Deck 1: The Importance of MIS

Full screen (f)
exit full mode
Question
The number of businesses adopting new technologies has seen a downfall over the years.
Use Space or
up arrow
down arrow
to flip the card.
Question
Moore's Law states that the speed of a computer doubles every 18 months.
Question
Which of the following best describes collaboration?

A)It is the ability of an individual to model the components of the system,to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed.
B)It is the ability to assess,evaluate,and apply emerging information technology to business.
C)It is the activity of two or more people working together to achieve a common goal,result,or work product.
D)It is the activity of constructing or modifying models with the help of one's nonroutine cognitive skills.
Question
Which of the following is necessary for effective collaboration?

A)modeling the components of a system
B)focusing on individual goals
C)proper division of tasks
D)giving and receiving critical feedback
Question
Which of the following is true about the impact of Moore's Law on business professionals?

A)They need to be able to assess,evaluate,and apply emerging information technology to business.
B)They have to concentrate more on developing routine skills than nonroutine skills.
C)They need to be able to develop better communication and information technologies.
D)They no longer need to focus on skills such as abstract reasoning and collaboration.
Question
Which of the following is an impact of rapid technological change on job security?

A)Routine skills have more demand.
B)Nonroutine cognitive skills have gained more market value.
C)Nonroutine jobs are outsourced,thus reducing the need of an in-house workforce.
D)Routine skills are no longer required to complete a task.
Question
________ is the ability to model the components of a unit,to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed.

A)Systems thinking
B)Collaboration
C)Adaptive learning
D)Critical reasoning
Question
Future business professionals need to be able to apply information technology to business.
Question
Which of the following is a result of Moore's law?

A)The risk of technology becoming obsolete has decreased.
B)The price to performance ratio of computers has fallen dramatically.
C)The outsourcing of nonroutine skills has increased drastically.
D)The cost of data processing has increased considerably.
Question
In a job interview,Roy is asked to use a product that he has never used before and is unfamiliar with its functioning.Which of the following skills is the interviewer trying to test?

A)systems thinking
B)abstract reasoning
C)collaboration skills
D)ability to experiment
Question
Because the cost of data processing,storage,and communications is essentially zero,any routine skill can and will be ________.

A)considered a nonroutine cognitive skill
B)a strong marketable skill
C)outsourced to the lowest bidder
D)sufficient to attain job security
Question
Which of the following statements is true of nonroutine cognitive skills?

A)They have become less marketable.
B)They increase an individual's job security.
C)They do not experience any impact of technological changes.
D)They are usually outsourced by organizations to the lowest bidder.
Question
Patricia,the marketing manager of a manufacturing firm,plans new marketing strategies with the help of her subordinates by providing and receiving critical feedback.Here,Patricia is displaying effective ________.

A)collaboration
B)cognitive acceleration
C)virtualization
D)abstraction
Question
The knowledge of managing information systems can lead to greater job security.
Question
Marketing managers planning to use new social networking technologies to strengthen their market presence are portraying their ________.

A)ability to experiment
B)routine skills
C)collaboration skills
D)ability to outsource work
Question
The number of transistors per square inch on an integrated chip doubles every 18 months.This observation is known as ________ Law.

A)Murphy's
B)Moore's
C)Amdahl's
D)Metcalfe's
Question
In a job interview,Lillian is asked to be part of a three-member group and design a mock business process based on the strengths and skills of the group's members.In this case,which of the following skills is the interviewer trying to test?

A)collaboration
B)cognitive acceleration
C)systems thinking
D)facilitation
Question
________ is making a reasoned analysis of an opportunity,envisioning potential solutions,evaluating those possibilities,and developing the most promising ones,consistent with the resources one has.

A)Experimentation
B)Abstraction
C)Systems thinking
D)Collaboration
Question
Which of the following statements is true of Moore's Law?

A)It is based on the technological advancements in weapon manufacturing.
B)It made the cost of data processing,communications,and storage essentially zero.
C)It states that the total number of transistors produced in the world doubles every 18 months.
D)It has resulted in obsoleting the use of transistors.
Question
________ is the ability to make and manipulate models.

