SOLUTION MANUAL FOR
Using MIS, 12th edition By David M. Kroenke, Randall J.
Boyle|Chapter 1-12
1. The Importance of MIS
LEARNING OBJECTIVES
Q1-1 Why is Introduction to M IS the most important class in the business school?
Q1-2 How M IS will affect you?
Q1-3 What is M IS?
Q1-4 How can you use the five-component model?
Q1-5 What is information?
Q1-6 What are necessary data characteristics?
Q1-7 2031?
CHAPTER OUTLINE
Q1-1 Why is Introduction to M IS the most important class in the business school?
The Digital Revolution
Evolving capabilities
Moore’s Law
Metcalfe’s Law
Other forces pushing digital change
This is the most important class in the school of business
Q1-2 How will M IS affect you?
How can you attain job security?
How can Intro to M IS help you learn nonroutine skills?
o Abstract Reasoning
o Systems Thinking
o Collaboration
o Ability to Experiment
o Jobs
What is the bottom line?
Q1-3 What is M IS?
Components of an information system
Management and use of information systems
Achieving strategies
Q1-4 How can you use the five-component model?
The most important component—You
All components must work
Copyright © 2022 Pearson Education, Inc.
, Kroenke - Using MIS 12th Ed - Instructor’s Manual 1-2
High-tech versus low-tech information systems
Understanding the scope of new information systems
Components ordered by difficulty and disruption
Q1-5 What is information?
Definitions vary
Where is information?
Q1-6 What are necessary data characteristics?
Accurate
Timely
Relevant
Just barely sufficient
Worth its cost
Q1-7 2031?
SECURITY GUIDE
Passwords and Password Etiquette
1. Here is a line from Shakespeare’s Macbeth: ―Tomorrow and tomorrow and
tomorrow, creeps in its petty pace.‖ Explain how to use these lines to create a
password. How could you add numbers and special characters to the password in a
way that you will be able to remember?
There are several correct ways to create a password from this line. One way might be
to take the first letters from each word. The password would then be ―tatatciipp.‖ You
could then capitalize a couple of the letters and add in a special character or numbers.
The resulting password could be ―T&2morrow&tciiPP.‖ This would be a very secure
password.
2. List two different phrases that you can use to create a strong password. Show the
password created by each.
There will be many correct answers to this question. Using a passphrase to create a
password is done by using the first letters in the phrase, then changing some of the
letters by substituting in special characters, numbers, or changes of case. For
example, the phrase, ―I never count my chickens before the eggs have hatched!‖
could create the password ―iNcmCHKNSb4t3ggsHH!‖ This would be a great
password.
3. One of the problems of life in the cyberworld is that we all are required to have
multiple passwords—one for work or school, one for bank accounts, another for eBay
or other auction sites, and so forth. Of course, it is better to use different passwords
for each. But in that case, you have to remember three or four different passwords.
Think of different phrases you can use to create a memorable, strong password for
each of these different accounts. Relate the phrase to the purpose of the account.
Show the passwords for each.
Copyright © 2022 Pearson Education, Inc.
, Kroenke - Using MIS 12th Ed - Instructor’s Manual 1-3
There will be many correct answers to this question. For example, a passphrase for a
university account may look something like, ―I will graduate from state university
before 2020 or bust!‖ This could yield a password that would look like
―IwgfSUb42020ORB!‖
4. Explain proper behavior when you are using your computer and you need to enter,
for some valid reason, another person’s password.
In this case, say to the other person, ―We need your password,‖ and then get out of
your chair, offer your keyboard to the other person, and look away while she enters
the password. Among professionals working in organizations that take security
seriously, this little ―do-si-do‖ move—one person getting out of the way so another
person can enter her password—is common and accepted.
5. Explain proper behavior when someone else is using her computer and that person
needs to enter, for some valid reason, your password.
If someone asks for your password, do not give it out. Instead, get up, go over to that
person’s machine, and enter your own password yourself. Stay present while your
password is in use, and ensure that your account is logged out at the end of the
activity. No one should mind or be offended in any way when you do this. It is the
mark of a professional.
SO WHAT?
IOTrends
1. People often use the terms Web and Internet interchangeably, but they are not the
same. Do your best to define each and identify exactly how they are different.
Student answers will vary but a good explanation can be found at the website
https://www.geeksforgeeks.org/whats-difference-internet-
web/#:~:text=The%20Internet%20is%20a%20global,on%20top%20of%20that%20in
frastructure. It states: ―The Internet is a global network of networks while the Web,
also referred formally as World Wide Web (www) is collection of information which
is accessed via the Internet. Another way to look at this difference is; the Internet is
infrastructure while the Web is service on top of that infrastructure.‖
2. The article talks about Web 1.0 and Web 2.0. You may be wondering if Web 2.0 is the
end of the line. What do you think—will there be a Web 3.0, and if so, what would it
entail?
Student responses will vary, but should cover some ideas and concepts that are not
already part of Web 1.0 or Web 2.0 specifically.
3. While IoT is clearly having an impact on businesses (e.g., tracking
manufacturing using sensors in production lines) and cities (e.g., tracking traffic
flows, lighting, public transportation), how has IoT impacted your life? Do you
have any IoT devices in your apartment or home? If not, which IoT devices would
you be interested in owning?
Copyright © 2022 Pearson Education, Inc.
, Kroenke - Using MIS 12th Ed - Instructor’s Manual 1-4
Student answers will vary, btu some devices could include Amazon Echo, Google
Nest, and similar devices.
4. Do you think IoT devices feature the newest and most advanced security
measures, or could there be potential security risks from using IoT devices?
Student answers will vary, but should point out that often times upon release new
products do not have all their security holes covered so users should be aware and
proceed with caution.
COLLABORATION EXERCISE 1
This chapter discussed why collaboration is a key skill for maintaining job security. In
this exercise, you will build a collaboration IS and then use that IS to answer the
questions below in a collaborative fashion. You might want to read the four questions
below before you build your IS.
Until you answer question 1-5, you’ll have to make do with email or face-to-face
meetings. Once you’ve answered that question, use your communication method to
answer question 1-6. Once you’ve answered question 1-6, use your communication
method and your content-sharing method to answer question 1-7. Then use the full IS to
answer questions 1-8 and 1-9.
1-5 Build a communication method:
a. Meet with your team and decide how you want to meet in the future.
Student decisions will vary. (LO: 2, Learning Outcome: Explain how IS can
enhance systems of collaboration and teamwork, AACSB: Interpersonal Relations
and Teamwork)
b. From the discussion in step a, list the requirements for your communication
system.
Student answers will vary. Expect students to include requirements in terms of
ease of use, availability, and features that support the way the team wants to work.
(LO: 2, Learning Outcome: Explain how IS can enhance systems of collaboration
and teamwork, AACSB: Interpersonal Relations and Teamwork)
c. Select and implement a communication tool. It could be Skype, Google Meet,
Zoom, or Skype for Business.
Student choices will vary depending on decision from step b above. (LO: 2,
Learning Outcome: Explain how IS can enhance systems of collaboration and
teamwork, AACS B: Interpersonal Relations and Teamwork)
d. Write procedures for the team to use when utilizing your new communication tool.
Student answers will vary. Look for students to include procedures regarding
meeting notifications, tardiness and missing meetings, and designating a team
member to send out reminders. (LO: 2, Learning Outcome: Explain how IS can
enhance systems of collaboration and teamwork, AACSB: Interpersonal Relations
Copyright © 2022 Pearson Education, Inc.