MIS FINAL

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Approximately what percentage of applications for jobs are rejected by potential employers before the interview due to public information posted online by the applicant (e.g. social networking, blogs, media sites, etc. - that is, your online reputation)? A. 60% or more B. About 10% C. Less than 5% D. Less than 50% E. About 30%

A

As part of their Smart Campus research, what MIS researcher is using CatCard data (digital traces) to analytize students' routines and relationships to predict student retention, or their likelihood of returning to campus after their freshman year? A. Sudha Ram B. Jay Nunamaker C. Hsinchen Chen D. Joe Valacich

A

Signals used to send messages can be _______ or digital. A. analog B. rotary C. binary D. discrete

A

Using telepresence and online/distance learning are examples of using technology to produce what order sustainability effect? A. 2nd Order - Applications Alternatives B. 4th Order - Competitive Advantage C. 1st Order - Creation, Use and Disposal D. 3rd Order - Long term Structural Change

A

What term describes being able to access information and communication in almost any location? A. Ubiquity B. Localization C. Open Source D. Accessibility

A

What type of customer intimacy zone innovation focuses on making structural modifications to established products in order to create a distinctive sub-category? A. Line-Extension Innovation B. Value-engineering Innovation C. Marketing Innovation D. Enhancement Innovation E. Experiential Innovation

A

What type of decision based on explicit knowledge and involves analysis using an algortihm and measured data? *A. Quantitative B. Collaborative C. Managerial D. Operational E. Qualitative

A

In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does "http://" define? A. Domain B. Protocol C. Browser D. Resource E. Server

B

In the decision matrix example shown below, which of the answers would have the highest score for Project A? A. Affects other projects *B. Time to complete C. Financial gain D. Project cost

B

What term describes a way of solving problems and producing things by connecting online with people that you otherwise wouldn't know? A. Group Systems B. Crowdsourcing C. Knowledge Management D. Communities of Practice

B

Which of the following is *NOT* a behavioral issue for meetings? A. Domination *B. Wrong people C. Misunderstandings D. Hidden Agendas

B

Which of the following is the correct order of the traditional System Development Life Cycle (SDLC)? A. investigation, analysis, design, implementation, programming and testing, operation and maintenance B. investigation, analysis, design, programming and testing, implementation, operation and maintenance C. analysis, investigation, design, programming and testing, implementation, operation and maintenance D. analysis, investigation, design, implementation, programming and testing, operation and maintenance

B

Which of the following issues related to wireless communication would NOT be a problem for an RFID (Radio Frequency Identification) system? A. Attenuation B. Line-of-sight C. Multi-path D. Monitoring E. Interference

B

Which of the following terms are related to production based on the mass customization initiated by a customer's order? A. Forecast model B. Pull model C. Push model D. Make-to-stock model

B

Which of the following types of security risks would ben identified weakness in which necessary controls are not present or effective? A. Control *B. Vulnerability C. Exploit D. Attack E. Footprint

B

EPEAT Preformance Categories (e.g., Material section, Energy Conservation, and Packaging Waste) are examples of that order effect of environmental sustainability? A. 3rd Order - Long term Structural Change B. 2nd Order - Applications Alternatives C. 1st Order - Creation, Use and Disposal D. 4th Order - Competitive Advantage

C

Explicit, or "leaky" knowledge, is based on information that is: A. Customized by each user B. Subjective and cognitive *C. Objective and rational D. Dependent on an employee's experience E. Informally communicated with an organization

C

For ABP-1, your "ticker symbol" identifies what? A. The time of the last stock trade B. Your assigned Stock Exchange C. Your assigned Company D. Your project team?s Icon E. The due date for your project

C

Google Analytics tracks the browser used to access a website. What term was used to describe a website that manages content based on the browser or device accessing the content? A. Content Management System B. Ephemeral Content Design C. Responsive Web Design D. Website Transformation Process

C

Harald Blaatand, who was the King of Demark from 940-981, is associated with what wireless technology? A. Satellite Transmitters B. Microwave Transmitters C. Bluetooth Technology D. Computer Wifi E. Cellular Telephone Networks

C

IT changes managers' job by _________ A. decreasing the volume of information they have to process. B. improving an employee's sense of connectedness. C. providing near real-time information so managers can make quicker decisions. D. making it easier to get all employees to work from one location.

