MIS FINAL EXAM

¡Supera tus tareas y exámenes ahora con Quizwiz!

What type of inventory management systems deliver the precise number of parts, called work-in-process inventory, to be assembled into a finished product at precisely the right time? a. JIT b. Poke-Yoke c. SCOR d. Vertical

*a. JIT

Which of the following issues related to wireless communication would NOT be a problem for an RFID (Radio Frequency Identification) system? a. Line-of-sight b. Monitoring c. Attenuation d. Interference e. Multi-path

*a. Line-of-sight

Information systems professionals understand business needs and analyze processes, methods and data to create customer-oriented solutions. The valueproposition for MIS was described more briefly by Dr. Jay Nunamaker, Regents Professor and founding chair of the M IS Department, as a discipline focused on doing what for business? A Solving real problems B Computer Design C Programming D Academic research E Marketing software

A Solving real problems

Which of Thomas Freidman's "flattners" related to technologies related to how content can be digitized and therefore shaped, manipulated, and transmitted; how processes can be done at high speed with total ease; and how mobile can be done anywhere and anytime by any one; and can be done by anyone? a. "The Steriods" b. Supply-chaining c. Informing d. Uploading

a. "The Steriods"

The symbol we use in MS Excel for Absolute Addressing is what? a. $ (US Dollar Sign) b. = (Equal Sign) c. & (Amphersand) d. ! (Exclamation Point)

a. $ (US Dollar Sign)

Assume you are 22 years old when you graduate from the University of Arizona and have a credit card with a $2,000 credit balance with an 18% annual rate. If you only make minimum payments of 2% of the balance or just $10 (whichever is greater) each month, what birthday willyou likely be be celebrating when the the credit card is paid off? a. 52 b. 37 c. 27 d. 32

a. 52

What would be the correct function to find the price of a Caffe Mocha, size Grande? a. =VLOOKUP(A14,$A$2:$D$10,3,FALSE) b. =VLOOKUP(A14,$B$2:$D$10,2,FALSE) c. =VLOOKUP($A$2:$D$10,A14,3,FALSE) d. =VLOOKUP(A14,$A$2:$D$10,"GRANDE",FALSE)

a. =VLOOKUP(A14,$A$2:$D$10,3,FALSE)

What is the recommended solution covered in a tech tip for keeping track of many secure passwords that could be hard to remember? a. A Password Manager App on a Cell phone with a Lock Screen b. A locking notebook with passwords kept in your bag c. a wallet card d. a secure encrypted usb stick like IronKey

a. A Password Manager App on a Cell phone with a Lock Screen

A "Fishbone" process analysis diagram is also known as: a. A cause-and-effect diagram b. A correlation graph c. A cross-functional flowchart d. An organization chart e. A numerical analysis diagram

a. A cause-and-effect diagram

In the Information - based Problem Solving Video Case, what was the map that the interviewee (Beth Bluer) was trying to create? a. A map overlying foster homes and registered sex offenders b. A map overlying violent crime and police patrol routes c. A map overlying street lighting and sexual assults d. A map overlying schools, registered sex offenders, and sexual assults e. A map overlying police precincts and violent crime incidents

a. A map overlying foster homes and registered sex offenders

Thought Question: Walmart's strategic focus is on Everyday low prices and maximum efficiency. You are a Walmart Manager and have been presented with 4 alternative IT ideas, which one should almost automatically float to the top? a. A new system for routing distribution that will save 10% of the total distribution costs b. A new system for customer service that will let customer's checkout 5% faster c. A new system for returns that will automatically track sales so customers can return items without a rece ipt d. A new system for employee scheduling so employees will have more comfortable and flexible work hours while still providing the stores optimal coverage

a. A new system for routing distribution that will save 10% of the total distribution costs

What accounting metric a strong indicator of whether a firm has sufficient short-term assets to cover its immediate liabilities? a. Acid Test b. Current ratio c. Earning per common share d. Price to earning ratio

a. Acid Test

All of the symbols representing tasks and decisions that are shown in single column of a vertical cross-functional diagram are related to the same what? a. Actor b. Root Cause c. Decision Model d. Organization e. Entity

a. Actor

In the IT Strategic Planning Video Case, it discussed showing the _______ between all the IT projects and the overall business strategy? We also discussed this specific topic in class and explained it's meaning and why it mattered. a. Alignment b. Synergy c. Implementation order d. Harmony e. Unity

a. Alignment

What is the name of a highly popular crowdsourcing Internet marketplace enabling individuals and businesses (known as Requesters) to coordinate the use of human intelligence to perform tasks that computers are currently unable to do? a. Amazon Mechanical Turk b. Azure Web Services c. Google Answers d. Bing Collaborative Interpreter

a. Amazon Mechanical Turk

In the video case study of Porter's Forces, Michael Porter commented that the airport's control of gates represented which of the five forces? a. Bargaining Power of Suppliers b. Potential Threat of New Entrants c. Threat of Substitute Products d. Bargaining Power of Buyers e. Industry Rivalries

a. Bargaining Power of Suppliers

One key differentiator of Zara from competitors is it owns it's supply chain, unlike retailers such as H&M or Uniqlo, and it also owns 50% of it's manufacturing. This approach means Zara is not only more nimble, but in general doesn't have to contend with which of Porter's four external (out side the industry) forces in the same way the other retailers do?. a. Bargaining Power of Suppliers b. Bargaining Power of Buyers c. Threat of Substitute Products d. Threat of new entrants

a. Bargaining Power of Suppliers

With re spect to Porter's Forces, which of the five factors would have be the LEAST (weakest) impact on Starbuck's business model? a. Bargaining power of suppliers b. Bargaining power of buyers (its customers) c. Threat of substitutes d. Threat of new entrants e Competitive rivalry

a. Bargaining power of suppliers

So, what is MIS? In the description of Scope Creep and unintended consequences, we discussed technology leading to unintended consequences... What sport was the example of where technology was leading to judgements about the performance of referees/umpires/ or coaches? a. Baseball and the Strike Box b. Football and the Instant Replay c. Hockey and scoring goals d. Basketball and the three-point-line

a. Baseball and the Strike Box

What is the Elevator Test? a. Being able to present the main point in 30 seconds b. Being more engaging then people standing in elevators c. Ensuring you sp eak clearly enough to be heard over noisy elevators d. Being engaging enough to keep someone engaged on an elevator

a. Being able to present the main point in 30 seconds

What term is used to describe the most successful solutions or problem-solving methods for achieving a business objective? a. Best practices b. Decision support c. Agility d. Bottom line

a. Best practices

What implementation approach mixes and matches core ERP modules as well as other extended ERP modules fro m different software providers to best fit their unique internal processes and value chains? a. Best-of-breed approach b. Vanilla approach c. Custom approach d. Software-as-a-service approach

a. Best-of-breed approach

What short-range wireless technology is commonly to connect smartphones with hands-free headsets for telephone calls and listening to music? a. Bluetooth b. WiMax c. Wavelength d. Spectrum e. Photon

a. Bluetooth

Harald Blaatand, who was the K ing of Demark from 940-981, is associated with what wireless technology? a. Bluetooth Technology b. Computer Wifi c. Cellular Telephone Networks d. Microwave Transmitters e. Satellite Transmitters

a. Bluetooth Technology

What type of chart essentially adds a third dimension, such as frequency or quantity, to scatter plots? a. Bubble Charts b. Stacked Area Charts c. Donut Charts d. Treemap Charts

a. Bubble Charts

LEED refers to the efficiency of? a. Buildings b. Cars c. Desktop Computers d. Data Centers e. Aircraft

a. Buildings

In the Zara case, the company has aligned its info rmation system strategy with what? a. Business strategy b. Product margins c. Decentralized intelligence d. Competitive position e. Efficiency model

a. Business strategy

In the Zara case, the company has aligned its information system strategy with what? a. Business strategy b. Product margins c. Decentralized intelligence d. Competitive position e. Efficiency model

a. Business strategy

What is the name of the system used by Raytheon that allows technical blueprints to come to life so engineers engineers and customers can make quick changes to technical specifications and adjust equipment according to their needs using the "the common language of visualization." a. CAVE b. Glip c. Slack d. Jive

a. CAVE

________________ allows you to access the internet through a coaxial media previously used only for TV connections. a. Cable modem b. Dial-up modem c. ADSL Modem d. SONET Modem

a. Cable modem

Which of the following states has a Social Media Privacy law specifically related to prohibiting employers from requesting passwords to personal Internet accounts to get or keep a job, or prohibiting colleges and universities from requiring access to students' social media accounts? a. California b. Arizona c. Pennsylvania d. New York

a. California

What are the equivalent concepts in Excel to the following database terms: Field, Record, and a Table, respectively? a. Cell, Row, Worksheet b. Reference, Slice, Workbook c. Formula, Worksheet, Workbook d. Cell, Range, Workshee

