MIS CCR-1
Two-Factor Authentication Video: Two-factor Authentication (2FA) protects your account login from being hacked through what method?
2FA Requires hackers also have your physical device (second factor)
As they identify and devleop business solutions, the work of information systems professionals is focused on what specific goal?
Creating business value
Although it incurs significant computational cost, known as proof of work, what aspect of the Bitcoin verifies transactions among anonymous participants?
Cryptographic mining
________ is an example of a source system for a data warehouse.
ERP (Enterprise Resource Planning) Systems
When entering an Excel expression into a worksheet cell, which of the following symbols must be used as the first character?
"=" (equals sign)
As an example of a debt trap, consider the case of a student that graduates from the University of Arizona with a modest credit card debt of $2,500 on a card with an annual percentage rate (APR) of 15%. If the person only makes the minimum requirement payments each month, approximately how many years will it take them to pay off their $2,500 credit card balance?
14 years
How have manufacturers used IT to enhance the accessibility of Web and graphical user interfaces to provide opportunities for individuals with disability related to impaired vision?
Adding audible screen tips
From the Video Case "It's Getting Harder to Spot a Deep Fake Video" what is a positive application developed by CereProc using deep fake technology that benefits individuals struck by disease?
Allowing people who have lost their voice to have synthetic voices
In the context of personal information being seen as an economic good, what term relates to the fact that individuals do not know who, how often, or how long their information will be used?
Asymmetric Information
What accounting statement is a financial snapshot of a company's overall financial condition at a given point in time?
Balance Sheet Statement
As described in our reading, what term was used to describe the Malaysian Experiment's Multimedia Super Corridor (MSC) comprehensive regulatory framework that offered intellectual property protections and cyber laws to facilitate and assist the development of a truly ICT and multimedia environment?
Bill of Guarantees
Plus (+), minus (-), multiply (*) and divide (/) are all examples of what type of arithmetic operator?
Binary
Which of the following three types of Database Management Systems (DBMS) architectures uses multiple interconnected databases?
Distributed
What type of DBMS (Database Management System) architecture stores information on an interconnected network of database servers?
Distributed Database
Which UofA MIS Researcher developed a system to use anonymized WiFi Data to identify person-density in buildings and spaces at the University using temporal and spatial data to help fight Covid-19?
Dr. Sudha Ram
What name is used to describe the Eller College of Management's commitment to fostering an environment where competition is fair, integrity is promoted, and academic dishonesty is rooted out?
E-tegrity
According to the Imperial College London, which of the following time horizons should businesses view disruptive technologies such as cryptocurrency, autonomous vehicles, and distributed ledgers (blockchain)?
Happening Now
What term is used to describe the process of combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists?
Non-obvious relationship awareness (NORA)
While working for IBM in the mid-1960's, what did Ted Codd develop to improve upon the hierarchical storage model?
Relational Database
Which of the following would typically NOT be a method used by a hacker as part of a phishing attack?
Requests for two-factor authentication
According to the "What is a database?" video case, what is the name of the database language that makes it possible to easily manage the requested data?
SQL (Structured Query Language)
What term, also described as vandalism, is a deliberate act that involves defacing an organization's website, potentially damaging the organization's image and causing its customers to lose faith?
Sabotage
According the the "What Defines Financial Literacy" video case discussing personal finance, the term "financial fitness" relates to your behaviors around the knowledge of financial literacy in all of the following areas except:
Selecting a career field that has high-paying jobs
What is the name of the controversial national reputation system developed by the Chinese government in order to have a standardized assessment of citizens' and businesses' economic and social reputations?
Social Credit System
According to Siemens Enterprise Communications, what is one of the most effective routes to stealing confidential data from organizations?
Social Engineering
In the "Berlin Declaration on Digital Society and Value-based Digital Government," which of the principles focused on having the public sector encourage wider participation in policy-making by involving society in the design of public services through co-creation, experimentation and collaboration?
Social participation and digital inclusion to shape the digital world
Which of the following is a technique designed to allow the perpetrator to enter restricted areas that are controlled with locks or card entry by following closely behind a legitimate employee and, when the employee gains entry, the attacker asks him or her to "hold the door"?
Tailgating
Described by IBM as "cognitive computing," IBM's Watson does NOT have which of the following capabilities?
The ability to detect deceptive behaviors and statements
Court decisions in many countries have determined the right of privacy is not absolute, but must be balanced against what?
The needs of society and the public's right to know
In the following image of an Entity-Relationship Diagram, the diamond "Enroll" defines what?
The relationship between "Students" and "Courses"
In the "Budgeting" video case discussing personal finance, what did they recommend as a first step in budgeting?
