Deck 1: The Importance of Mis

Full screen (f)
exit full mode
Question
Marketing managers planning to use new social networking technologies to strengthen their market presence are portraying their ________.

A) ability to experiment
B) systems thinking skills
C) abstract reasoning skills
D) collaboration skills
Use Space or
up arrow
down arrow
to flip the card.
Question
Patricia is the marketing manager at a manufacturing firm: She plans new marketing strategies with the help of her subordinates,by providing and receiving critical feedback: Here,Patricia is displaying effective ________.

A) collaboration
B) experimentation
C) systems thinking
D) abstraction
Question
________ is the ability to model the components of a unit,to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed.

A) Systems thinking
B) Abstract reasoning
C) Cognitive reasoning
D) Experimentation
Question
________ is the activity of two or more people working together to achieve a common goal,result,or work product.

A) Venturing
B) Enterprising
C) Collaboration
D) Assimilation
Question
A group of components that interact to achieve some purpose is referred to as a(n)________.

A) system
B) element
C) process
D) entity
Question
Which of the following is necessary for effective collaboration?

A) being nice to other individuals
B) focusing on individual goals
C) working individually on different projects
D) giving and receiving critical feedback
Question
In a job interview,Lillian is asked to be part of a three-member group and design a mock business process based on the strengths and skills of the group's members: In this case,which of the following skills is the interviewer trying to test?

A) collaboration
B) abstract reasoning
C) systems thinking
D) ability to experiment
Question
Which of the following is an example of the hardware component of an information system?

A) Web browser
B) operating system
C) microprocessor
D) data file
Question
In a grocery store,the clerk scans the UPC code on an item,which is transmitted to the computer: The scanner device is an example of the ________ component of an IS.

A) hardware
B) software
C) data
D) procedure
Question
Because of Moore's Law,the cost of data processing,communications,and storage ________.

A) is essentially zero
B) has increased exponentially
C) is witnessing an upward trend
D) has leveled off
Question
Which of the following is an impact of rapid technological change on job security?

A) Routine skills are more in demand.
B) Nonroutine cognitive skills gain more market value.
C) Nonroutine jobs are outsourced, thus reducing the need of an in-house workforce.
D) Routine skills are no longer required to complete a task.
Question
Which of the following statements states Moore's Law?

A) A computer becomes obsolete within 18 months.
B) The number of transistors per square inch on an integrated chip doubles every 18 months.
C) The total number of transistors produced in the world doubles every 18 months.
D) The speed of a computer doubles every 18 months.
Question
In a job interview,Roy is asked to use a product that he has never used before and is not familiar with: Which of the following skills is the interviewer trying to test?

A) systems thinking
B) abstract reasoning
C) collaboration
D) ability to experiment
Question
________ is the ability to make and manipulate models.

A) Abstract reasoning
B) Systems thinking
C) Social learning
D) Experimentation
Question
The five-component framework of an information system consists of computer hardware,software,data,people,and ________.

A) bugs
B) procedures
C) device drivers
D) tools
Question
________ is making a reasoned analysis of an opportunity,envisioning potential solutions,evaluating those possibilities,and developing the most promising ones,consistent with the resources you have.

A) Experimentation
B) Abstraction
C) Systems thinking
D) Collaboration
Question
Which of the following is true of nonroutine cognitive skills?

A) They have become less marketable.
B) They increase an individual's job security.
C) Technological changes have no impact on such skills.
D) Organizations usually outsource such skills to the lowest bidder.
Question
Because the cost of data processing,storage,and communications is essentially zero,any routine skill can and will be ________.

A) considered a nonroutine cognitive skill
B) a strong marketable skill
C) outsourced to the lowest bidder
D) sufficient to attain job security
Question
As a result of Moore's Law,________.

A) the risk of technology becoming obsolete has decreased
B) the price to performance ratio of computers has fallen dramatically
C) nonroutine skills can be outsourced
D) the cost of data processing has increased considerably
Question
"The number of transistors per square inch on an integrated chip doubles every 18 months." This observation is known as ________ Law.

A) Murphy's
B) Moore's
C) Amdahl's
D) Metcalfe's
Question
Which of the following is considered a strong password?

A) sword123
B) RileyyeliR
C) paranoid4EVER
D) BL@k2V1.0.1
Question
Which of the following is the weakest password?

A) B33rmu9
B) Qw37^T1bb?as
C) 3B47qq<3>5!7bdE
D) As60$T1dd?dc
Question
In a situation where someone needs to log into your account to solve a problem and asks for your password,________.

A) refuse to provide the password
B) enter your password yourself
C) say it out loud
D) provide the password through an email
Question
Which of the following distinguishes information systems from information technology?

A) people
B) data
C) software
D) hardware
Question
Security systems ultimately depend on the behavior of its ________.

