1) The number of transistors per square inch on an integrated chip doubles every 18 months. This observation is known as ________ Law.
A) Murphy's
B) Moore's
C) Amdahl's
D) Metcalfe's
Answer: B
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the major types of computer hardware and software used by companies.
Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school?
Classification: Concept
2) Which of the following statements is TRUE of Moore's Law?
A) It is based on the technological advancements in weapon manufacturing.
B) It made the cost of data processing, communications, and storage essentially zero.
C) It states that the total number of transistors produced in the world doubles every 18 months.
D) It has made the use of transistors obsolete.
Answer: B
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Describe the major types of computer hardware and software used by companies.
Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school?
Classification: Concept
3) Which of the following is a result of Moore's law?
A) The risk of technology becoming obsolete has decreased.
B) The price to performance ratio of computers has fallen dramatically.
C) The outsourcing of nonroutine skills has increased drastically.
D) The cost of data processing has increased considerably.
Answer: B
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Explain how IS can be used to gain and sustain competitive advantage.
Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school?
Classification: Concept
4) Which of the following is TRUE about the impact of Moore's Law on business professionals?
A) They need to be able to assess, evaluate, and apply emerging information technology to business.
B) They have to concentrate more on developing routine skills than nonroutine skills.
C) They need to be able to develop better communication and information technologies.
D) They no longer need to focus on skills such as abstract reasoning and collaboration.
Answer: A
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Explain how IS can be used to gain and sustain competitive advantage.
Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school?
Classification: Concept
5) ________ states that the value of a network is equal to the square of the number of users connected to it.
A) Kryder's Law
B) Metcalfe's Law
C) Moore's Law
D) Nielsen's Law
Answer: B
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Explain how IS can be used to gain and sustain competitive advantage.
Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school?
Classification: Concept
6) Which of the following laws speaks about the storage density on magnetic disks?
A) Metcalfe's Law
B) Kryder's Law
C) Nielsen's Law
D) Moore's Law
Answer: B
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Explain how IS can be used to gain and sustain competitive advantage.
Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school?
Classification: Concept
7) Moore's Law states that the speed of a computer doubles every 18 months.
Answer: FALSE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the major types of computer hardware and software used by companies.
Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school?
Classification: Concept
8) Future business professionals need to be able to apply information technology to business.
Answer: TRUE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Explain how IS can be used to gain and sustain competitive advantage.
Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school?
Classification: Concept
9) The number of businesses adopting new technologies has seen a downfall over the years.
Answer: FALSE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Explain how IS can be used to gain and sustain competitive advantage.
Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school?
Classification: Concept
10) Define Moore's Law and explain how the phenomenon described by it affects business.
Answer: Moore's Law states that the number of transistors per square inch on an integrated chip doubles every 18 months. The more common version of this is expressed as, "The speed of a computer chip doubles every 18 months," which is incorrect. Due to the impact of Moore's Law, the price to performance ratio of computers has fallen dramatically. Moore's Law is the principal reason why data storage and data transmission are essentially free today. New businesses like YouTube and Facebook have taken advantage of the opportunities offered by this development.
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Explain how IS can be used to gain and sustain competitive advantage.
Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school?
Classification: Concept
11) As the cost of data processing, storage, and communications is essentially zero, any routine skill can and will be ________.
A) considered a nonroutine cognitive skill
B) a strong marketable skill
C) outsourced to the lowest bidder
D) sufficient to attain job security
Answer: C
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Explain how IS can be used to gain and sustain competitive advantage.
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
12) Which of the following is an impact of rapid technological change on job security?
A) Routine skills have more demand.
B) Nonroutine cognitive skills have gained more market value.
C) Nonroutine jobs are outsourced, thus reducing the need of an in-house workforce.
D) Routine skills are no longer required to complete a task.
Answer: B
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Discuss the ethical and social issues raised by the use of information systems.
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
13) Which of the following statements is TRUE of nonroutine cognitive skills?
A) They have become less marketable.
B) They increase an individual's job security.
C) They do not experience the impact of technological changes.
D) They are usually outsourced by organizations to the lowest bidder.
Answer: B
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Discuss the ethical and social issues raised by the use of information systems.
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
14) ________ is the ability to make and manipulate models.
A) Abstract reasoning
B) Cognitive acceleration
C) Adaptive learning
D) Holacracy
Answer: A
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
15) ________ is the ability to model the components of a unit to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed.