a. Cell, Row, Worksheet

Which of the following types of analysis would be used to produce the Clery report, which is a public annual security report (ASR) that includes statistics of campus crime for the preceding 3 calendar years identifying the crimes committed in physical (geographic) proximity to a college campus as an effort to improve campus safety? a. Cluster b. Forecasting c. Classification d. Sequencing

a. Cluster

Identifying patterns in data based on common temporal (time) or spatial (geographic) traits is based on what type of data mining analysis? a. Clustering b. Association c. Sequencing d. Forecasting e. Classification

a. Clustering

The "nearest neighbor" Intelligent System Strategy is similar to what DM method? a. Clustering b. Classification c. Association d. Sequencing

a. Clustering

What term refers to the process where two or more entities (individuals, teams, groups, or organizations) who work together to accomplish certain tasks, such as a work group or virtual team? a. Collaboration b. Cross-function Teams c. Group Systems d. Communities of Practice

a. Collaboration

Which of the following decisions would *not* be a quantitative decision? a. Comparing project objectives with corporate objectives b. Return on Investment Analysis c. Price-to-Earnings Stock Analysis d. Approving a person's loan based on total debt and their age

a. Comparing project objectives with corporate objectives

The "Porter's Forces" model deals with what aspect of globalized business? a. Competition b. Design c. Location d. Relationships e. Time

a. Competition

What term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding? a. Conceptual model b. Semiotic Engineering c. Design Intention d. Emotional design

a. Conceptual model

What term describes a way of solving problems and producing things by connecting online with people that you otherwise wouldn't know? a. Crowdsourcing b. Group Systems c. Knowledge Management d. Communities of Practice

a. Crowdsourcing

Which of the following security measures would be considered a "last line defense" for Information Security? a. Cryptography b. Access Control c. Firewall d. Intrusion Detection e. Security SDLC

a. Cryptography

In the Ruby Tuesday's sales analysis case, analyzing historical data about the sales dimensions of products categories, sales regions, and months of the year would be best using which of the following approaches we've previously discussed? a. Data Cubes b. Knowledge Management c. Communitites of Practice d. Visualization

a. Data Cubes

In cybersecurity, what is our last line of defense? a. Data Encryption b. Strong Authentica tion c. Biometrics (e.g.: retinal scans) d. Physical Security (e.g.: locked data centers)

a. Data Encryption

What information-related issues does using a relational database model solve? a. Data Redundancy b. Data Isolation c. Data formatting

a. Data Redundancy

What type of data mining presents information graphically so that users are able to identify patterns in the underlying data? a. Data Visualization b. Case-based Reasoning c. Neural Networks d. Rule Induction e. Nearest-neighbor Techniques

a. Data Visualization

Which group of voters would result in the highest return on investment (i.e., largest number of votes for a DNC candidate) using a get-out-the- vote (GOTV) strategy? a. Democratic voters who sometimes vote b. Independent voters who always vote c. Independent voters who sometimes vote d. Republication voters who sometimes vote e. Democratic voters who always vote

a. Democratic voters who sometimes vote

Converting all MIS 111 students from clickers to response cards without an initial test period is an example of what type of conversion? a. Direct conversion b. Pilot conversion c. Phased conversion d. Parallel conversion

a. Direct conversion

What is the named used to describe daily spending decisions like eating at a restaurant, buying clothes, drinking Starbucks, or playing a round of golf? a. Discretionary b. Fixed c. Variable d. Intermittent

a. Discretionary

When major airlines (American, Delta, United, etc.) bypass travel agents and directly market tickets to customers from the airline's corporate website, this is an example of using what type of business sales strategy? a. Disintermediation b. Crowdsourcing c. Group Systems d. Reintermediation e. Communities of Practice

a. Disintermediation

In the URL (Uniform Resource Locator) " http://www.arizona.edu", what does ".edu" define? a. Domain b. Browser c. Protocol d. Resource e. Server

a. Domain

What is the name of the Regents Professor and founding chair of the MIS Department that pioneered the field of Group Decision Support Systems? a. Dr. Jay Nanamaker b. Dr. Hsinchun Chen c. Dr. Sudha Ram d. Dr. Sue Brown

a. Dr. Jay Nanamaker

What type of chart allows you to plot data using two y-axes and a shared x-axis, visualizing a correlation or the lack thereof between the two y-axes data sets? a. Dual Axis Chart b. Box and Whisker Chart c. Funnel Chart d. Radar Chart

a. Dual Axis Chart

What was the name of the legislation adopted by the European Parliament that mandated that all countries within the EU must setup laws requiring websites to obtain informed consent before they can store or retrieve information on a visitor's computer or web-enabled device. a. EU Cookie Law b. EU Cybersecurity Act c. EU Data Protection Directive d. EU General Data Protection Regulation

a. EU Cookie Law

In the SCOR model, competitive requirements such as reliability, responsiveness, and agility are all related to what dimension of a vendor's performance? a. Effectiveness b. Efficiency c. Mapping d. Productivity e. Modeling

a. Effectiveness

For companies managing their supply chain business processes using CPFAR (Collaborative Planning, Forecasting and Replenishment), the process improvements over the traditional ordering process could be primarily considered as an improvement in which of the following? a. Efficiency b. Quality c. Effectiveness d. Agility e. Feasibility

a. Efficiency

When information syste ms were first introductd into organizations, the primary focus of their use was what? a. Efficiency b. Effectiveness c. Value Creation d. Strategic Advantage

a. Efficiency

The Gainesville police department started using the internet to accomplish all of these objectives except? a. Empower businesses to identify high crime areas and determine appropriate levels of security. b. Demystify law enf orcement operations for the citizens of Gainesville. c. Enable individual citizens to better protect themselves from criminal activity. d. Motivate community groups to have a stronger hand in addressing crime

a. Empower businesses to identify high crime areas and determine appropriate levels of security.

What is the process of identifying metrics that are outside of acceptable tolerance levels? a. Exceptiuon Reporting b. Drill Down c. Classification d. Visualization

a. Exceptiuon Reporting

When Dr. Sudha Ram used CatCard data (digital traces) as part of her research to analyze students' routines and relationships to predict student retention. What knowledge management term would you use to classify the CatCard transactional data? a. Explicit data b. Sticky data c. Tacit data d. Feasible data

a. Explicit data

School of Arts: What domain of education in the art school emphasizes experimental contemporary studio practice that includes combined media installation, performance, environmental and site-specific art, 3D modeling, digital fabrication, video, audio and AR/VRinstallations, community based practice, and interactive and relational strategies? a. Extended Media b. Digital Art c. Interdisciplinary Practice d. Visual Culture

a. Extended Media

In the Personal Branding Video Case from Tuck Business School, which tool was discussed as being an 'overheard pe rsonal conversation' that still needed to be managed in the context of your business personal brand a. Facebook b. Linkedin c. Twitter d. Instagram e. SnapChat

a. Facebook

What organization was created in the Eller College of Management in the Spring of 2003 and is designed to be a member organization dedicated to the support of Eller College undergraduate students in their pursuit of co- curricular knowledge, skills, leadership and community activities? a. Federation of Eller Student Organizations (FESO) b. Eller Leadership and Integrity Training for Excellence (ELITE) c. Leadership Empowerment & Academic Development Program (LEAD) d. PACE Freshman Honorary Experience

a. Federation of Eller Student Organizations (FESO)

What network security control prevents information from moving between two networks? a. Firewall b. Post Scanner c. Packet Sniffer d. Biometric Identification

a. Firewall

Car payments and rent are examples of what type of expenses? a. Fixed b. Discretionary c. Variable d. Pre-paid e. Flexible

a. Fixed

When budgeting, the amount you spend for rent is considered as: a. Fixed expenses b. Variable expenses c. Discretionary expenses d. Non-Elective expenses

a. Fixed expenses

Satellites used for data communicatio ns that appear to be stationary from a fixed location on earth are placed in what type of orbit? a. Geosynchronous orbit b. Polar orbit c. Mid-earth orbit d. Elliptical orbit e. Commercial orbit

a. Geosynchronous orbit

Which of the following is an example of how individuals use technology in a way that that allow others easily to monitor and track their activities? a. Geotagging smartphone photos b. Hashtagging posts on Twitter c. Accessing a website d. Reading a blog post online e. Sending emails to friends

a. Geotagging smartphone photos

Related to the concepts of globalization, what computer "law" states that the bandwidth (speed) of data networks will double approximately every 24 months? a. Gilder's Law b. Moore's Law c. Metcalf's Law d. Ohm's Law e. Kepler's Law

a. Gilder's Law

What term did Thomas Friedman's use to describe the impact of globalization where individual countries must sacrifice some degree of economic sovereignty to global institutions (such as capital markets and multinational corporations)? a. Golden Straightjacket b. Golden Arches Theory c. The Lexus and the Olive Tree d. The World Is Flat

