MIS 111 Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is NOT a major advantage of wireless devices to users? a) They are small enough to easily carry or wear. b) They can be used to copy and pass on confidential information. c) They can communicate wirelessly with the Internet and other devices. d) They have sufficient computing power to perform productive tasks.

b) They can be used to copy and pass on confidential information.

Customers _____________________ because of Web 2.0. a) are less empowered b) are more empowered c) have seen no difference d) are generally confused

b) are more empowered

IT __________ be used to create a competitive advantage ___________. a) can; because everyone has access to technology b) can; when it is used effectively c) cannot; because everyone has access to technology d) cannot; even when it is used effectively

b) can; when it is used effectively

A firewall is a _______ control. a) access b) communication c) physical d) virtual

b) communication

WebMD is a(n) _________ that allows doctors to ___________. a) ERP; diagnose diseases b) expert; diagnose diseases c) ERP; perform long-distance surgery d) expert; perform long-distance surgery

b) expert; diagnose diseases

ERP address information silos by _____________. a) correcting a lack of communication between TPSs b) integrating functional areas c) reducing the amount of information presented d) simplifying system creation

b) integrating functional areas

In a relational database, what term refers to the collection of items that are all related to a single unique value, where the single value often serves as the primary key? a) A field b) A form c) A record d) A list e) A deposit

c) A record

What is an example of a decision that a Team Spiderweb diagram could be used to inform? a) Estimating the cost of staffing b) Assigning project development tasks c) Choosing a change leader d) Evaluating market feasibility e) Setting software development priorities

c) Choosing a change leader

Which of the following is NOT a disadvantage of web-based call centers located overseas? a) Communication b) Control c) Cost d) Security

c) Cost

What type of data structure allows us to organize multi-dimensional information from a data warehouse so that it can be viewed using different data abstractions (or projections)? a) Neural network b) Click stream c) Data cube d) Executive dashboard e) Decision support system

c) Data cube

A Cost-Benefit Analysis is related mostly to what type of project management feasibility assessment? a) Technical b) Operational c) Economic d) Political e) Ethical

c) Economic

Often presented visually on an executive dashboard, what type of report focuses attention on business processes whose performance falls outside the range of their defined KPI metrics? a) Batch b) Drill-down c) Exception d) Ad hoc e) Annual

c) Exception

What is NOT an advantage of digital transmission? a) Produces fewer errors b) Permits higher maximum transmission rates c) Harder to encrypt d) Simpler to integrate voice, video, and data

c) Harder to encrypt

___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information. a) Competitive intelligence b) Espionage c) Information extortion d) Intellectual property

c) Information extortion

What process improvement tool is used to identify factors that lead to an undesirable outcome? a) Tug-o-war diagram b) Gantt Chart c) Ishikawa diagram d) PERT chart e) Cross-functional diagram

c) Ishikawa diagram

Which of the following is FALSE of social computing? a) It focuses on improving collaboration. b) It encourages user-generated content. c) It allows social information to remain anonymous. d) It combines social behavior and IT to create value.

c) It allows social information to remain anonymous.

The sequence of activities performed by users of GroupSystems' ThinkTank product directly parallel the steps in what other business process? a) Transaction processing system b) Operational CRM c) Knowledge management cycle d) Economic globalization e) Just-in-time Inventory Management

c) Knowledge management cycle

______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. a) Accountability b) Due Process c) Liability d) Responsibility

c) Liability

____________ means that users carry a device with them and can initiate a real-time contact with other systems from wherever they happen to be. a) Broad reach b) Instant connectivity c) Mobility d) Ubiquity

c) Mobility

The European Union's data protection laws are ___________ strict compared to the US laws. a) Equally b) Less c) More d) Non-existently

c) More

What % of people like to purchase products from companies that protect the environment? a) More than 10% b) More than 35% c) More than 50% d) More than 75%

c) More than 50%

Which of the following is the technology that enables most mobile wallet applications? a) AFC b) ERP c) NFC d) VRP

c) NFC

Market capitalization is determined by multiplying the stock price by what? a) Profits earned from direct operations b) Dividends paid during the last fiscal year c) Number of common shares outstanding d) Book value of the company e) Year-end Earnings, minus taxes and interest

c) Number of common shares outstanding

On the balance sheet, total assets minus total liabilities must equal what? a) Free Cash flow b) Dividends Paid c) Owner's Equity d) Stock price e) Market Value

c) Owner's Equity

From smallest to largest, which of the following is in the correct order? a) LAN, PAN, MAN, WAN b) LAN, MAN, PAN, WAN c) PAN, LAN, MAN, WAN d) PAN, MAN, LAN, WAN

c) PAN, LAN, MAN, WAN

What action did Stacy Snyder take that resulted in her losing her job? a) Hacking the AP Twitter feed and posting a fraudulent message b) Undertaking accounting fraud at her company c) Posting a photo of herself at a party on her personal social media account d) Infecting her company's network computer with a virus while using Facebook at work e) Being a whistle-blower and reporting the illegal actions of her employer

c) Posting a photo of herself at a party on her personal social media account

______________ is the right to be left alone and to be free of unreasonable personal intrusions. a) A digital dossier b) Information privacy c) Privacy d) Profiling

c) Privacy

________________ clouds are proprietary data centers that integrate servers, storage, networks, data, and applications. a) Hybrid b) Public c) Private d) Vertical

c) Private

When a site like Google Docs becomes unavailable for any period of time, this fuels the cloud computing concern of ________. a) Legacy IT systems b) Privacy c) Reliability d) Security

c) Reliability

What is an example of something in the Integrated Application layer of the 4 Layer Model? a) GPS b) Data center c) Smart transport d) Search engine

c) Smart transport

Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? a) Defense in Depth b) Industrial Sabotage c) Social Engineering d) Advanced Persistent Threats e) Open Source Hacking

c) Social Engineering

When analyzing a set of click-stream data, what term is used describe the percentage of rows containing an item with a desired outcome relative to the total number of rows recorded? a) Projection b) Visualization c) Support d) Metadata e) Induction

c) Support

How does telemedicine improve the delivery of medical care in rural communities? a) Telemedicine allows patients to make a preliminary self-diagnosis online b) Telemedicine prevents physicians from making errors during surgery c) Telemedicine reduces the need for patients to travel to physician's offices d) "Telemedicine Avatars" can perform routine procedures without the physician e) Telemedicine will allow a physician to meet with multiple patients at the same time

c) Telemedicine reduces the need for patients to travel to physician's offices

What collaboration tool was discussed in class that enhances the participants' contextual awareness by sharing non-verbal information during meetings? a) Teleportation b) Twitter c) Telepresence d) Crowdsourcing e) Six Sigma

c) Telepresence

A Bill-of-Materials describes the components that make up an item, the quantity used, and what other information about a finished good? a) The value of the material b) The vendor who supplies the material c) The relationships of raw materials and subassemblies d) The lot sizing used when purchasing raw materials

c) The relationships of raw materials and subassemblies

_________ is any danger to which a system may be exposed. a) Exposure b) Information security c) Threat d) Security

c) Threat

_____________ is the most prevalent form of communications wiring. a) Coaxial cable b) Fiber optics c) Twisted-pair wire d) Wireless

c) Twisted-pair wire

The Eller "GoodCat" website that allows for anonymous reporting of unethical behavior in Eller classes uses what type of business model? a) Transparency model b) Ethical drift model c) Whistleblower model d) Loyalty model e) Engagement model

c) Whistleblower model

Robots are useful ___________. a) as companions (e.g. cyberpooches) b) for driving cars (e.g. cyberchauffer) c) for handling monotonous tasks (e.g. factory work) d) only in science fiction (e.g. Terminator)

c) for handling monotonous tasks (e.g. factory work)

Google's main business reason for installing fiber in select US cities is to _______. a) begin competing with the cable distribution giants b) bring the internet to rural areas c) generate more web traffic, which generates more ad revenue for them d) give people an option other than the telecommunications companies who control existing cable networks

c) generate more web traffic, which generates more ad revenue for them

The three security challenges of wireless communication are confidentiality, accessibility, and _____. a) importance b) Internet c) integrity d) incorporation

c) integrity

The _________ prohibits an organization from collecting any personal information unless the customer specifically authorizes it. a) digital dossier policy b) information privacy policy c) opt-in model of informed consent d) opt-out model of informed consent

c) opt-in model of informed consent

When you use Google Drive to work on a document with a classmate, this is considered _________. a) crowdsourcing b) teleconferencing c) virtual collaboration d) workflow

c) virtual collaboration

Selecting computers with EPEAT power supplies should reduce the annual operating cost of a computer by what? a) $0.50 b) $2.50 c) $4.00 d) $7.00 e) $12.00

d) $7.00

Originally discussed by Dr. Gilliland, David Myers' (former controller of MCI/Worldcom) statement "I still don't know that one point when I started to cross the line...", is an example of how small, incremental repeated compounding of unethical decisions can result in what? a) Gut check b) Transparency test c) Whistleblowing d) Ethical drift e) Defining moment

d) Ethical drift

ERP systems are an evolution of _____________. a) AI b) CRM c) DSS d) FAIS

d) FAIS

Planned, recurring expenses that occur on a routine schedule, such rent or car payments that must be paid every month, are examples of what? a) Flexible expenses b) Deductions c) Discretionary expenses d) Fixed expenses e) Cash flow

d) Fixed expenses

As originally discussed by Dr. Gilliland, the classic values conflict with "Who Am I'" represents what type of ethical dilemma? a) Short-term vs. long-term b) Honesty vs. integrity c) Peer-pressure vs. boss-pressure d) Integrity vs. loyalty e) Organizational ethics

d) Integrity vs. loyalty

The success of a Group Decision Support System (GDSS) is based upon two key features: contributor anonymity (i.e., the identity of the person making the comment or suggestion is not known), and what other important feature? a) Analytical CRM b) Reintermiediation c) Disintermediation d) Parallel Discussions e) Six Sigma

d) Parallel Discussions

Which of the following business component are *not* included in an MRP-II planning cycle? a) Raw Materials b) Workforce c) Plant and Equipment d) Product Margins

d) Product Margins

Which of the following is a benefit of cloud computing? a) Privacy b) Reliability c) Security d) Productivity

d) Productivity

What type of business systems have the capability to place automatic requests to buy products from vendors in real time? a) AI (Artificial Intelligence) b) CRM (Customer Relationship Management) c) DSS (Decision Support System) d) SCM (Supply Chain Management)

d) SCM (Supply Chain Management)

