MIS 111 Final Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

LEED refers to the efficiency of? a. Buildings b. Cars c. Desktop Computers d. Data Centers e. Aircraft

Buildings

What tool is commonly used to track how, when and from what location users are using website? a. Project Management b. Content Management c. Wire Frame Design d. Google Analytics

Google Analytics

Each long vertical or horizontal element in a cross-functional flowchart we put processes and decisions into is called what? a. Swimlane b. Path c. Timeline d. Thread

Swimlane

Identifying patterns in data based on common temporal (time) or spatial (geographic) traits is based on what type of data mining analysis? a. Clustering b. Association c. Sequencing d. Forecasting e. Classification

Clustering

What is the named used to describe daily spending decisions like eating at a restaurant, buying clothes, drinking Starbucks, or playing a round of golf? a. Discretionary b. Fixed c. Variable d. Intermittent

Discretionary

What is the correct order of switching sites for packet "P5" in the following routing diagram? a. New York, Dallas, Los Angeles b. New York, Atlanta, Los Angeles c. New York, Los Angeles d. New York, Chicago, Los Angeles

New York, Dallas, Los Angeles

From Don Norman's perspective, what fatal flaw does the BMW iDrive (which he described as a well thought out, very logical, and sensible device) have with respect its human interface? a. The iDrive destroyed spatiality b. The iDrive did not have a hierarchical menu structure c. The iDrive used a confusing set of control knobs d. The iDrive only controlled the driving-related functions

The iDrive destroyed spatiality

The big advantage of bubble charts over scatter charts is? a. They add another dimension b. They are more colorful c. They allow negative values on the Y axis d. There is no advantage

They add another dimension

What term would be used to describe any danger to which is system may be exposed? a. Threat b. Audit c. Espionage d. Visibility e. Violation

Threat

in the College Money Management 101 Video Case - What was Lesson 1, the very first thing students should start doing? a. Track Expenses b. Pick the right bank c. Minimize Debt d. Get a part-time job e. Keep an emergency fund f. Avoid stupid moves

Track Expenses

The __________________ test proposes a scenario in which a man and a computer both pretend to be women or men, and a human interviewer has to identify which is the real human. a. Turing b. SkyNet c. Terminator d. Google

Turing

The Internet is a ______________. a. LAN b. MAN c. PAN d. WAN

WAN

Which of the following is *NOT* a behavioral issue for meetings? a. Wrong people b. Hidden Agendas c. Misunderstandings d. Domination

Wrong people

Many experts believe ________ is the solution to the challenge of making money from social networking sites and social commerce sites. a. advertising b. company buy-in c. crowdsourcing d. employee use

advertising

Satellites used for data communications that appear to be stationary from a fixed location on earth are placed in what type of orbit? a. Geosynchronous orbit b. Polar orbit c. Mid-earth orbit d. Elliptical orbit e. Commercial orbit

Geosynchronous orbit

Which of the following is an example of how individuals use technology in a way that that allow others easily to monitor and track their activities? a. Geotagging smartphone photos b. Hashtagging posts on Twitter c. Accessing a website d. Reading a blog post online e. Sending emails to friends

Geotagging smartphone photos

Related to the concepts of globalization, what computer "law" states that the bandwidth (speed) of data networks will double approximately every 24 months? a. Gilder's Law b. Moore's Law c. Metcalf's Law d. Ohm's Law e. Kepler's Law

Gilder's Law

What Leadership in Energy and Environmental Design (LEED) certification was the building where our classroom is located, Environment and Natural Resources 2, awarded by the U.S. Green Building Council? a. Certified b. Silver c. Gold d. Platinum

Platinum

The University of Arizona is nationally recognized for sustainability in its academics, research, operations, and administration by the Assocation for the Advancement of Sustainability in Higher Education. What Sustainability Tracking, Assessment & Rating System™ (STARS) rating was the University of Arizona awarded in 2017? a. Bronze b. Silver c. Gold d. Platinum

Gold

What term did Thomas Friedman's use to describe the impact of globalization where individual countries must sacrifice some degree of economic sovereignty to global institutions (such as capital markets and multinational corporations)? a. Golden Straightjacket b. Golden Arches Theory c. The Lexus and the Olive Tree d. The World Is Flat

Golden Straightjacket

In the Online Democracy model, the "Voter Activation Network" uses voter registration rolls to categorize voters as always/sometimes/never voting by using information obtained from: a. Online media b. Commercially-generated databases c. Private sector polling d. Government records e. Partisan political organizations

Government records

Allowing individuals to file tax returns, renew driver's licenses, and obtain various permits online is an example of what type of eGovernment? a. Government-to-business (G2B) b. Government-to-citizen (G2C) c. Government-to-employees (G2E) d. Government-to-government (G2G) e. Government-to-suppliers (G2S)

Government-to-citizen (G2C)

Pioneered at the University of Arizona, what decision support technology as developed to address problems such as a lack of focus, fear of speaking, hidden agendas and misunderstandings then collaborating with others? a. Data Mining b. Communities of practice c. Executive Dashboard d. Group Decision Support Systems e. Crowdsourcing

Group Decision Support Systems

In recognizing ethical situations, which of the following is related to a chemical reaction that occurs in your body, specifically your intestinal track? a. Ethical drift b. Gut check c. Transparency test d. Gut punch e. Taste check

Gut check

When adding your icon to your ABP-3B website, in what section should you add the link directive to your icon file? a. HEAD b. BODY c. HTML d. ALT

HEAD

What term is used to describe a physical interface between peripheral devices and the computer? a. Port b. Session c. App d. Signal

Port

What is the name of the University of Arizona's primary career management tool that offers UA students and alumni access to jobs, internships, and a range of other services? a. Handshake b. eSMS c. UAccess d. D2L

Handshake

What is NOT an advantage of digital transmission? a. Produces fewer errors b. Permits higher maximum transmission rates c. Harder to encrypt d. Simpler to integrate voice, video, and data

Harder to encrypt

What term is used to describe a function that uses an algorithm to convert an input of letters and numbers into an encrypted output of a fixed length? a. Hash b. Data miner c. Transaction d. Blockchain fork

Hash

Which of the following terms is used to measures the frequency of analog signals? a. Farads b. Hertz c. Ohms d. Angstroms

Hertz

What Regents Professor on the MIS Faculty at the University of Arizona developed the COPLINK system for managing knowledge used in law enforcement? a. Hsinchun Chen b. Joe Valacich c. Jay Nunamaker d. Sudha Ram

Hsinchun Chen

Which of the following is a support activity in Porter's value chain model? a. Human Resources b. Logistics c. Operations d. Marketing e. Service

Human Resources

What is the name of the collaborative effort to advance Blockchain technology by identifying and addressing important features for a cross-industry open standard for distributed ledgers that can transform the way business transactions are conducted globally? a. Hyperledger Project b. Bluemix c. Blockchain Garage d. Asset Exchange

Hyperledger Project

The ____________________ is a summary of information needs of the functional areas and of the organization as a whole. a. Application portfolio b. IT environment c. Mission d. Objective of the IT function

IT environment

In the assigned reading for project management, what type of diagram was used to map the impact of a problem using the axes "Impact" and "Likelihood" that you also used in Applied Business Project 2? a. I^2 Diagram b. Cross-functional Diagram c. Ishikawa Diagram d. Radar Diagram

I^2 Diagram

What action did Stacy Snyder take that resulted in her losing her job? a. Hacking the AP Twitter feed and posting a fraudulent message b. Undertaking accounting fraud at her company c. Posting a photo of herself at a party on her personal social media account d. Infecting her company's network computer with a virus while using Facebook at work e. Being a whistle-blower and reporting the illegal actions of her employer

Posting a photo of herself at a party on her personal social media account

Which phase of of PowerPoint Presentations do professionals spend the most time on? a. Practicing b. Designing c. Presenting d. Planning

Practicing

What type of image formatting would you want to use if you wanted words to be above and below the image and let the image be centered using the centering alignment a. Square b. Tight c. Top and Bottom d. In Line with Text

In Line with Text

The default layout of a new image in MS Word, which causes many people problems, is: a. In line with text b. Top and Bottom with Fixed Position on the Page c. Tight Wrapping d. Square Text Wrapping

In line with text

In the Building Your Brand Video Case, what was a critical part of of building your online professional presence a. Include keywords associated with the jobs you are seeking b. List all the skills you possess to any extent c. Highlight your communication skills through blog posts d. Use Instagram to highlight the keywords for skills you have for potential employers

Include keywords associated with the jobs you are seeking

Which of the following groups of voters would the DNC be most likely to contact with a persuasion campaign message? a. Independent voters who sometimes vote b. Democratic voters who sometimes vote c. Independent voters who always vote d. Republication voters who sometimes vote e. Democratic voters who always vote

Independent voters who always vote

In the McGinn model of design, the least common category of design elements would be related to what factor in the McGinn model? a. Context b. Culture c. Human Sensory d. Group e. Individual

Individual

When analyzing the performance of students in MIS 111 on Exam 1, which of the following would not be appropriate as a useful "dimension" in an OLAP data cube? a. Individual email addresses b. Class standing c. Academic major d. Class section

Individual email addresses

In Thomas Friedman's discussion of globalization, he described the process of globalization as being realized through actions that were first defined by your country, then later defined by multi-national companies, and finally, in the most recent age of globalization is defined by: a. Individuals b. International treaties c. Social media d. Financial markets e. Political parties

Individuals

What dimension of Porter's Forces focuses on the decision that a buyer makes when choosing among direct, existing competitors when all of the competitors offer the same identical name-brand product (e.g., an iPhone 6)? a. Industry Rivalry b. Threat of Substitution c. Threat of New Entrants d. Buyer power e. Supplier power

Industry Rivalry

[Linkages] When viewing the linkages among trading partners, which of the following is common for both upstream and downstream supply chains? a. Orders b. Payments c. Products d. Information

Information

___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information. a. Competitive intelligence b. Espionage c. Information extortion d. Intellectual property

Information extortion

What term best describes when consumers are able to use their smartphones to obtain information about a company's competitor's product pricing, features, customer reviews and availability while shopping in their company's brink-and mortar store? a. Information transparency b. Crucial distinctions c. Accessibility d. Interference e. Multi-path

Information transparency

If you want to insert am image with a caption, and have the caption automatically stay with the image whenever you move the image, your best option is: a. Set the image paragraph format to "Keep with Next" b. Insert both the image and the caption into a text box c. Copy the image and caption then paste together as a larger image d. It is impossible to keep a caption with an image, you just have to move it back into place after moving the image

Insert both the image and the caption into a text box

In the History of the Cell Phone video case, how did the use of cellular phones change the way in which calls were made? a. Instead of calling a place, calls to cellular telephones were associated with a person b. Calling a cellular telephone required the assistance of an operator c. A new system of telephone numbers were required to call cellular phones d. Cellular telephones could only call telephones within the local calling area e. Cellular telephones improved the sound quality that customers experiences

Instead of calling a place, calls to cellular telephones were associated with a person

As an employee of MCI/Worldcom, David Myers faced what classic ethical dilemma also described as a 'Who am I?'? a. Integrity versus Loyality b. Social Contract Theory c. Weak Learning Culture d. Procrastionation Culture e. Profit Maximizing Culture

Integrity versus Loyality

The classic values conflict with "Who Am I'" represents what type of ethical dilemma? a. Short-term vs. long-term b. Honesty vs. integrity c. Peer-pressure vs. boss-pressure d. Integrity vs. loyalty e. Organizational ethics

Integrity vs. loyalty

In the decision process, problem identification and classification occur during which phase? a. Intelligence b. Design c. Choice d. Implementation

Intelligence

Similiar to the expansion of telecommunications in the 1800's with the telegraph, what transportation infrastructure was discussed in class that guided the decision the placement of the long-haul fiber-optic cable infrastructure? a. Inter-continental Railroads Network b. Inter-regional Transmission Electrical Power Lines c. Federal Interstate Highway System d. Major Inland Rivers and Waterways

Inter-continental Railroads Network

Operating unregulated WiFi networks, clickers, Bluetooth headsets, cordless telephones, and microwave ovens using the same 2.4GHz ISM frequency range in close proximity to one another might result in what problem? a. Interference b. Attenuation c. Multi-path d. Line-of-sight e. Right-of-way

Interference

In the assigned reading on accessibility, the authors note that while WCAG 1.0 focused on the techniques for accomplishing accessibility, WCAG 2.0 focused on what? a. Principles of accessibilities b. Strategies to avoi lawsuits c. Economics of accessibility d. Designing tactile maps of website

Principles of accessibilities

______________ is the right to be left alone and to be free of unreasonable personal intrusions. a. A digital dossier b. Information privacy c. Privacy d. Profiling

Privacy

Which of the following is FALSE of social computing? a. It focuses on improving collaboration. b. It encourages user-generated content. c. It allows social information to remain anonymous. d. It combines social behavior and IT to create value.