a. Golden Straightjacket

What is the name of the University of Arizona's primary career management tool that offers UA students and alumni access to jobs, internships, and a range of other services? a. Handshake b. eSMS c. UAccess d. D2L

a. Handshake

What Regents Professor on the MIS Faculty at the University of Arizona developed the COPLINK system for managing knowledge used in law enforcement? a. Hsinchun Chen b. Joe Valacich c. Jay Nunamaker d. Sudha Ram

a. Hsinchun Chen

Which of the following is a support activity in Porter's value chain model? a. Human Resources b. Logistics c. Operations d. Marketing e. Service

a. Human Resources

In the Building Your Brand Vi deo Case, what was a critical part of of building your online professional presence a. Include keywords associated with the jobs you are seeking b. List all the skills you possess to any extent c. Highlight your communication skills through blog posts d. Use Instagram to highlight the keywords for skills you have for potential employers

a. Include keywords associated with the jobs you are seeking

When analyzing the performance of students in MIS 111 on Exam 1, which of the following would not be appropriate as a useful "dimension" in an OLAP data cube? a. Individual email addresses b. Class standing c. Academic major d. Class section

a. Individual email addresses

In Thomas Friedman's discussion of globalization, he described the process of globalization as being realized through actions that were first defined by your country, then later defined by multi-national companies, and finally, in the most recent age of globalization is defined by: a. Individuals b. International treaties c. Social media d. Financial markets e. Political parties

a. Individuals

What dimension of Porter's Forces focuses on the decision that a buyer makes when choosing among direct, existing competitors when all of the competitors offer the same identical name-brand product (e.g., an iPhone 6)? a. Industry Rivalry b. Threat of Su bstitution c. Threat of New Entrants d. Buyer power e. Supplier power

a. Industry Rivalry

In the History of the Cell Phone video case, how did the use of cellular phones change the way in which calls were made? a. Instead of calling a place, calls to cellular telephones were associated with a person b. Calling a cellular telephone required the assistance of an operator c. A new system of telephone numbers were required to call cellular phones d. Cellular telephones could only call telephones within the local calling area e. Cellular telephones improved the sound quality that customers experience

a. Instead of calling a place, calls to cellular telephones were associated with a person

As an employee of MCI/Worldcom, David Myers faced what classic ethical dilemma also described as a 'Who am I?'? a. Integrity versus Loyality b. Social Contract Theory c. Weak Learning Culture d. Procrastionation Culture e. Profit Maximizing Culture

a. Integrity versus Loyality

In the decision process, problem identification and classification occur during which phase? a. Intelligence b. Design c. Choice d. Implementation

a. Intelligence

Operating unregulated WiFi networks, clickers, Bluetooth headsets, cordless telephones, and microwave ovens using the same 2.4GHz ISM frequency range in close proximity to one another might result in what problem? a. Interference b. Attenuation c. Multi-path d. Line-of-sight e. Right-of-way

a. Interference

What is the one key rule in designing a Presentation a. Keep is simple b. Use Color well c. Use high-quality graphics d. Us e appropriate charts

a. Keep is simple

Business metrics that describe the performance of critical business activities are known as: a. Key performance indicators b. Residual risk assessments c. Business continuity plans d. Business intelligence analyses e. Decision trees

a. Key performance indicators

What term is used to describe the con version of tacit knowledge to explicit knowledge, so that the knowledge can be used in the organization by the staff? a. Knowledge Codification b. Knowledge Cycle c. Knowledge Representation d. Knowledge Interpretation

a. Knowledge Codification

COPLINK, developed at the University of Arizona in the MIS Department's Artificial Intelligence Lab, allows law enforcement officers to integrate database information to identify crime suspects based on limited information (e.g., a license plate number or nickname). What term is used to describe the type of information system that is commonly used to maintain collection of experiential, reflective and solutions- oriented information? a. Knowledge management b. Group decision support sytems c. Crowdsourcing d. Telepresence e. Spiderweb Mapping

a. Knowledge management

How does adding social networking to the VAN allows candidates to im prove the effectiveness of their volunteers? a. Leverages personal relationships b. Sending campaign tweets automatically c. Automatically registers new voters d. Eliminates the need for blockwalking e. Replaces campaign volunteers with computer bots

a. Leverages personal relationships

On your personal financial balance sheet, your student loans would be classifi ed in what category? a. Liability b. Assets c. Net Worth d. Prepaid Expense e. Expenditures

a. Liability

In general, what you think of as the quality of your network connection speed when you are using your PC, iPad, or Smartphone is most influenced by which of the following? a. Local Tier-3 ISPs b. Backbone Tier-1 ISPs c Regional Tier-2 ISPs d. Location of the content provider's servers e. Protocols used for Layer-1 transmissionway restrictions

a. Local Tier-3 ISPs

In the Martha Stewart case, which of the following issues resulting in Martha Stewart being convicted of criminal ch arges that resulted in prison time? a. Lying to the FBI b. Defaulting on a loan c. Selling stocks below book value d. Insider trading e. Falsely advertising her products

a. Lying to the FBI

In the COPLINK video case, law enforcement in what city used the COPLINK system developed to manage knowledge more efficiently and effectively? a. Mesa, Arizona b. Chicago, Illinois c. Las Vegas, Nevaa d. Tucson, Arizona

a. Mesa, Arizona

Related to the concepts of globalization, what computer "law" states that value of the internet is related to the number of connections (users)? a. Metcalf's Law b. Gilder's Law c. Moore's Law d. Ohm's Law e. Kepler's Law

a. Metcalf's Law

The Associated Students of the University of Arizona is a representative organization led by University of Arizona students that serves, engages and empowers the student body through advocacy and the provision of programs and resources.What is the name of the Eller student currently serving as our ASUA Senator? a. Michelle Mendoza b. Olivia Johnson c. Ashin Katwala d. Brennen Feder

a. Michelle Mendoza

An unobstructed, straight line-of-sight path between a transmitter and receiver is required by which of the following high-speed, commercial wireless network technologies? a. Microwave b. 802.11 Wi-Fi c. Bluetooth d. 3G Cellular e. Broadcast Radio

a. Microwave

Related to the concepts of globalization, what computer "law" states that the density of transistors will double approximately every 18 months? a. Moore's Law b. Metcalf's Law c. Gilder's Law d. Ohm's Law e. Kepler's Law

a. Moore's Law

Explicit, or "leaky" knowledge, is based on information that is: a. Objective and rational b. Subjective and cognitive c. Informally communicated with an organization d. Dependent on an employee's experience e. Customized by each user

a. Objective and rational

Each long vertical or horizontal element in a cross-functional flowchart we put processes and decisions into represents what? a. One actor b. One decision c. One business process d. One connection

a. One actor

Although globalization has been underway for many centuries, digitization, networking, and connectiveness have dramatically increased what? a. Pace of Change b. Number of "Olive Tree" products and services c. Data Redundancy d. Revenue per Employee e. Worker Productivity

a. Pace of Change

In a packet-switched data communication network, which of the following is true: a. Packets can be lost or become corrupted between the sender and receiver b. All packets from a sender follow the same path through the network to the receiver c. A ll packets always follow the shortest path (fewest hops) through the network d. All packets from a sender always arrive at the receiver in same order they were sent e. The path packets follow in the network can never be changed if a data link fails

a. Packets can be lost or become corrupted between the sender and receiver

Understanding the question and responding with the right answer f or a question in the lightning round depends most on what? a. People b. Process c. Technology d. All three equally

a. People

Official - sounding emails that demand you reply immediately to confirm your personal information or you will lose access to your account are a software attack known as: a. Phishing Attack b. Trojan Horse c. Zero-day Attack d. Drive-by Attack e. Logic Bomb

a. Phishing Attack

What term is used to describe a physical interface between peripheral devices and the computer? a. Port b. Session c. App d. Signal

a. Port

Which phase of of PowerPoint Presentations do professionals spend the most time on? a. Practicing b. Designing c. Presenting d. Planning

a. Practicing

If we are trying to select the projects to do first, what projects should we select? a. Projects that easy to do and also have a high value proposition b. Projects that will require significant effort, but are easily planned c. Projects that correct major errors in the software d. Projects that design new features requested by our customers

a. Projects that easy to do and also have a high value proposition

In the URL (Uniform Resource Locator) " http://www.arizona.edu", what does "http://" define? a. Protocol b. Browser c. Domain d Resource e. Server

a. Protocol

Which of the following terms are related to production based on the mass customization initiated by a customer's order? a. Pull model b. Push model c. Make-to-stock model d. Forecast model

a. Pull model

What type of decision based on explicit knowledge and involves analysis using an algortihm and measured data? a. Quantitative b. Qualitative c. Managerial d. Operational e. Collaborative

