MIS 111 Final
What special character does Excel use as a delimiter following the worksheet name in a cross-sheet reference? ! (Exclamation point) % (Percentage sign) $ (US currency sign) & (Amphersand)
! (Exclamation point)
When entering an Excel expression into a worksheet cell, which of the following symbols must be used as the first character? "@" (at sign) "=" (equals sign) "!" (exclamation mark) "?" (question mark)
"=" (equals sign)
IT __________ be used to create a competitive advantage ___________. 1) can; because everyone has access to technology 2) cannot; because everyone has access to technology 3) cannot; even when it is used effectively 4) can; when it is used effectively
can; when it is used effectively
Companies purchase digital dossiers to ________. engage in electronic surveillance create customer intimacy evaluate the competition track their own reputations
create customer intimacy
Which of the following is the correct order for the KMS cycle? create, capture, refine, store, manage, disseminate create, capture, store, refine, manage, disseminate create, capture, store, manage, refine, disseminate create, capture, refine, manage, store, disseminate
create, capture, refine, store, manage, disseminate
According to IT's About Business 8.6, FedEX launched EDEN (Equipment Detection, Event Notification) to improve the efficiency and effectiveness of its ____________. 1) UPS 2) profitability analysis 3) package tracking 4) dock operations
dock operations
The most common media used for the Internet backbone is a ________ network. 1) radio 2) microwave 3) fiber-optic 4) satellite
fiber-optic
The threat from rivalry is _________ when there is intense competition among many firms in an industry and _________ when competition is not as intense. high; high low; high low; low high; low
high; low
Data warehouses is a repository of _________ data, used primarily by _______ companies. historical; large real-time; large historical; small real-time; small
historical; large
your personal UArizona email address is "[email protected]", which of the following would be the exact URL that you should used when accessing your personal U-System URL website address for the EC Hosting project? http://www.u.arizona.edu/~wwildcat http://www.u.arizona.edu https://www.u.arizona.edu/~wwildcat http://wwildcat.u.arizona.edu
http://www.u.arizona.edu/~wwildcat
If your sales team shows a customer's name is "Johnny Smith" but your shipping department says it is "John A. Smith", this is a data __________ issue. inconsistency security redundancy isolation
inconsistency
Which of the following is the full filename that should be used for your EC Hosting assignment in the public_html directory on the u.arizona.edu (U-System) server? Index.html (first letter is upper case) index.html (all lower case characters) INDEX.HTML (all upper case characters) website.html (all lower case)
index.html (all lower case characters)
Typing in your password to access a system is an example of something the user _________. does knows is has
knows
If you hire a cybersecurity company like FireEye to identify security weaknesses in your information systems so you can enhance your security management to minimize the impact of theats to your business, you are using a risk _________ strategy. transference limitation analysis acceptance
limitation
Buyer power is high when buyers have _________ choices from whom to buy and low when buyers have _________ choices. few; few few; many many; few many; many
many; few
Information about data sources; database, table, and column names; refresh schedules; and data-usage measures are collectively define what issue about the information in a data warehouse. cost quality metadata governance
metadata
Big Data helps companies identify groups of customers that share one or more characteristics. This is called __________. data analyzation experimentation business model creation microsegmentation
microsegmentation
IT makes managers ________ productive and ________ the number of employees who can report to a single manager. more; increases more; decreases less; increases less; decreases
more; increases
If you receive a phishing email on your UA email account, where should you report the phishing email? [email protected] [email protected] [email protected] [email protected]
IT changes managers' job by _________ decreasing the volume of information they have to process. providing near real-time information so managers can make quicker decisions. making it easier to get all employees to work from one location. improving an employee's sense of connectedness.
providing near real-time information so managers can make quicker decisions.
Database systems minimize ________. independence redundancy security integrity
redundancy
You are a marketing manager responsible for planning the budget for your department. This is a(n) ______ task and a(n) _______ decision. 1) unstructured; management control 2) unstructured; strategic planning 3) semistructured; management control 4) semistructured; operational control
semistructured; management control
As a purchasing manager, you have to purchase products every week to replenish your existing items in your inventory. This is a(n) ________ decision. 1) structured 2) unstructured 3) semistructured 4) midstructured
structured
As shown below, what "Host name" should be used with WinSCP (or equivalent field for CyberDuck) to connect to the UArizona personal web hosting server? www.u.arizona.edu websites.arizona.edu hosting.arizona.edu u.arizona.edu
u.arizona.edu
In the URL "http://www.u.arizona.edu/~wtn", what part of the URL defines the hosting server? www http:// ~wtn u.arizona.edu
u.arizona.edu
A data ________ is a repository of historical data that are organized by subject to support decision makers in the organization . shop warehouse table store
warehouse
In the following example, what lookup_value should be used to return the value of 24.53 contained in cell G9? 5 Distance!"D 2" "D 2" Distance!G9
"D 2"
On the U-System (u.arizona.edu) hosting server, ___(a)___ is the directory that contains the ___(b)___ website file. (a) public.html, (b) index_html (a) index_html, (b) public.html (a) index.html, (b) publc_html (a) public_html, (b) index.html
(a) public_html, (b) index.html
In the Project Selection example discussed in the video case on Decision Matricies by Dr. Martin from DePaul University, if a criterion received 5 points as a rating but the criterion's weight was 10%, what would be the score used for that criterion? 10.0 5.0 1.0 0.5
0.5
Which of the following represents the value 1234.56 when formatted as an Excel "Accounting" value with "Symbol" as "None"? $1,234.56 1.23E+03 1234.56 1,234.56
1,234.56
According to Helium.com, about what percentage of applicants are eliminated before the job interview due related specifically to the applicant having posting inappropriate comments about previous jobs? 90% 60% 10% 20%
10%
Geoff Wilson's first product took _________ months to develop; today, his company can bring a minimum viable product to customers in _________ month(s). 18; 3 24; 12 24; 1 18; 6
18; 3
According to the World Economic Forum, of the approximately 50 million tons of electronic e-waste produced each year, what percentage is recycled? 20% 2.3% 50% 90%
20%
What is the correct "port" number that should be used with the WinSCP or CyberDuck secure file transfer program? 80 22 21 25
22
In the following example, if we change the "column_index" value from 3 to 6 (e.g., =VLOOKUP(5, B3:H16, 6,) ), what value will be returned? 24.53 18.78 19.55 12.04
24.53
In the case study "IT's About Business 1.3," (at the beginning of section 1.4 of the textbook), approximately ________ percent of Cuba's citizens have Internet access at home. 5 45 75 95
5
As discussed in the Mythical Man Month, consider the situation shown below where the time to complete each task of the project was estimated to require 3 workers for 4 months, but in actuality, each task will require 2 months if we only use 3 workers. Theoretically, we could still complete the project on-time, if we could complete the remaining 18 months of work in the remaining 2 months. In addition to our original 3 workers, how many additional workers would be need to hire? 2 3 6 9
6
When using more active learning approaches (based on what why say and write), people generally remember what percentage of the material? 10% 30% 50% 70%
70%
According to Social Intelligence, approximately what percentage of employers have decided not to hire a candidate based on inappropriate, discriminatory, or unsafe content they found online? 50% 75% 95% 20%
75%
According to the reading on "Candidates Fielding YouTube Questions", what % of Americans believe "generally speaking, elected officials in Washington lose touch with the people pretty quickly." 1) 79% 2) 25% 3) 98% 4) 6%
79%
_________ is a physical control. A firewall Encryption Virtual Private Network (VPN) A company gate
A company gate
______________ is an electronic profile of you and your habits. A digital dossier Curriculum Vitae Social network Information framework
A digital dossier
_________ is a communications control. Encryption Radio Frequency Identification (RFID) A company gate A firewall
A firewall
________ is an autonomous device that monitors its own condition as well as physical and environmental conditions around it and are an underlying technology of ________. 1) A QR Code; wireless sensors 2) An RFID tag; wireless sensors 3) A wireless sensor; the IoT (Internet of Things) 4) A wireless sensor; RFID (Radio Frequency Identification)
A wireless sensor; the IoT (Internet of Things)
An assignment is due and you cannot get a push to your DuoPlus app on your smart phone. What other options do you have to authenticate yourself for UArizona 2-factor authentication (if you have planned ahead for using the option)? (Select the most complete answer) Generating a passcode locally using the app Sending a passcode using SMS texting Pre-printed bypass codes Calling a lifeline (trusted friend's number) Using a Yubikey hardware token Calling an alternate phone number Calling the 247 for idenity verification ALL of the answers shown are possible options for being able to authenticate when you cannot receive a push message to your DuoPlus app