A) Systems thinking
B) Collaboration
C) Adaptive learning
D) Critical reasoning
Answer: A
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
16) Which of the following best describes collaboration?
A) It is the ability of an individual to model the components of the system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed.
B) It is the ability to assess, evaluate, and apply emerging information technology to business.
C) It is the activity of two or more people working together to achieve a common goal, result, or work product.
D) It is the activity of constructing or modifying models with the help of one's nonroutine cognitive skills.
Answer: C
AACSB: Interpersonal Relations and Teamwork
Difficulty: 1: Easy
Course LO: Explain how IS can enhance systems of collaboration and teamwork.
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
17) In a job interview, Lillian is asked to be part of a three-member group and design a mock business process based on the strengths and skills of the group's members. In this case, which of the following skills is the interviewer trying to test?
A) collaboration
B) cognitive acceleration
C) systems thinking
D) facilitation
Answer: A
AACSB: Reflective Thinking
Difficulty: 2: Moderate
Course LO: Explain how IS can enhance systems of collaboration and teamwork.
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Application
18) Patricia, the marketing manager of a manufacturing firm, plans new marketing strategies with the help of her subordinates by providing and receiving critical feedback. Patricia is displaying effective ________.
A) collaboration
B) cognitive acceleration
C) virtualization
D) abstraction
Answer: A
AACSB: Reflective Thinking
Difficulty: 2: Moderate
Course LO: Explain how IS can enhance systems of collaboration and teamwork.
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Application
19) Which of the following is necessary for effective collaboration?
A) modeling the components of a system
B) focusing on individual goals
C) proper division of tasks
D) giving and receiving critical feedback
Answer: D
AACSB: Interpersonal Relations and Teamwork
Difficulty: 2: Moderate
Course LO: Explain how IS can enhance systems of collaboration and teamwork.
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
20) ________ is making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the available resources.
A) Experimentation
B) Abstraction
C) Systems thinking
D) Collaboration
Answer: A
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
21) Marketing managers planning to use new social networking technologies to strengthen their market presence are portraying their ________.
A) ability to experiment
B) routine skills
C) collaboration skills
D) ability to outsource work
Answer: A
AACSB: Analytical Thinking
Difficulty: 2: Moderate
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
22) In a job interview, Roy is asked to use a product that he has never used before and is unfamiliar with its functioning. Which of the following skills is the interviewer trying to test?
A) systems thinking
B) abstract reasoning
C) collaboration skills
D) ability to experiment
Answer: D
AACSB: Reflective Thinking
Difficulty: 2: Moderate
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Application
23) The knowledge of managing information systems can lead to greater job security.
Answer: TRUE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Discuss the ethical and social issues raised by the use of information systems.
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
24) A marketable skill has no impact on job security.
Answer: FALSE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Explain how IS can be used to gain and sustain competitive advantage.
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
25) Strong nonroutine cognitive skills are more in demand than routine skills.
Answer: TRUE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
26) Abstract reasoning is one of the components of strong nonroutine cognitive skills.
Answer: TRUE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
27) Critical feedback undermines collaboration.
Answer: FALSE
AACSB: Interpersonal Relations and Teamwork
Difficulty: 1: Easy
Course LO: Explain how IS can enhance systems of collaboration and teamwork.
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
28) Effective collaboration is all about being nice to one's team members.
Answer: FALSE
AACSB: Interpersonal Relations and Teamwork
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
29) Professionals in the 21st century need to be able to experiment in order to have greater job security.
Answer: TRUE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Explain how IS can be used to gain and sustain competitive advantage.
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
30) Successful experimentation is characterized by the investment of huge sums of money at every idea that enters one's head.
Answer: FALSE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
31) When a user is provided with an unfamiliar program and asked to use it, he or she is being tested on their ability to collaborate effectively.
Answer: FALSE
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Explain how IS can enhance systems of collaboration and teamwork.
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
32) What is a marketable skill?
Answer: A marketable skill used to be that one could name particular skills, such as computer programming, tax accounting, or marketing, as examples of marketable skills. But today, because of Moore's Law, because the cost of data processing, storage, and communications is essentially zero, any routine skill can and will be outsourced to the lowest bidder. One has to develop strong nonroutine cognitive skills to be more successful and such skills are called marketable skills. Abstract reasoning, systems thinking, collaboration, and the ability to experiment are also classified as marketable skills.
