MIS 111 FINAL

¡Supera tus tareas y exámenes ahora con Quizwiz!

IT changes managers' job by _________ a. providing near real-time information so managers can make quicker decisions. b. making it easier to get all employees to work from one location. c. decreasing the volume of information they have to process. d. improving an employee's sense of connectedness

providing near real-time information so managers can make quicker decisions.

As a possible password, how many variableswould the password MIS111Exam(just the underlined string of characters) have when assessing its security strength? a. 1 b. 2 c. 3 d. 4 e. 5

3

Approximately what percentage of applications for jobs are rejected by potential employersbefore the interviewdue to public information posted online by the applicant (e.g. social networking, blogs, media sites, etc. -that is, your online reputation)? a. Less than 5% b. About 10% c. About 30% d. Less than 50% e. 60% or more

60% or more

A "Fishbone" process analysis diagram is also known as: a. A cause-and-effect diagram b. A correlation graph c. A cross-functional flowchart d. An organization chart e. A numerical analysis diagram

A cause-and-effect diagram

A feature of an object that limits possible (often incorrect) uses of a device is known as: a. False causality b. A visible metaphor c. A conceptual distinction d. An affordance e. A constraint

A constraint

In the history of the cell phone case study, the inventor noted that prior to the invention of the cell phone, telephone numbers were generally associated with a place. After the invention of the cellphone, telephone numbers are most commonly associated with what? a. A person b. A place c. A location d. A ciphertext e. A packet

A person

In a relational database, what term refers to the collection of items that are all related to a single unique value, where the single value often serves as the primary key? a. A field b. A form c. A record d. A list e. A deposit

A record

In the video case about Dr. Chiu's Smartrek application, which of the following was not an incentive used to encourage driver participation? a. Ability to find other people for carpooling b. Possibility of avoiding traffic congestion c. Ability to earn points for charity d. Ability to help the community e. Ability to earn prizes and gift

Ability to find other people for carpooling

______________ refers to determining who is responsible for actions that were taken. a. Acceptance b. Accountability c. Liability d. Responsibility

Accountability

The advantage of ________________ is they can be read over greater distances. a. Active RFID tags b. Passive RFID tags c. QR codes d. WSNs

Active RFID tags

All of the symbols representing tasks and decisions that are shown in single column of a vertical cross-functional diagram are related to the same what? a. Actor b. Root Cause c. Decision Model d. Organization e. Entity

Actor

Physical properties (shape, texture, color, etc.) of an object that allow someone to use an object correctly without the need for labels or instructions are knownas: a. Constraints b. Affordances c. Distinctions d. Feedback e. Models

Affordances

Which of the following would motivate businesses to create accessible eCommerce websites for their customers? a. The website is likely easier for all users to navigate b. Usable designs are often better designs c. To capitalize on a larger base of potential customers d. To comply with ADA and Section 508 of the Rehabilitation Act e. All (A-D) of the above

All (A-D) of the above

Which company used software to disrupt the previous market-leading companies in the book industry? a. Amazon b. Barnes and Noble c. Books-a-Million d. Walmart

Amazon

A graphical description of a database that describes the way in which an organization's data and business activities are associated with one another is known as_______________: a. A Model of Efficiency b. An Entity Relationship Diagram c. An Enterprise Resource Design d. A Throughput Analysis e. An Artificial Database Scheme

An Entity Relationship Diagram

The human voice is a (an): a. Analog Signal b. Digital Signal c. Hybrid Signal d. Natural Signal

Analog Signal

Disclosing personal information such as your race,religion, sex, disabilities, and age on social media undermines what type of protections otherwise provided to you as a citizen in the United States? a. Wage discrimination laws b. Anti-discrimination laws c. Voter eligibility laws d. Commercial driver's license eligbility laws e. Personal credit eligibility laws

Anti-discrimination laws

Which ofthe following could always be used to prevent a hacker from compromising a Bluetooth network? a. Attenuation b. Line-of-sight c. Foot-printing d. Intrusion Detection

Attenuation

Which of the following is NOT a value-adding attribute of mobile computing? a. Bandwidth improvement b. Instant connectivity c. Localization d. Ubiquity

Bandwidth improvement

Which of the following terms would NOT commonly be associated with analog data? a. Bits per second (bps) b. Bandwidth c. Continuous d. Cycles per second e. Hertz (Hz

Bits per second (bps)

What short-range wireless technology is commonly to connect smartphones with hands-free headsets for telephone calls and listening to music? a. Bluetooth b. WiMax c. Wavelength d. Spectrum e. Photon

Bluetooth

Harald Blaatand, who was the King of Demark from 940-981, is associated with what wireless technology? a. Bluetooth Technology b. Computer Wifi c. Cellular Telephone Networks d. Microwave Transmitters e. Satellite Transmitters

Bluetooth Technology

The equity on a company's balance sheet is most closely related to which of the following? a. Market value b. Operating income c. Share price d. Book value e. Gross margin

Book value

LEED refers to the efficiency of: a. Buildings b. cars c. desktop computers d. data centers e. aircraft

Buildings

What term is used to describe the behavior where small changes in customer demand that result in large variations in raw material orders causing inefficiency in the supply chain? a. Supply Chain Operations Reference (SCOR) Model b. Bullwhip effect c. Just-In-Time Orders d. Reverse Auctions e. Single-Minute Exchange of Dies (SMED)

Bullwhip effect

As discussed in class, a key concern for a startup business is the "burn rate" for their initial capital.What financial report best describes a company's "burn rate" for investors? a. Balance sheet b. General ledger c. Income statement d. Cash flow statement e. Ticker symbol statement

Cash flow statement

In the root cause video case, the marble of national monument was wearing prematurely. What was the change identified by the in-depth root cause analysis of the problem? a. Changing the time the lights illuminating the monument were turned on b. Changing the acid level in the cleaning solution c. Changing the business process used to clean the monument d. Changing the company contracted to perform the cleaning e. Restricting the areas that visitors to the monument were allowed to walk

