Computer science

Using MIS 2021 Textbook Questions And Answers

US$14.99 US$24.00

b Chapter: 1 -Problem: 5 /b Explain proper behavior when someone else is using her computer and that person needs to enter, for some valid reason, your password. brbAnswer Preview/b: If someone asks for your password, do not give it out. Instead, get up… brbr,b Chapter:

Description

Chapter: 1 -Problem: 5 >> Explain proper behavior when someone else is using her computer and that person needs to enter, for some valid reason, your password.
Answer Preview: If someone asks for your password, do not give it out. Instead, get up…

, Chapter: 9 -Problem: 3 >> The article mentions that younger generations are starting to plateau in their use of social media—what do you think is driving this trend? Are you a part of this trend?
Answer Preview: The plateauing trend in social media use among younger generations can be influenced by several fact…

, Chapter: 7 -Problem: 1 >> Why do you think malicious individuals targeted Zoom? Do you see any parallels between Zoom and Windows?
Answer Preview: However, I can provide some general observations. Zoom gained significant popularity during the COVI…

, Chapter: 2 -Problem: 1 >> Some of the most innovative and powerful companies in the world are technology companies (e.g., Google, Facebook, Apple, Amazon, and Netflix). Out of the five companies on this list, could a case be made that Amazon should be considered the most powerful company of them all? Why?
Answer Preview: A case could indeed be made for considering Amazon as the most powerful company among the five mentioned (Google, Facebook, Apple, Amazon, and Netflix…

, Chapter: 1 -Problem: 1 >> People often use the terms Web and Internet interchangeably, but they are not the same. Do your best to define each and identify exactly how they are different.
Answer Preview: Certainly! While the terms "Web" and "Internet" are often used interchangeably, they refer to differ…

, Chapter: 9 -Problem: 3 >> Are you guilty of using impression management tactics on your own social media accounts? Or have you found yourself impacted by the possible impression management tactics of others? Overall, does the information in this article make you want to reduce your use of social media or abandon it altogether?
Answer Preview: Yes, I have used impression management tactics on my social media accounts. Impression management re…

, Chapter: 7 -Problem: 2 >> One measure used to slow the infection rate of COVID-19 was the order to shelter in place. This forced many workers to begin working from home. How does this new working format introduce security risks to organizations?
Answer Preview: The shift to remote work introduced new security risks for organizations. Here are some common security challenges associated with remote work: 1. Home Network Security: Home networks may not have the …

, Chapter: 1 -Problem: 3 >> One of the problems of life in the cyberworld is that we all are required to have multiple passwords—one for work or school, one for bank accounts, another for eBay or other auction sites, and so forth. Of course, it is better to use different passwords for each. But in that case, you have to remember three or four different passwords. Think of different phrases you can use to create a memorable,
Answer Preview: Creating strong, memorable passwords is indeed important for maintaining security in the cyberworl…

, Chapter: 2 -Problem: 4 >> Can you think of any emerging technologies that will disrupt,or change, processes in industries over the next 10-plus years?
Answer Preview: Certainly! There are several emerging technologies that have the potential to disrupt or change processes in industries over the next 10-plus years. H…

, Chapter: 1 -Problem: 1 >> Here is a line from Shakespeare’s Macbeth: “Tomorrow and tomorrow and tomorrow, creeps in its petty pace.” Explain how to use these lines to create a password. How could you add numbers and special characters to the password in a way that you will be able to remember?
Answer Preview: There are several correct ways to create a password from this line. O…

, Chapter: 11 -Problem: 1 >> To what extent are social media platforms an important part of your daily interactions? Do you use a certain social media platform because your family or friends use it? Why do you think this is the case?
Answer Preview: Social media platforms have become an integral part of the daily lives of many people in the United …

, Chapter: 9 -Problem: 4 >> Do you think there are any adverse effects of social media use? Have you ever noticed any of these effects in your own life?
Answer Preview: yes, I will outline a few that have impacted my life. Mental Health Issues: Excessive use of social …