In project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resources and what other dimension of the planning process? a) Alignment b) Feasibility c) Agility d) Scope e) Value

d) Scope

Which of the following is a problem with BYOD? a) Cost b) Productivity c) Satisfaction d) Security

d) Security

In the VAN (Voter Activiation Network) Relationship-Based Political Organizing video case study, the VAN was able to idenify the relationships of possible supporters using data from what source? a) Voter registration records b) Direct mail campaigns c) Online surveys d) Supporter's Facebook contacts e) Tax returns of registered voters

d) Supporter's Facebook contacts

______________________ is the wireless transmission and receipt of data gathered from remote sensors. a) A mobile portal b) A voice portal c) The Internet of Things d) Telemetry

d) Telemetry

Applications such as "find a friend" (FourSquare), driving directions (Smartrek), roadside assistance (OnStar), and fleet management (UPS and FedEx) are all examples of services that have been enhanced by knowing what? a) The identity of the requester b) The time the request was made c) The age of the requester d) The location of the requester e) The number of people making requests

d) The location of the requester

Which of the following is a DISADVANTAGE of purchasing prewritten software? a) It may eliminate the need to hire personnel specifically dedicated to a project. b) The company can know what it is getting before it invests in the product. c) The company can try out the software before purchasing it. d) The software is controlled by another company.

d) The software is controlled by another company.

The __________________ test proposes a scenario in which a man and a computer both pretend to be women or men, and a human interviewer has to identify which is the real human. a) Google b) SkyNet c) Terminator d) Turing

d) Turing

What does it mean to use a "SaaS" product? a) Deploy customer-created applications to a cloud b) Rent fundamental computing resources c) Have limited elasticity d) Use provider's applications over a network

d) Use provider's applications over a network

The web ____________ buyer power. a) decreases b) increases c) has no impact on d) has a mixed impact on

d) has a mixed impact on

Which of the following is the correct order of the traditional System Development Life Cycle (SDLC)? a) analysis, investigation, design, programming and testing, implementation, operation and maintenance b) analysis, investigation, design, implementation, programming and testing, operation and maintenance c) investigation, analysis, design, implementation, programming and testing, operation and maintenance d) investigation, analysis, design, programming and testing, implementation, operation and maintenance

d) investigation, analysis, design, programming and testing, implementation, operation and maintenance

The value of the "all time" total sales created by this projection could be calculated using what Excel function? a) average b) mean c) median d) sum e) count

d) sum

Telepresence is a version of ____________. a) email b) a portal c) unified communication d) videoconferencing

d) videoconferencing

Approximately what percentage of applications for jobs are rejected by potential employers before the interview due to public information posted online by the applicant (e.g. social networking, blogs, media sites, etc. - that is, your online reputation)? a) Less than 5% b) About 10% c) About 30% d) Less than 50% e) 60% or more

e) 60% or more

Which of the following would motivate businesses to create accessible eCommerce websites for their customers? a) To comply with ADA and Section 508 of the Rehabilitation Act b) To capitalize on a larger base of potential customers c) The website is likely easier for all users to navigate d) Only the first two of the above reasons e) All of the three reasons shown above

e) All of the three reasons shown above

Which of these is NOT an essential Cloud Computing characteristic? a) On-Demand Service b) Resource Pooling c) Elasticity (ability to change or scale) d) Measured Service, (Pay for like a utility, what you need) e) Compliance (HIPPA, PCI)

e) Compliance (HIPPA, PCI)

The task of brainstorming in a group decision support system is similar to what step in the knowledge management cycle? a) Disseminate b) Publish c) Refine d) Store e) Create

e) Create

Selecting an EPEAT compliant technology in place of traditional technology is an example of what order sustainability effect? a) 1st Order - Creation and Use b) 2nd Order - Application Substitution c) 3rd Order - Long-term Structural Change d) 4th Order- Transference e) 5th Order - Value Proposition

a) 1st Order - Creation and Use

Using telepresence to change from in-person meeting to online (virtual meetings), would be an example of what order sustainability effect? a) 2nd Order (application) b) 1st Order (existence) c) 3rd Order (structural change)

a) 2nd Order (application)

The password '4r1ZoN@' has how many variables ? a) 4 b) 1 c) 2 d) 3 e) 5

a) 4

A "Fishbone" process analysis diagram is also known as: a) A cause-and-effect diagram b) A correlation graph c) A cross-functional flowchart d) An organization chart e) A numerical analysis diagram

a) A cause-and-effect diagram

Your ABP "ticker symbol" is similar to what database concept? a) A key b) A table c) A record d) A field e) An ERD

a) A key

In the history of the cell phone case study, the inventor noted that prior to the invention of the cell phone, telephone numbers were generally associated with a place. After the invention of the cellphone, telephone numbers are most commonly associated with what? a) A person b) A place c) A location d) A ciphertext e) A packet

a) A person

In the video case about Dr. Chiu's Smartrek application, which of the following was not an incentive used to encourage driver participation? a) Ability to find other people for carpooling b) Possibility of avoiding traffic congestion c) Ability to earn points for charity d) Ability to help the community e) Ability to earn prizes and gift

a) Ability to find other people for carpooling

All of the symbols representing tasks and decisions that are shown in single column of a vertical cross-functional diagram are related to the same what? a) Actor b) Root Cause c) Decision Model d) Organization e) Entity

a) Actor

What part of an "IMG" (image) HTML tag meets the POUR principle of being "perceivable?" a) Alt (alt text) b) Character height c) Character width d) Src (file locaiton) e) Image filename

a) Alt (alt text)

What short-range wireless technology is commonly to connect smartphones with hands-free headsets for telephone calls and listening to music? a) Bluetooth b) WiMax c) Wavelength d) Spectrum e) Photon

a) Bluetooth

Harald Blaatand, who was the King of Demark from 940-981, is associated with what wireless technology? a) Bluetooth Technology b) Computer Wifi c) Cellular Telephone Networks d) Microwave Transmitters e) Satellite Transmitters

a) Bluetooth Technology

LEED refers to the efficiency of? a) Buildings b) Cars c) Desktop Computers d) Data Centers e) Aircraft

a) Buildings

What term was used to describe when large variations in demand occur in the supply chain even when consumer demand is constant? a) Bullwhip Effect b) Six Sigma c) CFAR Cycle d) SCOR Demand e) SMED Effect

a) Bullwhip Effect

In the Zara case, the company has aligned its information system strategy with what? a) Business strategy b) Product margins c) Decentralized intelligence d) Competitive position e) Efficiency model

a) Business strategy

Reintermediation is addressing what business issue that was the result of disintermediation? a) Buying complexity b) Value Proposition c) Product availability d) Production scheduling

a) Buying complexity

________________ allows you to access the internet through a coaxial media previously used only for TV connections. a) Cable modem b) Dial-up modem c) ADSL Modem d) SONET Modem

a) Cable modem

A cause and effect diagram, also known as a fishbone diagram, informs what type of decision? a) Causality b) Feasibility c) Budgeting d) Scheduling

a) Causality

What type of data mining analysis identifies patterns in the data based on demographic characteristics (e.g., sex, age, race, income, education)? a) Classification b) Association c) Clustering d) Forecasting e) Sequencing

a) Classification

Identifying patterns in data based on common temporal (time) or spatial (geographic) traits is based on what type of data mining analysis? a) Clustering b) Association c) Sequencing d) Forecasting e) Classification

a) Clustering

Xerox PARC's Unicomp was a precursor to which of the following topics also discussed in class? a) Collaboration b) Globalization c) Entrepreneurship d) Sustainability e) Data Mining

a) Collaboration

What do website project managers consider to be the most critical component of managing website transformation? a) Communication b) Organization c) Innovation d) Dedication e) Compensation

a) Communication

The "Porter's Forces" model deals with what aspect of globalized business? a) Competition b) Design c) Location d) Relationships e) Time

