MIS 111 Final Exam Review

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

According to the video on the Power of Entrepreneurship, approximately how many people live on less than $10.00 per day?

4 Billion

The advantage of ________________ is they can be read over greater distances.

Active RFID tags

Signals used to send messages can be _____ or digital.

Analog

When a company purchases a high-value software package, how is the ownership of the software package represented on the company?s balance sheet?

As an asset

The task of brainstorming in a group decision support system is similar to what step in the knowledge management cycle?

Create

With respect to a database, what term is used to describe an abstract representation of all of the information included in a data structure about a particular type of entity?

Entity Class

Related to the concepts of globalization, what computer "law" states that the bandwidth (speed) of data networks will double approximately every 24 months?

Gilder's Law

Pioneered at the University of Arizona, what decision support technology as developed to address problems suchas a lack of focus, fear of speaking, hidden agendas and misunderstandings then collaborating with others?

Group Decision Support Systems

The success of a Group Decision Support System (GDSS) is based upon two key features: contributor anonymity (i.e., the identity of the person making the comment or suggestion is not known), and what other important feature?

Parallel Discussions

What is an affordance?

Physical property of an object that shows functionality

Which of the following business components are *not* included in an MRP-II planning cycle?

Product Margins

_____ is the process of forming a digital dossier.

Profiling

What is the term used to describe the process of reducing the number of dimensions of a multi-dimensional data cube (e.g., from three dimensions, perhaps season, location, and product, into two dimensions, such as season and location)?

Projection

Google Analytics tracks the browser used to access a website. What term was used to describe a website that manages content based on the browser or device accessing the content?

Responsive Web Design

What is the name of the agile framework for managing the work of development teams who break their work into actions that can be completed within timeboxed iterations, called sprints (30 days or less)?

SCRUM

Donut Charts are difficult to read, Microsoft recommends what as an alternative?

Stacked Column or Bar Charts

In the Software Development Lifecycle Process (SDLC), in what SDLC stage is it the most costly to make changes to the system requirements

Systems Operation and Maintenance

In order to get Excel to display the exact closing date for each month, you need to format the X-axis as:

Text axis

Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of the project?

The project milestones and the order they are scheduled to be completed

Pie charts have several limitations, including all of the following except?

They have limited color and don't draw the eye and attention

In the decision matrix example shown below, which of the answers would have the highest score for Project A?

Time to complete

Training for the professional "Certified Public Accountant" certification generally focuses on which of the following?

Tracking and reporting the financial transactions of a business, and reporting financial results to external stakeholders

Customers _____________________ because of Web 2.0.

are more empowered

WebMD is a(n) _________ that allows doctors to ___________.

expert; diagnose diseases

Excel uses what character to indicate a row or column reference is absolute addressing?

$ (US Dollar Sign)

EPEAT Preformance Categories (e.g., Material section, Energy Conservation, and Packaging Waste) are examples of that order effect of environmental sustainability?

1st Order - Creation, Use and Disposal

Using telepresence and online/distance learning are examples of using technology to produce what order sustainability effect?

2nd Order - Applications Alternatives

Due to the curvature of the earth, microwave towers generally cannot be spaced more than about how many kilometers apart?

48

Assume you are off campus and cannot connect to UAWiFi. Which of the following would be a secure alternative to access the campus network?

Access any open wireless network, and then use a VPN to connect to campus

______________ refers to determining who is responsible for actions that were taken.

Accountability

One of the origins of the Internet was the result of a project by US government agency?

Advanced Research Project Agency

Physical properties (shape, texture, color, etc.) of an object that allow someone to use an object correctly without the need for labels or instructions are known as:

Affordances

What information systems standard allows trading partners to move routine documents, such as purchasing orders, using standard data formats as messages over the Internet.

Answer Choice B

Which of the following types of access controls would be the process of validating a claim of identity (e.g., Something you know, have, do, or are)?

Authentication

Which of the following is NOT a value-adding attribute of mobile computing?

Bandwidth improvement

With respect to Porter's Forces, which of the five factors would have the LEASE (weakest) impact on Starbuck's business model?

Bargaining power of suppliers

What term is used to describe the most successful solutions or problem-solving methods for achieving a business objective?

Best practices

What implementation approach mixes and matches core ERP modules as well as other extended ERP modules from different software providers to best fit their unique internal processes and value chains?

Best-of-breed approach

The equity on a company's balance sheet is most closely related to which of the following?

Book value

Reintermediation is addressing what business issue that was the result of company's directly selling to their customers as part of disintermediation?

Buying complexity

What term is used to describe the printable, one-time use codes you can generate for NetID+ authentication that are useful when traveling, when cell phone carriers may charge additional fees for calls and texts, or when you do not have access to your primary authentication device?

Bypass codes

The "nearest neighbor" IS Strategy is similar to what DM method?

Clustering

Which of the following knowledge management concepts includes an organizational culture focused on problem solving, a desire to share knowledge because of mutual interest, and norms that build trust, such as might be found in an MIS 111 FlexLab?

Community of practice

Which of the following application software packages was acquired by the University as a Software-as-a-Service (SaaS) technology?

D2L / Brightspace

In the Ruby Tuesday's sales analysis case, analyzing historical data about the sales dimensions of product categories, sales regions, and months of the year would be best using which of the following approaches we've previously discussed?

Data Cubes

What type of data mining presents information graphically so that users are able to identify patterns in the underlying data?

Data Visualization

Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of which approach for security control?

Defense in depth

When the DNC was targeting voters using their data-driven approach, which of these voting groups were the most appropriate to target?

Democratic and swing voters who sometimes vote

In the decision support process, formulating a module to be evaluated and setting criteria for making a choice would occur during what phase of the decision making process?

Design Phase

During which phase of the website transformation process would the project team for developing perform content analysis, layout the website using wireframes, and define a consistent visual design?

Developing Site Structure

What term is used to describe an individual who was born after the widespread adoption of digital technology and have grown up using technology like the internet, computers and mobile devices?