, Chapter: 1 -Problem: 4 >> Explain proper behavior when you are using your computer and you need to enter, for some valid reason, another person’s password.
Answer Preview: In this case, say to the other person, We need your password, and then get …

, Chapter: 6 -Problem: 3 >> Based on the benefits and challenges associated with telecommuting that are presented in this article, would you prefera standard office format or working from home? Explain.
Answer Preview: Working from home or doing telecommuting has both certain benefits and challenges. On the positive s…

, Chapter: 7 -Problem: 1 >> Have you or someone you know become the victim of a phishing attack? What mechanisms did the attacker use to get the victim to fulfill the call to action? What was the outcome of the attack?
Answer Preview: Yes, I know someone who has been a victim of a phishing attack. Phishing attacks are one of the most …

, Chapter: 7 -Problem: 4 >> If the dark Web is such a hotbed of criminal activity for hackers, why isn’t it shut down, or at least, why aren’t the criminals arrested and prosecuted?
Answer Preview: The reason it is not shutdown as a whole is that …

, Chapter: 2 -Problem: 1 >> Do you think criminals will actually decrypt your data if you pay them the ransom?
Answer Preview: No. Paying a ransom to criminals for data decryption is a risky decision, and there are no guarantee…

, Chapter: 12 -Problem: 4 >> The hackers were able to avoid jail time for their actions. Do you think their direct disruption of numerous sites and companies’ digital operations should have resulted in more serious penalties? How should the legal system apply penalties for the creation of malware that will continue to live on in spite of the hackers being caught and maybe even feeling sorry for their actions?
Answer Preview: yes. In some cases, hackers who manage to avoid jail time may have reached agreements with law enfor…

, Chapter: 4 -Problem: 1 >> Imagine you have partnered with a company to develop the next best gadget to be featured at an upcoming CES. What gadget would you create?
Answer Preview: If I were to partner with a company to develop the next best gadget to be featured at CES, I would create a smart home management system called "HomeH…

, Chapter: 8 -Problem: 4 >> If you could test out one of the new technologies outlined in this article, which one would it be? Explain.
Answer Preview: I would test out the new Exoskeleton technology. This technology is exciting because it has so many …

, Chapter: 6 -Problem: 1 >> How did the COVID-19 pandemic influence the use of telecommuting? Do you think this will have a lasting impact on the percentage of workers who are able to work from home?
Answer Preview: Telecommuting became the new normal as businesses needed to find ways to ke…

, Chapter: 11 -Problem: 3 >> What role do you think managers and higher-level organizational leaders play in promoting compliance and there by a secure organizational culture?
Answer Preview: Managers and higher-level organizational leaders play a crucial role in promoting compliance and establishing a secure organizational culture. Here ar…

, Chapter: 1 -Problem: 4 >> Do you think IoT devices feature the newest and most advanced security measures, or could there be potential security risks from using IoT devices?
Answer Preview: While IoT devices have become increasingly popular and offer many benefits, there are potential security risks associated with their use. While some IoT devices may feature advanced security measures, …

, Chapter: 6 -Problem: 1 >> If you have abandoned physical storage drives and now use the cloud, do you think you should still keep an external drive with a backup of cloud files?
Answer Preview: Yes, it is generally recommended to have an additional backup of your cloud files, even if you prima…

, Chapter: 4 -Problem: 3 >> Why do you think phishing attacks have the success rates that they do? Do you think it is likely that you would be the target of a spear phishing attack?
Answer Preview: Phishing attacks have relatively high success rates due to several factors: Social engineering: Phis…

, Chapter: 10 -Problem: 3 >> Can you think of any other innovations not listed in the article that companies could use to try to mitigate the risks introduced by employees who may have the virus and be contagious?
Answer Preview: Certainly! While the article provides some innovative approaches to mitigate the risks associated with employees who may have the virus and be contagi…