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
33) What is abstract reasoning?
Answer: Abstract reasoning is the ability to make and manipulate models. Constructing a model from the five components of an information system is an example of abstract reasoning.
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
34) What is systems thinking?
Answer: Systems thinking is the ability to model the components of a system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed. It shows how components' inputs and outputs relate to one another.
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
35) What is collaboration? How can one ensure effective collaboration?
Answer: Collaboration is the activity of two or more people working together to achieve a common goal, result, or work product. It means to develop ideas and plans with others in a team and to provide and receive critical feedback. Effective collaboration is not about being nice. Surveys indicate the single most important skill for effective collaboration is to give and receive critical feedback.
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
36) What is experimentation? Explain its importance.
Answer: Experimentation is making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has. Fear of failure paralyzes many good people and many good ideas. This can be overcome by having the ability to experiment.
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
37) Which of the following is TRUE of tradable jobs?
A) They are dependent on a particular location.
B) They can be outsourced overseas.
C) They only include technical positions.
D) They only include nontechnical and managerial positions.
Answer: B
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Explain how IS can be used to gain and sustain competitive advantage.
Learning Obj: LO 1.3: Why are MIS-related jobs in high demand?
Classification: Concept
38) According to the U.S. Bureau of Labor Statistics, all good computer jobs have gone overseas.
Answer: FALSE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Explain how IS can be used to gain and sustain competitive advantage.
Learning Obj: LO 1.3: Why are MIS-related jobs in high demand?
Classification: Concept
39) ________ refers to the products, methods, inventions, and standards that are used to produce information.
A) Information technology
B) Information processing
C) Simulation
D) Product specification
Answer: A
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
40) Which of the following statements is TRUE about information systems?
A) They can be bought off the shelf.
B) They are a group of components that produce information.
C) They drive the development of information technology.
D) They are not susceptible to the changing needs of the market.
Answer: B
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
41) Which of the following components distinguishes information systems from information technology?
A) people
B) procedure
C) software
D) hardware
Answer: A
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
42) A group of components that interact to achieve some purpose is referred to as a(n) ________.
A) system
B) element
C) unit
D) entity
Answer: A
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
43) Which of the following is an example of a hardware component of an information system?
A) Web browser
B) operating system
C) storage disk
D) data file
Answer: C
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the major types of computer hardware and software used by companies.
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
44) The five-component framework of an information system consists of computer hardware, software, data, people, and ________.
A) documents
B) procedures
C) objectives
D) results
Answer: B
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
45) In a grocery store, a clerk uses a barcode scanner to read the barcode on an item. Which of the following components of an information system includes this scanning device?
A) hardware
B) software
C) data
D) procedure
Answer: A
AACSB: Reflective Thinking
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.4: What is MIS?
Classification: Application
46) Which of the following statements is TRUE about the management and use of information systems?
A) An employee must be a programmer to manage information systems.
B) Information systems must be adapted to new requirements.
C) Information systems need not be maintained after development.
D) Organizations with dynamic business environments do not use information systems.
Answer: B
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects.
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
47) Why is it important for business professionals to take an active role in developing and managing information systems?
A) They know how to create a database and configure computers.
B) They are the people who know how to build networks.
C) They know whether a system meets their needs and requirements.
D) They are the lone users of information systems.
Answer: C
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects.
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
48) Which of the following is a critical responsibility of business professionals in using information systems?
A) protecting the security of a system and its data
B) reprogramming a system to meet changing needs
C) creating and modifying a system's databases
D) building and configuring additional networks
Answer: A
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects.
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
49) Information systems and information technology are not the same.
Answer: TRUE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Discuss the role of information systems in supporting business processes.
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
50) Information systems can be bought, whereas information technology cannot be bought.
Answer: FALSE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
51) An information system is a group of components that interact to produce information.
Answer: TRUE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
52) The methods used to start a program and save a file are referred to as procedures.
Answer: TRUE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
53) Building information systems requires many different skills besides those of programmers.
Answer: TRUE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
54) The use of information systems is restricted to the field of business.
Answer: FALSE
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Discuss the role of information systems in supporting business processes.