A)Abstract reasoning
B)Cognitive acceleration
C)Adaptive learning
D)Holacracy
Question
What is a marketable skill?
Question
What is collaboration? How can one ensure effective collaboration?
Question
Professionals in the 21st century need to be able to experiment in order to have greater job security.
Question
When a user is provided with an unfamiliar program and asked to use it,he or she is being tested on their ability to collaborate effectively.
Question
Routine skills are outsourced to the lowest bidder because the cost of data processing,storage,and communications is essentially zero.
Question
In a grocery store,a clerk uses a barcode scanner to read the barcode on an item.Which of the following components of an information system includes this scanning device?

A)hardware
B)software
C)data
D)procedure
Question
The five-component framework of an information system consists of computer hardware,software,data,people,and ________.

A)documents
B)procedures
C)objectives
D)results
Question
Increased outsourcing has made nonroutine skills less marketable.
Question
What is abstract reasoning?
Question
Abstract reasoning is one of the components of strong nonroutine cognitive skills.
Question
Which of the following is an example of a hardware component of an information system?

A)Web browser
B)operating system
C)storage disk
D)data file
Question
A group of components that interact to achieve some purpose is referred to as a(n)________.

A)system
B)element
C)unit
D)entity
Question
What is experimentation? Explain its importance.
Question
A marketable skill has no impact on job security.
Question
What is meant by systems thinking?
Question
Successful experimentation is throwing buckets of money at every crazy idea that enters one's head.
Question
Strong nonroutine cognitive skills are more in demand than routine skills.
Question
Critical feedback undermines collaboration.
Question
Effective collaboration is all about being nice to one's team members.
Question
Define Moore's Law and explain how the phenomenon described by it affects business.
Question
The methods used to start a program and save a file are referred to as procedures.
Question
An information system is a group of components that interact to produce information.
Question
Describe the five components of an information system using an example.
Question
Which of the following is a critical responsibility of business professionals in using information systems?

A)protecting the security of a system and its data
B)reprogramming a system to meet changing needs
C)creating and modifying a system's databases
D)building and configuring additional networks
Question
Which of the following statements is true about the management and use of information systems?

A)An employee must be a programmer to manage information systems.
B)Information systems must be adapted to new requirements.
C)Information systems need not be maintained after development.
D)Organizations with dynamic business environments do not use information systems.
Question
Which of the following components distinguishes information systems from information technology?

A)people
B)database structure
C)software
D)hardware
Question
What are the points that one should keep in mind when deciding to implement a management information system (MIS)?
Question
Why is it important for business professionals to take an active role in developing and managing information systems?

A)They know how to create a database and configure computers.
B)They are the people who know how to build networks.
C)They know whether a system meets their needs and requirements.
D)They are the lone users of information systems.
Question
________ refers to the products,methods,inventions,and standards that are used to produce information.

A)Information technology
B)Information processing
C)Simulation
D)Product specification
Question
Building information systems requires many different skills besides those of programmers.
Question
Businesses do not use information systems to achieve their strategies.
Question
Explain the management and use of information systems.
Question
Information systems should be created by a business only if they help achieve the strategies of that business.
Question
Which of the following statements is true about information systems?

A)They can be bought off the shelf.
B)They are a group of components that produce information.
C)They drive the development of information technology.
D)They are not susceptible to the changing needs of the market.
Question
Which of the following reasons is valid for a company to create a new information system?

A)to project a modern image
B)to avoid falling behind the technology curve
C)to help employees achieve the strategies of the business
D)to show its social networking presence
Question
Information systems can be bought,whereas information technology cannot be bought.
Question
Define management information systems.What are the key elements of its definition?
Question
Information systems and information technology are not the same.
Question
Describe an information system.
Question
The use of information systems is restricted to the field of business.
Question
Which of the following precautions should be taken to protect one's password?

A)Do not base it on the first letter of the words in a phrase.
B)Do not write it down or share it with others.
C)Do not use virtual keyboards to enter it.
D)Do not have multiple special characters in it.
Question
Which of the following passwords is the weakest?