, Chapter: 12 -Problem: 2 >> Not only is 5G expected to provide incredible new capabilities on its own, but it is also expected to act as a magnifier that helps other emerging technologies become even more powerful. How do you think 5G could feed the power of artificial intelligence?
Answer Preview: 5G has the potential to greatly enhance the power and capabilities of artificial intelligence (AI) in several ways: 1. Faster Data Transmission: The h…

, Chapter: 10 -Problem: 4 >> The comparison of information security to a digital castlehas been used for many years. However, the landscape of technology has changed drastically with the mass proliferation of laptops, mobile devices, wearables, and so on. Do you think the digital castle model still holds true today? Why or why not?
Answer Preview: The digital castle analogy has been commonly used in the context of information security to represent the idea of protecting valuable data and systems …

, Chapter: 1 -Problem: 2 >> List two different phrases that you can use to create a strong password. Show the password created by each.
Answer Preview: Using a passphrase to create a password is done by using the first let…

, Chapter: 6 -Problem: 2 >> Is it possible that growing numbers of telecommuters could negatively impact Internet stability and speeds as more and more people work from home?
Answer Preview: There is no doubt that as more and more users are on home ne…

, Chapter: 6 -Problem: 4 >> Have you ever taken an online course? If so, how did it differ from a standard classroom environment? What did you like and what did you dislike about online learning? How do you think these pros and cons would translate to working remotely versus working in a traditional office setting?
Answer Preview: Yes, I have taken an online course before. It differed from a standard classroom environment in that the learning material was distributed online inst…

, Chapter: 5 -Problem: 1 >> Think about your own password reuse behavior. Do you reuse passwords for your own personal accounts? If so, has the scenario provided in this article changed your perception ofpassword reuse so that you will avoid doing so in the future?
Answer Preview: Password reuse is generally considered risky because if one account gets compromised, it can lead …

, Chapter: 10 -Problem: 4 >> If you could go to either Black Hat or Def Con, what topic area would be of most interest to you (technical security, behavioral security, hacking IoT devices, etc.)? Explain.
Answer Preview: However, I can provide insights into the different topic areas that might be of interest to individuals attending these conferences. 1. Technical Secu…

, Chapter: 9 -Problem: 2 >> How of ten do you engage with social media? As you read the article and learned about the emerging technologies that may be used as a part of future social media experiences, how did you feel? Are you excited at the prospect of augmented reality and wearables, or are you concerned that these technologies may be too intrusive or will be tiring as you can constantly be connected?
Answer Preview: I generally engage with social media on a daily basis, typically using popular platforms like Facebo…

, Chapter: 5 -Problem: 4 >> How does password reuse compare or contrast to physical use of the same key for every door that you have to open over the course of a week? Think about the implications of losing that one key that opens all of your physical doors.
Answer Preview: Password reuse and the physical use of the same key for multiple doors have some similarities but also significant differences in terms of implication…

, Chapter: 2 -Problem: 4 >> Can you think of any examples of known international cyberattacks that have succeeded in damaging their targets?
Answer Preview: Yes, there have been several notable examples of international cyberattacks that have successfully damaged their targets. Here are a few prominent cas…

, Chapter: 4 -Problem: 4 >> What do you think would happen if a regional power outage was to occur in the northeastern United States for several months? How would the time of year impact the implications of a power outage of this scale?
Answer Preview: If a regional power outage were to occur in the northeastern United States for several months , it would have significant implications across various …

, Chapter: 2 -Problem: 3 >> Can you think of any other industries that have been disrupted, or seen processes drastically changed, due to innovationsin technology over the past 10-plus years?
Answer Preview: Over the past 10-plus years, several industries have experienced significant disruption and process changes due to technological innovations. Here are a few notable examples: Transportation: The trans…

, Chapter: 5 -Problem: 4 >> In a business setting, what types of organizations would place greater value on security rather than convenience?What types of organizations would prioritize convenience over security?
Answer Preview: Organizations providing health care services are especially focused on s…