Changing the time the lights illuminating the monument were turned on

Which of the following is the correct order of the evolution of the modern IT infrastructure, from latest to earliest? a. Cloud and mobile computing, enterprise computing, LANs (client/server computing), stand-alone PCs, mainframe and dumb terminals, stand-alone mainframes b. Cloud and mobile computing, stand-alone PCs, enterprise computing, LANs (client/server computing), mainframe and dumb terminals, stand-alone mainframes c. Stand-alone mainframes, mainframe and dumb terminal, LANs (client/server computing), enterprise computing, stand-alone PCs, cloud and mobile computing d. Stand-alone mainframes, mainframe and dumb terminal, stand-alone PCs, LANs (client/server computing), enterprise computing, cloud and mobile computing

Cloud and mobile computing, enterprise computing, LANs (client/server computing), stand-alone PCs, mainframe and dumb terminals, stand-alone mainframes

Identifying patterns in data based on common temporal (time) or spatial (geographic) traits is based on what type of data mining analysis? a. Clustering b. Association c. Sequencing d. Forecasting e. Classification

Clustering

A Hybrid Cloud a. Is owned by the firm using it b. Is leased from another company c. It provided by government agencies d. Combines private and outsourced resources

Combines private and outsourced resources

Which of the following knowledge management concepts includes an organizational culture focused on problem solving, a desire to share knowledge because of mutual interest, and norms that build trust, such as might be found in an MIS 111 FlexLab? a. Best practices community b. Knowledge management cycle c. Intellectual capital community d. Community of practice e. Click-stream analysis

Community of practice

Which of these is NOT an essential Cloud Computing characteristic? a. On-Demand Service b. Resource Pooling c. Elasticity (ability ch change or scale) d. Measured Service, (Pay for like a utility, what you need) e. Compliance (HIPPA, PCI)

Compliance (HIPPA, PCI)

What type of software system allows a user to publish, edit, and modify websites from central interface and manage the development workflow in a collaborative environment? a. Content Management Systems b. Augmented Reality Systems c. Group Decision Support Systems d. Google Analytics

Content Management Systems

An entrepreneur developing detailed documentation of their business processes so that they can be offered to other individuals as a franchise operation is an example of: a. Converting explicit knowledge into tacit knowledge b. Converting tacit knowledge into explicit knowledge c. Creating a community of practice d. A time-delayed response e. Dependent demand

Converting tacit knowledge into explicit knowledge

Which of the following is NOT a disadvantage of web-based call centers located overseas? a. Communication b. Control c. Cost d. Security

Cost

WalMart has a(n) ___________ strategy. a. Cost leadership b. Customer orientation c. Differentiation d. Innovation

Cost leadership

The task of brainstormingin a group decision support system is similar to what stepin the knowledge management cycle? a. Disseminate b. Publish c. Refine d. Store e. Create

Create

Selecting EPEAT-compliant technology with a high rating over traditional, less energy efficient technology is an example of focusing on what sustainability effect? a. Use of government regulation to eliminate wasteful products b. Creation, Use and Disposal of a product c. Substitution by using alternative methods d. Impacts of long term structural change e. Increased awareness through the use of metrics

Creation, Use and Disposal of a product

What is the name for the path containing the minimum set of tasks that you must traverse in order to reach completion of your project on time? a. Critical Path b. Scope Triangle c. Mythical Man Month d. Project Proposa

Critical Path

What is the process of solving problems and producing things by connecting people that you otherwise would not know using the internet? a. Data mining b. Knowledge management c. Group decision support systems d. Crowdsourcing e. Distance learning

Crowdsourcing

What technique has been used by companies such as Starbucks and Netflix used to engage large numbers of non-employees to innovate, manage, design and market new products? a. Executive dashboards b. Click-stream analysis c. Capacity planning d. Crowdsourcing e. Six Sigma

Crowdsourcing

Which of the following security measures would be considered a "last line defense" for Information Security? a. Cryptography b. Access Control c. Firewalld. Intrusion Detection e. Security SDLC

Cryptography

In the Database Management case study discussed in class, how did marketing use information to improve the profitability of their sales? a. Sales data helped develop a product "recommender" system like Amazon's b. More accurate calculation of sales commissions c. Restocking levels were determined based on sales forecasts d. Customers were classified according into a status level and market segment e. Sales channels were selected for customers based on responses to promotion

Customers were classified according into a status level and market segment

What type of data mining presents information graphically so that users are able to identify patterns in the underlying data? a. Data Visualization b. Case-based Reasoning c. Neural Networks d. Rule Induction e. Nearest-neighbor Techniques

Data Visualization

What type of data structure allows us to organize multi-dimensional information from a data warehouse so that it can be viewed using different data abstractions (or projections)? a. Neural network b. Click stream c. Data cube d. Executive dashboard e. Decision support system

Data cube

Maintaining multiple copies of the same data in multiple information systems that can be independently updated commonly results in what information management problem? a. Data isolation b. Data inconsistency c. Data devaluation d. Data compression e. Data validation

Data inconsistency

__________ support local control, whereas ____________ support central control. a. Data marts; data dictionaries b. Data marts; data warehouses c. Data warehouses; data dictionaries d. Data warehouses; data marts

Data marts; data warehouses

Concerns over discrimination, data contamination, and intellectual property (ownership of information) were legal and ethical issues discussed in relation to what topic? a. Telemedicine b. Crowdsourcing c. Click-stream analysis d. Data mining e. Project management

Data mining

Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control? a. Bullwhip effect b. Just-In-Time c. Defense in depth d. Disintermediation

Defense in depth

Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control? a. Defense in depth b. Just-In-Time c. Bullwhip effect

Defense in depth

In the management of the Eller College of Management's website, which of the following is considered as the highest priority in the website transformation process? a. Consistent design and navigation b. Enhance interactive components c. Timely and easy updates d. Usability on desktop and mobile e. Defined audience

Defined audience

In the decision support process, formulating a module to be evaluated and setting criteria for making a choice would occur during what phase of the decision making process? a. Choice Phase b. Design Phase c. Functional Phase d. Intelligence Phase e. Operational Phase

Design Phase

A business intelligence tool that uses abstractions such as color and graphical images like instrument gauges to allow executives to grasp business situations quickly is known as a: a. Planning Horizon b. Digital dashboard c. Expert system d. Neural network e. Geographic information system

