MIS 111 Final
A ______________ is a shared field that allows relational tables to link to one another and minimizes data redundancy A _____________ is a field (or group of fields) in one table that uniquely identifies a row (or record) of another table.
Foreign key
A ______________ is a field (or attribute) of a record that uniquely identifies that record so that it can be retrieved, updated, and sorted.
Primary key
A ______________ is a field that has some identifying information, but typically does not uniquely identify a record with complete accuracy.
Secondary key
25. Blog tags and twitter hashtags (#MIS111) allow a community of users to connect information using a self-organized logical data structure known as what? a. A folksonomy b. A entity-relationship diagram c. A fishbone diagram d. A taxonomy e. Community of practice
a. A folksonomy
33. Besides sensors, radios, and chips, what is the value in the Internet of Things? a. Establishment of services on top of the connectivity b. Cheaper equipment costs c. Creating less data d. Companies that haven't failed e. Eliminates the need for a value proposition
a. Establishment of services on top of the connectivity
21. In the history of the cell phone case study, the inventor noted that prior to the invention of the cell phone, telephone numbers were generally associated with a place. After the invention of the cellphone, telephone numbers are most commonly associated with what? a. A person b. A place c. A location d. A cipher text e. A packet
a. A person
29. All of the symbols representing tasks and decisions that are shown in single column of a vertical cross-functional diagram are related to the same what? a. Actor b. Root Cause c. Decision Model d. Organization e. Entity
a. Actor
42. What POUR design recommendation might create security risks for banking systems and online testing environments? a. Allowing users unlimited time to complete tasks b. Allowing users to select their own technologies to access web content c. Compliance with new requirements in the Web Content Accessibility Guidelines 2.0 (WCAG 2.0) d. Ability to transform content from one format to another (e.g., text to Braille)
a. Allowing users unlimited time to complete tasks
3. Which company used software to disrupt the previous market-leading companies in the book industry? a. Amazon b. Barnes and Noble c. Books-a-Million d. Walmart
a. Amazon
34. The Internet of Things can be described as three "any"-type connections. What are these three "any" connections? a. Any time, any place, any thing b. Any price, any person, any network c. Any time, any place, any network d. Any place, any person, any industry
a. Any time, any place, any thing
48. Which of the following types of distance learning experiences are not taught in the presence of an instructor, but rather independently viewed by student online and at their pace? a. Asynchronous classes b. Synchronous classes c. Hybrid classes d. Accessible classes e. Globalized classes
a. Asynchronous classes
20. Harald Blaatand, who was the King of Demark from 940-981, is associated with what wireless technology? a. Bluetooth Technology b. Computer Wi-Fi c. Cellular Telephone Networks d. Microwave Transmitters e. Satellite Transmitters
a. Bluetooth Technology
32. Which of the following is an extended ERP module? a. Business intelligence b. Financial management c. HR management d. Operations management
a. Business intelligence
27. In the root cause video case, the marble of national monument was wearing prematurely. What was the change identified by the in-depth root cause analysis of the problem? a. Changing the time the lights illuminating the monument were turned on b. Changing the acid level in the cleaning solution c. Changing the business process used to clean the monument d. Changing the company contracted to perform the cleaning e. Restricting the areas that visitors to the monument were allowed to walk
a. Changing the time the lights illuminating the monument were turned on
17. Identifying patterns in data based on common temporal (time) or spatial (geographic) traits is based on what type of data mining analysis? a. Clustering b. Association c. Sequencing d. Forecasting e. Classification
a. Clustering
71. What term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding? a. Conceptual model b. Semiotic Engineering c. Design Intention d. Emotional design
a. Conceptual model
In a database entity relationship diagram, specifying the minimum and maximum possible values that may exist for a relationship between two entities can best be described using what database term? a. Constraint b. Entity Class c. Diagram d. Relationship e. Attribute
a. Constraint
38. Which of the POUR principles of accessibility focuses on the need to convert non-textual information into another format, such as from audio to text? a. Converting the non-textual information makes the content more perceivable b. Converting the non-textual information makes the content more operable c. Converting the non-textual information makes the content more understandable d. Converting the non-textual information makes the content more robust e. Converting the non-textual information makes the content more confidential
a. Converting the non-textual information makes the content more perceivable
34. WalMart has a(n) ___________ strategy. a. Cost leadership b. Customer orientation c. Differentiation d. Innovation
a. Cost leadership
49. Technologies such as Blackboard, Desire-to-Learn (D2L), Moodle, and Sakai represent what category of E-Learning technology? a. Course Management Systems b. Searching facilities c. Life-course studies d. Student-led inquiry e. Correspondence education
a. Course Management Systems
16. What type of data mining presents information graphically so that users are able to identify patterns in the underlying data? a. Data Visualization b. Case-based Reasoning c. Neural Networks d. Rule Induction e. Nearest-neighbor Techniques
a. Data Visualization
59. What pilot sustainability initiative focused on collaboratively capturing usable clothes and appliances when students move out of residence halls each semester? a. Dodge the Dumpster b. Zero Waste c. Green Team d. Spring Fling e. LEED Buildings
a. Dodge the Dumpster
1. IT has changed the manager's job in many ways. Which of the following is NOT the result of this change? a. Easier to make a decision b. More information to address c. Remote supervision d. Real-time information