C

In a vertical cross-functional business process diagram, the order of items in one column (from top to bottom) shows what relationship among these item A. Importance B. Skill level C. Time D. Cost E. Frequency

C

In the four layer model of the IOT architecture developed by the UofA's Cloud and Autonomic Computer Center, environmental sustainability would be most closely related to what layer? A. Sensing and identification layer B. Network construction layer C. Integrated application layer D. Information processing layer

C

One of the origins of the Internet was the result of a project by US government agency? A. National Security Agency B. National Aeronautics and Space Administration C. Advanced Research Project Agency D. National Science Foundation

C

Planned, recurring expenses that occur on a routine schedule, such rent or car payments that must be paid every month, are examples of what? A. Deductions B. Discretionary expenses C. Fixed expenses D. Cash flow E. Flexible expenses

C

Related to the concepts of globalization, what computer "law" states that the density of transistors will double approximately every 18 months? A. Metcalf's Law B. Ohm's Law C. Moore's Law D. Kepler's Law E. Gilder's Law

C

The "Porter's Forces" model deals with what aspect of globalized business? A. Design B. Relationships C. Competition D. Time E. Location

C

What is the name used to describe when a person visits a brick-and-mortar store only to check physical characteristics of a product but intends to purchase the product online? A. Disintermediating B. Hybrid shopping *C. Showrooming D. Multiplexing

C

What is the purpose of a PERT chart? A. Review the Triple Constraint B. View the organizational structure of a company C. Schedule and organize tasks D. Find where Product Enhancement, Research, or Training is needed

C

Which of the following are similar actions in the DM, KCC, and GDSS cycles? A. Modeling, Document, Disseminate B. Data Evaluation, Capture, Document C. Problem Definition, Create, Brainstorm D. Data Evaluation, Manage, Organize

C

Which of the following is an informational role? A. Figurehead B. Entrepreneur C. Disseminator D. Disturbance handler

C

Robots are useful ___________. A. for driving cars (e.g. cyberchauffer) B. only in science fiction (e.g. Terminator) C. as companions (e.g. cyberpooches) D. for handling monotonous tasks (e.g. factory work)

D

Similar to trends in computing hardware, what is the trend for wireless network hardware? A. Less, but bigger network antennas B. Interference and attenuation are being eliminated C. Putting networks onto chips D. Virtualization and merging with the cloud E. Sensors that don't need batteries

D

The _________ prohibits an organization from collecting any personal information unless the customer specifically authorizes it. A. information privacy policy B. opt-out model of informed consent C. digital dossier policy D. opt-in model of informed consent

D

What type of chart essentially adds a third dimension, such as frequency or quantity, to scatter plots? A. Donut Charts B. Treemap Charts C. Stacked Area Charts D. Bubble Charts

D

Which of the following business component are *not* included in an MRP-II planning cycle? A. Workforce B. Plant and Equipment C. Raw Materials *D. Product Margins

D

Which of the following is a DISADVANTAGE of purchasing prewritten software? A. The company can try out the software before purchasing it. B. It may eliminate the need to hire personnel specifically dedicated to a project. C. The company can know what it is getting before it invests in the product. D. The software is controlled by another company.

D

A Cost-Benefit Analysis is related mostly to what type of project management feasibility assessment? *A. Economic B. Technical C. Operational D. Political E. Ethical

A

A feature of an object that limits possible (often incorrect) uses of a device is known as: A. A constraint B. A conceptual distinction C. A visible metaphor D. An affordance E. False causality

A

An entrepreneur developing detailed documentation of their business processes so that they can be offered to other individuals as a franchise operation is an example of: A. Converting tacit knowledge into explicit knowledge B. Creating a community of practice C. Converting explicit knowledge into tacit knowledge D. Dependent demand E. A time-delayed response

A

What type of guided media uses light for signaling? A. twisted pair *B. fiber optics C. open wire D. coaxial cable

B

A "Fishbone" process analysis diagram is also known as: A. A correlation graph B. A cause-and-effect diagram C. A numerical analysis diagram D. An organization chart E. A cross-functional flowchart

B

According to MIT Sloan Management Review, what percentage of companies have placed sustainability permanently on their management agendas? A. About 25% B. About 70% C. About 10% D. About 50%

B

According to the "IOT Changes Everything" video case, one of the challenges limiting the widespread deployment of IOT is the transitioning to IPv6. What is the value of using IPv6 to IOT? A. Lower power consumption for data communication B. Ability to uniquely address billions of IOT devices C. Defining a standard control protocol for all IOT devices D. Extended communication range for wireless communication

B

As I move farther away from campus, I notice that my UAWiFi connection gets progressively weaker. What factor will always cause this to occur? A. The signal blocked by strong encryption B. The signal strength is lost due to attenuation C. The signal cannot be received due to interference D. The signal is blocked due to right-of-way restrictions

B

The big advantage of bubble charts over scatter charts is? A. There is no advantage B. They add another dimension C. They allow negative values on the Y axis D. They are more colorful

B

The following "img" directive uses what type of addressing? <img src="file://C:/Users/Patton/Pictures/NistFigure2.PNG " width="2612" height="1746" alt="Security"/> A. Relative B. Absolute C. File D. Named

B

The terms "contextual," "relevant," and "actionable" are commonly related to what term? A. Information B. Knowledge C. Relationship D. Repository E. Alignment

B

Thomas Friedman was quoted as saying, "We're in the middle of 3 accelerations; the market, mother nature, and Moore's law. Moore's law says the power of microchips will double every 24 months, mother nature is climate change, biodiversity loss and population, and the market is digital globalization." What is Moore's Law? A. The effect of a telecommunications network is proportional to the square of the number of connected users of the system B. The number of transistors in a dense integrated circuit doubles about every two years C. The theoretical maximum information transfer rate of communicatiions channel D. The bandwidth of the internet grows at least three times faster than computer power