Digital dashboard

What pilot sustainability initiative focused on collaboratively capturing usable clothes and appliances when students move out of residence halls each semester? a. Dodge the Dumpster b. Zero Waste c. Green Team d. Spring Fling e. LEED Buildings

Dodge the Dumpster

In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does ".edu" define? a. Browser b. Domain c. Protocol d. resource e. server

Domain

In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does ".edu" define? a. Domain b. Browser c. Protocol d. Resource

Domain

Often presented visually on an executive dashboard, what type of report focuses attention on business processes whose performance falls outside the range of their defined KPI metrics? a. Batchb. Drill-down c. Exception d. Ad hoc e. Annual

Exception

IT has changed the manager's job in many ways. Which of the following is NOT the result of this change? a. Easier to make a decision b. More information to address c. Remote supervision d. Real-time information

Easier to make a decision

A Cost-Benefit Analysis is related mostly to what type of project management feasibility assessment? a. Technical b. Operational c. Economic d. Political e. Ethical

Economic

Purchasing an entire box of screws, even though only a small number are need for the master production schedule is an example of making a purchasing decision based on what approach? a. Fixed order quantity b. Lot-for-Lot c. Economic Order Quantity d. Independent Demand

Economic Order Quantity

What type of analysis evaluates the trade-offs with respect to making a decision on whether to purchase a new computer vs. continuing running older, less efficient computers? a. Process analysis b. Management analysis c. Economic analysis d. Impact analysis e. Cognitive analysis

Economic analysis

What category of location-based services would best describe products such as "location-based gaming", "social networking," and "find a friend"? a. Entertainment b. Mobile Resource Management c. Information Services d. Personal Security e. Social Networking

Entertainment

What common term was used with both human-computer interaction and In a database entity relationship diagram as a way of limiting choices by the user and also specifying the minimum and maximum possible values that may exist for a relationship between two entities, respectively? a. Constraint b. Entity Class c. Diagram d. Relationship e. Attribute

Entity Class

With respect to a database, what term is used to describe an abstract representation of all of the information included in a data structure about a particular type of entity? a. Entity Attribute b. Entity Class c. Entity Key d. Entity Model e. Entity Table

Entity Class

Originally discussed by Dr. Gilliland, David Myers' (former controller of MCI/Worldcom) statement "I still don't know that one point when I started to cross the line...", is an example of how small, incremental repeated compounding of unethical decisions can result in what? a. Gut check b. Transparency test c. Whistleblowing d. Ethical drift e. Defining moment

Ethical drift

______________ is knowledge that has been codified or documented. a. Data b. Explicit knowledge c. Information d. Tacit knowledge

Explicit knowledge

ERP systems are an evolution of _____________. a. AI b. CRM c. DSS d. FAIS

FAIS

From a user's perspective, perceived affordances would include actual perceptible design affordances and what other category of perceptual affordances? a. Correct rejection of design characteristics that are not affordances b. Hidden design affordances c. Design mitigation affordances d. False or fake design affordances e. Accessible affordances

False or fake design affordances

Which type of media is least likely to be affected by electronic noise? a. Fiber Optic Cable b. CAT-3 Cable c. CAT-5 Cable d. Coaxial Cable e. POTS Cable

Fiber Optic Cable

What type of guided media uses light for signaling? a. Fiber Optics b. twisted pair c. coaxial cable d. open wire

Fiber Optics

What network security control prevents information from moving between two networks? a. Firewall b. Post Scanner c. Packet Sniffer d. Biometric Identification

Firewall

Selecting among technology products based solely upon thier EPEAT ranking is an exampleof what order sustainability effects? a. Capital Order b. First Order c. Second Order d. Third Order e. Consumer Order

First Order

Which of the project management documents includes all three of the triple constraints? a. Spiderweb Diagram b. PERT Chart c. Gantt Chart d. Cross-functional Diagram e. Hierarchical Diagram

Gantt Chart

Satellites used for data communications that appear to be stationary from a fixed location on earth are placed in what type of orbit? a. Geosynchronous orbit b. Polar orbit c. Mid-earth orbit d. Elliptical orbit e. Commercial orbit

Geosynchronous orbit

Allowing individuals to file tax returns, renew driver's licenses, and obtain various permits online is an example of what type of eGovernment? a. Government-to-business (G2B) b. Government-to-citizen (G2C) c. Government-to-employees (G2E) d. Government-to-government (G2G) e. Government-to-suppliers (G2S)

Government-to-citizen (G2C)

What technology was developed to address problems such as a lack of focus, fear of speaking, hidden agendas and misunderstandings then collaborating with others? a. Data Mining b. Communities of practice c. Executive Dashboard d. Group Decision Support Systems e. Crowdsourcing

Group Decision Support Systems

In recognizing ethical situations, which of the following is related to a chemical reaction that occurs in your body, specifically your intestinal track? a. Ethical drift b. Gut check c. Transparency test d. Gut punch e. Taste check

Gut check

What is NOT an advantage of digital transmission? a. Produces fewer errors b. Permits higher maximum transmission rates c. Harder to encrypt d. Simpler to integrate voice, video, and data

Harder to encrypt

In the "Don Norman: Thoughtful Design" Video Case, what did he say was the most important part / thing to take into account when creating a good and thoughtful design? a. Simplicity b. Flexibility c. How will it works d. How the designer thinks it should work e. How the user thinks it should work

How the user thinks it should work

Which of the following is a support activity in Porter's value chain model? a. Customer service b. Human resource management c. Logistics d. Operations

Human resource management

The ____________________ is a summary of information needs of the functional areas and of the organization as a whole. a. Application portfolio b. IT environment c. Mission d. Objective of the IT function

IT environment

Which of the following is TRUE? a. IT can eliminate any job. b. IT impacts entire industries. c. IT opens up jobs for middle managers. d. IT only helps improve employees' health and safety.

IT impacts entire industries.

