MIS 111 Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

The advantage of ________________ is they can be read over greater distances. a. Active RFID tags b. Passive RFID tags c. WSNs d. QR codes

a. Active RFID tags

What term is used to describe an online advertising service developed by Google, where advertisers pay to display advertising, product listings, and video content as a result of Google search. a. Adwords b. Pagerank c. Organic d. Hashtags e. Responsive

a. Adwords

the IT Strategic Planning Video Case, it discussed showing the _______ between all the IT projects and the overall business strategy? We also discussed this specific topic in class and explained it's meaning and why it mattered. a. Alignment b. Synergy c. Implementation order d. Harmony e. Unity

a. Alignment

Signs that an email is a phishing attempt often include everything but: a. An option to opt out of future emails b. A sense of Urgency or something terrible might happen c. An offer that is very good, almost too good to be true d. An appeal to help others

a. An option to opt out of future emails

The human voice is a (an): a. Analog Signal b. Digital Signal c. Hybrid Signal d. Natural Signal

a. Analog Signal

The Internet of Things can be described as three "any"-type connections. What are these three "any" connections? a. Any time, any place, any thing b. Any price, any person, any network c. Any time, any place, any network d. Any place, any person, any industry

a. Any time, any place, any thing

NetID+ is the University of Arizona's two- step authentication solution that adds two-step authentication as an extra layer of security to your NetID-accessed accounts, including D2L. NetID+ is now required for all campus logins during 2019. What is the name of the phone app that works with NetID+ *a. Duo b. Access c. LastPass d. KeyFob

*a. Duo

Medicine: What is the name of the University of Arizona's state-of-the-art, technology-driven, clinical simulation training facility supporting the innovative educational needs of the medical school and its clinical affiliates, including industry health care partners and the community? This facility is dedicated, in every sense, to providing truly experiential, innovative and immersive simulation education. With 33,000 square feet of dedicated space, it represents one of the largest simulation facilities housed within a university in the U.S.. a. The Center for Simulation and Innovation b. The Medical Simulation Center c. The Clinical Immersion Center d. The Immersive Simulation Center

*a. The Center for Simulation and Innovation

Cisco uses the term "the power of in-person" to describe the ability of what technology to improve access to subject matter experts and to open doors for small business people? a. Crowdsourcing b. Data Mining c. Knowledge Management d. Telepresence

*d. Telepresence

If the gross requirements for weeks 1- 4 were decreased to 20 units per week, calculate the shortage / projected available for week 4 (identified by the red box)? a. 0 b. 10 c. 20 d. 80

a. 0

A product design being changed to meet EPEAT standards would be an example of what order sustainability effect? Sustainability Order Definitions: First Order: as a Direct Result of its Existance Second Order: From Application Third Order: Long term socio-economic structural changes a. 1st- Creation b. 2nd- Application c. 3rd- Long term structural change

a. 1st- Creation

What type of HTML tag is used to display a file that contains a photo on your website? a. <img> b. <jpg> c. <photo> d. <file>

a. <img>

What is the recommended solution covered in a tech tip for keeping track of many secure passwords that could be hard to remember? a. A Password Manager App on a Cell phone with a Lock Screen b. A locking notebook with passwords kept in your bag c. a wallet card d. a secure encrypted usb stick like IronKey

a. A Password Manager App on a Cell phone with a Lock Screen

"Fishbone" process analysis diagram is also known as: a. A cause-and-effect diagram b. A correlation graph c. A cross-functional flowchart d. An organization chart e. A numerical analysis diagram

a. A cause-and-effect diagram

For a stock trader, what does the "ticker symbol" identify? a. A company b. A trading exchange c. A company's market value d. A company's annual report (10K)

a. A company

In the Information-based Problem Solving Video Case, what was the map that the interviewee (Beth Bluer) was trying to create? a. A map overlying foster homes and registered sex offenders b. A map overlying violent crime and police patrol routes c. A map overlying street lighting and sexual assults d. A map overlying schools, registered sex offenders, and sexual assults e. A map overlying police precincts and violent crime incidents

a. A map overlying foster homes and registered sex offenders

In the video case about Dr. Chiu's Smartrek application, which of the following was not an incentive used to encourage driver participation? a. Ability to find other people for carpooling b. Possibility of avoiding traffic congestion c. Ability to earn points for charity d. Ability to help the community e. Ability to earn prizes and gift

a. Ability to find other people for carpooling

In the video case about Dr. Chiu's Smartrek application, which of the following was not an incentive used to encourage driver participation? a. Ability to find other people for carpooling b. Possibility of avoiding traffic congestion c. Ability to earn points for charity d. Ability to help the community e. Ability to earn prizes and gift

a. Ability to find other people for carpooling

Assume you are off campus and cannot connect to UAWiFi. Which of the following would be a secure alternative to access the campus network? a. Access any open wireless network, and then use a VPN to connect to campus b. UAWiFi is the only secure option to connect to campus c. Only login to systems using NetID+ d. Only use your smartphone's WiFi connection if you have to use an open wireless networks

a. Access any open wireless network, and then use a VPN to connect to campus

So, what is MIS? In the description of Scope Creep and unintended consequences, we discussed technology leading to unintended consequences... What sport was the example of where technology was leading to judgements about the performance of referees/umpires/ or coaches? a. Baseball and the Strike Box b. Football and the Instant Replay c. Hockey and scoring goals d. Basketball and the three-point-line

a. Baseball and the Strike Box

What short-range wireless technology is commonly to connect smartphones with hands -free headsets for telephone calls and listening to music? a. Bluetooth b. WiMax c. Wavelength d. Spectrum e. Photon

a. Bluetooth

Harald Blaatand, who was the King of Demark from 940-981, is associated with what wireless technology? a. Bluetooth Technology b. Computer Wifi c. Cellular Telephone Networks d. Microwave Transmitters e. Satellite Transmitters

a. Bluetooth Technology

What step in a group decision support system process would be used to identify the key issues in a category? a. Brainstorming b. Organizing c. Prioritizing d. Building consensus

a. Brainstorming

LEED refers to the efficiency of? a. Buildings b. Cars c. Desktop Computers d. Data Centers e. Aircraft

a. Buildings

What organization employed Sir Tim Berners-Lee when he developed the "vague but exciting" concept for the world wide web? a. CERN-European Organization for Nuclear Research b. Defense Advanced Research Projects Agency c. Stanford Research Institute d. MIT Lincoln Labs

a. CERN-European Organization for Nuclear Research

_____________ allows you to access the internet through a coaxial media previously used only for TV connections. a. Cable modem b. Dial-up modem c. ADSL Modem d. SONET Modem

a. Cable modem

Identifying patterns in data based on common temporal (time) or spatial (geographic) traits is based on what type of data mining analysis? a. Clustering b. Association c. Sequencing d. Forecasting e. Classification

a. Clustering

What term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding? a. Conceptual model b. Semiotic Engineering c. Design Intention d. Emotional design

a. Conceptual model

You were instructed not to include your any personally identifiable information, such as your name, on your ABP-3 website to avoid a violation of FERPA (Family Educational Rights and Privacy Act). This addresses which of the following cybersecurity goals? a. Confidentiality b. Integrity c. Accessibility d. Authentication

a. Confidentiality

What common term was used with both human-computer interaction and In a database entity relationship diagram as a way of limiting choices by the user and also specifying the minimum and maximum possible values that may exist for a relationship between two entities, respectively? a. Constraint b. Entity Class c. Diagram d. Relationship e. Attribute

a. Constraint

The design of connectors consider the speed of the communication interface, the function being supported, and what other concept related to human-computer interface design? a. Constraints to improve reliability b. Hidden affordances for security c. Cultural design standards d. Operational and functional causality

a. Constraints to improve reliability

Along with content management, what other dimenion does telepresence offer businesses? a. Contextual awareness b. Crowdsourcing c. Reintermedation d. Personal branding

a. Contextual awareness

What is the name for the path containing the minimum set of tasks that you must traverse in order to reach completion of your project on time? a. Critical Path b. Scope Triangle c. Mythical Man Month d. Project Plan

a. Critical Path

What term is used to describe the process of connecting with large groups of people via the internet? a. Crowdsourcing b. eGovernment c. Entrepreneurship d. MIS (Management Information Systems)

a. Crowdsourcing

Which of the following security measures would be considered a "last line defense" for Information Security? a. Cryptography b. Access Control c. Firewall d. Intrusion Detection

a. Cryptography

In cybersecurity, what is our last line of defense? a. Data Encryption b. Strong Authentication c. Biometrics (e.g.: retinal scans) d. Physical Security (e.g.: locked data centers)

a. Data Encryption

What type of data mining presents information graphically so that users are able to identify patterns in the underlying data? a. Data Visualization b. Case-based Reasoning c. Neural Networks d. Rule Induction e. Nearest-neighbor Techniques

a. Data Visualization

Which of the following is an informational role? a. Disseminator b. Dis turbance handler c. Entrepreneur d. Figurehead

a. Disseminator

In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does ".edu" define? a. Domain b. Browser c. Protocol d. Resource e. Server

a. Domain

Humanities: Using the latest technology such as avatars, 3D glasses and green screens, what Humanities professor has created a virtual environment that allows students to take a step back in time and truly immerse themselves in the nuances of the Harlem Renaissance? a. Dr. Bryan Carter b. Dr. Alain-Philippe Durand c. Dr. Melissa A. Fitch d. Dr. Albrecht Classen

a. Dr. Bryan Carter

Who was the founding director of the Arizona Telemedicine Program? a. Dr. Ronald Weinstein b. Dr. Ana Maria Lopez c. Dr. John Po d. Dr. Jay Nunamaker

a. Dr. Ronald Weinstein

What is the official Smartphone app that helps facilitate logging in with NetID+? a. Duo Mobile b. Norton Identity Manager c. Cisco Anyconnect d. Sophos Home AV

a. Duo Mobile

One of the impacts of Globalization is the Economics of Distance (Transportation Costs) has been replaced by what? a. Economies of Attention b. Economies of Networking c. Economies of Relationships d. Economies of Time

a. Economies of Attention

The old accounting maxim of "promise low" and "deliver high" is related what costing and budget concept? a. Prudence b. Accruals c. Consistency d. Variance

a. Prudence

en you're travelling and on the campus of another university, what is a secure, worldwide roaming access service that allows students, researchers, and staff to obtain fast and secure Internet connectivity? a. Eduroam b. NetID+ c. GlobalUA d. VPNNet

a. Eduroam

In the SCOR model, competitive requirements such as reliability, responsiveness, and agility are all related to what dimension of a vendor's performance? a. Effectiveness b. Efficiency c. Mapping d. Productivity e. Modeling

a. Effectiveness

For companies managing their supply chain business processes using CPFAR (Collaborative Planning, Forecasting and Replenishment), the process improvements over the traditional ordering process could be primarily considered as an improvement in which of the following? a. Efficiency b. Quality c. Effectiveness d. Agility e. Feasibility

a. Efficiency

When analyzing the performance of students on Exam 1, which of the following would not be a useful "dimension" in an OLAP data cube? a. Email addresses b. Class standing c. Class section d. Academic major

a. Email addresses

The Gainesville police department started using the internet to accomplish all of these objectives except? a. Empower businesses to identify high crime areas and determine appropriate levels of security. b. Demystify law enforcement operations for the citizens of Gainesville. c. Enable individual citizens to better protect themselves from criminal activity. d. Motivate community groups to have a stronger hand in addressing crime.

a. Empower businesses to identify high crime areas and determine appropriate levels of security.