Digital Native

A business intelligence tool that uses abstractions such as color and graphical images like instrument gauges to allow executives to grasp business situations quickly is known as a:

Digital dashboard

What is the name used to describe daily spending decisions like eating at a restaurant, buying clothes, drinking Starbucks, or playing a round of golf?

Discretionary

Besides sensors, radios, and chips, what is the value in the Internet of Things?

Establishment of services on top of the connectivity

When Dr. Sudha Ram used CatCard data (digital traces) as part of her research to analyze students' routines and relationships to predict student retention. What knowledge management term would you use to classify the CatCard transactional data?

Explicit data

_______________ is knowledge that has been codified or documented.

Explicit knowledge

Which of the following types of security risks would be technique used to compromise a system?

Exploit

From a user's perspective, perceived affordances would include actual perceptible design affordances and what other category of perceptual affordances?

False or fake design affordances

What type of guided media uses light for signaling?

Fiber optics

What term was coined by Eli Pariser to describe a personalized search in which a website algorithm predicts what information a user would like to see based on user location and past searches on the website?

Filter bubble

What term describes the ability of a person to effectively evaluate and manage one's finances in order to make prudent decisions toward reaching life's goals?

Financial Literacy

What network security control prevents information from moving between two networks?

Firewall

Which of the following security controls would be used to limit access to systems to specific ports or network systems?

Firewalls

planned, recurring expenses that occur on a routine schedule, such rent or car payments that much be paid every month, are examples of what?

Fixed Expenses

What phrase is used to describe the current and developing environment in which disruptive technologies and trends such as the Internet of Things (IoT), robotics, virtual reality (VR) and artificial intelligence (AI) are changing the way we live and work?

Fourth Industrial Revolution

Which of the project management documents includes all three of the triple constraints that are in the Scope Triangle?

Gantt Chart

Satellites used for data communications that appear to be stationary from a fixed location on earth are placed in what type of orbit?

Geosynchronous orbit

In recognizing ethical situations, which of the following is related to a chemical reaction that occurs in your body, specifically your intestinal track?

Gut check

When adding your icon to your ABP-3B website, what section should you add the link directive to your icon file?

HEAD

What Regents Professor on the MIS Faculty at the University of Arizona developed the COPLINK system for managing knowledge used in law enforcement?

Hsinchun Chen

The ____________________ is a summary of information needs of the functional areas and of the organization as a whole.

IT environment

Which of the following is TRUE?

IT impacts entire industries

In the McGinn model of design, the least common category of design elements would be related to what factor in the McGinn model?

Individual

When analyzing the performance of students in MIS 111 on Exam 1, which of the following would not be appropriate as a useful "dimension" in an OLAP data cube?

Individual email addresses

In Thomas Friedman's discussion of globalization, he described the process of globalization as being realized through actions that were first defined by your country, then later defined by multi-national companies, and finally, in the most recent age of globalization is defined by:

Individuals

When viewing the linkages among trading partners, which of the following is common for both upstream and downstream supply chains?

Information

___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information.

Information extortion

Operating unregulated WiFi networks, clickers, Bluetooth headsets, cordless telephones, and microwave ovens using the same 2.4GHz ISM frequency range in close proximity to one another might result in what problem?

Interference

Which of the following is FALSE of social computing?

It allows social information to remain anonymous.

In addition to possessing contextual and relevant information, what other characteristic aspect does knowledge possess?

It is actionable

What is NOT a benefit of telemedicine?

It requires traveling so doctors can see their patients in person

Making the Adobe Creative Cloud is now available to UofA students. What approach for software acquisition did the UoA used to allow students to have access to this software?

Lease (Right to Use Product)

______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

Liability

The risk of a project can be measured on what two scales?

Likelihood and Impact

Which of the following issues related to wireless communication would NOT be a problem for an RFID (Radio Frequency Identification) system?

Line-of-sight

Although Martha Stewart?s actions related to insider trading, she served prison time for what criminal acts?

Lying about her actions to the FBI

When describing the invention of the cell phone, who said "For the first time, you were calling a person, not a place..."?

Martin Cooper

Who said the following quote "You can't use up creativity, The more you use, the more you have."

Maya Angelo

What center in the Eller College of Management has the mission to help students improve their potential and advance society by developing an entrepreneurial and innovative mindset?

McGuire Center for Entrepreneurship

____________ means that users carry a device with them and can initiate a real-time contact with other systems from wherever they happen to be.

Mobility

Related to the concepts of globalization, what computer "law" states that the density of transistors will double approximately every 18 months?

Moore's Law

What is the name for the exchange points for Internet traffic used by major ISPs?

NAP

Which of the following is the technology that enables most mobile wallet applications?

NFC

What is the name of the device that of the physical device that interfaces computers with a local area network (LAN)?

Network Interface Card (NIC)

What is the correct order of switching sites for packet "P5" in the following routing diagram?

New York, Dallas, Los Angeles

Market capitalization is determined by multiplying the stock price by what?

Number of common shares outstanding

The _____ prohibits an organization from collecting any personal information unless the customer specifically authorizes it.

Opt-in model of informed consent

What is NOT a factor contributing to the Bullwhip effect?

Outsourcing

On the balance sheet, total assets minus total liabilities must equal what?

Owner's Equity

Which type of website file contains software that's executed on the host before sending the results to the browser?

PHP

Although globalization has been underway for many centuries, digitization, networking, and connectiveness have dramatically increased what?

Pace of Change

In a packet-switched data communication network, which of the following is true:

Packets can be lost or become corrupted between the sender and receiver

What type of chart would be show the values of individual components proportional to a whole, allowing you to easily know relative size of a component, such as might be done to analyze the allocation of expenditures in a budget?

Pie Chart

In the assigned reading on accessibility, the authors note that while WCAG 1.0 focused on the techniques for accomplishing accessibility, WCAG 2.0 focused on what?

Principles of accessibilities

______________ is the right to be left alone and to be free of unreasonable personal intrusions.

Privacy

The old accounting maxim of "promise low" and "deliver high" is related to what costing and budget concept?

