MIS 111 Final Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

IT __________ be used to create a competitive advantage ___________. a) can; because everyone has access to technology b) can; when it is used effectively c) cannot; because everyone has access to technology d) cannot; even when it is used effectively

can; when it is used effectively

WebMD is a(n) _________ that allows doctors to ___________. a) ERP; diagnose diseases b) expert; diagnose diseases c) ERP; perform long-distance surgery d) expert; perform long-distance surgery

expert; diagnose diseases

Robots are useful ___________. a) as companions (e.g. cyberpooches) b) for driving cars (e.g. cyberchauffer c) for handling monotonous tasks (e.g. factory work) d) only in science fiction (e.g. Terminator)

for handling monotonous tasks (e.g. factory work)

The web ____________ buyer power. a) decreases b) increases c) has no impact on d) has a mixed impact on

has a mixed impact on

The _________ prohibits an organization from collecting any personal information unless the customer specifically authorizes it. a) digital dossier policy b) information privacy policy c) opt-in model of informed consent d) opt-out model of informed consent

opt-in model of informed consent

IT changes managers' job by _________ a) providing near real-time information so managers can make quicker decisions b) making it easier to get all employees to work from one location c) decreasing the volume of information they have to process d) improving an employee's sense of connectedness

providing near real-time information so managers can make quicker decision

The _____________ approach states that an ethical action is the one that provides the most good or does the least harm. a) common good b) fairness c) rights d) utilitarian

utilitarian

Selecting computers with EPEAT power supplies should reduce the annual operating cost of a computer by what? a)$0.50 b) $2.50 c) $4.00 d) $7.00 e) $12.0

$7.00

Selecting an EPEAT compliant technology in place of traditional technology is an example of what order sustainability effect? a) 1st Order -Creation and Use b) 2nd Order -Application Substitution c) 3rd Order -Long-term Structural Change d) 4th Order-Transference e) 5th Order -Value Proposition

1st Order -Creation and Use

Substituting face-to-face meetingswith telecommuting and online distance learning are examples of how technology produces what order sustainability effect? a) 2nd Order -Application Substitution b) 1st Order -Creation and Use c) 3rd Order -Long-term Structural Change d) 4th Order-Transferencee) 5th Order -Value Proposition

2nd Order -Application Substitution

As a possible password, how many variableswould the password MIS111Exam (just the underlined string of characters) have when assessing its security strength? a) 1 b) 2 c) 3 d) 4 e) 5

3

The password '4r1ZoN@' has how many variables ? a) 4 b) 1 c) 2 d) 3 e) 5

4

Approximately what percentage of applications for jobs are rejected by potential employersbefore the interviewdue to public information posted online by the applicant (e.g. social networking, blogs, media sites, etc. -that is, your online reputation)? a) Less than 5% b) About 10% c) About 30% d) Less than 50% e) 60% or more

60% or more

______________ refers to determining who is responsible for actions that were taken. a) Acceptance b) Accountability c) Liability d) Responsibility

Accountability

Which company used software to disrupt the previous market-leading companies in the book industry? a) Amazon b) Barnes and Noble c) Books-a-Million d) Walmart

Amazon

Disclosing personal information such as your race, religion, sex, disabilities, and age on social media undermines what type of protections otherwise provided to you as a citizen in the United States? a) Wage discrimination laws b) Anti-discrimination laws c) Voter eligibility laws d) Commercial driver's license eligbility laws e) Personal credit eligibility laws

Anti-discrimination laws

In the video case study of Porter's Forces, Michael Porter commented that the airport's control of gates represented which of the five forces? a) Bargaining Power of Suppliers b) Potential Threat of New Entrants c) Threat of Substitute Products d) Bargaining Power of Buyers e) Industry Rivalries

Bargaining Power of Suppliers

The equity on a company's balance sheet is most closely related to which of the following? a) Market value b) Operating income c) Share price d) Book value e) Gross margin

Book value

LEED refers to the efficiency of? a) Buildings b) Cars c) Desktop Computers d) Data Centers e) Aircraft