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
55) Information systems should be created by a business only if they help achieve the strategies of that business.
Answer: TRUE
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Discuss the role of information systems in supporting business processes.
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
56) Explain the difference and the relationship between information technology (IT) and information systems (IS).
Answer: Information technology and information systems are two closely related terms, but they are different. Information technology (IT) refers to the products, methods, inventions, and standards that are used for the purpose of producing information. IT pertains to the hardware, software, and data components. An information system (IS) is an assembly of hardware, software, data, procedures, and people that produces information. Information technology drives the development of new information systems.
Users can buy IT; they can buy or lease hardware, they can license programs and databases, and they can even obtain predesigned procedures. Ultimately, however, it is the people who execute those procedures to employ the new IT.
For any new system, users will always have training tasks (and costs), they will always have the need to overcome employees' resistance to change, and they will always need to manage the employees as they use the new system. Hence, one can buy IT, but not IS.
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Discuss the key issues involved in managing the components of IT infrastructure.
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
57) Describe an information system.
Answer: A system is a group of components that interact to achieve some purpose. An information system (IS) is a group of components that interact to produce information. An IS is based on the five-component framework of computer hardware, software, data, procedures, and people. These five components are present in every information system—from the most simple to the most complex.
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
58) Describe the five components of an information system using an example.
Answer: The five components of an information system are computer hardware, software, data, procedures, and people. For example, when one uses a computer to write a class report, he or she is using hardware (the computer, storage disk, keyboard, and monitor), software (Word, WordPerfect, or some other word-processing program), data (the words, sentences, and paragraphs in his or her report), procedures (the methods he or she uses to start the program, enter his or her report, print it, and save and back up his or her file), and people (an individual).
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe the components of an information system (IS).
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
59) Define management information system. What are the key elements of its definition?
Answer: A management information system is the management and use of information systems that help businesses achieve their strategies. This definition has three key elements: management and use, information systems, and strategies.
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects.
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
60) Explain the management and use of information systems.
Answer: Information systems must be developed, maintained and, because business is dynamic, they must be adapted to new requirements. To create an information system that meets specific needs, one will have to take an active role in that system's development. In addition to management tasks, he or she will also have important roles to play in the use of information systems. For example, when using an information system, there will be responsibilities for protecting the security of the system and its data. One may also have tasks for backing up data.
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects.
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
61) What are the points that one should keep in mind when deciding to implement a management information system (MIS)?
Answer: When deciding to implement an MIS, one needs to keep in mind that information systems are not created for exploring technology. They are not created so that the company can be "modern" or so that the company can show it has a social networking presence on the Web. They are not created because the information systems (IS) department thinks they need to be created or because the company is "falling behind the technology curve." Information systems exist to help people who work in a business to achieve the strategies of that business.
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects.
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
62) Security systems ultimately depend on the behavior of their ________.
A) users
B) programmers
C) hardware components
D) database structures
Answer: A
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe different methods of managing IS security.
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept
63) Which of the following requirements should a password fulfill in order to be considered strong?
A) It should have five characters at the most.
B) It should contain a complete dictionary word.
C) It should not contain many special characters.
D) It should not contain the user name or company name.
Answer: D
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe different methods of managing IS security.
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept
64) A user has created a password that meets all the criteria for a strong password. What is a potential drawback of such a password?
A) It will be difficult to remember.
B) It will be very short.
C) It can be easily guessed.
D) It might be the password of another computer.
Answer: A
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Describe different methods of managing IS security.
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept
65) A password is said to be weak if it contains ________.
A) a complete dictionary word
B) both uppercase and lowercase letters
C) the numbers 9 and 3
D) three special characters
Answer: A
AACSB: Analytical Thinking
Difficulty: 2: Moderate
Course LO: Describe different methods of managing IS security.
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept
66) Which of the following passwords is the weakest?
A) Bird999
B) TuRning243
C) 3B47qq<3>5!7bdE
D) As60$T1dd?dc
Answer: A
AACSB: Analytical Thinking
Difficulty: 2: Moderate
Course LO: Describe different methods of managing IS security.
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept
67) Which of the following passwords is the strongest?
A) sword123
B) RileyyeliR
C) paranoid4EVER
D) BL@k2V1.0.1
Answer: D
AACSB: Analytical Thinking
Difficulty: 2: Moderate
Course LO: Describe different methods of managing IS security.