B

Using the Internet of Things to increase the efficiency of a company's operations by allowing it to track, in real time, the movement of raw materials and parts through the manufacturing process to finished products delivered to the customer is related to what business function? A. Cost accounting and financial management B. Supply chain management C. Social media marketing D. Lifecycle product sustainability

B

What is NOT a factor contributing to the Bullwhip Effect? A. Batch Purchasing *B. Outsourcing C. Forecasting/Trend Analysis D. Shortage Gaming E. Price Promotions

B

What is the name for the exchange points for Internet traffic used by major ISPs? A. MAC B. NAP C. TCP D. ISDN

B

What is the name of a highly popular crowdsourcing Internet marketplace enabling individuals and businesses (known as Requesters) to coordinate the use of human intelligence to perform tasks that computers are currently unable to do? A. Bing Collaborative Interpreter B. Amazon Mechanical Turk C. Azure Web Services D. Google Answers

B

What is the name of the criterion of intelligence where depends on the ability of a computer program to impersonate a human in a real-time written conversation with a human judge, sufficiently well that the judge is unable to distinguish reliably—on the basis of the conversational content alone—between the program and a real human? A. Augmented Reality B. Turing Test C. Ephemeral content D. Content sharing

B

What is the name of the device that of the physical device that interfaces computers with a local area network (LAN)? A. Transmission Control Protocol (TCP) B. Network Interface Card (NIC) C. Internet Service Provider (ISP) D. Peer-to-peer Processing (P2P)

B

What is the named used to describe daily spending decisions like eating at a restaurant, buying clothes, drinking Starbucks, or playing a round of golf? A. Intermittent *B. Discretionary C. Variable D. Fixed

B

According to the articles what technologies enable businesses and their employees to get in front of clients and customers but do it in a cost-savings manner?

C

According to the mythical man-month what is the reason adding people to a project will not speedup your project? A. Each increase in the staff requires a corresponding extension to the project due date B. Increased critical path milestones for the project C. Increased spending on personnel D. Increased complexity of interpersonal communications

D

Afirewall is a _______ control. A. virtual B. access C. physical D. communication

D

Allowing individuals to file tax returns, renew driver's licenses, and obtain various permits online is an example of what type of eGovernment? A. Government-to-business (G2B) B. Government-to-suppliers (G2S) C. Government-to-government (G2G) D. Government-to-citizen (G2C) E. Government-to-employees (G2E)

D

Although globalization has been underway for many centuries, digitization, networking, and connectiveness have dramatically increased what? A. Data Redundancy B. Number of "Olive Tree" products and services C. Revenue per Employee D. Pace of Change E. Worker Productivity

D

Although web users should have an unlimited amount of time to complete tasks on the web, this design goal must be balanced against what other issue? A. Communication Bandwidth B. Cost of Data Transmission C. Availability of Equipment D. Security and risk

D

An I^2 diagram helps identify opportunities that are "low hanging fruit". What does the term "low hanging fruit" mean in this context? A. Projects that correct major errors in the software B. Projects that will require significant effort, but are easily planned C. Projects that design new features requested by our customers *D. Projects that easy to do and also have a high value proposition

D

As discussed in class, what company was founded in the Globalization 2.0 era based on the business model of selling discontinued product lines directly to consumers by using a new transportation infrastructure to reach a geographically distributed customer base? A. Wal-Mart B. Overstock.com C. BigLots! D. Sears, Roebuck & Co. E. Ebay.com

D

Assume you need to put a sign that says "PUSH" on a door handle to explain the correct way to operate the door. The "PUSH" sign helps a user understand what aspect of usability? A. The sign explains a correct rejection B. The sign explains a consistent affordance C. The sign explains a perceptible affordance *D. The sign explains a false affordance E. The sign explains a hidden affordance

D

Assuming orders are currently being processed correctly, adding CPFAR inventory management practices would improve a company in all of the following ways except: A. Administrative overhead B. Process efficiency C. Process latency D. Process effectiveness

D

Business metrics that describe the performance of critical business activities are known as: A. Decision trees B. Residual risk assessments C. Business intelligence analyses D. Key performance indicators E. Business continuity plans

D

Concerns over using data to illegally discriminate against an individual or group, reaching wrong conclusions due to data contamination, and violating intellectual property (ownership of information) protections were legal and ethical issues discussed in relation to what topic discussed during this module? A. Crowdsourcing B. Project management C. Click-stream analysis D. Data mining E. Telemedicine

D

Customers _____________________ because of Web 2.0. A. are less empowered B. have seen no difference C. are generally confused D. are more empowered

D

Donut Charts are difficult to read, Microsoft recommends what as an alternative? A. Cake Charts B. Pie Charts C. Scatter Charts *D. Stacked Column or Bar Charts