Track your current income and expenses for a month
According to "The internet is watching you" video case, what approach could be used with big data to give teachers an early warning that a student needs help with their studies?
Tracking a student's grades
As described in the Accenture "Building Your Brand" video case, what should you be scanning for when reviewing descriptions of ideal jobs to help you build an online profile that contributes to your job search process?
Using keywords you find in your online profile
When executed, which of the following is returned when an Excel function, such as SUM or COUNT, is executed?
Value
What one of the Big Data "Four V's" of Big Data does IBM describe as "data uncertainty" as it relates to managing the reliability and predictability of inherently imprecise data types?
Veracity
Which of the following is NOT considered a "fundamental" data type in Excel?
Date
Which of the following represents the value 1234.56 when formatted as an Excel "Accounting" value with "Symbol" as "None"?
1,234.56
The General Data Protection Regulation, the world's strongest data protection laws, went into effect in ____ on May 25, 2018.
the European Union
Which of the following metrics would be used as a measure of the ability of a company to meet its short-term financial obligations?
Acid Test
According to Social Intelligence, approximately what percentage of employers check up on current employees on social media?
50%
According to Helium.com, approximately what percentage of job candidates are rejected before having an in-person interview?
65%
Notwithstanding that many books are now electronic (or digital) products, in 2020, physical books still accounted for approximately what percent of total book sales?
81 percent
_________ is an electronic profile of you and your habits.
A digital dossier
Which of the following attacks, created by a programmer developing a system, is a segment of computer code that is embedded within an organization's existing computer programs and is designed to activate and perform a destructive action at a certain time or date?
A logic bomb
Generating over $11 billions dollars through streaming services, record label receive approximately how much revenue each time a song is streamed?
About 0.3 cents
Employers often monitor their current employees online behavior to identify potential risks that behavior might represent for the company and its employees. Which of the following actions was NOT discussed as an online action by an employee that could represent a risk for a company?
Accessing websites containing political or religious content
_________ refers to determining who is responsible for actions that were taken.
Accountability
_________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.
Accuracy
What term is used to describe the subjects, such as product, customer, geographic area, and vendor, used to organize the data in a data warehouse?
Business dimension
What term is used to describe a pre-printed list of NetID+ authentication codes that can be used when your Duo App cannot be used for authentication?
Bypass codes
Which of the following terms used with Excel would be most closely related to the concept of a programming named variable?
Cell reference (relative, absolute, or named)
From the perspective of the Democracy Online framework, which group would participate through activities such as committing time to participate, helping others learn, communicating respectfully and responsibly, and starting/volunteering with citizen-based online democracy efforts and community networks?
Citizens in the Online Commons
While e-Inclusion focuses on participation of all individuals and communities in all aspects of the information society no matter their country, gender, age, or wealth, what categoy of e-Empowerment is tightly connected with the concept of e-Democracy and the galaxy of interactions between citizens and government that e-Democracy enables?
Citizenship Level
From the Video Case "It's Getting Harder to Spot a Deep Fake Video" what is a potential negative application that could cause great harm to well known people?
Committing fraud by creating a fake video that could be used to blackmail an individual or ruin their reputation
All of the following are social engineering tactics discussed in the class discussion except?
Cracking - Brute force trying different variations of symbols or words until you guess the correct password
What term is used to describe a a low-cost, scaled-down version of a data warehouse that is designed for the end-user needs in an SBU (Strategic Business Unit) or an individual department?
Data mart
When developing a company's privacy policy guidelines, all of the following issues that would be relevant for Data Accuracy EXCEPT:
Data should not be given to third parties without the individual's knowledge or permission
Replacing the original Safe Harbor regulations, what is the name of the new legal framework adopted in 2016 by the the European Commission and the U.S. Department of Commerce that regulates the way that the U.S. companies export and handle transatlantic data flows?
EU-US Privacy Shield
The California Budget Challenge focuses on having citizens assess what type of feasibility constraint?
Economic feasibility
What term is used to describe the study of designing machines and work settings to minimize injury and illness?
Ergonomics
Which of the following is typically NOT considered a worker health and safety problem caused by computers?
Ergonomics
In the video case "Living in a digital society," what country was discussed as having a comprehensive eGovernment program using digital technologies?
Estonia
What ethical framework is based on the tenant "Assume that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise"?
Ethical "No Free Lunch Rule"
What ethical situation was David Myers, former Controller of WorldCom referring to when he stated "I still don't know that one point when I started to cross the line... when I should have acted differently"?
Ethical drift
Which of the ethical situations that Dr. Gilliland described considered the aggregate impact of of small ethical deviations?
Ethical drift
Which of the following Excel fundamental data types would NOT be considered as a literal or constant?