Prudence

Which of the following terms are related to production based on the mass customization initiated by a customer's order?

Pull model

Which of the following technologies would *NOT* require line-of-sight scanning?

RFID Tags

CODASYL, the Conference/Committee on Data Systems Languages, is remembered almost entirely for two activities: its work on the development of the COBOL language and its activities in standardizing database interfaces. We've learned about the pioneers of databases (Chen and Codd) today, who is credited for developing FLOW-MATIC, which evoled into the COBOL, the widely used business programming language?

Rear Admiral Grace Murray Hopper

Industry analytsts expect that 5th generation networks will be defined by three characterisitcs over 4th generation cellular networks. Which of the following would is not one of the expected changes?

Reduced signal attenuation

What is used to determe how long an investment will take to double, given a fixed annual rate of interest, allowing investors to get a rough estimate of how many years it will take for the initial investment to duplicate itself.

Rule of 72

What type of business systems have the capability to place automatic requests to buy products from vendors in real time?

SCM (Supply Chain Management)

What is the name of the social engineering attack that frightens computer users into visiting malware-infested websites by appearing to be legitimate warnings from antivirus software companies that your computer's files have been infected with the intent of tricking a user into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection?

Scareware

What term is used to describe the very common tendancy for projects to accumulate new functionality to fulfil the requirements of project stakeholders?

Scope Creep

Although web users should have an unlimited amount of time to complete tasks on the web, this design goal must be balanced against what other issue?

Security and risk

Which of the following causes of the bullwhip effect is related to a trading partner intentionally sharing inaccurate information with a company's future inventory requirements?

Shortage Gaming

What is the name used to describe when a person visits a brick-and-mortar store only to check physical characteristics of a product but intends to purchase the product online?

Showrooming

Dr. Patton discussed the Hacking Google Glasses video case and talked about what it could be a precursor to something else getting hacked in the future. What did he say might be the next thing hacked using the same technique?

Smart / Autonomous Cars

What is an example of something in the Integrated Application layer of the 4 Layer Model?

Smart transport

Information systems professionals understand business needs and analyze processes, methods and data to create customer-oriented solutions.The value proposition for MIS was described more briefly by Dr. Jay Nunamaker, Regents Professor and founding chair of the MIS Department, as a discipline focused on doing what for business?

Solving real problems

What normative theory of ethics focuses on the belief that manager's actions should be guided by the understanding that they are entrusted with a responsibility to manage and protect the assets of the company for the benefit of all of those who the actions of the firm affect?

Stakeholder

What term describes individuals with tactic knowledge about a particular domain?

Subject-matter Experts

Tacit or "sticky" knowledge, is based on information that is:

Subjective and cognitive

Using the Internet of Things to increase the efficiency of a company's operations by allowing it to track, in real time, the movement of raw materials and parts through the manufacturing process to finished products delivered to the customer is related to what business function?

Supply chain management

In the VAN (Voter Activiation Network) Relationship-Based Political Organizing video case study, the VAN was able to idenify the relationships of possible supporters using data from what source?

Supporter's Facebook contacts

What term is used to describe the one column for an actor in a cross -functional diagram?

Swimlane

What is the name of the business intelligence tool that is used for interactive analytics and data modeling?

Tableau

Subjective knowledge that is based an individual's experiences is known as what?

Tacit knowledge

Creating a business process that can be franchised is an example of what type of knowledge management conversion?

Tacit to Explicit

Determining whether your personal computer has appropriate hardware to take an online exam proctored by Examity is what type of assessment?

Technical feasibility

How does telemedicine improve the delivery of medical care in rural communities?

Telemedicine reduces the need for patients to travel to physician's offices

What term is used to describe how telemedicine uses wireless transmission and receipt of data gathered from remote sensors to allow doctors can monitor patients and control medical equipment from a distance?

Telemetry

Cisco uses the term "the power of in-person" to describe the ability of what technology to improve access to subject matter experts and to open doors to small business people?

Telepresence

Which of the following technologies we've discussed was described as a more environmentally friendly "best practice for communication" that could greatly benefit small businesses?

Telepresence

Which of the following does a Fishbone Diagram typically not inform you about a problem?

The cost of correcting a problem with a process

In the video case about Transmission Control Protocol (TCP), Vint Cerf described TCP using an analogy of the sending postcard through the US postal system. Which of the following was not an issue discussed in the case study?

The cost of sending the packets making up a message

In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what common problem did his analogy using the postal service to email a page from a book have with sending TCP packets?

The message might get lost and not delivered

A Bill-of-Materials describes the components that make up an item, the quantity used, and what other information about a finished good?

The relationships of raw materials and subassemblies

The big advantage of bubble charts over scatter charts is?

They add another dimension

A Stacked Area chart is good for showing relative contributions of different series to a total over time, but they have one big limitation, which is?

They can't show negative values

Treemap Charts largest advantage over bar or column charts is?

They show individual values relative to the sum of the series as well as other values

What is considered to be the high-capacity data transmission core of the internet structure?

Tier 1 ISP

What British scientist invented the World Wide Web in 1989 while working at CERN (European Organization for Nuclear Research) in 1989?

Tim Berners-Lee

Which of these is NOT enumerated as a Motivation to Create Accessible Web Content?

To improve the reliability of technical functionality (technology centered motivations)

What term describes being able to access information and communication in almost any location?

Ubiquity

Long term weather predictions are generally considered what type of problem?

Unstructured

If the search column for a VLOOKUP contains a duplicate value, which will be returned?

VLOOKUP will return a value based on the first match

What inventory strategy allows a company's supplier to monitor inventory levels and manage the replenishment process for the supplier's products?

VMI

What technology do companies use to make the links between connections between two corporate intranets more secure?

VPN

In the case study presented in class, Nestle's Digital Acceleration Team training program focuses on developing skills in all of the following business issues, except:

Validating

When you check your credit score for incorrect information, you're responding to which of the "4 V's" discussed for "big data" in the financial reporting business sector?