, Chapter: 8 -Problem: 4 >> Think about the passwords that you use to access various sites and accounts. How many different passwords do you use? Do you reuse any of your passwords? Are any of your reused passwords also used for critical accounts like banking or healthcare? Have you ever reused a personal password for a work account? What are the risks of thesepractices?
Answer Preview: I use between 10-15 passwords for …

, Chapter: 7 -Problem: 3 >> Were you or anyone you know impacted by cybercrime or nefarious digital actors during the COVID-19 pandemic? What happened?
Answer Preview: The COVID-19 pandemic presented an opportunity for cybercriminals and nefarious digital actors to ex…

, Chapter: 4 -Problem: 3 >> Sustainability becomes an even more important issue when considering e-waste at an organizational level (i.e., think how much e-waste is created by your local university, municipality, or hospital). How might cloud computing reduce e-waste?
Answer Preview: Cloud computing can help reduce e-waste in several ways: 1. Server Consolidation: Cloud computing allows for the consolidation of multiple virtual ser…

, Chapter: 7 -Problem: 2 >> Are you aware of any other types of malicious digital activities that took place during the COVID-19 pandemic?
Answer Preview: Yes, during the COVID-19 pandemic, there have been several types of malicious digital activities that have taken place. Here are some examples: Phishi…

, Chapter: 4 -Problem: 2 >> Take a few minutes to take inventory of all of your electronic devices. Next, identify the typical life span of each of these products. Estimate how many devices you might abandon over the span of 10 years. What sustainability score would you give yourself?
Answer Preview: Smartphone: Estimated lifespan of 2-3 years Tablet: Estimated lifespan of 3-4 years Drone: The lifes…

, Chapter: 6 -Problem: 4 >> Do you think there are any other risks to undersea fiber lines besides military operations intended to damagethem?
Answer Preview: Yes, there are several other risks to undersea fiber optic cables besides intentional military opera…

, Chapter: 2 -Problem: 2 >> If you are 100 percent certain that paying the ransom for your data will result in it being decrypted, should you do it? Explain.
Answer Preview: When deciding whether to pay a ransom for encrypted data, it's important to weigh the potential risks and benefits. Here are some factors to consider: …

, Chapter: 10 -Problem: 1 >> The list presented in the article entails a number of solutions that would require data collection from employees. Do you think employers have a right to collect these types of data?
Answer Preview: The question of whether employers have a right to collect certain types of data from employees depen…

, Chapter: 2 -Problem: 3 >> The article mentions that surveillance of and attacks against critical infrastructure are growing commonplace. Take a few minutes to search for the latest examples of these types of attacks against critical infrastructure organizations. (Refer to the CISA list in the article to help guide your search of relevant industries.)
Answer Preview: While I don't have real-time browsing capabilities to provide the latest examples, I can mention a few notable incidents involving attacks against cr…

, Chapter: 6 -Problem: 2 >> Search the Internet for a map of undersea fiber lines—based on the number of lines that run into the geographic area where you were born, how likely do you think it would be that Internet connectivity could be disrupted long-term?
Answer Preview: The availability of broadband Internet service is commonly provided over fiber optic cables that are …

, Chapter: 8 -Problem: 1 >> If you were the employee in the hypothetical scenario presented at the beginning of this article, would you opt in or opt out of the wearables program? Explain.
Answer Preview: I believe that I would opt in to the wearables program proposed by my employer. As an employee, I un…

, Chapter: 9 -Problem: 4 >> You have probably heard of the polygraph machine—a device designed to measure physiological responses of interviewees while they are being asked a number of questions to identify if deception is present. While these devices cannot be employed in our online interactions, do you think new types of technologies to identify deception are being developed?
Answer Preview: Yes, new types of technologies are being developed to identify deception in various contexts, including online interactions. While the polygraph machi…

, Chapter: 1 -Problem: 2 >> The article talks about Web 1.0 and Web 2.0. You may be wondering if Web 2.0 is the end of the line. What do you think—will there be a Web 3.0, and if so, what would it entail?
Answer Preview: The concept of Web 2 0 introduced a significant shift in the way people interacted with the internet, emphasizing user-generated content, social netwo…

