MIS 111 Exam 1 (ICQs/PARs)
The _____________ approach states that an ethical action is the one that provides the most good or does the least harm.
utilitarian
The Gainesville police department started using the internet to accomplish all of these objectives except?
Empower businesses to identify high crime areas and determine appropriate levels of security.
Who said the following quote "You can't use up creativity. The more you use, the more you have."
Maya Angelou
What Center in the Eller College of Management has the mission to help students improve their potential and advance society by developing an entrepreneurial and innovative mindset?
McGuire Center for Entrepreneurship
What is the name of the yearlong, team-based program to learn the principles of entrepreneurship and innovation in the Eller College of Management that allows students to build a new venture from the ground up collaboratively with mentors, industry experts, investors and real-world entrepreneurs?
McGuire New Venture Development Program
Steven Clift has practical online steps for government to support democracy. What was the suggested open standard data format to "Provide access to raw data from decision-making information systems."?
XML
Does IT provide opportunities for people with disabilities?
Yes
Was David Myers treated fairly?
Yes
You decide to use the password "1234" on your computer because you figure nobody cares enough about your information to steal it. This is a risk __________ strategy.
acceptance
Who was quoted as saying,"Integrity is All You've Got"?
Karl Eller
How does adding social networking to the VAN allows candidates to improve the effectiveness of campaign volunteers?
Leverages personal relationships of campaign volunteers with voters
When you are investing on your own, what type of order do the readings say you should be placing?
Limit Order
What type of customer intimacy zone innovation focuses on making structural modifications to established products in order to create a distinctive sub-category?
Line-Extension Innovation
An investors willingness to potentially loose their money in exchange for the potential of higher returns is called their?
Risk Tolerance
In 2000, operating a basic internet application costs businesses approximately ________ per month. In mid-2016, operating the same application in Amazon's cloud cost approximately ________ per month.
$150,000; $1,000
Taxes, FICA and other Payroll Deductions can easily be what percentage of a person's paycheck?
35%
According to the in-class video case study on the Power of Entrepreneurship, approximately how many people live on less than $10.00 per day?
4 Billion
If you graduate from the University of Arizona when you are 22 years old and have a credit card that charges an 18% annual rate. If you just have a $2,000 credit balance with an 18% annual rate, but only make minimum payments of 2% of the balance each month, what birthday will you likely be celebrating when your $2,000 credit card balance is paid off?
52nd bday
According to the reading on "Candidates Fielding YouTube Questions", what % of Americans believe "generally speaking, elected officials in Washington lose touch with the people pretty quickly."
79%
What is the recommended solution covered in a tech tip for keeping track of many secure passwords that could be hard to remember?
A Password Manager App on a Cell phone with a Lock Screen
______________ is an electronic profile of you and your habits.
A digital dossier
_________ is a communications control.
A firewall
What is an Exploit?
A technique used to compromise a system
Assume you are off campus and cannot connect to UAWiFi. Which of the following would be a secure alternative to access the campus network?
Access any open wireless network, and then use a VPN to connect to campus
______________ refers to determining who is responsible for actions that were taken.
Accountability
Making sure your customer's information is correct in your information systems is a(n) _________ issue.
Accuracy
Signs that an email is a phishing attempt often include everything but:
An option to opt out of future emails
Phishing Attacks often contain all the following except what?
Ask you to go to the official site for an institution with the correct link that exactly matches the URL it really goes to when you hover over it
What term is used to describe the printable, one-time use codes you can generate for NetID+ authentication that are useful when traveling, when cell phone carriers may charge additional fees for calls and texts, or when you do not have access to your primary authentication device?
Bypass codes
If you have an empty building you can move into if your primary location is destroyed, you've implemented a _________ site.
Cold
WalMart has a(n) ___________ strategy.
Cost leadership
In cybersecurity, what is our last line of defense?
Data Encryption
______________ is a privacy policy guideline for Data Collection.
Data should be adequate, relevant, and not excessive in relation to the business objective.
When the DNC was targeting voters using their data-driven approach, which of these voting groups were the most appropriate to target?