ALL of the answers shown are possible options for being able to authenticate when you cannot receive a push message to your DuoPlus app
According to the "What is Blockchain?" video case, blockchain-based Bitcoin was seen as increasing the difficulty of doing what? Correctly identifying ownership of property Providing dated proof of existence Ensure the accuracy of traditional notaries Ability of public authorities to enforce traditional financial regulations
Ability of public authorities to enforce traditional financial regulations
According to the "What is Blockchain?" video case, blockchain-based Bitcoin was seen as increasing the difficulty of doing what? Ensure the accuracy of traditional notaries Ability of public authorities to enforce traditional financial regulations Providing dated proof of existence Correctly identifying ownership of property
Ability of public authorities to enforce traditional financial regulations
Of the over $550 million dollars lent to low-income individuals or to those who do not have access to typical banking services, what was the approximate average size of a loan made by the Kiva microfinance services organization? About $10,000.00 About $1000.00 About $10.00 About $400.00
About $400.00
Which of the following metrics would be used as a measure of the ability of a company to meet its short-term financial obligations? Fixed Assets Acid Test Inventory Turnover Gross Margin
Acid Test
________ use internal batteries for power, and they broadcast radio waves to a reader. 1) Active QR code symbols 2) Passive RFID (Radio Frequency Identification) devices 3) Active RFID (Radio Frequency Identification) devices 4) Passive QR symbols
Active RFID (Radio Frequency Identification) devices
The advantage of ________________ is they can be read over greater distances because they use internal batteries for power. 1) WSNs 2) QR codes 3) Passive RFID tags 4) Active RFID tags
Active RFID tags
In a communication architecture, transmitters and senders are described using what term? Contents Actors Infrastructures Protocols
Actors
According to the Mythical Man Month view, adding resources (addition team members) to a project will improve (shorten) the time required to complete the project by the largest amount under which of the following scenarios? Adding resources to a task with high communication requirements Adding resources to an unpartitionable task Adding resources to a task with complex interrelationships Adding resources to a partitionable task
Adding resources to a partitionable task
In the video case "How Data Solves Government Problems", which of the following categories of data was NOT part of a planned map visualization that would help assess whether resources were being distributed appropriately in the state of Maryland? Addresses of homes where senior citizens live Addresses of homes where registered sex offenders live Addresses of homes where individuals who have committed the most violent crimes live Addresses of homes where foster children live
Addresses of homes where senior citizens live
What is the harm of journalists editing or combining photos to create a 'more compelling scene' which also projects an image that never actually existed? 1) The 'news' the journalist is portraying may be inaccurate and/or biased 2) The deception, when revealed, may erode public trust in journalism 3) If the new scene portrays an individual or country in a negative light it can become propaganda and/or lead to violence 4) All of the above
All of the above
How can you contact the UArizona 247 Support Center (available 24 hours a day, 7 days a week) for free (no-cost) assistance with tecnhology and computer software? (Select the most complete answer) On the web at: http://247.arizona.edu Calling on the phone: (520) 626-TECH [or 520-626-8324] In-person at the 24/7 Lounge in the Student Success District All of the answers are possible ways to contact the 247 Support Center for assistance
All of the answers are possible ways to contact the 247 Support Center for assistance
From the Video Case "It's Getting Harder to Spot a Deep Fake Video" what is a potential positive application of these deepfake videos that benefits individuals struck by disease? 1) Allowing people who have lost their voice to have synthetic voices 2) Turning all existing movies into Nicholas Cage Movies 3) Allowing people caught on video saying extremely offensive things to deny it and insist it was a fake video 4) Committing fraud by creating a fake video that could be used to blackmail an individual or ruin their reputation
Allowing people who have lost their voice to have synthetic voices
Sound waves, such as the human voice, vary continuously over time and are considered what type of data? Secure Transparent Analog Digital
Analog
What was the name of the innovative collaborative classroom pioneered by the Eller College of Management in the early 2000's? Arizona Telesuite Wilbur's Workroom CATs Collabororium Wildcat Classroom
Arizona Telesuite
According to Intel's "power of Entrepreneurship" video case, during the time it took for you to watch the video case, approximately how many new businesses did entrepreneurs start? Around 800 Around 110,000 Around 300,000 Around 110,000,00
Around 800
Which of the following applications would commonly use Ultra High Frequency (UHF 902-928 MHz) wireless communications? Animal Identification Electronic Door Locking Systems Automatic Toll Collection Systems Asset Management in Warehouses
Asset Management in Warehouses
From an accounting perspective, what term is used to describe the value of anything you own? Assets Liabilities Expenses Income
Assets
What term is used to describe any system that increases or improve functional capabilities of individuals with disabilities? Open Technology Disability Enabled Assistive Technology Inclusive Systems
Assistive Technology
What technology was introduced in 1657 that fundamentally changed society? a) Steam engine b) Telegraph c) Moveable-type printing press d) Balance spring
Balance spring
In passive learning environments focused solely on reading and hearing information, would not be an effective way of preparing someone for to be able to do which of the following learnign outcomes? Being able to define the information Being able to list the information Being able to describe the information Being able to apply the information
Being able to apply the information
__________________ are/is the most effective and efficient way of doing things, readily available to a wide range of employees. Knowledge management systems Best practices Knowledge management Intellectual capital
Best practices
Plus (+), minus (-), multiply (*) and divide (/) are all examples of what type of arithmetic operator? Logical Unary Binary Assignment
Binary
In the Bloomberg video case "Killing the Need for Passwords," what term is used to describe the science of measuring features or fuctions of the human body to establish your identity? Physical Security Defense in Depth Biometrics Non-repudiation
Biometrics
Which of the following descriptive terms would generally be associated with the transmission of digital data? Bits per second Cycles per second Hertz (Hz) Continuously variable waves
Bits per second
Which wireless technology offers a single wireless standard to integrate technologies previously connected with with cabling? Radio Frequency Identification (RFID) Microwave Wi-Fi Bluetooth
Bluetooth
What "law" states that "adding manpower to a late software project makes it later"? Gilder's Law Brooks' Law Moore's Law Metcalf's Law
Brooks' Law
What type of chart is similar to a scatter chart, but allows you to add another dimension of data on a third axis? Bubble Chart Combo Chart Stacked Area Chart
Bubble Chart
What type of chart is similar to a scatter chart, but allows you to add another dimension of data on a third axis? Stacked Area Chart Bubble Chart Combo Chart
Bubble Chart
In the video case "The world of micro-loans", what product was being produced by a loan recipient in Lima, Peru that legend says represents financial prosperity? Bear statue Bull statue Tiger statue Lion statue
Bull statue
What term is a measure of the speed in which cash is spent by entrepreneurial firms, which often have negative income and a high growth rate? Burn rate Operating income Investment securities Depreciation and Amortization
Burn rate
What approach do spear phishing emails use to make hacking using phishing emails more effective? By offering a prize or award for responding By requesting an email "read receipt" to the hacker knows the phish has been read By appearing to send a message from a known person or trusted sender By including a deadline that a response is requested from the recipient
By appearing to send a message from a known person or trusted sender
How is the hierarchical order of pivot fields displayed in a pivot table (i.e., major vs. standing as when in the following sample pivot table) determined? By the order of the field names in the "Values" section By the order of the columns in the original worksheet By the order of field names in the "Columns" section By the order of field names in the "Rows" section
By the order of field names in the "Rows" section
What term is used to describe the pre-printed codes that can be used as an alternate authentication method when your DuoMobile app isn't available? Lifelines Hardware Tokens SMS Passcodes Bypass Codes
Bypass Codes
What term is used to describe a pre-printed list of NetID+ authentication codes that can be used when your Duo App cannot be used for authentication? Bypass codes Yubikey tokens SMS Passcodes Lifelines
Bypass codes
What was the name of the steroscopic 3-D (S3D) virtual environment used by the Raytheon Company to display 3-D models? HOLODECK MOOC CAVE DELVE
CAVE
Which of the following Excel functions will return the number of cells in a range by adding the values that match specified criteria? AVERAGEIF SUBTOTAL COUNTIF SUMIF
COUNTIF