a. Quantitative

What technology has been used for such diverse applications as healthcare, tracking lost pets, and toll collecting on highways? a. RFID b. SCOR c. MRP-II d. Infrared e. CFAR

a. RFID

CODASYL, the Conference/Committee on Data Systems Languages, is remembered almost entirely for two activities: its work on the development of the COBOL language and its activities in standardizing database interfaces. We've learned about the pioneers of databases (Chen and Codd) today, who is credited for developing FLOW-MATIC, which evoled into the COBOL, the widely used business programming language? a. Rear Admiral Grace Murray Hopper b. Ada Lovelace c. Dennis Richie d. Niklaus Wirth e. Charles Babbage

a. Rear Admiral Grace Murray Hopper

In a decision matrix, a "weighting" allows what additional information to be included in the analysis? a. Relative importance b. Cost of capital c. Order of analysis d. Number of employees on the project team

a. Relative importance

Which of the following actions would be considered a biometric authe ntication? a. Requiring a user to scan their fingerprint b. Requiring a user to enter a secret password c. Requiring a user to swipe a CatCard d. Requiring a user to sign their signature e. Requiring a user to type a group of displayed letters

a. Requiring a user to scan their fingerprint

An investors willingness to potentially loose their money in exchange for the potential of higher returns is called their? a. Risk Tolerance b. Diversification c. Investing Tolerance d. Aggressiveness Quotient

a. Risk Tolerance

What is used to determ ine how long an investment will take to double, given a fixed annual rate of interest, allowing investors to get a rou gh estimate of how many years it will take for the initial investment to duplicate itself. a. Rule of 72 b. 28/36 Rule c. 2% Rule d. Rule of 18

a. Rule of 72

What is the name of the agile framework for managing the work of development teams who break their work into actions that can be completed within timeboxed iterations, called sprints (30 days or less)? a. SCRUM b. Waterfall c. Prototyle Methodology d. Rapid Application Development

a. SCRUM

As discussed in class, what company was founded in the Globalization 2.0 era based on the business model of selling discontinued product lines directly to consumers by using a new transportation infrastructure to reach a geographically distributed customer base? a. Sears, Roebuck & Co. b. Ebay.com c. Overstock.com d. Wal-Mart e. BigLots!

a. Sears, Roebuck & Co.

Which of the following causes of the bullwhip effect is related to a trading partner intentionally sharing inaccurate information with a company's future inventory requirements? a. Shortage Gaming b. Outsourcing c. Price Promotions d. Batch Purchasing e. Forecasting/Trend Analysis

a. Shortage Gaming

What is the most important rule in presenting? a. Show your passion b. keep it short c. make eye contact d. move around

a. Show your passion

Which of the following is generally NOT commonly used as a biometric identification? a. Signature b. Fingerprint c. Facial geometry

a. Signature

In the Jack Welch Video Case in the SCM Lecture, What approach was he discussing as key to providing customer value? a. Six Sigma b. Total Quality Management c. Lean Manufacturing, using JIT and SMED d. the SCOR Model-the Supply Chain Op erations Reference Model e. CPFAR-Collaborative Planning, Forecasting And Replenishment

a. Six Sigma

In the video case for Nestle, data-driven decisions were primarily based on visualizations of information from what source? a. Social Media Platforms b. Investment Analyst Forecasts c. Financial Performance Reports d. Cost and Production Schedules

a. Social Media Platforms

A Mekko, or Marimekko or market map chart, which paints a picture of the overall market and helps to drive discussions about growth opportunities or acquisitions by showing the relationship between each segment or bar to the total. A Mekko chart is similar to what other type of chart discussed in class? a. Stacked Bar Chart b. Scatt er Plot c. Donut Chart d. Surface Chart

a. Stacked Bar Chart

Donut Charts are difficult to read, Microsoft recommends what as an alternative? a. Stacked Column or Bar Charts b. Scatter Charts c. Pie Charts d. Cake Charts

a. Stacked Column or Bar Charts

When Planning the presentation, what is the number one rule? a. Start with the end in mind b. Know your audience c. Have a clear structure d. Have the best conten

a. Start with the end in mind

When classifying items on an I^2 diagr am, we depend on individuals with domain knowledge and consultants about the items. What name do we use to describe an individual with domain knowledge? a. Subject-matter Expert b. Expert System c. Franchisee d. Community of Practice

a. Subject-matter Expert

What term describes individuals with tactic knowledge about a particular domain? a. Subject-matter Experts b. Knowledge Guides c. Expert Systems d. Community Leaders

a. Subject-matter Experts

Each long vertical or horizontal element in a cross-functional flowchart we put processes and decisions into is call ed what? a. Swimlane b. Path c. Timeline d. Thread

a. Swimlane

Originally spun out of Stanford University as a research project, what big data tool started out by offering visualization techniques for exploring and analyzing relational databases and data cubes and has expanded to include Big Data research? a. Tableau b. PowerBI c. VMware d. Oracle

a. Tableau

_______________ is knowledge that is generally imprecise, costly to transfer, and difficult to formalize or codify. a. Tacit knowledge b. Explicit knowledge c. Information d. Data

a. Tacit knowledge

Cisco uses the term "the power of in-person" to describe the ability of what technology to improve access to subject matter experts and to open doors to small business people? a. Telepresence b. Crowdsourcing c. Data Mining d. Knowledge Management

a. Telepresence

Which of the following technologies we've discussed was described as a more environmentally friendly "best practice for communication" that could greatly benefit small businesses? a. Telepresence b. Information Security c. Knowledge Management d. Data Mining

a. Telepresence

In the Video Case on Michael Porters Competitive Forces What Industry was described as being Terrible in Every Category? a. The Airline Industry b. The Railroad Industry c. Th e Supermarket Industry d. The Cattle Industry

a. The Airline Industry

Porters five forces focuses on what part of competition? a. The Business Environment b. The Five Core Internal Processes of a Business c. The Business Supply Chain d. The Five C ore Business Functional Areas

a. The Business Environment

Which of the following does a Fishbone Diagram typically not inform you about a problem? a. The cost of correcting a problem with a process b. Identifie s the major categories of a problem c. Identifies many of the root causes of problems d. Helps guide the process improvement process e. Organizes the problems associated with a process by the major categories

a. The cost of correcting a problem with a process

From Don Norman's perspective, what fatal flaw does the BMW iDrive (which he descibed as a well thought out, very logical, and sensible Device) have with respect its human interface? a. The iDrive destroyed spatiality b. The iDrive did not have a hierarchical menu structure c. The iDrive used a confusing set of control knobs d. The iDrive only controlled the driving-related functions

a. The iDrive destroyed spatiality

In the Cybersecurity 101 Video Case, the reason for many of the insecurities currently found on the internet is due to what? a. The internet was not originally designed to experience the massive growth it underwent b. The internet was originally designed as a Game and not as a serious business network c. The internet was originally limited to short distances so distant countries couldn't be connected d. The internet was originally designed for use i n space relaying data between satellites so human hackers were not a concern

a. The internet was not originally designed to experience the massive growth it underwent

In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what common problem did his analogy using the postal service to email a page from a book have with sendingTCP packets? a. The message might get lost and not delivered b. The message might get changed in route c. The message might not get sent d. The message might be illegible e. The message might be in the wrong language

a. The message might get lost and not delivered

Thomas Friedman was quoted as saying, "We're in the middle of 3 accelerations; the market, mother nature, and Moore's law. Moore's law says the power of microchips will double every 24 months, mother nature is climate change, biodiversity loss and population, and the market is digital globalization." What is Moore's Law? a. The number of transistors in a dense integrated circuit doubles about every two years b. The effect of a telecommunications network is proportional to the square of the number of connected users of the system c. The bandwidth of the internet grows at least three times faster than computer power d. The theoretical maximum information transfer rate of communicatiions chance

a. The number of transistors in a dense integrated circuit doubles about every two years

In the Biometric Passwords Video Case, what were the two emerging biometric technologies that were explained in detail? a. The patterns of eye veins, heartbeat rythms b. The patterns of fingerprints, brainwave patterns c. The patterns of eye veins, brainwave patterns d. The patterns of fingerprints, heartbeat rythms

a. The patterns of eye veins, heartbeat rythms

As I move farther away from campus, I notice that my UAWiFi connection gets progressively weaker. What factor will always cause this to occur? a. The signal strength is lost due to attenuation b. The signal blocked by strong encryption c. The signal cannot be received due to interference d. The signal is blocked due to right-of-

a. The signal strength is lost due to attenuation

The big advantage of bubble charts over scatter charts is? a. They add another dimension b. They are more colorful c. They allow negative values on the Y axis d. There is no advantage

a. They add another dimension

What common function do "HTTP", "TCP" and "IP" share? a. They all define internet-based protocols b. They all are website domains c. They all are data encryption methods d. They are abbreviations for physical media e. They are common computer viruses

a. They all define internet-based protocols

A Stacked Area chart is good for showing relative contributions of different series to a total over time, but they have one big limitation, which is? a. They can't show negative values b. They can only include 3 series c. One series can be hidden behind another series d. They can only show four points in time e. They tend to lack color and not draw the eye

a. They can't show negative values

Pie charts have several limitations, including all of the following except? a. They have limited color and don't draw the eye and attention b. They can only show one series c. They cannot show negative values d. When two or more items are close in value it can be hard to determine which is larger e. Values near zero may not show up and be hidden

a. They have limited color and don't draw the eye and attention

Treemap Charts largest advantage over bar or column charts is? a. They show individual values relative to the sum of the series as well as other values b. They allow multiple series to be displayed c. They allow time series data to be displayed d. There is no actual advantage

a. They show individual values relative to the sum of the series as well as other values

