MIS CCR-1

¡Supera tus tareas y exámenes ahora con Quizwiz!

Two-Factor Authentication Video: Two-factor Authentication (2FA) protects your account login from being hacked through what method?

2FA Requires hackers also have your physical device (second factor)

As they identify and devleop business solutions, the work of information systems professionals is focused on what specific goal?

Creating business value

Although it incurs significant computational cost, known as proof of work, what aspect of the Bitcoin verifies transactions among anonymous participants?

Cryptographic mining

________ is an example of a source system for a data warehouse.

ERP (Enterprise Resource Planning) Systems

When entering an Excel expression into a worksheet cell, which of the following symbols must be used as the first character?

"=" (equals sign)

As an example of a debt trap, consider the case of a student that graduates from the University of Arizona with a modest credit card debt of $2,500 on a card with an annual percentage rate (APR) of 15%. If the person only makes the minimum requirement payments each month, approximately how many years will it take them to pay off their $2,500 credit card balance?

14 years

How have manufacturers used IT to enhance the accessibility of Web and graphical user interfaces to provide opportunities for individuals with disability related to impaired vision?

Adding audible screen tips

From the Video Case "It's Getting Harder to Spot a Deep Fake Video" what is a positive application developed by CereProc using deep fake technology that benefits individuals struck by disease?

Allowing people who have lost their voice to have synthetic voices

In the context of personal information being seen as an economic good, what term relates to the fact that individuals do not know who, how often, or how long their information will be used?

Asymmetric Information

What accounting statement is a financial snapshot of a company's overall financial condition at a given point in time?

Balance Sheet Statement

As described in our reading, what term was used to describe the Malaysian Experiment's Multimedia Super Corridor (MSC) comprehensive regulatory framework that offered intellectual property protections and cyber laws to facilitate and assist the development of a truly ICT and multimedia environment?

Bill of Guarantees

Plus (+), minus (-), multiply (*) and divide (/) are all examples of what type of arithmetic operator?

Binary

Which of the following three types of Database Management Systems (DBMS) architectures uses multiple interconnected databases?

Distributed

What type of DBMS (Database Management System) architecture stores information on an interconnected network of database servers?

Distributed Database

Which UofA MIS Researcher developed a system to use anonymized WiFi Data to identify person-density in buildings and spaces at the University using temporal and spatial data to help fight Covid-19?

Dr. Sudha Ram

What name is used to describe the Eller College of Management's commitment to fostering an environment where competition is fair, integrity is promoted, and academic dishonesty is rooted out?

E-tegrity

According to the Imperial College London, which of the following time horizons should businesses view disruptive technologies such as cryptocurrency, autonomous vehicles, and distributed ledgers (blockchain)?

Happening Now

What term is used to describe the process of combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists?

Non-obvious relationship awareness (NORA)

While working for IBM in the mid-1960's, what did Ted Codd develop to improve upon the hierarchical storage model?

Relational Database

Which of the following would typically NOT be a method used by a hacker as part of a phishing attack?

Requests for two-factor authentication

According to the "What is a database?" video case, what is the name of the database language that makes it possible to easily manage the requested data?

SQL (Structured Query Language)

What term, also described as vandalism, is a deliberate act that involves defacing an organization's website, potentially damaging the organization's image and causing its customers to lose faith?

Sabotage

According the the "What Defines Financial Literacy" video case discussing personal finance, the term "financial fitness" relates to your behaviors around the knowledge of financial literacy in all of the following areas except:

Selecting a career field that has high-paying jobs

What is the name of the controversial national reputation system developed by the Chinese government in order to have a standardized assessment of citizens' and businesses' economic and social reputations?

Social Credit System

According to Siemens Enterprise Communications, what is one of the most effective routes to stealing confidential data from organizations?

Social Engineering

In the "Berlin Declaration on Digital Society and Value-based Digital Government," which of the principles focused on having the public sector encourage wider participation in policy-making by involving society in the design of public services through co-creation, experimentation and collaboration?

Social participation and digital inclusion to shape the digital world

Which of the following is a technique designed to allow the perpetrator to enter restricted areas that are controlled with locks or card entry by following closely behind a legitimate employee and, when the employee gains entry, the attacker asks him or her to "hold the door"?

Tailgating

Described by IBM as "cognitive computing," IBM's Watson does NOT have which of the following capabilities?

The ability to detect deceptive behaviors and statements

Court decisions in many countries have determined the right of privacy is not absolute, but must be balanced against what?

The needs of society and the public's right to know

In the following image of an Entity-Relationship Diagram, the diamond "Enroll" defines what?

The relationship between "Students" and "Courses"

In the "Budgeting" video case discussing personal finance, what did they recommend as a first step in budgeting?