What is a market-oriented mechanism for advancing the value proposition of innovation? a. Entrepreneurship b. Globalization c. Crowdsourcing d. Financial Literacy

a. Entrepreneurship

What building at the University of Arizona is the largest project in the state of Arizona achieved LEED (Leadership in Energy and Environmental Design) platinum certification, the highest possible certification by the U.S. Green Building Council's (USGBC)? a. Environment and Natural Resources 2 (ENR2) b. Old Main c. Student Union Memorial Center d. McClelland Hall

a. Environment and Natural Resources 2 (ENR2)

In the Personal Branding Video Case from Tuck Business School, which tool was discussed as being an 'overheard personal conversation' that still needed to be managed in the context of your business personal brand a. Facebook b. Linkedin c. Twitter d. Instagram e. SnapChat

a. Facebook

What term is used to describe managing the sources and uses of capital, such as managing earnings, savings, and debt? a. Finance b. Accounting c. Financial literacy d. Budgeting

a. Finance

What network security control prevents information from moving between two networks? a. Firewall b. Post Scanner c. Packet Sniffer d. Biometric Identification

a. Firewall

Embraced by the University of Arizona's strategic plan, what term is used to describe how the velocity, scope, and systems impact of breakthroughs is disrupting almost every industry in every country and heralds a transformation of entire systems of production, management, and governance? a. Fourth Industrial Revolution b. Post-Industrial Society c. Economic Globalization d. Future Shock

a. Fourth Industrial Revolution

Which Ford product link represents the largest market opportunity? a. Fusion b. Focus c. Taurus d. Mustang

a. Fusion

Officially called Directive 2009/136/EC, what other name is used for the EU mandate that websites to obtain informed consent before they can store or retrieve information on a visitor's computer or web-enabled device. a. General Data Protection Regulation b. EU Comprehensive Cybersecurity Act c. EU Cookie Law d. EU Safe Harbor Act

a. General Data Protection Regulation

DishTV, DirecTV, and SiriusXM radio are all based on what type of satellite technology? a. Geostationary Orbit (GEO) b. Middle Earth Orbit (MEO) c. Low Earth Orbit (LEO) d. Polar Earth Orbit (PEO)

a. Geostationary Orbit (GEO)

Which of the following is an example of how individuals use technology in a way that that allow others easily to monitor and track their activities? a. Geotagging smartphone photos b. Hashtagging posts on Twitter c. Accessing a website d. Reading a blog post online e. Sending emails to friends

a. Geotagging smartphone photos

How do you check or report a suspicious phishing email at the UofA? a. Go to https://security.arizona.edu/ b. Call 911 c. Call the local police office d. Google it on Snopes

a. Go to https://security.arizona.edu/

What term did Thomas Friedman's use to describe the impact of globalization where individual countries must sacrifice some degree of economic sovereignty to global institutions (such as capital markets and multinational corporations)? a. Golden Straightjacket b. Golden Arches Theory c. The Lexus and the Olive Tree d. The World Is Flat

a. Golden Straightjacket

Would you describe the stakeholder role of Eller's Dean and the Mar/Comm Team in the project to transform the Eller College's website into a "marketing hub"? a. High Interest / Importance, High Influence b. High Interest / Importance, Low Influence c. Low Interest / Importance, High Influence d. Low Interest / Importance, Low Influence

a. High Interest / Importance, High Influence

Which of the following IS true about VLookup? a. If the lookup value is not found VLookup will return an error b. The lookup value must be a number c. The lookup table must have at least two columns d. The Range lookup choice (TRUE or FALSE) is required

a. If the lookup value is not found VLookup will return an error

In the Building Your Brand Video Case, what was a critical part of of building your online professional presence a. Include keywords associated with the jobs you are seeking b. List all the skills you possess to any extent c. Highlight your communication skills through blog posts d. Use Instagram to highlight the keywords for skills you have for potential employers

a. Include keywords associated with the jobs you are seeking

What term best describes when consumers are able to use their smartphones to obtain information about a company's competitor's product pricing, features, customer reviews and availability while shopping in their company's brink- and mortar store? a. Information transparency b. Crucial distinctions c. Accessibility d. Interference e. Multi-path

a. Information transparency

What term best describes when consumers are able to use their smartphones to obtain information about a company's competitor's product pricing, features, customer reviews and availability while shopping in their company's brink-and mortar store? a. Information transparency b. Crucial distinctions c. Accessibility d. Interference e. Multi-path

a. Information transparency

As discussed by Dr. Mars, Product, Process, (re) Positioning, and Paradigm Shifts are all related to what larger concept? a. Innovation b. eGovernment c. Normative ethics d. Information security

a. Innovation

In the History of the Cell Phone video case, how did the use of cellular phones change the way in which calls were made? a. Instead of calling a place, calls to cellular telephones were associated with a person b. Calling a cellular telephone required the assistance of an operator c. A new system of telephone numbers were required to call cellular phones d. Cellular telephones could only call telephones within the local calling area e. Cellular telephones improved the sound quality that customers experiences

a. Instead of calling a place, calls to cellular telephones were associated with a person

As an employee of MCI/Worldcom, David Myers faced what classic ethical dilemma also described as a 'Who am I?'? a. Integrity versus Loyality b. Social Contract Theory c. Weak Learning Culture d. Procrastionation Culture e. Profit Maximizing Culture

a. Integrity versus Loyality

What is NOT a benefit of telemedicine? a. It requires traveling so doctors can see their patients in person b. It reduces the need to move the patient c. It provides real-time care to isolated areas d. It improves access to healthcare

a. It requires traveling so doctors can see their patients in person

Business metrics that describe the performance of critical business activities are known as: a. Key performance indicators b. Residual risk assessments c. Business continuity plans d. Business intelligence analyses e. Decision trees

a. Key performance indicators

The risk of a project can be measured on what two scales? a. Likelihood and Impact b. Budget and Management c. Change and Control d. Vision and Goals

a. Likelihood and Impact

In, general, what you think of as the quality of your network connection speed when you are using your PC, iPad, or Smartphone is most influenced by which of the following? a. Local Tier-3ISPs b. Backbone Tier-1 ISPs c. Regional Tier-2 ISPs d. Location of the content provider's servers e. Protocols used for Layer-1 transmission

a. Local Tier-3ISPs

What Center in the Eller College of Management has the mission to help students improve their potential and advance society by developing an entrepreneurial and innovative mindset? a. McGuire Center for Entrepreneurship b. Eller Center Executive Education c. Economic + Business Research Center d. Center for Mangement Innovations in Healthcare

a. McGuire Center for Entrepreneurship

An unobstructed, straight line-of-sight path between a transmitter and receiver is required by which of the following high-speed, commercial wireless network technologies? a. Microwave b. 802.11 Wi-Fi c. Bluetooth d. 3G Cellular e. Broadcast Radio

a. Microwave

Which of the following is the technology that enables most mobile wallet applications? a. NFC b. ERP c. VRP d. AFC

a. NFC

Explicit, or "leaky" knowledge, is based on information that is: a. Objective and rational b. Subjective and cognitive c. Informally communicated with an organization d. Dependent on an employee's experience e. Customized by each user

a. Objective and rational

Which of the following permits the company to collect personal information until the customer specifically requests that the data not be collected? a. Opt-out model of informed consent b. Digital dossier policy c. Personal information privacy policy d. Opt-in model of informed consent e. Privacy Paradox

a. Opt-out model of informed consent

In a packet-switched data communication network, which of the following is true: a. Packets can be lost or become corrupted between the sender and receiver b. All packets from a sender follow the same path through the network to the receiver c. All packets always follow the shortest path (fewest hops) through the network d. All packets from a sender always arrive at the receiver in same order they were sent e.The path packets follow in the network can never be changed if a data link fails

a. Packets can be lost or become corrupted between the sender and receiver

If you miss a class what course technology will allow you to watch a podcast of it? a. Panapto b. Examity c. TurnItIn d. Inclusive Access

a. Panapto

According to Dr. Mars, the development of the integrated circuit, which later was used to develop computers and smartphones, as what type of innovation? a. Paradigm shift b. Product c. Process d. (re) Positioning

a. Paradigm shift

Understanding the question and responding with the right answer for a question in the lightning round depends most on what? a. People b. Process c. Technology d. All three equally

a. People

Which of the following is NOT one of the "4 P's" of innovation? a. Personalization b. Paradigm Shifts c. Product d. Process

a. Personalization

Official-sounding emails that demand you reply immediately to confirm your personal information or you will lose access to your account are a software attack known as: a. Phishing Attack b. Trojan Horse c. Zero-day Attack d. Drive-by Attack e. Logic Bomb