It allows social information to remain anonymous.

Which of the following business component are *not* included in an MRP-II planning cycle? a. Raw Materials b. Workforce c. Plant and Equipment d. Product Margins

Product Margins

In addition to possessing contextual and relevant information, what other characteristic aspect does knowledge possess? a. It is an entity class b. It solves a structured problem c. It is always displayed visually d. It is actionable e. It is consistent

It is actionable

What is NOT a benefit of telemedicine? a. It improves access to healthcare b. It provides real-time care to isolated areas c. It reduces the need to move the patient d. It requires traveling so doctors can see their patients in person

It requires traveling so doctors can see their patients in person

What type of inventory management systems deliver the precise number of parts, called work-in-process inventory, to be assembled into a finished product at precisely the right time? a. JIT b. Poke-Yoke c. SCOR d. Vertical

JIT

What is the one key rule in designing a Presentation a. Keep is simple b. Use Color well c. Use high-quality graphics d. Use appropriate charts

Keep is simple

Business metrics that describe the performance of critical business activities are known as: a. Key performance indicators b. Residual risk assessments c. Business continuity plans d. Business intelligence analyses e. Decision trees

Key performance indicators

What term is used to describe the percentage value of the number of times a keyword or key phrase appears on a webpage as compared to the total amount of words on the page? a. Conversion rate b. Keyword density c. Page rank d. Website ROI

Keyword density

The terms "contextual," "relevant," and "actionable" are commonly related to what term? a. Information b. Knowledge c. Repository d. Alignment e. Relationship

Knowledge

What term is used to describe the conversion of tacit knowledge to explicit knowledge, so that the knowledge can be used in the organization by the staff? a. Knowledge Codification b. Knowledge Cycle c. Knowledge Representation d. Knowledge Interpretation

Knowledge Codification

What is the term used to describe the process of reducing the number of dimensions of a multi-dimensional data cube (e.g., from three dimensions, perhaps season, location, and product, into two dimensions, such as season and location)? a. Simplification b. Variable c. Projection d. Context e. Function

Projection

If we are trying to select the projects to do first, what projects should we select? a. Projects that easy to do and also have a high value proposition b. Projects that will require significant effort, but are easily planned c. Projects that correct major errors in the software d. Projects that design new features requested by our customers

Projects that easy to do and also have a high value proposition

What term is used to describe the original consensus algorithm in a Blockchain network that is used to confirm transactions and produce new blocks to the chain? a. Proof-of-Work b. Immutability c. Provenance d. Cryptography

Proof-of-Work

In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does "http://" define? a. Protocol b. Browser c. Domain d. Resource e. Server

Protocol

What term is used to describe the chronology of the ownership, custody or location of a historical object? a. Provenance b. Consensus c. Immutability d. Replication

Provenance

The old accounting maxim of "promise low" and "deliver high" is related what costing and budget concept? a. Prudence b. Accruals c. Consistency d. Variance

Prudence

COPLINK, developed at the University of Arizona in the MIS Department's Artificial Intelligence Lab, allows law enforcement officers to integrate database information to identify crime suspects based on limited information (e.g., a license plate number or nick name). What term is used to describe the type of information system that is commonly used to maintain collection of experiential, reflective and solutions-oriented information? a. Knowledge management b. Group decision support sytems c. Crowdsourcing d. Telepresence e. Spiderweb Mapping

Knowledge management

The sequence of activities performed by users of GroupSystems' ThinkTank product directly parallel the steps in what other business process? a. Transaction processing system b. Operational CRM c. Knowledge management cycle d. Economic globalization e. Just-in-time Inventory Management

Knowledge management cycle

Thought Question: If you are forming a startup company, and you hope it will grow to be the next Amazon, but there is a great deal of uncertainty about both growth rate and future needs for your financial systems, which option for acquiring your Financial IT applications makes the most sense? a. Develop In-House b. Lease c. Buy

Lease

Which of the following terms are related to production based on the mass customization initiated by a customer's order? a. Pull model b. Push model c. Make-to-stock model d. Forecast model

Pull model

Making the Adobe Creative Cloud is now available to UofA students. What approach for software acquisition did the UoA used to allow students to have access to this software? a. Buy (Ownership of Intellectual Property) b. Lease (Right to Use Product) c. In-House Development (Writing Software) d. Open Source (Non-proprietary software) e. Government Seizure (Right of Eminent Domain)

Lease (Right to Use Product)

What type of decision based on explicit knowledge and involves analysis using an algorithm and measured data? a. Quantitative b. Qualitative c. Managerial d. Operational e. Collaborative

Quantitative

How does adding social networking to the VAN allows candidates to improve the effectiveness of their volunteers? a. Leverages personal relationships b. Sending campaign tweets automatically c. Automatically registers new voters d. Eliminates the need for blockwalking

Leverages personal relationships

In the Relationship-based Organizing Video Case, what was being done to improve the effectiveness of campaign volunteers? a. Tracking any online posts about candidates to allow immediate, effective responses by volunteers b. Leveraging personal relationships of campaign volunteers with voters to allow personal networking c. Eliminating the need for block-walking and phone calls by campaign volunteers through online engagement d. Enhancing the call efficiency of volunteers by enabling personalized phone conversations

Leveraging personal relationships of campaign volunteers with voters to allow personal networking

On your personal financial balance sheet, your student loans would be classified in what category? a. Liability b. Assets c. Net Worth d. Prepaid Expense e. Expenditures

Liability

The risk of a project can be measured on what two scales? a. Likelihood and Impact b. Budget and Management c. Change and Control d. Vision and Goals

Likelihood and Impact

Which of the following issues related to wireless communication would NOT be a problem for an RFID (Radio Frequency Identification) system? a. Line-of-sight b. Monitoring c. Attenuation d. Interference e. Multi-path

Line-of-sight

In the Personal Branding video case, which of the following online platforms was idenfied as being primarily a business networking tool? a. Facebook b. LinkedIn c. Democratic voters who sometimes vote d. Wordpress e. Amazon.com

LinkedIn

In general, what you think of as the quality of your network connection speed when you are using your PC, iPad, or Smartphone is most influenced by which of the following? a. Local Tier-3 ISPs b. Backbone Tier-1 ISPs c. Regional Tier-2 ISPs d. Location of the content provider's servers e. Protocols used for Layer-1 transmission

Local Tier-3 ISPs

Which of Thomas Freidman's "flattners" related to technologies related to how content can be digitized and therefore shaped, manipulated, and transmitted; how processes can be done at high speed with total ease; and how mobile can be done anywhere and anytime by anyone; and can be done by anyone? a. "The Steriods" b. Supply-chaining c. Informing d. Uploading

"The Steriods"

If you go to your web page and it says "Forbidden - You don't have permission to access /~<yourNetId>/ on this server", you most likely, you will need to change the permissions on your public_html directory or index.html file to which of the following? a. "rwxr--r--" b. "rw-rw-rw-" c. "rwxr-xr-x" d. "-wx-wx-wx"

"rwxr-xr-x"

The symbol we use in MS Excel for Absolute Addressing is what? a. $ (US Dollar Sign) b. = (Equal Sign) c. & (Amphersand) d. ! (Exclamation Point)

$ (US Dollar Sign)

What is the name for the exchange points for Internet traffic used by major ISPs? a. NAP b. MAC c. TCP d. ISDN

NAP

Which of the following is the technology that enables most mobile wallet applications? a. AFC b. ERP c. NFC d. VRP

NFC

The NotPetya Cyberattack caused how much in damage around the world? (in $) a. 10 Billion b. 10 Million c. 100 Million d. 100 Billion

10 Billion

What is the correct "port" to use for your secure shell connection when transferring files to the U.Arizona.edu web server? a. 20 b. 22 c. 25 d. 80

22

Taxes, FICA and other Payroll Deductions can easily be what percentage of a person's paycheck? a. 15% b. 25% c. 35% d. 45%

35%

According Cornell University's Computer Energy Usage Facts, how much energy can you save by replacing traditional CRT monitors with equivalently-sized LCD monitors? a. 20% b. 30% c. 40% d. 50%

40%

Due to the curvature of the earth, microwave towers generally cannot be spaced more than about how many kilometers (not miles) apart? a. 18 b. 30 c. 48 d. 77

48

Assume you are 22 years old when you graduate from the University of Arizona and have a credit card with a $2,000 credit balance with an 18% annual rate. If you only make minimum payments of 2% of the balance or just $10 (whichever is greater) each month, what birthday will you likely be be celebrating when the the credit card is paid off? a. 52 b. 37 c. 27 d. 32

52

Approximately what percentage of applications for jobs are rejected by potential employers before the interview due to public information posted online by the applicant (e.g. social networking, blogs, media sites, etc. - that is, your online reputation)? a. Less than 5% b. About 10% c. About 30% d. Less than 50% e. 60% or more

60% or more

When deployed, the Irridium satellite telephone network was based on a constellation of 66 satellites. However, how many operational satellites were originally proposed for the original constellation? (Hint the name Irridum was selected due to this number.) a. 18 b. 30 c. 48 d. 77

77

What is the name of the wireless technology that is designed to be embedded in mobile devices such as cell phones and credit cards allowing you to pay for items by waving your card within a few centimeters of a point-of-sale terminal? a. Near-field Communication b. Personal Area Networks c. Bluetooth d. MiFi

Near-field Communication

What is the recommended solution covered in a tech tip for keeping track of many secure passwords that could be hard to remember? a. A Password Manager App on a Cell phone with a Lock Screen b. A locking notebook with passwords kept in your bag c. a wallet card d. a secure encrypted usb stick like IronKey