Track your current income and expenses for a month

According to "The internet is watching you" video case, what approach could be used with big data to give teachers an early warning that a student needs help with their studies?

Tracking a student's grades

As described in the Accenture "Building Your Brand" video case, what should you be scanning for when reviewing descriptions of ideal jobs to help you build an online profile that contributes to your job search process?

Using keywords you find in your online profile

When executed, which of the following is returned when an Excel function, such as SUM or COUNT, is executed?

Value

What one of the Big Data "Four V's" of Big Data does IBM describe as "data uncertainty" as it relates to managing the reliability and predictability of inherently imprecise data types?

Veracity

Which of the following is NOT considered a "fundamental" data type in Excel?

Date

Which of the following represents the value 1234.56 when formatted as an Excel "Accounting" value with "Symbol" as "None"?

1,234.56

The General Data Protection Regulation, the world's strongest data protection laws, went into effect in ____ on May 25, 2018.

the European Union

Which of the following metrics would be used as a measure of the ability of a company to meet its short-term financial obligations?

Acid Test

According to Social Intelligence, approximately what percentage of employers check up on current employees on social media?

50%

According to Helium.com, approximately what percentage of job candidates are rejected before having an in-person interview?

65%

Notwithstanding that many books are now electronic (or digital) products, in 2020, physical books still accounted for approximately what percent of total book sales?

81 percent

_________ is an electronic profile of you and your habits.

A digital dossier

Which of the following attacks, created by a programmer developing a system, is a segment of computer code that is embedded within an organization's existing computer programs and is designed to activate and perform a destructive action at a certain time or date?

A logic bomb

Generating over $11 billions dollars through streaming services, record label receive approximately how much revenue each time a song is streamed?

About 0.3 cents

Employers often monitor their current employees online behavior to identify potential risks that behavior might represent for the company and its employees. Which of the following actions was NOT discussed as an online action by an employee that could represent a risk for a company?

Accessing websites containing political or religious content

_________ refers to determining who is responsible for actions that were taken.

Accountability

_________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.

Accuracy

What term is used to describe the subjects, such as product, customer, geographic area, and vendor, used to organize the data in a data warehouse?

Business dimension

What term is used to describe a pre-printed list of NetID+ authentication codes that can be used when your Duo App cannot be used for authentication?

Bypass codes

Which of the following terms used with Excel would be most closely related to the concept of a programming named variable?

Cell reference (relative, absolute, or named)

From the perspective of the Democracy Online framework, which group would participate through activities such as committing time to participate, helping others learn, communicating respectfully and responsibly, and starting/volunteering with citizen-based online democracy efforts and community networks?

Citizens in the Online Commons

While e-Inclusion focuses on participation of all individuals and communities in all aspects of the information society no matter their country, gender, age, or wealth, what categoy of e-Empowerment is tightly connected with the concept of e-Democracy and the galaxy of interactions between citizens and government that e-Democracy enables?

Citizenship Level

From the Video Case "It's Getting Harder to Spot a Deep Fake Video" what is a potential negative application that could cause great harm to well known people?

Committing fraud by creating a fake video that could be used to blackmail an individual or ruin their reputation

All of the following are social engineering tactics discussed in the class discussion except?

Cracking - Brute force trying different variations of symbols or words until you guess the correct password

What term is used to describe a a low-cost, scaled-down version of a data warehouse that is designed for the end-user needs in an SBU (Strategic Business Unit) or an individual department?

Data mart

When developing a company's privacy policy guidelines, all of the following issues that would be relevant for Data Accuracy EXCEPT:

Data should not be given to third parties without the individual's knowledge or permission

Replacing the original Safe Harbor regulations, what is the name of the new legal framework adopted in 2016 by the the European Commission and the U.S. Department of Commerce that regulates the way that the U.S. companies export and handle transatlantic data flows?

EU-US Privacy Shield

The California Budget Challenge focuses on having citizens assess what type of feasibility constraint?

Economic feasibility

What term is used to describe the study of designing machines and work settings to minimize injury and illness?

Ergonomics

Which of the following is typically NOT considered a worker health and safety problem caused by computers?

Ergonomics

In the video case "Living in a digital society," what country was discussed as having a comprehensive eGovernment program using digital technologies?

Estonia

What ethical framework is based on the tenant "Assume that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise"?

Ethical "No Free Lunch Rule"

What ethical situation was David Myers, former Controller of WorldCom referring to when he stated "I still don't know that one point when I started to cross the line... when I should have acted differently"?

Ethical drift

Which of the ethical situations that Dr. Gilliland described considered the aggregate impact of of small ethical deviations?

Ethical drift

Which of the following Excel fundamental data types would NOT be considered as a literal or constant?

Expression

All of the following are optional employee contributions made as wither pre- or post-tax payroll deductions EXCEPT:

Federal Insurance Contribution Act (FICA)

With respect to managing a personal budget, what category of consistent expenditures would describe predictable payments such as car and rent payments?