D

Due to the curvature of the earth, microwave towers generally cannot be spaced more than about how many kilometers apart? A. 18 B. 30 C. 77 D. 48

D

Google's main business reason for installing fiber in select US cities is to _______. A. bring the internet to rural areas B. begin competing with the cable distribution giants C. give people an option other than the telecommunications companies who control existing cable networks D. generate more web traffic, which generates more ad revenue for them

D

IT allows the workplace to expand to 24 hours a day at _______________, which is a benefit for ___________. A. a central location; employers and employees B. a central location; only employees C. any location; only employers D. any location; employers and employees

D

If your sales system shows a customer's name as "Johnny Smith", but your logistics system for shipping shows the same customer as "John A. Smith", what type of database problem does this represent? A. Security B. Isolation C. Redundancy D. Inconsistency

D

In a relational database, what term refers to the collection of items that are all related to a single unique value, where the single value often serves as the primary key? A. A field B. A deposit C. A list *D. A record E. A form

D

As a possible password, how many variables would the password MIS111Exam (just the underlined string of characters) have when assessing its security strength? A. 2 B. 5 C. 1 D. 4 *E. 3

E

In Thomas Friedman's discussion of globalization, he described the process of globalization as being realized through actions that were first defined by your country, then later defined by multi-national companies, and finally, in the most recent age of globalization is defined by: A. Political parties B. International treaties C. Financial markets D. Social media *E. Individuals

E

With respect to a database, what term is used to describe an abstract representation of all of the information included in a data structure about a particular type of entity? A. Entity Key *B. Entity Class C. Entity Table D. Entity Attribute E. Entity Model

B

With respect to an individual, what term describes the process of managing one's earnings, savings, and debt to meet the actual and budgeted expenses? A. Expense Management B. Personal Finance C. Personal Accounting D. Risk Management E. Financial Literacy

B

_______________ is knowledge that has been codified or documented. A. Data B. Explicit knowledge C. Information D. Tacit knowledge

B

Applications such as "find a friend" (FourSquare), driving directions (Smartrek), roadside assistance (OnStar), and fleet management (UPS and FedEx) are all examples of services that have been enhanced by knowing what? *A. The location of the requester B. The age of the requester C. The time the request was made D. The identity of the requester E. The number of people making requests

A

Assume you are 22 years old when you graduate from the University of Arizona and have a credit card with a $2,000 credit balance with an 18% annual rate. If you only make minimum payments of 2% of the balance or just $10 (whichever is greater) each month, what birthday will you likely be be celebrating when the the credit card is paid off? A. 52 B. 37 C. 32 D. 27

A

Assume you are off campus and cannot connect to UAWiFi. Which of the following would be a secure alternative to access the campus network? A. Access any open wireless network, and then use a VPN to connect to campus B. Only login to systems using NetID+ C. UAWiFi is the only secure option to connect to campus D. Only use your smartphone's WiFi connection if you have to use an open wireless networks

A

COPLINK, developed at the University of Arizona in the MIS Department's Artificial Intelligence Lab, allows law enforcement officers to integrate database information to identify crime suspects based on limited information (e.g., a license plate number or nick name). What term is used to describe the type of information system that is commonly used to maintain collection of experiential, reflective and solutions-oriented information? A. Knowledge management B. Telepresence C. Group decision support sytems D. Spiderweb Mapping E. Crowdsourcing

A

Cisco uses the term "the power of in-person" to describe the ability of what technology to improve access to subject matter experts and to open doors to small business people? A. Telepresence B. Crowdsourcing C. Data Mining D. Knowledge Management

A

Converting all MIS 111 students from clickers to response cards without an initial test period is an example of what type of conversion? *A. Direct conversion B. Pilot conversion C. Phased conversion D. Primary conversion E. Parallel conversion

A

Data ___________ means all applications are able to access the same data, which is ___________ by databases. A. independence; maximized B. independence; minimized C. isolation; maximized D. isolation; minimized

A

Dr. Patton discussed the Hacking Google Glasses video case in class and talked about what it could be a precursor to something else getting hacked in the future. What did he say might be the next thing hacked using the same technique? A. Smart / Autonomous Cars B. IoT Toys and Devices C. Smart Phones D. Stop Light Control Systems

A

Dr. Patton discussed the Hacking Google Glasses video case in class and talked about what it could be a precursor to something else getting hacked in the future. What did he say might be the next thing hacked using the same technique? A. Smart / Autonomous Cars B. IoT Toys and Devices C. Smart Phones D. Stop Light Control Systems

A

If the search column for a VLOOKUP contains a duplicate value, which value will be returned? A. VLOOKUP will return a value based on the the first match B. VLOOKUP will return an error (#DUPLICATE), since the search column must be unique C. VLOOKUP will return both values D. VLOOKUP will return a value based on the the last match

A

In June of 2018, Exactis, a marketing and data aggregation firm, disclosed that the personal details of over 340,000,000 individuals and businesses had been compromised. What security failure caused this massive security breach? *A. A database was able to be accessed on a server open to the internet B. An disgruntled employee of Exactis copied the file after being fired C. Exactis sold a surplus computer and left information on the hard disk D. Unencrupted network traffic was monitored on a wireless network

