MIS test 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

The algorithm commonly described as a Caesar Shift Cipher is

An encryption algorithm developed by Julius Caesar

Which of the following types of distance learning experiences are not taught in the presence of an instructor, but rather independently viewed by student online and at their pace?

Asynchronous classes

Harald Blaatand, who was the King of Demark from 940-981, is associated with what wireless technology?

Bluetooth technology

What is the two-factor authentication method used by the UofA that enhances the security of VPN connections by requiring a user to acknowledge a login request using a smartphone app or code number?

NETID+

In a packet-switched data communication network, which of the following is true

Packets can be lost or become corrupted between the sender and receiver

What IOT technology discussed in class could be used to identify shoppers and allow products to "introduce" (recommend) themselves to a shopper?

RFID tags

Google Docs is an example of what cloud-based service model?

SaaS

When displaying a webpage, such as http://www.u.arizona.edu/~wilbur, what is the name of the directory the web browser will check in the "wilbur" account for the "index.html" website

The "public_html" directory

How does telemedicine improve the delivery of medical care in rural communities?

"Telemedicine Avatars"

In the Chris Anderson Long Tail Video Case, he showed a curve reflecting the 80/20 rule, which he also called a power law and what

a Pareto curve

Which category of learner-instructor interaction focuses on course navigation and administrative requirements?

creating structure

A business intelligence tool that uses abstractions such as color and graphical images like instrument gauges to allow executives to grasp business situations quickly is known as a

digital dashboard

When major airlines (American, Delta, United, etc.) bypass travel agents and directly market tickets to customers from the airline's corporate website, this is an example of using what type of business sales strategy?

disintermediation

Manage/Store -Formatting and Currency

document

What term is used to describe how a product or service offered by a business fulfills the needs of its customers?

value proposition

What is an example of a social trend in e-learning?

you're expected to be connected to others in online space

Knowledge

decision

In the Online Democracy model, the "Voter Activation Network" uses voter registration rolls to categorize voters as always/sometimes/never voting by using information obtained from:

government records

In the History of the Cell Phone video case, how did the use of cellular phones change the way in which calls were made?

instead of calling a place, calls to cellular telephones are associated with a person

Capture-Identify Value

organize

Refine-Create an actionable context

prioritize

In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does "http://" define?

protocol

What type of problem has an optimal solution can be reached through single set of steps based on an algorithm?

structured

Similar to trends in computing hardware, what is the trend for wireless network hardware?

virtualization and merging with the cloud

What is NOT an advantage of digital transmission?

Harder to encrypt

What short-range wireless technology is commonly to connect smartphones with hands-free headsets for telephone calls and listening to music?

bluetooth

Satellites used for data communications that appear to be stationary from a fixed location on earth are placed in what type of orbit?

Geosynchronous orbit

An unobstructed, straight line-of-sight path between a transmitter and receiver is required by which of the following high-speed, commercial wireless network technologies?

Microwave

A "Fishbone" process analysis diagram is also known as:

a cause and effect diagram

The Internet of Things can be described as three "any"-type connections. What are these three "any" connections?

any time, any place, any thing

Create-Identify a New Process

brainstorm

What term describes the method of doing business by which a company sustains itself

business model

Which of the following knowledge management concepts includes an organizational culture focused on problem solving, a desire to share knowledge because of mutual interest, and norms that build trust, such as might be found in an MIS 111 FlexLab?

community of practice

The "Porter's Forces" model deals with what aspect of globalized business?

competition

The task of brainstormingin a group decision support system is similar to what step in the knowledge management cycle?

create

The SMED (single minute exchange of die) technique pioneered by Toyota reduced setup time and allowed Toyota's production process to what?

have a more agile manufacturing process

Dr. Neumann's being able to purchase his "Globalization Tie" directlyfrom a merchant in China is an example of what "era" of globalization?

individual based globalization

In Thomas Friedman's discussion of globalization, he described the process of globalization as being realized through action that were first defined by your country, then later defined by multi-national companies, and finally, in the most recent age of globalization is defined by

individuals

What is an example of something in the Integrated Application layer of the 4 Layer Model?

smart transport

When evaluating a vendor's "on-time delivery" performance using the SCOR (Supply Chain Operations Reference) model, what are we assessing about the vendor?

the vendors effectiveness

What is considered to be the center of the Internet structure?

tier 1 ISP

The characteristics of big data (data science) are described as being related to volume (of the information), velocity (speed at which information is collected), and what other characteristic?

variety (integrating data from multiple sources)

What free service delivers emergency information to registered UA students, faculty and staff -as well as their friends and family -via their cell phones, mobile devices and/or email accounts during a campus emergency?