In the video case on the "Business Value of RFID," RFID improved the business operations of American Aprarel EXCEPT: a. Shoplifting (Shrinkage) b. Stockouts c. Selling products at full price d. Finding misplaced inventory e. Identifying defective merchandise

Identifying defective merchandise

Which of the following HTML "IMG" tag characteristics meets the accessibility "POUR" principle of being "Perceivable"? a. Including the tag alt="My House" b. Including a URL (e.g., http://www.cnn.com/) c. Including the tag height="200" d. Including at least one "%20" in a filename e. Including the tag width="141

Including the tag alt="My House"

Which of the following HTML "IMG" tag characteristics would make a reference to an image absolute? a. Including the tag alt="My House" b. Including a URL reference (e.g., http://www.cnn.com/) c. Including the tag height="200" d. Including at least one "%20" in a filename e. Including the tag width="141"

Including the tag alt="My House"

In the McGinn model of design, the least commoncategory of design elements would be related to what factor in the McGinn model? a. Context b. Culture c. Human Sensory d. Group e. Individual

Individual

Dr. Neumann's being able to purchase his "Globalization Tie" directly from a merchant in China is an example of what "era" of globalization? a. Individual-based globalization b. Industry-based globalization c. Country-based globalization d. Company-based globalization e. Cloud-based globalization

Individual-based globalization

In Thomas Friedman's discussion of globalization, he described the process of globalization as being realized through action that were first defined by your country, then later defined by multi-national companies, and finally, in the most recent age of globalization is defined by: a. Individuals b. International treaties c. Social media d. Financial markets e. Political parties

Individuals

Building on its initial success of the Voter Activation Network, the Democratic National Committee moved beyond simply classing voters by whether they are likely to cast a vote and their party affiliation to also include what additional aspect of Web2.0? a. Identifying voters who were likely to blog for a candidate or issue b. Using "mash-ups" to select efficient driving routes on election day for GOTV drivers c. Using a "long tail" strategy to every voter to building support through niche issues d. Influencing voters by having supporters use their social media relationships e. Creating issue-related folkonomies to inform voters of important issues

Influencing voters by having supporters use their social media relationships

Which of the four IOT (Internet of Things) layers includes technology such as data centers, information security and data mining? a. Information Processing b. Integrated applications c. Network Construction d. Sensing and Identification

Information Processing

___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information. a. Competitive intelligence b. Espionage c. Information extortion d. Intellectual property

Information extortion

What term best describes when consumers are able to use their smartphones to obtain information about a company's competitor's product pricing, features, customer reviews and availability while shopping in their company's brink-and mortar store? a. Information transparency b. Crucial distinctions c. Accessibility d. Interference e. Multi-path

Information transparency

In the History of the Cell Phone video case, how did the use of cellular phones change the way in which calls weremade? a. Instead of calling a place, calls to cellular telephones were associated with a person b. Calling a cellular telephone required the assistance of an operator c. A new system of telephone numbers were required to call cellular phones d. Cellular telephones could only call telephones within the local calling area e. Cellular telephones improved the sound quality that customers experiences

Instead of calling a place, calls to cellular telephones were associated with a person

As originally discussed by Dr. Gilliland, the classic values conflict with "Who Am I'" represents what type of ethical dilemma? a. Short-term vs. long-term b. Honesty vs. integrity c. Peer-pressure vs. boss-pressure d. Integrity vs. loyalty e. Organizational ethics

Integrity vs. loyalty

Operating unregulated WiFi networks, clickers, Bluetooth headsets, cordless telephones, and microwave ovens using the same 2.4GHz ISM frequencyrange in close proximity to one another might result in what problem? a. Interference b. Attenuation c. Multi-path d. Line-of-sight e. Right-of-way

Interference

The web __________ the same thing as the internet. a. Could be b. Is c. Is not d. I don't know

Is not

In addition to possessing contextual and relevant information, what other characteristic aspect does knowledge possess? a. It is an entity class b. It solves a structured problem c. It is always displayed visually d. It is actionable e. It is consistent

It is actionable

What is NOT a benefit of telemedicine? a. It improves access to healthcare b. It provides real-time care to isolated areas c. It reduces the need to move the patient d. It requires traveling so doctors can see their patients in person

It requires traveling so doctors can see their patients in person

Business metrics that describe the performance of critical business activities are known as: a. Key performance indicators b. Residual risk assessments c. Business continuity plans d. Business intelligence analyses e. Decision trees

Key performance indicators

The terms "contextual," "relevant," and "actionable" are commonly related to what term? a. Information b. Knowledge c. Repository d. Alignment e. Relationship

Knowledge

COPLINK, developed at the University of Arizona in the MIS Department's Artificial Intelligence Lab, allows law enforcement officers to integrate database information to identify crime suspects based on limited information (e.g., a license plate number or nick name).Upon what information system technology is this system's design based? a. Knowledge management b. Group decision support sytems c. Crowdsourcing d. Telepresence e. Spiderweb Mapping

Knowledge management

The sequence of activities performed by users of GroupSystems' ThinkTank product directly parallel the steps in what other business process? a. Transaction processing system b. Operational CRM c. Knowledge management cycle d. Economic globalization e. Just-in-time Inventory Management

Knowledge management cycle

Making the Adobe Creative Cloud available to UofA students is an example of what type of approach for software Acquisition? a. Buy b. Lease c. In-House Development d. Open Source e. Rent-to-Own

Lease

______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. a. Accountability b. Due Process c. Liability d. Responsibility

Liability

Which of the following issues related to wireless communication would NOT be a problem for an RFID (Radio Frequency Identification) system? a. Line-of-sight b. Monitoring c. Attenuation d. Interference e. Multi-path

Line-of-sight

In the Personal Branding video case, which of the following online platforms was idenfied as being primarily a business networking tool? a. Facebook b. LinkedIn c. Democratic voters who sometimes vote d. Wordpress e. Amazon.com

LinkedIn

In general, what you think of as the quality of your network connection speed when you are using your PC, iPad, or Smartphone is most influenced by which of the following? a. Local Tier-3 ISPs b. Backbone Tier-1 ISPs c. Regional Tier-2 ISPs d. Location of the content provider's servers e. Protocols used for Layer-1 transmission