A

In the Accenture video case, the presenter emphasizes that project managment is not about lists and linear relationships, but rather about managing what? A. Complex inter-relationships B. Crisis managment C. Client requirements D. Project costs

A

In the History of the Cell Phone video case, how did the use of cellular phones change the way in which calls were made? A. Instead of calling a place, calls to cellular telephones were associated with a person B. Calling a cellular telephone required the assistance of an operator C. Cellular telephones could only call telephones within the local calling area D. Cellular telephones improved the sound quality that customers experiences E. A new system of telephone numbers were required to call cellular phones

A

In the Ruby Tuesday's sales analysis case, analyzing historical data about the sales dimensions of products categories, sales regions, and months of the year would be best using which of the following approaches we've previously discussed? A. Data Cubes B. Visualization C. Communitites of Practice D. Knowledge Management

A

In the assigned reading, Don Norman makes the case for viewing conceptual models as what? A. A story in context B. Intentional design C. A set of possibilities D. Virtual space

A

In the assigned reading, Don Norman noted two critical issues with the original BMW iDrive design: the design failed to provide a good conceptual model (a story) and also what other problem? A. The iDrive destroyed spatiality B. The iDrive was not accessible C. The iDrive provided false affordances D. The iDrive was ergonomically difficult to use

A

Physical properties (shape, texture, color, etc.) of an object that allow someone to use an object correctly without the need for labels or instructions are known as: A. Affordances B. Constraints C. Feedback D. Models E. Distinctions

A

Put the following assets in order of increasing liquidity (least to most)* A. Cash, Inventory, Property & Plant B. Accounts Receivable, Cash, Property C. Property, Accounts Receivable, Cash D. Property, Cash, Accounts Receivable E. Cash, Property&plant, inventory

A

Related to the concepts of globalization, what computer "law" states that the bandwidth (speed) of data networks will double approximately every 24 months? A. Gilder's Law B. Moore's Law C. Ohm's Law D. Kepler's Law E. Metcalf's Law

A

Related to the concepts of globalization, what computer "law" states that value of the internet is related to the number of connections (users)? A. Metcalf's Law B. Gilder's Law C. Moore's Law D. Kepler's Law E. Ohm's Law

A

Select the answer below that orders the media correctly from the lowest to highest bandwith (data rates). A. Twisted pair, Coaxial Cable, Fiber-optic Cable B. Coaxial Cable, Twisted pair, Fiber-optic Cable C. Fiber-optic Cable, Coaxial Cable, Twisted pair D. Twisted pair, Fiber-optic Cable, Coaxial Cable

A

Select the answer the correctly orders the types of computer networks in terms of area span of coverage from largest to smallest? A. WAN, MAN, LAN, PAN B. WAN, LAN, PAN, MAN C. PAN, MAN, LAN, WAN D. PAN, LAN, MAN, WAN

A

Similiar to the expansion of telecommunications in the 1800's with the telegraph, what transportation infrastructure was discussed in class that guided the decision the placement of the long-haul fiber-optic cable infrastructure? A. Inter-continental Railroads Network B. Federal Interstate Highway System C. Inter-regional Transmission Electrical Power Lines D. Major Inland Rivers and Waterways

A

Subjective knowledge that is based an individual's experiences is known as what? A. Tacit knowledge B. Technical knowledge C. Explicit knowledge D. Procedural knowledge E. Refined knowledge

A

The "nearest neighbor" IS Strategy is similar to what DM method? A. Clustering B. Sequencing C. Classification D. Association

A

The _____________ approach states that an ethical action is the one that provides the most good or does the least harm. A. utilitarian B. common good C. fairness D. rights

A

The pattern of financial fraud undertaken by David Myers, MCI?s Controller, is a good example of what type of ethical situation? *A. Ethical Drift B. Gut Check C. Transparency Test D. Lost Opportunity E. Whistleblowing

A

The risk of a project can be measured on what two scales? A. Likelihood and Impact B. Vision and Goals C. Change and Control D. Budget and Management

A

The sequence of activities performed by users of GroupSystems' ThinkTank product directly parallel the steps in what other business process? *A. Knowledge management cycle B. Operational CRM C. Just-in-time Inventory Management D. Transaction processing system E. Economic globalization

A

The success of a Group Decision Support System (GDSS) is based upon two key features: contributor anonymity (i.e., the identity of the person making the comment or suggestion is not known), and what other important feature? A. Parallel Discussions B. Disintermediation C. Reintermiediation D. Analytical CRM E. Six Sigma

A

Training for the professional "Certified Public Accountant" certification generally focuses on which of the following? A. Tracking and reporting the financial transactions of a business, and reporting financial results to external stakeholders B. Measuring, interpreting, and communicating information to managers for the pursuit of an organization's goals C. The management of money, investments, and other financial instruments to fund the goals of the business