A Password Manager App on a Cell phone with a Lock Screen

What does the "%20" represent in an src directive? a. A Space Character b. A repetition count (i.e., repeat the next character 20 times) c. A wildcard that matches any lowercase character d. An underscore character

A Space Character

A "Fishbone" process analysis diagram is also known as: a. A cause-and-effect diagram b. A correlation graph c. A cross-functional flowchart d. An organization chart e. A numerical analysis diagram

A cause-and-effect diagram

A feature of an object that limits possible (often incorrect) uses of a device is known as: a. False causality b. A visible metaphor c. A conceptual distinction d. An affordance e. A constraint

A constraint

In the Information-based Problem Solving Video Case, what was the map that the interviewee (Beth Bluer) was trying to create? a. A map overlying foster homes and registered sex offenders b. A map overlying violent crime and police patrol routes c. A map overlying street lighting and sexual assults d. A map overlying schools, registered sex offenders, and sexual assults e. A map overlying police precincts and violent crime incidents

A map overlying foster homes and registered sex offenders

Thought Question: Walmart's strategic focus is on Everyday low prices and maximum efficiency. You are a Walmart Manager and have been presented with 4 alternative IT ideas, which one should almost automatically float to the top? a. A new system for routing distribution that will save 10% of the total distribution costs b. A new system for customer service that will let customer's checkout 5% faster c. A new system for returns that will automatically track sales so customers can return items without a receipt d. A new system for employee scheduling so employees will have more comfortable and flexible work hours while still providing the stores optimal coverage

A new system for routing distribution that will save 10% of the total distribution costs

In a relational database, what term refers to the collection of items that are all related to a single unique value, where the single value often serves as the primary key? a. A field b. A form c. A record d. A list e. A deposit

A record

What is an Exploit? a. A deliberate act that exploits a vulnerability b. A technique used to compromise a system c. An identified weakness d. A necessary Control

A technique used to compromise a system

What term is used to describe the marketing analysis where two versions of a web page are compared to see which one gives a better conversion rate for similar visitors at the same time? a. A-B (or Split) Testing b. SEO Testing c. SEM Testing d. PPC Marketing

A-B (or Split) Testing

You have a MAC running OSX, which of these is NOT true? a. A.You will be fine just using your computer for assignments and exams b. A.You might find it easier if you can run a MS Windows virtual machine (VM) c. A.You may not be able to run a MS Windows VM d. A.You must have a MS Windows VM for Assignments and Exams

A.You must have a MS Windows VM for Assignments and Exams

In the video case about Dr. Chiu's Smartrek application, which of the following was not an incentive used to encourage driver participation? a. Ability to find other people for carpooling b. Possibility of avoiding traffic congestion c. Ability to earn points for charity d. Ability to help the community e. Ability to earn prizes and gift

Ability to find other people for carpooling

According to the "IOT Changes Everything" video case, one of the challenges limiting the widespread deployment of IOT is the transitioning to IPv6. What is the value of using IPv6 to IOT? a. Ability to uniquely address billions of IOT devices b. Extended communication range for wireless communication c. Lower power consumption for data communication d. Defining a standard control protocol for all IOT devices

Ability to uniquely address billions of IOT devices

According to MIT Sloan Management Review, what percentage of companies have placed sustainability permanently on their management agendas? a. About 10% b. About 25% c. About 50% d. About 70%

About 70%

The following "img" directive uses what type of addressing? <img src="file://C:/Users/Patton/Pictures/NistFigure2.PNG " width="2612" height="1746" alt="Security"/> a. Absolute b. Relative c. Named d. File

Absolute

What accounting metric a strong indicator of whether a firm has sufficient short-term assets to cover its immediate liabilities? a. Acid Test b. Current ratio c. Earning per common share d. Price to earning ratio

Acid Test

The advantage of ________________ is they can be read over greater distances. a. Active RFID tags b. Passive RFID tags c. QR codes d. WSNs

Active RFID tags

All of the symbols representing tasks and decisions that are shown in single column of a vertical cross-functional diagram are related to the same what? a. Actor b. Root Cause c. Decision Model d. Organization e. Entity

Actor

One of the origins of the Internet was the result of a project by US government agency? a. Advanced Research Project Agency b. National Science Foundation c. National Security Agency d. National Aeronautics and Space Administration

Advanced Research Project Agency

What term is used to describe an online advertising service developed by Google, where advertisers pay to display advertising, product listings, and video content as a result of Google search. a. Adwords b. Pagerank c. Organic d. Hashtags e. Responsive

Adwords

Physical properties (shape, texture, color, etc.) of an object that allow someone to use an object correctly without the need for labels or instructions are known as: a. Constraints b. Affordances c. Distinctions d. Feedback e. Models

Affordances

In the IT Strategic Planning Video Case, it discussed showing the _______ between all the IT projects and the overall business strategy? We also discussed this specific topic in class and explained it's meaning and why it mattered. a. Alignment b. Synergy c. Implementation order d. Harmony e. Unity

Alignment

All of the following are Information System Professional Specialties Except? a. Project management b. Business analyst c. Network management d. Database administrator e. Website designer f. Security analyst g. All of the following are Information System

All of the following are Information System

Which of the following would motivate businesses to create accessible eCommerce websites for their customers? a. To comply with ADA and Section 508 of the Rehabilitation Act b. To capitalize on a larger base of potential customers c. The website is likely easier for all users to navigate d. Only the first two of the above reasons e. All of the three reasons shown above

All of the three reasons shown above

What is the name of a highly popular crowdsourcing Internet marketplace enabling individuals and businesses (known as Requesters) to coordinate the use of human intelligence to perform tasks that computers are currently unable to do? a. Amazon Mechanical Turk b. Azure Web Services c. Google Answers d. Bing Collaborative Interpreter

Amazon Mechanical Turk

What is the term used to describe a graphical description of a database that describes the way in which an organization's data and business activities are associated with one another? a. A Model of Efficiency b. An Entity Relationship Diagram c. An Enterprise Resource Design d. A Throughput Analysis e. An Artificial Database Scheme

An Entity Relationship Diagram

In the Martha Stewart case, which of the following issues resulting in Martha Stewart being convicted of criminal charges that resulted in prison time? a. Lying to the FBI b. Defaulting on a loan c. Selling stocks below book value d. Insider trading e. Falsely advertising her products

Lying to the FBI

Parking garage passes and access control on employee ID badges are examples of: a. Bluetooth b. LEO c. RFID d. 4G / cellular

RFID

What technology has been used for such diverse applications as healthcare, tracking lost pets, and toll collecting on highways? *a. RFID b. SCOR c. MRP-II d. Infrared e. CFAR

RFID

What IoT technology discussed in class could be used to identify shoppers and allow products to "introduce" (recommend) themselves to a shopper? a. RFID Tags b. Geotagging c. Product Metadata d. Crowdsourcing e. Folksonomies

RFID Tags

CODASYL, the Conference/Committee on Data Systems Languages, is remembered almost entirely for two activities: its work on the development of the COBOL language and its activities in standardizing database interfaces. We've learned about the pioneers of databases (Chen and Codd) today, who is credited for developing FLOW-MATIC, which evovled into the COBOL, the widely used business programming language? a. Rear Admiral Grace Murray Hopper b. Ada Lovelace c. Dennis Richie d. Niklaus Wirth e. Charles Babbage

Rear Admiral Grace Murray Hopper

Industry analytsts expect that 5th generation networks will be defined by three characterisitcs over 4th generation cellular networks. Which of the following would is not one of the expected changes? a. Reduced signal attenuation b. Improved transmission rates c. Low latency d. Reduced power consumption

Reduced signal attenuation

In a decision matrix, a "weighting" allows what additional information to be included in the analysis? a. Relative importance b. Cost of capital c. Order of analysis d. Number of employees on the project team

Relative importance

Tracking what products are delivered to users, and when, is a form of what? a. Release Control b. Acceptance Control c. Maintenance Control d. Scheduling Control

Release Control

Internet-enabled globalization does the following: a. Forces new suppliers to distribute products using traditional distribution networks b. Removes geography as a barrier to relationships c. Creates barriers that protect "olive tree" products d. Forces competitors to share sales information and product pricing

Removes geography as a barrier to relationships

What is the name of the device that of the physical device that interfaces computers with a local area network (LAN)? a. Network Interface Card (NIC) b. Transmission Control Protocol (TCP) c. Internet Service Provider (ISP) d. Peer-to-peer Processing (P2P)

Network Interface Card (NIC)

Which rule of thumb must you follow? a. The 10 20 30 rule b. The 6 x 6 rule c. the 7 x 7 rule d. the No more than 20 slides rule e. the 2-3 minutes per slide rule f. None of the rules of thumb are absolute musts

None of the rules of thumb are absolute musts

Market capitalization is determined by multiplying the stock price by what? a. Profits earned from direct operations b. Dividends paid during the last fiscal year c. Number of common shares outstanding d. Book value of the company e. Year-end Earnings, minus taxes and interest

Number of common shares outstanding

Explicit, or "leaky" knowledge, is based on information that is: a. Objective and rational b. Subjective and cognitive c. Informally communicated with an organization d. Dependent on an employee's experience e. Customized by each user

Objective and rational

Each long vertical or horizontal element in a cross-functional flowchart we put processes and decisions into represents what? a. One actor b. One decision c. One business process d. One connection

One actor

Where can I host my ABP-3A and ABP-3B websites? a. Only on the U.Arizona.edu web server b. On any internet web server (e.g., iCloud or GoDaddy) c. On the submission link for the assignment on D2L d. On Arizona.box.com, which also is a backup for your website

Only on the U.Arizona.edu web server

What name is used to describe results found when a search engine algorithm analyzes all the pages across the web in an unbiased way and reports the pages considered to contain the most relevant information for your search terms? a. Adword b. Organic c. Promoted d. Sponsored

Organic

Which of the following actions would be considered a biometric authentication? a. Requiring a user to scan their fingerprint b. Requiring a user to enter a secret password c. Requiring a user to swipe a CatCard d. Requiring a user to sign their signature e. Requiring a user to type a group of displayed letters

Requiring a user to scan their fingerprint

What term was used to describe a website that can adapt to the type of device being used to access the website? a. Responsive b. Augmented c. Optimized d. Transformed e. Validated

Responsive

In the COPLINK video case, law enforcement in what city used the COPLINK system developed to manage knowledge more efficiently and effectively? a. Mesa, Arizona b. Chicago, Illinois c. Las Vegas, Nevaa d. Tucson, Arizona

Mesa, Arizona

Related to the concepts of globalization, what computer "law" states that value of the internet is related to the number of connections (users)? a. Metcalf's Law b. Gilder's Law c. Moore's Law d. Ohm's Law e. Kepler's Law

Metcalf's Law

Google Analytics tracks the browser used to access a website. What term was used to describe a website that manages content based on the browser or device accessing the content? a. Responsive Web Design b. Content Management System c. Ephemeral Content Design d. Website Transformation Process

Responsive Web Design

What type of website could adapt to the multiple devices (PC, mobile, and tablet) that a user incorporates in their daily shopping habits? a. Responsive web design b. Universal access design c. Open source design d. Transformational web design

Responsive web design

The Associated Students of the University of Arizona is a representative organization led by University of Arizona students that serves, engages and empowers the student body through advocacy and the provision of programs and resources. What is the name of the Eller student currently serving as our ASUA Senator? a. Michelle Mendoza b. Olivia Johnson c. Ashin Katwala d. Brennen Feder