Which of the following Excel functions will return the number of cells in a range by adding the values that match specified criteria? COUNTIF SUMIF AVERAGEIF SUBTOTAL
COUNTIF
Which of the following residential internet connectivity technologies can have degraded performance if many of your neighbors are accessing the Internet at once? Fiber-to-the-home (FTTH) modems Cable modems DSL modems Dial-up modems
Cable modems
According to the Mythical Man Month, all of the following happen when you add workers to a project EXCEPT: Change the project's scope Repartition the work Increase the project team's inter-communication
Change the project's scope
Pivot tables allow data to be easily grouped and analyzed by their values, such residence hall or major. Which of the following data mining methods would use a similar approach? Forecasting Association Classification Sequencing
Classification
If you have an empty building with just rudimentary services and facilities that will allow you to move into quickly if your primary location is destroyed, you've implemented a _________ site. Neutral Hot Warm Cold
Cold
What metadata from your orignal worksheet data is used to identify the Pivot Table Fields? Most frequently used data value in a column Comment fields Worksheet names Column headings (Header row)
Column headings (Header row)
From the Video Case "It's Getting Harder to Spot a Deep Fake Video" what is a potential negative application that could cause great harm to well known people? 1) Committing fraud by creating a fake video that could be used to blackmail an individual or ruin their reputation 2) Allowing people caught on video saying extremely offensive things to deny it and insist it was a fake video 3) Turning all existing movies into Nicholas Cage Movies 4) Allowing people who have lost their voice to have synthetic voices
Committing fraud by creating a fake video that could be used to blackmail an individual or ruin their reputation
According to the "PM Essential Skills" video case, project managment is all about what? Linear relationships Complex Inter-relationships Ensuring nothing ever goes wrong Making to-do lists
Complex Inter-relationships
In a three-tier database architecture, what tier is used to model data? Abstract Physical Conceptual View
Conceptual
What capability in Excel allows you to highlight cells based on their values, add data bars that graph relative values in a range, or highlight duplicate values in a column of data? Pivot Table Sort Function Conditional Formatting Watch Window
Conditional Formatting
What role does the Internet Corporation for Assigned Names and Numbers (ICANN) serve in the global internet? Monitors internet traffic for illegal activity Manages authentication on VPN networks Coordinates the assignment of IP addresses through registrars Operates inter-exchange Network Access Points (NAPs)
Coordinates the assignment of IP addresses through registrars
According to the lecture, what are some possible incentives for innovations? 1) Copyright protection, patents, and prizes 2) Farmer's rights, instant return on investment, and brand protection 3) Trade secrets, commercial expertise, and product monopoly 4) Awards, public acclaim, and service placement
Copyright protection, patents, and prizes
What form of sustainable entrepreneurship focuses specifically on actions that appear to further some social good, beyond the interests of the firm and that which is required by law, and often denotes societal engagement of organizations? Traditional Entrepreneurship Corporate Social Responsibility Ecopreneurship Social Entrepreneurship
Corporate Social Responsibility
Which of the following aspects of a project plan informs the project team about the inter-relationships and inter-dependence of tasks and resouces? Critical Path Analysis Project Milestone Reporting Feasibility Analysis Variance Reporting
Critical Path Analysis
What term is used to describe a specific metric that often determines the success or failure of a task? Variance Analysis Key Performance Indicator Critical Success Factor Drill Down Task
Critical Success Factor
What type of addressing in Excel allows you to reference a cell or range in another worksheet in the same workbook? Worksheet Reference Cross-sheet reference Absolute Reference Relative Reference
Cross-sheet reference
"Collective Intelligence" is a term that is most closely associated with what concept presented in our class discussion? Telemedicine Crowdsourcing Crowdfunding Telepresence
Crowdsourcing
What term is used to describe the practice of evaluating requirements and brining direction and control over data and information? Data Visualization Data Governance Data Quality Data Warehousing
Data Governance
According to the "Future of Medtech" video case study, what is a potential new source of information to improve preventative care? Data from direct patient surveys technology companies Data from urgent care clinics and health-care providers Data from government agencies technology companies Data from consumer-focused technology companies
Data from consumer-focused technology companies
What technology enables natural interaction with virtual objects exclusively by hand gesture recognition? CAVE Data glove Samsung Gear VR Microsoft HoloLens
Data glove
__________________________ is an approach to managing information across an entire organization. Big Data Master data Master data management Data governance
Data governance
In general, a _____ _______ is a repository of historical data that are organized by subject to support central control by decision makers in the organization, while a _____ ________ is designed for the end-user needs in a strategic business unit (SBU) and support local rather than central control. 1) Data marts; data warehouses 2) Data marts; data dictionaries 3) Data warehouses; data dictionaries 4) Data warehouses; data marts
Data warehouses; data marts
In the Dashboard Data Quality case study on Covid 19, what technology decision made by the the Public Health of England (PHE developers) limited the spreadsheet rows of data and resulted in 15k+ covid 19 cases not being properly reported? 1) The PHE chose a Very old Lotus 123 Spreadsheet technology limited to 65,000 rows of data 2) The PHE developers Choose an open source Google Sheets spreadsheet limited to 65,000 rows of data 3) The PHE chose a new untested version of Microsoft Excel that threw errors if anyone loaded more than 65,000 rows of data 4) Data was lost because the PHE used an old Excel XLS file format that was limited to 65,000 rows of data
Data was lost because the PHE used an old Excel XLS file format that was limited to 65,000 rows of data
Which of the following is NOT considered a "fundamental" data type in Excel? Alphanumeric Value Date Null (Empty Cell) Numeric Value
Date
Which of the following types of wireless communication used as part of a connected vehicle architecture would have a line-of-sight range of approximately 300 meters? Satellite Communication Dedicated Short-Range Communication Bluetooth Communication Cellular Communication
Dedicated Short-Range Communication
What security approach are you using for your home network if you combine changing your AP (access point) name, adding a strong password to access your wireless network, and also separately password protecting devices on your network? Intrusion detection Tunneling Two-factor authentication Defense in depth
Defense in depth
When connecting to the U-System (u.arizona.edu) server for the first time, WinSCP displays the warning message "the server's host key was not found in the cache," as shown below. This warning is related to what aspect of creating a channel for secure data transmission? Defining the list of authorized users allowed to upload files to the U-System server Defining the encryption standard (e.g., DES, RSA, AES) to be used during transfers Defining the the U-System server as a trusted endpoint for tunneling Defining the value of the private key to be used during transfers
Defining the the U-System server as a trusted endpoint for tunneling
According to Fred Brooks, the author of the Mythical Man Month, when planning a project, the most time should be planned for which of the following activities? Design Unit/component testing Coding System testing
Design
Validation of the model occurs in the _______ phase of the Decsion Making Process (Intelligence, Design, Choice, or IDC) . 1) Implementation 2) Choice 3) Design 4) Intelligence
Design
You create a screen shot illustrating what the new system will potentially look like. This is part of the ________ stage of the SDLC. Analysis Design Investigation Programming and testing
Design
Which of the following has the strategy "I am better because I am different"? Operational effectiveness Cost leader Innovation Differentiation Customer oriented
Differentiation
What term is used to describe virtual representations of physical assets used for modeling and prediction of energy resources? Smart Monitoring Virtual Energy Reality Digital Twins Fintech Solutions
Digital Twins
A business intelligence tool that uses abstractions such as color and graphical images like instrument gauges to allow executives to grasp business situations quickly is known as a: 1) Expert system 2) Planning Horizon 3) Geographic information system 4) Neural network 5) Digital dashboard
Digital dashboard
What is an example of a Universal Design approach that can be used to improve the accessibility of videos presented in class? Including a URL that links to the video on YouTube Using high-resolution video formats, such as 4K or HD Displaying open captions Including the video PPTs posted prior to class
Displaying open captions
What type of innovations are intended to be incompatible with existing standards and value chain, and must develop markets de novo (latin for "from the beginning")? 1) Application Innovation 2) Disruptive Innovation 3) Profit Innovation 4) Platform Innovation 5) Product Innovation
Disruptive Innovation
Which of the following was NOT described as one of the four innovation zones? 1) Product Leadership Zone 2) Operational Excellence Zone 3) Category Renewal Zone 4) Disruptive Technology Zone 5) Customer Intimacy Zone