What term would be used to describe any danger to which is system my be exposed? a. Threat b. Audit c. Espionage d. Visibility e. Violation

a. Threat

Before paying an invoice in the procurement process, the accounting team checks that the purchase order, the goods receipt document (bill-of-lading), and the vendor's invoice all match. What is the term that is used to describe this auditing process? a. Three-way Match b. Order fulfillment c. Batch processing d. Cross-department process

a. Three-way Match

In a vertical cross-functional business process diagram, the order of items in one column (from top to bottom) shows what relationship among these items? a. Time b. Cost c. Importance d. Frequency e. Skill level

a. Time

In a vertical cross-functional diagram, items are ordered in one coumn relates to what? a. Time b. Economic value c. Feasibility d. Frequency of occurence

a. Time

Hierarchical Diagrams are commonly used for all of the following except? a. Time series data b. Organizational Charts c. Project Task Decomposition d. Bill of Materials

a. Time series data

In the decision matrix example shown below, which of the answers would have the highest score for Project A? a. Time to complete b. Affects other projects c. Project cost d. Financial gain

a. Time to complete

In the 'How Technology Changes Us' Video Case, what was the fundamental technology that was being discussed as totally changing the world and how people function? a. Timekeeping b. Electricity c. Steam Engines d. Food Storage

a. Timekeeping

Which of the following would NOT be considered a type of social engineering ? a. Torjan Horse b. Spear Phis hing c. Tailgating d. Vishing e. Smishing

a. Torjan Horse

in the College Money Management 101 Video Case - What was Lesson 1, the very first thing students should start doing? a. Track Expenses b. Pick the right bank c. Minimize Debt d. Get a part-time job e. Keep an emergency fund f. Avoid stupid moves

a. Track Expenses

In financial markets, a "ticker symbol" identifies what? a. Traded Company b. Stock Exchange c. Sales Transaction Record d. Stock Broker's Identification e. Customer's Identification

a. Traded Company

The __________________ test proposes a scenario in which a man and a computer both pretend to be women or men, and a human interviewer has to identify which is the real human. a. Turing b. SkyNet c. Terminator d. Google

a. Turing

A company's "ticker" or stoc k symbol serves what role on a stock trading exchange? a. Uniquely identifies a traded stock b. The time and date the stock was sold c. The broker selling the stock d. The change (up or down) in price from the last purchase price e. The official company logo used for stock transactions

a. Uniquely identifies a traded stock

When applying for advanced standing in the Eller College of Management, the process of selecting your major would be best described as having what characteristics of a decision? a. Unstructured and Strategic b. Structured and Operational c. Semi-structured and Operational d. Structured and Management

a. Unstructured and Strategic

If the search column for a VLOOKUP contains a duplicate value, which value will be returned? a. VLOOKUP will return a value based on the the first match b. VLOOKUP will return a value based on the the last match c. VLOOKUP will return an error (#DUPLICATE), since the search column must be unique d. VLOOKUP will return both values

a. VLOOKUP will return a value based on the the first match

What inventory strategy allows a company's supplier to monitor inventory levels and manage the replenishment process for the supplier's products? a. VMI b. Tier-1 Suppliers c. Push Manufacturing d. Bullwhip delivery

a. VMI

What technology do companies use to make the links between connection between two corporate intranets more secure? a. VPN b. CPFAR c. SCOR d. VMI

a. VPN

If you are just being asked for something you know to get into a system, what is the system attempting to do? a. Validate your identity b. Strongly validate your identity c. Have you tell it your Identity d. Have you show it your Identity

a. Validate your identity

The characteristics of big data (data science) are described as being related to volume (of the information), velocity (speed at which information is collected), veracity (the accuracy of the information) and what other characteristic? a. Variety (integrating data from multiples sources) b. Vagueness (using data without a clear definition) c. Valuation (using data that has significant economic value) d. Visual (using data that can be displayed graphically) e. Vertical (using data related only to one market)

a. Variety (integrating data from multiples sources)

When you check your credit score for incorrect information, you're responding to which of the "4 V's" discussed for "big data" in the financial reporting business sector? a. Veracity b. Volume c. Variety d. Velocity

a. Veracity

Businesses like to use Virtual Private Networks for every reason except? a. Virtual networks are faster than ordinary internet connections b. They have no control over the path data takes between business sites c. Data from web-browsers may not be encrypted d. Data from applications other than web browsers may not be encrypted e. Virtual networks are cheaper than leased lines

a. Virtual networks are faster than ordinary internet connections

Similar to trends in computing hardware, what is the trend for wireless network hardware? a. Virtualization and merging with the cloud b. Interference and attenuation are being eliminated c. Less, but bigger network antennas d. Putting networks onto chips e. Sensors that don't need batteries

a. Virtualization and merging with the cloud

According to the articles what technologies enable businesses and their employees to get in front of clients and customers but do it in a cost-savings manner? a. VoIP and web conferencing b. Telecommuting c. Telemedicine d. eFax e. email

a. VoIP and web conferencing

The Dow Jones Industrial Average is a market indicator comprised of 30 large publically traded companies, and is intended to to gauge the performance of the industri al sector within the American economy. Recently, General Electric, who had been part of the DJIA for over 100 years, was replaced by another company. What company replaced GE in the DJIA? a. Walgreens b. Google c. Tesla d. American Airlines

a. Walgreens

What type of chart would be typically be used to show how the an initial value is affected by intermediate values--either positive or negative--and resulted in the composition of a final value? a. Waterfall Charts b. Histogram Charts c. Sunburst Charts d. Surface Charts

a. Waterfall Charts

The four guiding principles of accessibility (perceivable, operable, understandable, and robust) are included in what document? a. Web Content Accessibility Guide, Version 2.0 b. Web Content Accessibility Guide, Version 1.0 c. Section 508 of the Rehabilitation Act d. Americans with Disabilities Act

a. Web Content Accessibility Guide, Version 2.0

Which of the following is *NOT* a behavioral issue for meetings? a. Wrong people b. Hidden Agendas c. Misunderstandings d. Domination

a. Wrong people

Of the items used that identify you uniquely at the University of Arizona, which one can be used as a primary key (unique identifier) outside the University? a. Your UA email address b. Your UA StudentID c. Your UA NetID d. Your UA CatCard Number

a. Your UA email address

Which of the following elements present on your CatCard releates to biometric identification? a. Your picture b. Your signature c. Your full name d. Your student ID number e. Your signature

a. Your picture

Signals used to send messages can be _______ or digital. a. analog b. discrete c. rotary d. binary

a. analog

Telepresence systems seamlessly integrate _____ and _____. a. contextual awareness; content management b. content awareness; hardware c. sentiment analysis; contextual software d. Ethernet; WiFi

a. contextual awareness; content management

What type of guided media uses light for signaling? a. fiber optics b. twisted pair c. coaxial cable d. open wire

a. fiber optics

ibrary: What is the name of the University of Arizona's multidisciplinary learning community and collaborative makerspace in the University Libraries where students can access cutting-edge technologies, such as 3D scanning and printing equipment, a visualization wall, virtual reality headsets, and Raspberry Pis, along with collaborating with interdisciplinary experts? a. iSpace b. Special Collections c. Multimedia Zone d. Collaborative Learning Space

a. iSpace

Data ___________ means all applications are able to access the same data, which is ___________ by databases. a. independence; maximized b independence; minimized c. isolation; maximized d. isolation; minimized

a. independence; maximized

What is the correct filename to use for your ABP-3B website? a. index.html b. abp3a.html c. website.html d. public.html e. home.html

a. index.html

In the Your Personal Brand Video Case, what two things had to be aligned and true for your personal brand to be effective? a. who you are and of how you present yourself b. who you are and your goals and aspirations c. who you are and your proposed caree r path d. who you are and what your what your resume looks like e. who you are and the environment you are operating in

a. who you are and of how you present yourself

What is an Exploit? a. A deliberate act that exploits a vulnerability b. A technique used to compromise a system c. An identified weakness d. A necessary Control