Local Tier-3 ISPs

What term is used to describe the information collected by an Internet of Things sensor that describes the action (i.e., location, time, place, etc.) as opposed to the data that is collected itself? a. Metadata b. Hashtagging c. Entities d. Packets e. Accommodations

Metadata

An unobstructed, straight line-of-sight path between a transmitter and receiver is required by which of the following high-speed, commercial wireless network technologies? a. Microwave b. 802.11 Wi-Fi c. Bluetooth d. 3G Cellular e. Broadcast Radio

Microwave

Which of the following is the technology that enables most mobilewallet applications? a. AFC b. ERP c. NFC d. VRP

NFC

Market capitalization is determined by multiplying the stock price by what? a. Profits earned from direct operations b. Dividends paid during the last fiscal year c. Number of common shares outstanding d. Book value of the company e. Year-end Earnings, minus taxes and interest

Number of common shares outstanding

What term is used to describe a physical interface between peripheral devices and the computer? a. Port b. Session c. App d. Signal

Port

Explicit, or "leaky" knowledge, is based on information that is: a. Objective and rational b. Subjective and cognitive c. Informally communicated with an organization d. Dependent on an employee's experience e. Customized by each user

Objective and rational

n the video case for telemedicine, Dr. Ana Lopez, who is the Medical Director of the Arizona Telemedicine Program, described how advances pioneered at the University of Arizona in tele-medicine and tele-pathology have improved the standard of health care in what way? a. Offering access to healthcare to individuals in correctional institutions b. Offering bundled, same-day assessment in the diagnosis of breast cancer c. Referrals for individuals calling the Poison and Drug Information Center d. Offering robotic surgery to military personnel in battlefields e. Offering on-site training physicians and nursing staff in rural communities

Offering bundled, same-day assessment in the diagnosis of breast cancer

Which of the following is NOT a characteristic of alignment? a. Organizations rotate business and IT professionals across departments and job functions b. Organizations create a vibrant and inclusive company culture c. Organizations view their IT department employees as supremely important d. Organizations provide overarching goals that are completely clear to each IT and business employee

Organizations view their IT department employees as supremely important

What is NOTa factor contributing to the Bullwhip Effect? a. Shortage Gaming b. Outsourcing c. Price Promotions d. Batch Purchasing e. Forecasting/Trend Analysis

Outsourcing

In the video case discussing how governments could leverage web 2.0 technologies, the speaker described an emerging era of "data-driven government" that had helped the state of Maryland identify where children were at risk.What approach was used for this solution? a. Online surveys of children current places in foster care homes b. Overlaying maps of children in foster care with maps of persons convicted of crimes c. Providing communities with maps of accidents and other police reports d. Using online forums to increase citizen engagement for new laws e. Allowing the media to access information on children in foster care

Overlaying maps of children in foster care with maps of persons convicted of crimes

On the balance sheet, total assets minus total liabilities must equal what? a. Free Cash flow b. Dividends Paid c. Owner's Equity d. Stock price

Owner's Equity

In a packet-switched data communication network, which of the following is true: a. Packets can be lost or become corrupted between the sender and receiver b. All packets from a sender follow the same path through the network to the receiver c. All packets always follow the shortest path (fewest hops) through the network d. All packets from a sender always arrive at the receiver in same order they were sent e. The path packets follow in the network can never be changed if a data link fails

Packets can be lost or become corrupted between the sender and receiver

The success of a Group Decision Support System (GDSS) is based upon two key features:contributor anonymity (i.e., the identity of the person making the comment or suggestion is not known), and what other important feature? a. Analytical CRM b. Reintermiediation c. Disintermediation d. Parallel Discussions e. Six Sigma

Parallel Discussions

What is an affordance? a. Being able to pay for something b. Physical property of an object that shows functionality c. How well the user likes the interface d. Safety of users and of data

Physical property of an object that shows functionality

What action did Stacy Snyder take that resulted in her losing her job? a. Hacking the AP Twitter feed and posting a fraudulent message b. Undertaking accounting fraud at her company c. Posting a photo of herself at a party on her personal social media account d. Infecting her company's network computer with a virus while using Facebook at work e. Being a whistle-blower and reporting the illegal actions of her employer

Posting a photo of herself at a party on her personal social media account

When printing a document, which of the following strategies would result in the most significant energy savings? a. Using wireless communication to increase data transmission speed b. Printing a document in monochrome (black and white) c. Printing a document on both sides of the paper (duplex printing) d. Printing a document with smaller fonts e. Adding an energy meter to a printer

Printing a document on both sides of the paper (duplex printing)

In the Video Case on Decision Matrices, what is the goal of weighting decision matrices? a. Prioritize the most important quantitative decision criteria b. Prioritize the most important qualitative decision criteria c. Prioritize the most important productivity decision criteria d. Determine which portion of the decision will be made based on the matrix e. Determine the quality of the data feeding the decision

Prioritize the most important quantitative decision criteria

______________ is the right to be left alone and to be free of unreasonable personal intrusions. a. A digital dossier b. Information privacy c. Privacy d. Profiling

Privacy

Since cell phones are "uniquely personal," the use of passive geolocation has raised what concern among users of mobile commerce? a. Privacy of personal information b. Accuracy of driving directions c. Identification of Showrooming d. Receiving accurate credit for incentives

Privacy of personal information

Which of the following business component are *not* included in an MRP-II planning cycle? a. Raw Materials b. Workforce c. Plant and Equipment d. Product Margins

Product Margins

What is the term used to describe the process of reducing the number of dimensions of a multi-dimensional data cube (e.g., from three dimensions, perhaps season, location, and product, into two dimensions, such as season and location)? a. Simplification b. Variable c. Projection d. Context e. Function

Projection

In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does "http://" define? a. Protocol b. Browser c. Domain d. Resource e. Server

Protocol

According to the Video Case on Decision Matrices, what factors should be used when making a decision? a. Only Quantitative factors b. Only Qualitative Factors c. Only Productivity Factors d. Quantitative and Qualitative Factors e. Qualitative, Quantitative, and Productivity Factors

Quantitative and Qualitative Factors

Parking garage passes and access control on employee ID badges are examples of: a. Bluetooth b. LEO c. RFID d. 4G / cellular