Disruptive Technology Zone
What type of DBMS (Database Management System) architecture stores information on an interconnected networked of database servers? Centralized Database Distributed Database Organizational Database Client/Server Database
Distributed Database
What type of DBMS (Database Management System) architecture stores information on an interconnected networked of database servers? Client/Server Database Organizational Database Distributed Database Centralized Database
Distributed Database
As discussed in our Topic Overview lecture, what professor at UArizona developed a virtual simulation experience called Virtual Harlem to allow students to engage, experience and be excited about their studies of the Harlem Renaissance? Dr. Jay Nunamaker Dr. Sudha Ram Dr. Bryan Carter Dr. Hsinchun Chen
Dr. Bryan Carter
What is the name of the MIS professor that is a University of Arizona Regents Professor and founder of the Center for the Management of Information? Dr. Sudha Ram Dr. Hsinchun Chen Dr. Jay Nunamaker Dr. Joe Valacich
Dr. Jay Nunamaker
Who said MIS is about "Solving real problems for real people"? a) Steve Jobs b) Dr. Sudha Ram c) Dr. Jay Nunamaker d) Admiral Grace Hopper
Dr. Jay Nunamaker
Which UofA MIS Researcher developed a system to use anonymized WiFi Data to identify person-density in buildings and spaces at the University using temporal and spatial data to help fight Covid-19? 1) Dr. Hsinchun Chen 2) Dr. Sudha Ram 3) Dr. Sue Brown 4) Dr. Jay Nunamaker
Dr. Sudha Ram
____________, also know as data integration, is one of the growing number of ways that source system data can be handled. SAP ETL SQL EDI
ETL
The EC Hosting process of downloading a file from D2L to your local computer, modifying the file as required by the assignment, and then uploading the file to the U-System (u.arizona.edu) website hosting server is similar to what other process that we discussed earlier in the semester? SDLC (Systems Development Life Cycle) ETL (Extract-Transform-Load) TCP Data Transmission Data Visualization
ETL (Extract-Transform-Load)
IT has changed the manager's job in many ways. Which of the following is NOT the result of this change? Remote supervision More information to address Real-time information Easier to make a decision
Easier to make a decision
When Warren Buffet evaluates a company's past performance based on reviewing their historical earnings per share (EPS) results, what method is being used to make this quantitative decision? Modeling and Simulation Economic Analysis Decision Tree Case-base reasoning
Economic Analysis
What is the name of the fast and secure wireless network that is available to members of the UArizona campus community when visiting other educational and reserarch institutions across the United States and around the world? EduHotspots UAGuest OpenWireless Eduroam
Eduroam
In the case study "IT's About Business 1.3," (at the beginning of section 1.4 of the textbook), ________ is the Internet on a portable hard drive. Vistar AlaMesa El Paquete Semanal Revolico
El Paquete Semanal
All of the following were described by Raytheon as benefits of using the S3D Cave Automatic Virtual Environment as a "common language of visualization" except: Allows much quicker changes to technical specification Allowed Raytheon to upsell customers during product demonstrations Cost savings over creating physical missile prototypes Eliminated the need for consulting clients in the design phase
Eliminated the need for consulting clients in the design phase
All of the following were described by Raytheon as benefits of using the S3D Cave Automatic Virtual Environment as a "common language of visualization" except: Eliminated the need for consulting clients in the design phase Allows much quicker changes to technical specification Cost savings over creating physical missile prototypes Allowed Raytheon to upsell customers during product demonstrations
Eliminated the need for consulting clients in the design phase
In terms of internet speed (bandwidth), which of the following applications generally has the lowest recommended speed (bandwidth) requirements? Social media Video calls and conferencing Email Online gaming
All of the following items was described as being keys attribute of a creating a good person brand, according to Paul Argenti from the Tuck School of Business at Dartmouth University, EXCEPT: Embellishing personal accomplishments, experience and qualifications Assuring that your your brand is attuned to the environment that you're operating in Planning the way in which your imagine, resume, and business cards look Ensuring alignment between who you are and how you present yourself
Embellishing personal accomplishments, experience and qualifications
The Gainesville police department started using the internet to accomplish all of these objectives except? 1) Enable individual citizens to better protect themselves from criminal activity. 2) Demystify law enforcement operations for the citizens of Gainesville. 3) Motivate community groups to have a stronger hand in addressing crime. 4) Empower businesses to identify high crime areas and determine appropriate levels of security.
Empower businesses to identify high crime areas and determine appropriate levels of security.
_________ is an access control. Radio Frequency Identification (RFID) Encryption A firewall A company gate
Encryption
Which of the following is an advantage of the traditional SDLC? Involves many users in the development process Works wells for ill-defined problems Bypasses the IS department and avoids delays Enforces quality by maintaining standards
Enforces quality by maintaining standards
As discussed in the Neuro-ID video case study, in addition to measuring a customer's "friction" (e.g., frustration or satisfaction), the system also is able to measure what security-related aspect of customer "intent"? Changing their physical location while using an application Deactivating VPN encryption before making a purchase Entering data in a way associated with fraudulent behaviors Making a purchase at an unusual time of day
Entering data in a way associated with fraudulent behaviors
According to our FIP lecture and the slides from Dr. Matt Mars, what term is used to describe development and implementation for advancing innovative solutions to economic, environmental, social, and/or technological problems or opportunities? Civic Leadership Entrepreneurial Leadership Social innovators Private-sector Leadership
Entrepreneurial Leadership
What is considered the market-oriented mechanism for advancing the value proposition of innovation? Applications Acquisition Migration Entrepreneurship
Entrepreneurship
________ is NOT a problem caused by computers. Job stress Ergonomics Carpal tunnel syndrome Repetitive strain injuries
Ergonomics
According to IT's About Business 6.1, ________ is the world's most isolated country when it comes to telecommunications access. 1) Ethiopia 2) Cuba 3) Eritrea 4) Belarus
Eritrea
Often presented visually on an executive dashboard, what type of report focuses attention on business processes whose performance falls outside of the tolerance ranges defined a KPI metric? 1) Annual 2) Ad hoc 3) Batch 4) Exception 5) Drill-down
Exception
According to the Accessibility and Inclusion for All video case, what technology are some car manufacturers using on their production lines to open jobs to individuals who might not have been able to perform the job previously? Screen readers Adjustable-height work surfaces Voice-recognition Exoskeletons
Exoskeletons
________ deals with more objective, rational, and technical knowledge. Explicit information Explicit knowledge Tacit information Tacit knowledge
Explicit knowledge
In the Excel expression "=VLOOKUP(5, B4:H16, 3, range_lookup)", what value should be used for range_lookup to return a value only when the lookup value in the table_array matches "5"? =VLOOKUP(lookup_value, table_array, column_index_number, range_lookup) Range=9 TRUE FALSE Row
FALSE
As described in the Relationship-based Organizing video case, information from what social media platform is used to improve the effectiveness of campaign worker's persuasion voter outreach activities? Facebook YouTube LinkedIn Twitter
Although it's not commonly available to most homes, which of the following wired technologies would provide the fastest data transmission speeds if all of these were available as choices to an individual for their "last mile" network connectivity? Cable Data Networks POTS (Plain Old Telephone Service) Dial-up Fiber optics (aka, Fiber-to-the-home or FTTH) DSL (Digital Subscriber Lines)
Fiber optics (aka, Fiber-to-the-home or FTTH)
Which of the following was NOT identified by Ted Codd as a weakness of the hierarchical data storage model used for organizing files on a computer system? The same file could be stored in multiple places File names were limited to 8 (eight) characters All searches were required to use a top-down approach The most current version of the file could be stored anywhere
File names were limited to 8 (eight) characters
In the Total Economic Impact methodology, what aspect of the model is based on the Nobel Prize winning work of Black, Merton, and Scholes in finance that is commonly referred to as the Black-Scholes equation? Risk Assessment Finanical Value of an Option Cost Reductions Future Benefits
Finanical Value of an Option
As discussed in the Forrester TEI video case, TEI (Total Economic Impact) helps make a business case that considers not only the traditional ROI (Return on Investment) measures of Costs and Benefits, but add assessments of risk and what other dimension? Sustainability Flexibility Vulnerability Profitability
Flexibility
What type of visualization is often used to show multi-step quantities where there is attrition or refinement? Histogram Chart Funnel Chart Box-and-whisker Chart Pie Chart
Funnel Chart
Which of the following is NOT a dimension that makes up the holistic approach to collaboration? People Process Globalization Technology
Globalization