a. Easier to make a decision
16. Satellites used for data communications that appear to be stationary from a fixed location on earth are placed in what type of orbit? a. Geosynchronous orbit b. Polar orbit c. Mid-earth orbit d. Elliptical orbit e. Commercial orbit
a. Geosynchronous orbit
44. According to the mythical man-month what is the reason adding people to a project will not speed up your project? a. Increased complexity of communications b. Increased spending on personnel c. Increased critical path milestones for the project d. Each increase in the staff requires a corresponding extension to the project due date
a. Increased complexity of communications
58. Dr. Neumann's being able to purchase his "Globalization Tie" directly from a merchant in China is an example of what "era" of globalization? a. Individual-based globalization b. Industry-based globalization c. Country-based globalization d. Company-based globalization e. Cloud-based globalization
a. Individual-based globalization
56. In Thomas Friedman's discussion of globalization, he described the process of globalization as being realized through action that were first defined by your country, then later defined by multi- national companies, and finally, in the most recent age of globalization is defined by: a. Individuals b. International treaties c. Social media d. Financial markets e. Political parties
a. Individuals
17. In the History of the Cell Phone video case, how did the use of cellular phones change the way in which calls were made? a. Instead of calling a place, calls to cellular telephones were associated with a person b. Calling a cellular telephone required the assistance of an operator c. A new system of telephone numbers were required to call cellular phones d. Cellular telephones could only call telephones within the local calling area e. Cellular telephones improved the sound quality that customers experiences
a. Instead of calling a place, calls to cellular telephones were associated with a person
14. Operating unregulated WiFi networks, clickers, Bluetooth headsets, cordless telephones, and microwave ovens using the same 2.4GHz ISM frequency range in close proximity to one another might result in what problem? a. Interference b. Attenuation c. Multi-path d. Line-of-sight e. Right-of-way
a. Interference
8. Business metrics that describe the performance of critical business activities are known as: a. Key performance indicators b. Residual risk assessments c. Business continuity plans d. Business intelligence analyses e. Decision trees
a. Key performance indicators
19. COPLINK, developed at the University of Arizona in the MIS Department's Artificial Intelligence Lab, allows law enforcement officers to integrate database information to identify crime suspects based on limited information (e.g., a license plate number or nick name). Upon what information system technology is this system's design based? a. Knowledge management b. Group decision support systems c. Crowdsourcing d. Telepresence e. Spiderweb Mapping
a. Knowledge management
53. An ubiquitous learner is someone who: a. Learns in everyday life b. Learns in the classroom only c. Learns in an online space only d. Often has poor academic skills and doesn't interact with the course
a. Learns in everyday life
45. The risk of a project can be measured on what two scales? a. Likelihood and Impact b. Budget and Management c. Change and Control d. Vision and Goals
a. Likelihood and Impact
12. In general, what you think of as the quality of your network connection speed when you are using your PC, iPad, or Smartphone is most influenced by which of the following? a. Local Tier-3 ISPs b. Backbone Tier-1 ISPs c. Regional Tier-2 ISPs d. Location of the content provider's servers e. Protocols used for Layer-1 transmission
a. Local Tier-3 ISPs
55. Which of the following projects is considered the first instance of a educational institution adopting a MOOC approach to the delivery of content (i.e., massive, open, online, and course- related)? a. MIT's OpenCourseware Project b. Kahn Academy c. Coursera d. Semester Online e. Udacity
a. MIT's OpenCourseware Project
10. What term is used to describe the information collected describing the action (i.e., location, time, place, etc.) as opposed to the data itself? a. Metadata b. Hashtagging c. Entities d. Packets e. Accommodations
a. Metadata
24. Explicit, or "leaky" knowledge, is based on information that is: a. Objective and rational b. Subjective and cognitive c. Informally communicated with an organization d. Dependent on an employee's experience e. Customized by each user
a. Objective and rational
3. In a packet-switched data communication network, which of the following is true: a. Packets can be lost or become corrupted between the sender and receiver b. All packets from a sender follow the same path through the network to the receiver c. All packets always follow the shortest path (fewest hops) through the network d. All packets from a sender always arrive at the receiver in same order they were sent e. The path packets follow in the network can never be changed if a data link fails
a. Packets can be lost or become corrupted between the sender and receiver
30. In the Video Case on Decision Matrices, what is the goal of weighting decision matrices? a. Prioritize the most important quantitative decision criteria b. Prioritize the most important qualitative decision criteria c. Prioritize the most important productivity decision criteria d. Determine which portion of the decision will be made based on the matrix e. Determine the quality of the data feeding the decision
a. Prioritize the most important quantitative decision criteria
25. What technology has been used for such diverse applications as healthcare, tracking lost pets, and toll collecting on highways? a. RFID b. SCOR c. MRP-II d. Infrared e. CFAR
a. RFID
46. Tracking what products are delivered to users, and when, is a form of what? a. Release Control b. Acceptance Control c. Maintenance Control d. Scheduling Control
a. Release Control
57. As discussed in class, what company was founded in the Globalization 2.0 era based on the business model of selling discontinued product lines directly to consumers by using a new transportation infrastructure to reach a geographically distributed customer base? a. Sears, Roebuck & Co. b. Ebay.com c. Overstock.com d. Wal-Mart e. BigLots!
a. Sears, Roebuck & Co.
