeeks.org/whats-difference-internet-
l



web/#:~:text=The%20Internet%20is%20a%20global,on%20top%20of%20that%20in
l



frastructure. It states: “The Internet is a global network of networks while the Web, also
l l l l l l l l l l l l l l l



referred formally as World Wide Web (www) is collection of information which is
l l l l l l l l l l l l l



accessed via the Internet. Another way to look at this difference is; the Internet is
l l l l l l l l l l l l l l l



infrastructure while the Web is service on top of that infrastructure.”
l l l l l l l l l l l




2. The article talks about Web 1.0 and Web 2.0. You may be wondering if Web 2.0 is the end
l l l l l l l l l l l l l l l l l l



of the line. What do you think—will there be a Web 3.0, and if so, what would it entail?
l l l l l l l l l l l l l l l l l l l



Student responses will vary, but should cover some ideas and concepts that are not already
l l l l l l l l l l l l l l



part of Web 1.0 or Web 2.0 specifically.
l l l l l l l l




3. While IoT is clearly having an impact on businesses (e.g., tracking manufacturing
l l l l l l l l l l l



using sensors in production lines) and cities (e.g., tracking traffic flows, lighting,
l l l l l l l l l l l l



public transportation), how has IoT impacted your life? Do you have any IoT devices
l l l l l l l l l l l l l l



in your apartment or home? If not, which IoT devices would you be interested in
l l l l l l l l l l l l l l l



owning? l



Student answers will vary, btu some devices could include Amazon Echo, Google Nest,
l l l l l l l l l l l l



and similar devices.
l l l




4. Do you think IoT devices feature the newest and most advanced security
l l l l l l l l l l l



measures, or could there be potential security risks from using IoT devices?
l l l l l l l l l l l l

, Kroenke - Using MIS 12th Ed - Instructor’s Manual l l l l l l l l
1-4

Student answers will vary, but should point out that often times upon release new
l l l l l l l l l l l l l



products do not have all their security holes covered so users should be aware and
l l l l l l l l l l l l l l l



proceed with caution.
l l l




COLLABORATIONEXERCISE 1 l l




This chapter discussed why collaboration is a key skill for maintaining job security. In this
l l l l l l l l l l l l l l



exercise, you will build a collaboration IS and then use that IS to answer the questions
l l l l l l l l l l l l l l l l



below in a collaborative fashion. You might want to read the four questions below before
l l l l l l l l l l l l l l l



you build your IS.
l l l l



Until you answer question 1-5, you’ll have to make do with email or face-to-face
l l l l l l l l l l l l l



meetings. Once you’ve answered that question, use your communication method to answer
l l l l l l l l l l l l



question 1-6. Once you’ve answered question 1-6, use your communication method and your
l l l l l l l l l l l l l



content-sharing method to answer question 1-7. Then use the full IS to answer questions 1-8
l l l l l l l l l l l l l l l



and 1-9.
l l




1-5 Build a communication method: l l l




a. Meet with your team and decide how you want to meet in the future.
l l l l l l l l l l l l l



Student decisions will vary. (LO: 2, Learning Outcome: Explain how IS can enhancel l l l l l l l l l l l



systems of collaboration and teamwork, AACSB: Interpersonal Relations and
l l l l l l l l l



Teamwork) l




b. From the discussion in step a, list the requirements for your communication
l l l l l l l l l l l



system. l



Student answers will vary. Expect students to include requirements in terms of ease of
l l l l l l l l l l l l l



use, availability, and features that support the way the team wants to work. (LO: 2,
l l l l l l l l l l l l l l l



Learning Outcome: Explain how IS can enhance systems of collaboration and
l l l l l l l l l l l



teamwork, AACSB: Interpersonal Relations and Teamwork)
l l l l l l




c. Select and implement a communication tool. It could be Skype, Google Meet,
l l l l l l l l l l l



Zoom, or Skype for Business.
l l l l l



Student choices will vary depending on decision from step b above. (LO: 2, Learning
l l l l l l l l l l l l l



Outcome: Explain how IS can enhance systems of collaboration and teamwork,
l l l l l l l l l l l



AACSB: Interpersonal Relations and Teamwork)
l l l l l




d. Write procedures for the team to use when utilizing your new communication tool.
l l l l l l l l l l l l



Student answers will vary. Look for students to include procedures regarding
l l l l l l l l l l l



meeting notifications, tardiness and missing meetings, and designating a team
l l l l l l l l l l



member to send out reminders. (LO: 2, Learning Outcome: Explain how IS can
l l l l l l l l l l l l l



enhance systems of collaboration and teamwork,AACSB: Interpersonal Relations
l l l l l l l l l



and Teamwork)l l




1-6 Build a content sharing method: l l l l




a. Meet with your team and decide the types of content that you will be creating.
l l l l l l l l l l l l l l

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller WhiteHouseTutor. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $18.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79223 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$18.49
  • (0)
  Add to cart