Which of the elements of the Interactive Public Commons described in the "Democracies Online" would be most closely aligned with the examples of how Arizona and Minnesota state legislatures use live streaming to expand access to their committee meetings and floor sessions? Private Sector Media and Commercial Content Government Civic Participation
Government
What term is used to describe a broad array of technologies associated with improving environmental sustainability and energy and other resource efficiencies? Greentech Sustaintech Cleantech Ecotech
Greentech
A smart ID card is something the user _______. Does Has Knows Is
Has
Microsoft Windows uses what type of file system to store your documents? Relational Accessible Flat Hierarchical
Hierarchical
Which of the following would be an example of a programming construct that is a logical function that evaluates a single condition and results in only one value? IF Function WHILE Function FOR Function SUM Function
IF Function
n the "Decision Tree for Buying a Car" example discussed in class, which of the following "IF" statements would correctly identify a "BUY" decision? IF tested = 'no' and mileage = 'low' THEN -> 'BUY' IF tested = 'yes' and mileage = 'high' and age = 'old' THEN -> 'BUY' IF tested = 'yes' and mileage = 'high' and age = 'recent' THEN -> 'BUY' IF tested = "yes" and mileage = 'high' THEN -> 'BUY'
IF tested = 'yes' and mileage = 'high' and age = 'recent' THEN -> 'BUY'
What technology has seen the largest increase in venture funding for products and services related to well-being and care delivery? IOT (Internet of Things) Digital Medical Devices Non-medical Hardware Artifical Intelligence (AI), Machine Learnign (ML), and Deep Learning
IOT (Internet of Things)
________ addresses consist of 32 bits and historically has been the most commonly used IP addressing scheme. 1) IPv2 2) IPv4 3) IPv6 4) IPv8
IPv4
The adoption of __________ has been an important factor in the development and rapid expansion of the Internet of Things. 1) IPv1 2) IPv4 3) IPv6 4) IPv8
IPv6
A(n) ________ is a company that provides Internet connections for a fee. 1) NAP 2) NSP 3) ISP 4) IXP
ISP
According to Wikipedia, what term is used to describe a graphic image (icon) associated with a particular Web page and/or Web site and can serve as a visual reminder of the Web site identity in the address bar or in tabs? Backgrounds Style Sheet CSS Keyframes Icons or Favicons
Icons or Favicons
Which of the following would not be associated with the POUR principle of "operable"? Provide sufficient time to read and use content Include a text alternative for non-text elements Make all functionality available from a keyboard
Include a text alternative for non-text elements
In terms of the "Believability" of the anticipated benefits resulting from an ROI investment, whcih of the following would have he lowest level of believability of achieving the anticipated ROI? Actual reductions in cost Increases in manager productivity Expected reductions in cost Increases in worker productivity
Increases in manager productivity
When off campus, using a VPN when accessing campus information systems affords all of the following advantages except: Transmitted information is protected by encryption Your computer will use an on-campus network (IP) address, hiding your actual physical location Authenticated access to protected UArizona Library resources and and databases Increases the speed of your broadband connection to the internet
Increases the speed of your broadband connection to the internet
What type of voters are most commonly targeted by a Get-Out-The-Vote (GOTV) campaign strategy? Individuals who sometimes vote for our party (swing voters), and always vote in an election Individuals who always vote for our party, and always vote in an election Individuals who sometimes vote for our party (swing voters), but never vote in an election Individuals who always vote for our party, but don't always vote in an election
Individuals who always vote for our party, but don't always vote in an election
______________ is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others. Profiling Code of ethics A digital dossier Information privacy
Information privacy
What project originally began in 1969 as the ARPAnet under the Advanced Research Project Agency (ARPA) of the U.S. Department of Defense? Web browsers Internet Satellities VPNs
Internet
The deliverable for the ________ stage of the SDLC is a go/no go decision. Analysis Design Programming and testing Investigation
Investigation
Biometrics is something the user _______. Does Has Knows Is
Is
With respect to establishing your CatCard as a trusted credential in a multi-factor authentication process, what role does the UArizona CatCard office serve? Intrusion Detection Authority Accountability Authority Proctor Authority Issuing Authority
Issuing Authority
Which of the following would NOT typically be an advantage of renting a DSL or cable home modem from your ISP provider? Your ISP upgrades your modem as technology changes, generally at no additioanl cost It is usually much less expensive in the long run if you stay with the same ISP for years Allows you to return unneeded equipment to your ISP if you move frequently Ensures you modem is compatible with the technical requirements of your ISP's network
It is usually much less expensive in the long run if you stay with the same ISP for years
According to IT's About Business 6.2, Google Fiber was first deployed in ________. 1) San Diego 2) Kansas City 3) Charlotte 4) Atlanta
Kansas City
Business metrics that describe the performance of critical business activities are known as: 1) Key performance indicators 2) Decision trees 3) Business intelligence analyses 4) Business continuity plans 5) Residual risk assessments
Key performance indicators
According to Accenture, what should you be scanning for when reviewing descriptions of ideal jobs to help you build an online profile that contributes to your job search process? Locations where a company plans to hold job fairs Names of hiring managers to call for an interview Keywords to use on your online profile Salary ranges and benefits to request during an interview
Keywords to use on your online profile
Who was Harald Blaatand "Bluetooth" II? Name of a Scandinavian Science Fiction Character The name of the Bluetooth Technology Inventor's Dog Calligrapher who designed the Bluetooth logo King of Denmark from 940 to 981
King of Denmark from 940 to 981
Being able to reuse information that is created contributes to what critical success factor (which is also know as a key factor) for a high ROI (Return on Investment)? Breadth Knowledge Collaboration Cost
Knowledge
Ethernet is a technology most commonly associated with ________s. 1) MAN 2) WAN 3) PAN 4) LAN
LAN
What term is used to describe the connection between an internet service provider and the customer, i.e., into your home? Revenue Mile First Mile Middle Mile Last Mile
Last Mile
Which of the following is a fast-growing company that is disrupting the traditional job recruiting industry? LinkedIn Google Facebook Amazon
Learning outcomes for Active Learning include empowering people to be able to do all of the following actions, except: Create Analyze List Evalute
List
As Medtech and Healthtech incorportate Artificial Intelligence, Machine Learning and Deep Learning into patient care systems, what risk must be considered and managed? Litigation Risks Related to Using Algorithms to Provide Medical 'Advice' Additional costs of regulation Dramatic increases in the cost of developing new computer systems Refusal of patients to release EMRs (Electronic Medical Records)
Litigation Risks Related to Using Algorithms to Provide Medical 'Advice'
Which of the following is not considered one of the shifts identified by the United Nations related to achieving a sustainable planet in the Digital Age? Accelerate Innovation Enable Alignment Mandate Compliance Mitigate Negative Impacts
Mandate Compliance
With respect to financial accounting, the term equity is used to describe the ownership of a company. Which of the following concepts would NOT be another term related to a company's "equity" in this context? Book value Accounting value Market value Assets - Liabilities
Market value
According to the video "What is a Paradigm Shift?", what company was discussed as being an example of a company capitalized on a paradigm shift due to people wanting to "get their food on the go"? McDonald's Restaurants Circle K Convenience Stores Chili's Restaurants Rudy Tuesday's Restaurants
McDonald's Restaurants
According to the video case on the Productivity Paradox, Goldman Sachs believes which of the following causes is the primary reason for the slowing in productivity growth? Mismangement Redistribution Time Lags Measurement Error
Measurement Error
4.5 As discussed in All ABout Business 4.5, who assumes all of the risk in credit card transactions and suffer most of the financial damages when a fradulent transactions is made? Credit Card Companies Insurance Companies Mechants Customers
Mechants
All of the following industries focus on incorporting virtual reality before the sale to allow clients and customers to "see" and experience projects and products except: Retail (Lowe's, IKEA, and Cruiseabout) Real Estate (Real Estate Agencies) Architectural Design (Architects) Media Companies (Disney)
Media Companies (Disney)
What term is used to describe the approach taken by companies such as MagicLeap.com where physical and digital objects are able to co-exist and interact in real time? Virtual Reality Augmented Reality Blended Reality Mixed Reality
Mixed Reality
For the most residential ADSL and Cable network plans, upload (from the customer's network to the internet) data transmission speeds are generally: Much faster than download (from the internet to the customer's network) data transmission speeds Always the same as the download (from the internet to the customer's network) transmissions speeds Much slower than download (from the internet to the customer's network) data transmission speeds