48. Which of the following causes of the bullwhip effect is related to a trading partner intentionally sharing inaccurate information with a company's future inventory requirements? a. Shortage Gaming b. Outsourcing c. Price Promotions d. Batch Purchasing e. Forecasting/Trend Analysis
a. Shortage Gaming
65. ________________ are focused on helping users stores, organize, search, and manage bookmarks of web pages on the internet. a. Social bookmarking b. Social news c. Web 2.0 media sites d. Virtual meeting places
a. Social bookmarking
52. The lack of what issue in online learning communities leads to a lack of commitment to a course, distrust and poor engagement in the class by students? a. Social presence b. Synchronous communication c. Learning Management Systems d. Sufficient communication bandwidth e. Accurate user model
a. Social presence
28. Which of the following does a Fishbone Diagram typically not inform you about a problem? a. The cost of correcting a problem with a process b. Identifies the major categories of a problem c. Identifies many of the root causes of problems d. Helps guide the process improvement process e. Organizes the problems associated with a process by the major categories
a. The cost of correcting a problem with a process
41. From Don Norman's perspective, what fatal flaw does the BMW iDrive (which he descibed as a well thought out, very logical, and sensible device) have with respect its human interface? a. The iDrive destroyed spatiality b. The iDrive did not have a hierarchical menu structure c. The iDrive used a confusing set of control knobs d. The iDrive only controlled the driving-related functions
a. The iDrive destroyed spatiality
8. In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cerf, what common problem did his analogy using the postal service to email a page from a book have with sending TCP packets? a. The message might get lost and not delivered b. The message might get changed in route c. The message might not get sent d. The message might be illegible e. The message might be in the wrong language
a. The message might get lost and not delivered
55. Although globalization has been underway for many centuries, digitization, networking, and connectiveness have dramatically increased what? a. The pace of Change b. The number of "Olive Tree" products and services c. Data Redundancy d. Revenue per Employee e. Worker Productivity
a. The pace of Change
11. As I move farther away from campus, I notice that my UAWiFi connection gets progressively weaker. What factor will always cause this to occur? a. The signal strength is lost due to attenuation b. The signal blocked by strong encryption c. The signal cannot be received due to interference d. The signal is blocked due to right-of-way restrictions e. The maximum packet hop count is exceeded
a. The signal strength is lost due to attenuation
4. What common function do "HTTP", "TCP" and "IP" share? a. They all define internet-based protocols b. They all are website domains c. They all are data encryption methods d. They are abbreviations for physical media e. They are common computer viruses
a. They all define internet-based protocols
43. Which of these is NOT enumerated as a Motivation to Create Accessible Web Content? a. To improve the reliability of technical functionality (technology centered motivations) b. To improve the lives of people with disabilities (human-centered motivations) c. To capitalize on the a wider audience or consumer base (marketing or economic- centered motivations) d. To avoid lawsuits and/or bad press (public relations and punishment-centered motivations)
a. To improve the reliability of technical functionality (technology centered motivations)
31. Which of the information layers in the Internet of Things model focuses on the communication networks that connect the sensors that actually collect the data? a. Transmission Layer b. Generation Layer c. Processing Layer d. Application Layer e. Metadata Layer
a. Transmission Layer
50. Making the Adobe Creative Cloud available to UofA students is an example of what type of approach for software Acquisition? a. Buy b. Lease c. In-House Development d. Open Source e. Rent-to-Own
b. Lease
37. A company's "ticker" or stock symbol serves what role on a stock trading exchange? a. Uniquely identifies a traded stock b. The time and date the stock was sold c. The broker selling the stock d. The change (up or down) in price from the last purchase price e. The official company logo used for stock transactions
a. Uniquely identifies a traded stock
11. The characteristics of big data (data science) are described as being related to volume (of the information), velocity (speed at which information is collected), and what other characteristic? a. Variety (integrating data from multiples sources) b. Vagueness (using data without a clear definition) c. Valuation (using data that has significant economic value) d. Visual (using data that can be displayed graphically) e. Vertical (using data related only to one market)
a. Variety (integrating data from multiples sources)
1. Businesses like to use Virtual Private Networks for every reason except? a. Virtual networks are faster than ordinary internet connections b. They have no control over the path data takes between business sites c. Data from web-browsers may not be encrypted d. Data from applications other than web browsers may not be encrypted e. Virtual networks are cheaper than leased lines
a. Virtual networks are faster than ordinary internet connections
19. Similar to trends in computing hardware, what is the trend for wireless network hardware? a. Virtualization and merging with the cloud b. Interference and attenuation are being eliminated c. Less, but bigger network antennas d. Putting networks onto chips e. Sensors that don't need batteries
a. Virtualization and merging with the cloud
46. Telepresence systems seamlessly integrate _____ and _____. a. contextual awareness; content management b. content awareness; hardware c. sentiment analysis; contextual software d. Ethernet; WiFi
a. contextual awareness; content management
4. IT changes managers' job by _________ a. providing near real-time information so managers can make quicker decisions. b. making it easier to get all employees to work from one location. c. decreasing the volume of information they have to process. d. improving an employee's sense of connectedness.
a. providing near real-time information so managers can make quicker decisions.
26. A "Fishbone" process analysis diagram is also known as: a. A correlation graph b. A cause-and-effect diagram c. A cross-functional flowchart d. An organization chart e. A numerical analysis diagram
b. A cause-and-effect diagram
25. ______________ refers to determining who is responsible for actions that were taken. a. Acceptance b. Accountability c. Liability d. Responsibility
b. Accountability
36. Physical properties (shape, texture, color, etc.) of an object that allow someone to use an object correctly without the need for labels or instructions are known as: a. Constraints b. Affordances c. Distinctions d. Feedback e. Models
b. Affordances
1. A graphical description of a database that describes the way in which an organization's data and business activities are associated with one another is known as _______________: a. A Model of Efficiency b. An Entity Relationship Diagram c. An Enterprise Resource Design d. A Throughput Analysis e. An Artificial Database Scheme