, Chapter: 4 -Problem: 1 >> Describe how the class enrollment application at your university could benefit from a mobile application that uses the cloud.
Answer Preview: The class enrollment application could enable students to view cou…

, Chapter: 5 -Problem: 3 >> The article mentions keystroke analysis as a way to detect and ultimately prevent password reuse. How do you think that the evaluation of someone’s typing behavior could beused to identify password reuse?
Answer Preview: Keystroke analysis refers to the process of analyzing and evaluating the timing and rhythm of a person's keystrokes while typing. By monitoring and a…

, Chapter: 2 -Problem: 2 >> Can you think of any other technologies that employ sensor fusion, cameras, and computer vision?
Answer Preview: Certainly! There are several other technologies that employ sensor fusion, cameras, and computer vision . Here are a few examples: Autonomous Vehicles…

, Chapter: 10 -Problem: 2 >> When a person or an organization is granted power, it can often be difficult for this power to be relinquished. If organizations put a number of monitoring and surveillance mechanisms in place to track employees so risk can be identified/mitigated, do you think employers will readily curtail these activities once the threat from the pandemic has subsided?
Answer Preview: The decision of whether employers will curtail monitoring and surveillance activities once the threat from the pandemic has subsided will depend on va…

, Chapter: 7 -Problem: 4 >> Why are online criminal activities so difficult to prosecute?
Answer Preview: It can be hard to locate an online criminal since many use speci…

, Chapter: 10 -Problem: 2 >> Do you think it is illegal to create and post a deep fake video?
Answer Preview: Creating and posting a deep fake video may be considered illegal in many countries under many differ…

, Chapter: 1 -Problem: 3 >> While IoT is clearly having an impact on businesses (e.g., tracking manufacturing using sensors in production lines) and cities (e.g., tracking traffic flows, lighting, public transportation), how has IoT impacted your life? Do you have any IoT devices in your apartment or home? If not, which IoTdevices would you be interested in owning?
Answer Preview: Here are some common ways IoT has influenced daily life: 1. Smart Home Devices: IoT devices such as …

, Chapter: 8 -Problem: 2 >> Employees are cited as one of the pain points in an ERP system deployment. Why do you think this is? Don’t you think workers would be excited or motivated by the opportunity to use a multimillion-dollar piece of software?
Answer Preview: Employees overall are resistant to change, …

, Chapter: 4 -Problem: 4 >> Phones are one of the devices that we replace most frequently. Brainstorm three different ways that a phone could be repurposed for something else instead of just being thrown away.
Answer Preview: 1. Media Hub: Repurpose the old phone as a dedicated media hub for your home. Connect it to your TV …

, Chapter: 11 -Problem: 1 >> You may not have realized that your university has a security policy that guides how students, faculty, and staff can use technological resources. Are you familiar with this policy and what it entails? If not, track down your university’s policy and read it carefully. Is there anything in the policy that surprises you?
Answer Preview: Yes, I am familiar with my universitys security policy and what it entails. The policy outlines the responsibilities and expectations for students, fa…

, Chapter: 10 -Problem: 1 >> What are the implications of deep fake videos for the world of politics, finance, or national security?
Answer Preview: The implications in these areas can be devastating since it could be impossible to know what …

, Chapter: 9 -Problem: 2 >> The article reports that the human deception detection accuracy rate is right around 50 percent. The studies used to calculate this statistic are largely based on participants who were college students or average citizens. Do you think law enforcement or government/military personnel would have higher accuracy rates?
Answer Preview: It's difficult to make a definitive statement about the deception detection accuracy rates for law e…

, Chapter: 8 -Problem: 1 >> Is it possible that companies could just keep using legacy systems to avoid the cost, risk, and security vulnerabilities associated with ERP systems?
Answer Preview: It is possible for companies to continue using legacy systems instead of implementing modern ERP (Enterprise Resource Planning) systems. There are sev…