Much slower than download (from the internet to the customer's network) data transmission speeds
________ are exchange points for Internet traffic. 1) NAPs 2) ISPs 3) IAPs 4) NSPs
NAPs
According to IS's About Business 3.4, which of the following insurance companies was NOT identified as offering usage-based automobile insurance. Progressive Allstate Nationwide State Farm
Nationwide
The Decision Support Rule Induction strategy commonly uses which of the following programming constructs to make a recommendation? Conditional Formatting Statements Iterative FOR Statements Nested IF Statements Conditional WHILE Statements
Nested IF Statements
What company offered a cash prize as part of their product development strategy that was similar to the approach discussed in the crowdsourcing video case where the British government in 1714 to find a way to make sailing the oceans safer? Starbucks Netflix Royal Paper Kiva
Netflix
When designing a security-in-depth strategy, firewalls and VPNs would be examples of what type of control? User Privileges Application Intrusion Detection System Network Access
Network Access
In order to reduce the physical wear and tear of contact practicing plays when training for competition, the NFL has used virutal reality to limit all of the following except: Training camp "two-a-day" practices Off-season practices Number of plays in a team's playbook Contact practices
Number of plays in a team's playbook
In Excel, a date, such as 2/1/2022, is represented internally by Excel as: Comment Numeric Value Alphanumeric String Operator
Numeric Value
Films produced using what VR recording technology permit the audience to view an entire envornment in every scene? Optical storage devices Omnidirectional cameras Wearable computers Gesture recognition interfaces
Omnidirectional cameras
What term is used to descript a set of functionalities that facilitate multi-dimensional data analysis for faster, more informed decision making? Knowledge Management On-Line Analytical Processing Weighted Decision Making Artifical Intelligence
On-Line Analytical Processing
Commonly occurring and well-defined business activities such as scheduling employees work hours would be what category of organizational decision? Operational Strategic Management Fuzzy
Operational
___________________ control is executing specific tasks efficiently and effectively. 1) Operational 2) Tactical 3) Management 4) Strategic
Operational
Increased visibility, Tracking, Traceability and Higher Quality are all attributes of what type of benefits for tracking items using RFID tags? Operational Benefits Legal Benefits Technical Benefits Product Benefits
Operational Benefits
________ rely entirely on readers for their power, are less expensive, and can be read only up to 20 feet. 1) Active QR symbols 2) Passive QR symbols 3) Active RFID (Radio Frequency Identification) devices 4) Passive RFID (Radio Frequency Identification) devices
Passive RFID (Radio Frequency Identification) devices
Which of the following terms is considered as an excellent measure of risk and provides an estimate of the time period needed before the net savings equals the initial cost? Equity Value Analysis Net Present Value Payback Period Internal Rate of Return
Payback Period
Hampton Virginia is stimulating Citizen Engagement in government in many ways. According to a study, Hampton citizens quality information included all of the following characteristics except? 1) Timely 2) Accurate 3) Personal 4) Complete
Personal
In the Neuro-ID video case "Intention, Friction and Fraud", all of the following are used to assess the behavior of online users, except: Advanced Machine Learning Personally Identifiable Information Real-time Behavioral Analytics Neuro-Cognative Research
Personally Identifiable Information
You decide to implement the manufacturing component of SAP followed by the financial component next. This is called a __________________ conversion. Parallel Pilot Direct Phased
Phased
What name is used to describe a network of connected Bluetooth devices? NFCnet Piconet Bluenet MiFiNet
Piconet
______________ is a privacy tool available to consumers that automatically communicates privacy policies between an electronic commerce web site and the visitors to that site. Photo tagging A digital dossier An information privacy policy Platform for Privacy Preferences (P3P)
Platform for Privacy Preferences (P3P)
What term is used to describe the use of real-time data, analysis and automated application technologies to optimize the use of inputs such as fertilizer, pesticides and water enabling farmers to produce more and waste less? Sustainable Agriculture Upstream Precision Agriculture Controlled Environment Agriculture Vertical Farming
Precision Agriculture
Although not an exact equivalent, the first column in a VLOOKUP table_array serves a role that is similar to what database concept? Primary Key Database record Foreign Key Database table
Primary Key
According to enhanced reality pioneer George Papagiannakis, creating a believiable interface using the tools of immersion, presentation, and interaction depends on correctly mapping all of the following elements except: Personality Physical Information Emotion Prior experience
Prior experience
What type of innovation focuses on the supply side, looking for opportunities to remove non-value-adding steps from the workflow? 1) Enhancement Innovation 2) Process Innovation 3) Value-Engineering Innovation 4) Organic Innovation 5) Value Migration Innovation
Process Innovation
What term is used to describe the checkpoints that occur during a project that also represent critical success factors (CSFs) for the project? Work Breakdown Structures Variance Reports Project Milestones Feasibility Studies
Project Milestones
When analyzing information using a data cube, what term is used to describe the process of combining (summing) all data for one dimension of a data cube into a single value, such as adding quarterly sales amounts into the total sales for a year? Reduction Consolidation Projection Aggregation
Projection
Meaning "the place or source of origin", what term did IBM use as one of the benefits of using blockchain as the technology to create a system of record? Finality Concensus Provenance Immutability
Provenance
Having information about person's voting history (i.e., submitting a ballot on election day, early voting site, a mail-in ballot, or participation in a partisian primary) would most likely be used by a blockwalker (campaign outreach worker) as a part of a strategy for engaging persons who are classified as "sometimes voters" for the campaign worker's political party in what way? Providing assistance with changing a voter's party affiliation Offering information about times and places that would be easy for the "sometimes voter" to donate money to a candidate's campaign Offering persuasive information about candidate's positions Providing accistance on how, when and where to cast a ballot in an upoming election
Providing accistance on how, when and where to cast a ballot in an upoming election
Which of the following data protection principles enshrined in the Eurpoean Union's General Data Protection Regulation (GDPR) should be considered when your analysis include fields whose data was not originally collected to be part of your analysis, such as the example in class where we included information about whether a student lived in a reidence hall when analyzing exam grades? Data Minimization Storage Limitations Accountabilty Purpose Limitation
Purpose Limitation
Which of the following data protection principles enshrined in the Eurpoean Union's General Data Protection Regulation (GDPR) should be considered when your analysis include fields whose data was not originally collected to be part of your analysis, such as the example in class where we included information about whether a student lived in a reidence hall when analyzing exam grades? Storage Limitations Accountabilty Purpose Limitation Data Minimization
Purpose Limitation
________________ are smaller because they store information both horizontally and vertically. 1) QR codes 2) Bar codes 3) Passive RFID tags 4) Active RFID tags
QR codes
What type of decision method relies on information that is NOT easily measureable, such as assessing the business alignment of a project with corporate objectives? Economic Decisions Qualitative Decisions Quantitative Decisions Backward Decisions
Qualitative Decisions
Which of the following visualizations is used to compare common trends and characteristics using the area and shape of the displayed information? Line Chart Scatter Chart Candlestick Chart Radar Chart
Radar Chart
According to our FIP lecture, the amount of value accumulation over time will be the greatest with what type of innovation? Sustaining innovation Incremental innovation Novelty innovation Radical innovation
Radical innovation
Which of the following was NOT considered a challenge confronting the widespread adoption of telemedicine? Licensure of caregivers Reduced travel for physicians Reimbursement by insurance Accreditional of telemedicine programs
Reduced travel for physicians
Although useful in a variety of applications, which of the following applications of VR technology was considered the logical starting point by the NFL? Helping injured players continue their training Assisting coaches in recruiting players on the road Teaching new players who do not get as much training time as starters Reinforcing actual practice repetitions for quaterbacks
Reinforcing actual practice repetitions for quaterbacks
How does adding a repeater in a home data network impact data tranmission latency? Repeater retransmissions significantly add to network data tranmission latency Network latency is not impacted by adding a repeater Repeater retransmissions are used to eliminate network data tranmission latency entirely Repeater retransmissions significantly reduce network data tranmission latency
Repeater retransmissions significantly add to network data tranmission latency
Which of the following is a decisional role? 1) Analyzer 2) Spokesperson 3) Liaison 4) Resource allocator
Resource allocator