UAlert

When analyzing data using Online Analytical Processing (OLAP)Multidimensional Analysis, the value of an item created by a projection would be the same as what Excel function?

SUM

You are multiplying Sales Valus in column A against a Sales Tax Rate in Cell D1. Which of the following formulas is a correct use of Absolute Value to ensure you are always referencing the Sales Tax Rate?

=A1*D$1

Which of the following is the correct method, or formula syntax, when using the COUNTIF function?

COUNTIF(range,criteria)

in the case study discussed in Database Management class, how did marketing use information to improve the profitability of their sales?

CUstomers were classified according into a status level and market segment **

Besides sensors, radios, and chips, what is the value in the Internet of Things?

Establishment of services on top of the connectivity

In general, what you think of as the quality of your network connection speed when you are using your PC, iPad, or Smartphone is most influenced by which of the following?

Local tier 3 ISP's

Which of the following projects is considered the first instance of a educational institution adopting a MOOC approach to the delivery of content (i.e., massive, open, online, and course-related)?

MIT's open courseware project

What term is used to describe the information collected describing the action (i.e., location, time, place, etc.) as opposed to the data itself?

Metadata

In the video case for telemedicine, Dr. Ana Lopez, who is the Medical Director of the Arizona Telemedicine Program, described how advances pioneered at the University of Arizona in tele-medicine and tele-pathology have improved the standard of health care in what way

Offering bundled, same-day assessment in the diagnosis of breast cancer

Parking garage passes and access control on employee ID badges are examples of:

RFID

What technology has been used for such diverse applications as healthcare, tracking lost pets, and toll collecting on highways?

RFID

In a VLOOKUP formula, what does the column_index_number argument, the third argument in the formula, mean?

This is the number of the column within the selected table_array where the lookup result is located.

If your laptop runs an application that needs to securely talk to a server, but isn't executed within a browser such as Firefox or Safari, what other technique is commonly used

VPN

If your laptop runs an application that needs to securely talk to a server, but isn't executed within a browser, such as Firefox or Safari, what other technique is commonly used?

VPN

If your laptop runs an application that needs to securely talk to a server, but isn't executed within a browser, such as Firefox or Safari, whatother technique is commonly used?

VPN

The benefits of using RFID from what category (driver) include offering new services, new and enhanced product features, and improved customer relationship management (CRM)?

Value generation

Businesses like to use Virtual Private Networks for every reason except?

Virtual networks are faster than ordinary internet connections

In the history of the cell phone case study, the inventor noted that prior to the invention of the cell phone, telephone numbers were generally associated with a place. After the invention of the cellphone, telephone numbers are most commonly associated with what?

a person

n the history of the cell phone case study, the inventor noted that prior to the invention of the cell phone, telephone numbers were generally associated with a place. After the invention of the cellphone, telephone numbers are most commonly associated with what?

a person

In a relational database, what term refers to the collection of items that are all related to a single unique value, where the single value often serves as the primary key

a record

In the video case about Dr. Chiu's Smartrek application, which of the following was not an incentive used to encourage driver participation?

ability to find people for carpooling

All of the symbols representing tasks and decisions that are shown in single column of a vertical cross-functional diagram are related to the same what?

actor

A graphical description of a database that describes the way in which an organization's data and business activities are associated with one another is known as _______________:

an entity relationship diagram

Signals used to send messages can be _______ or digital.

analog `

What term describes the method of doing business by which a company sustains itself?

business model

In the root cause video case, the marble of national monument was wearing prematurely. What was the change identified by thein-depth root cause analysis of the problem?

changing the time the lights illuminating the monument were turned on

What type of data mining analysis identifies patterns in the data based on geographic (physical) or temporal (time) proximity?

clustering

Telepresence systemsseamlessly integrate _____ and _____

contextual awareness; content management

An entrepreneur developing detailed documentation of their business processes so that they can be offered to other individuals as a franchise operation is an example o

converting tacit knowledge into explicit knowledge

Technologies such as Blackboard, Desire-to-Learn (D2L), Moodle, and Sakai represent what category of E-Learning technology?