Veracity

As a possible password, how many variables would the password MIS111Exam have when assessing its security strength?

3

What does the "%20" represent in an HTML src attribute of a IMG tag?

A Space Character

What approach to knowledge management would best describe the Eller FlexLabs?

A community of practice

In a relational database, what term refers to the collection of items that are all related to a single unique value, where the single value often serves as the primary key?

A record

In the assigned reading, Don Norman makes the case for viewing conceptual models as what?

A story in context

What accounting metric a strong indicator of whether a firm has sufficient short-term assets to cover its immediate liabilities?

Acid Test

All of the symbols representing tasks and decisions that are shown in single column of a vertical cross-functional diagram are related to the same what?

Actor

What Data Mining method is similar to the approach used by IS Case-based reasoning?

Association

What term was coined by Goldman Sachs in 2001 to describe the fastest growing market economies?

BRIC

Harald Blaatand, who was the King of Demark from 940-981, is associated with what wireless technology?

Bluetooth Technology

What type of security activity provides guidance to people who are tasked with resuming business operations after a major disaster, such as building fire, earthquake, or flood, occurs?

Business continunity

What term refers to the process where two or more entities (individuals, teams, groups, or organizations) who work together to accomplish certain tasks, such as a work group or virtual team?

Collaboration

The "Porter's Forces" model deals with what aspect of globalized business?

Competition

Converting all MIS 111 students from clickers to response cards without an initial test period is an example of what type of conversion?

Direct conversion

What term is used to describe inter organizational ERP systems that provide web-enabled links among a company's key business systems - such as inventory and production - and its customers, suppliers, distributors, and other relevant parties?

ERP-II

Weak passwords are a(n) _____ threat.

Employee

What category of location-based services would best describe products such as "location-based gaming", "social networking," and "find a friend"?

Entertainment

What type of inventory demand is based on the forecasted need for finished products?

Independent demand

What type of inventory management systems deliver the precise number of parts, called work-in-process inventory, to be assembled into a finished product at precisely the right time?

JIT

The European Union's data protection laws are ___________ strict compared to the US laws.

More

With respect to an individual, what term describes the process of managing one's earnings, savings, and debt to meet the actual and budgeted expenses?

Personal finance

In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does "http://" define?

Protocol

Parking garage passes and access control on employee ID badges are examples of:

RFID

What technology has been used for such diverse applications as healthcare, tracking lost pets, and toll collecting on highways?

RFID

Internet-enabled globalization does the following:

Removes geography as a barrier to relationships

Which of the following actions would be considered a biometric authentication?

Requiring a user to scan their fingerprint

What term was used to describe a website that can adapt to the type of device being used to access the website?

Responsive

What is the purpose of a PERT chart?

Schedule and organize tasks

In project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resources and what other dimension of the planning process?

Scope

What common function do "HTTP", "TCP" and "IP" share?

They all define internet-based protocols

The Internet is a ______________.

WAN

Select the answer the correctly orders the types of computer networks in terms of area span of coverage from largest to smallest?

WAN, MAN, LAN, PAN

What type of chart would be typically be used to show how the an initial value is affected by intermediate values -- either positive or negative -- and resulted in the composition of a final value?

Waterfall Charts

Which of the following is *NOT* a behavioral issue for meetings?

Wrong people

Of the items used that identify you uniquely at the University of Arizona, which one can be used as a primary key (unique identifier) outside the University?

Your UA email address

For ABP-1, your "ticker symbol" identifies what?

Your assigned Company

A firewall is a _____ control.

communication

Telepresence systems seamlessly integrate _____ and _____.

contextual awareness; content management

The goal of CAPTCHA is to ___________.

ensure you are not a botnet software

Robots are useful ___________.

for handling monotonous tasks (e.g. factory work)

Telepresence is a version of ____________.

videoconferencing

Which of Thomas Freidman's "flattners" related to technologies related to how content can be digitized and therefore shaped, manipulated, and transmitted; how processes can be done at high speed with total ease; and how mobile can be done anywhere and anytime by anyone; and can be done by anyone?

"The Steroids"

IT allows the workplace to expand to 24 hours a day at _______________, which is a benefit for ___________.

any location; employers and employees

IT __________ be used to create a competitive advantage ___________.

can; when it is used effectively

The difference between =vlookup() and =hlookup() is what?

each record in a vlookup is in a row, and in hlookup is in a column

Google's main business reason for installing fiber in select US cities is to _______.

generate more web traffic, which generates more ad revenue for them

Which of the following is the correct order of the traditional System Development Life Cycle (SDLC)?

investigation, analysis, design, programming and testing, implementation, operation and maintenance

What is the name of the directory where the files for your websites for ABP-3A and ABP-3B will be stores on the U.Arizona.Edu web server?

public_html

The _____________ approach states that an ethical action is the one that provides the most good or does the least harm.

utilitarian

When you use Google Drive to work on a document with a classmate, this is considered_____.

virtual collaboration

Disclosing personal information such as your race, religion, sex, disabilities, and age on social media undermines what type of protections otherwise provided to you as a citizen in the United States?

Anti-discrimination laws

What is the importance of the triple constraint?

Any changes to one constraint will likely affect the project outcome

The Internet of Things can be described as three "any"-type connections. What are these three "any" connections?

Any time, any place, any thing

If we change the FOQ quantity to 75 units, what value will replace the projected available in week four?

55

What tool is commonly used to track how, when, and from what location users are using a website?

Google Analytics

Related to the concepts of globalization, what computer "law" states that value of the internet is related to the number of connections (users)?

Metcalf's Law

Approximately what percentage of applications for jobs are rejected by potential employers before the interview due to public information posted online by the applicant (e.g. social networking, blogs, media sites, etc. - that is, your online reputation)?

60% or more

When deployed, the Irridium satellite telephone network was based on a constellation of 66 satellites. However, how many operational satellites were originally proposed for the original constellation? (Hint the name Irridum was selected due to this number.)