, Chapter: 4 -Problem: 2 >> Judging from your personal experience, describe the BYOD policy that appears to be in place at your university. Explain the advantages and disadvantages of the policy to you as a student and to the organization as a whole. How do you think that BYOD policy will change in the next five years? Explain your answer.
Answer Preview: BYOD Policy at a University: A typical BYOD policy at a university allows students to use their personal electronic devices, such as laptops, tablets, and smartphones, for academic purposes. The polic…

, Chapter: 9 -Problem: 1 >> Consider and answer the questions introduced in the beginning of the article. When did you create your first social media account? Which plat form did you choose, and why did you choose that one specifically? Was your choice motivated by the platform that your friends were using (you were pulled in), or were you motivated by finding a platform that certain people were not members of, like your par
Answer Preview: I created my first social media account in 2020. I chose to create Facebook account and this was due to many reasons. Some of the reasons that made me …

, Chapter: 5 -Problem: 1 >> Have you chosen to store any of your personal data in the cloud? If so, do you store all of your data or only certain types of data? If not, what factors have inhibited you from trusting your data in the hands of cloud providers? If you don’t use cloud-based storage, how do you back up your data?
Answer Preview: As mentioned in the article, some students may be select…

, Chapter: 10 -Problem: 3 >> What is your position on the adoption of IoT devices considering their tendency to have poor security controls? Are they worth the risk?
Answer Preview: The adoption of Internet of Things (IoT) devices presents both benefits and risks. IoT devices offer …

, Chapter: 12 -Problem: 3 >> Think of three more examples of industries or processes that will benefit from the higher speeds and lower latencies offered by 5G.
Answer Preview: Certainly! Here are three more examples of industries or processes that can benefit from the higher …

, Chapter: 9 -Problem: 1 >> Take an inventory of your text messages or emails for the past day. How many times do you even marginally misrepresent the truth? Does your own track record support the observation that most people regularly engage in some form of deception?
Answer Preview: I took an inventory of my texts and emails from the past day and found that I did not even marginall…

, Chapter: 6 -Problem: 3 >> Based on the various cloud computing risks identified in this article, do you now think differently about storing your own data in the cloud? Explain.
Answer Preview: Yes, Cloud computing offers numerous benefits, such as scalability, flexibility, and cost-effectiven…

, Chapter: 8 -Problem: 2 >> If you were the manager in the hypothetical scenario presented at the beginning of this article, would you be interested in accessing wearables data and thus support thewearables program? Explain.
Answer Preview: Yes, I would be interested in supporting the wearables program. Wearables have the potential to be a …

, Chapter: 8 -Problem: 3 >> The article mentions that many companies have to alter the functionality of off-the-shelf ERP solutions to match their business processes. What do you think companies operating in unique market niches use if a platform like SAP would likely not mesh well with their business processes?
Answer Preview: Companies operating in unique market niches and facing challenges with off-the-shelf ERP solutions like SAP often explore alternative options to meet …

, Chapter: 4 -Problem: 2 >> The article mentions that the Stuxnet attack relied on compromising programmable logic controllers (PLCs). Do some online research and find out if PLCs are used for any other applications. Does this introduce risk to other types of organizations?
Answer Preview: Yes, programmable logic controllers (PLCs) are used for various applications beyond the context of the Stuxnet attack. PLCs are commonly employed in i…

Additional Information

Book:
Using MIS 2021
Isbn:
ISBN: 9780136921653
Edition:
12th Edition
Author:
Authors: David M. Kroenke, Randall J. Boyle
Image:
645b95b3caf03_29231.jpg

10 Reviews for Using MIS 2021 Textbook Questions And Answers

Dayami Griffith
Thank you for everything you do
Riya Mcintosh
Reliable and good work
Leah Diaz
Awesome Tutor!!!
Gauge Garrett
always great
Jace Hooper

Add a review

Your Rating

29811

Character Limit 400