Buildings

In the Zara case, the company has aligned its information system strategy with what? a) Business strategy b) Product margins c) Decentralized intelligence d) Competitive position e) Efficiency mode

Business strategy

As discussed in class, a key concern for a startup business is the "burn rate" for their initial capital.What financial report best describes a company's "burn rate" for investors? a) Balance sheet b) General ledger' c) Income statement d) Cash flow statement e) Ticker symbol statement

Cash flow statement

The "Porter's Forces" model deals with what aspect of globalized business? a) Competition b) Design c) Location d) Relationships e) Time

Competition

Selecting EPEAT-compliant technology with a high rating over traditional, less energy efficient technology is an example of focusingon what sustainability effect? a) Use of government regulation to eliminate wasteful products b) Creation, Use and Disposal of a product c) Substitution by using alternative methods d) Impacts of long term structural change e) Increased awareness through the use of metrics

Creation, Use and Disposal of a product

Focusing on improving existing products by extending product lines and improving product features is what type of innovation? a) Customer Intimacy b) Product Leadership c) Operational Excellence d) Category Renewal e) Open-source Development

Customer Intimacy

Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control? a) Bullwhip effect b) Just-In-Time c) Defense in depth d) Disintermediation e) Social Contract

Defense in dept

Which group of voters would result in the highest return on investment (i.e., largest number of votes for a DNC candidate) using a get-out-the-vote (GOTV) strategy? a) Democratic voters who sometimes vote b) Independent voters who always vote c) Independent voters who sometimes vote d) Republication voters who sometimes vote e) Democratic voters who always vote

Democratic voters who sometimes vote

What type of innovations are intended to be incompatible with existing standards and value chain, and must develop markets de novo (latin for "from the beginning")? a) Disruptive Innovation b) Application Innovation c) Platform Innovation d) Product Innovation e) ProfitInnovation

Disruptive Innovation

What type of innovations are intended to be incompatible with existing standards and value chain, and must develop markets de novo (latin for "from the beginning")? a) Disruptive Innovation b) Application Innovation c) Product Innovation d) Platform Innovation e) Profit Innovation

Disruptive Innovation

Which of the following was NOT described as one of the four innovation zones? a) Disruptive Technology Zone b) Product Leadership ZoneProduct Leadership Zone c) Customer Intimacy Zone d) Category Renewal Zone e) Operational Excellence Zone

Disruptive Technology Zone

IT has changed the manager's job in many ways. Which of the following is NOT the result of this change? a) Easier to make a decision b) More information to address c) Remote supervision d) Real-time information

Easier to make a decision

The outcomes of the E-Government Strategy report primarily focuses on improving business processes in which of the following ways ? a) Efficiency b) Desirability c) Feasibility d) Popularity e) Reliability

Efficiency

The Gainesville police department started using the internet to accomplish all of these objectives except? a) Demystify law enforcement operations for the citizens of Gainesville b) Motivate community groups to have a strongerhand in addressing crime. c) Enable individual citizens to better protect themselves from criminal activity. d) Empower businesses to identify high crime areas and determine appropriate levels of security

Empower businesses to identify high crime areas and determine appropriate levels of security

Originally discussed by Dr. Gilliland, David Myers' (former controller of MCI/Worldcom) statement "I still don't know that one point when I started to cross the line...", is an example of how small, incremental repeated compounding of unethical decisions can result in what? a) Gut check b) Transparency test c) Whistleblowing d) Ethical drift e) Defining moment

Ethical drift

ERP systems are an evolution of _____________. a) AI b) CRM c) DSS d) FAIS

FAIS

What term describes the ability of a person to effectively evaluate and manage one's finances in order to make prudent decisions toward reaching life's goals? a) Personal Accounting b) Financial Literacy c) Household Finance d) Expense Management e) Risk Management

Financial Literacy

Car payments and rent are examples of what type of expenses? a) Fixed b) Discretionary c) Variable d) Pre-paid e) Flexible

Fixed

Planned, recurring expenses that occur on a routine schedule, such rent or car payments that must be paid every month, are examples of what? a) Flexible expenses b) Deductions c) Discretionary expenses d) Fixed expenses e) Cash flow