n the Total Economic Impact methodology, using best and worst case estimates to determine the overall estimated value for costs is an example of which of the following four dimensions? Risk Adjustment Impact on Business Processes Options Available Impact on IT Services
Risk Adjustment
As discussed in the "Eye on Oversight" video case, what term is used to describe an agency's ability to be proactive and identify vulnerabilities? Risk Management IT Controls Cybersecurity Resiliency
Risk Management
_______________ is a process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan. Risk Risk analysis Risk management Risk mitigation
Risk mitigation
What the name of the device that is accessed using a public IP (Internet Protocol) address for the external internet while forwarding traffic from your home network devices that use private addresses assigned using Network Address Translation (NAT)? Bridge Modem Router Codec
Router
Which of the following Decision Support Strategies use conditional execution to make a recommendation? Case-based Reasoning Nearest Neighbor Technique Rule Induction Neural Networks
Rule Induction
Which of the following Decision Support Strategies use conditional execution to make a recommendation? Neural Networks Rule Induction Case-based Reasoning Nearest Neighbor Technique
Rule Induction
According to the "what is a database" video case, what is the name of the database language that makes it possible to easily manage the requested data? COBOL (Common Business Oriented Language) HTML (Hypertext Markup Language) SQL (Structured Query Language) NLP (Natural Language Processing)
SQL (Structured Query Language)
Which of the following Excel functions will return the total value of a number of cells in a range by adding the values that match specified criteria? SUMIF AVERAGEIF COUNTIF SUBTOTAL
SUMIF
Which of the following is NOT commonly considered to be one of the project management "triple constraints"? Scale/Quantity Schedule/Time Cost/Resource Scope/Quality
Scale/Quantity
When determining the critical path for a project, which of the "triple contraints" determines the critical path? Scope/Quality Cost/Resources Schedule/Time
Schedule/Time
Internet Assigned Numbers Authority (IANA) distinguishes the following groups as valid Top Level Domains (TLDs), except: Secure top-level domains (sTLD) Internationalized country code top-level domains (IDN ccTLD) Country-code top-level domains (ccTLD) Generic top-level domains (gTLD)
Secure top-level domains (sTLD)
What term refers to structures that use data collection, integrated processes, smart engineering or creative design to self-regulate and optimize the building's environment and operations which can capture changes within the building and enable the building to self-learn and automatically modify or customize its settings? 3D Printed Buildings Disruptive Buildings Smart Buildings Digital Building Passports
Smart Buildings
According to Siemens Enterprise Communications, what is one of the most effective routes to stealing confidential data from organizations? Brute-force Hacking Keyloggers Social Engineering Denial of Service Attacks
Social Engineering
Phishing emails use what approach to acquire personal information and exploit victims for financial gain? Keyloggers Brute force password cracking Social Engineering Denial of Service
Social Engineering
In the video case for Nestle, data-driven decisions were primarily based on visualizations of information from what source? Cost and Production Schedules Financial Performance Reports Investment Analyst Forecasts Social Media Platforms
Social Media Platforms
According to the Physical vs. Logical Topologies Video Case, what type of network topology is the most common physical topology? Bus Topology Mesh Topology Star Topology Ring Topology
Star Topology
What type of Intrusion Detection and Prevention System (IDPS) uses a normal traffic baseline, alerts when traffic levels fall outside expected clipping (acceptable or anticipated) levels? Network-based Signature-based Statistical Anomaly-based Host-based
Statistical Anomaly-based
Identifying majors with specific language and mathematics requirements using the Degree Search selection filters help you solve what type of business problem? Strategic Fuzzy Structured Unstructured
Structured
_____________ is a disadvantage of twisted-pair wire. 1) Difficult to work with 2) All of these options are disadvantages 3) Relatively expensive and inflexible 4) Subject to interference
Subject to interference
In the Breakthrough Energy Catalyst video case, investments are being made to develop technologies to convert biological inputs, including municipal waste, into what product? Green Hydrogen Long-duration Energy Storage Direct Air Capture Sustainable Aviation Fuel
Sustainable Aviation Fuel
According to the Voter Identification Matrix analysis of eligible (registered) possible voters, which of the following groups of voters were NOT seen as being in a category that campaigns were advised "Don't waste your resources on.." when planning campaign outreach? Swing voters who always vote People who always vote, and vote for our party People who always vote against our party People who will never vote
Swing voters who always vote
Which of the following is software modeling tool that is commonly used for more advanced business intelligence visualizations? Tableau Linux Adobe Illustrator Python
Tableau
________ is the cumulative store of subjective or experiential learning. Explicit knowledge Tacit information Explicit information Tacit knowledge
Tacit knowledge
_______________ is knowledge that is generally imprecise, costly to transfer, and difficult to formalize or codify. 1) Data 2) Explicit knowledge 3) Tacit knowledge 4) Information
Tacit knowledge
In an RFID system, where would the unique data identifying an item typically be found? Tag Computer Reader Receiving Antenna
Tag
In 2006, the National Federation of the Blind filed a lawsuit against company because their ecommerce website was not accessible as required by ADA? Amazon Target Walmart Macy's
Target
What type of investrment analysis focuses on historical returns and price changes, to chart patterns that can be used to estimate future price movement for securities and the larger market? Technical Analysis Quantitative Analysis Transactional Analysis Fundamental Analysis
Technical Analysis
All of the following were discussed as "ingredients" that make up a successful approach to the Universal Design for Learning (UDL) methodology EXCEPT what? Variability Context Goals Technology
Technology
Which of the following technologies would provide the level of social interaction necessary to build relationships? Web conferencing Contact management Telepresence Video streaming
Telepresence
_________ is a system in which any object, natural or manmade, has a unique identity and is able to send and receive information over a network without human interaction. 1) The IoT (Internet of Things) 2) A mobile portal 3) UWB (Ultra Wideband) 4) A wireless network
The IoT (Internet of Things)
What does an SSID (Service Set Indentifier) identify on wireless network? Type of data encryption (e.g., WEP, AES, etc.) to be used when connecting to the wireless network The protocol used by the NICs (Network Interface Cards) on the wireless network The name of the base station (aka access point name) a computer uses to connect to the wireless network The name of the DNS (Domain Name Service) to be used by devices on the wireless network
The name of the base station (aka access point name) a computer uses to connect to the wireless network
What basis did an NFL executive use for recommending the VR company STriVR charge professional football teams $250,000 for its product? The system would be like "picking up half a coach" The NFL teams cannot spend more than $250,000 for software without approval of the league NFL teams were not buying the STriVR application because the original price of $500,000 proposed by STriVR was considered as too high The average salary for new players in the NFL was $250,000
The system would be like "picking up half a coach"
If the evaluation of the first parameter of an Excel IFERROR function (shown in bold/underlined in the example below) does NOT return an error (e.g., #N/A), what value does the IFERROR function return? =IFERROR( VLOOKUP(H15,D$11:F$19,3,FALSE), "Unknown" ) The value of the second parameter The value "FALSE" The value of the first parameter The value "TRUE"
The value of the first parameter
According to the video case discussing economic opportunities to make money with AR, VR, and 360 video content, what is the major difference between virtual reality and 360 video? VR video content has lower resolution than 360 video content The way the user moves through the content Social media sites, such as YouTube and Facebook, do not support 360 video content The cost of producing 360 video content is significantly higher
The way the user moves through the content
In a cross-sheet reference, why would it be necessary to enclose the worksheet name in single quote marks (e.g., 'Customer Data'!A1)? The worksheet name has an embedded space The worksheet being referened is read-only The worksheet name includes a reserved word The data being referenced is a text string
The worksheet name has an embedded space
In the "Introducing Cellular V2X" video case, all of the following were identified as common benefits of using vehicle communications technologies such as 802.11p DSRC (Dedicated Short Range Communications) except: Fewer Accidents Less Congestion Reduced Emissions Theft Prevention
Theft Prevention
All of the following are limitations of bar codes, except: 1) They can be easily ripped, soiled, or lost. 2) They don't identify the item's manufacturer and product 3) They require line of sight to be scanned 4) They don't identify individual item by serial number
They don't identify the item's manufacturer and product
Which of the following issues discussed in our class discussion related to explaning the productivity paradox in terms of the experience of the employees or fully integrating a new information systems with other existing (legacy) information systems? Measurement Problems Redistribution Mismangement Time Lags