RFID

What technology has been used for such diverse applications as healthcare, tracking lost pets, and toll collecting on highways? a. RFID b. SCOR c. MRP-II d. Infrared e. CFAR

RFID

What IOT technology discussed in class could be used to improve tracking of retail inventory? a. RFID Tags b. Geotagging c. Product Metadata d. Crowdsourcing e. Folksonomies

RFID Tags

What IOT technology discussed in class could be used to identify shoppers and allow products to introduce (Recommend) themselves to a shopper? a. RFID tags b. geottaging c. product metadate d. crowdsourcing e. folksonomies

RFID tags

What technology uses radio-frequency one-way communication path to allow objects identify themselves by transmitting information stored in the object? a. Radio Frequency Identification b. Bluetooth c. Near Field Communication d. WiFi (802.11xx)

Radio Frequency Identification

Internet-enabled globalization does the following: a. Forces new suppliers to distribute products using traditional distribution networks b. Removes geography as a barrier to relationships c. Creates barriers that protect "olive tree" products d. Forces competitors to share sales information and product pricinge. All (A, B, C, and D) of the above

Removes geography as a barrier to relationships

Which of the following actions would be considered a biometric authentication? a. Requiring a user to enter a secret password b. Requiring a user to swipe a CatCard c. Requiring a user to scan their fingerprint d. Requiring a user to sign their signature e. Requiring a user to type a group of displayed letters

Requiring a user to scan their fingerprint

ERP ______________ systems have the capability to place automatic requests to buy products from suppliers in real time. a. AI b. CRM c. DSS d. SCM

SCM

What type of hack occurs when a web form allows a database command to be entered that results in the database's information being compromised? a. SQL Injection b. Brute-force compromise c. Web page hijacking d. Cross-site Scripting e. Social Engineering

SQL Injection

Google Docs is an example of? a. SaaS b. IaaS c. GaaS d. Paas

SaaS

In the Thoughtful Designvideo case, Don Norman explained cultural perceptions in design through the use of what common, everyday item? a. Opening and closing a door b. Salt and pepper shakers c. A shopping cart d. The signs on restroom doors e. Trash and cigarette waste containers

Salt and pepper shakers

In project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resourcesand what other dimension of the planning process? a. Alignment b. Feasibility c. Agility d. Scope e. Value

Scope

As discussed in class, what company was founded in the Globalization 2.0 era based on the business model of selling discontinued product lines directly to consumers by using a new transportation infrastructure to reach a geographically distributed customer base? a. Sears, Roebuck & Co. b. Ebay.com c. Overstock.com d. Wal-Mart e. BigLots!

Sears, Roebuck & Co.

In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what analogy in the real world did he use to describe TCP? a. Sending information taped to post cards b. Sending information using radio transmitters c. Sending information using secret messages d. Sending information encoded with barcodes e. Sending information using the sematic web

Sending information taped to post cards

Which of the following causes of the bullwhip effect is related to a trading partner intentionallysharing inaccurate information with a company's future inventory requirements? a. Shortage Gaming b. Outsourcing c. Price Promotions d. Batch Purchasing

Shortage Gaming

What is the name used to describe when a person visits a brick-and-mortar store only to check physical characteristics of a product but intends to purchase theproduct online? a. Showrooming b. Disintermediating c. Multiplexing d. Hybrid shopping

Showrooming

As I move farther away from campus, my connection to UAWiFi gets weaker. What will always cause this to occur? a. Signal strength has limited power b. Signal blocked by strong encryption c. Signal has Multi-path propagation d. Signal interference from other sources

Signal strength has limited power

Which of the following is generally NOT commonly used as a biometric identification? a. Signature b. Fingerprint c. Facial geometry d. Retinal Pattern

Signature

In the Jack Welch Video Case what practice was he discussing to enhance customer satisfaction? a. Six-Sigma b. Total Quality Management c. SMED d. The Toyota Production System

Six-Sigma

Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? a. Defense in Depth b. Industrial Sabotage c. Social Engineering d. Advanced Persistent Threats e. Open Source Hacking

Social Engineering

_____________________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords. a. Dumpster diving b. Shoulder surfing c. Social engineering d. Tailgating

Social engineering

Your username (UANetID) is your claim of identify to a computer system.When the computer system verifies your identify by requiringyou to enter a password is an example of what type of authentication? a. Something a user is b. Something a user has c. Something a user does d. Something a user knows e. Something a user inherits

Something a user knows

Sensors, RFID tags, meters, GPS, and other devices are used to collect supply chain information. These are all examples of __________. a. Batch processing b. OLAP c. OLTP d. Source data automation

Source data automation

What normative theory of ethics focuses on the belief that manager's actions should be guided by the understanding that they are entrusted with a responsibility to manage and protect the assets of the company for the benefit of all of those who the actions of the firm affect? a. Stockholder b. Stakeholder c. Social Contract d. Organizational e. Loyalty

Stakeholder

What type of problem has an optimal solution can be reached through single set of steps based on an algorithm?a. Strategic b. Structured c. Management d. Collaborative e. Unstructured

Structured

The University of Arizona Green Fund is an example of what type of sustainability program? a. Student engagement b. Faculty scholarship c. Campus operations d. Administrative leadership e. Facilities planning

Student engagement

SCM helps address which of Porter's Five Forces? a. Buyer power b. Rivalry c. Supplier power d. Threat of substitutes

Supplier power

When analyzing a set of click-stream data, what term is used describe the percentage of rows containing an item relative to the total number of rows? a. Projection b. Visualization c. Support d. Metadata e. Induction

Support

In the VAN (Voter Activiation Network) Relationship-Based Political Organizing video case study, the VAN able to idenify the relationships of possible supporters using data from what source? a. Voter registration records b. Direct mail campaigns c. Onlinesurveys d. Supporter's Facebook contacts e. Tax returns of registered voters

Supporter's Facebook contacts

In the Software Development Lifecycle Process (SDLC), in what SDLC stage is it the most costly to make changes to the system requirements a. Systems Design b. Systems Programming c. Systems Testing d. Systems Operation and Maintenance e. Systems Implementation