a) Competition

What technique has been used by companies such as Starbucks and Netflix used to engage large numbers of non-employees to innovate, manage, design and market new products? a) Crowdsourcing b) Executive dashboards c) Click-stream analysis d) Capacity planning e) Six Sigma

a) Crowdsourcing

Which of the following security measures would be considered a "last line defense" for Information Security? a) Cryptography b) Access Control c) Firewall d) Intrusion Detection e) Security SDLC

a) Cryptography

Why is shortage gaming the most difficult of the bullwhip effects for a company to manage? a) Customer deception b) Information latency c) Inaccurate prices d) Product obsolescence

a) Customer deception

What type of data mining presents information graphically so that users are able to identify patterns in the underlying data? a) Data Visualization b) Case-based Reasoning c) Neural Networks d) Rule Induction e) Nearest-neighbor Techniques

a) Data Visualization

In a business process diagram, a diamond shape is used to indicate what action? a) Decision b) Starting Point c) Ending Point d) User task

a) Decision

What technique allows alternatives with independent contributions with similar overall business values to be identified and evaluated? a) Decision Matrices b) Bullwhip Effect c) Ishakowa Diagram d) Neural Network e) Master Production Schedule

a) Decision Matrices

Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control? a) Defense in depth b) Just-In-Time c) Bullwhip effect d) Disintermediation e) Social Contract

a) Defense in depth

What term describes how two or more different authentication mechanisms were used to enhance security? a) Defense-in-depth b) Due Diligence c) Man-in-the-middle d) Intrusion detection e) Social Engineering

a) Defense-in-depth

Which of the following was NOT described as one of the four innovation zones? a) Disruptive Technology Zone b) Product Leadership ZoneProduct Leadership Zone c) Customer Intimacy Zone d) Category Renewal Zone e) Operational Excellence Zone

a) Disruptive Technology Zone

Which of the following is an informational role? a) Disseminator b) Disturbance handler c) Entrepreneur d) Figurehead

a) Disseminator

In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does ".edu" define? a) Domain b) Browser c) Protocol d) Resource e) Server

a) Domain

IT has changed the manager's job in many ways. Which of the following is NOT the result of this change? a) Easier to make a decision b) More information to address c) Remote supervision d) Real-time information

a) Easier to make a decision

In the SCOR model, competitive requirements such as reliability, responsiveness, and agility are all related to what dimension of a vendor's performance? a) Effectiveness b) Efficiency c) Mapping d) Productivity e) Modeling

a) Effectiveness

For companies managing their supply chain business processes using CPFAR (Collaborative Planning, Forecasting and Replenishment), the process improvements over the traditional ordering process could be primarily considered as an improvement in which of the following? a) Efficiency b) Quality c) Effectiveness d) Agility e) Feasibility

a) Efficiency

The outcomes of the E-Government Strategy report primarily focuses on improving business processes in which of the following ways ? a) Efficiency b) Desirability c) Feasibility d) Popularity e) Reliability

a) Efficiency

What is the most significant threat to information security in the cloud for most companies? a) Employee behavior b) Packet monitoring c) Remote hackers d) WiFi monitoring e) Defective Hardware

a) Employee behavior

A Virtual Private Network encrypts data and also verifies what else? a) End Points b) Application c) Network path

a) End Points

Besides sensors, radios, and chips, what is the value in the Internet of Things? a) Establishment of services on top of the connectivity b) Cheaper equipment costs c) Creating less data d) Companies that haven't failed e) Eliminates the need for a value proposition

a) Establishment of services on top of the connectivity

The law enforcement data used by the COPLINK system is primarily focused on managing what type of knowledge? a) Explicit b) Sticky c) Tacit d) Feasible e) Open

a) Explicit

Translating a product manual from one language to another is an example of what type of knowledge management conversion? a) Explicit to Explicit b) Tacit to Tacit c) Tacit to Explicit d) Explicit to Tacit

a) Explicit to Explicit

Perceived affordances includes perceptible affordances and what other type of affordance? a) False Affordance b) Hidden Affordance c) Correct Rejections d) Cultural Affordance e) Feasible Affordance

a) False Affordance

By allowing group members to contribute ideas anonymously online, the ThinkTank system could help a participant overcome which of the following difficulties? a) Fear of speaking b) Lack of focus c) Hidden Agendas d) Misunderstandings

a) Fear of speaking

Which type of media is least likely to be affected by electronic noise? a) Fiber Optic Cable b) CAT-3 Cable c) CAT-5 Cable d) Coaxial Cable e) Hertz Cable

a) Fiber Optic Cable

What database term describes the ERD attributes that are all associated with one ERD entity, such as an StudentID, that collectively compose a record? a) Fields b) Characters c) Keys d) Tables e) Files

a) Fields

What network security control prevents information from moving between two networks? a) Firewall b) Post Scanner c) Packet Sniffer d) Biometric Identification

a) Firewall

Car payments and rent are examples of what type of expenses? a) Fixed b) Discretionary c) Variable d) Pre-paid e) Flexible

a) Fixed

Which project management documentation includes information about all of the Triple Constraints? a) Gantt Chart b) Organization c) Time Line d) Pert Chart e) Work Breakdown

a) Gantt Chart

Satellites used for data communications that appear to be stationary from a fixed location on earth are placed in what type of orbit? a) Geosynchronous orbit b) Polar orbit c) Mid-earth orbit d) Elliptical orbit e) Commercial orbit

a) Geosynchronous orbit

Which of the following is an example of how individuals use technology in a way that that allow others easily to monitor and track their activities? a) Geotagging smartphone photos b) Hashtagging posts on Twitter c) Accessing a website d) Reading a blog post online e) Sending emails to friends

a) Geotagging smartphone photos

Related to the concepts of globalization, what computer "law" states that the bandwidth (speed) of data networks will double approximately every 24 months? a) Gilder's Law b) Moore's Law c) Metcalf's Law d) Ohm's Law e) Kepler's Law

a) Gilder's Law

Which of the following is a support activity in Porter's value chain model? a) Human Resources b) Logistics c) Operations d) Marketing e) Service

a) Human Resources

Which of the charts that you prepared for ABP-2 that is also called a Magic Quadrant, is commonly used in consulting and by businesses for the comparison of alternatives? a) I^2 (I-squared) Diagram b) Root Cause Diagram c) Cross-functional Diagram d) Bar Chart Diagram e) ans

a) I^2 (I-squared) Diagram

If your sales team shows a customer's name as "Johnny Smith", but your shipping department knows the customer as "John A. Smith", what type of data problem does this issue represent? a) Inconsistency b) Security c) Redundancy d) Isolation

a) Inconsistency

What type of inventory demand is based on the forecasted need for finished products? a) Independent b) Customer c) Dependent d) Required e) Shortage

a) Independent

Which of the following groups of voters would the DNC be most likely to contact with a persuasion campaign message? a) Independent voters who sometimes vote b) Democratic voters who sometimes vote c) Independent voters who always vote d) Republication voters who sometimes vote e) Democratic voters who always vote

a) Independent voters who sometimes vote

Which of the four IOT (Internet of Things) layers includes technology such as data centers, information security and data mining? a) Information Processing b) Integrated applications c) Network Construction d) Sensing and Identification

a) Information Processing

What term best describes when consumers are able to use their smartphones to obtain information about a company's competitor's product pricing, features, customer reviews and availability while shopping in their company's brink-and mortar store? a) Information transparency b) Crucial distinctions c) Accessibility d) Interference e) Multi-path

a) Information transparency

In the History of the Cell Phone video case, how did the use of cellular phones change the way in which calls were made? a) Instead of calling a place, calls to cellular telephones were associated with a person b) Calling a cellular telephone required the assistance of an operator c) A new system of telephone numbers were required to call cellular phones d) Cellular telephones could only call telephones within the local calling area e) Cellular telephones improved the sound quality that customers experiences

a) Instead of calling a place, calls to cellular telephones were associated with a person

