MIS
MIS Management Information Systems
1. Watch the video vintage hardware and answer the following questions.
Video link:
i. How did the IBM 407 Accounting Machine patch panel operate?
ii. How did the fixed-head hard drive operate? What was its total memory capacity?
iii. How did the core memory hard drive operate? What was its total memory capacity?
iv. When was the first floppy disk invented? By whom? What was it used for?
2. Read the Security Guides Poisoned App-les on textbook page 150 and answer the four discussion questions:
i. Think about your use of various phone and computer apps and your interactions on social media. Have you ever experienced a breach of your privacy or personal data? What was the impact of this breach? Were you able to resolve it, or were you forced to live with the consequences?
ii. Try to identify three different strategies that any smartphone user could follow in an attempt to minimize the risk of installing and using dangerous/risky apps.
iii. Reflect on the trade-off between free apps and the potential privacy risks that these apps may introduce. Has this article changed your perception of free apps? If so, how?
iv. Conduct an Internet search to identify if there have been any recent security vulnerabilities introduced through an app store (e.g., the App Store, Google Play, or Windows Phone Store). If so, conduct a brief investigation to see which apps are involved, how many people have been affected, and whether the vulnerability has been resolved.
PAGE
1