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept
68) Which of the following techniques is best suited for creating memorable, strong passwords?
A) using at least one dictionary word in the password
B) repeating previously used passwords
C) basing passwords on the first letter of the words in a phrase
D) creating a password that is related to one's name or company's name
Answer: C
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Describe different methods of managing IS security.
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept
69) Which of the following precautions should be taken to protect one's password?
A) Do not base it on the first letter of the words in a phrase.
B) Do not write it down or share it with others.
C) Do not use virtual keyboards to enter it.
D) Do not have multiple special characters in it.
Answer: B
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe different methods of managing IS security.
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept
70) Which of the following statements on password etiquette is TRUE?
A) If someone asks for the password, do not just give it out.
B) Always back up the password by writing it down.
C) Never access an information system from a computer that is connected to the Internet.
D) Never use the password more than three times a day.
Answer: A
AACSB: Ethical Understanding and Reasoning Abilities
Difficulty: 2: Moderate
Course LO: Describe different methods of managing IS security.
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept
71) What should be done if someone needs to log into a user's account to solve a problem and asks for the user's password?
A) The user should refuse to provide the password.
B) The user should enter the password themselves.
C) The user should say it out loud.
D) The user should provide the password through an email.
Answer: B
AACSB: Ethical Understanding and Reasoning Abilities
Difficulty: 1: Easy
Course LO: Describe different methods of managing IS security.
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept
72) Strong passwords have a maximum of five characters.
Answer: FALSE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe different methods of managing IS security.
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept
73) Good passwords contain a complete dictionary word.
Answer: FALSE
AACSB: Analytical Thinking
Difficulty: 1: Easy
Course LO: Describe different methods of managing IS security.
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept
74) If a password is complex, it is ideal to write it on a piece of paper and keep it near the workstation.
Answer: FALSE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe different methods of managing IS security.
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept
75) Moving away to let another user enter his or her password is a mark of professionalism.
Answer: TRUE
AACSB: Ethical Understanding and Reasoning Abilities
Difficulty: 1: Easy
Course LO: Describe different methods of managing IS security.
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept
76) Users are advised not to share their password with others.
Answer: TRUE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe different methods of managing IS security.
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept
77) What is the role of users in information security?
Answer: Like all information systems, security systems have five components, including people. Thus, every security system ultimately depends on the behavior of its users. If the users do not take security seriously, if they do not follow security procedures, then the hardware, software, and data components of the security system are wasted expenses. Almost all security systems use user names and passwords. Users of information systems in a business organization will be instructed to create a strong password and to protect it. It is vitally important for users to do so.
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe different methods of managing IS security.
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept
78) Explain the characteristics of a strong password.
Answer: The characteristics of a strong password are:
1. It should have 10 or more characters, 12 is even better.
2. It should not contain one's user name, real name, or company name.
3. It should not contain a complete dictionary word in any language.
4. It should be different from the previous passwords the user has used.
5. It should contain both upper- and lowercase letters, numbers, and special characters (such as ˜ ! @; # $ % ^; &; * ( ) _ +; — =; { } | [ ] \ : " ; ' <; >;? , . /).
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe different methods of managing IS security.
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept
79) How can a strong password be made memorable?
Answer: One technique for creating memorable, strong passwords is to base them on the first letter of the words in a phrase. The phrase could be the title of a song or the first line of a poem or one based on some fact about one's life. For example, one can take the phrase, "I was born in Rome, New York, before 1990." Using the first letters from that phrase and substituting the character for the word before, one can create the password IwbiR,NY<1990.
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe different methods of managing IS security.
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept
80) Explain the necessary password etiquette to be followed by the users of an information system.
Answer: Once users create a strong password, they need to protect it with proper behavior. Proper password etiquette is one of the marks of a business professional. Users should never write down their password, and should not share it with others. They should never ask others for their passwords. If, in a work-related or emergency situation, someone asks for the password, users are advised not to give it out. Instead, it is better for the user to get up, go over to that person's machine, and enter the password. Users should be present while their password is in use, and should ensure that their account is logged out at the end of the activity.
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Describe different methods of managing IS security.
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept
81) What is one reason information technology has changed from a minor support function to a primary driver of corporate profitability?