a. Phishing Attack

What term is used to describe a physical interface between peripheral devices and the computer? a. Port b. Session c. App d. Signal

a. Port

The standardization of manfacturing to create the assembly line was an example of what type of innovation? a. Process b. Product c. (re) Positioning d. Paradigm shifts

a. Process

Which of the following "4 P's" of Innovation discussed by Dr. Mars related to the instruction of the MRI for diagnosing internal illnesses? a. Product b. Process c. (re) Positioning d. Paradigm Shifts

a. Product

In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does "http://" define? a. Protocol b. Browser c. Domain d. Resource e. Server

a. Protocol

What type of decision based on explicit knowledge and involves analysis using an algortihm and measured data? a. Quantitative b. Qualitative c. Managerial d. Operational e. Collaborative

a. Quantitative

What technology has been used for such diverse applications as healthcare, tracking lost pets, and toll collecting on highways? a. RFID b. SCOR c. MRP-II d. Infrared e. CFAR

a. RFID

What IoT technology discussed in class could be used to identify shoppers and allow products to "introduce" (recommend) themselves to a shopper? a. RFID Tags b. Geotagging c. Product Metadata d. Crowdsourcing e. Folksonomies

a. RFID Tags

Tracking what products are delivered to users, and when, is a form of what? a. Release Control b. Acceptance Control c. Maintenance Control d. Scheduling Control

a. Release Control

Which of the following actions would be considered a biometric authentication? a. Requiring a user to scan their fingerprint b. Requiring a user to enter a secret password c. Requiring a user to swipe a CatCard d. Requiring a user to sign their signature e. Requiring a user to type a group of displayed letters

a. Requiring a user to scan their fingerprint

What term was used to describe a website that can adapt to the type of device being used to access the website? a. Responsive b. Augmented c. Optimized d. Transformed e. Validated

a. Responsive

An investors willingness to potentially loose their money in exchange for the potential of higher returns is called their? a. Risk Tolerance b. Diversification c. Investing Tolerance d. Aggressiveness Quotient

a. Risk Tolerance

What is the name of the agile framework for managing the work of development teams who break their work into actions that can be completed within timeboxed iterations, called sprints (30 days or less)? a. SCRUM b. Waterfall c. Prototyle Methodology d. Rapid Application Development

a. SCRUM

Paying Google to display marketing advertisements when a user searches for a specific Adword is most commonly associated with which of the following concepts? a. SEM b. SEO c. Organic d. Pagerank e. Hashtags

a. SEM

Keyword selection and density, image alt tags, and links to content are mostly commonly associated with which of the following concepts? a. SEO b. CPC c. SEM d. PPC e. ROI

a. SEO

What is the name of the social engineering attack that frightens computer users into visiting malware-infested websites by appearing to be legitimate warnings from antivirus software companies that your computer's files have been infected with the intent of tricking a user into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection? a. Scareware b. Pretexting c. Tailgating d. Quid Pro Quo

a. Scareware

The accounting value of a firm is equal to what? a. Shareholder Equity b. Assets c. Liabilities d. Stock Price e. Annual Dividend

a. Shareholder Equity

Which of the following causes of the bullwhip effect is related to a trading partner intentionally sharing inaccurate information with a company's future inventory requirements? a. Shortage Gaming b. Outsourcing c. Price Promotions d. Batch Purchasing e. Forecasting/Trend Analysis

a. Shortage Gaming

What is the name used to describe when a person visits a brick-and-mortar store only to check physical characteristics of a product but intends to purchase the product online? a. Showrooming b. Disintermediating c. Multiplexing d. Hybrid shopping

a. Showrooming

What is the name used to describe when a person visits a brick-and mortar store only to check physical characteristics of a product but intends to purchase the product online? a. Showrooming b. Disintermediating c. Multiplexing d. Hybrid shopping

a. Showrooming

Which of the following is generally NOT commonly used as a biometric identification? a. Signature b. Fingerprint c. Facial geometry d. Retinal Pattern

a. Signature

In the Jack Welch Video Case in the SCM Lecture, What approach was he discussing as key to providing customer value? a. Six Sigma b. Total Quality Management c. Lean Manufacturing, using JIT and SMED d. the SCOR Model - the Supply Chain Operations Reference Model e. CPFAR- Collaborative Planning, Forecasting And Replenishment

a. Six Sigma

Intelligently monitoring and managing parking, urban noise, waste management and road congestion are examples of what application of IOT technology? a. Smart Cities b. Intelligent User Interfaces c. Paradigm Shifts d. 2nd Order Sustainability

a. Smart Cities

In the video case for Nestle, data-driven decisions were primarily based on visualizations of information from what source? a. Social Media Platforms b. Investment Analyst Forecasts c. Financial Performance Reports d. Cost and Production Schedules

a. Social Media Platforms

What type of electronic commerce helps shoppers connect with one another based on tastes, location, age, gender, and other selected attributes allowing them to share information using voting, comments, discussions, and reviews focused on shopping? a. Social shopping b. Crowdsourcing c. Business value chains d. Globalization

a. Social shopping

What is the name of the secure password storage product offered to student sthrough the UofA Information Security Office? a. Stache b. UAPasswords c. Box d. DuoMobile

a. Stache

Donut Charts are difficult to read, Microsoft recommends what as an alternative? a. Stacked Column or Bar Charts b. Scatter Charts c. Pie Charts d. Cake Charts

a. Stacked Column or Bar Charts

On a balance sheet, assets must equal the sum of liabilities and what other financial measure? a. Stockholder's Equity b. Gross Margin c. Retained Earnings d. Net Income e. Dividend Yield

a. Stockholder's Equity

This website uses what type of balance? a. Symmetrical b. Asymmetrical c. Radial d. Grid

a. Symmetrical

In the College Money Management 101 Video Case - What was Lesson 1, the very first thing students should start doing? a. Track Expenses b. Pick the right bank c. Minimize Debt d. Get a part-time job e. Keep an emergency fund f. Avoid stupid moves

a. Track Expenses

How does telemedicine improve the delivery of medical care in rural communities? a. Telemedicine reduces the need for patients to travel to physician's offices b. "Telemedicine Avatars" can perform routine procedures without the physician c. Telemedicine prevents physicians from making errors during surgery d. Telemedicine will allow a physician to meet with multiple patients at the same time e. Telemedicine allows patients to make a preliminary self-diagnosis online

a. Telemedicine reduces the need for patients to travel to physician's offices

What type of information system that we've discussed could support the change to more virtual collaboration in the product design processes? a. Telepresence b. Knowledge Management c. Weighted Decision Making d. Data Mining

a. Telepresence

Which of the following does a Fishbone Diagram typically not inform you about a problem? a. The cost of correcting a problem with a process b. Identifies the major categories of a problem c. Identifies many of the root causes of problems d. Helps guide the process improvement process e. Organizes the problems associated with a process by the major categories

a. The cost of correcting a problem with a process

From Don Norman's perspective, what fatal flaw does the BMW iDrive (which he descibed as a well thought out, very logical, and sensible device) have with respect its human interface? a. The iDrive destroyed spatiality b. The iDrive did not have a hierarchical menu structure c. The iDrive used a confusing set of control knobs d.The iDrive only controlled the driving-related functions

a. The iDrive destroyed spatiality

In the Cybersecurity 101 Video Case, the reason for many of the insecurities currently found on the internet is due to what? a. The internet was not originally designed to experience the massive growth it underwent b. The internet was originally designed as a Game and not as a serious business network c. The internet was originally limited to short distances so distant countries couldn't be connected d. The internet was originally designed for use in space relaying data between satellites so human hackers w ere not a concern

a. The internet was not originally designed to experience the massive growth it underwent

Thomas Friedman was quoted as saying, "We're in the middle of 3 accelerations; the market, mother nature, and Moore's law. Moore's law says the power of microchips will double every 24 months, mother nature is climate change, biodiversity loss and population, and the market is digital globalization." What is Moore's Law? a. The number of transistors in a dense integrated circuit doubles about every eighteen months to two years b.The effect of a telecommunications network is proportional to the square of the number of connected users of the system c. The bandwidth of the internet grows at least three times faster than computer power d. The theoretical maximum information transfer rate of communications channel

a. The number of transistors in a dense integrated circuit doubles about every eighteen months to two years

In the Biometric Passwords Video Case, what were the two emerging biometric technologies that were explained in detail? a. The patterns of eye veins, heartbeat rythms b. The patterns of fingerprints, brainwave patterns c. The patterns of eye veins, brainwave patterns d. The patterns of fingerprints, heartbeat rythms

a. The patterns of eye veins, heartbeat rythms

The big advantage of bubble charts over scatter charts is? a. They add another dimension b. They are more colorful c. They allow negative values on the Y axis d. There is no advantage

a. They add another dimension

What common function do "HTTP", "TCP" and "IP" share? a. They all define internet-based protocols b. They all are website domains c. They all are data encryption methods d. They are abbreviations for physical media e. They are common computer viruses

a. They all define internet-based protocols

A Stacked Area chart is good for showing relative contributions of different series to a total over time, but they have one big limitation, which is? a. They can't show negative values b. They can only include 3 series c. One series can be hidden behind another series d. They can only show four points in time e. They tend to lack color and not draw the eye

a. They can't show negative values

Pie charts have several limitations, including all of the following except? a. They have limited color and don't draw the eye and attention b. They can only show one series c. They cannot show negative values d. When two or more items are close in value it can be hard to determine which is larger e. Values near zero may not show up and be hidden

a. They have limited color and don't draw the eye and attention

Treemap Charts largest advantage over bar or column charts is? a. They show individual values relative to the sum of the series as well as other values b. They allow multiple series to be displayed c. They allow time series data to be displayed d. There is no actual advantage

a. They show individual values relative to the sum of the series as well as other values