A) users
B) hardware
C) software
D) data
Question
Future business professionals need to be able to apply information technology to business.
Question
Why is it important for business professionals to take an active role in developing and managing information systems?

A) They know how to create a database and configure computers.
B) They are the people who know how to build networks.
C) They know whether a system is sufficient to meet needs and requirements.
D) They are the lone users of information systems.
Question
Which of the following is true about the management and use of information systems?

A) An employee must be a programmer to manage information systems.
B) Information systems must be adapted to changing requirements.
C) Information systems need not be maintained after development.
D) Organizations with dynamic business environments do not use information systems.
Question
In order to protect your password,you should never ________.

A) use it more than three times in one day
B) write it down
C) use virtual keyboards to enter it
D) create one that contains multiple special characters
Question
Which of the following requirements should a password fulfill in order to be considered strong?

A) It should have five characters at the most.
B) It should contain a complete dictionary word.
C) It should not contain many special characters.
D) It should not contain your user name or company name.
Question
Which of the following characteristics would weaken a password?

A) containing a complete dictionary word
B) containing both upper- and lowercase letters
C) containing the numbers 9 and 3
D) containing three special characters
Question
Which of the following is a valid reason for a company to create a new information system?

A) to project a modern image
B) to avoid falling behind the technology curve
C) to help employees achieve the strategies of the business
D) to show its social networking presence on the Web
Question
Which of the following is the most complete and accurate definition of information technology?

A) the products, methods, inventions, and standards that are used to produce information
B) an assembly of hardware, software, data, procedures, and people that produces information
C) systems that are used to process the information that is produced using technology
D) the various data models and software that are used to interpret available information
Question
The number of businesses adopting new technologies has seen a downfall over the years.
Question
Which of the following is true about information systems?

A) They can be bought off the shelf.
B) They are an assembly of information technology.
C) They are the same as information technology.
D) They are not susceptible to changing needs.
Question
Moore's Law states that the speed of a computer doubles every 18 months.
Question
Which of the following techniques is best suited for creating memorable,strong passwords?

A) use at least one dictionary word in the password
B) use numbers instead of special characters
C) base passwords on the first letter of the words in a phrase
D) create a password that is related to your name or company name
Question
Which of the following statements on password etiquette is true?

A) If someone asks for your password, do not just give it out.
B) Always back up your password by writing it down.
C) Never access an information system from a computer that is connected to the Internet.
D) Never use the password more than three times in one day.
Question
You have created a password that meets all the criteria for a strong password: What is a potential drawback of such a password?

A) It will be difficult to remember.
B) It will be very short.
C) It can be easily guessed.
D) It will create IP address conflicts in networks.
Question
Which of the following is a critical responsibility for business professionals in using information systems?

A) protecting the security of the system and its data
B) reprogramming the system to meet changing needs
C) creating and modifying the system's databases
D) building and configuring additional networks
Question
Routine skills are outsourced because the cost of data communication is essentially zero.
Question
Critical feedback undermines collaboration.
Question
The knowledge to manage information systems can lead to greater job security.
Question
When business was stable,professionals avoided experimenting in fear of failure.
Question
Information systems can be bought whereas information technology cannot.
Question
Strong passwords have a maximum of five characters.
Question
Information systems should be developed only if they help achieve business strategies.
Question
The methods used to start a program and save a file are referred to as procedures.
Question
Building information systems requires many different skills besides those of programmers.
Question
An information system is a group of components that interact to produce information.
Question
Increased outsourcing has made nonroutine skills less marketable.
Question
A marketable skill has no impact on job security.
Question
Experimentation only increases the fear of failure.
Question
Information systems and information technology are not the same.
Question
Effective collaboration is all about being nice to your team members.
Question
Information systems are restricted to the field of information technology.
Question
If you are provided with an unfamiliar program and are asked to use it,you are being tested on your ability to effectively collaborate.
Question
Abstract reasoning is the ability to make and manipulate models.
Question
Businesses themselves use information systems to achieve their strategies.
Question
Strong nonroutine cognitive skills are more in demand than routine skills.
Question
What is abstract reasoning?
Question
Explain the management and use of information systems.
Question
What is a marketable skill?
Question
Good passwords contain a complete dictionary word.
Question
What is the role of users in information security?
Question
Explain the necessary password etiquette to be followed by the users of an information system.
Question
What is experimentation? Explain its importance.
Question
Explain the difference and the relationship between information technology (IT)and information systems (IS).
Question
Moving away to let another person enter his or her password is common and acceptable.
Question
Define management information systems: What are the key elements of its definition?
Question
What is collaboration? How can one ensure effective collaboration?
Question
Define Moore's Law and explain how the phenomenon it describes affects the technology business.
Question
What is meant by systems thinking?
Question
Describe the five components of an information system using an example.
Question
How can a strong password be made memorable?
Question
Explain the characteristics of a strong password.
Question
Describe an information system.
Question
If your password is complex,it is ideal to write the password on a piece of paper and keep it near your workstation.
Question
If someone asks you for your password,do not share it with them.
Question
What are the points one needs to keep in mind when deciding to implement a management information system (MIS)?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: The Importance of Mis
1
Marketing managers planning to use new social networking technologies to strengthen their market presence are portraying their ________.