Time Lags
Which of the following issues discussed in our class discussion related to explaning the productivity paradox in terms of the experience of the employees or fully integrating a new information systems with other existing (legacy) information systems? Measurement Problems Time Lags Mismangement Redistribution
Time Lags
Which of these is NOT enumerated as a Motivation to Create Accessible Web Content? 1) To capitalize on the a wider audience or consumer base (marketing or economic-centered motivations) 2) To improve the lives of people with disabilities (human-centered motivations) 3) To improve the reliability of technical functionality (technology centered motivations) 4) To avoid lawsuits and/or bad press (public relations and punishment-centered motivations)
To improve the reliability of technical functionality (technology centered motivations)
Using force feedback is an example of how virtual reality systems incorporate what human sense into their virtual environments? Sound Touch Sight Smell
Touch
In the video case "RFID Creates Value in Retail," all of the following were identified as steps businesses should take to create actionable information through the use of RFID (Radio Frequency Identification) except: Training retail employees on how RFID sensors are able to collect data from tagged products Tagging products with RFID tags at the item level Using business intelligence tools to provide real-time insights for decision making Integrating data from RFID tagged products into information systems to give the data shape and meaning
Training retail employees on how RFID sensors are able to collect data from tagged products
The process used to move data from one data repository to another is referred to as Extract, ________, and Load. Analyze Translate Migrate Transform
Transform
Which of the following scanning and analysis risk management techniques would not commonly be considers as a type of vulnerability assessment focused on profiling? Trap-and-Trace Honeypots Footprinting and FIngerprinting Packet Sniffers Port Scanning Utilities
Trap-and-Trace Honeypots
What type of visualization allows a decision make to compare the releative amounts of subcategories to each other, but also to understand their relative portion of the whole category? Scatter Chart Treemap Waterfall Chart Bubble Chart
Treemap
_____________ is the most prevalent form of communications wiring. 1) Wireless 2) Twisted-pair wire 3) Fiber optics 4) Coaxial cable
Twisted-pair wire
Which of the following web hosting services is acceptable for the EC Hosting assignment? Wix Hosting Service GoDaddy Hosting Service Any Commercial Web Hosting Service U-System (UArizona's Web Hosting Service)
U-System (UArizona's Web Hosting Service)
Which of the following computer ports is a multi-function, bus-oriented (up to 127 devices), high-speed serial interface? Modem Port VGA Port USB Port DVI Port
USB Port
Your attitude, existing relationships, professional role, education, skills and training, and philanthropic efforts all contribute to identify what aspect of your personal brand? Brand risk Digital dossier Unique Selling Proposition Economic Value
Unique Selling Proposition
During the "Define Interaction" phase of a User Centered Design process, what method is used to model user behaviors prior to the actual design of the UI? Decision Trees Prototypes Use Cases Surveys
Use Cases
What recommendation did Don Norman have to improve a design model when designing for the disabled? Translating instructions into a braille format Using rapid prototyping Hiring designers with specific disabilities Offering users better training
Using rapid prototyping
In the TechInsider video case, hackers we able to defeat the two-factor authentication used to protect the account of Deray McKesson by doing what? By stealing Deray McKesson's telephone in order to receive the authentication codes Using social engineering to get Deray McKesson to send them a 6-digit authentication code By getting Deray McKesson to text the hackers an authentication within 60 seconds Using social engineering to get Verizon to activate a new SIM card for his phone
Using social engineering to get Verizon to activate a new SIM card for his phone
When adding a pivot table comparison (analysis) field, where would you define the calculation (e.g., SUM, AVERAGE, COUNT, etc.) to be used when displaying the value for a group of data? As a "Filter" setting on the fields list pulldown menu By adding an equation to the field under "Rows" field setting Using the "Format Cells" option Using the "Value Field Setting" in the Values area pulldown menu
Using the "Value Field Setting" in the Values area pulldown menu
When adding a pivot table comparison (analysis) field, where would you define the calculation (e.g., SUM, AVERAGE, COUNT, etc.) to be used when displaying the value for a group of data? Using the "Format Cells" option As a "Filter" setting on the fields list pulldown menu By adding an equation to the field under "Rows" field setting Using the "Value Field Setting" in the Values area pulldown menu
Using the "Value Field Setting" in the Values area pulldown menu
In the Data-Driven Decisions at Nestlé video case study, Nestlé's Digital Acceleration Team training program focuses on developing skills in all of the following business issues, except: Listening Validating Inspiring and Transforming Engaging
Validating
The comparison (analysis) values, such as the "grade" field used in our in-class discussion of pivot tables, would be displayed in which section of an Excel PivotTable control panel, as shown below: Values Filters Columns Rows
Values
All of the following benefits and management strategies would commonly be associated with a "good" likelihood of achievability except: Directly quantifiable saving from reductions in cost Measurements and results based on prior corporate history Direct observations of a pilot site implementation Vendor-supplied estimates of cost savings
Vendor-supplied estimates of cost savings
Which of the following would be an example of a programming control structure that repeatedly executes a statement or a series of statements while a specific condition is true or until a specific condition becomes true? IF Statement Nested IF Statement Conversion Statement WHILE statement
WHILE statement
Which of the following would be an example of a programming control structure that repeatedly executes a statement or a series of statements while a specific condition is true or until a specific condition becomes true? Nested IF Statement Conversion Statement WHILE statement IF Statement
WHILE statement
What term is commonly used to describe a system of universally accepted standards for storing, retrieving, formatting, and displaying information over the internet through a client/server architecture? URL (Uniform Resource Locator) NAP (Network Access Points) WWW (World Wide Web) TLD (Top-Level Domain)
WWW (World Wide Web)
In the "Eye on Oversight" video case study, what was the name of a ransomware software that impacted the United Kingdom National Health Service in 2017? PC Cyborg Wannacry CryptoLocker TeslaCrypt
Wannacry
What term is used to describe the approach an attacker often uses to find open (unprotected) wireless networks by searching around a geographic area? Phishing Distributed Denial Of Service (DDOS) Man-in-the-Middle War driving
War driving
What type of visualization is commonly used to display data when components leading to a total can involve negative values? Bubble Chart Waterfall Chart
Waterfall Chart
Which of the following would NOT be generally considered as a good chart to use for comparing the relative magnitudes data? Line Chart Waterfall Chart Bar Chart Column Chart
Waterfall Chart
In terms of maximum operating range, which of the following correctly orders the sort-range wireless technologies from longest range to shortest range? NFC, RFID, Bluetooth, Wi-Fi Wi-Fi, RFID, NFC, Bluetooth Bluetooth, WiFi, RFID, NFC WiFi, Bluetooth, RFID, NFC
WiFi, Bluetooth, RFID, NFC
Which of the following is a voluntary standard for website accessibility? Americans with Disabilities Act World Wide Web Consortium (W3C) Section 504 of the Rehabilitation Act Section 508 of the Rehabilitation Act
World Wide Web Consortium (W3C)
Steven Clift has practical online steps for government to support democracy. What was the suggested open standard data format to "Provide access to raw data from decision-making information systems."? 1) XML 2) JSON 3) CVS 4) TXT
XML
Sarbanes-Oxley is an example of ________ 1) an ethical issue 2) customer focus 3) our social responsibility 4) a government regulation
a government regulation
Rear Admiral Grace Murray Hopper was a pioneer of computer programming the first to devise the theory of machine-independent programming languages. She also noted the first actual computer bug in 1945, what was the bug? 1) a moth stuck between the contacts of a mechanical relay in the machine 2) A beetle shorting out a mechanical switch 3) A butterfly blocking an optical relay switch 4) Termite destroying the computer mounting board supporting the vacuum tubes
a moth stuck between the contacts of a mechanical relay in the machine
The ____________ protocol enables client application programs to access the other layers. 1) transport 2) Internet 3) application 4) network interface
application
RFID was developed to replace ________. 1) bar codes 2) UWB (Ultra Wideband) 3) QR codes 4) NFC (Near Field Communication)
bar codes
Which of the following is the correct order of the data hierarchy, from smallest to largest? byte, bit, field, file, record, database bit, byte, field, record, file, database byte, bit, field, record, file, database bit, byte, field, file, record, database
bit, byte, field, record, file, database
You live in a small town with only retailer offering certain products or services. This means there is low ______. threat of substitutes threat of new entrants supplier power buyer power
buyer power