A) Because technology fundamentally changes business.
B) Because technology is much cheaper than in the past.
C) Because corporate executives like computers.
D) Because Apple, Inc. became a publicly traded company.
Answer: A
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Why is introduction to MIS the most important class in the business school?.
Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school?
Classification: Concept
82) The conversion from analog to digital equipment is known as the ________.
A) Information Age
B) Bells Law
C) Digital Revolution
D) Digital Age
Answer: C
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: The Digital Revolution
Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school?
Classification: Concept
83) Kryder's law states that storage density on magnetic disks is increasing at an exponential rate.
Answer: TRUE
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Other forces pushing digital change
Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school?
Classification: Concept
84) What is Project Loon and why is it important?
Answer: Project Loon, sponsored by Google, is a major effort to bring internet access to everyone in the world. The network uses inflated balloons floating around the world.
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Metcalfe's Law
Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school?
Classification: Concept
85) What is a primary metric for social media companies?
A) number of subscribers
B) advertising revenue
C) number of active posts (NAP)
D) monthly active users (MAU)
Answer: D
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Metcalfe's Law
Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school?
Classification: Concept
86) Why did Jennifer lose her job at Falcon Security?
A) because of a downturned economy
B) because she did not agree with Joni
C) because she did not experiment with any ideas
D) because the company moved to another city
Answer: C
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: How can I attain job security?
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
87) Which task is an example of abstract reasoning?
A) Construct a model.
B) Model systems components.
C) Provide critical feedback.
D) Test new alternatives.
Answer: A
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: How can Intro to MIS help you learn non-routine skills?
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
88) Effective collaboration is about being nice.
Answer: FALSE
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: How can Intro to MIS help you learn non-routine skills?
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
89) Since 1990 the most significant determinate of employment and salary is ________.
A) the ability to experiment
B) education
C) industry
D) nature of work performed.
Answer: D
AACSB: Information Technology
Difficulty: 3: Challenging
Course LO: How can Intro to MIS help you learn non-routine skills?
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
90) Describe what causes many good people with good ideas to not try their idea.
Answer: Fear of failure: the fear that paralyzes so many good people and so many ideas. Some people are afraid to experiment with their ideas. Successful experimentation is not throwing buckets of money at every idea. Experimentation is making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones.
AACSB: Information Technology
Difficulty: 3: Challenging
Course LO: How can Intro to MIS help you learn non-routine skills?
Learning Obj: LO 1.2: How will MIS affect me?
Classification: Concept
91) All good computer jobs have gone overseas away from the United States
Answer: FALSE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Why are MIS-related jobs in high demand
Learning Obj: LO 1.3: Why are MIS-related jobs in high demand?
Classification: Concept
92) All of these skills are high paying jobs available to business professionals in information systems and computer technology EXCEPT ________.
A) accounting manager
B) improving business process quality
C) interpret data mining results for improved marketing
D) know how to use emerging technologies
Answer: A
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Why are MIS-related jobs in high demand
Learning Obj: LO 1.3: Why are MIS-related jobs in high demand?
Classification: Concept
93) For any new system, you will always have these obstacles EXCEPT ________.
A) developing a social media page
B) raining tasks
C) overcoming employee's resistance to change
D) managing employees as they use the new system
Answer: A
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: What is MIS?
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
94) Every system whether simple or complex uses the five-component framework model.
Answer: TRUE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Components of an information system
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
95) Whatever career you choose you must ________ systems development.
A) know how much it costs to create a
B) take an active role in
C) wait for the
D) know how to create
Answer: B
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Management and the use of information systems.
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
96) What does an organization themselves do?
A) create products
B) create services
C) nothing
D) build information systems
Answer: C
AACSB: Information Technology
Difficulty: 2: Moderate
Course LO: Achieving strategies
Learning Obj: LO 1.4: What is MIS?
Classification: Concept
97) Security systems ultimately depend on ________.
A) the firewalls installed
B) behavior of users
C) the devices on the network
D) the security budget
Answer: B
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: What is your role in security?
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept
98) The future belongs to people businesspeople who can envision new applications for technology.
Answer: TRUE
AACSB: Information Technology
Difficulty: 1: Easy
Course LO: Password etiquette
Learning Obj: LO 1.5: What is your role in IS security?
Classification: Concept