Fixed expenses

Which of the following is an example of how individuals use technology in a way that that allow others easily to monitor and track their activities? a) Geotagging smartphone photos b) Hashtagging posts on Twitter c) Accessing a website d) Reading a blog post online e) Sending emails to friend

Geotagging smartphone photos

In the Online Democracy model, the "Voter Activation Network" uses voter registration rolls to categorize voters as always/sometimes/never voting by using information obtained from: a) Online media b) Commercially-generated databases c) Private sector polling d) Government records e) Partisan political organization

Government records

Allowing individuals to file tax returns, renew driver's licenses, and obtain various permits online is an example of what type of eGovernment? a) Government-to-business (G2B) b) Government-to-citizen (G2C) c) Government-to-employees (G2E) d) Government-to-government (G2G) e) Government-to-suppliers (G2S)

Government-to-citizen (G2C)

In recognizing ethical situations, which of the following is related to a chemical reaction that occurs in your body, specifically your intestinal track? a) Ethical drift b) Gut check c) Transparency test d) Gut punch e) Taste check

Gut check

Which of the following is a support activity in Porter's value chain model? a) Human Resources b) Logistics c) Operations d) Marketing e) Service

Human Resources

Which of the following is TRUE? a)IT can eliminate any job b) IT impacts entire industries c) IT opens up jobs for middle managers d) IT only helps improve employees' health and safety.

IT impacts entire industries

Which of the following groups of voters would the DNC be most likely to contact with a persuasion campaign message? a) Independent voters who sometimes vote b) Democratic voters who sometimes vote c) Independent voters who always vote d) Republication voters who sometimes vote e) Democratic voters who always vote

Independent voters who sometimes vote

Co-location of trading computers at the stock exchange would providewhat type of competitive advantage for a company like Goldman Sachs with respect to Porter's Forces? a) Industry Rivalries b) Potential Threat of New Entrants c) Threat of Substitute Products d) Bargaining Power of Suppliers e) Bargaining Power of Buyer

Industry Rivalries

What dimension of Porter's Forces focuses on the decision that a buyer makes when choosing among direct, existing competitors when all of the competitors offer the same identical name-brand product (e.g., an iPhone 6)? a) Industry Rivalry b) Threat of Substitution c) Threat of New Entrants d) Buyer power e) Supplier power

Industry Rivalry

As an employee of MCI/Worldcom,David Myers faced what classic ethical dilemma also described as a 'Who am I?'? a) Integrity versus Loyality b) Social Contract Theory c) Weak Learning Culture d) Procrastionation Culture e) Profit Maximizing Culture

Integrity versus Loyality

As originally discussed by Dr. Gilliland, the classic values conflict with "Who Am I'" represents what type of ethical dilemma? a) Short-term vs. long-term b) Honesty vs. integrity c) Peer-pressure vs. boss-pressure d) Integrity vs. loyalty e) Organizational ethic

Integrity vs. loyalty

How does adding social networking to the VAN allows candidates toimprove the effectiveness of their volunteers? a) Leverages personal relationships b) Sending campaign tweets automatically c) Automatically registers new voters d) Eliminates the need for blockwalking e) Replaces campaign volunteers with computer bot

Leverages personal relationships

87. On your personal financial balance sheet, your student loans would be classified in what category? a) Liability b) Assets c) Net Worth d) Prepaid Expense e) Expenditures

Liability

______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. a) Accountability b) Due Process c) Liability d) Responsibility

Liability

What type of customer intimacy zone innovation focuses on making structural modifications to established products in order to create a distinctive sub-category? a) Line-ExtensionInnovation b) Enhancement Innovation c) Marketing Innovation d) Experiential Innovation e) Value-engineering Innovation

Line-ExtensionInnovation

In the Personal Branding video case, which of the following online platforms was idenfied as being primarily a business networking tool? a) Facebook b) LinkedIn c) Democratic voters who sometimes vote d) Wordpress e) Amazon.com

LinkedIn

In the Martha Stewart case, which of the following issues resulting in Martha Stewart being convicted of criminal charges? a) Lying to the FBI b) Defaulting on a loan c) Selling stocks below book value d) Insider trading e) Falsely advertising her product