As an employee of MCI/Worldcom, David Myers faced what classic ethical dilemma also described as a 'Who am I?'? a) Integrity versus Loyality b) Social Contract Theory c) Weak Learning Culture d) Procrastionation Culture e) Profit Maximizing Culture

a) Integrity versus Loyality

Business metrics that describe the performance of critical business activities are known as: a) Key performance indicators b) Residual risk assessments c) Business continuity plans d) Business intelligence analyses e) Decision trees

a) Key performance indicators

COPLINK, developed at the University of Arizona in the MIS Department's Artificial Intelligence Lab, allows law enforcement officers to integrate database information to identify crime suspects based on limited information (e.g., a license plate number or nick name). What term is used to describe the type of information system that is commonly used to maintain collection of experiential, reflective and solutions-oriented information? a) Knowledge management b) Group decision support systems c) Crowdsourcing d) Telepresence e) Spiderweb Mapping

a) Knowledge management

The risk of a project can be measured on what two scales? a) Likelihood and Impact b) Budget and Management c) Change and Control d) Vision and Goals

a) Likelihood and Impact

What type of customer intimacy zone innovation focuses on making structural modifications to established products in order to create a distinctive sub-category? a) Line-Extension Innovation b) Enhancement Innovation c) Marketing Innovation d) Experiential Innovation e) Value-engineering Innovation

a) Line-Extension Innovation

Which of the following issues related to wireless communication would NOT be a problem for an RFID (Radio Frequency Identification) system? a) Line-of-sight b) Monitoring c) Attenuation d) Interference e) Multi-path

a) Line-of-sight

Which of the following wireless issues would NOT be a problem for short range wireless applications, such as RFID, Bluetooth and NFC? a) Line-of-sight b) Interference c) Attenuation d) Multi-path e) Right-of-way

a) Line-of-sight

In the Martha Stewart case, which of the following issues resulting in Martha Stewart being convicted of criminal charges? a) Lying to the FBI b) Defaulting on a loan c) Selling stocks below book value d) Insider trading e) Falsely advertising her products

a) Lying to the FBI

How did pioneering the SMED (single minute exchange of die) technique to reduce setup improve Toyota's operation of its assembly process? a) Made assembly line more agile / flexible b) Eliminated the need for workers c) Reduced payroll and headcount costs d) Reduced design errors e) ans

a) Made assembly line more agile / flexible

Related to the concepts of globalization, what computer "law" states that value of the internet is related to the number of connections (users)? a) Metcalf's Law b) Gilder's Law c) Moore's Law d) Ohm's Law e) Kepler's Law

a) Metcalf's Law

An unobstructed, straight line-of-sight path between a transmitter and receiver is required by which of the following high-speed, commercial wireless network technologies? a) Microwave b) 802.11 Wi-Fi c) Bluetooth d) 3G Cellular e) Broadcast Radio

a) Microwave

Commonly-occurring and well-defined business activities such as scheduling employees work hours would be what category of organizational decision? a) Operational b) Fuzzy c) Strategic d) Management e) Validated

a) Operational

Which of the following is NOT one of the "4 P's" of innovation? a) Personalization b) Product c) Process d) Process e) Paradigm Shifts

a) Personalization

What term is used to describe a physical interface between peripheral devices and the computer? a) Port b) Session c) App d) Signal

a) Port

Since cell phones are "uniquely personal," the use of passive geolocation has raised what concern among users of mobile commerce? a) Privacy of personal information b) Accuracy of driving directions c) Identification of Showrooming d) Receiving accurate credit for incentives e) Incorrect shipping addresses for packages

a) Privacy of personal information

What type of innovation focuses on the supply side, looking for opportunities to remove non-value-adding steps from the workflow? a) Process Innovation b) Value-Engineering Innovation c) Value Migration Innovation d) Organic Innovation e) Enhancement Innovation

a) Process Innovation

The use of CPFAR would improve a company in all of the following ways, except what? a) Process effectiveness b) Process overhead c) Process efficiency d) Process accuracy e) Process latency

a) Process effectiveness

In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does "http://" define? a) Protocol b) Browser c) Domain d) Resource e) Server

a) Protocol

The old accounting maxim of "promise low" and "deliver high" is related what costing and budget concept? a) Prudence b) Accruals c) Consistency d) Variance

a) Prudence

What term was used to describe a website that can adapt to the type of device being used to access the website? a) Responsive b) Augmented c) Optimized d) Transformed e) Validated

a) Responsive

Google Docs is an example of what type of service? a) SaaS b) IaaS c) GaaS d) PaaS e) TasS

a) SaaS

As discussed in class, what company was founded in the Globalization 2.0 era based on the business model of selling discontinued product lines directly to consumers by using a new transportation infrastructure to reach a geographically distributed customer base? a) Sears, Roebuck & Co. b) Ebay.com c) Overstock.com d) Wal-Mart e) BigLots!

a) Sears, Roebuck & Co.

A Virtual Private Network uses tunneling to encrypt data and uses authentication to verify what else? a) Sender's and receiver's identity (end points) b) Browser version compatibility c) Valid data encryption key d) Transmission path on network

a) Sender's and receiver's identity (end points)

In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what analogy in the real world did he use to describe TCP? a) Sending information taped to post cards b) Sending information using radio transmitters c) Sending information using secret messages d) Sending information encoded with barcodes e) Sending information using the sematic web

a) Sending information taped to post cards

The accounting value of a firm is equal to what? a) Shareholder Equity b) Assets c) Liabilities d) Stock Price e) Annual Dividend

a) Shareholder Equity

Using a hardware token as your NetID+ authentication method uses which of the following methods? a) Something you have b) Something you are (biometrics) c) Something you know d) Something you do

a) Something you have

Creating a business process that can be franchised is an example of what type of knowledge management conversion? a) Tacit to Explicit b) Tacit to Tacit c) Explicit to Tacit d) Explicit to Explicit

a) Tacit to Explicit

What term is used to describe a user who common access with specific privileges to a shared software instance? a) Tenant b) Community c) Honeynet d) Platform e) Vendor

a) Tenant

In the Video Case on Michael Porters Competitive Forces What Industry was described as being Terrible in Every Category? a) The Airline Industry b) The Railroad Industry c) The Supermarket Industry d) The Cattle Industry

a) The Airline Industry

Porters five forces focuses on what part of competition? a) The Business Environment b) The Five Core Internal Processes of a Business c) The Business Supply Chain d) The Five Core Business Functional Areas

a) The Business Environment

A Stacked Area chart is good for showing relative contributions of different series to a total over time, but they have one big limitation, which is? a) They can't show negative values b) They can only include 3 series c) One series can be hidden behind another series d) They can only show four points in time e) They tend to lack color and not draw the eye

a) They can't show negative values

What term would be used to describe any danger to which is system my be exposed? a) Threat b) Audit c) Espionage d) Visibility e) Violation

a) Threat

In a vertical cross-functional business process diagram, the order of items in one column (from top to bottom) shows what relationship among these items? a) Time b) Cost c) Importance d) Frequency e) Skill level

a) Time

Hierarchical Diagrams are commonly used for all of the following except? a) Time series data b) Organizational Charts c) Project Task Decomposition d) Bill of Materials

a) Time series data

Which of these is NOT enumerated as a Motivation to Create Accessible Web Content? a) To improve the reliability of technical functionality (technology centered motivations) b) To improve the lives of people with disabilities (human-centered motivations) c) To capitalize on the a wider audience or consumer base (marketing or economic-centered motivations) d) To avoid lawsuits and/or bad press (public relations and punishment-centered motivations)

a) To improve the reliability of technical functionality (technology centered motivations)

In financial markets, a "ticker symbol" identifies what? a) Traded Company b) Stock Exchange c) Sales Transaction Record d) Stock Broker's Identification e) Customer's Identification

a) Traded Company

Which of the information layers in the Internet of Things model focuses on the communication networks that connect the sensors that actually collect the data? a) Transmission Layer b) Generation Layer c) Processing Layer d) Application Layer e) Metadata Layer

a) Transmission Layer

A company's "ticker" or stock symbol serves what role on a stock trading exchange? a) Uniquely identifies a traded stock b) The time and date the stock was sold c) The broker selling the stock d) The change (up or down) in price from the last purchase price e) The official company logo used for stock transactions

a) Uniquely identifies a traded stock

Entrepreneurship is a market-oriented mechanism for advancing what aspect of innovation? a) Value Proposition b) Product Feasibility c) Profitability d) Marketability e) Globalization

a) Value Proposition

Information being represented in multiple forms, such as narrative text, numeric values, and multi-media formats, relates to what challenge for managing Big Data? a) Variety b) Veracity c) Volume d) Velocity

a) Variety

Weak passwords are a(n) ___________ threat. a) employee b) outside c) hardware d) software

a) employee

Data ___________ means all applications are able to access the same data, which is ___________ by databases. a) independence; maximized b) independence; minimized c) isolation; maximized d) isolation; minimized

a) independence; maximized

What is the correct filename to use for your ABP-3B website? a) index.html b) abp3a.html c) website.html d) public.html e) home.html

a) index.html

The shortage for week 4 (identified by the red box) will be how many units? a) 5 b) 20 c) 25 d) 100

b) 20

YouTube's main revenue stream is _________. a) Subscription membership b) Advertising c) A-la-carte/spot video purchasing d) Selling storage space

b) Advertising

What is the importance of the triple constraint? a) You must funnel all resources into only one of the constraints b) Any changes to one constraint will likely affect the project outcome c) Security is the most important constraint d) Time, resources, and scope don't matter

b) Any changes to one constraint will likely affect the project outcome

Users first started bringing their PCs to work to improve their productivity in the 1970s; this is similar to the __________ phenomenon today. a) AI b) BYOD c) ERP d) RFID

b) BYOD

In the decision support process, formulating a module to be evaluated and setting criteria for making a choice would occur during what phase of the decision making process? a) Choice Phase b) Design Phase c) Functional Phase d) Intelligence Phase e) Operational Phase

b) Design Phase

In recognizing ethical situations, which of the following is related to a chemical reaction that occurs in your body, specifically your intestinal track? a) Ethical drift b) Gut check c) Transparency test d) Gut punch e) Taste check

b) Gut check

With respect to authentication, a smart ID card is something the user _______. a) Does b) Has c) Is d) Knows