course management systems

What other approach used incentives to motivate people to share their influence and intellectual property?

crowdsourcing

What technique has beenused by companies such as Starbucks and Netflix used to engage large numbers of non-employees to innovate, manage, design and market new products?

crowdsourcing

What type of data structure allows us to organize multi-dimensional information from a data warehouse so that it can be viewed using different data abstractions (or projections)

data cube

Maintaining multiple copies of the same data in multiple information systems that can be independently updated commonly results in what information management problem

data inconsistency

Concerns over discrimination, data contamination, and intellectual property (ownership of information) were legal and ethical issues discussed in relation to what topic?

data mining

Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control?

defense in depth

In the VAN (Voter Activation Network) case study, if you were supporting a Democratic candidate, which group of voters could be most efficiently reached using only a get-out-the-vote (GOTV) activity?

democratic voters who sometimes vote

The Democratic National Committee used a software tool called the Voter Activation Network to classify voters considering whether a voter is likely to cast a vote and the party affiliation of the voter.The GOTV (get out the vote) was specifically targeted at what demographic?

democrats who sometimes vote and support democratic candidates

In the decision support process, formulating a module to be evaluated and setting criteria for making a choice would occur during what phase of the decision making process?

design phase

In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does ".edu" define?

domain

In the SCOR model, competitive requirements such as reliability, responsiveness, and agility are all related to what dimension of a vendor's performance?

effectiveness

For companies managing their supply chain business processes using CFAR (Collaborative Forecasting and Replenishment), the process improvements over the traditional ordering process could be primarily considered as an improvement in which of the following?

efficiency

What category of location-based services would best describe products such as "location-based gaming", "social networking," and "find a friend"?

entertainment

With respect to a database, what term is used to describe an abstract representation of all of the information included in a data structure about a particular type of entity?

entity class

Besides sensors, radios, and chips, what is the value in the Internet of Things?

establishment of services on top of the connectivity

Often presented visually on an executive dashboard, what type of report focuses attention on business processes whose performance falls outside the range of their defined KPI metrics

exception

What type of guided media uses light for signaling?

fiber optics

Allowing individuals to file tax returns, renew driver's licenses, and obtain various permits online is an example of what type of eGovernment?

government to citizen

What technology was developed toaddress problems such as a lack of focus, fear of speaking, hidden agendas and misunderstandings then collaborating with others

group decision support system

In Thomas Friedman's discussion of globalization, he described the process of globalization as being realized through action that were first defined by your country, then later defined by multi-national companies, and finally, in the most recent age of globalization is defined by:

individuals

What dimension of Porter's Forces focuses on the decision that a buyer makes when choosing among direct, existing competitors when all of the competitors offer the same identical name-brand product (e.g., an iPhone 6)?

industry rivalry

Building on its initial success of the Voter Activation Network, the Democratic National Committee moved beyond simply classing voters by whether they are likely to cast a vote and their party affiliation to also include what additional aspect of Web2.0?

influencing voters by having supporters use their social media relationships

The three security challenges of wireless communication are confidentiality, accessibility, and _____.

integrity

Operating unregulated WiFi networks, clickers, Bluetooth headsets, cordless telephones, and microwave ovens using the same 2.4GHz ISM frequency range in close proximity to one another might result in what problem?

interference

in addition to possessing contextual and relevant information, what other characteristic aspect does knowledge possess?

it is actionable

hat is NOT a benefit of telemedicine?

it requires traveling so doctors can see their patients in person

Business metrics that describe the performance of critical business activities are known as

key performance indicators

The terms "contextual," "relevant," and "actionable" are commonly related to what term?

knowledge

The sequence of activities performed by users of GroupSystems' ThinkTank product directly parallel the steps in what other business process

knowledge management cycle

An ubiquitous learner is someone who:

learns in everyday life

Which of the following issues related to wireless communication would NOT be a problem for an RFID (Radio Frequency Identification) system

line of sight

Which of the following issues related to wireless communication would NOT be a problem for an RFID (Radio Frequency Identification) system?

line of sight

The Gainesville Police Department P2C (Police-to-Citizen) website uses visualization tools that allow citizens to help themselves in what way?

map crime incidents

An unobstructed, straight line-of-sight path between a transmitter and receiver is required by which of the following high-speed, commercial wireless network technologies?