What term would be used to describe any danger to which is system my be exposed? a. Threat b. Audit c. Espionage d. Visibility e. Violation

a. Threat

In a vertical cross-functional business process diagram, the order of items in one column (from top to bottom) shows what relationship among these items? a. Time b. Cost c. Importance d. Frequency e. Skill level

a. Time

Hierarchical Diagrams are commonly used for all of the following except? a. Time series data b. Organizational Charts c. Project Task Decomposition d. Bill of Materials

a. Time series data

In the 'How Technology Changes Us' Video Case, what was the fundamental technology that was being discussed as totally changing the world and how people function? a. Timekeeping b. Electricity c. Steam Engines d. Food Storage

a. Timekeeping

Which of these is NOT enumerated as a Motivation to Create Accessible Web Content? a. To improve the reliability of technical functionality (technology centered motivations) b. To improve the lives of people with disabilities (human-centered motivations) c. To capitalize on the a wider audience or consumer base (marketing or economic-centered motivations) d. To avoid lawsuits and/or bad press (public relations and punishment-centered motivations)

a. To improve the reliability of technical functionality (technology centered motivations)

Which of the following would NOT be considered a type of social engineering ? a. Torjan Horse b. Spear Phishing c. Tailgating d. Vishing e. Smishing

a. Torjan Horse

In financial markets, a "ticker symbol" identifies what? a. Traded Company b. Stock Exchange c. Sales Transaction Record d. Stock Broker's Identification e. Customer's Identification

a. Traded Company

Which of the information layers in the Internet of Things model focuses on the communication networks that connect the sensors that actually collect the data? a. Transmission Layer b. Generation Layer c. Processing Layer d. Application Layer e. Metadata Layer

a. Transmission Layer

If you are just being asked for something you know to get into a system, what is the system attempting to do? a. Validate your identity b. Strongly validate your identity c. Have you tell it your Identity d. Have you show it your Identity

a. Validate your identity

In the Nestle Video case study, Nestle's Digital Acceleration Team training program focuses on developing skills in all of the following business issues, except: a. Validating b. Engaging c. Listening d. Inspiring and Transforming

a. Validating

The characteristics of big data (data science) are described as being related to volume (of the information), velocity (speed at which information is collected), veracity (the accuracy of the information) and what other characteristic? a.Variety (integrating data from multiples sources) b. Vagueness (using data without a clear definition) c. Valuation (using data that has significant economic value) d. Visual (using data that can be displayed graphically) e. Vertical (using data related only to one market)

a. Variety (integrating data from multiples sources)

What collaboration tool was discussed in class that enhances the participants' contextual awareness by sharing non-verbal information during meetings? a. Videoconferencing b. Teleconferencing c. Teleportation d. Crowdsourcing e. Six Sigma

a. Videoconferencing

Businesses like to use Virtual Private Networks for every reason except? a. Virtual networks are faster than ordinary internet connections b. They have no control over the path data takes between business sites c. Data from web-browsers may not be encrypted d. Data from applications other than web browsers may not be encrypted e. Virtual networks are cheaper than leased lines

a. Virtual networks are faster than ordinary internet connections

Similar to trends in computing hardware, what is the trend for wireless network hardware? a. Virtualization and merging with the cloud b. Interference and attenuation are being eliminated c. Less, but bigger network antennas d. Putting networks onto chips e. Sensors that don't need batteries

a. Virtualization and merging with the cloud

According to the articles what technologies enable businesses and their employees to get in front of clients and customers but do it in a cost-savings manner? a. VoIP and web conferencing b. Telecommuting c. Telemedicine d. eFax e. email

a. VoIP and web conferencing

Which of the following elements present on your CatCard releates to biometric identification? a. Your picture b. Your signature c. Your full name d. Your student ID number e. Your signature

a. Your picture

Signals used to send messages can be _______ or digital. a. analog b. discrete c. rotary d. binary

a. analog

A ________ system tracks all communications between the company and the customer, the purpose of each communication, and any necessary follow-up. a. contact management b. sales lead tracking c. sales forecasting d. product knowledge

a. contact management

Telepresence systems seamlessly integrate _____ and _____. a. contextual awareness; content management b. contextual software; content awareness c. content awareness; hardware d. sentiment analysis; contextual software

a. contextual awareness; content management

Anthropology: Lead by Drs. Sudha Ram (MIS) and Dr. Barbara Mills (School of Anthropology), what "Big Data" knowledge discovery project is a collaboration between the College of Social and Behavioral Sciences and the Eller College of Management that focuses specifically on pre-Hispanic archaeological data from the American Southwest— Arizona, Utah, New Mexico and Colorado— from A.D. 800 to the 1500s, shortly after the arrival of the Spanish in the region? a. cyberSW Project b. AskCyPert System c. Keck Visual Anthropology Laboratory d. Archaeological Mapping Laboratory

a. cyberSW Project

What is the domain for the following ABP3 website? http://www.u.arizona.edu/~wtn a. edu b. arizona c. http:// d. ~wtn

a. edu

What type of guided media uses light for signaling? a. fiber optics b. twisted pair c. coaxial cable d. open wire

a. fiber optics

According to Dr. Mars, radical innovation is likely to produce _________ value accumulation over time? a. higher b. lower c. about the same d. unpredictable

a. higher

UA Libraries: What is the name of the collaborative working environment and makerspace at the University of Arizona Science and Engineering Library that is a collaboration among Innovate UA, the College of Humanities, and the UA Libraries. that is equipped with monitors, computers, basic office essentials, sleek communal tables, massive wall boards, 3D printing and scanning, motion capture instruments, open source microcontroller kits, a soldering station, and usability and play testing lab? a. iSpace b. Special Collections c. Multimedia Zone d. Collaborative Learning Space

a. iSpace

Data ___________ means all applications are able to access the same data, which is ___________ by databases. a. independence; maximized b. independence; minimized c. isolation; maximized d. isolation; minimized

a. independence; maximized

What is the correct filename to use for your ABP-3B website? a. index.html b. abp3a.html c. website.html d. public.html e. home.html

a. index.html

In the Your Personal Brand Video Case, what two things had to be aligned and true for your personal brand to be effective? a. who you are and of how you present yourself b. who you are and your goals and aspirations c. who you are and your proposed career path d. who you are and what your what your resume looks like e. who you are and the environment you are operating in

a. who you are and of how you present yourself

Setting the criteria for making a choice and searching for alternatives typically occurs in what phase of the Decision Making Process? a. Intelligence b. Design c. Choice d. Execution

b. Design

Phishing Attacks often contain all the following except what? a.Ask you to go to the official site for an institution with the correct link that exactly matches the URL it really goes to when you hover over it b.Demand immediate action or a dire consequence will happen c. Have embedded links that go to strange URLs d. Ask for a log-in or personal information at the website they link to

a.Ask you to go to the official site for an institution with the correct link that exactly matches the URL it really goes to when you hover over it

the Avnet Video Case Study, Avnet using telepresence and home based workers are examples of using technology to produce what order sustainability effect? a. 1st- Creation b. 2nd- Application c. 3rd- Long term structural change

b. 2nd- Application

What is an Exploit? a. A deliberate act that exploits a vulnerability b. A technique used to compromise a system c. An identified weakness d. A necessary Control

b. A technique used to compromise a system

Which of the following topics related to your ABP-3 project would be a focused way to ensure a search engine lists your website? a. Icon b. Adwords c. CSS Coding d. Using Drupal

b. Adwords

Physical properties (shape, texture, color, etc.) of an object that allow someone to use an object correctly without the need for labels or instructions are known as: a. Constraints b. Affordances c. Distinctions d. Feedback e. Models

b. Affordances

99. What is the name of a highly popular crowdsourcing Internet marketplace enabling individuals and businesses (known as Requesters) that coordinates the use of human intelligence to perform tasks that computers are currently unable to do? a. Bing Collaborative Interpreter b. Amazon Mechanical Turk c. Azure Web Services d. Google Answers

b. Amazon Mechanical Turk

What is the term used to describe a graphical description of a database that describes the way in which an organization's data and business activities are associated with one another? a. A Model of Efficiency b. An Entity Relationship Diagram c. An Enterprise Resource Design d. A Throughput Analysis e. An Artificial Database Scheme

b. An Entity Relationship Diagram

Line Charts are useful for performing what task about with a dataset? a. Comparing absolute magnitudes b. Analyzing data trends over time c. Comparing relative data importance d. Finding clusters within the data

b. Analyzing data trends over time

[Disintermediation] What term is describes the conflict when manufacturers (brands) disintermediate their channel partners, such as distributors, retailers, dealers, and sales representatives, by selling their products directly to consumers through general marketing methods and/or over the Internet. a. Answer Choice A b. Answer Choice B c. Answer Choice C d. Answer Choice D

b. Answer Choice B

Which of the following is not one of the dimensions of the Internet of Things? a. Any PLACE connection b. Any SECURE connection c. Any THING connection d. Any TIME connection

b. Any SECURE connection

What is the importance of the triple constraint? a. You must funnel all resources into only one of the constraints b. Any changes to one constraint will likely affect the project outcome c. Security is the most important constraint d. Time, resources, and scope don't matter

b. Any changes to one constraint will likely affect the project outcome

What impairment for wireless communication actually serves as the basis for spatial multiplexing? a. Interference b. Attenuation c. Multi-path d. Distortion

b. Attenuation

What term is used to describe the behavior where small changes in customer demand that result in large variations in raw material orders causing inefficiency in the supply chain? a. Supply Chain Operations Reference (SCOR) Model b. Bullwhip effect c. Just-In-Time Orders d. Reverse Auctions e. Single-Minute Exchange of Dies (SMED)

b. Bullwhip effect

What is the most important component of website project management? a. Keeping an open mind b. Communicating effectively and often c. Using tools to give you the upper hand d. Creating and revising, creating and revising

b. Communicating effectively and often

The expansion of telecommunications infrastructure occurred primarily during while era of globalization, as described by Thomas Friedman? a. Countries b. Companies c. Individuals

b. Companies

According to the speaker from Accenture, project management is not about lists and linear relationships, but rather involves managing what? a. Client requirements b. Complex inter-relationships c. Crisis management d. Project costs

b. Complex inter-relationships

An entrepreneur developing detailed documentation of their business processes so that they can be offered to other individuals as a franchise operation is an example of: a. Converting explicit knowledge into tacit knowledge b. Converting tacit knowledge into explicit knowledge c. Creating a community of practice d. A time-delayed response e. Dependent demand