Fixed Expenses

What term is used to describe a tool that is used to transform, manipulate, or select data in order to return a value that can be used in an expression?

Function

In the "Drunken Pirate" case discussion, why was the picture, captioned "Drunken Pirate", that Stacy Snyder posted of herself on her personal MySpace account considered as being an "unprofessional" act for a high school teacher-in-training?

Her online posting promoted drinking in the "virtual view" of her students

What data warehouse architecture is based on a central data warehouse that stores the data plus multiple dependent data marts that source their data from the central repository in order to maintain a single version of the truth for decision-support purposes?

Hub-and-spoke

Which of the following goals was NOT part of the Democratic National Committee's (DNC's) 2008 Election Strategy to increase voter participation in all 50 states?

Identify and Motivate voters supporting Republican party ideals

What financial statement reports the economic results of a company over a time period by showing the derivation of earnings and losses?

Income Statement

Which of the following was NOT discussed as an issue that might motivate a company to increase its investments in IT to replace people with technologies to cut costs?

Increased data breaches

Which of the following is NOT a likely benefit for a company using Blockchain technology?

Increases the risk of data tampering, fraud and cyber crime

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?

Increasing skills necessary to be a computer hacker

Which of the following stages of e-Government evolution is defined in our reading where the government's online presence is mainly comprised of a web page and/or an official website, and much of the information is static and there is little interaction with citizens?

Interactive

Which of the following was previously a long-time, industry-leading company that had to declare bankruptcy due to the disruptive impact of an innovative software company on its core business product?

Kodak

Both the "Building Your Brand" and "Your Personal Brand" video cases recommended building an online profile on what professional networking site to create awareness of your personal brand used by company recruiters searching for job candidates?

LinkedIn

With respect to financial accounting, the term equity is used to describe the ownership of a company. Which of the following concepts would NOT be another term related to a company's "equity" in this context?

Market value

In the Crime Inc. - Martha Stewart video case, in addition to the criminal penalties, what other penalty did Martha Stewart receive as a result of a subsequent civil case?

Not allowed to serve as a director or CEO of a public company for five years

Which of the following criminal actions taken by Martha Stewart in the ImClone case study directly resulted in her serving time in prison?

Obstruction of justice

Which of the following would generally NOT be an example of a transformation performed as part of an ETL (Extract, Transform, and Load) or data integration process?

Obtaining data from source systems using handwritten code or with commercial data-integration software

According to DOMO, about how long does it take for users to upload 48 hours of new video to YouTube, post 100,000 new tweets to Twitter, and Instagram users to share 3,600 new photos?

One minute

Which of the following is NOT a correct statement about the UArizona WiFi wireless network system?

Open access wireless network availabe to guests when on the UArizona campus

In our discussion of eGovernment, what term was used to describe how the City of St. Paul allow its citizens to choose to receive an email notification when any new content is published related to specific content categories or to a specific city neighborhood?

Personalization

Developed by the Imperial College London, the Table of Disruptive Technologies classifies technologies on two dimensions: Time Horizon and what other dimension?

Potential for Socio-Economic Disruption

Which of the following terms is used to describe farm management that uses information technology to ensure that crops receive exactly what they need—for example, water, fertilizer, and pesticides—for optimum health and productivity?

Precision agriculture

Domain expertise and text, numeric, and visual data are all inputs to what phase of the spiral methodology for the data mining process?

Problem Definition

As described in the "Democracies Online", which of the following would NOT be a considered as aspect associated "Political Organizations"?

Provide User Connectivity, Increase Bandwidth, Lower Costs, and Bring More Users

What term describes the amount of cash available in the short term and indicates the funds needed to operate a business of a given size?

Working Capital

Which of the following data structure concepts in Excel would be similar to a database field?

Worksheet column

Which of the following data structure concepts in Excel would be similar to a database record?

Worksheet row

Which of the following is an accurate representation of the data hierarchy from smallest to largest?

bit, byte, field, record, file, database

The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action.

deontology

URL filtering, which uses software to block connections to inappropriate websites, is a type of _________ technology.

electronic surveillance

Photo tagging is the process of assigning names to to images of people using what type of technology?

facial recognition

Databases allow applications and data to be independent of one another but still allow all applications to access the same data which maximizes data ________.

independence

A(n) ________ of an entity refers to each row in a relational table, which is a specific, unique representation of the entity.

instance

Information in data warehouses and data marts is __________, so it reflects history, which is critical for identifying and analyzing trends.

nonvolatile


Conjuntos de estudio relacionados

XCEL Chapter Exam - Social Security

View Set

World History Tobik (chapter 18)

View Set

2000 SAT Words with tumblrs and pictures

View Set