A) ability to experiment
B) systems thinking skills
C) abstract reasoning skills
D) collaboration skills
A
2
Patricia is the marketing manager at a manufacturing firm: She plans new marketing strategies with the help of her subordinates,by providing and receiving critical feedback: Here,Patricia is displaying effective ________.

A) collaboration
B) experimentation
C) systems thinking
D) abstraction
A
3
________ is the ability to model the components of a unit,to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed.

A) Systems thinking
B) Abstract reasoning
C) Cognitive reasoning
D) Experimentation
A
4
________ is the activity of two or more people working together to achieve a common goal,result,or work product.

A) Venturing
B) Enterprising
C) Collaboration
D) Assimilation
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
A group of components that interact to achieve some purpose is referred to as a(n)________.

A) system
B) element
C) process
D) entity
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is necessary for effective collaboration?

A) being nice to other individuals
B) focusing on individual goals
C) working individually on different projects
D) giving and receiving critical feedback
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
In a job interview,Lillian is asked to be part of a three-member group and design a mock business process based on the strengths and skills of the group's members: In this case,which of the following skills is the interviewer trying to test?

A) collaboration
B) abstract reasoning
C) systems thinking
D) ability to experiment
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is an example of the hardware component of an information system?

A) Web browser
B) operating system
C) microprocessor
D) data file
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
In a grocery store,the clerk scans the UPC code on an item,which is transmitted to the computer: The scanner device is an example of the ________ component of an IS.

A) hardware
B) software
C) data
D) procedure
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
Because of Moore's Law,the cost of data processing,communications,and storage ________.

A) is essentially zero
B) has increased exponentially
C) is witnessing an upward trend
D) has leveled off
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is an impact of rapid technological change on job security?

A) Routine skills are more in demand.
B) Nonroutine cognitive skills gain more market value.
C) Nonroutine jobs are outsourced, thus reducing the need of an in-house workforce.
D) Routine skills are no longer required to complete a task.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following statements states Moore's Law?

A) A computer becomes obsolete within 18 months.
B) The number of transistors per square inch on an integrated chip doubles every 18 months.
C) The total number of transistors produced in the world doubles every 18 months.
D) The speed of a computer doubles every 18 months.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
In a job interview,Roy is asked to use a product that he has never used before and is not familiar with: Which of the following skills is the interviewer trying to test?

A) systems thinking
B) abstract reasoning
C) collaboration
D) ability to experiment
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
________ is the ability to make and manipulate models.

A) Abstract reasoning
B) Systems thinking
C) Social learning
D) Experimentation
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
The five-component framework of an information system consists of computer hardware,software,data,people,and ________.

A) bugs
B) procedures
C) device drivers
D) tools
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
________ is making a reasoned analysis of an opportunity,envisioning potential solutions,evaluating those possibilities,and developing the most promising ones,consistent with the resources you have.

A) Experimentation
B) Abstraction
C) Systems thinking
D) Collaboration
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is true of nonroutine cognitive skills?

A) They have become less marketable.
B) They increase an individual's job security.
C) Technological changes have no impact on such skills.
D) Organizations usually outsource such skills to the lowest bidder.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
Because the cost of data processing,storage,and communications is essentially zero,any routine skill can and will be ________.

A) considered a nonroutine cognitive skill
B) a strong marketable skill
C) outsourced to the lowest bidder
D) sufficient to attain job security
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
As a result of Moore's Law,________.

A) the risk of technology becoming obsolete has decreased
B) the price to performance ratio of computers has fallen dramatically
C) nonroutine skills can be outsourced
D) the cost of data processing has increased considerably
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
"The number of transistors per square inch on an integrated chip doubles every 18 months." This observation is known as ________ Law.

A) Murphy's
B) Moore's
C) Amdahl's
D) Metcalfe's
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is considered a strong password?

A) sword123
B) RileyyeliR
C) paranoid4EVER
D) BL@k2V1.0.1
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is the weakest password?

A) B33rmu9
B) Qw37^T1bb?as
C) 3B47qq<3>5!7bdE
D) As60$T1dd?dc
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
In a situation where someone needs to log into your account to solve a problem and asks for your password,________.

A) refuse to provide the password
B) enter your password yourself
C) say it out loud
D) provide the password through an email
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following distinguishes information systems from information technology?

A) people
B) data
C) software
D) hardware
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
Security systems ultimately depend on the behavior of its ________.