b) Has

Selecting EPEAT-compliant technology with a high rating over traditional, less energy efficient technology is an example of focusing on what sustainability effect? a) Use of government regulation to eliminate wasteful products b) Creation, Use and Disposal of a product c) Substitution by using alternative methods d) Impacts of long term structural change e) Increased awareness through the use of metrics

b) Creation, Use and Disposal of a product

Maintaining multiple copies of the same data in multiple information systems that can be independently updated commonly results in what information management problem? a) Data isolation b) Data inconsistency c) Data devaluation d) Data compression e) Data validation

b) Data inconsistency

___________ support local control, whereas ____________ support central control. a) Data marts; data dictionaries b) Data marts; data warehouses c) Data warehouses; data dictionaries d) Data warehouses; data marts

b) Data marts; data warehouses

A business intelligence tool that uses abstractions such as color and graphical images like instrument gauges to allow executives to grasp business situations quickly is known as a: a) Planning Horizon b) Digital dashboard c) Expert system d) Neural network e) Geographic information system

b) Digital dashboard

What category of location-based services would best describe products such as "location-based gaming", "social networking," and "find a friend"? a) Information Services b) Entertainment c) Mobile Resource Management d) Personal Security e) Social Networking

b) Entertainment

With respect to a database, what term is used to describe an abstract representation of all of the information included in a data structure about a particular type of entity? a) Entity Attribute b) Entity Class c) Entity Key d) Entity Model e) Entity Table

b) Entity Class

_______________ is knowledge that has been codified or documented. a) Data b) Explicit knowledge c) Information d) Tacit knowledge

b) Explicit knowledge

What term describes the ability of a person to effectively evaluate and manage one's finances in order to make prudent decisions toward reaching life's goals? a) Personal Accounting b) Financial Literacy c) Household Finance d) Expense Management e) Risk Management

b) Financial Literacy

Allowing individuals to file tax returns, renew driver's licenses, and obtain various permits online is an example of what type of eGovernment? a) Government-to-business (G2B) b) Government-to-citizen (G2C) c) Government-to-employees (G2E) d) Government-to-government (G2G) e) Government-to-suppliers (G2S)

b) Government-to-citizen (G2C)

The ____________________ is a summary of information needs of the functional areas and of the organization as a whole. a) Application portfolio b) IT environment c) Mission d) Objective of the IT function

b) IT environment

Which of the following is TRUE? a) IT can eliminate any job. b) IT impacts entire industries. c) IT opens up jobs for middle managers. d) IT only helps improve employees' health and safety.

b) IT impacts entire industries.

With ____________, the customer manages applications, data, and the operating system while the vendor manages the servers, virtualization, storage, and networking. a) DaaS b) IaaS c) PaaS d) SaaS

b) IaaS

The terms "contextual," "relevant," and "actionable" are commonly related to what term? a) Information b) Knowledge c) Repository d) Alignment e) Relationship

b) Knowledge

Making the Adobe Creative Cloud is now available to UofA students. What approach for software acquisition did the UoA used to allow students to have access to this software? a) Buy (Ownership of Intellectual Property) b) Lease (Right to Use Product) c) In-House Development (Writing Software) d) Open Source (Non-proprietary software) e) Government Seizure (Right of Eminent Domain)

b) Lease (Right to Use Product)

In the Personal Branding video case, which of the following online platforms was idenfied as being primarily a business networking tool? a) Facebook b) LinkedIn c) Democratic voters who sometimes vote d) Wordpress e) Amazon.com

b) LinkedIn

What is NOT a factor contributing to the Bullwhip Effect? a) Shortage Gaming b) Outsourcing c) Price Promotions d) Batch Purchasing e) Forecasting/Trend Analysis

b) Outsourcing

______________ clouds are the most secure because they can be placed behind an organization's firewall. a) Hybrid b) Private c) Public d) Vertical

b) Private

Internet-enabled globalization does the following: a) Forces new suppliers to distribute products using traditional distribution networks b) Removes geography as a barrier to relationships c) Creates barriers that protect "olive tree" products d) Forces competitors to share sales information and product pricing

b) Removes geography as a barrier to relationships

In the Thoughtful Design video case, Don Norman explained cultural perceptions in design through the use of what common, everyday item? a) Opening and closing a door b) Salt and pepper shakers c) A shopping cart d) The signs on restroom doors e) Trash and cigarette waste containers

b) Salt and pepper shakers

What normative theory of ethics focuses on the belief that manager's actions should be guided by the understanding that they are entrusted with a responsibility to manage and protect the assets of the company for the benefit of all of those who the actions of the firm affect? a) Stockholder b) Stakeholder c) Social Contract d) Organizational e) Loyalty

b) Stakeholder

What type of problem has an optimal solution can be reached through single set of steps based on an algorithm? a) Strategic b) Structured c) Management d) Collaborative e) Unstructured

b) Structured

Subjective knowledge that is based an individual's experiences is known as what? a) Refined knowledge b) Tacit knowledge c) Technical knowledge d) Explicit knowledge e) Procedural knowledge

b) Tacit knowledge

When displaying a webpage, such as http://www.u.arizona.edu/~wilbur, what is the name of the directory the web browser will check in the "wilbur" account for the "index.html" website? a) The "home" directory b) The "public_html" directory c) The "www" directory d) The "wilbur" directory

b) The "public_html" directory

What is considered to be the high-capacity data transmission core of the Internet structure? a) NAP b) Tier 1 ISP c) Tier 3 ISP d) LAN

b) Tier 1 ISP

As a possible password, how many variables would the password MIS111Exam (just the underlined string of characters) have when assessing its security strength? a) 1 b) 2 c) 3 d) 4 e) 5

c) 3

Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control? a) Bullwhip effect b) Just-In-Time c) Defense in depth d) Disintermediation e) Social Contract

c) Defense in depth

Purchasing an entire box of screws, even though only a small number are need for the master production schedule is an example of making a purchasing decision based on what approach? a) Fixed order quantity b) Lot-for-Lot c) Economic Order Quantity d) Independent Demand

c) Economic Order Quantity

With respect to an individual, what term describes the process of managing one's earnings, savings, and debt to meet the actual and budgeted expenses? a) Personal Accounting b) Financial Literacy c) Personal Finance d) Expense Management e) Risk Management

c) Personal Finance

What is the term used to describe the process of reducing the number of dimensions of a multi-dimensional data cube (e.g., from three dimensions, perhaps season, location, and product, into two dimensions, such as season and location)? a) Simplification b) Variable c) Projection d) Context e) Function

c) Projection

Parking garage passes and access control on employee ID badges are examples of: a) Bluetooth b) LEO c) RFID d) 4G / cellular

c) RFID

Which of the following actions would be considered a biometric authentication? a) Requiring a user to enter a secret password b) Requiring a user to swipe a CatCard c) Requiring a user to scan their fingerprint d) Requiring a user to sign their signature e) Requiring a user to type a group of displayed letters

c) Requiring a user to scan their fingerprint

Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project? a) Whether the major project milestones are being completed on budget b) Individual work assignments for persons assigned to the project c) The project milestones and the order they are scheduled to be completed d) Whether project tasks have been organized in the most efficient order e) The quality of the work performed during each major project milestone

c) The project milestones and the order they are scheduled to be completed

The equity on a company's balance sheet is most closely related to which of the following? a) Market value b) Operating income c) Share price d) Book value e) Gross margin

d) Book value

As discussed in class, a key concern for a startup business is the "burn rate" for their initial capital. What financial report best describes a company's "burn rate" for investors? a) Balance sheet b) General ledger c) Income statement d) Cash flow statement e) Ticker symbol statement

d) Cash flow statement

Which of the following is true about a Hybrid Cloud? a) Is owned by the firm using it b) Is leased from another company c) It provided by government agencies d) Combines private and outsourced resources

d) Combines private and outsourced resources

Which of the following knowledge management concepts includes an organizational culture focused on problem solving, a desire to share knowledge because of mutual interest, and norms that build trust, such as might be found in an MIS 111 FlexLab? a) Best practices community b) Knowledge management cycle c) Intellectual capital community d) Community of practice e) Click-stream analysis

d) Community of practice

What technique has been used by companies such as Starbucks and Netflix used to engage large numbers of non-employees to innovate, manage, design and market new products? a) Executive dashboards b) Click-stream analysis c) Capacity planning d) Crowdsourcing e) Six Sigma

d) Crowdsourcing

Concerns over using data to illegally discriminate against an individual or group, reaching wrong conclusions due to data contamination, and violating intellectual property (ownership of information) protections were legal and ethical issues discussed in relation to what topic discussed during this module? a) Telemedicine b) Crowdsourcing c) Click-stream analysis d) Data mining e) Project management

d) Data mining

The Internet of Things can be described as three "any"-type connections. What are these three "any" connections? a) Any time, any place, any thing b) Any price, any person, any network c) Any time, any place, any network d) Any place, any person, any industry

a) Any time, any place, any thing

What issue that is normally considered a challenge for wireless communication serves as the basis for spatial multiplexing? a) Attenuation b) Interference c) Multi-path d) Line-of-sight e) Right-of-way

a) Attenuation

Which of the following could always be used to prevent a hacker from compromising a Bluetooth network? a) Attenuation b) Line-of-sight c) Foot-printing d) Intrusion Detection e) Multi-path Reflections

a) Attenuation

Which of the following elements of your ABP-3B website would not normally have an impact on your organic page rank? a) Background Colors for Table Columns b) Keyword Density c) Image Alt tags d) Image Filenames e) Title Tag

a) Background Colors for Table Columns

Which of the following is NOT a value-adding attribute of mobile computing? a) Bandwidth improvement b) Instant connectivity c) Localization d) Ubiquity

a) Bandwidth improvement

In the video case study of Porter's Forces, Michael Porter commented that the airport's control of gates represented which of the five forces? a) Bargaining Power of Suppliers b) Potential Threat of New Entrants c) Threat of Substitute Products d) Bargaining Power of Buyers e) Industry Rivalries

a) Bargaining Power of Suppliers

Which of the following terms would NOT commonly be associated with analog data? a) Bits per second (bps) b) Frequency c) Continuous d) Cycles per second e) Hertz (Hz)

a) Bits per second (bps)

