Unit 2: MIS Basics: Hardware, Software, Networking, and Security
As mentioned in the course introduction, much of MIS is now centered on technology. Accordingly, MIS capabilities are mostly limited to the hardware and software capabilities of a given system. Ten years ago, the average Internet user could download an MP3 music file in a few minutes over a cable. This can now be done in seconds wirelessly from just about anywhere in the developed world thanks to improvements in hardware and software. While it is nearly impossible to remain in front of technology developments, it is possible to analyze trends in technology advancements and identify what hardware and software may give you a competitive advantage.
This unit will first discuss the hardware component of technology, followed by software. The unit finishes with a discussion of networking as a component of technology.
Completing this unit should take you approximately 11 hours.
Upon successful completion of this unit, you will be able to:
- compare and contrast hardware and software;
- identify the primary components of a computer and the functions they perform;
- describe the two primary categories of software;
- describe the advantages and disadvantages of cloud computing for companies;
- define the term open-source and identify its primary characteristics;
- identify the types of networks and their general functions;
- identify the information security triad; and
- describe the tools used to secure information technologies.
2.1: Hardware
This chapter focuses on how personal computers work, and then turns to other hardware devices. Be sure to read the sidebar on Moore's Law. As you read, focus on how Moore's Law might describe the different components and devices discussed in this chapter.
Watch this lecture on information systems hardware. The personal computer is the primary device that has driven the information systems revolution in the past thirty years.
2.1.1: Personal Computers
- Review the timeline of computers at the Old Computers website. Pick one computer from the listing and write a brief summary. Include the specifications for CPU, memory, and screen size. Now find the specifications of any computer on the market today and compare. Did Moore's Law hold true?
2.1.2: Other Digital Devices
- There have been advances in technology since this textbook was published. Name a recently-developed technology that the author should add to the discussion in Chapter 2.
2.2: Software
- As you read this chapter, focus on how software differs from hardware. There are several ways to categorize software; the most significant difference is between systems software and application software. These resources will introduce you to the concept of open source software and cloud computing, two important concepts in business right now.
This lecture supports what you read in Chapter 3.
2.2.1: Cloud Computing
After reviewing the unit materials, respond to the following question and post your answer on the discussion forum. Feel free to start your own related posts, and respond to other students’ posts as well.
If you were running a small business with limited funds for information technology, would you consider using cloud computing? Find some web-based resources that support your decision. Explain your decision in at least two paragraphs. Hint: you can find materials about this decision by searching on the term "cloud computing for small business".
2.2.2: Open-Source Software
Review this article on the security risks of open-source software. Write a short analysis giving your opinion on the different risks discussed.
2.3: Networks
In this chapter, you will read about the use of communications technologies to allow our computers to send messages to each other. The evolution of these technologies has brought us the Internet and all of the wireless communications that we use today.
What is the difference between the Internet and the World Wide Web? Create at least three statements that identify the differences between the two.
2.4: Security
In this chapter, you will focus on several important concepts related to information security. Be sure you understand the components of the information security triad presented at the beginning of the chapter. The chapter ends with a focus on your own personal information security; you are highly encouraged to take stock in your own efforts to stay secure!
2.4.1 The Information Security Triad
In this video, you will learn in more detail about the CIA Information Security Triad. After watching this video, take a moment to reflect and then write a one-sentence definition of what each of the components of the triad. Then, respond to the following prompt and post your answer on the discussion forum. Feel free to start your own related posts, and respond to other students' posts as well.
In a brief paragraph, describe how you apply these components in some areas of your work life or personal life. For example, if you work at a bank, you might consider how you maintain confidentiality, integrity, and accessibility for one kind of data. Of course, be sure not to share confidential data in your post!
2.4.2 Tools for Information Security
What are some of the latest advances in encryption technologies? Conduct some independent research on encryption using scholarly or practitioner resources, then write a two- to three-page essay that describes at least two new advances in encryption technology.
2.4.3 Personal Information Security
How are you doing on keeping your own information secure? The following exercise is meant to help you answer that question and take steps to improve your personal information security.
Unit 2 Assessment
Take this assessment to see how well you understood this unit.
- This assessment does not count towards your grade. It is just for practice!
- You will see the correct answers when you submit your answers. Use this to help you study for the final exam!
- You can take this assessment as many times as you want, whenever you want.