b. An Entity Relationship Diagram
13. Disclosing personal information such as your race, religion, sex, disabilities, and age on social media undermines what type of protections otherwise provided to you as a citizen in the United States? a. Wage discrimination laws b. Anti-discrimination laws c. Voter eligibility laws d. Commercial driver's license eligbility laws e. Personal credit eligibility laws
b. Anti-discrimination laws
15. What short-range wireless technology is commonly to connect smartphones with hands-free headsets for telephone calls and listening to music? a. WiMax b. Bluetooth c. Wavelength d. Spectrum e. Photon
b. Bluetooth
49. What term is used to describe the behavior where small changes in customer demand that result in large variations in raw material orders causing inefficiency in the supply chain? a. Supply Chain Operations Reference (SCOR) Model b. Bullwhip effect c. Just-In-Time Orders d. Reverse Auctions e. Single-Minute Exchange of Dies (SMED)
b. Bullwhip effect
44. ERP ___________ systems also benefit businesses by generating forecasting analyses of product consumption based on critical variables such as geographical area, season, day of the week, and type of customer. a. AI b. CRM c. DSS d. SCM
b. CRM
53. What is the most critical component of managing website transformation? a. Organization b. Communication c. Innovation d. Dedication e. Inspiration
b. Communication
54. As discussed by our guest speaker, what type of software allows publishing, editing, and modifying content from a central interface, and managing project workflow in a collaborative environment? a. Social Media b. Content Management c. Wireframe Design d. Google Analytics
b. Content Management
22. An entrepreneur developing detailed documentation of their business processes so that they can be offered to other individuals as a franchise operation is an example of: a. Converting explicit knowledge into tacit knowledge b. Converting tacit knowledge into explicit knowledge c. Creating a community of practice d. A time-delayed response e. Dependent demand
b. Converting tacit knowledge into explicit knowledge
72. Selecting EPEAT-compliant technology with a high rating over traditional, less energy efficient technology is an example of focusing on what sustainability effect? a. Use of government regulation to eliminate wasteful products b. Creation, Use and Disposal of a product c. Substitution by using alternative methods d. Impacts of long term structural change e. Increased awareness through the use of metrics
b. Creation, Use and Disposal of a product
4. Maintaining multiple copies of the same data in multiple information systems that can be independently updated commonly results in what information management problem? a. Data isolation b. Data inconsistency c. Data devaluation d. Data compression e. Data validation
b. Data inconsistency
36. Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control? a. Bullwhip effect b. Defense in depth c. Just-In-Time d. Disintermediation e. Social Contract
b. Defense in depth
56. The Democratic National Committee used a software tool called the Voter Activation Network to classify voters considering whether a voter is likely to cast a vote and the party affiliation of the voter. The GOTV (get out the vote) was specifically targeted at what demographic? a. Democratic voters who always vote, and support Democratic candidates b. Democratic voters who sometimes vote, and support Democratic candidates c. Democratic voters who never vote, and support Democratic candidates d. Swing voters who sometimes vote, but may support Democratic candidates e. Republican voters who never vote, and support Republican candidates
b. Democratic voters who sometimes vote, and support Democratic candidates
7. In the decision support process, formulating a module to be evaluated and setting criteria for making a choice would occur during what phase of the decision making process? a. Choice Phase b. Design Phase c. Functional Phase d. Intelligence Phase e. Operational Phase
b. Design Phase
9. A business intelligence tool that uses abstractions such as color and graphical images like instrument gauges to allow executives to grasp business situations quickly is known as a: a. Planning Horizon b. Digital dashboard c. Expert system d. Neural network e. Geographic information system
b. Digital dashboard
3. With respect to a database, what term is used to describe an abstract representation of all of the information included in a data structure about a particular type of entity? a. Entity Attribute b. Entity Class c. Entity Key d. Entity Model e. Entity Table
b. Entity Class
59. What term describes the ability of a person to effectively evaluate and manage one's finances in order to make prudent decisions toward reaching life's goals? a. Personal Accounting b. Financial Literacy c. Household Finance d. Expense Management e. Risk Management
b. Financial Literacy
58. Allowing individuals to file tax returns, renew driver's licenses, and obtain various permits online is an example of what type of eGovernment? a. Government-to-business (G2B) b. Government-to-citizen (G2C) c. Government-to-employees (G2E) d. Government-to-government (G2G) e. Government-to-suppliers (G2S)
b. Government-to-citizen (G2C)
24. In recognizing ethical situations, which of the following is related to a chemical reaction that occurs in your body, specifically your intestinal track? a. Ethical drift b. Gut check c. Transparency test d. Gut punch e. Taste check
b. Gut check
33. Which of the following is a support activity in Porter's value chain model? a. Customer service b. Human resource management c. Logistics d. Operations
b. Human resource management
2. Which of the following is TRUE? a. IT can eliminate any job. b. IT impacts entire industries. c. IT opens up jobs for middle managers. d. IT only helps improve employees' health and safety.
b. IT impacts entire industries.
21. The terms "contextual," "relevant," and "actionable" are commonly related to what term? a. Information b. Knowledge c. Repository d. Alignment e. Relationship
b. Knowledge
64. Intellectual capital is also called __________. a. Data b. Knowledge c. Information d. Wisdom
b. Knowledge
18. In the Personal Branding video case, which of the following online platforms was idenfied as being primarily a business networking tool? a. Facebook b. LinkedIn c. Democratic voters who sometimes vote d. Wordpress e. Amazon.com
b. LinkedIn
52. ______________________ refers to the real-time connection between a mobile device and other computing environments. a. Location-based commerce b. Mobile computing c. Mobile commerce d. Telemetry
b. Mobile computing
46. What is NOT a factor contributing to the Bullwhip Effect? a. Shortage Gaming b. Outsourcing c. Price Promotions d. Batch Purchasing e. Forecasting/Trend Analysis
b. Outsourcing
17. According to the article "How your digital identity will be used" all of the following but one are unchangeable: a. Date of Birth b. Passport Number c. Heartbeat Signature d. Biometric Data e. DNA Analysis
b. Passport Number
53. Internet-enabled globalization does the following: a. Forces new suppliers to distribute products using traditional distribution networks b. Removes geography as a barrier to relationships c. Creates barriers that protect "olive tree" products d. Forces competitors to share sales information and product pricing e. All (A, B, C, and D) of the above
