Kroenke - Using MIS 12th Ed - Instructor’s Manual
Solution Manual For
Using MIS 12th Edition
By: David M. Kroenke
Copyright © 2022 Pearson Education, Inc.
, Kroenke - Using MIS 12th Ed - Instructor’s Manual
Solution Manual For
Using Mis, 12th Edition By David M. Kroenke, Randall J.
Boyle|Chapter 1-12
1. The Importance Of Mis
Learning Objectives
Q1-1 Why Is Introduction To Mis The Most Important Class In The Business
School? Q1-2 How Mis Will Affect You?
Q1-3 What Is Mis?
Q1-4 How Can You Use The Five-Component
Model? Q1-5 What Is Information?
Q1-6 What Are Necessary Data
Characteristics? Q1-7 2031?
Chapter Outline
Q1-1 Why Is Introduction To Mis The Most Important Class In The Business School?
• The Digital Revolution
• Evolving Capabilities
• Moore’s Law
• Metcalfe’s Law
• Other Forces Pushing Digital Change
• This Is The Most Important Class In The School Of
Business Q1-2 How Will Mis Affect You?
• How Can You Attain Job Security?
• How Can Intro To Mis Help You Learn Nonroutine Skills?
o Abstract Reasoning
o Systems Thinking
o Collaboration
o Ability To Experiment
o Jobs
• What Is The Bottom
Line? Q1-3 What Is
Mis?
• Components Of An Information System
• Management And Use Of Information Systems
• Achieving Strategies
Q1-4 How Can You Use The Five-Component Model?
• The Most Important Component—You
• All Components Must Work
Copyright © 2022 Pearson Education, Inc.
, Kroenke - Using MIS 12th Ed - Instructor’s Manual 1-2
• High-Tech Versus Low-Tech Information Systems
• Understanding The Scope Of New Information Systems
• Components Ordered By Difficulty And
Disruption Q1-5 What Is Information?
• Definitions Vary
• Where Is Information?
Q1-6 What Are Necessary Data Characteristics?
• Accurate
• Timely
• Relevant
• Just Barely Sufficient
• Worth Its
Cost Q1-7 2031?
Security Guide
Passwords And Password Etiquette
1. Here Is A Line From Shakespeare’s Macbeth: ―Tomorrow And Tomorrow And
Tomorrow, Creeps In Its Petty Pace.‖ Explain How To Use These Lines To Create A
Password. How Could You Add Numbers And Special Characters To The Password
In A Way That You Will Be Able To Remember?
There Are Several Correct Ways To Create A Password From This Line. One Way
Might Be To Take The First Letters From Each Word. The Password Would Then Be
―Tatatciipp.‖ You Could Then Capitalize A Couple Of The Letters And Add In A
Special Character Or Numbers. The Resulting Password Could Be
―T&2morrow&Tciipp.‖ This Would Be A Very Secure Password.
2. List Two Different Phrases That You Can Use To Create A Strong Password.
Show The Password Created By Each.
There Will Be Many Correct Answers To This Question. Using A Passphrase To
Create A Password Is Done By Using The First Letters In The Phrase, Then
Changing Some Of The Letters By Substituting In Special Characters, Numbers, Or
Changes Of Case. For Example, The Phrase, ―I Never Count My Chickens Before
The Eggs Have Hatched!‖ Could Create The Password ―Incmchknsb4t3ggshh!‖
This Would Be A Great Password.
3. One Of The Problems Of Life In The Cyberworld Is That We All Are Required To
Have Multiple Passwords—One For Work Or School, One For Bank Accounts,
Another For Ebay Or Other Auction Sites, And So Forth. Of Course, It Is Better To
Use Different Passwords For Each. But In That Case, You Have To Remember Three
Or Four Different Passwords. Think Of Different Phrases You Can Use To Create A
Memorable, Strong Password For Each Of These Different Accounts. Relate The
Phrase To The Purpose Of The Account. Show The Passwords For Each.
Copyright © 2022 Pearson Education, Inc.
, Kroenke - Using MIS 12th Ed - Instructor’s Manual 1-3
There Will Be Many Correct Answers To This Question. For Example, A Passphrase
For A University Account May Look Something Like, ―I Will Graduate From State
University Before 2020 Or Bust!‖ This Could Yield A Password That Would Look
Like
―Iwgfsub42020orb!‖
4. Explain Proper Behavior When You Are Using Your Computer And You Need To
Enter, For Some Valid Reason, Another Person’s Password.