b. Converting tacit knowledge into explicit knowledge

Which of the following is NOT a disadvantage of web-based call centers located overseas? a. Communication b. Cost c. Control d. Security

b. Cost

Why is shortage gaming the most difficult of the bullwhip effects for a company to manage? a. Information latency b. Customer deception c. Inaccurate prices d. Product obsolescence

b. Customer deception

If your sales team shows a customer's name as "Johnny Smith", but your shipping department knows the customer as "John A. Smith", what type of data problem does this issue represent? a. Data Security b. Data Inconsistency c. Data Redundancy d. Data Isolation

b. Data Inconsistency

Maintaining multiple copies of the same data in multiple information systems that can be independently updated commonly results in what information management problem? a. Data isolation b. Data inconsistency c. Data devaluation d. Data compression e. Data validation

b. Data inconsistency

________ support local control, whereas ____________ support central control. a. Data marts; data dictionaries b. Data marts; data warehouses c. Data warehouses; data dictionaries d. Data warehouses; data marts

b. Data marts; data warehouses

In the decision support process, formulating a module to be evaluated and setting criteria for making a choice would occur during what phase of the decision making process? a. Choice Phase b. Design Phase c. Functional Phase d. Intelligence Phase e. Operational Phase

b. Design Phase

A business intelligence tool that uses abstractions such as color and graphical images like instrument gauges to allow executives to grasp business situations quickly is known as a: a. Planning Horizon b. Digital dashboard c. Expert system d. Neural network e. Geographic information system

b. Digital dashboard

What category of location-based services would best describe products such as "location-based gaming", "social networking," and "find a friend"? a. Information Services b. Entertainment c. Mobile Resource Management d. Personal Security e. Social Networking

b. Entertainment

What is the process of identifying metrics that are outside of acceptable tolerance levels? a. Visualization b. Exception Reporting c. Drill Down d. Classification

b. Exception Reporting

What affordance issue is the label "PUSH" addressing? a. Perceptible Affordance b. False Affordance c. Correct Rejection d. Hidden Affordance

b. False Affordance

What type of MPS scheduling resulted in MPS planning a quantity of 100 units? a. Economic Order Quantity b. Fixed Order Quantity c. Lot for Lot

b. Fixed Order Quantity

Allowing individuals to file tax returns, renew driver's licenses, and obtain various permits online is an example of what type of eGovernment? a. Government-to-business (G2B) b. Government-to-citizen (G2C) c. Government-to-employees (G2E) d. Government-to-government (G2G) e. Government-to-suppliers (G2S)

b. Government-to-citizen (G2C)

In recognizing ethical situations, which of the following is related to a chemical reaction that occurs in your body, specifically your intestinal track? a. Ethical drift b. Gut check c. Transparency test d. Gut punch e. Taste check

b. Gut check

The ___________________ is a summary of information needs of the functional areas and of the organization as a whole. a. Application portfolio b. IT environment c. Mission d. Objective of the IT function

b. IT environment

Who was quoted as saying, "Integrity is All You've Got"? a. Warren Buffet b. Karl Eller c.Tom Peters d. Thomas Friedman

b. Karl Eller

The terms "contextual," "relevant," and "actionable" are commonly related to what term? a. Information b. Knowledge c. Repository d. Alignment e. Relationship

b. Knowledge

Making the Adobe Creative Cloud is now available to UofA students. What approach for software acquisition did the UoA used to allow students to have access to this software? a. Buy (Ownership of Intellectual Property) b. Lease (Right to Use Product) c. In- House Development (Writing Software) d. Open Source (Non-proprietary software) e. Government Seizure (Right of Eminent Domain)

b. Lease (Right to Use Product)

How does adding social networking to the VAN allows candidates to improve the effectiveness of campaign volunteers? a. Tracks any online posts about candidates to allow responses by volunteers b. Leverages personal relationships of campaign volunteers with voters c. Eliminates the need for block-walking and phone calls by campaign volunteers

b. Leverages personal relationships of campaign volunteers with voters

In the Relationship-based Organizing Video Case, what was being done to improve the effectiveness of campaign volunteers? a. Tracking any online posts about candidates to allow immediate, effective responses by volunteers b. Leveraging personal relationships of campaign volunteers with voters to allow personal networking c. Eliminating the need for block-walking and phone calls by campaign volunteers through online engagement d. Enhancing the call efficiency of volunteers by enabling personalized phone conversations

b. Leveraging personal relationships of campaign volunteers with voters to allow personal networking

95. On your personal financial balance sheet, your student loans would be classified in what category? a. Asset b. Liability c. Net Worth

b. Liability

In the Personal Branding video case, which of the following online platforms was idenfied as being primarily a business networking tool? a. Facebook b. LinkedIn c. Democratic voters who sometimes vote d. Wordpress e. Amazon.com

b. LinkedIn

What was the major benefit of Toyota's pioneering the SMED (single minute exchange of die) technique that improved the operation of its assembly process by reducing setup time? a. Eliminated the need for skilled workers b. Made assembly line more agile / flexible c. Reduced payroll and headcount costs d. Reduced design errors

b. Made assembly line more agile / flexible

What term is used to describe the information collected describing the action (i.e., location, time, place, etc.) as opposed to the data itself? a. Hashtagging b. Metadata c. Entities d. A.Packets

b. Metadata

What term means users that cannot change or update the data in data warehouses or data marts? a. Integrated b. Nonvolatile c. Consistent d. Relational

b. Nonvolatile

What is NOT a factor contributing to the Bullwhip Effect? a. Shortage Gaming b. Outsourcing c. Price Promotions d. Batch Purchasing e. Forecasting/Trend Analysis

b. Outsourcing

What is an affordance? a. Being able to pay for something b. Physical property of an object that shows functionality c. How well the user likes the interface d. Safety of users and of data

b. Physical property of an object that shows functionality

What term is used to describe when both the consumer and retailer are informed of the price of an item, pre and post purchase? a. Personalized pricing b. Price Transparency c. Customer intelligence d. Price experience

b. Price Transparency

In project prioritization for a Decision Matrix, if "Priority" was a factor weighted numerically on the announced date for a vendor's end- of- life support for a information system currently used in our production line, what type of decision would this be? a. Qualitative b. Quantitative c. Subjective d. Other

b. Quantitative

What term did we use to describe customer sale generated from a website lead (potential customer)? a. Purchasing Lead Time b. Sales Conversion c. Collaborative Planning, Forecasting and Replenishment d. Customer Opt-in

b. Sales Conversion

Dr. Patton discussed the Hacking Google Glasses video case in class and talked about what it could be a precursor to something else getting hacked in the future. What did he say might be the next thing hacked using the same technique? a. Stop Light Control Systems b. Smart / Autonomous Cars / Trucks c. Smart Phones d. IoT Toys, games, and Devices

b. Smart / Autonomous Cars / Trucks

What normative theory of ethics focuses on the belief that manager's actions should be guided by the understanding that they are entrusted with a responsibility to manage and protect the assets of the company for the benefit of all of those who the actions of the firm affect? a. Stockholder b. Stakeholder c. Social Contract d. Organizational e. Loyalty

b. Stakeholder

What type of problem has an optimal solution can be reached through single set of steps based on an algorithm? a. Strategic b. Structured c. Management d. Collaborative e. Unstructured

b. Structured

What term describes individuals with tactic knowledge about a particular domain? a. Knowledge Guides b. Subject Matter Experts c. Expert Systems d. Community of Practice Leaders

b. Subject Matter Experts

Tacit or "sticky" knowledge, is based on information that is: a. Objective and rational b. Subjective and cognitive c. Easily communicated using cross- functional diagrams d. Described using algorithms and processes diagrams e. Easily understood with little domain knowledge

b. Subjective and cognitive

Subjective knowledge that is based an individual's experiences is known as what? a. Refined knowledge b. Tacit knowledge c. Technical knowledge d. Explicit knowledge e. Procedural knowledge

b. Tacit knowledge

Creating a business process that can be franchised is an example of what type of knowledge management conversion? a. Tacit to Tacit b. Tacit to Explicit c. Explicit to Tacit d. Explicit to Explicit

b. Tacit to Explicit

How does the Heart Attack Diagnoses Decision Tree transform medical expert's knowledge? a. Tacit to Tacit b.Tacit to Explicit c. Explicit to Tacit d. Explicit to Explicit

b. Tacit to Explicit

Telemedicine's approach is similar to what other collaborative business process? a. Crowdsourcing b. Telepresence c. Group systems d. Knowledge Management

b. Telepresence

What is considered to be the high- capacity data transmission core of the Internet structure? a. NAP b. Tier 1 ISP c. Tier 3 ISP d. LAN

b. Tier 1 ISP

The Internet is a ______________. a. MAN b. WAN c. LAN d. PAN

b. WAN

Customers _____________________ because of Web 2.0. a. are less empowered b. are more empowered c. have seen no difference d. are generally confused

b. are more empowered

IT __________ be used to create a competitive advantage ___________. a. can; because everyone has access to technology b. can; when it is used effectively c. cannot; because everyone has access to technology d. cannot; even when it is used effectively

b. can; when it is used effectively

What string within this "IMG" tag makes this absolute addressing for the image? <img alt="My House" height="200" src="http://www.cnn.com/My%20House.JPG" width="141" /> a. alt="My House" directive b. http://www.cnn.com/in src directive c. height="200" and width="141" d. Using the "%20" in the filename

b. http://www.cnn.com/in src directive

What filename should you use for your ABP-3 webpage? a. INDEX.html b. index.html c. ABP-3.html d. <your_net_id>.html

b. index.html

ERP address information silos by _____________. a. correcting a lack of communication between TPSs b. integrating functional areas c. reducing the amount of information presented d. simplifying system creation

b. integrating functional areas

Based on the "Website Visits to Closes" visualization, 78,000 "valid contacts" produces 13,000 "closes", if our marketing team wants to double our closes, how many valid contacts do we estimate our website have to identify? a. 39,000 b. 78,000 c. 160,000 d. 320,000

c. 160,000

Taxes, FICA and other Payroll Deductions can easily be what percentage of a person's paycheck? a. 15% b. 25% c. 35% d. 45%