b. Removes geography as a barrier to relationships
39. In the Thoughtful Design video case, Don Norman explained cultural perceptions in design through the use of what common, everyday item? a. Opening and closing a door b. Salt and pepper shakers c. A shopping cart d. The signs on restroom doors e. Trash and cigarette waste containers
b. Salt and pepper shakers
23. What normative theory of ethics focuses on the belief that manager's actions should be guided by the understanding that they are entrusted with a responsibility to manage and protect the assets of the company for the benefit of all of those who are impacted by the actions and financial results of the firm? a. Stockholder b. Stakeholder c. Social Contract d. Organizational e. Loyalty
b. Stakeholder
10. What type of problem has an optimal solution can be reached through single set of steps based on an algorithm? a. Strategic b. Structured c. Management d. Collaborative e. Unstructured
b. Structured
61. Why did ABOR (Arizona Board of Regents) require the University allocate US$400,000 from tuition revenue each year to the Green Fund? a. This was the court settlement from a sustainability lawsuit files by the EPA b. Students used social media to protest when the proposed "Green Fee" was not presented to the Board c. The Federal EPEAT law required universities to spend money on sustainability d. The University has a structural budget surplus that must be spent each year
b. Students used social media to protest when the proposed "Green Fee" was not
18. Subjective knowledge that is based an individual's experiences is known as what? a. Refined knowledge b. Tacit knowledge c. Technical knowledge d. Explicit knowledge e. Procedural knowledge
b. Tacit knowledge
9. What is considered to be the center of the Internet structure? a. NAP b. Tier 1 ISP c. Tier 3 ISP d. LAN
b. Tier 1 ISP
40. What free service delivers emergency information to registered UA students, faculty and staff - as well as their friends and family - via their cell phones, mobile devices and/or email accounts during a campus emergency? a. Blackboard b. UAlert c. UAccess d. D2L e. Twitter
b. UAlert
13. The benefits of using RFID from what category (driver) include offering new services, new and enhanced product features, and improved customer relationship management (CRM)? a. Cost reduction b. Value Generation c. Increased Security d. Meeting legal requirements e. Increasing customer satisfaction
b. Value Generation
60. In the sustainability project to reduce waste at basketball and football games, a key factor in improving the diversion rate was: a. Offering discounting ticket prices for recyclers b. Working purchasing to use products that can be recycled c. Eliminating trash cans at the stadium and McKale arena d. Remodeling the stadium and McKale arena to be LEED buildings e. Changing to pre-packaged food products and bottled beverages
b. Working purchasing to use products that can be recycled
54. What is an example of a social trend in e-learning? a. If the Internet doesn't work, you can't go to class b. You're expected to be connected to others in the online space c. You can search Google for whatever you need d. Books are now digital instead of on paper
b. You're expected to be connected to others in the online space
27. TPSs are _______________ to the success of any enterprise because they ___________. a. critical; only contain data, which isn't sufficient to make strategic business decisions b. critical; support core operations c. meaningless; only contain data, which isn't sufficient to make strategic business decisions d. meaningless; support core operations
b. critical; support core operations
5. WebMD is a(n) _________ that allows doctors to ___________. a. ERP; diagnose diseases b. expert; diagnose diseases c. ERP; perform long-distance surgery d. expert; perform long-distance surgery
b. expert; diagnose diseases
68. In response to poor communication problems with application development, many companies are _________. a. forward outsourcing b. insourcing c. nearshore outsourcing d. offshore outsourcing
b. insourcing
63. Data warehouses and data marts are __________; this means users cannot change or update the data in data warehouses or data marts. a. integrated b. nonvolatile c. organized by business dimension or subject d. time variant
b. nonvolatile
52. When was the World Wide Web developed, and by whom? a. 1977 - Charles Babbage b. 1981 - Margret Thatcher c. 1989 - Tim Berners-Lee d. 1991 - Al Gore
c. 1989 - Tim Berners-Lee
9. As a possible password, how many variables would the password MIS111Exam (just the underlined string of characters) have when assessing its security strength? a. 1 b. 2 c. 3 d. 4 e. 5
c. 3
2. In a relational database, what term refers to the collection of items that are all related to a single unique value, where the single value often serves as the primary key? a. A field b. A form c. A record d. A list e. A deposit
c. A record
15. What type of data structure allows us to organize multi-dimensional information from a data warehouse so that it can be viewed using different data abstractions (or projections)? a. Neural network b. Click stream c. Data cube d. Executive dashboard e. Decision support system
c. Data cube
8. Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control? a. Bullwhip effect b. Just-In-Time c. Defense in depth d. Disintermediation e. Social Contract
c. Defense in depth
49. A Cost-Benefit Analysis is related mostly to what type of project management feasibility assessment? a. Technical b. Operational c. Economic d. Political e. Ethical
c. Economic
47. The term used to define the degree to which a goal is achieved is: a. Efficiency b. Productivity c. Effectiveness d. Enhancement e. Expectations
c. Effectiveness
56. What is the most siginificant threat to information security in the cloud for most companies? a. Packet Monitoring b. Remote Hackers c. Employee Behavior d. WiFi Monitoring
c. Employee Behavior
6. Often presented visually on an executive dashboard, what type of report focuses attention on business processes whose performance falls outside the range of their defined KPI metrics? a. Batch b. Drill-down c. Exception d. Ad hoc e. Annual
c. Exception
Which of the project management documents includes all three of the triple constraints? a. Spiderweb Diagram b. PERT Chart c. Gantt Chart d. Cross-functional Diagram e. Hierarchical Diagram
c. Gantt Chart
51. What term is used to describe the process of adding metadata to digital photos to identify the exact geographical location the photo was taken? a. Hashtagging b. Bookmarking c. Geotagging d. Data mining e. Phishing
c. Geotagging
5. What is NOT an advantage of digital transmission? a. Produces fewer errors b. Permits higher maximum transmission rates c. Harder to encrypt d. Simpler to integrate voice, video, and data
c. Harder to encrypt
27. The sequence of activities performed by users of GroupSystems' ThinkTank product directly parallel the steps in what other business process? a. Transaction processing system b. Operational CRM c. Knowledge management cycle d. Economic globalization e. Just-in-time Inventory Management
c. Knowledge management cycle
26. ______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. a. Accountability b. Due Process c. Liability d. Responsibility
c. Liability