The expansion of telecommunications infrastructure occurred primarily during what era of globalization, as described by Thomas Friedman? a) Companies b) Countries c) Individuals d) Entrepreneurial e) Sustainable

a) Companies

What common term was used with both human-computer interaction and In a database entity relationship diagram as a way of limiting choices by the user and also specifying the minimum and maximum possible values that may exist for a relationship between two entities, respectively? a) Constraint b) Entity Class c) Diagram d) Relationship e) Attribute

a) Constraint

What type of software system allows a user to publish, edit, and modify websites from central interface and manage the development workflow in a collaborative environment? a) Content Management Systems b) Augmented Reality Systems c) Group Decision Support Systems d) Google Analytics e) Crowdsourcing Systems

a) Content Management Systems

What is the name for the path containing the minimum set of tasks that you must traverse in order to reach completion of your project on time? a) Critical Path b) Scope Triangle c) Mythical Man Month d) Project Plan

a) Critical Path

Focusing on improving existing products by extending product lines and improving product features is what type of innovation? a) Customer Intimacy b) Product Leadership c) Operational Excellence d) Category Renewal e) Open-source Development

a) Customer Intimacy

Which group of voters would result in the highest return on investment (i.e., largest number of votes for a DNC candidate) using a get-out-the-vote (GOTV) strategy? a) Democratic voters who sometimes vote b) Independent voters who always vote c) Independent voters who sometimes vote d) Republication voters who sometimes vote e) Democratic voters who always vote

a) Democratic voters who sometimes vote

Setting the criteria for making a choice and searching for alternatives typically occurs in what phase? a) Design b) Intelligence c) Choice d) Execution e) Transactional

a) Design

When major airlines (American, Delta, United, etc.) bypass travel agents and directly market tickets to customers from the airline's corporate website, this is an example of using what type of business sales strategy? a) Disintermediation b) Crowdsourcing c) Group Systems d) Reintermediation e) Communities of Practice

a) Disintermediation

What type of innovations are intended to be incompatible with existing standards and value chain, and must develop markets de novo (latin for "from the beginning")? a) Disruptive Innovation b) Application Innovation c) Platform Innovation d) Product Innovation e) Profit Innovation

a) Disruptive Innovation

What type of innovations are intended to be incompatible with existing standards and value chain, and must develop markets de novo (latin for "from the beginning")? a) Disruptive Innovation b) Application Innovation c) Product Innovation d) Platform Innovation e) Profit Innovation

a) Disruptive Innovation

According to the mythical man-month what is the reason adding people to a project will not speedup your project? a) Increased complexity of interpersonal communications b) Increased spending on personnel c) Increased critical path milestones for the project d) Each increase in the staff requires a corresponding extension to the project due date

a) Increased complexity of interpersonal communications

In Thomas Friedman's discussion of globalization, he described the process of globalization as being realized through actions that were first defined by your country, then later defined by multi-national companies, and finally, in the most recent age of globalization is defined by: a) Individuals b) International treaties c) Social media d) Financial markets e) Political parties

a) Individuals

Co-location of trading computers at the stock exchange would provide what type of competitive advantage for a company like Goldman Sachs with respect to Porter's Forces? a) Industry Rivalries b) Potential Threat of New Entrants c) Threat of Substitute Products d) Bargaining Power of Suppliers e) Bargaining Power of Buyers

a) Industry Rivalries

What dimension of Porter's Forces focuses on the decision that a buyer makes when choosing among direct, existing competitors when all of the competitors offer the same identical name-brand product (e.g., an iPhone 6)? a) Industry Rivalry b) Threat of Substitution c) Threat of New Entrants d) Buyer power e) Supplier power

a) Industry Rivalry

Data collection and the identification and statement of the problem occurs in what phase of decision making? a) Intelligence b) Choice c) Design d) Execution e) Transactional

a) Intelligence

Operating unregulated WiFi networks, clickers, Bluetooth headsets, cordless telephones, and microwave ovens using the same 2.4GHz ISM frequency range in close proximity to one another might result in what problem? a) Interference b) Attenuation c) Multi-path d) Line-of-sight e) Right-of-way

a) Interference

How does adding social networking to the VAN allows candidates to improve the effectiveness of their volunteers? a) Leverages personal relationships b) Sending campaign tweets automatically c) Automatically registers new voters d) Eliminates the need for blockwalking e) Replaces campaign volunteers with computer bots

a) Leverages personal relationships

On your personal financial balance sheet, your student loans would be classified in what category? a) Liability b) Assets c) Net Worth d) Prepaid Expense e) Expenditures

a) Liability

In general, what you think of as the quality of your network connection speed when you are using your PC, iPad, or Smartphone is most influenced by which of the following? a) Local Tier-3 ISPs b) Backbone Tier-1 ISPs c) Regional Tier-2 ISPs d) Location of the content provider's servers e) Protocols used for Layer-1 transmission

a) Local Tier-3 ISPs

Related to the concepts of globalization, what computer "law" states that the density of transistors will double approximately every 18 months? a) Moore's Law b) Metcalf's Law c) Gilder's Law d) Ohm's Law e) Kepler's Law

a) Moore's Law

Allocating resources based on the frequency of past incidents in an area would be an example of using what predictive Data Mining strategy? a) Nearest neighbor b) Case-based reasoning c) Neural Networks d) Rule Induction

a) Nearest neighbor

Which of the following does a "PING" command NOT display about the computer? a) Network security b) It's IP Address c) Network latency d) Packet loss e) It's URL

a) Network security

What term means users that cannot change or update the data in data warehouses or data marts? a) Nonvolatile b) Integrated c) Organized d) Consistent e) Relational

a) Nonvolatile

Explicit, or "leaky" knowledge, is based on information that is: a) Objective and rational b) Subjective and cognitive c) Informally communicated with an organization d) Dependent on an employee's experience e) Customized by each user

a) Objective and rational

What was the central issue in the Stacy Snyder in-class discussion case? a) Online Reputation b) Geotagging c) Lying about qualifications d) Age discrimination e) Cheating on an exam

a) Online Reputation

In what SDLC stage would making a change to the systems requirements have the highest economic and behavioral costs? a) Operation and Maintenance b) Systems Design c) Programming and Testing d) Implementation

a) Operation and Maintenance

Which of the following permits the company to collect personal information until the customer specifically requests that the data not be collected? a) Opt-out model of informed consent b) Digital dossier policy c) Personal information privacy policy d) Opt-in model of informed consent e) Privacy Paradox

a) Opt-out model of informed consent

Although globalization has been underway for many centuries, digitization, networking, and connectiveness have dramatically increased what? a) Pace of Change b) Number of "Olive Tree" products and services c) Data Redundancy d) Revenue per Employee e) Worker Productivity

a) Pace of Change

The Gainesville police department started using the internet to accomplish all of these objectives except? a) Demystify law enforcement operations for the citizens of Gainesville. b) Motivate community groups to have a stronger hand in addressing crime. c) Enable individual citizens to better protect themselves from criminal activity. d) Empower businesses to identify high crime areas and determine appropriate levels of security.

d) Empower businesses to identify high crime areas and determine appropriate levels of security.