microwave

What is a description of a structure or process used in a business that explains how it will work in the real world?

model

In a packet-switched data communication network, which of the following is true:

packets can become lost or become corrupted between the sender and the receiver

The command shown in class, to 'touch' another computer over the internet using its address and the command line, was what?

ping

In the "Democracy Online" framework, what group should take responsibility for providing information about positions, candidates, and advocacy efforts, and work to involve supporters through online interactive spaces?

political organization

Cyber risk consists of people, _______, leadership, and management

processes

What is the term used to describe the process of reducing the number of dimensions of a multi-dimensional data cube (e.g., from three dimensions, perhaps season, location, and product, into two dimensions, such as season and location)

projection

Internet-enabled globalization does the following

removes geography as a barrier to relationships

Which of the following actions would be considered a biometric authentication?

requiring a user to scan their fingerprint

As discussed in class, what company was founded in the Globalization 2.0 era based on the business model of selling discontinued product lines directly to consumers by using a new transportation infrastructure to reach a geographically distributed customer base?

sears, roebuck & co

In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what analogy in the real world did he use to describe TCP?

sending information taped to post cards

What term is used to describe the ethically-questionable practice of consumers buying products online after examining them in brick-and-mortar stores?

show rooming

Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what?

social engineering

The lack of what issue in online learning communities leads to a lack of commitment to a course, distrust and poor engagement in the class by students?

social presence

What is software architecture in which a single instance of software runs on a server and serves multiple a group of users who share a common access with specific privileges to the software instance?

software multi-tenancy

Your username (UANetID) is your claim of identify to a computer system.When the computer system verifies your identify by requiring you to enter a password is an example of what type of authentication?

something a user knows

As confirmed by our in-class poll, what is the most likely action an owner will take with their old computer or telephone after purchasing a new device?

store it

When analyzing a set of click-stream data, what term is used describe the percentage of rows containing an item relative to the total number of rows?

support

In the VAN (Voter ActivationNetwork) Relationship-Based Political Organizing video case study, the VAN able to identifythe relationships of possible supporters using data from what source?

supporters facebook contacts

Subjective knowledge that is based an individual's experiences is known as what

tacit knowledge

"According to Phil Darg, the largest category of online students that are primarily motivated by due dates and major assignments is known as:"

taskers

What collaboration tool was discussed in class that enhances the participants' contextual awareness by sharing non-verbal information during meetings?

telepresence

Which of the following does a Fishbone Diagram typically not inform you about a problem?

the cost of correcting a problem with a process

Applications such as "find a friend" (FourSquare), driving directions (Smartrek), roadside assistance (OnStar), and fleet management (UPS and FedEx) are all examples of services that have been enhanced by knowing what?

the location of the requester

In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cerf, what common problem did his analogy using the postal service to email a page from a book have with sending TCP packets?

the message might get lost and not delivered

In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what common problem did his analogy using the postal service to email a page from a book have with sending TCP packets?

the message might get lost and not delivered

Although globalization has been underway for many centuries, digitization, networking, and connectiveness have dramatically increased what?

the pace of change

The success of a Group Decision Support System (GDSS) is based upon two key features: contributor anonymity (i.e., the identity of the person making the comment or suggestion is not known), and what other important feature?

the parallel discussions

As I move farther away from campus, I notice that my UAWiFi connection gets progressively weaker. What factor will always cause this to occur?

the signal strength is lost due to attenuation

With respect to a product's design, who forms (determines) the "mental model" of a system's user interface?

the users of the product

With respect to a product's design, who forms (determines) the "mental model" of a system's user interface?

the users of the products

What common function do "HTTP", "TCP" and "IP" share?

they all define internet based protocol

Which of the following statements is true about a strategic business decision

they are generally made by senior business managers

In a vertical cross-functional business process diagram, the order of items in one column (from top to bottom) shows what relationship among these items?

time

In a vertical cross-functional business process diagram, the order of items in one column (from top to bottom) shows what relationship among these items?

timing

Which of the information layers in the Internet of Things model focuses on the communication networks that connect the sensors that actually collect the data?

transmission layer


Conjuntos de estudio relacionados

Economic and Business Statistics week 11+

View Set

Business & Government Relations Final

View Set

Chapter Eighteen: Classification

View Set

Calculus Formulas and Derivatives

View Set