c. 35%

If you graduate from the University of Arizona when you are 22 years old and have a credit card that charges an 18% annual rate. If you just have a $2,000 credit balance wit h an 18% annual rate, but only make minimum payments of 2% of the balance each month, what birthday will you likely be celebrating when your $2,000 credit card balance is paid off? a. 32nd birthday b. 42nd birthday c. 52nd birthday d. 62nd birthday

c. 52nd birthday

In a relational database, what term refers to the collection of items that are all related to a single unique value, where the single value often serves as the primary key? a. A field b. A form c. A record d. A list e. A deposit

c. A record

Which group of voters would result in the highest return on investment (i.e., largest number of votes for a DNC candidate) using a get-out-the-vote (GOTV) strategy? a. A.Independent voters who always vote b. A.Independent voters who sometimes vote c. A.Democratic voters who sometimes vote d. Democratic voters who always vote

c. A.Democratic voters who sometimes vote

If you are using a normal flat screen television (these are 1080P) what is the speed to you need to stream using any of the listed services? a. At least 2.5 Mbps b. At least 5 Mbps c. At least 9 Mbps d. At least 25 Mbps

c. At least 9 Mbps

In a business process diagram, the comparison used to make a decision with two mutually exclusive outcomes is known as what type of expression? a. Arithmetic b. Relational c. Boolean d. Hierarchical

c. Boolean

What type of data mining analysis would be used to produce the Clery report, which is based crimes for the preceding 3 calendar years committed in physical (geographic) proximity to a college campus? a. Association b. Classification c. Clustering d. Sequencing

c. Clustering

PARC's Unicomp was a precursor to which of the following topics previously discussed in class? a. Globalization b. Entrepreneurship c. Collaboration d. Sustainability

c. Collaboration

What approach to knowledge management would best describe the MIS 111/112 Study Halls? a. Knowledge transfer b. Best practices c. Community of Practice d. Crowdsourcing

c. Community of Practice

Selecting EPEAT-compliant technology with a high rating over traditional, less energy efficient technology is an example of focusing on what sustainability effect? a. Substitution by using alternative methods b. Use of government regulation to eliminate wasteful products c. Creation, Use and Disposal of a product d. Impacts of long term structural change e. Increased awareness through the use of metrics

c. Creation, Use and Disposal of a product

What technique has been used by companies such as Starbucks and Netflix used to engage large numbers of non-employees to innovate, manage, design and market new products? a. Videoconferencing b. Teleconferencing c. Crowdsourcing d. Teleportation e. Six Sigma

c. Crowdsourcing

What type of data structure allows us to organize multi- dimensional information from a data warehouse so that it can be viewed using different data abstractions (or projections)? a. Neural network b. Click stream c. Data cube d. Executive dashboard e. Decision support system

c. Data cube

In a business process diagram, a diamond shape is used to indicate what action? a. Starting Point b. Ending Point c. Decision d. User task

c. Decision

Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control? a. Bullwhip effect b. Just-In-Time c. Defense in depth d. Disintermediation e. Social Contract

c. Defense in depth

What type of repeater has the greatest throughput? a. Single Band b. Double Band c. Double Radio

c. Double Radio

A Cost-Benefit Analysis is related mostly to what type of project management feasibility assessment? a. Technical b. Operational c. Economic d. Political e. Ethical

c. Economic

Purchasing an entire box of screws, even though only a small number are need for the master production schedule is an example of making a purchasing decision based on what approach? a. Fixed order quantity b. Lot-for-Lot c. Economic Order Quantity d. Independent Demand

c. Economic Order Quantity

In your telephone contacts, the list of all possible fields (names, address, telephone number, etc.) that can be saved for each contact would be described using what term? a. Data Abstraction b. Entity c. Entity class d. Cardinality

c. Entity class

Often presented visually on an executive dashboard, what type of report focuses attention on business processes whose performance falls outside the range of their defined KPI metrics? a. Batch b. Drill-down c. Exception d. Ad hoc e. Annual

c. Exception

When we discussed data communication networks, what city did we indicate was partnering with the UA MIS Department to implement Smart City technology? a. Tokyo, Japan b. Hyderabad, India c. Fortaleza, Brazil d. Paris, France

c. Fortaleza, Brazil

What type of project management documentation includes information about all of the Triple Constraints? a. Timeline / Pipeline Chart b. PERT Chart c. Gantt Chart d. Work Breakdown Structure Chart

c. Gantt Chart

What is the name of the University of Arizona's primary career management tool that offers UA students and alumni access to jobs, internships, and a range of other services? a. eSMS b. Uaccess c. Handshake d. D2L

c. Handshake

What is NOT an advantage of digital transmission? a. Produces fewer errors b. Permits higher maximum transmission rates c. Harder to encrypt d. Simpler to integrate voice, video, and data

c. Harder to encrypt

What type of inventory demand is derived and based on the forecasted need for finished products? a. Shortage demand b. Expected demand c. Independent demand d. Dependent demand

c. Independent demand

Which of the following groups of voters would the DNC be most likely to contact with a persuasion campaign message? a. Independent voters who sometimes vote b. Democratic voters who sometimes vote c. Independent voters who always vote d. Republication voters who sometimes vote e. Democratic voters who always vote

c. Independent voters who always vote

________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information. a. Competitive intelligence b. Espionage c. Information extortion d. Intellectual property

c. Information extortion

What problem might occur when you operate WiFi networks, Bluetooth headsets, baby monitors, and garage door openers all using the same 2.4GHz ISM frequency range in close proximity to one another? a. Attenuation b. Interference Interference c. Interference d. Distortion

c. Interference

Which of the following is FALSE of social computing? a. It focuses on improving collaboration. b. It encourages user-generated content. c. It allows social information to remain anonymous. d. It combines social behavior and IT to create value.

c. It allows social information to remain anonymous.

What term describes the a cost-savings inventory management approach using SCOR and MRP to schedule the delivery of parts close to the time as items is used in the production process? a. Cross-docking b. Poke-Yoke c. Just-in- Time d. Reverse Logistics

c. Just-in- Time

In the Six Sigma DMAIC (Define, Measure, Analyze, Improve and Control), a specific metric that is central to the success of a process would be described using what term? a. CSF b. MRP c. KPI d. ROI

c. KPI

In a database file or table, a group of fields all associated with one identifier, such as an SSN, would be described using what database term? a. Character b. Record c. Key d. Table

c. Key

The sequence of activities performed by users of GroupSystems' ThinkTank product directly parallel the steps in what other business process? a. Transaction processing system b. Operational CRM c. Knowledge management cycle d. Economic globalization e. Just-in- time Inventory Management

c. Knowledge management cycle

Which of the following wireless issues would NOT be a problem for short range wireless communications technologies, such as RFID and NFC? a. Attenuation b. Interference c. Line-of-sight d. Multi-path

c. Line-of-sight

In general, what you think of as the quality of your network connection speed when you are using your PC, iPad, or Smartphone is most influenced by which of the following? a. Backbone Tier-1 ISPs b. Regional Tier-2 ISPs c. Local Tier-3 ISPs d. Metropolitan Tier-2.5 ISPs

c. Local Tier-3 ISPs

Who saidd the following quote "You can't use up creativity. The more you use, the more you have." a. Linus Pauling b. Thomas Edison c. Maya Angelou d. Albert Einstein

c. Maya Angelou

_________ means that users carry a device with them and can initiate a real - time contact with other systems from wherever they happen to be. a. Broad reach b. Instant connectivity c. Mobility d. Ubiquity

c. Mobility

__________ means that users carry a device with them and can initiate a real-time contact with other systems from wherever they happen to be. a. Broad reach b. Instant connectivity c. Mobility d. Ubiquity

c. Mobility

Which of the following enabling technologies most closes relates to the type of innovations described by Dr. Mars as "paradigm shifts? a. Gilder's Law b. Metcalf's Law c. Moore's Law d. Shannon's Law

c. Moore's Law

If you have one wireless access point, for best coverage you should do what? a. Mount it on your roof b. Mount it next to the front windows c. Mount it in the center of the house d. Mount it on your roof

c. Mount it in the center of the house

Allocating resources based on the frequency of past incidents in an area would be an example of using what predictive decision making strategy? a. Case-based Reasoning b. Neural Networks c. Nearest Neighbor d. Rule Induction

c. Nearest Neighbor

Market capitalization is determined by multiplying the stock price by what? a. Profits earned from direct operations b. Dividends paid during the last fiscal year c. Number of common shares outstanding d. Book value of the company e. Year-end Earnings, minus taxes and interest

c. Number of common shares outstanding

On the balance sheet, total assets minus total liabilities must equal what? a. Free Cash flow b. Dividends Paid c. Owner's Equity d. Stock price e. Market Value

c. Owner's Equity

Which of the following techniques would NOT commonly be used by a SMB as part of their a search engine optimi zation strategy? a. Title directives b. Alt tags c. Pay-per-click d.Reciprocal links

c. Pay-per-click

What action did Stacy Snyder take that resulted in her losing her job? a. Hacking the AP Twitter feed and posting a fraudulent message b. Undertaking accounting fraud at her company c. Posting a photo of herself at a party on her personal social media account d. Infecting her company's network computer with a virus while using Facebook at work e. Being a whistle-blower and reporting the illegal actions of her employer

c. Posting a photo of herself at a party on her personal social media account

_____________ is the right to be left alone and to be free of unreasonable personal intrusions. a. A digital dossier b. Information privacy c. Privacy d. Profiling

c. Privacy

The Transmission Control Protocol (TCP) address all of the following issues related to the transmission of data using packets, EXCEPT: a. Packets being lost during transmission b. Receiving Packets out of message order c. Privacy for user's message content d. Packets taking different paths to the client

c. Privacy for user's message content

at is the term used to describe the process of reducing the number of dimensions of a multi- dimensional data cube (e.g., from three dimensions, perhaps season, location, and product, into two dimensions, such as season and location)? a. Simplification b. Variable c. Projection d. Context e. Function

c. Projection

What term is used to describe the original consensus algorithm in a Blockchain network that is used to confirm transactions and produce new blocks to the chain? a. Provenance b. Cryptography c. Proof-of- Work d. Immutability