Michelle Mendoza

An unobstructed, straight line-of-sight path between a transmitter and receiver is required by which of the following high-speed, commercial wireless network technologies? a. Microwave b. 802.11 Wi-Fi c. Bluetooth d. 3G Cellular e. Broadcast Radio

Microwave

____________ means that users carry a device with them and can initiate a real-time contact with other systems from wherever they happen to be. a. Broad reach b. Instant connectivity c. Mobility d. Ubiquity

Mobility

Related to the concepts of globalization, what computer "law" states that the density of transistors will double approximately every 18 months? a. Ohm's Law b. Metcalf's Law c. Gilder's Law d. Moore's Law e. Kepler's Law

Moore's Law

If you have one wireless access point, for best coverage you should do what? a. Mount it on your roof b. Mount it next to the front windows c. Mount it in the center of the house d. Mount it on a metal plate

Mount it in the center of the house

What is the importance of the triple constraint? a. You must funnel all resources into only one of the constraints b. Any changes to one constraint will likely affect the project outcome c. Security is the most important constraint d. Time, resources, and scope don't matter

Any changes to one constraint will likely affect the project outcome

The Internet of Things can be described as three "any"-type connections. What are these three "any" connections? a. Any time, any place, any thing b. Any price, any person, any network c. Any time, any place, any network d. Any place, any person, any industry

Any time, any place, any thing

Anything that is capable of being owned or controlled to produce value would be considered as what? a. Asset b. Ledger c. Contract d. Blockchain

Asset

[GoldmanSachs] What term was coined by Goldman Sachs in 2001 to describe the fastest growing market economies? a. EAGLES b. TIMP c. BRIC d. TICK

BRIC

Which of the following is NOT a value-adding attribute of mobile computing? a. Bandwidth improvement b. Instant connectivity c. Localization d. Ubiquity

Bandwidth improvement

Critical Thinking Question: Thinking of Porter's five forces, if you are one of the mobile telephone companies upgrading to a 5G network, and the largest supplier of 5G telecom equipment in the world can no longer be purchased from for political reasons, which of the five forces will it impact from your perspective? a. Potential Threat of New Entrants b. Threat of Substitute Products c. Bargaining Power of Suppliers d. Bargaining Power of Buyers e. Industry Competitors

Bargaining Power of Suppliers

In the video case study of Porter's Forces, Michael Porter commented that the airport's control of gates represented which of the five forces? a. Bargaining Power of Suppliers b. Potential Threat of New Entrants c. Threat of Substitute Products d. Bargaining Power of Buyers e. Industry Rivalries

Bargaining Power of Suppliers

One key differentiator of Zara from competitors is it owns it's supply chain, unlike retailers such as H&M or Uniqlo, and it also owns 50% of it's manufacturing. This approach means Zara is not only more nimble, but in general doesn't have to contend with which of Porter's four external (out side the industry) forces in the same way the other retailers do?. a. Bargaining Power of Suppliers b. Bargaining Power of Buyers c. Threat of Substitute Products d. Threat of new entrants

Bargaining Power of Suppliers

With respect to Porter's Forces, which of the five factors would have be the LEAST (weakest) impact on Starbuck's business model? a. Bargaining power of suppliers b. Bargaining power of buyers (its customers) c. Threat of substitutes d. Threat of new entrants e. Competitive rivalry

Bargaining power of suppliers

So, what is MIS? In the description of Scope Creep and unintended consequences, we discussed technology leading to unintended consequences... What sport was the example of where technology was leading to judgements about the performance of referees/umpires/ or coaches? a. Baseball and the Strike Box b. Football and the Instant Replay c. Hockey and scoring goals d. Basketball and the three-point-line

Baseball and the Strike Box

What is the Elevator Test? a. Being able to present the main point in 30 seconds b. Being more engaging then people standing in elevators c. Ensuring you speak clearly enough to be heard over noisy elevators d. Being engaging enough to keep someone engaged on an elevator

Being able to present the main point in 30 seconds

What term is used to describe the most successful solutions or problem-solving methods for achieving a business objective? a. Best practices b. Decision support c. Agility d. Bottom line

Best practices

What implementation approach mixes and matches core ERP modules as well as other extended ERP modules from different software providers to best fit their unique internal processes and value chains? a. Best-of-breed approach b. Vanilla approach c. Custom approach d. Software-as-a-service approach

Best-of-breed approach

What low-power, non-directional wireless technology is used to create small personal area networks for cell phones and portable music players? a. Bluetooth b. Cellular radio c. Radio Frequency Identification d. Near-field Communication

Bluetooth

What short-range wireless technology is commonly to connect smartphones with hands-free headsets for telephone calls and listening to music? a. Bluetooth b. WiMax c. Wavelength d. Spectrum e. Photon

Bluetooth

Harald Blaatand, who was the King of Demark from 940-981, is associated with what wireless technology? a. Bluetooth Technology b. Computer Wifi c. Cellular Telephone Networks d. Microwave Transmitters e. Satellite Transmitters

Bluetooth Technology

What type of chart essentially adds a third dimension, such as frequency or quantity, to scatter plots? a. Bubble Charts b. Stacked Area Charts c. Donut Charts d. Treemap Charts

Bubble Charts

What term is used to describe the behavior where small changes in customer demand that result in large variations in raw material orders causing inefficiency in the supply chain? a. Supply Chain Operations Reference (SCOR) Model b. Bullwhip effect c. Just-In-Time Orders d. Reverse Auctions e. Single-Minute Exchange of Dies (SMED)

Bullwhip effect

In the Zara case, the company has aligned its information system strategy with what? a. Business strategy b. Product margins c. Decentralized intelligence d. Competitive position e. Efficiency model

Business strategy

What is the name of the system used by Raytheon that allows technical blueprints to come to life so engineers engineers and customers can make quick changes to technical specifications and adjust equipment according to their needs using the "the common language of visualization." a. CAVE b. Glip c. Slack d. Jive

CAVE

________________ allows you to access the internet through a coaxial media previously used only for TV connections. a. Cable modem b. Dial-up modem c. ADSL Modem d. SONET Modem

Cable modem

Which of the following states has a Social Media Privacy law specifically related to prohibiting employers from requesting passwords to personal Internet accounts to get or keep a job, or prohibiting colleges and universities from requiring access to students' social media accounts? a. California b. Arizona c. Pennsylvania d. New York

California

What are the equivalent concepts in Excel to the following database terms: Field, Record, and a Table, respectively? a. Cell, Row, Worksheet b. Reference, Slice, Workbook c. Formula, Worksheet, Workbook d. Cell, Range, Worksheet

Cell, Row, Worksheet

[Disintermediation] What term is describes the conflict when manufacturers (brands) disintermediate their channel partners, such as distributors, retailers, dealers, and sales representatives, by selling their products directly to consumers through general marketing methods and/or over the Internet. a. Globalization b. Channel Conflict c. Porter's Forces d. Balance of Trade

Channel Conflict

What Nuclear Remediation Site had their computers wiped clean by NotPetya? a. Fukushima b. 3 Mile Island c. Chernobyl d. Tokaimura e. Goiânia

Chernobyl

Which of the following types of analysis would be used to produce the Clery report, which is a public annual security report (ASR) that includes statistics of campus crime for the preceding 3 calendar years identifying the crimes committed in physical (geographic) proximity to a college campus as an effort to improve campus safety? a. Cluster b. Forecasting c. Classification d. Sequencing

Cluster

The "nearest neighbor" Intelligent System Strategy is similar to what DM method? a. Clustering b. Classification c. Association d. Sequencing

Clustering

What term refers to the process where two or more entities (individuals, teams, groups, or organizations) who work together to accomplish certain tasks, such as a work group or virtual team? a. Collaboration b. Cross-function Teams c. Group Systems d. Communities of Practice

Collaboration

What approach to knowledge management would best describe the Eller FlexLabs? a. Best Practices b. Community of Practice c. Knowledge conversion d. Knowledge FAQ

Community of Practice

Which of the following knowledge management concepts includes an organizational culture focused on problem solving, a desire to share knowledge because of mutual interest, and norms that build trust, such as might be found in an MIS 111 FlexLab? a. Best practices community b. Knowledge management cycle c. Intellectual capital community d. Community of practice e. Click-stream analysis

Community of practice

Which of the following decisions would *not* be a quantitative decision? a. Comparing project objectives with corporate objectives b. Return on Investment Analysis c. Price-to-Earnings Stock Analysis d. Approving a person's loan based on total debt and their age

Comparing project objectives with corporate objectives

Porter's Forces describes which of the following business issues? a. Profitability b. Competition c. Security d. Product Design

Competition

The "Porter's Forces" model deals with what aspect of globalized business? a. Competition b. Design c. Location d. Relationships e. Time

Competition

In the Accenture video case, the presenter emphasizes that project management is not about lists and linear relationships, but rather about managing what? a. Complex inter-relationships b. Crisis managment c. Client requirements d. Project costs

Complex inter-relationships

What term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding? a. Conceptual model b. Semiotic Engineering c. Design Intention d. Emotional design

Conceptual model

What MS Excel function could be used to implement Intelligent System Rule Induction? a. IF Statements b. Conditional Formatting c. Pivot Table Slicers d. Table Filters

Conditional Formatting

When we discussed the design of network infrastructure, we noted that the design of connectors on computers we generally related to the speed of the communication interface, the function being supported (number of signals required), and what other issue related to human-computer interaction? a. Constraints to improve reliability b. Hidden affordances for security c. Cultural design standards d. Operational and functional causality

Constraints to improve reliability

What is the name of software that allows publishing, editing, and modifying content from a central interface, providing procedures to manage workflow in a collaborative environment? a. Content Management Systems b. Customer Relationship Management Systems c. Social Networking Systems d. Self-publishing Platforms

Content Management Systems

What term is used to compare the number of closed sales to the the total number of website visitors? For example, if an ecommerce site receives 200 visitors in a month and has 50 sales, this term would be calculated as 50 (sales) divided by 200 (visits), or 25%. a. Conversion rate b. Pay-per-click rate c. SEM (Search engine marketing) rate d. Adword ROI

Conversion rate

An entrepreneur developing detailed documentation of their business processes so that they can be offered to other individuals as a franchise operation is an example of: a. Converting explicit knowledge into tacit knowledge b. Converting tacit knowledge into explicit knowledge c. Creating a community of practice d. A time-delayed response e. Dependent demand

Converting tacit knowledge into explicit knowledge

Which of the following is NOT a disadvantage of web-based call centers located overseas? a. Security b. Cost c. Control d. Communication

Cost

The task of brainstorming in a group decision support system is similar to what step in the knowledge management cycle? a. Disseminate b. Publish c. Refine d. Store e. Create

Create

What is the name for the path containing the minimum set of tasks that you must traverse in order to reach completion of your project on time? a. Critical Path b. Scope Triangle c. Mythical Man Month d. Project Plan

Critical Path

What term is used to describe the set of tasks that must be completed as scheduled in order to ensure the delivery of your project on time? a. Scope Creep b. Change Management c. Quality Triangle d. Critical Path

