100% Zufriedenheitsgarantie Sofort verfügbar nach Zahlung Sowohl online als auch als PDF Du bist an nichts gebunden 4.2 TrustPilot
logo-home
Prüfung

Instructor’s Manual for Using MIS, 12th Edition by David M. Kroenke & Randall J. Boyle

Bewertung
-
Verkauft
-
seiten
107
Klasse
A+
Hochgeladen auf
07-10-2025
geschrieben in
2025/2026

This is the Instructor’s Manual for Using MIS (12th Edition) by David M. Kroenke and Randall J. Boyle (ISBN13: 9780136921653). Designed for instructors and educators, this manual offers a complete guide to effectively teach Management Information Systems (MIS) using this widely adopted textbook. It includes structured content for lesson planning, case discussions, and assessments. Includes: Detailed chapter outlines Lecture support materials Answers to review questions Suggested teaching strategies Integration tips for classroom use

Mehr anzeigen Weniger lesen
Hochschule
Using MIS
Kurs
Using MIS











Ups! Dein Dokument kann gerade nicht geladen werden. Versuch es erneut oder kontaktiere den Support.

Schule, Studium & Fach

Hochschule
Using MIS
Kurs
Using MIS

Dokument Information

Hochgeladen auf
7. oktober 2025
Anzahl der Seiten
107
geschrieben in
2025/2026
Typ
Prüfung
Enthält
Fragen & Antworten

Themen

Inhaltsvorschau

INSTRUCTOR’S MANUAL

USING MIS
12TH EDITION

CHAPTER NO. 01: THE IMPORTANCE OF M I S
SECURITY GUIDE: Passwords and Password Etiquette

1. Here is a line from Shakespeare’s Macbeth: “Tomorrow and tomorrow and
tomorrow, creeps in its petty pace.” Explain how to use these lines to create a
password. How could you add numbers and special characters to the password in a
way that you will be able to remember?
There are several correct ways to create a password from this line. One way might be
to take the first letters from each word. The password would then be “tatatciipp.” You
could then capitalize a couple of the letters and add in a special character or numbers.
The resulting password could be “T&2morrow&tciiPP.” This would be a very secure
password.

2. List two different phrases that you can use to create a strong password. Show the
password created by each.
There will be many correct answers to this question. Using a passphrase to create a
password is done by using the first letters in the phrase, then changing some of the
letters by substituting in special characters, numbers, or changes of case. For
example, the phrase, “I never count my chickens before the eggs have hatched!”
could create the password “iNcmCHKNSb4t3ggsHH!” This would be a great
password.

3. One of the problems of life in the cyberworld is that we all are required to have
multiple passwords—one for work or school, one for bank accounts, another for eBay
or other auction sites, and so forth. Of course, it is better to use different passwords
for each. But in that case, you have to remember three or four different passwords.
Think of different phrases you can use to create a memorable, strong password for
each of these different accounts. Relate the phrase to the purpose of the account.
Show the passwords for each.
There will be many correct answers to this question. For example, a passphrase for a
university account may look something like, “I will graduate from state university
before 2020 or bust!” This could yield a password that would look like
“IwgfSUb42020ORB!”

,4. Explain proper behavior when you are using your computer and you need to enter,
for some valid reason, another person’s password.
In this case, say to the other person, “We need your password,” and then get out of
your chair, offer your keyboard to the other person, and look away while she enters
the password. Among professionals working in organizations that take security
seriously, this little “do-si-do” move—one person getting out of the way so another
person can enter her password—is common and accepted.

5. Explain proper behavior when someone else is using her computer and that person
needs to enter, for some valid reason, your password.
If someone asks for your password, do not give it out. Instead, get up, go over to that
person’s machine, and enter your own password yourself. Stay present while your
password is in use, and ensure that your account is logged out at the end of the
activity. No one should mind or be offended in any way when you do this. It is the
mark of a professional.

SO WHAT?

IOTrends

1. People often use the terms Web and Internet interchangeably, but they are not the
same. Do your best to define each and identify exactly how they are different.
Student answers will vary but a good explanation can be found at the website
https://www.geeksforgeeks.org/whats-difference-internet-
web/#:~:text=The%20Internet%20is%20a%20global,on%20top%20of%20that%20in
frastructure. It states: “The Internet is a global network of networks while the Web,
also referred formally as World Wide Web (www) is collection of information which
is accessed via the Internet. Another way to look at this difference is; the Internet is
infrastructure while the Web is service on top of that infrastructure.”

2. The article talks about Web 1.0 and Web 2.0. You may be wondering if Web 2.0 is the
end of the line. What do you think—will there be a Web 3.0, and if so, what would it
entail?
Student responses will vary, but should cover some ideas and concepts that are not
already part of Web 1.0 or Web 2.0 specifically.

3. While IoT is clearly having an impact on businesses (e.g., tracking
manufacturing using sensors in production lines) and cities (e.g., tracking traffic
flows, lighting, public transportation), how has IoT impacted your life? Do you
have any IoT devices in your apartment or home? If not, which IoT devices would
you be interested in owning?

, Student answers will vary, btu some devices could include Amazon Echo, Google
Nest, and similar devices.

4. Do you think IoT devices feature the newest and most advanced security
measures, or could there be potential security risks from using IoT devices?
Student answers will vary, but should point out that often times upon release new
products do not have all their security holes covered so users should be aware and
proceed with caution.