77

Since our firm's sales are cyclical, we adjust the commissions of our sales team sales each quarter. What HLOOKUP function would be used to determine the correct commission rate for March 15th, as shown below?

=HLOOKUP(c5,C2:F3,2,TRUE)

Which of the following would motivate businesses to create accessible eCommerce websites for their customers?

All of the three reasons shown above

What is the term used to describe a graphical description of a database that describes the way in which an organization's data and business activities are associated with one another?

An Entity Relationship Diagram

What MS Excel funtion could be used to implement IS Rule Induction?

Conditional Formatting

The pattern of financial fraud undertaken by David Myers, MCI?S Controller, is a good example of what type of ethical situation?

Ethical Drift

For companies managing their supply chain business processes using CPFAR (Collaborative Planning, Forecasting and Replenishment), the process improvements over the traditional ordering process could be primarily considered an improvement in which of the following?

Efficiency

What the name of the undergraduate certificate offered through the McGuire Center for Entrepreneurship that provides Eller undergraduate students with the opportunity to apply their knowledge and skill sets in real-world environments in order to make your community a better place to live and work as well as having a positive social impact?

Eller Social Innovation (ESI) Certificate

In the Online Democracy model, the "Voter Activation Network" uses voter registration rolls to categorize voters as always/sometimes/never voting by using information obtained form:

Government records

What term best describes when consumers are able to use their smartphones to obtain information about a company's competitor's product pricing, features, customer reviews and availability while shopping in their company's brink-and mortar store?

Information transparency

What type of customer intimacy zone innovation focuses on making structural modifications to established products in order to create a distinctive sub-category?

Line-Extension Innovation

In general, what you think of as the quality of your network connection speed when you are using your PC, iPad, or Smartphone is most influenced by which of the following?

Local Tier-3 ISPs

When applying for advanced standing in the Eller College of Management, the process of selecting your major would be best described as having what characteristics of a decision?

Unstructured and Strategic

What is the correct filename for your ABP-3A website?

index.html

What is the correct filename to use for your ABP-3B website?

index.html

The three security challenges of wireless communication are confidentiality, accessibility, and _____.

integrity

What term is used to describe the set of tasks that must be completed as scheduled in order to ensure the delivery of your project on time?

Critical Path

A feature of an object that limits possible (often incorrect) uses of a device is known as:

A constraint

In June of 2018, Exactis, a marketing and data aggregation firm, disclosed that the personal details of over 340,000,000 individuals and business had been compromised. What security failure caused this massive security breach?

A database was able to be accessed on a server open to the internet

In the video case about Dr. Chiu's Smartrek application, which of the following was not an incentive used to encourage driver participation?

Ability to find other people for carpooling

Which of the following decisions would *not* be a quantitative decision?

Comparing project objectives with corporate objectives

Porter's Forces describes which of the following business issues?

Competition

What type of data structure allows us to organize multi-dimensional information from a data warehouse so that it can be viewed using different data abstractions (or projections)?

Data cube

When major airlines (American, Delta, United, etc.) bypass travel agents and directly market tickets to customers from the airline's corporate website, this is an example of using what type of business sales strategy?

Disintermediation

Which of the following is an informational role?

Disseminator

In the assigned reading for project management, what type of diagram was used to map the impact of a problem using the axes "Impact" and "Likelihood" that you also used in Applied Business Project 2?

I^2 Diagram

Which of the following types of access controls would be a person?s unique identifier within the security domain, such as Name, SSN, Employee ID?

Identification

If your sales system shows a customer's name as "Johnny Smith", but your logistics system for shipping shows the same customer as "John A. Smith", what type of database problem does this represent?

Inconsistency

According to the mythical man-month what is the reason adding people to a project will not speedup your project?

Increased complexity of interpersonal communications

Business metrics that describe the performance of critical business activities are known as:

Key performance indicators

What term is used to describe the percentage value of the number of times a keyword or key phrase appears on a webpage as compared to the total amount of words on the page?

Keyword density

The terms "contextual," "relevant," and "actionable" are commonly related to what term?

Knowledge

What term is used to describe the conversion of tacit knowledge to explicit knowledge, so that the knowledge can be used in the organization by the staff?

Knowledge Codification

What type of decision is based on explicit knowledge and involves analysis using an algorithm and measured data?

Quantitative

Who was the founding director of the Arizona Telemedicine Program?

Ronald S. Weinstein, M.D.

What topic from Data Mining is closely related to decision trees?

Rule Induction

Paying Google to display marketing advertisements when a user searches for a specific Adword is most commonly associated with which of the following concepts?

SEM

As discussed in class, what company was founded in the Globalization 2.0 era based on the business model of selling discontinued product lines directly to consumers by using a new transportation infrastructure to reach a geographically distributed customer base?

Sears, Roebuck & Co.

Which of the following is a problem with BYOD?

Security

Bandwidth is the transmission capacity of a network, stated in bits per second. Which of the following "laws" we've discussed determines the maximum bandwidth (signalling rate) of a given type of communication media (e.g., copper cable, fiber optic, etc.)?

Shannon's Law

Which of the following factors related to the bullwhip effect was due to deception between two trading partners?

Shortage Gaming

In the Jack Welch Video Case in the SCM Lecture, what approach was he discussing as key to providing customer value?

Six Sigma

What normative ethical theory expects a corporation to create more value to society than it consumes?

Social Contract Theory

In the video case for Nestle, data-driven decisions were primarily based on visualizations of information from what source?

Social Media Platforms

In the NASA project management video case, what did the speaker indicate was the greatest risk he faced in managing projects for NASA?

Social and political risk

From Don Norman's perspective, what fatal flaw does the BMW iDrive (which he descibed as a well thought out, very logical, and sensible device) have with respect its human interface?

The iDrive destroyed spatiality

In the assigned reading, Don Norman noted two critical issues with the original BMW iDrive design: the design failed to provide a good conceptual model (a story) and also what other problem?