Critical Path

What technique has been used by companies such as Starbucks and Netflix used to engage large numbers of non-employees to innovate, manage, design and market new products? a. Executive dashboards b. Click-stream analysis c. Capacity planning d. Crowdsourcing e. Six Sigma

Crowdsourcing

What term describes a way of solving problems and producing things by connecting online with people that you otherwise wouldn't know? a. Crowdsourcing b. Group Systems c. Knowledge Management d. Communities of Practice

Crowdsourcing

Which of the following security measures would be considered a "last line defense" for Information Security? a. Cryptography b. Access Control c. Firewall d. Intrusion Detection e. Security SDLC

Cryptography

In the Ruby Tuesday's sales analysis case, analyzing historical data about the sales dimensions of products categories, sales regions, and months of the year would be best using which of the following approaches we've previously discussed? a. Data Cubes b. Knowledge Management c. Communitites of Practice d. Visualization

Data Cubes

In cybersecurity, what is our last line of defense? a. Data Encryption b. Strong Authentication c. Biometrics (e.g.: retinal scans) d. Physical Security (e.g.: locked data centers)

Data Encryption

What information-related issues does using a relational database model solve? a. Data Redundancy b. Data Isolation c. Data formatting

Data Redundancy

What type of data mining presents information graphically so that users are able to identify patterns in the underlying data? a. Data Visualization b. Case-based Reasoning c. Neural Networks d. Rule Induction e. Nearest-neighbor Techniques

Data Visualization

What type of data structure allows us to organize multi-dimensional information from a data warehouse so that it can be viewed using different data abstractions (or projections)? a. Neural network b. Click stream c. Data cube d. Executive dashboard e. Decision support system

Data cube

Maintaining multiple copies of the same data in multiple information systems that can be independently updated commonly results in what information management problem? a. Data isolation b. Data inconsistency c. Data devaluation d. Data compression e. Data validation

Data inconsistency

___________ support local control, whereas ____________ support central control. a. Data marts; data dictionaries b. Data marts; data warehouses c. Data warehouses; data dictionaries d. Data warehouses; data marts

Data marts; data warehouses

Concerns over using data to illegally discriminate against an individual or group, reaching wrong conclusions due to data contamination, and violating intellectual property (ownership of information) protections were legal and ethical issues discussed in relation to what topic discussed during this module? a. Telemedicine b. Crowdsourcing c. Click-stream analysis d. Data mining e. Project management

Data mining

Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control? a. Bullwhip effect b. Just-In-Time c. Defense in depth d. Disintermediation e. Social Contract

Defense in depth

What term did the textbook author use to describe when the functions of many physical devices are included in one other physical device? a. Dematerialization b. Distermediation c. Internalization d. Integration

Dematerialization

Which group of voters would result in the highest return on investment (i.e., largest number of votes for a DNC candidate) using a get-out-the-vote (GOTV) strategy? a. Democratic voters who sometimes vote b. Independent voters who always vote c. Independent voters who sometimes vote d. Republication voters who sometimes vote e. Democratic voters who always vote

Democratic voters who sometimes vote

In the decision support process, formulating a module to be evaluated and setting criteria for making a choice would occur during what phase of the decision making process? a. Choice Phase b. Design Phase c. Functional Phase d. Intelligence Phase e. Operational Phase

Design Phase

During which phase of the website transformation process would the project team for developing perform content analysis, layout the website using wireframes, and define a consistent visual design? a. Developing Site Structure b. Defining the Project c. Production d. Site and CMS Maintenance e. Training, Launch and Buildout

Developing Site Structure

What term is used to describe an individual who was born after the widespread adoption of digital technology and have grown up using technology like the Internet, computers and mobile devices? a. Digital Native b. Millennial c. Digital Immigrants d. Online Generation

Digital Native

A business intelligence tool that uses abstractions such as color and graphical images like instrument gauges to allow executives to grasp business situations quickly is known as a: a. Planning Horizon b. Digital dashboard c. Expert system d. Neural network e. Geographic information system

Digital dashboard

Converting all MIS 111 students from clickers to response cards without an initial test period is an example of what type of conversion? a. Direct conversion b. Pilot conversion c. Phased conversion d. Parallel conversion

Direct conversion

When major airlines (American, Delta, United, etc.) bypass travel agents and directly market tickets to customers from the airline's corporate website, this is an example of using what type of business sales strategy? a. Disintermediation b. Crowdsourcing c. Group Systems d. Reintermediation e. Communities of Practice

Disintermediation

Which of the following is an informational role? a. Disturbance handler b. Disseminator c. Entrepreneur d. Figurehead

Disseminator

In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does ".edu" define? a. Domain b. Browser c. Protocol d. Resource e. Server

Domain

What type of repeater has the greatest throughput a. Single Band b. Double Band c. Double Radio

Double Radio

What is the name of the Regents Professor and founding chair of the MIS Department that pioneered the field of Group Decision Support Systems? a. Dr. Jay Nanamaker b. Dr. Hsinchun Chen c. Dr. Sudha Ram d. Dr. Sue Brown

Dr. Jay Nanamaker

What is the name of the MIS Regents Professor and founding Chair of the MIS Department who described MIS as "Solving real problems for real people"? a. A.Dr. Sudha Ram b. Dr. Jay Nunamaker c. Dr. Hsinchun Chen d. Dr. Jim LaSalle

Dr. Jay Nunamaker

What type of chart allows you to plot data using two y-axes and a shared x-axis, visualizing a correlation or the lack thereof between the two y-axes data sets? a. Dual Axis Chart b. Box and Whisker Chart c. Funnel Chart d. Radar Chart

Dual Axis Chart

[ERPModules] Which of the following is typically not considered a "core" ERP module? a. Financial b. E-Business c. Human Resources d. Operations

E-Business

What information systems standard allows trading partners to move routine documents, such as purchasing orders, using standard data formats as messages over the Internet. a. CRM b. EDI c. SFA d. JIT

EDI

[Systems] What term is used to describe interorganizational ERP systems that provide web-enabled links among a company's key business systems—such as inventory and production—and its customers, suppliers, distributors, and other relevant parties? a. MRP b. MRP-II c. ERP d. ERP-II

ERP-II

What was the name of the legislation adopted by the European Parliament that mandated that all countries within the EU must setup laws requiring websites to obtain informed consent before they can store or retrieve information on a visitor's computer or web-enabled device. a. EU Cookie Law b. EU Cybersecurity Act c. EU Data Protection Directive d. EU General Data Protection Regulation

EU Cookie Law

A Cost-Benefit Analysis is related mostly to what type of project management feasibility assessment? a. Technical b. Operational c. Economic d. Political e. Ethical

Economic

Purchasing an entire box of screws, even though only a small number are need for the master production schedule is an example of making a purchasing decision based on what approach? a. Fixed order quantity b. Lot-for-Lot c. Economic Order Quantity d. Independent Demand

Economic Order Quantity

One of the impacts of Globalization is the the Economics of Distance (Transportation Costs) has been replaced by what? a. Econonmies of Time b. Economies of Relationships c. Economies of Attention d. Econonmies of Margin Cost

Economies of Attention

What is NOT a factor contributing to the Bullwhip Effect? a. Shortage Gaming b. Outsourcing c. Price Promotions d. Batch Purchasing e. Forecasting/Trend Analysis

Outsourcing

Which type of website file contains software that's executed on the host before sending the results to the browser? a. PHP b. HTML c. JPG d. JavaScript

PHP

Although globalization has been underway for many centuries, digitization, networking, and connectiveness have dramatically increased what? a. Pace of Change b. Number of "Olive Tree" products and services c. Data Redundancy d. Revenue per Employee e. Worker Productivity

Pace of Change

In a packet-switched data communication network, which of the following is true: a. Packets can be lost or become corrupted between the sender and receiver b. All packets from a sender follow the same path through the network to the receiver c. All packets always follow the shortest path (fewest hops) through the network d. All packets from a sender always arrive at the receiver in same order they were sent e. The path packets follow in the network can never be changed if a data link fails

Packets can be lost or become corrupted between the sender and receiver

What term does Google use to describe how important a website is based upon counting the number and quality of links to a page, using the underlying assumption is that more important websites are likely to receive more links from other websites? a. Conversion rate b. Keyword density c. Page rank d. Website ROI

Page rank

The success of a Group Decision Support System (GDSS) is based upon two key features: contributor anonymity (i.e., the identity of the person making the comment or suggestion is not known), and what other important feature? a. Analytical CRM b. Reintermiediation c. Disintermediation d. Parallel Discussions e. Six Sigma

Parallel Discussions

In the SCOR model, competitive requirements such as reliability, responsiveness, and agility are all related to what dimension of a vendor's performance? a. Effectiveness b. Efficiency c. Mapping d. Productivity e. Modeling

Effectiveness

For companies managing their supply chain business processes using CPFAR (Collaborative Planning, Forecasting and Replenishment), the process improvements over the traditional ordering process could be primarily considered as an improvement in which of the following? a. Efficiency b. Quality c. Effectiveness d. Agility e. Feasibility

Efficiency

When information systems were first introduced into organizations, the primary focus of their use was what? a. Efficiency b. Effectiveness c. Value Creation d. Strategic Advantage

Efficiency

Understanding the question and responding with the right answer for a question in the lightning round depends most on what? a. People b. Process c. Technology d. All three equally

People

The Gainesville police department started using the internet to accomplish all of these objectives except? a. Empower businesses to identify high crime areas and determine appropriate levels of security. b. Demystify law enforcement operations for the citizens of Gainesville. c. Enable individual citizens to better protect themselves from criminal activity. d. Motivate community groups to have a stronger hand in addressing crime.

Empower businesses to identify high crime areas and determine appropriate levels of security.