In This Case, Say To The Other Person, ―We Need Your Password,‖ And Then Get
Out Of Your Chair, Offer Your Keyboard To The Other Person, And Look Away
While She Enters The Password. Among Professionals Working In Organizations
That Take Security Seriously, This Little ―Do-Si-Do‖ Move—One Person Getting
Out Of The Way So Another Person Can Enter Her Password—Is Common And
Accepted.
5. Explain Proper Behavior When Someone Else Is Using Her Computer And That
Person Needs To Enter, For Some Valid Reason, Your Password.
If Someone Asks For Your Password, Do Not Give It Out. Instead, Get Up, Go Over
To That Person’s Machine, And Enter Your Own Password Yourself. Stay Present
While Your Password Is In Use, And Ensure That Your Account Is Logged Out At
The End Of The Activity. No One Should Mind Or Be Offended In Any Way When
You Do This. It Is The Mark Of A Professional.
So What?
Iotrends
1. People Often Use The Terms Web And Internet Interchangeably, But They Are Not
The Same. Do Your Best To Define Each And Identify Exactly How They Are
Different. Student Answers Will Vary But A Good Explanation Can Be Found At
The Website Https://Www.Geeksforgeeks.Org/Whats-Difference-Internet-
Web/#:~:Text=The%20internet%20is%20a%20global,On%20top%20of%20that%20i
n Frastructure. It States: ―The Internet Is A Global Network Of Networks While
The Web, Also Referred Formally As World Wide Web (Www) Is Collection Of
Information Which Is Accessed Via The Internet. Another Way To Look At This
Difference Is; The Internet Is Infrastructure While The Web Is Service On Top Of
That Infrastructure.‖
2. The Article Talks About Web 1.0 And Web 2.0. You May Be Wondering If Web 2.0 Is
The End Of The Line. What Do You Think—Will There Be A Web 3.0, And If So,
What Would It Entail?
Student Responses Will Vary, But Should Cover Some Ideas And Concepts That Are
Not Already Part Of Web 1.0 Or Web 2.0 Specifically.
3. While Iot Is Clearly Having An Impact On Businesses (E.G., Tracking
Manufacturing Using Sensors In Production Lines) And Cities (E.G., Tracking
Traffic Flows, Lighting, Public Transportation), How Has Iot Impacted Your
Life? Do You Have Any Iot Devices In Your Apartment Or Home? If Not, Which
Copyright © 2022 Pearson Education, Inc.
Solution Manual For
Using MIS 12th Edition
By: David M. Kroenke
Copyright © 2022 Pearson Education, Inc.
, Kroenke - Using MIS 12th Ed - Instructor’s Manual
Solution Manual For
Using Mis, 12th Edition By David M. Kroenke, Randall J.
Boyle|Chapter 1-12
1. The Importance Of Mis
Learning Objectives
Q1-1 Why Is Introduction To Mis The Most Important Class In The Business
School? Q1-2 How Mis Will Affect You?
Q1-3 What Is Mis?
Q1-4 How Can You Use The Five-Component
Model? Q1-5 What Is Information?
Q1-6 What Are Necessary Data
Characteristics? Q1-7 2031?
Chapter Outline
Q1-1 Why Is Introduction To Mis The Most Important Class In The Business School?
• The Digital Revolution
• Evolving Capabilities
• Moore’s Law
• Metcalfe’s Law
• Other Forces Pushing Digital Change
• This Is The Most Important Class In The School Of
Business Q1-2 How Will Mis Affect You?
• How Can You Attain Job Security?
• How Can Intro To Mis Help You Learn Nonroutine Skills?
o Abstract Reasoning
o Systems Thinking
o Collaboration
o Ability To Experiment
o Jobs
• What Is The Bottom
Line? Q1-3 What Is
Mis?
• Components Of An Information System
• Management And Use Of Information Systems
• Achieving Strategies
Q1-4 How Can You Use The Five-Component Model?
• The Most Important Component—You
• All Components Must Work
Copyright © 2022 Pearson Education, Inc.
, Kroenke - Using MIS 12th Ed - Instructor’s Manual 1-2
• High-Tech Versus Low-Tech Information Systems
• Understanding The Scope Of New Information Systems
• Components Ordered By Difficulty And
Disruption Q1-5 What Is Information?
• Definitions Vary
• Where Is Information?
Q1-6 What Are Necessary Data Characteristics?
• Accurate
• Timely
• Relevant
• Just Barely Sufficient
• Worth Its
Cost Q1-7 2031?
Security Guide
Passwords And Password Etiquette
1. Here Is A Line From Shakespeare’s Macbeth: ―Tomorrow And Tomorrow And
Tomorrow, Creeps In Its Petty Pace.‖ Explain How To Use These Lines To Create A
Password. How Could You Add Numbers And Special Characters To The Password
In A Way That You Will Be Able To Remember?