In the Jack Welch Video Case what practice was he discussing to enhance customer satisfaction? a) Six-Sigma b) Total Quality Management c) SMED d) The Toyota Production System

a) Six-Sigma

In the video case for Nestle, data-driven decisions were primarily based on visualizations of information from what source? a) Social Media Platforms b) Investment Analyst Forecasts c) Financial Performance Reports d) Cost and Production Schedules

a) Social Media Platforms

The doughnut model describes a "Safe And Just Space for Humanity" as a space bounded by the environmental ceiling and what other construct as the floor? a) Social foundation b) Planetary Boundaries c) Sustainable Development Goals (SDGs) d) Ecosystem Assessment e) Ethical Framework

a) Social foundation

Donut Charts are difficult to read, Microsoft recommends what as an alternative? a) Stacked Column or Bar Charts b) Scatter Charts c) Pie Charts d) Cake Charts

a) Stacked Column or Bar Charts

On a balance sheet, assets must equal the sum of liabilities and what other financial measure? a) Stockholder's Equity b) Gross Margin c) Retained Earnings d) Net Income e) Dividend Yield

a) Stockholder's Equity

Identifying majors with specific language and mathematics requirements using the Degree Search selection filters help you solve what type of business problem? a) Structured b) Economic c) Fuzzy d) Strategic e) Unstructured

a) Structured

A company's IT architecture (e.g., data networks, applications, and databases) is related to what type of feasibility? a) Technical b) Behavioral c) Economic

a) Technical

Telemedicine's approach is similar to what other collaborative business process? a) Telepresence b) Crowdsourcing c) Workflow d) Group systems e) Knowledge Management

a) Telepresence

Which of the following does a Fishbone Diagram typically not inform you about a problem? a) The cost of correcting a problem with a process b) Identifies the major categories of a problem c) Identifies many of the root causes of problems d) Helps guide the process improvement process e) Organizes the problems associated with a process by the major categories

a) The cost of correcting a problem with a process

In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what common problem did his analogy using the postal service to email a page from a book have with sending TCP packets? a) The message might get lost and not delivered b) The message might get changed in route c) The message might not get sent d) The message might be illegible e) The message might be in the wrong language

a) The message might get lost and not delivered

As I move farther away from campus, I notice that my UAWiFi connection gets progressively weaker. What factor will always cause this to occur? a) The signal strength is lost due to attenuation b) The signal blocked by strong encryption c) The signal cannot be received due to interference d) The signal is blocked due to right-of-way restrictions

a) The signal strength is lost due to attenuation

The big advantage of bubble charts over scatter charts is? a) They add another dimension b) They are more colorful c) They allow negative values on the Y axis d) There is no advantage

a) They add another dimension

What common function do "HTTP", "TCP" and "IP" share? a) They all define internet-based protocols b) They all are website domains c) They all are data encryption methods d) They are abbreviations for physical media e) They are common computer viruses

a) They all define internet-based protocols

Pie charts have several limitations, including all of the following except? a) They have limited color and don't draw the eye and attention b) They can only show one series c) They cannot show negative values d) When two or more items are close in value it can be

a) They have limited color and don't draw the eye and attention

Treemap Charts largest advantage over bar or column charts is? a) They show individual values relative to the sum of the series as well as other values b) They allow multiple series to be displayed c) They allow time series data to be displayed d) There is no actual advantage

a) They show individual values relative to the sum of the series as well as other values

Which of the following would NOT be considered a type of social engineering ? a) Trojan Horse b) Spear Phishing c) Tailgating d) Vishing e) Smishing

a) Trojan Horse

In the root cause analysis video case, what was the solution to preventing the marble from crumbling at the Jefferson Memorial? a) Turning the lights on one hour after sunset b) Spraying pesticides at dusk to kill the spiders c) Using netting to block the birds from entering d) Using a milder cleaning solution for marble

a) Turning the lights on one hour after sunset

Based on the clickstream data in the image, what level of support would the following assertion have: "If a students checks "Mygrades", then they will also access the PAR assignment" a) 25% Support b) 50% Support c) 75% Support d) 100% Support

b) 50% Support

13. ______________ refers to determining who is responsible for actions that were taken. a) Acceptance b) Accountability c) Liability d) Responsibility

b) Accountability

Physical properties (shape, texture, color, etc.) of an object that allow someone to use an object correctly without the need for labels or instructions are known as: a) Constraints b) Affordances c) Distinctions d) Feedback e) Models

b) Affordances

What is the term used to describe a graphical description of a database that describes the way in which an organization's data and business activities are associated with one another? a) A Model of Efficiency b) An Entity Relationship Diagram c) An Enterprise Resource Design d) A Throughput Analysis e) An Artificial Database Scheme

b) An Entity Relationship Diagram

Disclosing personal information such as your race, religion, sex, disabilities, and age on social media undermines what type of protections otherwise provided to you as a citizen in the United States? a) Wage discrimination laws b) Anti-discrimination laws c) Voter eligibility laws d) Commercial driver's license eligbility laws e) Personal credit eligibility laws

b) Anti-discrimination laws

What term is used to describe the behavior where small changes in customer demand that result in large variations in raw material orders causing inefficiency in the supply chain? a) Supply Chain Operations Reference (SCOR) Model b) Bullwhip effect c) Just-In-Time Orders d) Reverse Auctions e) Single-Minute Exchange of Dies (SMED)

b) Bullwhip effect

What term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding? a) Semiotic Engineering b) Conceptual model c) Emotional design d) Design Intention

b) Conceptual model

An entrepreneur developing detailed documentation of their business processes so that they can be offered to other individuals as a franchise operation is an example of: a) Converting explicit knowledge into tacit knowledge b) Converting tacit knowledge into explicit knowledge c) Creating a community of practice d) A time-delayed response e) Dependent demand

b) Converting tacit knowledge into explicit knowledge

From a user's perspective, perceived affordances would include actual perceptible design affordances and what other category of perceptual affordances? a) Correct rejection of design characteristics that are not affordances b) Hidden design affordances c) Design mitigation affordances d) False or fake design affordances e) Accessible affordances

d) False or fake design affordances

In the Online Democracy model, the "Voter Activation Network" uses voter registration rolls to categorize voters as always/sometimes/never voting by using information obtained from: a) Online media b) Commercially-generated databases c) Private sector polling d) Government records e) Partisan political organizations

d) Government records

Pioneered at the University of Arizona, what decision support technology as developed to address problems such as a lack of focus, fear of speaking, hidden agendas and misunderstandings then collaborating with others? a) Data Mining b) Communities of practice c) Executive Dashboard d) Group Decision Support Systems e) Crowdsourcing

d) Group Decision Support Systems

In addition to possessing contextual and relevant information, what other characteristic aspect does knowledge possess? a) It is an entity class b) It solves a structured problem c) It is always displayed visually d) It is actionable e) It is consistent

d) It is actionable

What is NOT a benefit of telemedicine? a) It improves access to healthcare b) It provides real-time care to isolated areas c) It reduces the need to move the patient d) It requires traveling so doctors can see their patients in person

d) It requires traveling so doctors can see their patients in person

______________ is the process of forming a digital dossier. a) Dossiering b) Information privacy c) Privacy d) Profiling

d) Profiling

Your username (UANetID) is your claim of identify to a computer system. When the computer system verifies your identify by requiring you to enter a password is an example of what type of authentication? a) Something a user is b) Something a user has c) Something a user does d) Something a user knows e) Something a user inherits

d) Something a user knows

Sensors, RFID tags, meters, GPS, and other devices are used to collect supply chain information. These are all examples of __________. a) Batch processing b) OLAP c) OLTP d) Source data automation

d) Source data automation

In the Software Development Lifecycle Process (SDLC), in what SDLC stage is it the most costly to make changes to the system requirements a) Systems Design b) Systems Programming c) Systems Testing d) Systems Operation and Maintenance e) Systems Implementation

d) Systems Operation and Maintenance

Assume you need to put a sign that says "PUSH" on a door handle to explain the correct way to operate the door. The "PUSH" sign helps a user understand what aspect of usability? a) The sign explains a perceptible affordance b) The sign explains a correct rejection c) The sign explains a hidden affordance d) The sign explains a false affordance e) The sign explains a consistent affordance

d) The sign explains a false affordance

What type of diagram helps a company assess the factors that inhibit change and encourage maintaining the status quo? a) Cross-functional diagram b) Ishikawa diagram c) Team spiderweb d) Tug-o-war diagram e) Inter-relationship graph

d) Tug-o-war diagram

_____________ is the act of locating WLANs while driving around a city. a) A rogue access point b) Eavesdropping c) RF jamming d) War driving

d) War driving

IT allows the workplace to expand to 24 hours a day at _______________, which is a benefit for ___________. a) a central location; only employees b) any location; only employers c) a central location; employers and employees d) any location; employers and employees

d) any location; employers and employees

The _____________ approach states that an ethical action is the one that provides the most good or does the least harm. a) common good b) fairness c) rights d) utilitarian

d) utilitarian

A feature of an object that limits possible (often incorrect) uses of a device is known as: a) False causality b) A visible metaphor c) A conceptual distinction d) An affordance e) A constraint

e) A constraint

In the "Don Norman: Thoughtful Design" Video Case, what did he say was the most important part / thing to take into account when creating a good and thoughtful design? a) Simplicity b) Flexibility c) How will it works d) How the designer thinks it should work e) How the user thinks it should work

e) How the user thinks it should work

In the video case on the "Business Value of RFID," RFID improved the business operations of American Aprarel EXCEPT: a) Shoplifting (Shrinkage) b) Stockouts c) Selling products at full price d) Finding misplaced inventory e) Identifying defective merchandise

e) Identifying defective merchandise

In the McGinn model of design, the least common category of design elements would be related to what factor in the McGinn model? a) Context b) Culture c) Human Sensory d) Group e) Individual

e) Individual

On a cross-functional diagram, what term is used to identify the tasks associated with a specific individual or process? a) Execution thread b) Work Sociogram c) Inter-relationship Digraph d) Critical path e) Swim lane