Democratic and swing voters who sometimes vote
Which group of voters would result in the highest return on investment (i.e., largest number of votes for a DNC candidate) using a get-out-the-vote(GOTV) strategy?
Democratic voters who sometimes vote
What type of innovations are intended to be incompatible with existing standards and value chain, and must develop markets de novo (latin for "from the beginning")?
Disruptive Innovation
Which of the following was NOT described as one of the four innovation zones?
Disruptive Technology Zone
Humanities: Using the latest technology such as avatars, 3D glasses and green screens, what Humanities professor has created a virtual environment that allows students to take a step back in time and truly immerse themselves in the nuances of the Harlem Renaissance?
Dr. Bryan Carter
NetID+ is the University of Arizona's two-step authentication solution that adds two-step authentication as an extra layer of security to your NetID-accessed accounts, including D2L. NetID+ is now required for all campus logins during 2019. What is the name of the phone app that works with NetID+
Duo
What is the official Smartphone app that helps facilitate logging in with NetID+?
Duo Mobile
IT has changed the manager's job in many ways. Which of the following is NOT the result of this change?
Easier to make a decision
What type of feasibility was a barrier to the prior leadership in Maryland producing the map that overlaid the foster care sites with locations of known violent criminals?
Economic Feasibility
When you're travelling and on the campus of another university, what is a secure, worldwide roaming access service that allows students, researchers, and staff to obtain fast and secure Internet connectivity?
Eduroam
The outcomes of the E-Government Strategy OMB report primarily focuses on improving business processes in which of the following ways ?
Efficiency
In the case study "IT's About Business 1.3," (at the beginning of section 1.4 of the textbook), ________ is the Internet on a portable hard drive.
El Paquete Semanal
What is the name of the undergraduate certificate offered through the McGuire Center for Entrepreneurship that provides Eller undergraduate students with the opportunity to apply their knowledge and skill sets in real-world environments in order to make your community a better place to live and work as well as having a positive social impact
Eller Social Innovation (ESI) Certificate
What is MIS?
Finance, Accounting, Security, convince, privacy, personal safety (Apple iTunes: online sales, royalty payments to artists, downloads etc.) ( getting into your own dorm room)
A public company's annual report is also called its?
Form 10-K
Embraced by the University of Arizona's strategic plan, what term is used to describe how the velocity, scope, and systems impact of breakthroughs is disrupting almost every industry in every country and heralds a transformation of entire systems of production, management, and governance?
Fourth Industrial Revolution
How do you check or report a suspicious phishing email at the UofA?
Go to https://security.arizona.edu/
What type of eCommercemodel focuses on increasing the efficiency of the University by allowing its employees to submit time card information using UAccess?
Government-to-employee (G2C)
Which of the following is TRUE? (IT)
IT impacts entire industries.
Which one of these is not one of the three listed techniques to rebalance your portfolio?
If you are drawing down your investments in retirement, you can alter your disbursements so more come from an over weighted category
Which group of voters would result in the highest return on investment (i.e., largest number of votes for a DNC candidate) using a persuasioncampaign strategy?
Independent voters who always vote
SCADA attacks typically occur on ___________.
Industrial control systems
___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information.
Information extortion
______________ is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others.
Information privacy
What do Informational systems actually do?
Information systems create solutions and focused on a customer's business needs
_________ is an example of a primary activity for most firms.
Operations
Which of the following is NOT a characteristic of alignment?
Organizations view their IT department employees as supremely important
If you miss a class what course technology will allow you to watch a podcast of it?
Panapto
looking at this problem from an MIS perspective...
People - human factors (understandability, capability, cost of knowledge acquisition, and acceptance) Process - design factors (algorithm, parameters, complexity, accuracy) Technology - systems factors (operational accuracy and reliability, implementation and operating costs, technical feasibility, complexing/interdependence)
Hampton Virginia is stimulating Citizen Engagement in government in many ways. According to a study, Hampton citizens quality information included all of the following characteristics except?
Personal
Which of the following is NOT one of the "4 P's" of innovation?
Personalization
Knowing what kind of surveillance an employer can use on its employees is a(n) _________ issue.