There Are Several Correct Ways To Create A Password From This Line. One Way
Might Be To Take The First Letters From Each Word. The Password Would Then Be
―Tatatciipp.‖ You Could Then Capitalize A Couple Of The Letters And Add In A
Special Character Or Numbers. The Resulting Password Could Be
―T&2morrow&Tciipp.‖ This Would Be A Very Secure Password.
2. List Two Different Phrases That You Can Use To Create A Strong Password.
Show The Password Created By Each.
There Will Be Many Correct Answers To This Question. Using A Passphrase To
Create A Password Is Done By Using The First Letters In The Phrase, Then
Changing Some Of The Letters By Substituting In Special Characters, Numbers, Or
Changes Of Case. For Example, The Phrase, ―I Never Count My Chickens Before
The Eggs Have Hatched!‖ Could Create The Password ―Incmchknsb4t3ggshh!‖
This Would Be A Great Password.
3. One Of The Problems Of Life In The Cyberworld Is That We All Are Required To
Have Multiple Passwords—One For Work Or School, One For Bank Accounts,
Another For Ebay Or Other Auction Sites, And So Forth. Of Course, It Is Better To
Use Different Passwords For Each. But In That Case, You Have To Remember Three
Or Four Different Passwords. Think Of Different Phrases You Can Use To Create A
Memorable, Strong Password For Each Of These Different Accounts. Relate The
Phrase To The Purpose Of The Account. Show The Passwords For Each.
Copyright © 2022 Pearson Education, Inc.
, Kroenke - Using MIS 12th Ed - Instructor’s Manual 1-3
There Will Be Many Correct Answers To This Question. For Example, A Passphrase
For A University Account May Look Something Like, ―I Will Graduate From State
University Before 2020 Or Bust!‖ This Could Yield A Password That Would Look
Like
―Iwgfsub42020orb!‖
4. Explain Proper Behavior When You Are Using Your Computer And You Need To
Enter, For Some Valid Reason, Another Person’s Password.
In This Case, Say To The Other Person, ―We Need Your Password,‖ And Then Get
Out Of Your Chair, Offer Your Keyboard To The Other Person, And Look Away
While She Enters The Password. Among Professionals Working In Organizations
That Take Security Seriously, This Little ―Do-Si-Do‖ Move—One Person Getting
Out Of The Way So Another Person Can Enter Her Password—Is Common And
Accepted.
5. Explain Proper Behavior When Someone Else Is Using Her Computer And That
Person Needs To Enter, For Some Valid Reason, Your Password.
If Someone Asks For Your Password, Do Not Give It Out. Instead, Get Up, Go Over
To That Person’s Machine, And Enter Your Own Password Yourself. Stay Present
While Your Password Is In Use, And Ensure That Your Account Is Logged Out At
The End Of The Activity. No One Should Mind Or Be Offended In Any Way When
You Do This. It Is The Mark Of A Professional.
So What?
Iotrends
1. People Often Use The Terms Web And Internet Interchangeably, But They Are Not
The Same. Do Your Best To Define Each And Identify Exactly How They Are
Different. Student Answers Will Vary But A Good Explanation Can Be Found At
The Website Https://Www.Geeksforgeeks.Org/Whats-Difference-Internet-
Web/#:~:Text=The%20internet%20is%20a%20global,On%20top%20of%20that%20i
n Frastructure. It States: ―The Internet Is A Global Network Of Networks While
The Web, Also Referred Formally As World Wide Web (Www) Is Collection Of
Information Which Is Accessed Via The Internet. Another Way To Look At This
Difference Is; The Internet Is Infrastructure While The Web Is Service On Top Of
That Infrastructure.‖
2. The Article Talks About Web 1.0 And Web 2.0. You May Be Wondering If Web 2.0 Is
The End Of The Line. What Do You Think—Will There Be A Web 3.0, And If So,
What Would It Entail?
Student Responses Will Vary, But Should Cover Some Ideas And Concepts That Are
Not Already Part Of Web 1.0 Or Web 2.0 Specifically.
3. While Iot Is Clearly Having An Impact On Businesses (E.G., Tracking
Manufacturing Using Sensors In Production Lines) And Cities (E.G., Tracking
Traffic Flows, Lighting, Public Transportation), How Has Iot Impacted Your
Life? Do You Have Any Iot Devices In Your Apartment Or Home? If Not, Which
Copyright © 2022 Pearson Education, Inc.