A)B33rmu9
B)Qw37^T1bb?as
C)3B47qq<3>5!7bdE
D)As60$T1dd?dc
Question
What should be done if someone needs to log into a user's account to solve a problem and asks for the user's password?

A)The user should refuse to provide the password.
B)The user should enter the password themselves.
C)The user should say it out loud.
D)The user should provide the password through an email.
Question
What is the role of users in information security?
Question
Explain the necessary password etiquette to be followed by the users of an information system.
Question
If a password is complex,it is ideal to write it on a piece of paper and keep it near the workstation.
Question
Strong passwords have a maximum of five characters.
Question
Security systems ultimately depend on the behavior of their ________.

A)users
B)programmers
C)hardware components
D)database structures
Question
A password is said to be weak if it contains ________.

A)a complete dictionary word
B)both upper- and lowercase letters
C)the numbers 9 and 3
D)three special characters
Question
Users are advised not to share their password with others.
Question
Which of the following requirements should a password fulfill in order to be considered strong?

A)It should have five characters at the most.
B)It should contain a complete dictionary word.
C)It should not contain many special characters.
D)It should not contain the user name or company name.
Question
How can a strong password be made memorable?
Question
Moving away to let another user enter his or her password is a mark of professionalism.
Question
Which of the following passwords is the strongest?

A)sword123
B)RileyyeliR
C)paranoid4EVER
D)BL@k2V1.0.1
Question
Explain the characteristics of a strong password.
Question
A user has created a password that meets all the criteria for a strong password.What is a potential drawback of such a password?

A)It will be difficult to remember.
B)It will be very short.
C)It can be easily guessed.
D)It will create IP address conflicts in networks.
Question
Good passwords contain a complete dictionary word.
Question
Which of the following techniques is best suited for creating memorable,strong passwords?

A)using at least one dictionary word in the password
B)repeating previously used passwords
C)basing passwords on the first letter of the words in a phrase
D)creating a password that is related to one's name or company's name
Question
Which of the following statements on password etiquette is true?

A)If someone asks for the password,do not just give it out.
B)Always back up the password by writing it down.
C)Never access an information system from a computer that is connected to the Internet.
D)Never use the password more than three times a day.
Question
Explain the difference and the relationship between information technology (IT)and information systems (IS).
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: The Importance of MIS
1
The number of businesses adopting new technologies has seen a downfall over the years.
False
2
Moore's Law states that the speed of a computer doubles every 18 months.
False
3
Which of the following best describes collaboration?

A)It is the ability of an individual to model the components of the system,to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed.
B)It is the ability to assess,evaluate,and apply emerging information technology to business.
C)It is the activity of two or more people working together to achieve a common goal,result,or work product.
D)It is the activity of constructing or modifying models with the help of one's nonroutine cognitive skills.
C
4
Which of the following is necessary for effective collaboration?

A)modeling the components of a system
B)focusing on individual goals
C)proper division of tasks
D)giving and receiving critical feedback
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is true about the impact of Moore's Law on business professionals?

A)They need to be able to assess,evaluate,and apply emerging information technology to business.
B)They have to concentrate more on developing routine skills than nonroutine skills.
C)They need to be able to develop better communication and information technologies.
D)They no longer need to focus on skills such as abstract reasoning and collaboration.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is an impact of rapid technological change on job security?

A)Routine skills have more demand.
B)Nonroutine cognitive skills have gained more market value.
C)Nonroutine jobs are outsourced,thus reducing the need of an in-house workforce.
D)Routine skills are no longer required to complete a task.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
________ is the ability to model the components of a unit,to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed.

A)Systems thinking
B)Collaboration
C)Adaptive learning
D)Critical reasoning
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
Future business professionals need to be able to apply information technology to business.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is a result of Moore's law?

A)The risk of technology becoming obsolete has decreased.
B)The price to performance ratio of computers has fallen dramatically.
C)The outsourcing of nonroutine skills has increased drastically.
D)The cost of data processing has increased considerably.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
In a job interview,Roy is asked to use a product that he has never used before and is unfamiliar with its functioning.Which of the following skills is the interviewer trying to test?