The iDrive destroyed spatiality

Applications such as "find a friend" (FourSquare), driving directions (Smartrek), roadside assistance (OnStar), and fleet management (UPS and FedEx) are all examples of services that have been enhanced by knowing what?

The location of the requester

_________ is any danger to which a system may be exposed.

Threat

Before paying an invoice in the procurement process, the accounting team checks that the purchase order, the goods receipt document (bill-of-lading), and the vendor's invoice all match. What is the term that is used to describe this auditing process?

Three-way Match

The characteristics of big data (data science) are described as being related to volume (of the information), velocity (speed at which information is collected), veracity (the accuracy of the information) and what other characteristic?

Variety (integrating data from multiples sources)

IT changes managers' job by _________

providing near real-time information so managers can make quicker decisions.

Originally spun out of Stanford University as a research project, what big data tool started out by offering visualization techniques for exploring and analyzing relational databases and data cubes and has expanded to include Big Data research?

tableau

Data ___________ means all applications are able to access the same data, which is ___________ by databases.

independence; maximized

What collaboration tool was discussed in class that enhances the participants' contextual awareness by sharing non-verbal information during meetings?

Telepresence

When displaying a webpage, such as http://www.u.arizona.edu/~wilbur,what is the name of the directory the web browser will check in the "wilbur" account for the "index.html" website?

The "public_html" directory

Porters five forces focuses on what part of competition?

The Business Environment

In the History of the Cell Phone video case, how did the use of cellular phones change the way in which calls were made?

Instead of calling a place, calls to cellular telephones were associated with a person

In the four layer model of the IOT architecture developed by the UofA's Cloud and Autonomic Computer Center, environmental sustainability would be most closely related to what layer?

Integrated application layer

ERP addresses information silos by _____.

Integrating functional areas

As originally discussed by Dr. Gilliland, the classic values conflict with "Who Am I'" represents what type of ethical dilemma?

Integrity vs. loyalty

In the decision process, problem identification and classification occur during which phase?

Intelligence

What would be the correct function to find the price of a Caffe Mocha, size Grande?

=VLOOKUP(A14,$A$2:$D$10,3,FALSE)

What type of tag attribute is used with an IMG (image) tag to improve accessibility?

ALT

According to the "IOT Changes Everything" video case, one of the challenges limiting the widespread deployment of IOT is the transitioning to IPv6. What is the value of using IPv6 to IOT?

Ability to uniquely address billions of IOT devices

According to MIT Sloan Management Review, what percentage of companies have placed sustainability permanently on their management agendas?

About 70%

The following "img" directive uses what type of addressing? <img src="file://C:/Users/Patton/Pictures/NistFigure2.PNG " width="2612" height="1746" alt="Security"/>

Absolute

What technique has been used by companies such as Starbucks and Netflix used to engage large numbers of non-employees to innovate, manage, design and market new products?

Crowdsourcing

What term describes a way of solving problems and producing things by connecting online with people that you otherwise wouldn't know?

Crowdsourcing

Which of the following security measures would be considered a "last line defense" for Information Security?

Cryptography

Similiar to the expansion of telecommunications in the 1800's with the telegraph, what transportation infrastructure was discussed in class that guided the decision the placement of the long-haul fiber-optic cable infrastructure?

Inter-continental Railroads Network

Assume you are 22 years old when you graduate from the University of Arizona and have a credit card with a $2,000 credit balance with an 18% annual rate. If you make minimum payments of 2% of the balance or just $10 (which is greater) each month, what birthday will you likely be celebrating when the credit card is paid off?

52

"Fishbone" process analysis diagram is also known as:

A cause-and-effect diagram

What term is used to describe the marketing analysis where two versions of a web page are compared to see which one gives a better conversion rate for similar visitors at the same time?

A-B (or split) Testing

What term is used to describe an online advertising service developed by Google, where advertisers pay to display advertising, product listings, and video content as a result of Google search.

Adwords

Which company used software to disrupt the previous market-leading companies in the book industry?

Amazon

What is the name of a highly popular crowdsourcing Internet marketplace enabling individuals and businesses (known as Requesters) to coordinate the use of human intelligence to perform tasks that computers are currently unable to do?

Amazon Mechanical Turk

What low-power, non-directional wireless technology is used to create small personal area networks for cell phones and portable music players?

Bluetooth

What short-range wireless technology is commonly to connect smartphones with hands- free headsets for telephone calls and listening to music?

Bluetooth

What type of chart essentially adds a third dimension, such as frequency or quantity, to scatter plots?

Bubble Charts

LEED refers to the efficiency of?

Buildings

What term is used to describe the behavior where small changes in customer demand that result in large variations in raw material orders causing inefficiency in the supply chain?

Bullwhip effect

What is the name of the system used by Raytheon that allows technical blueprints to come to life so engineers engineers and customers can make quick changes to technical specifications and adjust equipment according to their needs using the "the common language of visualization."

CAVE

Which of the following supply chain technologies eliminates the need for a company to implement the "3-way match" process?

CPFAR

________________ allows you to access the internet through a coaxial media previously used only for TV connections.

Cable modem

Put the following assets in order of increasing liquidity (least to most)

Cash, Inventory, Property & Plant

What are the equivalent concepts in Excel to the following database terms: Field, Record, and a Table, respectively?

Cell, Row, Worksheet

What term is describes the conflict when manufacturers (brands) disintermediate their channel partners, such as distributors, retailers, dealers, and sales representatives, by selling their products directly to consumers through general marketing methods and/or over the Internet.

Channel Conflict

What type of data mining analysis identifies patterns in the data based on demographic characteristics (e.g. age, gender, income, ethnicity, etc.)?

Classification

Which of the following types of analysis would be used to produce the Clery report, which is a public annual security report (ASR) that includes statistics of campus crime for the preceding 3 calendar years identifying the crimes committed in physical (geographic) proximity to a college campus as an effort to improve campus safety?