A

WebMD is a(n) _________ that allows doctors to ___________. A. expert; diagnose diseases B. ERP; perform long-distance surgery C. expert; perform long-distance surgery D. ERP; diagnose diseases

A

What British Scientist invented the World Wide Web in 1989 while working at CERN (European Organization for Nuclear Research) in 1989? A. Tim Berners-Lee B. Martin Cooper C. Harald Blatand D. Vint Cerf

A

What approach to knowledge management would best describe the Eller FlexLabs? A. Community of Practice B. Knowledge conversion C. Best Practices D. Knowledge FAQ

A

What common function do "HTTP", "TCP" and "IP" share? *A. They all define internet-based protocols B. They are abbreviations for physical media C. They are common computer viruses D. They all are data encryption methods E. They all are website domains

A

What common term was used with both human-computer interaction and In a database entity relationship diagram as a way of limiting choices by the user and also specifying the minimum and maximum possible values that may exist for a relationship between two entities, respectively? A. Constraint B. Diagram C. Attribute D. Relationship E. Entity Class

A

What does the "%20" represent in an HTML src attribute of a IMG tag? A. A Space Character B. A wildcard that matches any lowercase character C. An underscore character D. A repetition count (i.e., repeat the next character 20 times)

A

What is considered to be the high-capacity data transmission core of the Internet structure? *A. Tier 1 ISP B. Tier 3 ISP C. LAN D. NAP

A

What is the correct filename for your ABP-3A website? A. index.html B. index.www C. Index.html D. INDEX.HTML

A

What is the importance of the triple constraint? *A. Any changes to one constraint will likely affect the project outcome B. Security is the most important constraint C. You must funnel all resources into only one of the constraints D. Time, resources, and scope don't matter

A

What is the name for the path containing the minimum set of tasks that you must traverse in order to reach completion of your project on time? A. Critical Path B. Scope Triangle C. Mythical Man Month D. Project Plan

A

What is the name of software that allows publishing, editing, and modifying content from a central interface, providing procedures to manage workflow in a collaborative environment? *A. Content Management Systems B. Self-publishing Platforms C. Customer Relationship Management Systems D. Social Networking Systems

A

What name is used to describe results found when a search engine algorithm analyzes all the pages across the web in an unbiased way and reports the pages considered to contain the most relevant information for your search terms? *A. Organic B. Sponsored C. Adword D. Promoted

A

What would be the correct function to find the price of a Caffe Mocha, size Grande? A. =VLOOKUP(A14,$A$2:$D$10,3,FALSE) B. =VLOOKUP(A14,$B$2:$D$10,2,FALSE) C. =VLOOKUP($A$2:$D$10,A14,3,FALSE) D. =VLOOKUP(A14,$A$2:$D$10,"GRANDE",FALSE)

A

When applying for advanced standing in the Eller College of Management, the process of selecting your major would be best described as having what characteristics of a decision? A. Unstructured and Strategic B. Semi-structured and Operational C. Structured and Operational D. Structured and Management

A

Which of the following causes of the bullwhip effect is related to a trading partner intentionally sharing inaccurate information with a company's future inventory requirements? A. Shortage Gaming B. Outsourcing C. Forecasting/Trend Analysis D. Batch Purchasing E. Price Promotions

A

Which of the following security measures would be considered a "last line defense" for Information Security? A. Cryptography B. Intrusion Detection C. Access Control D. Firewall E. Security SDLC

A

Which of the following technologies we've discussed was described as a more environmentally friendly "best practice for communication" that could greatly benefit small businesses? A. Telepresence B. Knowledge Management C. Information Security D. Data Mining

A

Which type of website file contains software that's executed on the host before sending the results to the browser? *A. PHP B. HTML C. JavaScript D. JPG

A

[ChartingTool] What is the name of the Business Intelligence tool that is used for interactive analytics and data modeling? *A. Tableau B. R C. Qualtrics D. Python

A

[Linkages] When viewing the linkages among trading partners, which of the following is common for both upstream and downstream supply chains? A. Information B. Orders C. Products D. Payments

A

____________ means that users carry a device with them and can initiate a real-time contact with other systems from wherever they happen to be. A. Mobility B. Ubiquity C. Instant connectivity D. Broad reach

A

websites for their customers? A. All of the three reasons shown above B. Only the first two of the above reasons C. To capitalize on a larger base of potential customers D. The website is likely easier for all users to navigate E. To comply with ADA and Section 508 of the Rehabilitation Act

A

Before paying an invoice in the procurement process, the accounting team checks that the purchase order, the goods receipt document (bill-of-lading), and the vendor's invoice all match. What is the term that is used to describe this auditing process? A. Order fulfillment B. Three-way Match C. Batch processing D. Cross-department process

B

Besides sensors, radios, and chips, what is the value in the Internet of Things? A. Cheaper equipment costs B. Establishment of services on top of the connectivity C. Eliminates the need for a value proposition D. Companies that haven't failed E. Creating less data