Which of the POUR principles focuses on the concept that web accessibility is based upon the assumption that people need to be able to input the information into their brain so that they can process it? a. Perceivable b. Operable c. Understandable d. Robust

Perceivable

Official-sounding emails that demand you reply immediately to confirm your personal information or you will lose access to your account are a software attack known as: a. Phishing Attack b. Trojan Horse c. Zero-day Attack d. Drive-by Attack e. Logic Bomb

Phishing Attack

When Making Charts, you should do all of the following if possible, except? a. Ensure there are Legends for each Axis b. include the units you are using c. Ensure that the chart is still readable and the series distinguishable if photocopied, so colorblind people can easily read it d. Ensure there isn't unnecessary data in the chart e. Ensure the chart has images and clip art relevant to it's topic to make it appear dynamic and interesting f. Include citations for data sources

Ensure the chart has images and clip art relevant to it's topic to make it appear dynamic and interestingWhich of the following is NOT a disadvantage of web-based call centers located overseas? a. Security *b. Cost c. Control d. Communication

What category of location-based services would best describe products such as "location-based gaming", "social networking," and "find a friend"? a. Information Services b. Entertainment c. Mobile Resource Management d. Personal Security e. Social Networking

Entertainment

With respect to a database, what term is used to describe an abstract representation of all of the information included in a data structure about a particular type of entity? a. Entity Attribute b. Entity Class c. Entity Key d. Entity Model e. Entity Table

Entity Class

What is an affordance? a. Being able to pay for something b. Physical property of an object that shows functionality c. How well the user likes the interface d. Safety of users and of data

Physical property of an object that shows functionality

[RelativeSize] What type of chart would be show the values of individual components proportional to a whole, allowing you to easily know relative size of a component, such as might be done to analyze the allocation of expenditures in a budget? a. Line Chart b. Bar Chart c. Pie Chart d. Bubble Chart

Pie Chart

Besides sensors, radios, and chips, what is the value in the Internet of Things? a. Establishment of services on top of the connectivity b. Cheaper equipment costs c. Creating less data d. Companies that haven't failed e. Eliminates the need for a value proposition

Establishment of services on top of the connectivity

David Myers' (former controller of MCI/Worldcom) statement "I still don't know that one point when I started to cross the line...", is an example of how small, incremental repeated compounding of unethical decisions can result in what? a. Gut check b. Transparency test c. Whistleblowing d. Ethical drift e. Defining moment

Ethical drift

Often presented visually on an executive dashboard, what type of report focuses attention on business processes whose performance falls outside the range of their defined KPI metrics? a. Batch b. Drill-down c. Exception d. Ad hoc e. Annual

Exception

What is the process of identifying metrics that are outside of acceptable tolerance levels? a. Classification b. Drill Down c. Exception Reporting d. Visualization

Exception Reporting

When Dr. Sudha Ram used CatCard data (digital traces) as part of her research to analyze students' routines and relationships to predict student retention. What knowledge management term would you use to classify the CatCard transactional data? a. Explicit data b. Sticky data c. Tacit data d. Feasible data

Explicit data

School of Arts: What domain of education in the art school emphasizes experimental contemporary studio practice that includes combined media installation, performance, environmental and site-specific art, 3D modeling, digital fabrication, video, audio and AR/VR installations, community based practice, and interactive and relational strategies? a. Extended Media b. Digital Art c. Interdisciplinary Practice d. Visual Culture

Extended Media

In the Personal Branding Video Case from Tuck Business School, which tool was discussed as being an 'overheard personal conversation' that still needed to be managed in the context of your business personal brand a. Facebook b. Linkedin c. Twitter d. Instagram e. SnapChat

Facebook

From a user's perspective, perceived affordances would include actual perceptible design affordances and what other category of perceptual affordances? a. Correct rejection of design characteristics that are not affordances b. Hidden design affordances c. Design mitigation affordances d. False or fake design affordances e. Accessible affordances

False or fake design affordances

What organization was created in the Eller College of Management in the Spring of 2003 and is designed to be a member organization dedicated to the support of Eller College undergraduate students in their pursuit of co-curricular knowledge, skills, leadership and community activities? a. Federation of Eller Student Organizations (FESO) b. Eller Leadership and Integrity Training for Excellence (ELITE) c. Leadership Empowerment & Academic Development Program (LEAD) d. PACE Freshman Honorary Experience

Federation of Eller Student Organizations (FESO)

What type of home ISP connection is typically the fastest a. DSL b. Cable c. Fiber d. They are all the same

Fiber

Which of the following types of wire media has the highest physical security? a. Fiber-optic cable b. Coaxial cable c. CAT-3 Twisted pair cable d. CAT-5 Twisted pair cable

Fiber-optic cable

What term was coined by Eli Pariser to describe a personalized search in which a website algorithm predicts what information a user would like to see based on user location and past searches on the website? a. Filter bubble b. Conversational marketing c. Social marketplace d. Shopping community

Filter bubble

What network security control prevents information from moving between two networks? a. Firewall b. Post Scanner c. Packet Sniffer d. Biometric Identification

Firewall

Car payments and rent are examples of what type of expenses? a. Fixed b. Discretionary c. Variable d. Pre-paid e. Flexible

Fixed

When budgeting, the amount you spend for rent is considered as: a. Fixed expenses b. Variable expenses c. Discretionary expenses d. Non-Elective expenses

Fixed expenses

An investors willingness to potentially loose their money in exchange for the potential of higher returns is called their? a. Risk Tolerance b. Diversification c. Investing Tolerance d. Aggressiveness Quotient

Risk Tolerance

What is used to determine how long an investment will take to double, given a fixed annual rate of interest, allowing investors to get a rough estimate of how many years it will take for the initial investment to duplicate itself. a. Rule of 72 b. 28/36 Rule c. 2% Rule d. Rule of 18

Rule of 72

If your internet speed seems slow, before calling your ISP and complaining the very first thing you should do is a. Try uploading and downloading files with a stopwatch b. reboot your computer c. See if other computers in your house are also slow d. Run a speedtest against the ISP's speed test site

Run a speedtest against the ISP's speed test site

What type of business systems have the capability to place automatic requests to buy products from vendors in real time? a. AI (Artificial Intelligence) b. CRM (Customer Relationship Management) c. DSS (Decision Support System) d. SCM (Supply Chain Management)

SCM (Supply Chain Management)

What is the name of the agile framework for managing the work of development teams who break their work into actions that can be completed within timeboxed iterations, called sprints (30 days or less)? a. SCRUM b. Waterfall c. Prototyle Methodology d. Rapid Application Development

SCRUM

Paying Google to display marketing advertisements when a user searches for a specific Adword is most commonly associated with which of the following concepts? a. SEM b. SEO c. Organic d. Pagerank e. Hashtags

SEM

Keyword selection and density, image alt tags, and links to content are mostly commonly associated with which of the following concepts? a. SEO b. CPC c. SEM d. PPC e. ROI

SEO

In project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resources and what other dimension of the planning process? a. Alignment b. Feasibility c. Agility d. Scope e. Value

Scope

As discussed in class, what company was founded in the Globalization 2.0 era based on the business model of selling discontinued product lines directly to consumers by using a new transportation infrastructure to reach a geographically distributed customer base? a. Ebay.com b. Sears, Roebuck & Co. c. Overstock.com d. Wal-Mart e. BigLots!

Sears, Roebuck & Co.

Which of the following is a problem with BYOD? a. Satisfaction b. Security c. Productivity d. Cost

Security

Although web users should have an unlimited amount of time to complete tasks on the web, this design goal must be balanced against what other issue? a. Security and risk b. Communication Bandwidth c. Cost of Data Transmission d. Availability of Equipment

Security and risk

Bandwidth is the transmission capacity of a network, stated in bits per second. Which of the following "laws" we've discussed determines the maximum bandwidth (signallin rate) of a given type of communication media (e.g., copper cable, fiber optic, etc.)? a. Gilder's Law b. Metcalf's Law c. Moore's Law d. Shannon's Law

Shannon's Law

Which of the following causes of the bullwhip effect is related to a trading partner intentionally sharing inaccurate information with a company's future inventory requirements? a. Shortage Gaming b. Outsourcing c. Price Promotions d. Batch Purchasing e. Forecasting/Trend Analysis

Shortage Gaming

What is the most important rule in presenting? a. Show your passion b. keep it short c. make eye contact d. move around

Show your passion

What is the name used to describe when a person visits a brick-and-mortar store only to check physical characteristics of a product but intends to purchase the product online? a. Showrooming b. Disintermediating c. Multiplexing d. Hybrid shopping

Showrooming

Which of the following is generally NOT commonly used as a biometric identification? a. Signature b. Fingerprint c. Facial geometry d. Retinol Pattern

Signature

In the Jack Welch Video Case in the SCM Lecture, What approach was he discussing as key to providing customer value? a. Six Sigma b. Total Quality Management c. Lean Manufacturing, using JIT and SMED d. the SCOR Model - the Supply Chain Operations Reference Model e. CPFAR - Collaborative Planning, Forecasting And Replenishment

Six Sigma

Dr. Patton discussed the Hacking Google Glasses video case in class and talked about what it could be a precursor to something else getting hacked in the future. What did he say might be the next thing hacked using the same technique? a. IoT Toys and Devices b. Smart Phones c. Smart / Autonomous Cars d. Stop Light Control Systems

Smart / Autonomous Cars

What is an example of something in the Integrated Application layer of the 4 Layer Model? a. GPS b. Data center c. Smart transport d. Search engine

Smart transport

Which of the following types of social engineering attacks would be a text or SMS message from someone claiming to be from a reputable or known company asking your to disclose your personal information a. Tailgating b. Vishing c. Smishing d. Spear Phishing

Smishing

What normative ethical theory expects a corporation to create more value to society that it consumes? a. Stockholder Theory b. Stakeholder Theory c. Social Contract Theory d. Supply Chain Theory

Social Contract Theory

Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? a. Defense in Depth b. Industrial Sabotage c. Social Engineering d. Advanced Persistent Threats e. Open Source Hacking

Social Engineering

In the video case for Nestle, data-driven decisions were primarily based on visualizations of information from what source? a. Social Media Platforms b. Investment Analyst Forecasts c. Financial Performance Reports d. Cost and Production Schedules

Social Media Platforms

In the NASA project management video case, what did the speaker indicate was the greatest risk he faced in managing projects for NASA? a. Social and political risk b. Cost overruns c. Technology failues d. Lack of individuals with technical expertise

Social and political risk

Information systems professionals understand business needs and analyze processes, methods and data to create customer-oriented solutions. The value proposition for MIS was described more briefly by Dr. Jay Nunamaker, Regents Professor and founding chair of the MIS Department, as a discipline focused on doing what for business? a. Solving real problems b. Computer Design c. Programming d. Academic research e. Marketing software

Solving real problems

Your username (UANetID) is your claim of identify to a computer system. When the computer system verifies your identify by requiring you to enter a password is an example of what type of authentication? a. Something a user is b. Something a user has c. Something a user does d. Something a user knows e. Something a user inherits

Something a user knows

What term is used to describe paid-for product ratings and reviews? a. Sponsored reviews b. Customer reviews c. Expert reviews d. Conversational marketing

Sponsored reviews

A Mekko, or Marimekko or market map chart, which paints a picture of the overall market and helps to drive discussions about growth opportunities or acquisitions by showing the relationship between each segment or bar to the total. A Mekko chart is similar to what other type of chart discussed in class? a. Stacked Bar Chart b. Scatter Plot c. Donut Chart d. Surface Chart

Stacked Bar Chart

Donut Charts are difficult to read, Microsoft recommends what as an alternative? a. Stacked Column or Bar Charts b. Scatter Charts c. Pie Charts d. Cake Charts

Stacked Column or Bar Charts

What normative theory of ethics focuses on the belief that manager's actions should be guided by the understanding that they are entrusted with a responsibility to manage and protect the assets of the company for the benefit of all of those who the actions of the firm affect? a. Stockholder b. Stakeholder c. Social Contract d. Organizational e. Loyalty

Stakeholder

When Planning the presentation, what is the number one rule? a. Start with the end in mind b. Know your audience c. Have a clear structure d. Have the best content

Start with the end in mind

What type of problem has an optimal solution can be reached through single set of steps based on an algorithm? a. Strategic b. Structured c. Management d. Collaborative e. Unstructuredc

Structured

When classifying items on an I^2 diagram, we depend on individuals with domain knowledge and consultants about the items. What name do we use to describe an individual with domain knowledge? a. Subject-matter Expert b. Expert System c. Franchisee d. Community of Practice

Subject-matter Expert

What term describes individuals with tactic knowledge about a particular domain? a. Subject-matter Experts b. Knowledge Guides c. Expert Systems d. Community Leaders

Subject-matter Experts

Tacit or "sticky" knowledge, is based on information that is: a. Objective and rational b. Subjective and cognitive c. Easily communicated using cross-functional diagrams d. Described using algorithms and processes diagrams e. Easily understood with little domain knowledge