A) users
B) hardware
C) software
D) data
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
Future business professionals need to be able to apply information technology to business.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
Why is it important for business professionals to take an active role in developing and managing information systems?

A) They know how to create a database and configure computers.
B) They are the people who know how to build networks.
C) They know whether a system is sufficient to meet needs and requirements.
D) They are the lone users of information systems.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is true about the management and use of information systems?

A) An employee must be a programmer to manage information systems.
B) Information systems must be adapted to changing requirements.
C) Information systems need not be maintained after development.
D) Organizations with dynamic business environments do not use information systems.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
In order to protect your password,you should never ________.

A) use it more than three times in one day
B) write it down
C) use virtual keyboards to enter it
D) create one that contains multiple special characters
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following requirements should a password fulfill in order to be considered strong?

A) It should have five characters at the most.
B) It should contain a complete dictionary word.
C) It should not contain many special characters.
D) It should not contain your user name or company name.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following characteristics would weaken a password?

A) containing a complete dictionary word
B) containing both upper- and lowercase letters
C) containing the numbers 9 and 3
D) containing three special characters
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following is a valid reason for a company to create a new information system?

A) to project a modern image
B) to avoid falling behind the technology curve
C) to help employees achieve the strategies of the business
D) to show its social networking presence on the Web
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following is the most complete and accurate definition of information technology?

A) the products, methods, inventions, and standards that are used to produce information
B) an assembly of hardware, software, data, procedures, and people that produces information
C) systems that are used to process the information that is produced using technology
D) the various data models and software that are used to interpret available information
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
The number of businesses adopting new technologies has seen a downfall over the years.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following is true about information systems?

A) They can be bought off the shelf.
B) They are an assembly of information technology.
C) They are the same as information technology.
D) They are not susceptible to changing needs.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
Moore's Law states that the speed of a computer doubles every 18 months.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following techniques is best suited for creating memorable,strong passwords?

A) use at least one dictionary word in the password
B) use numbers instead of special characters
C) base passwords on the first letter of the words in a phrase
D) create a password that is related to your name or company name
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following statements on password etiquette is true?

A) If someone asks for your password, do not just give it out.
B) Always back up your password by writing it down.
C) Never access an information system from a computer that is connected to the Internet.
D) Never use the password more than three times in one day.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
You have created a password that meets all the criteria for a strong password: What is a potential drawback of such a password?

A) It will be difficult to remember.
B) It will be very short.
C) It can be easily guessed.
D) It will create IP address conflicts in networks.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is a critical responsibility for business professionals in using information systems?

A) protecting the security of the system and its data
B) reprogramming the system to meet changing needs
C) creating and modifying the system's databases
D) building and configuring additional networks
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
Routine skills are outsourced because the cost of data communication is essentially zero.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
Critical feedback undermines collaboration.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
The knowledge to manage information systems can lead to greater job security.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
When business was stable,professionals avoided experimenting in fear of failure.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
Information systems can be bought whereas information technology cannot.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
Strong passwords have a maximum of five characters.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
Information systems should be developed only if they help achieve business strategies.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
The methods used to start a program and save a file are referred to as procedures.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
Building information systems requires many different skills besides those of programmers.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
An information system is a group of components that interact to produce information.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
Increased outsourcing has made nonroutine skills less marketable.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
A marketable skill has no impact on job security.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
Experimentation only increases the fear of failure.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
Information systems and information technology are not the same.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
Effective collaboration is all about being nice to your team members.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
Information systems are restricted to the field of information technology.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
If you are provided with an unfamiliar program and are asked to use it,you are being tested on your ability to effectively collaborate.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
Abstract reasoning is the ability to make and manipulate models.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
Businesses themselves use information systems to achieve their strategies.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
Strong nonroutine cognitive skills are more in demand than routine skills.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
What is abstract reasoning?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
Explain the management and use of information systems.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
What is a marketable skill?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
Good passwords contain a complete dictionary word.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
What is the role of users in information security?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
Explain the necessary password etiquette to be followed by the users of an information system.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
What is experimentation? Explain its importance.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
Explain the difference and the relationship between information technology (IT)and information systems (IS).
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
Moving away to let another person enter his or her password is common and acceptable.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
Define management information systems: What are the key elements of its definition?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
What is collaboration? How can one ensure effective collaboration?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
Define Moore's Law and explain how the phenomenon it describes affects the technology business.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
What is meant by systems thinking?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
Describe the five components of an information system using an example.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
How can a strong password be made memorable?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
Explain the characteristics of a strong password.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
Describe an information system.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
If your password is complex,it is ideal to write the password on a piece of paper and keep it near your workstation.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
If someone asks you for your password,do not share it with them.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
What are the points one needs to keep in mind when deciding to implement a management information system (MIS)?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 80 flashcards in this deck.