B

Businesses like to use Virtual Private Networks for every reason except? A. Data from web-browsers may not be encrypted B. Virtual networks are faster than ordinary internet connections C. Data from applications other than web browsers may not be encrypted D. They have no control over the path data takes between business sites E. Virtual networks are cheaper than leased lines

B

Creating a business process that can be franchised is an example of what type of knowledge management conversion? A. Explicit to Tacit B. Tacit to Explicit C. Explicit to Explicit D. Tacit to Tacit

B

ERP address information silos by _____________. A. simplifying system creation *B. integrating functional areas C. correcting a lack of communication between TPSs D. reducing the amount of information presented

B

Excel uses what character to indicate a row or column reference is absolute addressing? A. = (Equal Sign) B. $ (US Dollar Sign) C. ! (Exclamation Point) D. & (Amphersand)

B

From Don Norman's perspective, what fatal flaw does the BMW iDrive (which he descibed as a well thought out, very logical, and sensible device) have with respect its human interface? A. The iDrive did not have a hierarchical menu structure B. The iDrive destroyed spatiality C. The iDrive used a confusing set of control knobs D. The iDrive only controlled the driving-related functions

B

GoldmanSachs] What term was coined by Goldman Sachs in 2001 to describe the fastest growing market economies? A. TICK B. BRIC C. EAGLES D. TIMP

B

In a decision matrix, a "weighting" allows what additional information to be included in the analysis? A. Order of analysis *B. Relative importance C. Number of employees on the project team D. Cost of capital

B

In the Personal Branding video case, which of the following online platforms was idenfied as being primarily a business networking tool? A. Facebook B. LinkedIn C. Amazon.com D. Wordpress E. Democratic voters who sometimes vote

B

In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does ".edu" define? A. Resource B. Domain C. Server D. Protocol E. Browser

B

In the decision support process, formulating a module to be evaluated and setting criteria for making a choice would occur during what phase of the decision making process? A. Intelligence Phase *B. Design Phase C. Choice Phase D. Operational Phase E. Functional Phase

B

In the video case about Dr. Chiu's Smartrek application, which of the following was not an incentive used to encourage driver participation? A. Ability to help the community B. Ability to find other people for carpooling C. Ability to earn prizes and gift D. Possibility of avoiding traffic congestion E. Ability to earn points for charity

B

Industry analytsts expect that 5th generation networks will be defined by three characterisitcs over 4th generation cellular networks. Which of the following would is not one of the expected changes? A. Reduced power consumption B. Reduced signal attenuation C. Low latency D. Improved transmission rates

B

Maintaining multiple copies of the same data in multiple information systems that can be independently updated commonly results in what information management problem? A. Data validation B. Data inconsistency C. Data compression D. Data devaluation E. Data isolation

B

Often presented visually on an executive dashboard, what type of report focuses attention on business processes whose performance falls outside the range of their defined KPI metrics? A. Ad hoc B. Exception C. Annual D. Drill-down E. Batch

B

On the balance sheet, total assets minus total liabilities must equal what? A. Market Value B. Owner's Equity C. Free Cash flow D. Stock price E. Dividends Paid

B

Operating unregulated WiFi networks, clickers, Bluetooth headsets, cordless telephones, and microwave ovens using the same 2.4GHz ISM frequency range in close proximity to one another might result in what problem? A. Multi-path B. Interference C. Right-of-way D. Line-of-sight E. Attenuation

B

Originally spun out of Stanford University as a research project, what big data tool started out by offering visualization techniques for exploring and analyzing relational databases and data cubes and has expanded to include Big Data research? A. VMware B. Tableau C. Oracle D. PowerBI

B

Paying Google to display marketing advertisements when a user searches for a specific Adword is most commonly associated with which of the following concepts? A. Pagerank B. SEM C. Organic D. SEO E. Hashtags

B

Tacit or "sticky" knowledge, is based on information that is: A. Easily communicated using cross-functional diagrams B. Subjective and cognitive C. Easily understood with little domain knowledge D. Objective and rational E. Described using algorithms and processes diagrams

B

Telepresence is a version of ____________. A. email B. videoconferencing C. a portal D. unified communication

B

Telepresence systems seamlessly integrate _____ and _____. A. sentiment analysis; contextual software B. contextual awareness; content management C. content awareness; hardware D. Ethernet; WiFi

B

The __________________ test proposes a scenario in which a man and a computer both pretend to be women or men, and a human interviewer has to identify which is the real human. A. Terminator B. Turing C. Google D. SkyNet

B

The ____________________ is a summary of information needs of the functional areas and of the organization as a whole. A. Application portfolio B. IT environment C. Objective of the IT function D. Mission

B

What low-power, non-directional wireless technology is used to create small personal area networks for cell phones and portable music players? A. Near-field Communication B. Bluetooth C. Radio Frequency Identification D. Cellular radio

B

What technology has been used for such diverse applications as healthcare, tracking lost pets, and toll collecting on highways? A. SCOR B. RFID C. CFAR D. MRP-II E. Infrared