Subjective and cognitive

Selecting EPEAT-compliant technology with a high rating over traditional, less energy efficient technology is an example of focusing on what sustainability effect? a. Use of government regulation to eliminate wasteful products b. Impacts of long term structural change c. Increased awareness through the use of metrics d. Substitution by using alternative methods

Substitution by using alternative methods

Using the Internet of Things to increase the efficiency of a company's operations by allowing it to track, in real time, the movement of raw materials and parts through the manufacturing process to finished products delivered to the customer is related to what business function? a. Supply chain management b. Lifecycle product sustainability c. Cost accounting and financial management d. Social media marketing

Supply chain management

In the VAN (Voter Activiation Network) Relationship-Based Political Organizing video case study, the VAN was able to idenify the relationships of possible supporters using data from what source? a. Voter registration records b. Direct mail campaigns c. Online surveys d. Supporter's Facebook contacts e. Tax returns of registered voters

Supporter's Facebook contacts

In the Software Development Lifecycle Process (SDLC), in what SDLC stage is it the most costly to make changes to the system requirements a. Systems Design b. Systems Programming c. Systems Testing d. Systems Operation and Maintenance e. Systems Implementation

Systems Operation and Maintenance

In the assigned reading, the acronym SMART was suggested as a way to remember the characteristics needed when defining requirements. Which letter focused on the ability of the project team to prove that a requirement has been satisfied and delivered? a. S b. M c. A d. R e. T

T

Originally spun out of Stanford University as a research project, what big data tool started out by offering visualization techniques for exploring and analyzing relational databases and data cubes and has expanded to include Big Data research? a. Tableau b. PowerBI c. VMware d. Oracle

Tableau

[ChartingTool] What is the name of the Business Intelligence tool that is used for interactive analytics and data modeling? a. Python b. Qualtrics c. Tableau d. R

Tableau

Subjective knowledge that is based an individual's experiences is known as what? a. Refined knowledge b. Tacit knowledge c. Technical knowledge d. Explicit knowledge e. Procedural knowledge

Tacit knowledge

_______________ is knowledge that is generally imprecise, costly to transfer, and difficult to formalize or codify. a. Tacit knowledge b. Explicit knowledge c. Information d. Data

Tacit knowledge

How does telemedicine improve the delivery of medical care in rural communities? a. Telemedicine allows patients to make a preliminary self-diagnosis online b. Telemedicine prevents physicians from making errors during surgery c. Telemedicine reduces the need for patients to travel to physician's offices d. "Telemedicine Avatars" can perform routine procedures without the physician e. Telemedicine will allow a physician to meet with multiple patients at the same time

Telemedicine reduces the need for patients to travel to physician's offices

What term is used to describe how telemedicine uses wireless transmission and receipt of data gathered from remote sensors to allow doctors can monitor patients and control medical equipment from a distance? a. Telemetry b. Multiplexing c. Attenuation d. Propagation

Telemetry

Cisco uses the term "the power of in-person" to describe the ability of what technology to improve access to subject matter experts and to open doors to small business people? a. Telepresence b. Crowdsourcing c. Data Mining d. Knowledge Management

Telepresence

What collaboration tool was discussed in class that enhances the participants' contextual awareness by sharing non-verbal information during meetings? a. Teleportation b. Twitter c. Telepresence d. Crowdsourcing e. Six Sigma

Telepresence

Which of the following technologies we've discussed was described as a more environmentally friendly "best practice for communication" that could greatly benefit small businesses? a. Telepresence b. Information Security c. Knowledge Management d. Data Mining

Telepresence

In the Video Case on Michael Porters Competitive Forces What Industry was described as being Terrible in Every Category? a. The Airline Industry b. The Railroad Industry c. The Supermarket Industry d. The Cattle Industry

The Airline Industry

Porters five forces focuses on what part of competition? a. The Business Environment b. The Five Core Internal Processes of a Business c. The Business Supply Chain d. The Five Core Business Functional Areas

The Business Environment

Which of the following does a Fishbone Diagram typically not inform you about a problem? a. The cost of correcting a problem with a process b. Identifies the major categories of a problem c. Identifies many of the root causes of problems d. Helps guide the process improvement process e. Organizes the problems associated with a process by the major categories

The cost of correcting a problem with a process

In the video case about Transmission Control Protocol (TCP), Vint Cerf described TCP using an analogy of the sending postcard through the US postal system. Which of the following was not an issue discussed in the case study? a. The cost of sending the packets making up a message b. That packets could arrive out of sequence c. That packets could be lost during transmission d. That the sender would know when to retransmit packets based on receiving a message from the receiver

The cost of sending the packets making up a message

Which of the following would *NOT* be a characteristic of a blockchain data store: a. The data store is managed as a single database using cloud technology b. Uses cryptography and digital signatures to prove identity, authenticity and enforce read/write access rights c. It is always unencrypted to provide complete transparency to all users

The data store is managed as a single database using cloud technology

In the assigned reading, Don Norman noted two critical issues with the original BMW iDrive design: the design failed to provide a good conceptual model (a story) and also what other problem? a. The iDrive destroyed spatiality b. The iDrive was not accessible c. The iDrive provided false affordances d. The iDrive was ergonomically difficult to use

The iDrive destroyed spatiality

In the Cybersecurity 101 Video Case, the reason for many of the insecurities currently found on the internet is due to what? a. The internet was not originally designed to experience the massive growth it underwent b. The internet was originally designed as a Game and not as a serious business network c. The internet was originally limited to short distances so distant countries couldn't be connected d. The internet was originally designed for use in space relaying data between satellites so human hackers were not a concern

The internet was not originally designed to experience the massive growth it underwent

Applications such as "find a friend" (FourSquare), driving directions (Smartrek), roadside assistance (OnStar), and fleet management (UPS and FedEx) are all examples of services that have been enhanced by knowing what? a. The identity of the requester b. The time the request was made c. The age of the requester d. The location of the requester e. The number of people making requests

The location of the requester

In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what common problem did his analogy using the postal service to email a page from a book have with sending TCP packets? a. The message might get lost and not delivered b. The message might get changed in route c. The message might not get sent d. The message might be illegible e. The message might be in the wrong language

The message might get lost and not delivered

Thomas Friedman was quoted as saying, "We're in the middle of 3 accelerations; the market, mother nature, and Moore's law. Moore's law says the power of microchips will double every 24 months, mother nature is climate change, biodiversity loss and population, and the market is digital globalization." What is Moore's Law? a. The number of transistors in a dense integrated circuit doubles about every two years b. The effect of a telecommunications network is proportional to the square of the number of connected users of the system c. The bandwidth of the internet grows at least three times faster than computer power d. The theoretical maximum information transfer rate of communicatiions channel

The number of transistors in a dense integrated circuit doubles about every two years

In the Biometric Passwords Video Case, what were the two emerging biometric technologies that were explained in detail? a. The patterns of eye veins, heartbeat rythms b. The patterns of fingerprints, brainwave patterns c. The patterns of eye veins, brainwave patterns d. The patterns of fingerprints, heartbeat rythms

The patterns of eye veins, heartbeat rythms

Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project? a. Whether the major project milestones are being completed on budget b. Individual work assignments for persons assigned to the project c. The project milestones and the order they are scheduled to be completed d. Whether project tasks have been organized in the most efficient order e. The quality of the work performed during each major project milestone

The project milestones and the order they are scheduled to be completed

A Bill-of-Materials describes the components that make up an item, the quantity used, and what other information about a finished good? a. The value of the material b. The vendor who supplies the material c. The relationships of raw materials and subassemblies d. The lot sizing used when purchasing raw materials

The relationships of raw materials and subassemblies

Assume you need to put a sign that says "PUSH" on a door handle to explain the correct way to operate the door. The "PUSH" sign helps a user understand what aspect of usability? a. The sign explains a perceptible affordance b. The sign explains a correct rejection c. The sign explains a hidden affordance d. The sign explains a false affordance e. The sign explains a consistent affordance

The sign explains a false affordance

As I move farther away from campus, I notice that my UAWiFi connection gets progressively weaker. What factor will always cause this to occur? a. The signal strength is lost due to attenuation b. The signal blocked by strong encryption c. The signal cannot be received due to interference d. The signal is blocked due to right-of-way restrictions

The signal strength is lost due to attenuation

What common function do "HTTP", "TCP" and "IP" share? a. They all define internet-based protocols b. They all are website domains c. They all are data encryption methods d. They are abbreviations for physical media e. They are common computer viruses

They all define internet-based protocols

Which of these is not an advantage of an all-in-one router, switch, WiFi access point, and Modem a. They are easy to upgrade b. They are cheap to upgrade c. They have one management interface d. You don't have to worry about connecting different network equipment together

They are cheap to upgrade

A Stacked Area chart is good for showing relative contributions of different series to a total over time, but they have one big limitation, which is? a. They can't show negative values b. They can only include 3 series c. One series can be hidden behind another series d. They can only show four points in time e. They tend to lack color and not draw the eye

They can't show negative values

Pie charts have several limitations, including all of the following except? a. They have limited color and don't draw the eye and attention b. They can only show one series c. They cannot show negative values d. When two or more items are close in value it can be hard to determine which is larger e. Values near zero may not show up and be hidden

They have limited color and don't draw the eye and attention

Treemap Charts largest advantage over bar or column charts is? a. They show individual values relative to the sum of the series as well as other values b. They allow multiple series to be displayed c. They allow time series data to be displayed d. There is no actual advantage

They show individual values relative to the sum of the series as well as other values

_________ is any danger to which a system may be exposed. a. Exposure b. Information security c. Threat d. Security

Threat

Before paying an invoice in the procurement process, the accounting team checks that the purchase order, the goods receipt document (bill-of-lading), and the vendor's invoice all match. What is the term that is used to describe this auditing process? a. Three-way Match b. Order fulfillment c. Batch processing d. Cross-department process

Three-way Match

What is considered to be the high-capacity data transmission core of the Internet structure? a. NAP b. Tier 1 ISP c. Tier 3 ISP d. LAN

Tier 1 ISP

In a vertical cross-functional business process diagram, the order of items in one column (from top to bottom) shows what relationship among these items? a. Time b. Cost c. Importance d. Frequency e. Skill leve

Time

In a vertical cross-functional business process diagram, the order of items in one column (from top to bottom) shows what relationship among these items? a. Time b. Cost c. Importance d. Frequency e. Skill level

Time

In a vertical cross-functional diagram, items are ordered in one coumn relates to what? a. Time b. Economic value c. Feasibility d. Frequency of occurence

Time

Hierarchical Diagrams are commonly used for all of the following except? a. Time series data b. Organizational Charts c. Project Task Decomposition d. Bill of Materials

Time series data

In the decision matrix example shown below, which of the answers would have the highest score for Project A? *picture usually shown here* a. Time to complete b. Affects other projects c. Project cost d. Financial gain

Time to complete

In the 'How Technology Changes Us' Video Case, what was the fundamental technology that was being discussed as totally changing the world and how people function? a. Timekeeping b. Electricity c. Steam Engines d. Food Storage

