Exam 1: The Importance of Mis

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The five-component framework of an information system consists of computer hardware,software,data,people,and ________.

(Multiple Choice)
4.8/5
(37)

What is the role of users in information security?

(Essay)
4.9/5
(51)

A group of components that interact to achieve some purpose is referred to as a(n)________.

(Multiple Choice)
4.9/5
(36)

Moore's Law states that the speed of a computer doubles every 18 months.

(True/False)
4.8/5
(37)

If your password is complex,it is ideal to write the password on a piece of paper and keep it near your workstation.

(True/False)
4.8/5
(34)

Which of the following distinguishes information systems from information technology?

(Multiple Choice)
4.7/5
(39)

The knowledge to manage information systems can lead to greater job security.

(True/False)
5.0/5
(43)

Describe an information system.

(Essay)
4.8/5
(38)

Patricia is the marketing manager at a manufacturing firm.She plans new marketing strategies with the help of her subordinates,by providing and receiving critical feedback.Here,Patricia is displaying effective ________.

(Multiple Choice)
4.9/5
(39)

If someone asks you for your password,do not share it with them.

(True/False)
4.8/5
(40)

The methods used to start a program and save a file are referred to as procedures.

(True/False)
4.7/5
(37)

Why is it important for business professionals to take an active role in developing and managing information systems?

(Multiple Choice)
4.7/5
(34)

Explain the characteristics of a strong password.

(Essay)
4.8/5
(34)

Strong passwords have a maximum of five characters.

(True/False)
4.9/5
(31)

You have created a password that meets all the criteria for a strong password.What is a potential drawback of such a password?

(Multiple Choice)
4.8/5
(34)

How can a strong password be made memorable?

(Essay)
4.9/5
(39)

Which of the following is true of nonroutine cognitive skills?

(Multiple Choice)
4.9/5
(40)

Moving away to let another person enter his or her password is common and acceptable.

(True/False)
4.9/5
(29)

Which of the following requirements should a password fulfill in order to be considered strong?

(Multiple Choice)
4.9/5
(36)

Explain the management and use of information systems.

(Essay)
4.8/5
(42)
Showing 21 - 40 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)