Privacy
______________ is the right to be left alone and to be free of unreasonable personal intrusions.
Privacy
What type of innovation focuses on the supply side, looking for opportunities to remove non-value-adding steps from the workflow?
Process Innovation
Which of the following "4 P's" of Innovation discussed by Dr. Mars related to the instruction of the MRI for diagnosing internal illnesses?
Product
Determining whether or not corporate computers can be used for private purposes is a(n) _________ issue.
Property
What major piece of legislation impacting business followed the MCI and Enron bankruptcies?
Sarbanes-Oxley Act
What is the name of the social engineering attack that frightens computer users into visiting malware-infested websites by appearing to be legitimate warnings from antivirus software companies that your computer's files have been infected with the intent of tricking a user into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection?
Scareware
Information systems professionals understand business needs and analyze processes, methods and data to create customer-oriented solutions. The value proposition for MIS was described more briefly by Dr. Jay Nunamaker, Regents Professor and founding chair of the MIS Department, as a discipline focused on doing what for business?
Solving real problems for real people
What is the name of the secure password storage product offered to student sthrough the UofA Information Security Office? (Hint: see https://security.arizona.edu in the "Student" section.)
Stache
Which of the following normative business ethics approach is most commonly used by businesses?
Stakeholder Theory
Medicine: What is the name of the University of Arizona's state-of-the-art, technology-driven, clinical simulation training facility supporting the innovative educational needs of the medical school and its clinical affiliates, including industry health care partners and the community? This facility is dedicated, in every sense, to providing truly experiential, innovative and immersive simulation education. With 33,000 square feet of dedicated space, it represents one of the largest simulation facilities housed within a university in the U.S..
The Center for Simulation and Innovation
All investments involve some degree of risk, what is the reward for taking on risk?
The potential for a greater investment return
_________ is any danger to which a system may be exposed.
Threat
support the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data.
Transaction processing systems (TPS)
If you are just being asked for something you know to get into a system, what is the system attempting to do?
Validate your identity
Which of the following can be used to confirm you have correctly submitted the correct assignment report document before the deadline?
all of the above (A. Reviewing the document displayed when uploading your assignment report, B.Reviewing the Digital Receipt email from D2L confirming your submission, C.Using the "Submission History" screen to see the filename and display the report)
IT __________ be used to create a competitive advantage ___________.
can; when it is used effectively
When you get an unexpected email, you should avoid everything but?
copying a link to a known website and pasting it into your browser
Anthropology: Lead by Drs. Sudha Ram (MIS) and Dr. Barbara Mills (School of Anthropology), what "Big Data" knowledge discovery project is a collaboration between the College of Social and Behavioral Sciences and the Eller College of Management that focuses specifically on pre-Hispanic archaeological data from the American Southwest — Arizona, Utah, New Mexico and Colorado — from A.D. 800 to the 1500s, shortly after the arrival of the Spanish in the region?
cyberSW Project
What is the named used to describe daily spending decisions like eating at a restaurant, buying clothes, drinking Starbucks, or playing a round of golf?
discretionary
Weak passwords are a(n) ___________ threat.
employee
The _________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource.
exposure
The web ____________ buyer power.
has a mixed impact on
UA Libraries: What is the name of the collaborative working environment and makerspace at the University of Arizona Science and Engineering Library that is a collaboration among Innovate UA, the College of Humanities, and the UA Libraries. that is equipped with monitors, computers, basic office essentials, sleek communal tables, massive wall boards, 3D printing and scanning, motion capture instruments, open source microcontroller kits, a soldering station, and usability and play testing lab?
iSpace
Car and technology companies are currently competing over who can offer the first self-driving car. This is an example of a(n) _________ strategy.
innovation
On your personal financial balance sheet, your student loans would be classified in what category?
liability
The _________ prohibits an organization from collecting any personal information unless the customer specifically authorizes it.
opt-in model of informed consent
You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is _________ and is _________.
piracy; illegal
Trustev was created to _________.
reduce online fraud
What are the 4 topics about IT?
reduce the number of middle managers IT changes the manager's job Can IT eliminate jobs? (no but creates them) impacts employees at work