A)systems thinking
B)abstract reasoning
C)collaboration skills
D)ability to experiment
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
Because the cost of data processing,storage,and communications is essentially zero,any routine skill can and will be ________.

A)considered a nonroutine cognitive skill
B)a strong marketable skill
C)outsourced to the lowest bidder
D)sufficient to attain job security
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following statements is true of nonroutine cognitive skills?

A)They have become less marketable.
B)They increase an individual's job security.
C)They do not experience any impact of technological changes.
D)They are usually outsourced by organizations to the lowest bidder.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
Patricia,the marketing manager of a manufacturing firm,plans new marketing strategies with the help of her subordinates by providing and receiving critical feedback.Here,Patricia is displaying effective ________.

A)collaboration
B)cognitive acceleration
C)virtualization
D)abstraction
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
The knowledge of managing information systems can lead to greater job security.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
Marketing managers planning to use new social networking technologies to strengthen their market presence are portraying their ________.

A)ability to experiment
B)routine skills
C)collaboration skills
D)ability to outsource work
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
The number of transistors per square inch on an integrated chip doubles every 18 months.This observation is known as ________ Law.

A)Murphy's
B)Moore's
C)Amdahl's
D)Metcalfe's
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
In a job interview,Lillian is asked to be part of a three-member group and design a mock business process based on the strengths and skills of the group's members.In this case,which of the following skills is the interviewer trying to test?

A)collaboration
B)cognitive acceleration
C)systems thinking
D)facilitation
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
________ is making a reasoned analysis of an opportunity,envisioning potential solutions,evaluating those possibilities,and developing the most promising ones,consistent with the resources one has.

A)Experimentation
B)Abstraction
C)Systems thinking
D)Collaboration
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following statements is true of Moore's Law?

A)It is based on the technological advancements in weapon manufacturing.
B)It made the cost of data processing,communications,and storage essentially zero.
C)It states that the total number of transistors produced in the world doubles every 18 months.
D)It has resulted in obsoleting the use of transistors.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
________ is the ability to make and manipulate models.

A)Abstract reasoning
B)Cognitive acceleration
C)Adaptive learning
D)Holacracy
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
What is a marketable skill?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
What is collaboration? How can one ensure effective collaboration?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
Professionals in the 21st century need to be able to experiment in order to have greater job security.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
When a user is provided with an unfamiliar program and asked to use it,he or she is being tested on their ability to collaborate effectively.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
Routine skills are outsourced to the lowest bidder because the cost of data processing,storage,and communications is essentially zero.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
In a grocery store,a clerk uses a barcode scanner to read the barcode on an item.Which of the following components of an information system includes this scanning device?

A)hardware
B)software
C)data
D)procedure
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
The five-component framework of an information system consists of computer hardware,software,data,people,and ________.

A)documents
B)procedures
C)objectives
D)results
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
Increased outsourcing has made nonroutine skills less marketable.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
What is abstract reasoning?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
Abstract reasoning is one of the components of strong nonroutine cognitive skills.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is an example of a hardware component of an information system?

A)Web browser
B)operating system
C)storage disk
D)data file
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
A group of components that interact to achieve some purpose is referred to as a(n)________.

A)system
B)element
C)unit
D)entity
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
What is experimentation? Explain its importance.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
A marketable skill has no impact on job security.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
What is meant by systems thinking?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
Successful experimentation is throwing buckets of money at every crazy idea that enters one's head.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
Strong nonroutine cognitive skills are more in demand than routine skills.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
Critical feedback undermines collaboration.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
Effective collaboration is all about being nice to one's team members.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
Define Moore's Law and explain how the phenomenon described by it affects business.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
The methods used to start a program and save a file are referred to as procedures.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
An information system is a group of components that interact to produce information.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
Describe the five components of an information system using an example.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following is a critical responsibility of business professionals in using information systems?

A)protecting the security of a system and its data
B)reprogramming a system to meet changing needs
C)creating and modifying a system's databases
D)building and configuring additional networks
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following statements is true about the management and use of information systems?