38. Market capitalization is determined by multiplying the stock price by what? a. Profits earned from direct operations b. Dividends paid during the last fiscal year c. Number of common shares outstanding d. Book value of the company e. Year-end Earnings, minus taxes and interest
c. Number of common shares outstanding
35. Which of the following is NOT a characteristic of alignment? a. Organizations rotate business and IT professionals across departments and job functions b. Organizations create a vibrant and inclusive company culture c. Organizations view their IT department employees as supremely important d. Organizations provide overarching goals that are completely clear to each IT and business employee
c. Organizations view their IT department employees as supremely important
39. On the balance sheet, total assets minus total liabilities must equal what? a. Free Cash flow b. Dividends Paid c. Owner's Equity d. Stock price e. Market Value
c. Owner's Equity
60. With respect to an individual, what term describes the process of managing one's earnings, savings, and debt to meet the actual and budgeted expenses? a. Personal Accounting b. Financial Literacy c. Personal Finance d. Expense Management e. Risk Management
c. Personal Finance
15. What action did Stacy Snyder take that resulted in her losing her job? a. Hacking the AP Twitter feed and posting a fraudulent message b. Undertaking accounting fraud at her company c. Posting a photo of herself at a party on her personal social media account d. Infecting her company's network computer with a virus while using Facebook at work e. Being a whistle-blower and reporting the illegal actions of her employer
c. Posting a photo of herself at a party on her personal social media account
14. What is the term used to describe the process of reducing the number of dimensions of a multi-dimensional data cube (e.g., from three dimensions, perhaps season, location, and product, into two dimensions, such as season and location)? a. Simplification b. Variable c. Projection d. Context e. Function
c. Projection
23. Parking garage passes and access control on employee ID badges are examples of: a. Bluetooth b. LEO c. RFID d. 4G / cellular
c. RFID
10. Which of the following actions would be considered a biometric authentication? a. Requiring a user to enter a secret password b. Requiring a user to swipe a CatCard c. Requiring a user to scan their fingerprint d. Requiring a user to sign their signature e. Requiring a user to type a group of displayed letters
c. Requiring a user to scan their fingerprint
37. Which of the following actions would be considered a biometric authentication? a. Requiring a user to enter a secret password b. Requiring a user to swipe a CatCard c. Requiring a user to scan their fingerprint d. Requiring a user to sign their signature e. Requiring a user to type a group of displayed letters
c. Requiring a user to scan their fingerprint
35. What is an example of something in the Integrated Application layer of the 4 Layer Model? a. GPS b. Data center c. Smart transport d. Search engine
c. Smart transport
11. Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? a. Defense in Depth b. Industrial Sabotage c. Social Engineering d. Advanced Persistent Threats e. Open Source Hacking
c. Social Engineering
38. Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? a. Defense in Depth b. Industrial Sabotage c. Social Engineering d. Advanced Persistent Threats e. Open Source Hacking
c. Social Engineering
14. _____________________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords. a. Dumpster diving b. Shoulder surfing c. Social engineering d. Tailgating
c. Social engineering
45. SCM helps address which of Porter's Five Forces? a. Buyer power b. Rivalry c. Supplier power d. Threat of substitutes
c. Supplier power
13. When analyzing a set of click-stream data, what term is used describe the percentage of rows containing an item relative to the total number of rows? a. Projection b. Visualization c. Support d. Metadata e. Induction
c. Support
51. "According to Phil Darg, the largest category of online students that are primarily motivated by due dates and major assignments is known as: a. Ball Dropers b. Achievers c. Taskers d. Ghosts e. Active Learners
c. Taskers
45. How does telemedicine improve the delivery of medical care in rural communities? a. Telemedicine allows patients to make a preliminary self-diagnosis online b. Telemedicine prevents physicians from making errors during surgery c. Telemedicine reduces the need for patients to travel to physician's offices d. "Telemedicine Avatars" can perform routine procedures without the physician e. Telemedicine will allow a physician to meet with multiple patients at the same time
c. Telemedicine reduces the need for patients to travel to physician's offices
43. What collaboration tool was discussed in class that enhances the participants' contextual awareness by sharing non-verbal information during meetings? a. Teleportation b. Twitter c. Telepresence d. Crowdsourcing e. Six Sigma
c. Telepresence
47. Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project? a. Whether the major project milestones are being completed on budget b. Individual work assignments for persons assigned to the project c. The project milestones and the order they are scheduled to be completed d. Whether project tasks have been organized in the most efficient order e. The quality of the work performed during each major project milestone
c. The project milestones and the order they are scheduled to be completed
30. In a vertical cross-functional business process diagram, the order of items in one column (from top to bottom) shows what relationship among these items? a. Importance b. Cost c. Time d. Frequency e. Skill level
c. Time
2. If your laptop runs an application that needs to securely talk to a server, but isn't executed within a browser, such as Firefox or Safari, what other technique is commonly used? a. TLS b. SSL c. VPN d. A Leased Line e. PGP
c. VPN
22. The Eller "GoodCat" website that allows for anonymous reporting of unethical behavior in Eller classes uses what type of business model? a. Transparency model b. Ethical drift model c. Whistleblower model d. Loyalty model e. Engagement model
c. Whistleblower model
6. Signals used to send messages can be _______ or digital. a. rotary b. discrete c. analog d. binary
c. analog
6. Robots are useful ___________. a. as companions (e.g. cyberpooches) b. for driving cars (e.g. cyberchauffer) c. for handling monotonous tasks (e.g. factory work) d. only in science fiction (e.g. Terminator)
c. for handling monotonous tasks (e.g. factory work)
22. The three security challenges of wireless communication are confidentiality, accessibility, and _____. a. importance b. Internet c. integrity d. incorporation
c. integrity
28. A(n) _______________ ratio is the availability of cash to pay debt. a. activity b. debt c. liquidity d. probability
c. liquidity
19. The _________ prohibits an organization from collecting any personal information unless the customer specifically authorizes it. a. digital dossier policy b. information privacy policy c. opt-in model of informed consent d. opt-out model of informed consent
c. opt-in model of informed consent
69. Cloud computing _____________________, which means a customer can access needed computing resources automatically. a. encompasses the characteristics of grid computing b. encompasses the characteristics of utility computing c. provides on-demand self-service d. utilizes broad network access