Systems Operation and Maintenance

Which of the following is NOT an inter-organizational system? a. CRM b. ERP c. SCM d. TPS

TPS

Subjective knowledge that is based an individual's experiences is known as what? a. Refined knowledge b. Tacit knowledge c. Technical knowledge d. Explicit knowledge e. Procedural knowledge

Tacit knowledge

How does telemedicine improve the delivery of medical care in rural communities? a. Telemedicine allows patients to make a preliminary self-diagnosis online b. Telemedicine prevents physicians from making errors during surgery c. Telemedicine reduces the need for patients to travel to physician's offices d. "Telemedicine Avatars" can perform routine procedures without the physician e. Telemedicine will allow a physician to meet with multiple patients at the same time

Telemedicine reduces the need for patients to travel to physician's offices

What collaboration tool was discussed in class that enhances the participants' contextual awarenessby sharing non-verbal information during meetings? a. Teleportation b. Twitter c. Telepresence d. Crowdsourcing e. Six Sigma

Telepresence

In the Video Case on Michael Porters Competitive Forces What Industry was described as being Terrible in Every Category? a. The Airline Industry b. The Railroad Industry c. The Supermarket Industry d. The Cattle Industry

The Airline Industry

Porters five forces focuses on what part of competition? a. The Business Environment b. The FiveCore Internal Processes of a Business c. The Business Supply Chaind . The Five Core Business Functional Areas

The Business Environment

Which of the following does a Fishbone Diagram typically not inform you about a problem? a. The cost of correcting a problem with a process b. Identifies the major categories of a problem c. Identifies many of the root causesof problems d. Helps guide the process improvement process e. Organizes the problems associated with a process by the major categories

The cost of correcting a problem with a process

Applications such as "find a friend" (FourSquare), driving directions (Smartrek), roadside assistance (OnStar), and fleet management (UPS and FedEx) are all examples of services that have been enhanced by knowing what? a. The location of the requester b. The identity of the requester c. The time the request was made d. The age of the requester e. The number of people making requests

The location of the requester

Although globalization has been underway for many centuries, digitization, networking, and connectiveness have dramatically increased what? a. The pace of Change b. The number of "Olive Tree" products and services c. Data Redundancy d. Revenue per Employee e. Worker Productivity

The pace of Change

Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project? a. Whether the majorproject milestones are being completed on budget b. Individual work assignments for persons assigned to the project c. The project milestones and the order they are scheduled to be completed d. Whether project tasks have been organized in the most efficient order e. The quality of the work performed during each major project milestone

The project milestones and the order they are scheduled to be completed

A Bill-of-Materials describes the components that make up an item, the quantity used, and what other information about a finished good? a. The value of the material b. The vendor who supplies the material c. The relationships of raw materials and subassemblies d. The lot sizing used when purchasing raw materials

The relationships of raw materials and subassemblies

Assume you need to put a sign that says "PUSH" on a door handle to explain the correct way to operate the door.The "PUSH" sign helps a user understand what aspect of usability? a. The sign explains a perceptible affordance b. The sign explains a correct rejection c. The sign explains a hidden affordance d. The sign explains a false affordance

The sign explains a false affordance

As I move farther away from campus, I notice that my UAWiFi connection gets progressively weaker. What factor will always cause this to occur? a. The signal strength is lost due to attenuation b. The signal blocked by strong encryption c. The signal cannot be received due to interference d. The signal is blocked due to right-of-way restrictions e. The maximum packet hop count is exceeded

The signal strength is lost due to attenuation

What common function do "HTTP", "TCP" and "IP" share? a. They all define internet-based protocols b. They all are website domains c. They all are data encryption methods d. They are abbreviations for physical media e. They are common computer viruses

They all define internet-based protocols

_________ is any danger to which a system may be exposed. a. Exposure b. Information security c. Threat d. Security

Threat

In a vertical cross-functional business process diagram, the order of items in one column (from top to bottom) shows what relationship among these items? a. Time b. Cost c. Importance d. Frequency e. Skill level

Time

he __________________ test proposes a scenario in which a man and a computer both pretend to be women or men, and a human interviewer has to identify which is the real human. a. Google b. SkyNet c. Terminator d. Turing

Turing

A company's "ticker" or stock symbol serves what role on a stock trading exchange? a. Uniquely identifies a traded stock b. The time and date the stock was sold c. The broker selling the stock d. The change (up or down) in price from the last purchase price e. The official company logo used for stock transactions

Uniquely identifies a traded stock

What website design philosophy places the user at the center of the process with users beingconsulted at each stage of the design process? a. Universal design b. CSF design c. Effective design d. Perceptual design e. Thoughtful design

Universal design

The characteristics of big data (data science) are described as being related to volume (of the information), velocity (speed at which information is collected), and what other characteristic? a. Variety (integrating data from multiples sources) b. Vagueness (using data without a clear definition) c. Valuation (using data that has significant economic value) d. Visual (using data that can be displayed graphically) e. Vertical (using data related only to one market)

Variety (integrating data from multiples sources)

Businesses like to use Virtual Private Networks for every reason except? a. Virtual networks are faster than ordinary internet connections b. They have no control over the path data takes between business sites c. Data from web-browsers may not be encrypted d. Data from applications other than web browsers may not be encrypted e. Virtual networks are cheaper than leased lines

Virtual networks are faster than ordinary internet connections

Similar to trends in computing hardware, what is the trend for wireless network hardware? a. Virtualization and merging with the cloud b. Interference and attenuation are being eliminated c. Less, but bigger network antennas . Putting networks onto chips e. Sensors that don't need batteries

Virtualization and merging with the cloud

The Internet is a ______________. a. LAN b. MAN c. PAN d. WAN

WAN

One key feature of __________________ is the ability to remix applications and data. a. Web 1.0 b. Web 2.0 c. Web 3.0 d. None of the above

Web 2.0

In our discussion of the Eller websites, issues such as user interface consistency, design standards, and branding are all components contributing to what larger issue? a. Information privacy b. Website Value Proposition c. Six Sigma Certification d. Spatial frequency reuse e. Information Transparency