e) Swim lane

Substituting face-to-face meetings with telecommuting and online distance learning are examples of how technology produces what order sustainability effect? a) 2nd Order - Application Substitution b) 1st Order - Creation and Use c) 3rd Order - Long-term Structural Change d) 4th Order- Transference e) 5th Order - Value Proposition

a) 2nd Order - Application Substitution

What term is used to describe an online advertising service developed by Google, where advertisers pay to display advertising, product listings, and video content as a result of Google search. a) Adwords b) Pagerank c) Organic d) Hashtags e) Responsive

a) Adwords

Which company used software to disrupt the previous market-leading companies in the book industry? a) Amazon b) Barnes and Noble c) Books-a-Million d) Walmart

a) Amazon

The human voice is a (an): a) Analog Signal b) Digital Signal c) Hybrid Signal d) Natural Signal e) Weighted Signal

a) Analog Signal

What term is used to describe the unintended consequence that the overuse of decision making tools results in the inability to make decisions? a) Analysis Paralysis b) Task Delegation c) Weighted Decisions d) Stack Overflow e) Hidden Agendas

a) Analysis Paralysis

In a packet-switched data communication network, which of the following is true: a) Packets can be lost or become corrupted between the sender and receiver b) All packets from a sender follow the same path through the network to the receiver c) All packets always follow the shortest path (fewest hops) through the network d) All packets from a sender always arrive at the receiver in same order they were sent e) The path packets follow in the network can never be changed if a data link fails

a) Packets can be lost or become corrupted between the sender and receiver

Official-sounding emails that demand you reply immediately to confirm your personal information or you will lose access to your account are a software attack known as: a) Phishing Attack b) Trojan Horse c) Zero-day Attack d) Drive-by Attack e) Logic Bomb

a) Phishing Attack

In the video where Vint Cerf described the TCP protocol used to send packets across the internet, what did he use as a metaphor for how data packets are sent? a) Post card b) Taxi cab c) Credit card d) Pay telephone e) Railroad car

a) Post card

The Transmission Control Protocol (TCP) address all of the following issues related to the transmission of data using packets, EXCEPT: a) Privacy for user's message content b) Packets being lost during transmission c) Receiving Packets out of message order d) Recovering packs that were not recevied e) Correctly ordering packets when received

a) Privacy for user's message content

The specific steps you must perform to earn AP credit in MIS 111 is what dimension the MIS Design Perspective? a) Process b) People c) Technology d) Management e) Financial

a) Process

What type of decision based on explicit knowledge and involves analysis using an algortihm and measured data? a) Quantitative b) Qualitative c) Managerial d) Operational e) Collaborative

a) Quantitative

What technology has been used for such diverse applications as healthcare, tracking lost pets, and toll collecting on highways? a) RFID b) SCOR c) MRP-II d) Infrared e) CFAR

a) RFID

What IoT technology discussed in class could be used to identify shoppers and allow products to "introduce" (recommend) themselves to a shopper? a) RFID Tags b) Geotagging c) Product Metadata d) Crowdsourcing e) Folksonomies

a) RFID Tags

What technology uses radio-frequency one-way communication path to allow objects identify themselves by transmitting information stored in the object? a) Radio Frequency Identification b) Bluetooth c) Near Field Communication d) WiFi (802.11xx) e) Geostationary Communication

a) Radio Frequency Identification

Dr. Jay Nunamaker, founding chair of the MIS Department, describes MIS as a discipline focused on "Solving Real Problems" for who? a) Real People b) Financial Analysts c) UA Faculty d) UA Students e) Society at Large

a) Real People

A group of fields all associated with one identifier, such as an SSN, can best be described using what database term? a) Record b) Character c) Key d) Table e) File

a) Record

How does using two-sided printing improve energy efficiency? a) Reduces energy usage by about half b) Increases energy costs by about 10% c) Makes no impact on energy efficiency d) Reduces energy usage by more than 90% e) It is not possible to measure a printer's energy efficiency

a) Reduces energy usage by about half

What business model has been developed to identify, aggregate and curate products due to the complexity resulting from vendors selling their products directly to consumers online? a) Reintermediation b) Disintermediation c) Reverse Auctions d) Analytical CRM

a) Reintermediation

Tracking what products are delivered to users, and when, is a form of what? a) Release Control b) Acceptance Control c) Maintenance Control d) Scheduling Control

a) Release Control

Which of the following actions would be considered a biometric authentication? a) Requiring a user to scan their fingerprint b) Requiring a user to enter a secret password c) Requiring a user to swipe a CatCard d) Requiring a user to sign their signature e) Requiring a user to type a group of displayed letters

a) Requiring a user to scan their fingerprint

Which of the following Intelligent Systems predictive outcome strategies uses decision trees? a) Rule Induction b) Neural Computing c) Nearest-neighbor d) Case-based reasoning

a) Rule Induction

Paying Google to display marketing advertisements when a user searches for a specific Adword is most commonly associated with which of the following concepts? a) SEM b) SEO c) Organic d) Pagerank e) Hashtags

a) SEM

Keyword selection and density, image alt tags, and links to content are mostly commonly associated with which of the following concepts? a) SEO b) CPC c) SEM d) PPC e) ROI

a) SEO

What type of hack occurs when a web form allows a database command to be entered that results in the database's information being compromised? a) SQL Injection b) Brute-force compromise c) Web page hijacking d) Cross-site Scripting e) Social Engineering

a) SQL Injection

The guidelines for an Applied Business Project is an example of which of the triple constraints? a) Scope b) Time c) Resources d) Feasibility e) Profitability

a) Scope

What term is used to describe when functions are added after the project has been initiated? a) Scope creep b) Feasibility Analysis c) Go/No-Go Decision d) Waterfall Design

a) Scope creep

Which of the following causes of the bullwhip effect is related to a trading partner intentionally sharing inaccurate information with a company's future inventory requirements? a) Shortage Gaming b) Outsourcing c) Price Promotions d) Batch Purchasing e) Forecasting/Trend Analysis

a) Shortage Gaming

What is the name used to describe when a person visits a brick-and-mortar store only to check physical characteristics of a product but intends to purchase the product online? a) Showrooming b) Disintermediating c) Multiplexing d) Hybrid shopping

a) Showrooming

Which of the following is generally NOT commonly used as a biometric identification? a) Signature b) Fingerprint c) Facial geometry d) Retinal Pattern

a) Signature

The characteristics of big data (data science) are described as being related to volume (of the information), velocity (speed at which information is collected), veracity (the accuracy of the information) and what other characteristic? a) Variety (integrating data from multiples sources) b) Vagueness (using data without a clear definition) c) Valuation (using data that has significant economic value) d) Visual (using data that can be displayed graphically) e) Vertical (using data related only to one market)

a) Variety (integrating data from multiples sources)

Businesses like to use Virtual Private Networks for every reason except? a) Virtual networks are faster than ordinary internet connections b) They have no control over the path data takes between business sites c) Data from web-browsers may not be encrypted d) Data from applications other than web browsers may not be encrypted e) Virtual networks are cheaper than leased lines

a) Virtual networks are faster than ordinary internet connections

Similar to trends in computing hardware, what is the trend for wireless network hardware? a) Virtualization and merging with the cloud b) Interference and attenuation are being eliminated c) Less, but bigger network antennas d) Putting networks onto chips e) Sensors that don't need batteries

a) Virtualization and merging with the cloud

According to the articles what technologies enable businesses and their employees to get in front of clients and customers but do it in a cost-savings manner? a) VoIP and web conferencing b) Telecommuting c) Telemedicine d) eFax e) email

a) VoIP and web conferencing

Which of the following elements present on your CatCard releates to biometric identification? a) Your picture b) Your signature c) Your full name d) Your student ID number e) Your signature

a) Your picture

Signals used to send messages can be _______ or digital. a) analog b) discrete c) rotary d) binary

a) analog

Telepresence systems seamlessly integrate _____ and _____. a) contextual awareness; content management b) content awareness; hardware c) sentiment analysis; contextual software d) Ethernet; WiFi

a) contextual awareness; content management

The goal of CAPTCHA is to ___________. a) ensure you are not a botnet software b) hack into secure networks c) protect networks against hackers d) remove alien software from your computer

a) ensure you are not a botnet software

What type of guided media uses light for signaling? a) fiber optics b) twisted pair c) coaxial cable d) open wire

a) fiber optics

IT changes managers' job by _________ a) providing near real-time information so managers can make quicker decisions. b) making it easier to get all employees to work from one location. c) decreasing the volume of information they have to process. d) improving an employee's sense of connectedness.

a) providing near real-time information so managers can make quicker decisions.


Conjuntos de estudio relacionados

Single Subject Designs, Joint Commission, Ethical Considerations, & Group Presentations

View Set

Omega Psi Phi History via OPP Official Website

View Set

science ch 2 sec 1 the skeletal system 1st part

View Set

CHAPTER 10 - INTERVENING IN CRISES

View Set

Geography Terms: Chapter 22: Section 2

View Set

PassPoint - Nursing Fundamentals 1

View Set

Bones Anatomy Skeletal system test (KEY) Which of these features is not present in the sphenoid bone?

View Set

Chapter 29: Management of Patients With Complications from Heart Disease

View Set

CBRN Reconnaissance and Surveillance

View Set