Timekeeping

Which of these is NOT enumerated as a Motivation to Create Accessible Web Content? a. To improve the reliability of technical functionality (technology centered motivations) b. To improve the lives of people with disabilities (human-centered motivations) c. To capitalize on the a wider audience or consumer base (marketing or economic-centered motivations) d. To avoid lawsuits and/or bad press (public relations and punishment-centered motivations)

To improve the reliability of technical functionality (technology centered motivations)

In financial markets, a "ticker symbol" identifies what? a. Traded Company b. Stock Exchange c. Sales Transaction Record d. Stock Broker's Identification e. Customer's Identification

Traded Company

Which of the information layers in the Internet of Things model focuses on the communication networks that connect the sensors that actually collect the data? a. Transmission Layer b. Generation Layer c. Processing Layer d. Application Layer e. Metadata Layer

Transmission Layer

Which of the following would NOT be considered a type of social engineering ? a. Torjan Horse b. Spear Phishing c. Tailgating d. Vishing e. Smishing

Trojan Horse

What is the name of the criterion of intelligence where depends on the ability of a computer program to impersonate a human in a real-time written conversation with a human judge, sufficiently well that the judge is unable to distinguish reliably—on the basis of the conversational content alone—between the program and a real human? a. Turing Test b. Augmented Reality c. Ephemeral content d. Content sharing

Turing Test

Select the answer below that orders the media correctly from the lowest to highest bandwith (data rates). a. Twisted pair, Coaxial Cable, Fiber-optic Cable b. Coaxial Cable, Twisted pair, Fiber-optic Cable c. Fiber-optic Cable, Coaxial Cable, Twisted pair d. Coaxial Cable, Twisted pair, Fiber-optic Cable

Twisted pair, Coaxial Cable, Fiber-optic Cable

What term describes being able to access information and communication in almost any location? a. Ubiquity b. Localization c. Accessibility d. Open Source

Ubiquity

A company's "ticker" or stock symbol serves what role on a stock trading exchange? a. Uniquely identifies a traded stock b. The time and date the stock was sold c. The broker selling the stock d. The change (up or down) in price from the last purchase price e. The official company logo used for stock transactions

Uniquely identifies a traded stock

Long term weather predictions are generally considered what type of problem? a. Structured b. Unstructured c. Physical d. Optimal

Unstructured

When applying for advanced standing in the Eller College of Management, the process of selecting your major would be best described as having what characteristics of a decision? a. Unstructured and Strategic b. Structured and Operational c. Semi-structured and Operational d. Structured and Management

Unstructured and Strategic

Common themes of a blockchain generally include everything but what? a. Uses cryptography and digital signatures to prove identity b. Usually contains financial transactions c. Is replicated across a number of systems in almost real-time d. Has mechanisms to make it hard to change historical records e. Usually exists over a client-server network

Usually exists over a client-server network

If the search column for a VLOOKUP contains a duplicate value, which value will be returned? a. VLOOKUP will return a value based on the the first match b. VLOOKUP will return a value based on the the last match c. VLOOKUP will return an error (#DUPLICATE), since the search column must be unique d. VLOOKUP will return both values

VLOOKUP will return a value based on the the first match

What inventory strategy allows a company's supplier to monitor inventory levels and manage the replenishment process for the supplier's products? a. VMI b. Tier-1 Suppliers c. Push Manufacturing d. Bullwhip delivery

VMI

What technology do companies use to make the links between connection between two corporate intranets more secure? a. VPN b. CPFAR c. SCOR d. VMI

VPN

If you are just being asked for something you know to get into a system, what is the system attempting to do? a. Validate your identity b. Strongly validate your identity c. Have you tell it your Identity d. Have you show it your Identity

Validate your identity

In the case study presented in class, Nestle's Digital Acceleration Team training program focuses on developing skills in all of the following business issues, except: a. Listening b. Engaging c. Inspiring and Transforming d. Validating

Validating

The characteristics of big data (data science) are described as being related to volume (of the information), velocity (speed at which information is collected), veracity (the accuracy of the information) and what other characteristic? a. Variety (integrating data from multiples sources) b. Vagueness (using data without a clear definition) c. Valuation (using data that has significant economic value) d. Visual (using data that can be displayed graphically) e. Vertical (using data related only to one market)

Variety (integrating data from multiples sources)

When you check your credit score for incorrect information, you're responding to which of the "4 V's" discussed for "big data" in the financial reporting business sector? a. Veracity b. Volume c. Variety d. Velocity

Veracity

Businesses like to use Virtual Private Networks for every reason except? a. Virtual networks are faster than ordinary internet connections b. They have no control over the path data takes between business sites c. Data from web-browsers may not be encrypted d. Data from applications other than web browsers may not be encrypted e. Virtual networks are cheaper than leased lines

Virtual networks are faster than ordinary internet connections

Similar to trends in computing hardware, what is the trend for wireless network hardware? a. Virtualization and merging with the cloud b. Interference and attenuation are being eliminated c. Less, but bigger network antennas d. Putting networks onto chips e. Sensors that don't need batteries

Virtualization and merging with the cloud

According to the articles what technologies enable businesses and their employees to get in front of clients and customers but do it in a cost-savings manner? a. VoIP and web conferencing b. Telecommuting c. Telemedicine d. eFax e. email

VoIP and web conferencing

Select the answer the correctly orders the types of computer networks in terms of area span of coverage from largest to smallest? a. WAN, MAN, LAN, PAN b. WAN, LAN, PAN, MAN c. PAN, LAN, MAN, WAN d. PAN, MAN, LAN, WAN

WAN, MAN, LAN, PAN

The Dow Jones Industrial Average is a market indicator comprised of 30 large publically traded companies, and is intended to to gauge the performance of the industrial sector within the American economy. Recently, General Electric, who had been part of the DJIA for over 100 years, was replaced by another company. What company replaced GE in the DJIA? a. Walgreens b. Google c. Tesla d. American Airlines

Walgreens

What type of chart would be typically be used to show how the an initial value is affected by intermediate values -- either positive or negative -- and resulted in the composition of a final value? a. Waterfall Charts b. Histogram Charts c. Sunburst Charts d. Surface Charts

Waterfall Charts

The four guiding principles of accessibility (perceivable, operable, understandable, and robust) are included in what document? a. Web Content Accessibility Guide, Version 2.0 b. Web Content Accessibility Guide, Version 1.0 c. Section 508 of the Rehabilitation Act d. Americans with Disabilities Act

Web Content Accessibility Guide, Version 2.0

If you are creating a template for a team, so each team member can work on a different section of the document, which is the most important thing to standardize before distributing the template? a. What Styles will be used and When b. The Image sizes to be used c. Table Design and Layout d. Column Count

What Styles will be used and When

Of the items used that identify you uniquely at the University of Arizona, which one can be used as a primary key (unique identifier) outside the University? a. Your UA email address b. Your UA StudentID c. Your UA NetID d. Your UA CatCard Number

Your UA email address

Which of the following elements present on your CatCard releates to biometric identification? a. Your picture b. Your signature c. Your full name d. Your student ID number e. Your signature

Your picture

Signals used to send messages can be _______ or digital. a. analog b. discrete c. rotary d. binary

analog

Customers _____________________ because of Web 2.0. a. are less empowered b. are more empowered c. have seen no difference d. are generally confused

are more empowered

IT __________ be used to create a competitive advantage ___________. a. can; because everyone has access to technology b. can; when it is used effectively c. cannot; because everyone has access to technology d. cannot; even when it is used effectively

can; when it is used effectively

Telepresence systems seamlessly integrate _____ and _____. a. contextual awareness; content management b. content awareness; hardware c. sentiment analysis; contextual software d. Ethernet; WiFi

contextual awareness; content management

When you get an unexpected email, you should avoid everything but? a. Opening attachments b. Clicking on links c. responding with personal data d. copying a link to a known website and pasting it into your browser

copying a link to a known website and pasting it into your browser

What type of guided media uses light for signaling? a. fiber optics b. twisted pair c. coaxial cable d. open wire

fiber optics

Google's main business reason for installing fiber in select US cities is to _______. a. begin competing with the cable distribution giants b. bring the internet to rural areas c. generate more web traffic, which generates more ad revenue for them d. give people an option other than the telecommunications companies who control existing cable networks

generate more web traffic, which generates more ad revenue for them

The web ____________ buyer power. a. decreases b. increases c. has no impact on d. has a mixed impact on

has a mixed impact on

Library: What is the name of the University of Arizona's multidisciplinary learning community and collaborative makerspace in the University Libraries where students can access cutting-edge technologies, such as 3D scanning and printing equipment, a visualization wall, virtual reality headsets, and Raspberry Pis, along with collaborating with interdisciplinary experts? a. iSpace b. Special Collections c. Multimedia Zone d. Collaborative Learning Space

iSpace

Data ___________ means all applications are able to access the same data, which is ___________ by databases. a. independence; maximized b. independence; minimized c. isolation; maximized d. isolation; minimized

independence; maximized

What is the correct filename for your ABP-3A website? a. index.html b. Index.html c. index.www d. INDEX.HTML

index.html

What is the correct filename to use for your ABP-3B website? a. index.html b. abp3a.html c. website.html d. public.html e. home.html

index.html

ERP address information silos by _____________. a. reducing the amount of information presented b. simplifying system creation c. correcting a lack of communication between TPSs d. integrating functional areas

integrating functional areas

The three security challenges of wireless communication are confidentiality, accessibility, and _____. a. importance b. Internet c. integrity d. incorporation

integrity

Which of the following is the correct order of the traditional System Development Life Cycle (SDLC)? a. analysis, investigation, design, programming and testing, implementation, operation and maintenance b. analysis, investigation, design, implementation, programming and testing, operation and maintenance c. investigation, analysis, design, implementation, programming and testing, operation and maintenance d. investigation, analysis, design, programming and testing, implementation, operation and maintenance

investigation, analysis, design, programming and testing, implementation, operation and maintenance

The web __________ the same thing as the internet. a. could be b. is c. is not d. I don't know

is not

If everything stops working and connecting to the internet, and you have no idea what to do, the first thing you should try is? a. powering the modem and router off then on again b. rebooting your computer c. Rebooting your television d. Rebooting everything

powering the modem and router off then on again

What is the name of the directory where the files for your websites for ABP-3A and ABP-3B will be stored on the U.Arizona.Edu web server? a. public_html b. public.html c. index_html d. www_html

public_html

Sensors, RFID tags, meters, GPS, and other devices are used to collect supply chain information. These are all examples of __________. a. OLAP b. OLTP c. source data automation d. batch processing

source data automation

The _____________ approach states that an ethical action is the one that provides the most good or does the least harm. a. common good b. fairness c. rights d. utilitarian

utilitarian

Telepresence is a version of ____________. a. email b. a portal c. unified communication d. videoconferencing

videoconferencing

When you use Google Drive to work on a document with a classmate, this is considered _________. a. crowdsourcing b. teleconferencing c. virtual collaboration d. workflow

virtual collaboration

In the Your Personal Brand Video Case, what two things had to be aligned and true for your personal brand to be effective? a. who you are and of how you present yourself b. who you are and your goals and aspirations c. who you are and your proposed career path d. who you are and what your what your resume looks like e. who you are and the environment you are operating in

who you are and of how you present yourself


Conjuntos de estudio relacionados

Oceans, Coasts, and Climate (Ch. 15 & 19)

View Set

Biochemistry Final Practice Problems

View Set