Cluster

Identifying patterns in data based on common temporal (time) or spatial (geographic) traits is based on what type of data mining analysis?

Clustering

In the Accenture video case, the presenter emphasizes that project managment is not about lists and linear relationships, but rather about managing what?

Complex inter-relationships

What term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding?

Conceptual model

What common term was used with both human-computer interaction and In a database entity relationship diagram as a way of limiting choices by the user and also specifying the minimum and maximum possible values that may exist for a relationship between two entities, respectively?

Constraint

When we discussed the design of network infrastructure, we noted that the design of connectors on computers we generally related to the speed of the communication interface, the function being supported (number of signals required), and what other issue related to human-computer interaction?

Constraints to improve reliability

What is the name of software that allows publishing, editing, and modifying content from a central interface, providing procedures to manage workflow in a collaborative environment?

Content Management Systems

What term is used to compare the number of closed sales to the the total number of website visitors? For example, if an ecommerce site receives 200 visitors in a month and has 50 sales, this term would be calcuated as 50 (sales) divided by 200 (visits), or 25%.

Conversion rate

An entrepreneur developing detailed documentation of their business processes so that they can be offered to other individuals as a franchise operation is an example of:

Converting tacit knowledge into explicit knowledge

What is the name for the path containing the minimum set of tasks that you must traverse in order to reach completion of your project on time?

Critical Path

Maintaining multiple copies of the same data in multiple information systems that can be independently updated commonly results in what information management problem?

Data inconsistency

___________ support analysis of data about a business unit or company division, whereas ____________ support analysis of entire organizations.

Data marts; data warehouses

Concerns over using data to illegally discriminate against an individual or group, reaching wrong conclusions due to data contamination, and violating intellectual property (ownership of information) protections were legal and ethical issues discussed in relation to what topic discussed during this module?

Data mining

What type of innovations are intended to be incompatible with existing standards and value chain, and must develop markets de novo (latin for "from the beginning")?

Disruptive Innovation

Which of the following was NOT described as one of the four innovation zones?

Disruptive Technology Zone

In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does ".edu" define?

Domain

What is the name of the Regents Professor and founding chair of the MIS Department that pioneered the field of Group Decision Support Systems?

Dr. Jay Nanamaker

What type of chart allows you to plot data using two y-axes and a shared x-axis, visualizing a correlation or the lack thereof between the two y-axes data sets?

Dual Axis Chart

Which of the following is typically not considered a "core" ERP module?

E-Business

What was the name of the legislation adopted by the European Parliament that mandated that all countries within the EU must setup laws requiring websites to obtain informed consent before they can store or retrieve information on a visitor's computer or web-enabled device.

EU Cookie Law

IT has changed the manager's job in many ways. Which of the following is NOT the result of this change?

Easier to make a decision

A Cost-Benefit Analysis is related mostly to what type of project management feasibility assessment?

Economic

Purchasing an entire box of screws, even though only a small number are needed for the master production schedule is an example of making a purchasing decision based on what approach?

Economic Order Quanitity

One of the impacts of Globalization is the the Economics of Distance (Transportation Costs) has been replaced by what?

Economies of Attention

In the SCOR model, competitive requirements such as reliability, responsiveness, and agility are all related to what dimension of a vendor's performance?

Effectiveness

Originally discussed by Dr. Gilliland, David Myers' (former controller of MCI/Worldcom) statement "I still don't know that one point when I started to cross the line...", is an example of how small, incremental repeated compounding of unethical decisions can result in what?

Ethical drift

Often presented visually on an executive dashboard, what type of report focuses attention on business processes whose performance falls outside the range of their defined KPI metrics?

Exception

What is the process of identifying metrics that are outside of acceptable tolerance levels?

Exceptiuon Reporting

Which of the following types of wire media has the highest physical security?

Fiber-optic cable

An unobstructed, straight line-of-sight path between a transmitter and receiver is required by which of the following high-speed, commercial wireless network technologies?

Microwave

The University of Arizona is nationally recognized for sustainability in its academics, research, operations, and administration by the Association for the Advancement of Sustainability in Higher Education. What Sustainability Tracking, Assessment & Rating System™ (STARS) rating was the University of Arizona awarded in 2017?

Gold

What term did Thomas Friedman's use to describe the impact of globalization where individual countries must sacrifice some degree of economic sovereignty to global institutions (such as capital markets and multinational corporations)?

Golden Straightjacket

Allowing individuals to file tax returns, renew driver's licenses, and obtain various permits online is an example of what type of eGovernment?

Government-to-citizen (G2C)

What is the collective name for a set of open source programs and procedures, such as MapReduce and Yarn, that commonly provide the "backbone" of their big data operations?

Hadoop

What is the name of the University of Arizona's primary career management tool that offers UA students and alumni access to jobs, internships, and a range of other services?

Handshake

What is NOT an advantage of digital transmission?

Harder to encrypt

Which of the following terms is used to measures the frequency of analog signals?

Hertz

What dimensions of Porter's Forces focuses on the decision that a buyer makes when choosing among direct, existing competitors when all of the competitors offer the same identical name-brand product (e.g., an iPhone 6)?

Industry Rivalry

Which of the following security controls would be used to identify and stop a known user's access based on a unusual pattern of behavior?

Intrusion Detection Systems

COPLINK, developed at the University of Arizona in the MIS Department's Artificial Intelligence Lab, allows law enforcement officers to integrate database information to identify crime suspects based on limited information (e.g., a license plate number or nick name). What term is used to describe the type of information system that is commonly used to maintain collection of experiential, reflective and solutions-oriented information?

Knowledge management

The sequence of activities performed by users of GroupSystems' ThinkTank product directly parallel the steps in what other business process?

Knowledge management cycle

In the Personal Branding video case, which of the following online platforms was idenfied as being primarily a business networking tool?

LinkedIn

What is the name of the wireless technology that is designed to be embedded in mobile devices such as cell phones and credit cards allowing you to pay for items by waving your card within a few centimeters of a point-of-sale terminal?