Expression
All of the following are optional employee contributions made as wither pre- or post-tax payroll deductions EXCEPT:
Federal Insurance Contribution Act (FICA)
With respect to managing a personal budget, what category of consistent expenditures would describe predictable payments such as car and rent payments?
Fixed Expenses
What term is used to describe a tool that is used to transform, manipulate, or select data in order to return a value that can be used in an expression?
Function
In the "Drunken Pirate" case discussion, why was the picture, captioned "Drunken Pirate", that Stacy Snyder posted of herself on her personal MySpace account considered as being an "unprofessional" act for a high school teacher-in-training?
Her online posting promoted drinking in the "virtual view" of her students
What data warehouse architecture is based on a central data warehouse that stores the data plus multiple dependent data marts that source their data from the central repository in order to maintain a single version of the truth for decision-support purposes?
Hub-and-spoke
Which of the following goals was NOT part of the Democratic National Committee's (DNC's) 2008 Election Strategy to increase voter participation in all 50 states?
Identify and Motivate voters supporting Republican party ideals
What financial statement reports the economic results of a company over a time period by showing the derivation of earnings and losses?
Income Statement
Which of the following was NOT discussed as an issue that might motivate a company to increase its investments in IT to replace people with technologies to cut costs?
Increased data breaches
Which of the following is NOT a likely benefit for a company using Blockchain technology?
Increases the risk of data tampering, fraud and cyber crime
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?
Increasing skills necessary to be a computer hacker
Which of the following stages of e-Government evolution is defined in our reading where the government's online presence is mainly comprised of a web page and/or an official website, and much of the information is static and there is little interaction with citizens?
Interactive
Which of the following was previously a long-time, industry-leading company that had to declare bankruptcy due to the disruptive impact of an innovative software company on its core business product?
Kodak
Both the "Building Your Brand" and "Your Personal Brand" video cases recommended building an online profile on what professional networking site to create awareness of your personal brand used by company recruiters searching for job candidates?
With respect to financial accounting, the term equity is used to describe the ownership of a company. Which of the following concepts would NOT be another term related to a company's "equity" in this context?
Market value
In the Crime Inc. - Martha Stewart video case, in addition to the criminal penalties, what other penalty did Martha Stewart receive as a result of a subsequent civil case?
Not allowed to serve as a director or CEO of a public company for five years
Which of the following criminal actions taken by Martha Stewart in the ImClone case study directly resulted in her serving time in prison?
Obstruction of justice
Which of the following would generally NOT be an example of a transformation performed as part of an ETL (Extract, Transform, and Load) or data integration process?
Obtaining data from source systems using handwritten code or with commercial data-integration software
According to DOMO, about how long does it take for users to upload 48 hours of new video to YouTube, post 100,000 new tweets to Twitter, and Instagram users to share 3,600 new photos?
One minute
Which of the following is NOT a correct statement about the UArizona WiFi wireless network system?
Open access wireless network availabe to guests when on the UArizona campus
In our discussion of eGovernment, what term was used to describe how the City of St. Paul allow its citizens to choose to receive an email notification when any new content is published related to specific content categories or to a specific city neighborhood?
Personalization
Developed by the Imperial College London, the Table of Disruptive Technologies classifies technologies on two dimensions: Time Horizon and what other dimension?
Potential for Socio-Economic Disruption
Which of the following terms is used to describe farm management that uses information technology to ensure that crops receive exactly what they need—for example, water, fertilizer, and pesticides—for optimum health and productivity?
Precision agriculture
Domain expertise and text, numeric, and visual data are all inputs to what phase of the spiral methodology for the data mining process?
Problem Definition
As described in the "Democracies Online", which of the following would NOT be a considered as aspect associated "Political Organizations"?
Provide User Connectivity, Increase Bandwidth, Lower Costs, and Bring More Users
What term describes the amount of cash available in the short term and indicates the funds needed to operate a business of a given size?
Working Capital
Which of the following data structure concepts in Excel would be similar to a database field?
Worksheet column
Which of the following data structure concepts in Excel would be similar to a database record?
Worksheet row
Which of the following is an accurate representation of the data hierarchy from smallest to largest?
bit, byte, field, record, file, database
The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action.
deontology
URL filtering, which uses software to block connections to inappropriate websites, is a type of _________ technology.
electronic surveillance
Photo tagging is the process of assigning names to to images of people using what type of technology?
facial recognition
Databases allow applications and data to be independent of one another but still allow all applications to access the same data which maximizes data ________.
independence
A(n) ________ of an entity refers to each row in a relational table, which is a specific, unique representation of the entity.
instance
Information in data warehouses and data marts is __________, so it reflects history, which is critical for identifying and analyzing trends.
nonvolatile