Information Systems for Business and Beyond Questions
- Chapter 5 – study questions 1-9, Exercise 1
questions 1-9 :
- What were the first four locations hooked up to the Internet (ARPANET)?
- What does the term packet mean?
- Which came first, the Internet or the World Wide Web?
- What was revolutionary about Web 2.0?
- What was the so-called killer app for the Internet?
- What makes a connection a broadband connection?
- What does the term VoIP mean?
- What is an LAN?
- What is the difference between an intranet and an extranet?
EXercie 1
- What is the IP address of your computer? How did you find out? What is the IP address of google.com? How did you find out? Did you get IPv4 or IPv6 addresses?
- Chapter 6 – study questions 1-10, Exercise 6
Question 1-10:
- Briefly define each of the three members of the information security triad.
- What does the term authentication mean?
- What is multi-factor authentication?
- What is role-based access control?
- What is the purpose of encryption?
- What are two good examples of a complex password?
- What is pretexting?
- What are the components of a good backup plan?
- What is a firewall?
- What does the term physical security mean?
Exercie 6 :
6.How are you doing on keeping your own information secure? Review the steps listed in the chapter and comment on how well you are doing.
Information Technology and Organizational Learning Assignment:
Chapter 4 – Review the section on Linear Development in Learning Approaches.Discuss how learning changes over time impact organizational culture.What is the impact of this cultural change on the success of IT projects?
Chapter 5 – Review the Roles of Line Management and Social Network and Information Technology sections.Note the various roles in the organization and note the similarities and differences within each role.Also, note how innovation technology management shapes how we communicate amongst coworkers within an organization.


0 comments