b. A technique used to compromise a system

Physical properties (shape, texture, color, etc.) of an object that allow someone to use an object correctly without the need for labels or instructions are known as: a. Constraints b. Affordances c. Distinctions d. Feedback e. Models

b. Affordances

What is the term used to describe a graphical description of a database that describes the way in which an organization's data and business activities are associated with one another? a. A Model of Efficiency b. An Entity Relationship Diagram c. An Enterprise Resource Design d. A Throughput Analysis e. An Artificial Database Scheme

b. An Entity Relationship Diagram

What term is used to describe the behavior where small changes in customer demand that result in large variations in raw material orders causing inefficiency in the supply chain? a. Supply Chain Operations Reference (SCOR) Model b. Bullwhip effect c. Just-In-Time Orders d. Reverse Auctions e. Single-Minute Exchange of Dies (SMED

b. Bullwhip effect

Disintermediation] What term is describes the conflict when manufacturers (brands) disintermediate their channel partners, such as distributors, retailers, dealers, and sales representatives, by selling their products directly to consumers through general marketing methods and/or over the Internet. a. Globalization b. Channel Conflict c. Porter's Forces d. Balance of Trade

b. Channel Conflict

What approach to knowledge management would best describe the Eller FlexLabs? a. Best Practices b. Community of Practice c. Knowledge conversion d. Knowledge FAQ

b. Community of Practice

Porter's Forces describes which of the following business issues? a. Profitability b. Competition c. Security d. Product Design

b. Competition

What MS Excel function could be used to implement Intelligent System Rule Induction? a. IF Statements b. Conditional Formatting c. Pivot Table Slicers d. Table Filters

b. Conditional Formatting

An entrepreneur developing detailed documentation of their business processes so that they can be offered to other individuals as a franchise operation is an example of: a. Converting explicit knowledge into tacit knowledge b. Converting tacit knowledge into explicit knowledge c. Creating a community of practice d. A time-delayed response e. Dependent demand

b. Converting tacit knowledge into explicit knowledge

Which of the following is NOT a disadvantage of web-based call centers located overseas? a. Security b. Cost c. Control d. Communication

b. Cost

Maintaining multiple copies of the same data in multiple information systems that can be independently updated commonly results in what information management problem? a. Data isolation b. Data inconsistency c. Data devaluation d. D ata compression e. Data validation

b. Data inconsistency

___________ support local control, whereas ____________ support central control. a. Data marts; data dictionaries b. Data marts; data warehouses c. Data warehouses; data dictionaries d. Data warehouses; data marts

b. Data marts; data warehouses

In the decision support process, formulating a module to be evaluated and setting criteria for making a choice would occur during what phase of the decision making process? a. Choice Phase b. Design Phase c. Functional Phase d. Intelligence Phase e. Operational Phase

b. Design Phase

A business intelligence tool that uses abstractions such as color and graphical images like instrument gauges to allow executives to grasp business situations quickly is known as a. Planning Horizon b. Digital dashboard c. Expert system d. Neural network e. Geographic information system

b. Digital dashboard

Which of the following is an informational role? a. Disturbance handler b. Disseminator c. Entrepreneur d. Figurehead

b. Disseminator

What is the name of the MIS Regents Professor and founding Chair of the MIS Department who described MIS as "Solving real problems for real people"? a. A.Dr. Sudha Ram b. Dr. Jay Nunamaker c. Dr. Hsinchun Ch en d. Dr. Jim LaSalle

b. Dr. Jay Nunamaker

[ERPModules] Which of the following is typically not considered a "core" ERP module? a. Financial b. E-Business c. Human Resources d. Operations

b. E-Business

What information systems standard allows trading partners to move routine documents, such as purchasing orders, using standard data formats as messages over the Internet. a. CRM b. EDI c. SFA d. JIT

b. EDI

With respect to a database, what term is used to describe an abstract representation of all of the information included in a data structure about a particular type of entity? a. Entity Attribute b. Entity Class c. Entity Key d. Entity Model e. Entity Table

b. Entity Class

Allowing individuals to file tax returns, renew driver's licenses, and obtain various permits online is an example of what type of eGovernment? a. Government-to-business (G2B) b. Government-to-citizen (G2C) c. Government-to-employees (G2E) d. Government-to-government (G2G) e. Government-to-suppliers (G2S)

b. Government-to-citizen (G2C)

In recognizing ethical situations, which of the following is related to a chemical reaction that occurs in your body, specifically your intestinal track? a. Ethical drift b. Gut check c. Transparency test d. Gut punch e. Taste check

b. Gut check

The ____________________ is a summary of information needs of the functional areas and of the organization as a whole. a. Application portfolio b. IT environment c. Mission d. Objective of the IT function

b. IT environment

The terms "contextual," "relevant," and "actionable" are commonly related to what term? a. Information b. Knowledge c. Repository d. Alignment e. Relationship

b. Knowledge

Thought Question: If you are forming a startup company, and you hope it will grow to be the next Amazon, but there is a great deal of uncertainty about both growth rate and future needs for your financial systems, which option for acquiring your Financial IT applications makes the most sense? a. Develop In-House b. Lease c. Buy

b. Lease

Making the Adobe Creative Cloud is now available to UofA students. What approach forsoftware acquisition did the UoA used to allow students to have access to this software? a. Buy (Ownership of Intellectual Property) b. Lease (Right to Use Product) c. In-House Development (Writing Software) d. Open Source (Non-proprietary software) e Government Seizure (Right of Eminent Domain

b. Lease (Right to Use Product)

In the Relationship-based Organizing Video Case, what was being done to improve the effectiveness of campaign volunt eers? a. Tracking any online posts about candidates to allow immediate, effective responses by volunteers b. Leveraging personal relationships of campaign volunteers with voters to allow personal networking c. Eliminating the need for block-walking and phone calls by campaign volunteers through online engagement d. Enhancing the call efficiency of volunteers by enabling personalized phone conversations

b. Leveraging personal relationships of campaign volunteers with voters to allow personal networking

In the Personal Branding video case, which of the following online platforms was idenfied as being primarily a business networking tool? a. Facebook b. LinkedIn c. Democratic voters who sometimes vote d. Wordpress e. Amazon.com

b. LinkedIn

What is NOT a factor contributing to the Bullwhip Effect? a. Shortage Gaming b. Outsourcing c. Price Promotions d. Batch Purchasing e. Forecasting/Trend Analysis

b. Outsourcing

What is an affordance? a. Being able to pay for something b. Physical property of an object that shows functionality c. How well the user likes the interface d. Safety of users and of data

b. Physical property of an object that shows functionality

Internet-enabled globalization does the following: a. Forces new suppliers to distribute products using traditional distribution networks b. Removes geography as a barrier to relationships c. Creates barriers that protect "olive tree" products d. Forces competitors to share sales information and product pricing

b. Removes geography as a barrier to relationships

Which of the following is a problem with BYOD? a. Satisfaction b. Security c. Productivity d. Cost

b. Security

What normative theory of ethics focuses on the belief that manager's actions should be guided by the understanding that they are entrusted with a responsibility to manage and protect the assets of the company for the benefit of all of those who the actions of the firm affect? a. Stockholder b. Stakeholder c. Social Contract d. Organizational e. Loyalty

b. Stakeholder

What type of problem has an optimal solution can be reached through single set of steps based on an algorithm? a. Strategic b. Structured c. Management d. Collaborative e. Unstructured

b. Structured

Tacit or "sticky" knowledge, is based on information that is: a. Objective and rational b. Subjective and cognitive c. Easily communicated using cross-functional diagrams d. Described using algorithms and processes diagrams e. Easily understood with little domain knowledge

b. Subjective and cognitive

Subjective knowledge that is based an individual's experiences is known as what? a. Refined knowledge b. Tacit knowledge c. Technical knowledge d. Explicit knowledge e. Procedural knowledge

b. Tacit knowledge

When displaying a webpage, such as http://www.u.arizona.edu/~wilbur, what is the name of the directory the web browser will check in the "wilbur" account for the "index.html" website? a. The "home" directory b. The "public_html" directory c. The "www" directory d. The "wilbur" directory

b. The "public_html" directory

What is considered to be the high-capacity data transmission core of the Internet structure? a. NAP b. Tier 1 ISP c. Tier 3 ISP d. LAN

b. Tier 1 ISP

Long term weather predictions are generally considered what type of problem? a. Structured b. Unstructured c. Physical d. Optima

b. Unstructured

IT __________ be used to create a competitive adv antage ___________. a. can; because everyone has access to technology b. can; when it is used effectively c. cannot; because everyone has access to technology d. cannot; even when it is used effectively

b. can; when it is used effectively

Taxes, FICA and other Payroll Deductions can easily be what percentage of a person's paycheck? a. 15% b. 25% c. 35% d. 45%