c. provides on-demand self-service
40. The equity on a company's balance sheet is most closely related to which of the following? a. Market value b. Operating income c. Share price d. Book value e. Gross margin
d. Book value
36. As discussed in class, a key concern for a startup business is the "burn rate" for their initial capital. What financial report best describes a company's "burn rate" for investors? a. Balance sheet b. General ledger c. Income statement d. Cash flow statement e. Ticker symbol statement
d. Cash flow statement
58. A Hybrid Cloud: a. Is owned by the firm using it b. Is leased from another company c. It provided by government agencies d. Combines private and outsourced resources
d. Combines private and outsourced resources
18. Which of the following issues related to wireless communication would NOT be a problem for an RFID (Radio Frequency Identification) system? a. Interference b. Monitoring c. Attenuation d. Line-of-sight e. Multi-path
d. Line-of-sight
23. Which of the following knowledge management concepts includes an organizational culture focused on problem solving, a desire to share knowledge because of mutual interest, and norms that build trust, such as might be found in an MIS 111 FlexLab? a. Best practices community b. Knowledge management cycle c. Intellectual capital community d. Community of practice e. Click-stream analysis
d. Community of practice
41. What other approach used incentives to motivate people to share their influence and intellectual property? a. Globalization b. Internet Of Things c. Six-Sigma d. Crowdsourcing
d. Crowdsourcing
42. What is the process of solving problems and producing things by connecting people that you otherwise would not know using the internet? a. Data mining b. Knowledge management c. Group decision support systems d. Crowdsourcing e. Distance learning
d. Crowdsourcing
44. What technique has been used by companies such as Starbucks and Netflix used to engage large numbers of non-employees to innovate, manage, design and market new products? a. Executive dashboards b. Click-stream analysis c. Capacity planning d. Crowdsourcing e. Six Sigma
d. Crowdsourcing
5. In the Database Management case study discussed in class, how did marketing use information to improve the profitability of their sales? a. Sales data helped develop a product "recommender" system like Amazon's b. More accurate calculation of sales commissions c. Restocking levels were determined based on sales forecasts d. Customers were classified according into a status level and market segment e. Sales channels were selected for customers based on responses to promotions
d. Customers were classified according into a status level and market segment
12. Concerns over discrimination, data contamination, and intellectual property (ownership of information) were legal and ethical issues discussed in relation to what topic? a. Telemedicine b. Crowdsourcing c. Click-stream analysis d. Data mining e. Project management
d. Data mining
67. Reality mining is a type of _____________. a. Dashboard b. Database c. Data mining d. Data visualization technology
d. Data visualization technology
62. In the VAN (Voter Activation Network) case study, if you were supporting a Democratic candidate, which group of voters could be most efficiently reached using only a get-out-the-vote (GOTV) activity? a. Independent voters who always vote b. Independent voters who sometimes vote c. Democratic voters who always vote d. Democratic voters who sometimes vote e. Democratic voters who never vote
d. Democratic voters who sometimes vote
21. Originally discussed by Dr. Gilliland, David Myers' (former controller of MCI/Worldcom) statement "I still don't know that one point when I started to cross the line...", is an example of how small, incremental repeated compounding of unethical decisions can result in what? a. Gut check b. Transparency test c. Whistleblowing d. Ethical drift e. Defining moment
d. Ethical drift
66. Small companies typically use _______ for their BI. a. Dashboards b. Data mining c. Data visualization d. Excel
d. Excel
31. ERP systems are an evolution of _____________. a. AI b. CRM c. DSS d. FAIS
d. FAIS
40. From a user's perspective, perceived affordances would include actual perceptible design affordances and what other category of perceptual affordances? a. Correct rejection of design characteristics that are not affordances b. Hidden design affordances c. Design mitigation affordances d. False or fake design affordances e. Accessible affordances
d. False or fake design affordances
7. What type of guided media uses light for signaling? a. open wire b. twisted pair c. coaxial cable d. Fiber Optics
d. Fiber Optics
61. Planned, recurring expenses that occur on a routine schedule, such rent or car payments that must be paid every month, are examples of what? a. Flexible expenses b. Deductions c. Discretionary expenses d. Fixed expenses e. Cash flow
d. Fixed expenses
61. In the Online Democracy model, the "Voter Activation Network" uses voter registration rolls to categorize voters as always/sometimes/never voting by using information obtained from: a. Online media b. Commercially-generated databases c. Private sector polling d. Government records e. Partisan political organizations
d. Government records
29. What technology was developed to address problems such as a lack of focus, fear of speaking, hidden agendas and misunderstandings then collaborating with others? a. Data Mining b. Communities of practice c. Executive Dashboard d. Group Decision Support Systems e. Crowdsourcing
d. Group Decision Support Systems
57. Building on its initial success of the Voter Activation Network, the Democratic National Committee moved beyond simply classing voters by whether they are likely to cast a vote and their party affiliation to also include what additional aspect of Web2.0? a. Identifying voters who were likely to blog for a candidate or issue b. Using "mash-ups" to select efficient driving routes on election day for GOTV drivers c. Using a "long tail" strategy to every voter to building support through niche issues d. Influencing voters by having supporters use their social media relationships e. Creating issue-related folkonomies to inform voters of important issues
d. Influencing voters by having supporters use their social media relationships
20. As originally discussed by Dr. Gilliland, the classic values conflict with "Who Am I'" represents what type of ethical dilemma? a. Short-term vs. long-term b. Honesty vs. integrity c. Peer-pressure vs. boss-pressure d. Integrity vs. loyalty e. Organizational ethics
d. Integrity vs. loyalty
20. In addition to possessing contextual and relevant information, what other characteristic aspect does knowledge possess? a. It is an entity class b. It solves a structured problem c. It is always displayed visually d. It is actionable e. It is consistent
d. It is actionable
47. What is NOT a benefit of telemedicine? a. It improves access to healthcare b. It provides real-time care to isolated areas c. It reduces the need to move the patient d. It requires traveling so doctors can see their patients in person
d. It requires traveling so doctors can see their patients in person