c. Proof-of- Work

Learning that users access program pages directly from search, not by navigating through the main Eller home page, supports which of the following information architecture decisions? a. Single site supports more cohesive user experience b. Primary navigation should focus on primary audience c. Provide "lanes" for secondary audiences d. Use consistent page layout across programs

c. Provide "lanes" for secondary audiences

Parking garage passes and access control on employee ID badges are examples of: a. Bluetooth b. LEO c. RFID d. 4G / cellular

c. RFID

Words such as "enrolled" and "teaches" are used to indicate what aspect of a database? a. Attribute b. Constraint c. Relationship d. Entity

c. Relationship

The value of the "all time" total sales created by this projection could be calculated using what Excel function? a. AVERAGE b. MEAN c. SUM d. COUNT

c. SUM

In project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resources and what other dimension of the planning process? a. Alignment b. Agility c. Scope d. Value e. Feasibility

c. Scope

The guidelines for provided for ABP3 would be an example of which of the triple constraints? a. Time b. Resources c. Scope

c. Scope

What company in our ICQ's is described by the following business model?-Beginning in '93, they focused on buying up discontinued lines from manufacturers and selling them at a discount to their customers-Strategy focused on meeting customer's needs by shipping on an emerging transportati on infrastructure promising rapid delivery-Used new communications technologies infrastructure to reach a geographically distributed customer base a. BigLots b. Overstock.com c. Sears, Roebuck & Co. d. Walmart

c. Sears, Roebuck & Co.

What is the primary purpose of the Eller College website? a. Disseminate academic programs info b. Tell stories about students and alumni c. Serve as a marketing hub d. Provide resources for current students

c. Serve as a marketing hub

After checking your kitchen for ingredients, your shopping list would formally be known as: a. Bill of Materials b. Lot Size c. Shortages d. Variances

c. Shortages

As I move farther away from campus, my connection to UAWiFi gets weaker. What will always cause this to occur? a. Signal blocked by strong encryption b. Signal has Multi-path propagation c. Signal strength has limited power d. Signal interference from other sources

c. Signal strength has limited power

What is an example of something in the Integrated Application layer of the 4 Layer Model? a. GPS b. Data center c. Smart transport d. Search engine

c. Smart transport

Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? a. Defense in Depth b. Industrial Sabotage c. Social Engineering d. Advanced Persistent Threats e. Open Source Hacking

c. Social Engineering

Information systems professionals understand business needs and analyze processes, methods and data to create customer-oriented solutions. The value proposition for MIS was described more briefly by Dr. Jay Nunamaker, Regents Professor and founding chair of the MIS Department, as a discipline focused on doing what for business? a. Programmins b. Computer Design c. Solving real problems d. Marketing software e. Academic research

c. Solving real problems

What term is used to describe paid-for product ratings and reviews? a. Conversational marketing b. Expert reviews c. Sponsored reviews d. Customer reviews

c. Sponsored reviews

Identifying majors with specific language and mathematics requirements using the Degree Search selection filters help you solve what type of business problem? a. Fuzzy b. Strategic c. Structured d. Unstructured

c. Structured

Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project? a. Whether the major project milestones are being completed on budget b. Individual work assignments for persons assigned to the project c. The project milestones and the order they are scheduled to be completed d. Whether project tasks have been organized in the most efficient order e. The quality of the work performed during each major project milestone

c. The project milestones and the order they are scheduled to be completed

A Bill-of- Materials describes the components that make up an item, the quantity used, and what other information about a finished good? a. The value of the material b. The vendor who supplies the material c. The relationships of raw materials and subassemblies d. The lot sizing used when purchasing raw materials

c. The relationships of raw materials and subassemblies

Which of these is not an advantage of an all-in-one router, switch, WiFi access point, and Modem? a. You don't have to worry about connecting different network equipment together b. They are easy to upgrade c. They are cheap to upgrade d. They have one management interface

c. They are cheap to upgrade

______ is any danger to which a system may be exposed. a. Exposure b. Information security c. Threat d. Security

c. Threat

The adoption of CPFAR still eliminate the need for which of the following business processes? a. Sales forecasting b. Product margin analysis c. Three-way match d. Accounting audits

c. Three-way match

What is the most common mistake that increases page loading times? a. Using MS Word to edit the webpage, creating huge documents b. Using too many hyperlinks c. Using huge images d. Failing to use a content Management System like WordPress

c. Using huge images

When you check your credit score for incorrect information, you're responding to which of the "4 V's"? a. Velocity b. Variety c. Veracity d. Volume

c. Veracity

If you are in Dreamweaver and you can't seem to edit your webpage what is most likely the problem? a. You haven't saved the index.html file yet b. You are in Split view c. You are in Live view d. You are in Design view

c. You are in Live view

Which of the following is NOT true about VLookup? a. It searches for values in the LEFT column of a table or range b. You have to specify the value it is searching for c. You indicate the column which you want to return a result from by entering the Column letter d. You can specify whether the value returned must be an exact match or is a range lookup

c. You indicate the column which you want to return a result from by entering the Column letter

What part of this "IMG" tag meets the POUR principle of being "perceivable"? <img alt="My House" height= "200" src="http://www.cnn.com/My%20House.JP G" width="141" /> a. height="200" width="141" b. http://www.cnn.com/ c. alt="My House" d. "%20" in filename

c. alt="My House"

Google's main business reason for installing fiber in select US cities is to _______. a. begin competing with the cable distribution giants b. bring the internet to rural areas c. generate more web traffic, which generates more ad revenue for them d. give people an option other than the telecommunications companies who control existing cable networks

c. generate more web traffic, which generates more ad revenue for them

The three security challenges of wireless communication are confidentiality, accessibility, and _____. a. importance b. Internet c. integrity d. incorporation

c. integrity

What is the name of the University of Arizona server that you MUST use to host your MIS 111 ABP-3 website? a. websites.arizona.edu b. hosting.arizona.edu c. u.arizona.edu d. mis111.arizona.edu

c. u.arizona.edu

43_06.6-Telepresence is a version of ____________. a. unified communication b. a portal c. videoconferencing d. email

c. videoconferencing

What is the minimum working speed a house should have to play 4k Ultra HD Videos? a. 2.5 Mbps b. 5 Mbps c. 9 Mbps d. 25 Mbps

d. 25 Mbps

What major piece of legislation impacting business followed the MCI and Enron bankruptcies? a. A.Clayton Antitrust Act b. A.Dodd-Frank Wall Reform c. A.Gramm-Leach-Bliley Act d. A.Sarbanes-Oxley Act

d. A.Sarbanes-Oxley Act

Why is it critical you put your index.html file and website images in the same unique directory before linking the images to the webpage and uploading to the server? a. Image links are relative, so when in the same directory the server can find them b. You will need to find your images so you can upload them to the server c. We do not allow you to use a link to a different webpage for the image location d. ALL OF THE ABOVE!

d. ALL OF THE ABOVE!

According to MIT Sloan Management Review, what percentage of companies have placed sustainability permanently on their management agendas? a. About 10% b. About 25% c. About 50% d. About 70%

d. About 70%

What type of feasibility was a barrier to the prior leadership in Maryland producing the map that overlaid the foster care sites with locations of known violent criminals? a. Technical feasibility b. Economic feasibility c. Behavioral feasibility d. All of the Above

d. All of the Above

By allowing group members to contribute ideas in parallel and anonymously online, the ThinkTank system could help a participant overcome which of the following difficulties? a. Lack of focus b. Hidden Agendas c. Fear of speaking d. All of the Above1

d. All of the Above1

Why are there so many different physical connector types? a. The function (serial, parallel, video) often defines the number of signals required b.Different symbols, shapes and sizes improves reliability when connecting devices c. Connector design evolves as technology demands faster communication speed d. All of the above

d. All of the above

Which of the following would not be a "behavioral change"? a. UAResLife Recycle Mania b. Encouraging 2-sided Printing c. Turning off your computer d. Avnet using virtualization

d. Avnet using virtualization

e equity on a company's balance sheet is most closely related to which of the following? a. Market value b. Operating income c. Share price d. Book value e. Gross margin

d. Book value

What is the most important component of website project management? a. Organization b. Participation c. Data analysis and reporting d. Communication

d. Communication

Which of the following knowledge management concepts includes an organizational culture focused on problem solving, a desire to share knowledge because of mutual interest, and norms that build trust, such as might be found in an MIS 111 StudyHall? a. Best practices community b. Knowledge management cycle c. Intellectual capital community d. Community of practice e. Click-stream analysis

d. Community of practice

en printing from your phone or computer to a CatPrints station, you are printing to an: a. End-user Device b. Local Equipment c. Local-Loop/ISP d. Content Service

d. Content Service

Google Analytics reports comparing PPC vs. SEO or old vs. new visitors are examples of what type of information visualization? a. Hierarchical diagrams b. Cross-functional diagrams c. Root cause analysis d. Digital Dashboards

d. Digital Dashboards

What is the named used to describe daily spending decisions like eating at a restaurant, buying clothes, drinking Starbucks, or playing a round of golf? a. Fixed b. Intermittent c. Variable d. Discretionary

d. Discretionary

David Myers' (former controller of MCI/Worldcom) statement "I still don't know that one point when I started to cross the line...", is an example of how small, incremental repeated compounding of unethical decisions can result in what? a. Gut check b. Transparency test c. Whistleblowing d. Ethical drift e. Defining moment

d. Ethical drift

From user's perspective, perceived affordances would include actual perceptible design affordances and what other category of perceptual affordances? a. Correct rejection of design characteristics that are not affordances b. Hidden design affordances c. Design mitigation affordances d. False or fake design affordances e. Accessible affordances

d. False or fake design affordances

Which of the following types of guided media has the highest level of physical security from eavesdropping? a. CAT-3 Cable b. CAT-5 Cable c. Coaxial Cable d. Fiber Optic Cable

d. Fiber Optic Cable

From Dr. Patton's lecture on Practical Networking, which one of these is NOT an option for internet access in Tucson for at least some residents? a. Centurylink DSL b. Comcast Cable Internet c. Cox Cable Internet d. Google Fiber

