study questions
  • Q1:why is introduction to MIS the most important class in the business school
  • Q2:what is an information system
  • Q3:what is MIS
  • Q4:why is the difference between information technology and information systems important to you
  • Q5:what is your role in IS security
  • Answer to Q1: Moore's law the number of transistors per square inch on an integrated chip doubles every 18 months
  • cost of data processing and data storage is essentially zero
  • transistors increases processing power
  • why is introduction to MIS the most important class second reason
  • future business professionals need to be able to assess, evaluate and apply emerging information technology to business
    • what are cost effective business application of Facebook. twitter or whatever will appear next
    • how can I attain job security
      • any routine skill can and will be outsourced to lowest bidder
      • organizations favor those with strong non-routine cognitive skills
        • example of critical skills for non routine cognition
          • abstract reasoning
            • construct a model or representation 
          • systems thinking
            • model system components and show how components inputs and outputs relate to one another
          • collaboration
            • develop ideas and plans with others. Provide and receive critical feedback
            • ability to experiment
              • create and test promising new affirmatives constant with available resources
  • what is the bottom line
    • asses, evaluate and apply emerging information systems technology to busuness
    • learn abstraction, systems thinking, collaboration
  • achieving strategies
    • information systems exist to help people in a business achieve strategies
  • what is the difference between IT and IS important to you>
    • information technology drives development of new information systems
    • information technology (IT)
      • products
      • methods
      • inventions
      • standards
        • IT components = hardware and software and date
        • IS = IT and procedures and people
    • what is your role in IS security
    • security systems has five IS components
    • security system ultimately depends on behavior of users
  • if security procedures are not followed, then hardware, software, and data components of security systems are wasted expense
  • strong password
    • ten or more characters
    • does not contain your username, real name, or company name
    • does not contain a complete dictionary word in any language
    • different from passwords used
    • contain both upper and lowercase letters, numbers and special characters 

Comments

Popular posts from this blog

database