Lying to the FBI

The European Union's data protection laws are ___________ strict compared to the US laws. a) Equally b) Less c) More d) Non-existently

More

What % of people like to purchase products from companies that protect the environment? a) More than 10% b) More than 35% c) More than 50% d) More than 75%

More than 50%

Market capitalizationis determined by multiplying the stock price by what? a) Profits earned from direct operations b) Dividends paid during the last fiscal year c) Number of common shares outstanding d) Book value of the company e) Year-end Earnings, minus taxes and interest

Number of common shares outstanding

What was the central issue in the Stacy Snyder in-class discussion case? a) Online Reputation b) Geotagging c) Lying about qualifications d) Age discrimination e) Cheating on an exa

Online Reputation

Which of the following permits the company to collect personal information until the customer specifically requests that the data not be collected? a) Opt-out model of informed consent b) Digital dossier policy c) Personal information privacy policy d) Opt-in model of informed consent e) Privacy Paradox

Opt-out model of informed consent

On the balance sheet, total assets minus total liabilities must equal what? a) Free Cash flow b) Dividends Paid c) Owner's Equity d) Stock price e) Market Value

Owner's Equity

With respect to an individual, what term describes the processof managing one's earnings, savings, and debt to meet the actual and budgeted expenses? a) Personal Accounting b)Financial Literacy c) Personal Finance d) Expense Management e) Risk Management

Personal Finance

Which of the following is NOTone of the "4 P's" of innovation? a) Personalization b) Product c) Process d) Process e) Paradigm Shift

Personalization

Official-sounding emails that demand you reply immediately to confirm your personal information or you will lose access to your account are a software attack known as: a) Phishing Attack b) Trojan Horse c) Zero-day Attack d) Drive-by Attack e) Logic Bomb

Phishing Attack

What action did Stacy Snyder take that resulted in her losing her job? a) Hacking the AP Twitter feed and posting a fraudulent message b) Undertaking accounting fraud at her company c) Posting a photo of herself at a party on her personal social media account d) Infecting her company's network computer with a virus while using Facebook at work e) Being a whistle-blower and reporting the illegal actions of her employe

Posting a photo of herself at a party on her personal social media account

______________ is the right to be left alone and to be free of unreasonable personal intrusions. a) A digital dossier b) Information privacy c) Privacy d) Profiling

Privacy

The specific steps you must perform to earn AP credit in MIS 111 is what dimension the MIS Design Perspective? a) Process b) People c) Technology d) Management e) Financial

Process

What type of innovation focuses on the supply side, looking for opportunities to remove non-value-adding steps from the workflow? a) Process Innovation b) Value-Engineering Innovation c) Value Migration Innovation d) Organic Innovation e) Enhancement Innovation

Process Innovation

______________ is the process of forming a digital dossier .a) Dossiering b) Information privacy c) Privacy d) Profiling

Profiling

Dr. Jay Nunamaker, founding chair of the MIS Department, describes MIS as a discipline focused on "Solving Real Problems" for who? a) Real People b) Financial Analysts c) UA Faculty d) UA Students e) Society at Large

Real People

How does using two-sided printing improve energy efficiency? a) Reduces energy usage by about half b) Increases energy costs by about 10% c) Makes no impact on energy efficiency d) Reduces energy usage by more than 90% e) It is not possible to measure a printer's energy efficiency

Reduces energy usage by about half

Which of the following actions would be considered a biometric authentication? a) Requiring a user to enter a secret password b) Requiring a user to swipe a CatCard c) Requiring a user to scan their fingerprint d) Requiring a user to sign their signature e) Requiring a user to type a group of displayed letter

Requiring a user to scan their fingerprint

The accounting value of a firm is equal to what? a) Shareholder Equity b) Assets c) Liabilities d) Stock Price e) Annual Dividend

Shareholder Equity

Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? a) Defense in Depth b) Industrial Sabotage c) Social Engineering d) Advanced Persistent Threats e) Open Source Hacking