Near-field Communication

Explicit, or "leaky" knowledge, is based on information that is:

Objective and rational

All of the items in one column a cross functional diagram are related to what?

One actor

What name is used to describe results found when a search engine algorithm analyzes all the pages across the web in an unbiased way and reports the pages considered to contain the most relevant information for your search terms?

Organic

What term does Google use to describe how important a website is based upon counting the number and quality of links to a page, using the underlying assumption is that more important websites are likely to receive more links from other websites?

Page rank

Which of the POUR principles focuses on the concept that web accessibility is based upon the assumption that people need to be able to input the information into their brain so that they can process it?

Perceivable

What leadership in Energy and Environment Design (LEED) certification was the building where our classroom is located, Environment and Natural Resources 2, awarded by the U.S. Green Building Council?

Platinum

What term is used to describe a physical interface between peripheral devices and the computer?

Port

What action did Stacy Snyder take that resulted in her losing her job?

Posting a photo of herself at a party on her personal social media account

Which of the following are similar actions in the DM, KCC, and GDSS cycles?

Problem Definition, Create, Brainstorm

What type of innovation focuses on the supply side, looking for opportunities to remove non-value-adding steps from the workflow?

Process Innovation

Assuming orders are currently being processed correctly, adding CPFAR inventory management practices would improve a company in all of the following ways except:

Process effectiveness

An I^2 diagram helps identify opportunities that are "low hanging fruit." What does the term "low hanging fruit" mean in this context?

Projects that are easy to do and also have a high value proposition

What IoT technology discussed in class could be used to identify shoppers and allow products to "introduce" (recommend) themselves to a shopper?

RFID Tags

In a decision matrix, a "weighting" allows what additional information to be included in the analysis?

Relative importance

Tracking what products are delivered to users, and when, is a form of what?

Release Control

Keyword selection and density, image alt tags, and links to content are mostly commonly associated with which of the following concepts?

SEO

Which of the following is generally NOT commonly used as a biometric identification?

Signature

Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what?

Social Engineering

What type of electronic commerce helps shoppers connect with one another based on tastes, location, age, gender, and other selected attributes allowing them to share information using voting, comments, discussions, and reviews focused on shopping?

Social shopping

Your username (UANetID) is your claim of identify to a computer system. When the computer system verifies your identify by requiring you to enter a password is an example of what type of authentication?

Something a user knows

What term is used to describe paid-for product ratings and reviews?

Sponsored reviews

A Mekko, or Marimekko or market map chart, which paints a picture of the overall market and helps to drive discussions about growth opportunities or acquisitions by showing the relationship between each segment or bar to the total. A Mekko chart is similar to what other type of chart discussed in class?

Stacked Bar Chart

What type of problem has an optimal solution can be reached through single set of steps based on an algorithm?

Structured

When classifying items on an I^2 diagram, we depend on individuals with domain knowledge and consultants about the items.When discussing knowledge management, what name did we use to describe an individual with domain knowledge?

Subject-matter Expert

As part of their Smart Campus research, what MIS researcher is using CatCard data (digital traces) to analytize students' routines and relationships to predict student retention, or their likelihood of returning to campus after their freshman year?

Sudha Ram

Thomas Friedman was quoted as saying, "We're in the middle of 3 accelerations; the market, mother nature, and Moore's law. Moore's law says the power of microchips will double every 24 months, mother nature is climate change, biodiversity loss and population, and the market is digital globalization." What is Moore's Law?

The number of transistors in a dense integrated circuit doubles about every two years

Assume you need to put a sign that says "PUSH" on a door handle to explain the correct way to operate the door. The "PUSH" sign helps a user understand what aspect of usability?

The sign explains a false affordance

As I move farther away from campus, I notice that my UAWiFi connection gets progressively weaker. What factor will always cause this to occur?

The signal strength is lost due to attenuation

Which of the following is a DISADVANTAGE of purchasing prewritten software?

The software is controlled by another company.

In a vertical cross-functional business process diagram, the order of items in one column (from top to bottom) shows what relationship among these items?

Time

In a vertical cross-functional diagram, items are ordered in one coumn relates to what?

Time

Hierarchical Diagrams are commonly used for all of the following except?

Time series data

Which of the information layers in the Internet of Things model focuses on the communication networks that connect the sensors that actually collect the data?

Transmission Layer

The _____ test proposes a scenario in which a man and a computer both pretend to be a women or men, and a human interviewer has to identify which is the real human.

Turing

What is the name of the criterion of intelligence where depends on the ability of a computer program to impersonate a human in a real-time written conversation with a human judge, sufficiently well that the judge is unable to distinguish reliably—on the basis of the conversational content alone—between the program and a real human?

Turing Test

Select the answer below that orders the media correctly from the lowest to highest bandwith (data rates).

Twisted pair, Coaxial Cable, Fiber-optic Cable

A company's "ticker" or stock symbol serves what role on a stock trading exchange?

Uniquely identifies a traded stock

Current information systems have evolved to focus on what role with respect to their services?

Value creation

Businesses like to use Virtual Private Networks for every reason except?

Virtual networks are faster than ordinary internet connections

Similar to trends in computing hardware, what is the trend for wireless network hardware?

Virtualization and merging with the cloud

According to the articles what technologies enable businesses and their employees to get in front of clients and customers but do it in a cost-saving manner?

VoIP and web conferencing

Which of the following types of security risks would ben identified weakness in which necessary controls are not present or effective?

Vulnerability

The web ____________ buyer power.

has a mixed impact on


Kaugnay na mga set ng pag-aaral

Cellular respiration and photosynthesis

View Set

Chapter 4: Common Gynecologic Issues

View Set

UNIT 2 TEST- POLITICAL PARTIES, INTEREST GROUPS AND ELECTIONS

View Set

Cardiovascular part II(Heart Failure, myocardial infarction, dysrhythmias)

View Set

Federal Government | Chapter 5: Equal Rights

View Set

FL Statutes, Rules, and Regulations Common to All Lines

View Set