59. The Gainesville Police Department P2C (Police-to-Citizen) website uses visualization tools that allow citizens to help themselves in what way? a. Contact police officers b. Make a police report c. Pay traffic fines d. Map crime incidents e. File a complaint
d. Map crime incidents
26. The success of a Group Decision Support System (GDSS) is based upon two key features: contributor anonymity (i.e., the identity of the person making the comment or suggestion is not known), and what other important feature? a. Analytical CRM b. Reintermiediation c. Disintermediation d. Parallel Discussions e. Six Sigma
d. Parallel Discussions
60. In the "Democracy Online" framework, what group should take responsibility for providing information about positions, candidates, and advocacy efforts, and work to involve supporters through online interactive spaces? a. Media and commercial content b. Government c. Private sector d. Political organizations e. Civic participation center
d. Political organizations
31. According to the Video Case on Decision Matrices, what factors should be used when making a decision? a. Only Quantitative factors b. Only Qualitative Factors c. Only Productivity Factors d. Quantitative and Qualitative Factors e. Qualitative, Quantitative, and Productivity Factors
d. Quantitative and Qualitative Factors
32. What IOT technology discussed in class could be used to identify shoppers and allow products to "introduce" (recommend) themselves to a shopper? a. Crowdsourcing b. Geotagging c. Product Metadata d. RFID Tags e. Folksonomies
d. RFID Tags
30. ____________________ reports are produced at scheduled intervals. a. Ad-hoc b. Exception c. Key indicator d. Routine
d. Routine
43. ERP ______________ systems have the capability to place automatic requests to buy products from suppliers in real time. a. AI b. CRM c. DSS d. SCM
d. SCM
55. Google Docs is an example of? a. IaaS b. GaaS c. PaaS d. SaaS e. WaaS
d. SaaS
48. In project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resources and what other dimension of the planning process? a. Alignment b. Feasibility c. Agility d. Scope e. Value
d. Scope
54. Which of the following is a problem with BYOD? a. Cost b. Productivity c. Satisfaction d. Security
d. Security
12. Your username (UANetID) is your claim of identify to a computer system. When the computer system verifies your identify by requiring you to enter a password is an example of what type of authentication? a. Something a user is b. Something a user has c. Something a user does d. Something a user knows e. Something a user inherits
d. Something a user knows
39. Your username (UANetID) is your claim of identify to a computer system. When the computer system verifies your identify by requiring you to enter a password is an example of what type of authentication? a. Something a user is b. Something a user has c. Something a user does d. Something a user knows e. Something a user inherits
d. Something a user knows
63. In the VAN (Voter Activation Network) Relationship-Based Political Organizing video case study, the VAN able to identify the relationships of possible supporters using data from what source? a. Voter registration records b. Direct mail campaigns c. Online surveys d. Supporter's Facebook contacts e. Tax returns of registered voters
d. Supporter's Facebook contacts
51. In the Software Development Lifecycle Process (SDLC), in what SDLC stage is it the most costly to make changes to the system requirements? a. Systems Design b. Systems Programming c. Systems Testing d. Systems Operation and Maintenance e. Systems Implementation
d. Systems Operation and Maintenance
42. Which of the following is NOT an interorganizational system? a. CRM b. ERP c. SCM d. TPS
d. TPS
37. Assume you need to put a sign that says "PUSH" on a door handle to explain the correct way to operate the door. The "PUSH" sign helps a user understand what aspect of usability? a. The sign explains a perceptible affordance b. The sign explains a correct rejection c. The sign explains a hidden affordance d. The sign explains a false affordance e. The sign explains a consistent affordance
d. The sign explains a false affordance
70. The __________________ test proposes a scenario in which a man and a computer both pretend to be women or men, and a human interviewer has to identify which is the real human. a. Google b. SkyNet c. Terminator d. Turing
d. Turing
50. What free service delivers emergency information to registered UA students, faculty and staff - as well as their friends and family - via their cell phones, mobile devices and/or email accounts during a campus emergency? a. Blackboard b. D2L c. UAccess d. UAlert e. Twitter
d. UAlert
34. Universal or accessible design should be viewed as a subset of what larger design issue? a. Affordances b. Constraints c. Metaphors d. Usability e. Distinctions
d. Usability
7. IT allows the workplace to expand to 24 hours a day at _______________, which is a benefit for ___________. a. a central location; only employees b. any location; only employers c. a central location; employers and employees d. any location; employers and employees
d. any location; employers and employees
29. GM's quality control issue is a(n) __________ function. a. accounting and finance b. human resources c. marketing d. production/operations management
d. production/operations management
16. Approximately what percentage of applications for jobs are rejected by potential employers before the interview due to public information posted online by the applicant (e.g. social networking, blogs, media sites, etc. - that is, your online reputation)? a. Less than 5% b. About 10% c. About 30% d. Less than 50% e. 60% or more
e. 60% or more
33. A feature of an object that limits possible (often incorrect) uses of a device is known as: a. False causality b. A visible metaphor c. A conceptual distinction d. An affordance e. A constraint
e. A constraint
35. Which of the following would motivate businesses to create accessible eCommerce websites for their customers? a. The website is likely easier for all users to navigate b. Usable designs are often better designs c. To capitalize on a larger base of potential customers d. To comply with ADA and Section 508 of the Rehabilitation Act e. All (A-D) of the above
e. All (A-D) of the above
57. Which of these is NOT an essential Cloud Computing characteristic? a. On-Demand Service b. Resource Pooling c. Elasticity (ability ch change or scale) d. Measured Service, (Pay for like a utility, what you need) e. Compliance (HIPPA, PCI)
e. Compliance (HIPPA, PCI)
28. The task of brainstorming in a group decision support system is similar to what step in the knowledge management cycle? a. Disseminate b. Publish c. Refine d. Store e. Create
e. Create
50. Which category of learner-instructor interaction focuses on course navigation and administrative requirements? a. Supporting learning b. Directing learning c. Providing performance feedback d. Promoting content understanding e. Creating structure
e. Creating structure
32. In the McGinn model of design, the least common category of design elements would be related to what factor in the McGinn model? a. Context b. Culture c. Human Sensory d. Group e. Individual
e. Individual
24. An unobstructed, straight line-of-sight path between a transmitter and receiver is required by which of the following high-speed, commercial wireless network technologies? a. Broadcast Radio b. 802.11 Wi-Fi c. Bluetooth d. 3G Cellular e. Microwave
e. Microwave