Education > SOLUTIONS MANUAL > Solution Manual for Using MIS, 12th edition By David M. Kroenke, Randall J. Boyle (All)

Solution Manual for Using MIS, 12th edition By David M. Kroenke, Randall J. Boyle

Document Content and Description Below

Solution Manual for Using MIS, 12th edition By David M. Kroenke, Randall J. Boyle-Q1-1 Why is Introduction to MIS the most important class in the business school?  The Digital Revolution  Evol... ving capabilities  Moore’s Law  Metcalfe’s Law  Other forces pushing digital change  This is the most important class in the school of business Q1-2 How will MIS affect you?  How can you attain job security?  How can Intro to MIS help you learn nonroutine skills? o Abstract Reasoning o Systems Thinking o Collaboration o Ability to Experiment o Jobs  What is the bottom line? Q1-3 What is MIS?  Components of an information system  Management and use of information systems  Achieving strategies Q1-4 How can you use the five-component model?  The most important component—You  All components must work Kroenke - Using MIS 12th Ed - Instructor’s Manual 1-2  High-tech versus low-tech information systems  Understanding the scope of new information systems  Components ordered by difficulty and disruption Q1-5 What is information?  Definitions vary  Where is information? Q1-6 What are necessary data characteristics?  Accurate  Timely  Relevant  Just barely sufficient  Worth its cost Q1-7 2031? SECURITY GUIDE Passwords and Password Etiquette 1. Here is a line from Shakespeare’s Macbeth: ―Tomorrow and tomorrow and tomorrow, creeps in its petty pace.‖ Explain how to use these lines to create a password. How could you add numbers and special characters to the password in a way that you will be able to remember? There are several correct ways to create a password from this line. One way might be to take the first letters from each word. The password would then be ―tatatciipp.‖ You could then capitalize a couple of the letters and add in a special character or numbers. The resulting password could be ―T&2morrow&tciiPP.‖ This would be a very secure password. 2. List two different phrases that you can use to create a strong password. Show the password created by each. There will be many correct answers to this question. Using a passphrase to create a password is done by using the first letters in the phrase, then changing some of the letters by substituting in special characters, numbers, or changes of case. For example, the phrase, ―I never count my chickens before the eggs have hatched!‖ could create the password ―iNcmCHKNSb4t3ggsHH!‖ This would be a great password. 3. One of the problems of life in the cyberworld is that we all are required to have multiple passwords—one for work or school, one for bank accounts, another for eBay or other auction sites, and so forth. Of course, it is better to use different passwords for each. But in that case, you have to remember three or four different passwords. Think of different phrases you can use to create a memorable, strong password for each of these different accounts. Relate the phrase to the purpose of the account. Show the passwords for each. Kroenke - Using MIS 12th Ed - Instructor’s Manual 1-3 There will be many correct answers to this question. For example, a passphrase for a university account may look something like, ―I will graduate from state university before 2020 or bust!‖ This could yield a password that would look like ―IwgfSUb42020ORB!‖ 4. Explain proper behavior when you are using your computer and you need to enter, for some valid reason, another person’s password. In this case, say to the other person, ―We need your password,‖ and then get out of your chair, offer your keyboard to the other person, and look away while she enters the password. Among professionals working in organizations that take security seriously, this little ―do-si-do‖ move—one person getting out of the way so another person can enter her password—is common and accepted. 5. Explain proper behavior when someone else is using her computer and that person needs to enter, for some valid reason, your password. If someone asks for your password, do not give it out. Instead, get up, go over to that person’s machine, and enter your own password yourself. Stay present while your password is in use, and ensure that your account is logged out at the end of the activity. No one should mind or be offended in any way when you do this. It is the mark of a professional. [Show More]

Last updated: 3 months ago

Preview 5 out of 139 pages

Buy Now

Instant download

We Accept:

We Accept
loader

Loading document previews ...

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$15.50

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

12
0

Document information


Connected school, study & course


About the document


Uploaded On

Apr 03, 2025

Number of pages

139

Written in

Seller


seller-icon
LAVIE

Member since 4 years

10 Documents Sold

Additional information

This document has been written for:

Uploaded

Apr 03, 2025

Downloads

 0

Views

 12


$15.50
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·