c. 35%

According Cornell University's Computer Energy Usage Facts, how much energy can you save by replacing traditional CRT monitors with equivalently-sized LCD monitors? a. 20% b. 30% c. 40% d. 50%

c. 40%

In a relational database, what term refers to the collection of items that are all related to a single unique value, where the single value often serves as the primary key? a. A field b. A form c. A record d. A list e. A deposi

c. A record

[GoldmanSachs] What term was coined by Goldman Sachs in 2001 to describe the fastest growing market economies? a. EAGLES b. TIMP c. BRIC d. TICK

c. BRIC

Critical Thinking Question: Thinking of Porter's five forces, if you are one of the mobile telephone companies upgrading to a 5G network, and the largest supplier of 5G telecom equipment in the world can no longer be purchased from for political reasons, which of the fiveforces will it impact from your perspective? a. Potential Threat of New Entrants b. Threat of Substitute Products c. Bargaining Power of Suppliers d. Bargaining Power of Buyers e. Industry Competitors

c. Bargaining Power of Suppliers

What type of data structure allows us to organize multi-dimensional information from adata warehouse so that it can be viewed using different data abstractions (or projections)? a. Neural network b. Click stream c. Data cube d. Executive dashbo ard e. Decision support system

c. Data cube

Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control? a. Bullwhip effect b. Just-In-Time c. Defense in depth d. Disintermediation e. Social Contract

c. Defense in depth

A Cost - Benefit Analysis is related mostly to what type of project management feasibility assessment? a. Technical b. Operational c. Economic d. Political e. Ethical

c. Economic

Purchasing an entire box of screws, even though only a small number are need for the master production schedule is an example of making a purchasing decision based on what approach? a. Fixed order quantity b. Lot-for-Lot c. Economic Order Quantity d. Independent Demand

c. Economic Order Quantity

One of the impacts of Globalization is the the Economics of Distance (Transportation Costs) has been replaced by what? a. Econonmies of Time b. Economies of Relationships c. Economies of Attention d. Econonmies of Margin Cost

c. Economies of Attention

Often presented visually on an executive dashboard, what type of report focuses attention on business processes whose performance falls outside the range of their defined KPI metrics? a. Batch b. Drill-down c. Exception d. Ad hoc e. Annual

c. Exception

The University of Arizona is nationally recognized for sustainability in its academics, research, operations, and administration by the Assocation for the Advancement of Sustainability in Higher Education. What Sustainability Tracking, Assessment & Rating System™ (STARS) rating was the University of Arizona awarded in 2017? a. Bronze b. Silver c. Gold d. Platinum

c. Gold

What is NOT an advantage of digital transmission? a. Produces fewer errors b. Permits higher maximum transmission rates c. Harder to encrypt d. Simpler to integrate voice, video, and data

c. Harder to encrypt

Which of the following groups of voters would the DNC be most likely to contact with a persuasion campaign message? a. Independent voters who sometimes vote b. Democratic voters who sometimes vote c. Independent voters who always vote d. Republication voters who sometimes vote e. Democratic voters who always vote

c. Independent voters who always vote

___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information. a. Competitive intelligence b. Espionage c. Information extortion d. Intellectual property

c. Information extortion

The sequence of activities performed by users of GroupSystems' ThinkTank product directly parallel the steps in what other business process? a. Transaction processing system b. Operational CRM c. Knowledge management cycle d. Economic globalization e. Just-in-time Inventory Management

c. Knowledge management cycle

Market capitalization is determined by multiplying the stock price by what? a. Profits earned from direct operations b. Dividends paid during the last fiscal year c. Number of common shares outstanding d. Book value of the company e. Year-end Earnings, minus taxes and interest

c. Number of common shares outstanding

[RelativeSize] What type of chart would be show the values of individual components proportional to a whole, allowing you to easily know relative size of a component, such as might be done to analyze the allo cation of expenditures in a budget? a. Line Chart b. Bar Chart c. Pie Chart d. Bubble Chart

c. Pie Chart

What action did Stacy Snyder take that resulted in her losing her job? a. Hacking the AP Twitt er feed and posting a fraudulent message b. Undertaking accounting fraud at her company c. Posting a photo of herself at a party on her personal social media account d. Infecting her company's network computer with a virus while using Facebook at work e. Being a whistle-blower and reporting the illegal actions of her employe

c. Posting a photo of herself at a party on her personal social media account

______________ is the right to be left alone and to be free of unreasonable personal intrusions. a. A digital dossier b. Information privacy c. Privacy d. Profiling

c. Privacy

What is the term used to describe the process of reducing the number of dimensions of a multi-dimensional data cube (e.g., from three dimensions, perhaps season, location, and product, into two dimensions, such as season and location)? a. Simplification b. Variable c. Projection d. Context e. Function

c. Projection

Parking garage passes and access control on employee ID badges are examples of: a. Bluetooth b. LEO c. RFID d. 4G / cellular

c. RFID

Which of the following types of social engineering attacks would be a text or SMS message from someone claiming to be from a reputable or known company asking your to disclose your personal information a. Tailgating b. Vishing c. Smishing d. Spear Phishing

c. Smishing

What normative ethical theory expects a corporation to create more value to society that it consumes? a. Stockholder Theory b. Stakeholder Theory c. Social Contract Theory d. Supply Chain Theory

c. Social Contract Theory

Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? a. Defense in Depth b. Industrial Sabotage c. Social Engineering d. Advanced Persistent Threats e Open Source Hacking

c. Social Engineering

Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? a. Defense in Depth b. Industrial Sabotage c. Social Engineering d. Advanced Persistent Threats e. Open Source Hacking

c. Social Engineering

[ChartingTool] What is the name of the Business Intelligence tool that is used for interactive analytics and data modeling? a. Python b. Qualtrics c. Tableau d. R

c. Tableau

How does telemedicine improve the delivery of medical care in rural communities? a. Telemedicine allows patients to make a preliminary self-diagnosis online b. Telemedicine prevents physicians from making errors during surgery c. Telemedicine reduces the need for patients to travel to physician's offices d. "Telemedicine Avatars" can perform routine procedures without the physician e. Telemedicine will allow a p hysician to meet with multiple patients at the same time

c. Telemedicine reduces the need for patients to travel to physician's offices

What collaboration tool was discussed in class that enhances the participants' contextual awareness by sharing non- verbal information during meetings? a. Teleportation b. Twitter c. Telepresence d. Crowdsourcing e. Six Sigma

c. Telepresence

A Bill-of-Materials describes the components that make up an item, the quantity used,and what other information about a finished good? a. The value of the material b. The vendor who supplies the material c. The relationships of raw materials and subassemblies d. The lot sizing used when purchasing raw materials

c. The relationships of raw materials and subassemblies

_________ is any danger to which a system may be exposed. a. Exposure b. Information security c. Threat d. Security

c. Threat

Google's main business reason for installing fiber in select US cities is to _______. a. begin competing with the cable distribution giants b. bring the internet to rural areas c. generate more web traffic, which generates more adrevenue for them d. give people an option other than the telecommunications companies who control existing cable networks

c. generate more web traffic, which generates more adrevenue for them

The three security challenges of wireless communication are confidentiality, accessibility, and _____. a. importance b. Internet c. integrity d. incorporation

c. integrity

Sensors, RFID tags, meters, GPS, and other devices are used to collect supply chain information. These are all examples of __________. a. OLAP b. OLTP c. source data automation d. batch processing

c. source data automation

When you use Google Drive to work on a document with a classmate, this is considered _________. a. crowdsourcing b. teleconferencing c. virtual collaboration d. workflow

c. virtual collaboration

You have a MAC running OSX, which of the se is NOT true? a. A.You will be fine just using your computer for assignments and exams b. A.You might find it easier if you can run a MS Windows virtual machine (VM) c. A.You may not be able to run a MS Windows VM d. A.You must have a MS Windows VM for Assignments and Exams

d. A.You must have a MS Windows VM for Assignments and Exams

According to MIT Sloan Management Review, what percentage of companies have placed sustainability permanently on their management agendas? a. About 10% b. About 25% c. About 50% d. About 70%

d. About 70%

Which of the following knowledge management concepts includes an organizational culture focused on problem solving, a desire to share knowledge because of mutual interest, and norms that build trust, such as might be found in an MIS 111 FlexLab? a. Best practices community b. Knowledge management cycle c. Intellectual capital community d. Community of practice e. Click-stream analysis

d. Community of practice

What technique has been used by companies such as Starbucks and Netflix used to engage large numbers of non- employees to innovate, manage, design and market new products? a. Executive dashboards b. Click-stream analysis c. Capacity planning d. Crowdsourcing e. Six Sigma