A)An employee must be a programmer to manage information systems.
B)Information systems must be adapted to new requirements.
C)Information systems need not be maintained after development.
D)Organizations with dynamic business environments do not use information systems.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following components distinguishes information systems from information technology?

A)people
B)database structure
C)software
D)hardware
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
What are the points that one should keep in mind when deciding to implement a management information system (MIS)?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
Why is it important for business professionals to take an active role in developing and managing information systems?

A)They know how to create a database and configure computers.
B)They are the people who know how to build networks.
C)They know whether a system meets their needs and requirements.
D)They are the lone users of information systems.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
________ refers to the products,methods,inventions,and standards that are used to produce information.

A)Information technology
B)Information processing
C)Simulation
D)Product specification
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
Building information systems requires many different skills besides those of programmers.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
Businesses do not use information systems to achieve their strategies.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
Explain the management and use of information systems.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
Information systems should be created by a business only if they help achieve the strategies of that business.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following statements is true about information systems?

A)They can be bought off the shelf.
B)They are a group of components that produce information.
C)They drive the development of information technology.
D)They are not susceptible to the changing needs of the market.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following reasons is valid for a company to create a new information system?

A)to project a modern image
B)to avoid falling behind the technology curve
C)to help employees achieve the strategies of the business
D)to show its social networking presence
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
Information systems can be bought,whereas information technology cannot be bought.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
Define management information systems.What are the key elements of its definition?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
Information systems and information technology are not the same.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
Describe an information system.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
The use of information systems is restricted to the field of business.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following precautions should be taken to protect one's password?

A)Do not base it on the first letter of the words in a phrase.
B)Do not write it down or share it with others.
C)Do not use virtual keyboards to enter it.
D)Do not have multiple special characters in it.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following passwords is the weakest?

A)B33rmu9
B)Qw37^T1bb?as
C)3B47qq<3>5!7bdE
D)As60$T1dd?dc
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
What should be done if someone needs to log into a user's account to solve a problem and asks for the user's password?

A)The user should refuse to provide the password.
B)The user should enter the password themselves.
C)The user should say it out loud.
D)The user should provide the password through an email.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
What is the role of users in information security?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
Explain the necessary password etiquette to be followed by the users of an information system.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
If a password is complex,it is ideal to write it on a piece of paper and keep it near the workstation.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
Strong passwords have a maximum of five characters.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
Security systems ultimately depend on the behavior of their ________.

A)users
B)programmers
C)hardware components
D)database structures
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
A password is said to be weak if it contains ________.

A)a complete dictionary word
B)both upper- and lowercase letters
C)the numbers 9 and 3
D)three special characters
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
Users are advised not to share their password with others.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
Which of the following requirements should a password fulfill in order to be considered strong?

A)It should have five characters at the most.
B)It should contain a complete dictionary word.
C)It should not contain many special characters.
D)It should not contain the user name or company name.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
How can a strong password be made memorable?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
Moving away to let another user enter his or her password is a mark of professionalism.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following passwords is the strongest?

A)sword123
B)RileyyeliR
C)paranoid4EVER
D)BL@k2V1.0.1
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
Explain the characteristics of a strong password.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
A user has created a password that meets all the criteria for a strong password.What is a potential drawback of such a password?

A)It will be difficult to remember.
B)It will be very short.
C)It can be easily guessed.
D)It will create IP address conflicts in networks.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
Good passwords contain a complete dictionary word.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following techniques is best suited for creating memorable,strong passwords?

A)using at least one dictionary word in the password
B)repeating previously used passwords
C)basing passwords on the first letter of the words in a phrase
D)creating a password that is related to one's name or company's name
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
Which of the following statements on password etiquette is true?

A)If someone asks for the password,do not just give it out.
B)Always back up the password by writing it down.
C)Never access an information system from a computer that is connected to the Internet.
D)Never use the password more than three times a day.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
Explain the difference and the relationship between information technology (IT)and information systems (IS).
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 80 flashcards in this deck.