CIS 243 Unit 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following statements on password etiquette is true?

If someone asks for the password, do not just give it out

Which of the following statements is true about the management and use of information systems?

Information systems must be adapted to new requirements

________ refers to the products, methods, inventions, and standards that are used to produce information.

Information technology

Which of the following best describes collaboration?

It is the activity of two or more people working together to achieve a common goal, result, or work product

Which of the following requirements should a password fulfill in order to be considered strong?

It should not contain the user name or company name

A user has created a password that meets all the criteria for a strong password. What is a potential drawback of such a password?

It will be difficult to remember

________ states that the value of a network is equal to the square of the number of users connected to it.

Metcalfe's Law

________ is the ability to model the components of a unit to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed.

Systems thinking

Which of the following statements is true about information systems?

They are a group of components that produce information

Which of the following is true of tradable jobs?

They can be outsourced overseas

Which of the following statements is true of non-routine cognitive skills?

They increase an individual's job security

Why is it important for business professionals to take an active role in developing and managing information systems?

They know whether a system meets their needs and requirements

Abstract reasoning is one of the components of strong non-routine cognitive skills

True

An information system is a group of components that interact to produce information

True

Building information systems requires many different skills besides those of programmers

True

Future business professionals need to be able to apply information technology to business

True

Information systems and information technology are not the same

True

Information systems should be created by a business only if they help achieve the strategies of that business

True

Moving away to let another user enter his or her password is a mark of professionalism

True

Professionals in the 21st century need to be able to experiment in order to have greater job security

True

Strong non-routine cognitive skills are more in demand than routine skills

True

The knowledge of managing information systems can lead to greater job security

True

The methods used to start a program and save a file are referred to as procedures

True

Users are advised not to share their password with others

True

A password is said to be weak if it contains ________.

a complete dictionary word

Marketing managers planning to use new social networking technologies to strengthen their market presence are portraying their ________.

ability to experiment

Which of the following techniques is best suited for creating memorable, strong passwords?

basing passwords on the first letter of the words in a phrase

In a job interview, Lillian is asked to be part of a three-member group and design a mock business process based on the strengths and skills of the group's members. In this case, which of the following skills is the interviewer trying to test?

collaboration

In a grocery store, a clerk uses a barcode scanner to read the barcode on an item. Which of the following components of an information system includes this scanning device?

hardware

As the cost of data processing, storage, and communications is essentially zero, any routine skill can and will be ________.

outsourced to the lowest bidder

Which of the following components distinguishes information systems from information technology?

people

The five-component framework of an information system consists of computer hardware, software, data, people, and ________.

procedures

Which of the following is a critical responsibility of business professionals in using information systems?

protecting the security of a system and its data

Which of the following is an example of a hardware component of an information system?

storage disk

The number of businesses adopting new technologies has seen a downfall over the years

False

The use of information systems is restricted to the field of business

False

If a password is complex, it is ideal to write it on a piece of paper and keep it near the workstation

False

Strong passwords have a maximum of five characters

False

Successful experimentation is characterized by the investment of huge sums of money at every idea that enters one's head

False

Which of the following passwords is the strongest?

[email protected]

Which of the following passwords is the weakest?

Bird999

Which of the following precautions should be taken to protect one's password?

Do not write it down or share it with others

A marketable skill has no impact on job security

False

Effective collaboration is all about being nice to one's team members

False

Good passwords contain a complete dictionary word

False


Set pelajaran terkait

Lección 15.1 Past participles used as adjectives: Completar; Escribir (usando el participio pasado.); 1- Oraciones (past participle forms of these verbs); 2- Las consecuencias (with estar); 3 - ¿Cómo están?; 4 - El misterio (all corrected)

View Set

Phrasal Verbs with PUT (Match/TF Study Set)

View Set

Chapter 8 Application Deployment and Management

View Set

IS Security Tools and Techniques Exam 2 Review Questions

View Set

Economics and Personal Finance study set

View Set

Anatomy Final (review: Exam 1 of 4)

View Set

Exam 3: Drug discovery: finding a lead

View Set

IST 220 CHAPTER 5: ETHERNET (802.3) SWITCHED LANs

View Set