d. Crowdsourcing

Concerns over using data to illegally discriminate against an individual or group, reaching wrong conclusions due to data contamination, and violating intellectual property (ownership of information) protections were legal and ethical issues discussed in relation to what topic discussed during this module? a. Telemedicine b. Crowdsourcing c. Click-stream analysis d. Data mining e. Project managemen

d. Data mining

[Systems] What term is used to describe interorganizational ERP systems that provide web-enabled links among a company's key business systems—such as inventory and production—and its customers, suppliers, distributors, and other relevant parties? a. MRP b. MRP-II c. ERP d. ERP-II

d. ERP-II

David Myers' (former controller of MCI/Worldcom) statement "I still don't know tha t one point when I started to cross the line...", is an example of how small, incremental repeated compounding of unethical decisions can result in what? a. Gut check b. Transparency test c. Whistleblowing d. Ethical drift e. Defining momen

d. Ethical drift

From a user's perspective, perceived affordances would include actual perceptible design affordances and what other category of perceptual affordances? a. Correct rejection of design characteristics that are not affordances b. Hidden design affordances c. Design mitigation affordances d. False or fake design affordances e. Accessible affordances

d. False or fake design affordances

In the Online Democracy model, the "Voter Activation Network" uses voter registration rolls to categorize voters as always /sometimes/never voting by using information obtained from: a. Online media b. Commercially-generated databases c. Private sector polling d. Government records e. Partisan political organizations

d. Government records

Pioneered at the University of Arizona, what decision support technology as developed to address problems such as a lack of focus, fear of speaking, hidden agendas and misunderstandings then collaborating with others? a. Data Mining b. Communities of practice c. Executive Dashboard d. Group Decision Support Systems e. Crowdsourcing

d. Group Decision Support Systems

[Linkages] When viewing the linkages among trading partners, which of the following is common for both upstream and downstream supply chains? a. Orders b. Payments c. Products d. Information

d. Information

The classic values conflict with "Who Am I'" represents what type of ethical dilemm a? a. Short-term vs. long-term b. Honesty vs. integrity c. Peer-pressure vs. boss-pressure d. Integrity vs. loyalty e. Organizational ethics

d. Integrity vs. loyalty

In addition to possessing contextual and relevant information, what other characteristic aspect does knowledge possess? a. It is an entity class b. It solves a structured problem c. It is always displayed visually d. It is actionable e. It is consistent

d. It is actionable

What is NOT a benefit of telemedicine? a. It improves access to healthcare b. It provides real-time care to isolated areas c. It reduces the need to move the patient d. It requires traveling so doctors can s ee their patients in person

d. It requires traveling so doctors can s ee their patients in person

The success of a Group Decision Support System (GDSS) is based upon two key features:contributor anonymity (i.e., the identity of the person making the comment or suggestion is not known), and what other important feature? a. Analytical CRM b. Reintermiediation c. Disintermediation d. Parallel Discussions e. Six Sigma

d. Parallel Discussions

What Leadership in Energy and Environmental Design (LEED) certification was the building where our classroom is located, Environment and Natural Resources 2, awarded by the U.S. Green Building Council? a. Certified b. Silver c. Gold d. Platinum

d. Platinum

Which of the following business component are *not* included in an MRP-II planning cycle? a. Raw Materials b. Workforce c. Plant and Equipment d. Product Margins

d. Product Margins

What type of business systems have the capability to place automatic requests to buy products from vendors in real time? a. AI (Artificial Intelligence) b. CRM (Customer Relationship Management) c. DSS (Decision Support System) d. SCM (Supply Chain Management)

d. SCM (Supply Chain Management)

Your username (UANetID) is your claim of identify to a computer system. When the computer system verifies your identify by requiring you to enter a password is an example of what type of authentication? a. Something a user is b. Something a user has c. Something a user does d. Something a user knows e. Something a user inherits

d. Something a user knows

Selecting EPEAT-compliant technology with a high rating over traditional, less energy efficient technology is an example of focusing on what sustainability effect? a. Use of government regulation to eliminate wasteful products b. Impacts of long term structural change c. Increased awareness through the use of metrics d. Substitution by using alternative methods

d. Substitution by using alternative methods

In the VAN (Voter Activiation Network) Relationship - Based Political Organizing video case study, the VAN was able to idenify the relationships of possible supporters using data from what source? a. Voter registration records b. Direct mail campaigns c. Online surveys d. Supporter's Facebook contacts e. Tax returns of registered voters

d. Supporter's Facebook contacts

In the Software Development Lifecycle Process (SDLC), in what SDLC stage is it the most costly to make changes to the system requirements a. Systems Design b. Systems Programming c. Systems Testing d. Systems Operation and Maintenance e. Systems Implementation

d. Systems Operation and Maintenance

Assume you need to put a sign that says "PUSH" on a door handle to explain the correct way to operate the door. The "PUSH" sign helps a user understand what aspect of usability? a. The sign explains a perceptible affordance b. The sign explains a correct rejection c. The sign explains a hidden affordance d. The sign explains a false affordance e. The sign explains a consistent affordance

d. The sign explains a false affordance

Which of the following is a DISADVANTAGE of purchasing prewritten software? a. It may eliminate the need to hire personnel specifically dedicated to a project. b. The company can know what it is getting before it invests in the product. c. The company can try out the software before purchasing it. d. The software is controlled by another company and may be hard to adapt.

d. The software is controlled by another company and may be hard to adapt.

In the case study presented in class, Nestle's Digital Acceleration Team training program focuses on developing skills in all of the following business issues, except: a. Listening b. Engaging c. Inspiring and Transforming d. Validating

d. Validating

When you get an unexpected email, you should avoid everything but? a. Opening attachments b. Clicking on links c. responding with personal data d. copying a link to a known website and pasting it into your browse

d. copying a link to a known website and pasting it into your browse

The web ____________ buyer power. a. decreases b. increases c. has no impact on d. has a mixed impact on

d. has a mixed impact on

ERP address information silos by _____________. a. reducing the amount of information presented b. simplifying system creation c. correcting a lack of communication between TPSs d. integrating functional areas

d. integrating functional areas

Which of the following is the correct order of the traditional System Development Life Cycle (SDLC)? a. analysis, investigation, design, programming and testing, impleme ntation, operation and maintenance b. analysis, investigation, design, implementation, programming and testing, operation and maintenance c. investigation, analysis, design, implementation, programming and testing, operation and maintenance d. investigation, analysis, design, programming and testing, implementation, operation and maintenance

d. investigation, analysis, design, programming and testing, implementation, operation and maintenance

The _____________ approach states that an ethical action is the one that provides the most good or does the least harm. a. common good b. fairness c. rights d. utilitarian

d. utilitarian

Telepresence is a version of ____________. a. email b. a portal c. unifie d communication d. videoconferencing

d. videoconferencing

Approximately what percentage of applications for jobs are rejected by potential employers before the interview due to public information posted online by the applicant (e.g.socialnetworking, blogs, media sites, etc.-that is, your online reputation)? a. Less than 5% b. About 10% c. About 30% d. Less than 50% e. 60% or more

e. 60% or more

Which of the following would motivate businesses to create accessible eCommerce websites for their customers? a. To comply with ADA and Section 508 of the Rehabilitation Act b. To capitalize on a larger base of potential customers c. The website is likely easier for all users to navigate d. Only the first two of the above reasons e. All of the three reasons shown above

e. All of the three reasons shown above

The task of brainstorming in a group decision support system is similar to what step in the knowledge management cycle? a. Disseminate b. Publish c. Refine d. Store e. Create

e. Create

When Making Charts, you should do all of the following if possible, except? a. Ensure there are Legends for each Axis b. include the units you are using c. Ensure that the chart is still readable and the series distinguishable if photocopied, so colorblind people can easily read it d. Ensure there isn't unnecessary data in the chart e. Ensure the chart has images and clip art relevant to it's topic to make it appear dynamic and interesting f. Include citations for data source

e. Ensure the chart has images and clip art relevant to it's topic to make it appear dynamic and interesting

Which rule of thumb must you follow? a. The 10 20 30 rule b. The 6 x 6 rule c. the 7 x 7 rule d. the No more than 20 slides rule e. the 2-3 minutes per slide rule f. None of the rules of thumb are absolute musts

f. None of the rules of thumb are absolute musts

All of the following are Information System Professional Specialties Except? a. Project management b. Business analyst c. Network management d. Database administrator e. Website designer f. Security analyst g. These are all Information System Professional Specialties

g. These are all Information System Professional Specialties


Conjuntos de estudio relacionados

NurseLogic Testing and Remediation Beginner

View Set

Hip, Pelvis, Thigh and Knee Conditions

View Set

PrepU Chapter 32: Skin Integrity and wound Care

View Set

Cell Bio Chapter 11: Membrane Structure

View Set

Nucleotides the building blocks of DNA

View Set

Advanced Data Structures and Algorithms: Quiz 1

View Set