COLLABORATION EXERCISE 1

This chapter discussed why collaboration is a key skill for maintaining job security. In
this exercise, you will build a collaboration I S and then use that I S to answer the
questions below in a collaborative fashion. You might want to read the four questions
below before you build your I S.
Until you answer question 1-5, you’ll have to make do with email or face-to-face
meetings. Once you’ve answered that question, use your communication method to
answer question 1-6. Once you’ve answered question 1-6, use your communication
method and your content-sharing method to answer question 1-7. Then use the full I S to
answer questions 1-8 and 1-9.

1-5 Build a communication method:

a. Meet with your team and decide how you want to meet in the future.
Student decisions will vary. (L O: 2, Learning Outcome: Explain how I S can
enhance systems of collaboration and teamwork, A A C S B: Interpersonal
Relations and Teamwork)

b. From the discussion in step a, list the requirements for your communication
system.
Student answers will vary. Expect students to include requirements in terms of
ease of use, availability, and features that support the way the team wants to work.
(L O: 2, Learning Outcome: Explain how I S can enhance systems of
collaboration and teamwork, A A C S B: Interpersonal Relations and Teamwork)

c. Select and implement a communication tool. It could be Skype, Google Meet,
Zoom, or Skype for Business.
Student choices will vary depending on decision from step b above. (L O: 2,
Learning Outcome: Explain how I S can enhance systems of collaboration and
teamwork, A A C S B: Interpersonal Relations and Teamwork)

, d. Write procedures for the team to use when utilizing your new communication tool.
Student answers will vary. Look for students to include procedures regarding
meeting notifications, tardiness and missing meetings, and designating a team
member to send out reminders. (L O: 2, Learning Outcome: Explain how I S can
enhance systems of collaboration and teamwork, A A C S B: Interpersonal
Relations and Teamwork)

1-6 Build a content sharing method:

a. Meet with your team and decide the types of content that you will be creating.
Student answers will vary. (L O: 2, Learning Outcome: Explain how I S can
enhance systems of collaboration and teamwork, A A C S B: Interpersonal
Relations and Teamwork)
b. Decide as a team whether you want to process your content using desktop
applications or cloud-based applications. Choose the applications you want to
use.
Student answers will vary. (L O: 2, Learning Outcome: Explain how I S can
enhance systems of collaboration and teamwork, A A C S B: Interpersonal
Relations and Teamwork)

c. Decide as a team the server you will use to share your content. You can use
Google Drive, Microsoft OneDrive, Microsoft SharePoint, or some other server.
Student answers will vary. Student decision will depend in part on the availability
of tools, such as SharePoint, in their environment. (L O: 2, Learning Outcome:
Explain how I S can enhance systems of collaboration and teamwork, A A C S B:
Interpersonal Relations and Teamwork)

d. Implement your content-sharing server.
No specific answer; a task to be performed by students. (L O: 2, Learning
Outcome: Explain how I S can enhance systems of collaboration and teamwork,
A A C S B: Interpersonal Relations and Teamwork)

e. Write procedures for the team to use when sharing content.
Student answers will vary. Look for students to include procedures regarding
responding to requests to edit, timeliness of responses, and expectations for
participating in content review. (L O: 2, Learning Outcome: Explain how I S can
enhance systems of collaboration and teamwork, A A C S B: Interpersonal
Relations and Teamwork)
20,19 €
Vollständigen Zugriff auf das Dokument erhalten:

100% Zufriedenheitsgarantie
Sofort verfügbar nach Zahlung
Sowohl online als auch als PDF
Du bist an nichts gebunden

Lerne den Verkäufer kennen

Seller avatar
Bewertungen des Ansehens basieren auf der Anzahl der Dokumente, die ein Verkäufer gegen eine Gebühr verkauft hat, und den Bewertungen, die er für diese Dokumente erhalten hat. Es gibt drei Stufen: Bronze, Silber und Gold. Je besser das Ansehen eines Verkäufers ist, desto mehr kannst du dich auf die Qualität der Arbeiten verlassen.
docusity Nyc Uni
Folgen Sie müssen sich einloggen, um Studenten oder Kursen zu folgen.
Verkauft
1212
Mitglied seit
2 Jahren
Anzahl der Follower
135
Dokumente
1318
Zuletzt verkauft
11 Jahren vor

4,5

189 rezensionen

5
135
4
29
3
16
2
1
1
8

Kürzlich von dir angesehen.

Warum sich Studierende für Stuvia entscheiden

on Mitstudent*innen erstellt, durch Bewertungen verifiziert

Geschrieben von Student*innen, die bestanden haben und bewertet von anderen, die diese Studiendokumente verwendet haben.

Nicht zufrieden? Wähle ein anderes Dokument

Kein Problem! Du kannst direkt ein anderes Dokument wählen, das besser zu dem passt, was du suchst.

Bezahle wie du möchtest, fange sofort an zu lernen

Kein Abonnement, keine Verpflichtungen. Bezahle wie gewohnt per Kreditkarte oder Sofort und lade dein PDF-Dokument sofort herunter.

Student with book image

“Gekauft, heruntergeladen und bestanden. So einfach kann es sein.”

Alisha Student

Häufig gestellte Fragen