Social Engineering

The doughnut model describes a "Safe And Just Space for Humanity" as a space bounded by the environmental ceiling and what other construct as the floor? a) Social foundation b) Planetary Boundaries c) Sustainable Development Goals (SDG�s) d) Ecosystem Assessment e) Ethical Framework

Social foundation

Your username (UANetID) is your claim of identify to a computer system.When the computer system verifies your identify by requiring you to enter a password is an example of what type of authentication? a) Something a user is b) Something a user has c) Something a user does d) Something a user knows e) Something a user inherits

Something a user knows

What normative theory of ethics focuses on the belief that manager's actions should be guided by the understanding that they are entrusted with a responsibility to manage and protect the assets of the company for the benefit of all of those who the actions of the firm affect? a) Stockholder b) Stakeholder c) Social Contract d) Organizational e) Loyalty

Stakeholder

On a balance sheet, assets must equal the sum of liabilities and what other financial measure? a) Stockholder's Equity b) Gross Margin c) RetainedEarnings d) Net Income e) Dividend Yield

Stockholder's Equity

In the VAN (Voter Activiation Network) Relationship-Based Political Organizing video case study, the VAN was able to idenify the relationships of possible supporters using data from what source? a) Voter registration records b) Direct mail campaigns c) Online surveys d) Supporter's Facebook contacts e) Tax returns of registered voter

Supporter's Facebook contacts

In the Video Case on Michael Porters Competitive Forces What Industry was described as being Terrible in Every Category? a) The Airline Industry b) The Railroad Industry c) The Supermarket Industry d) The Cattle Industry

The Airline Industry

Porters five forces focuses on what part of competition? a) The Business Environment b) The FiveCore Internal Processes of a Business c) The Business Supply Chain d) The Five Core Business Functional Area

The Business Environment

What term would be used to describe any danger to which is system my be exposed? a) Threat b) Audit c) Espionage d) Visibility e) Violation

Threat

_________ is any danger to which a system may be exposed. a) Exposure b) Information security c) Threat d) Security

Threat

Which of the following would NOT be considered a type of social engineering ? a) Torjan Horse b) Spear Phishing c) Tailgating d) Vishing e) Smishing

Torjan Horse

In financial markets, a "ticker symbol" identifies what? a) Traded Company b) Stock Exchange c) Sales Transaction Record d) Stock Broker's Identification e) Customer's Identification

Traded Company

A company's "ticker" or stock symbol serves what role on a stock trading exchange? a) Uniquely identifies a traded stock b) The time and date the stock was sold c) The broker selling the stock d) The change (up or down) in price from the last purchase price e) The official company logo used for stock transaction

Uniquely identifies a traded stock

Entrepreneurship is a market-oriented mechanism for advancing what aspect of innovation? a) Value Proposition b) Product Feasibility c) Profitability d) Marketability e) Globalization

Value Proposition

According to the articles what technologies enable businesses and theiremployees to get in front of clients and customers but do it in a cost-savingsmanner? a) VoIP and web conferencing b) Telecommuting c) Telemedicine d) eFax e) email

VoIP and web conferencing

The Eller "GoodCat" website that allows for anonymous reporting of unethical behavior in Eller classes uses what type of business model? a) Transparency model b) Ethical drift model c) Whistleblower model d) Loyalty model e) Engagement mode

Whistleblower model

Which of the following elements present on your CatCard releates to biometric identification? a) Your picture b) Your signature c) Your full name d) Your student ID number e) Your signature

Your picture

IT allows the workplace to expand to 24 hours a day at _______________, which is a benefit for ___________. a) a central location; only employees b) any location; only employers c) a central location; employers and employees d) any location; employers and employee

any location; employers and employee


Ensembles d'études connexes

nonmarketable us gov securities unit 2

View Set

psych chapter 15 quiz (psychological disorders)

View Set

DIT Microsoft Excel Test Review: Projects 1-10 GMetrix

View Set

Bio 122 Chapter 11 Study Guide: Cell Communication

View Set

US History: ch 4 section 3 and 4

View Set

Accounting Test2 5-8 pre-lecture questions

View Set