Website Value Proposition

which of the following is an informational role? a. disseminator b. disturbance handler c. entrepeneur d. figurehead

disseminator

The Eller "GoodCat" website that allows for anonymous reporting of unethical behavior in Eller classes uses what type of business model? a. Transparency model b. Ethical drift model c. Whistleblower model d. Loyalty model e. Engagement model

Whistleblower model

In the sustainability project to reduce waste at basketball and football games, a key factor in improving the diversion rate was: a. Offering discounting ticket prices for recyclers b. Working purchasing to use products that can be recycled c. Eliminating trash cans at the stadium and McKale arena d. Remodeling the stadium and McKale arena to be LEED buildings e. Changing to pre-packaged food products and bottled beverages

Working purchasing to use products that can be recycled

Signals used to send messages can be _______ or digital. a. analog b. discrete c. rotary d. binary

analog

IT allows the workplace to expand to 24 hours a day at _______________, which is a benefit for ___________.a. a central location; only employees b. any location; only employers c. a central location; employers and employees d. any location; employers and employees

any location; employers and employees

the internet of things can be describes as three any type connections. what are these three "any" type connections? a. any time, any place, any thing b. any price, any person, any network c. any time, any place, any network d. any place, any person, any industry

any time, any place, any thing

IT __________ be used to create a competitive advantage ___________. a. can; because everyone has access to technology b. can; when it is used effectively c. cannot; because everyone has access to technology d. cannot; even when it is used effectively

can; when it is used effectively

Telepresence systems seamlessly integrate _____ and _____. a. contextual awareness; content management b. content awareness; hardware c. sentiment analysis; contextual software d. Ethernet; WiFi

contextual awareness; content management

according to our guest speaker who spoke on managing the development of eller websites, what is the most important business skill a person working with technology should have? a. understanding cost management b. effective communication skills c. ability to work under pressure d. knowlegde of content management systems e. ability to wotk independently

effective communication skills

what is the most significant threat to information security in the cloud for most companies? a. packet monitoring b. remote hackers c. employee behavior d. WIFI monitoring

employee behavior

besides sensors, radios and chips, what is the value of the internet of things? a. establisment of service on top of the connectivity b. cheaper equipment costs c. creating less data d. companies that haven't failed e. eliminates the need for a value propositon

establisment of service on top of the connectivity

WebMD is a(n) _________ that allows doctors to ___________. a. ERP; diagnose diseases b. expert; diagnose diseases c. ERP; perform long-distance surgery d. expert; perform long-distance surgery

expert; diagnose diseases

Robots are useful ___________. a. as companions (e.g. cyberpooches) b. for driving cars (e.g. cyberchauffer) c. for handling monotonous tasks (e.g. factory work) d. only in science fiction (e.g. Terminator)

for handling monotonous tasks (e.g. factory work)

The web ____________ buyer power. a. decreases b. increases c. has no impact on d. has a mixed impact on

has a mixed impact on

According to the mythical man-month what is the reason adding people to a project will not speedup your project? a. Increased complexity of communications b. Increased spending on personnel c. Increased critical path milestones for the project d. Each increase in the staff requires a corresponding extension to the project due date

increased complexity of communications

data _________________ means all applications are able to access the same data, which is ______________ by databases. a. independence; maximized b. independence; minimized c. isolation; maximized d. isolation; minimized

independence; maximized

What is the correct filename to use for your ABP-3A website? a. index.html b. abp3a.html c. Index.html d. Public.html e. public.html

index.html

ERP address information silos by _____________. a. correcting a lack of communication between TPSs b. integrating functional areas c. reducing the amount of information presented d. simplifying system creation

integrating functional areas

The three security challenges of wireless communication are confidentiality, accessibility, and _____. a. importance b. Internet c. integrity d. incorporation

integrity

The _________ prohibits an organization from collecting any personal information unless the customer specifically authorizes it. a. digital dossier policy b. information privacy policy c. opt-in model of informed consent d. opt-out model of informed consent

opt-in model of informed consent

In the "Democracy Online" framework, what group should take resposibility for providing information about positions, candidates, and advocacy efforts, and work to involve supporters through online interactive spaces? a. media and commercial content b. government c. private sector d. political organizations e. civic participation center

political organizations

what is an example of something in the integrated application layer of the 4 layer model? a. GPS b. data center c. smart transport d. search engine

smart transport

When displaying a webpage, such as http://www.u.arizona.edu/~wilbur, what is the name of the directory the web browser will check in the "wilbur"account for the "index.html" website? a. The "home" directory b. The "public_html" directory c. The "www" directory d. The "web" directory e. The "wilbur" directory

the "public_html" directory

Which of these is NOT enumerated as a Motivation to Create Accessible Web Content? a. To improve the reliability of technical functionality (technology centered motivations) b. To improve the lives of people with disabilities (human-centered motivations) c. To capitalize on the a wider audience or consumer base (marketing or economic-centered motivations) d. To avoid lawsuits and/or bad press (public relations and punishment-centeredmotivations)

to improve the reliability of technical functionality (technology centered motivations)

which of the information layers in the internet of things model focuses on the communication networks that connect the sensors that actually collect the data? a. transmission layer b. generation layer c. processing layer d. application layer e. metadata layer

transmission layer

The _____________ approach states that an ethical action is the one that provides the most good or does the least harm. a. common good b. fairness c. rights d. utilitarian

utilitarian


Conjuntos de estudio relacionados

Mathematics 800 Fundamentals - Unit 5: More With Functions SOLVING EQUATIONS WITH DISTRIBUTIVE PROPERTY

View Set

Философия сессия 2

View Set

PrepU Passpoint Coordinated Care

View Set

8th Grade Forces, Motion, and Energy 4-2

View Set

Chapter 8: The Adrenal Glands (Penny)

View Set

Industrial test, absolutism test, French rev test

View Set

WGU C913 Ultimate Study Combined Sets

View Set

Microbiology, Ch 26, Nester's 9th

View Set

Managerial Accounting Exam 4 T/F (Ch8-9)

View Set

Chapter 7: On-the-Job Training Methods

View Set

tale of two cities book 3 quotes

View Set