study questions
- Q1:why is introduction to MIS the most important class in the business school
- Q2:what is an information system
- Q3:what is MIS
- Q4:why is the difference between information technology and information systems important to you
- Q5:what is your role in IS security
- Answer to Q1: Moore's law the number of transistors per square inch on an integrated chip doubles every 18 months
- cost of data processing and data storage is essentially zero
- transistors increases processing power
- why is introduction to MIS the most important class second reason
- future business professionals need to be able to assess, evaluate and apply emerging information technology to business
- what are cost effective business application of Facebook. twitter or whatever will appear next
- how can I attain job security
- any routine skill can and will be outsourced to lowest bidder
- organizations favor those with strong non-routine cognitive skills
- example of critical skills for non routine cognition
- abstract reasoning
- construct a model or representation
- systems thinking
- model system components and show how components inputs and outputs relate to one another
- collaboration
- develop ideas and plans with others. Provide and receive critical feedback
- ability to experiment
- create and test promising new affirmatives constant with available resources
- what is the bottom line
- asses, evaluate and apply emerging information systems technology to busuness
- learn abstraction, systems thinking, collaboration
- achieving strategies
- information systems exist to help people in a business achieve strategies
- what is the difference between IT and IS important to you>
- information technology drives development of new information systems
- information technology (IT)
- products
- methods
- inventions
- standards
- IT components = hardware and software and date
- IS = IT and procedures and people
- what is your role in IS security
- security systems has five IS components
- security system ultimately depends on behavior of users
- if security procedures are not followed, then hardware, software, and data components of security systems are wasted expense
- strong password
- ten or more characters
- does not contain your username, real name, or company name
- does not contain a complete dictionary word in any language
- different from passwords used
- contain both upper and lowercase letters, numbers and special characters
Comments
Post a Comment