d. Google Fiber

In the Online Democracy model, the "Voter Activation Network" uses voter registration rolls to categorize voters as always/sometimes/never voting by using information obtained from: a. Online media b. Commercially-generated databases c. Private sector polling d. Government records e. Partisan political organizations

d. Government records

Pioneered at the University of Arizona, what decision support technology as developed to address problems such as a lack of focus, fear of speaking, hidden agendas and misunderstandings then collaborating with others? a. Data Mining b. Communities of practice c. Executive Dashboard d. Group Decision Support Systems e. Crowdsourcing

d. Group Decision Support Systems

How does this this wall safe provide a safe hiding spot? a. Perceptible Affordance b. False Affordance c. Correct Rejection d. Hidden Affordance

d. Hidden Affordance

Most users of these salt-and-pepper shakers would most likely depend on information from what level of the McGinn hierarchy? a. Individual b. User Group c. Cultural d. Human Sensory Perception

d. Human Sensory Perception

EcoReps Dashboards installed in residence halls are an example of what layer in the IOT model? a. Sensing and Identification b. Network Construction c. Information Processing d. Integrated Application

d. Integrated Application

The classic values conflict with "Who Am I'" represents what type of ethical dilemma? a. Short-term vs. long-term b. Honesty vs. integrity c. Peer-pressure vs. boss-pressure d. Integrity vs. loyalty e. Organizational ethics

d. Integrity vs. loyalty

In addition to possessing contextual and relevant information, what other characteristic aspect does knowledge possess? a. It is an entity class b. It solves a structured problem c. It is always displayed visually d. It is actionable e. It is consistent

d. It is actionable

Eller's Dean, Dr. Paulo Goes, routinely sends an email newsletter called "Dean's Update" with information about the college to alumni and donors. Which web marketing strategy does this use? a. Law of the Dean End Street b. Law of Giving and Selling c. Law of Trust d. Law of Push and Pull

d. Law of Push and Pull

Commonly-occurring and well- defined business activities such as scheduling employees work hours would be what category of organizational decision? a. Fuzzy b. Strategic c. Management d. Operational

d. Operational

The success of a Group Decision Support System (GDSS) is based upon two key features: contributor anonymity (i.e., the identity of the person making the comment or suggestion is not known), and what other important feature? a. Analytical CRM b. Reintermiediation c. Disintermediation d. Parallel Discussions e. Six Sigma

d. Parallel Discussions

Which of the following business component are *not* included in an MRP-II planning cycle? a. Raw Materials b. Workforce c. Plant and Equipment d. Product Margins

d. Product Margins

What type of business systems have the capability to place automatic requests to buy products from vendors in real time? a. AI (Artificial Intelligence) b. CRM (Customer Relationship Management) c. DSS (Decision Support System) d. SCM (Supply Chain Management)

d. SCM (Supply Chain Management)

In project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resources and what other dimension of the planning process? a. Alignment b. Feasibility c. Agility d. Scope e. Value

d. Scope

Which of the following is a problem with BYOD? a. Cost b. Productivity c. Satisfaction d. Security

d. Security

Which of the following "laws" we've discussed determines the maximum bandwidth (signaling rate) of a given type of communication media (e.g., copper cable, fiber optic, etc.)? a. Moore's Law b. Gilder's Law c. Metcalf's Law d. Shannon's Law

d. Shannon's Law

What did the NASA project manager indicate was the greatest risk he faced in managing projects for NASA? a. Lack of individuals with technical expertise b. Technology failures c. Cost overruns d. Social and political risk

d. Social and political risk

Your username (UANetID) is your claim of identify to a computer system. When the computer system verifies your identify by requiring you to enter a password is an example of what type of authentication? a. Something a user is b. Something a user has c. Something a user does d. Something a user knows e. Something a user inherits

d. Something a user knows

In the VAN (Voter Activiation Network) Relationship-Based Political Organizing video case study, the VAN was able to idenify the relationships of possible supporters using data from what source? a. Voter registration records b. Direct mail campaigns c. Online surveys d. Supporter's Facebook contacts e. Tax returns of registered voters

d. Supporter's Facebook contacts

In the Software Development Lifecycle Process (SDLC), in what SDLC stage is it the most costly to make changes to the system requirements a. Systems Design b. Systems Programming c. Systems Testing d. Systems Operation and Maintenance e. Systems Implementation

d. Systems Operation and Maintenance

____________ is knowledge that is generally imprecise, costly to transfer, and difficult to formalize or codify. a. Data b. Explicit knowledge c. Information d. Tacit knowledge

d. Tacit knowledge

Applications such as "find a friend" (FourSquare), driving directions (Smartrek), roadside assistance (OnStar), and fleet management (UPS and FedEx) are all examples of services that have been enhanced by knowing what? a. The identity of the requester b. The time the request was made c. The age of the requester d. The location of the requester e. The number of people making requests

d. The location of the requester

Assume you need to put a sign that says "PUSH" on a door handle to explain the correct way to operate the door. The "PUSH" sign helps a user understand what aspect of usability? a. The sign explains a perceptible affordance b. The sign explains a correct rejection c. The sign explains a hidden affordance d. The sign explains a false affordance e. The sign explains a consistent affordance

d. The sign explains a false affordance

Which of the following is a DISADVANTAGE of purchasing prewritten software? a. It may eliminate the need to hire personnel specifically dedicated to a project. b. The company can know what it is getting before it invests in the product. c. The company can try out the software before purchasing it. d. The software is controlled by another company and may be hard to adapt.

d. The software is controlled by another company and may be hard to adapt.

The __________________ test proposes a scenario in which a man and a computer both pretend to be women or men, and a human interviewer has to identify which is the real human. a. Google b. SkyNet c. Terminator d. Turing

d. Turing

Packets sent over which route will arrive first (shortest transmission time)? a. P1 Route b. P4 Route c. P6 Route d. Unknown-Can't be determined from information shown

d. Unknown-Can't be determined from information shown

If the search column for a VLOOKUP contains a duplicate value, which value will be returned? a. VLOOKUP will return both values b. VLOOKUP will return a value based on the last match c. VLOOKUP will return an error (#DUPLICATE), since the search column must be unique d. VLOOKUP will return a value based on the first match

d. VLOOKUP will return a value based on the first match

74. When you get an unexpected email, you should avoid everything but? a. Opening attachments b. Clicking on links c. responding with personal data d. copying a link to a known website and pasting it into your browser

d. copying a link to a known website and pasting it into your browser

The web ____________ buyer power. a. decreases b. increases c. has no impact on d. has a mixed impact on

d. has a mixed impact on

What minimum set of files needed to be uploaded for your website to work correctly a. index.html and favicon.ico b. all referenced picture files and favicon.ico c. index.html and all referenced picture files d. index.html, all reverenced picture files, and favicon.ico e. index.html, abp3.html, all referenced picture files, and favicon.ico

d. index.html, all reverenced picture files, and favicon.ico

Which of the following is the correct order of the traditional System Development Life Cycle (SDLC)? a. analysis, investigation, design, programming and testing, implementation, operation and maintenance b. analysis, investigation, design, implementation, programming and testing, operation and maintenance c. investigation, analysis, design, implementation, programming and testing, operation and maintenance d. investigation, analysis, design, programming and testing, implementation, operation and maintenance

d. investigation, analysis, design, programming and testing, implementation, operation and maintenance

When hosting your ABP3 website on your u.arizona.edu account what subdirectory did you need to upload to? a. ./~ b. /home/<your netID> c. ~ d. public_html

d. public_html

Sensors, RFID tags, meters, GPS, and other devices are used to collect supply chain information. These are all examples of __________. a. batch processing b. OLAP c. OLTP d. source data automation

d. source data automation

The _____________ approach states that an ethical action is the one that provides the most good or does the least harm. a. common good b. fairness c. rights d. utilitarian

d. utilitarian

What was a major consideration when selecting the paths (routes) for the physical media used for guided media? a.Right-of-way b.Geographical c.Political boundaries d.All of the above

d.All of the above

Concerns over using data to illegally discriminate against an individual or group, reaching wrong conclusions due to data contamination, and violating intellectual property (ownership of information) protections were legal and ethical issues discussed in relation to what topic discussed during this module? a. Telemedicine b. Crowdsourcing c. Click-stream analysis d.Data mining e. Project management

d.Data mining

Approximately what percentage of applications for jobs are rejected by potential employers before the interview due to public information posted online by the applicant (e.g. social networking, blogs, media sites, etc.-that is, your online reputation)? a. Less than 5% b. About 10% c. About 30% d. Less than 50% e. 60% or more

e. 60% or more

A feature of an object that limits possible (often incorrect) uses of a device is known as: a. False causality b. A visible metaphor c. A conceptual distinction d. An affordance e. A constraint

e. A constraint

Which of the following would motivate businesses to create accessible eCommerce websites for their customers? a. To comply with ADA and Section 508 of the Rehabilitation Act b. To capitalize on a larger base of potential customers c. The website is likely easier for all users to navigate d. Only the first two of the above reasons e. All of the three reasons shown above

e. All of the three reasons shown above

The task of brainstorming in a group decision support system is similar to what step in the knowledge management cycle? a. Disseminate b. Publish c. Refine d. Store e. Create

e. Create

Car payments and rent are examples of what type of expenses? a. Variable b. Pre-paid c. Flexible d. Discretionary e. Fixed

e. Fixed

In the McGinn model of design, the least common category of design elements would be related to what factor in the McGinn model? a. Context b. Culture c. Human Sensory d. Group e. Individual

e. Individual

All of the following are Information System Professional Specialties Except? a.Project management b.Business analyst c.Network management d.Database administrator e. Website designer f. Security analyst g. These are all Information System Professional Specialties

g. These are all Information System Professional Specialties


Conjuntos de estudio relacionados

Decimals in Standard, Written, and Expanded Forms

View Set

Cybersecurity Principles T/F and Quizzes Part 1

View Set

Chapter 1, Financial Accounting Attempts

View Set

171Qw/exp Saunders NCLEX Gastrointestinal

View Set