B

What term does Google use to describe how important a website is based upon counting the number and quality of links to a page, using the underlying assumption is that more important websites are likely to receive more links from other websites? A. Website ROI B. Page rank C. Conversion rate D. Keyword density

B

What term is used to describe how telemedicine uses wireless transmission and receipt of data gathered from remote sensors to allow doctors can monitor patients and control medical equipment from a distance? A. Propagation B. Telemetry C. Attenuation D. Multiplexing

B

What term is used to describe the behavior where small changes in customer demand that result in large variations in raw material orders causing inefficiency in the supply chain? A. Reverse Auctions *B. Bullwhip effect C. Single-Minute Exchange of Dies (SMED) D. Supply Chain Operations Reference (SCOR) Model E. Just-In-Time Orders

B

What term is used to describe the conversion of tacit knowledge to explicit knowledge, so that the knowledge can be used in the organization by the staff? A. Knowledge Interpretation B. Knowledge Codification C. Knowledge Representation D. Knowledge Cycle

B

What term is used to describe the marketing analysis where two versions of a web page are compared to see which one gives a better conversion rate for similar visitors at the same time? A. PPC Marketing *B. A-B (or Split) Testing C. SEO Testing D. SEM Testing

B

What term refers to the process where two or more entities (individuals, teams, groups, or organizations) who work together to accomplish certain tasks, such as a work group or virtual team? A. Communities of Practice B. Collaboration C. Cross-function Teams D. Group Systems

B

What type of chart allows you to plot data using two y-axes and a shared x-axis, visualizing a correlation or the lack thereof between the two y-axes data sets? A. Box and Whisker Chart B. Dual Axis Chart C. Radar Chart D. Funnel Chart

B

What type of data mining analysis identifies patterns in the data based on demographic characteristics (e.g., age, gender, income, ethnicity, etc.)? A. Association B. Classification C. Sequencing D. Clustering

B

When Dr. Sudha Ram used CatCard data (digital traces) as part of her research to analyze students' routines and relationships to predict student retention. What knowledge management term would you use to classify the CatCard transactional data? A. Feasible data B. Explicit data C. Tacit data D. Sticky data

B

When a company purchases a high-value software package, how is the ownership of the software package represented on the company?s balance sheet? A. As owner equity B. As an asset C. It would not be listed D. As retained earnings E. As a liability

B

When classifying items on an I^2 diagram, we depend on individuals with domain knowledge and consultants about the items. When discussing knowlege management, what name did we use to describe an individual with domain knowledge? A. Franchisee *B. Subject-matter Expert C. Community of Practice D. Expert System

B

When deployed, the Irridium satellite telephone network was based on a constellation of 66 satellites. However, how many operational satellites were originally proposed for the original constellation? (Hint the name Irridum was selected due to this number.) A. 18 B. 77 C. 30 D. 48

B

When you use Google Drive to work on a document with a classmate, this is considered _________. A. teleconferencing *B. virtual collaboration C. crowdsourcing D. workflow

B

Which of the following was NOT described as one of the four innovation zones? A. Category Renewal Zone B. Disruptive Technology Zone C. Product Leadership ZoneProduct Leadership Zone D. Operational Excellence Zone E. Customer Intimacy Zone

B

Although Martha Stewart?s actions related to insider trading, she served prison time for what criminal acts? A. Accounting statement fraud to the SEC B. Financial embezzlement at Omnimedia C. Lying about her actions to the FBI D. Deceptive advertising practices E. Theft of corporate property

C

An unobstructed, straight line-of-sight path between a transmitter and receiver is required by which of the following high-speed, commercial wireless network technologies? A. Broadcast Radio B. 802.11 Wi-Fi C. Microwave D. Bluetooth E. 3G Cellular

C

Bandwidth is the transmission capacity of a network, stated in bits per second. Which of the following "laws" we've discussed determines the maximum bandwidth (signalling rate) of a given type of communication media (e.g., copper cable, fiber optic, etc.)? A. Metcalf's Law B. Gilder's Law C. Shannon's Law D. Moore's Law

C

Current information systems have evolved to focus on what role with respect to their services? A. Strategic B. Productivity C. Value creation D. Efficiency E. Effectiveness

C

Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project? A. The quality of the work performed during each major project milestone B. Whether project tasks have been organized in the most efficient order C. The project milestones and the order they are scheduled to be completed D. Whether the major project milestones are being completed on budget E. Individual work assignments for persons assigned to the project

C

Disclosing personal information such as your race, religion, sex, disabilities, and age on social media undermines what type of protections otherwise provided to you as a citizen in the United States? A. Personal credit eligibility laws B. Voter eligibility laws *C. Anti-discrimination laws D. Commercial driver's license eligbility laws E. Wage discrimination laws

C

During which phase of the website transformation process would the project team for developing perform content analysis, layout the website using wireframes, and define a consistent visual design? A. Production B. Training, Launch and Buildout C. Developing Site Structure D. Defining the Project E. Site and CMS Maintenance

C

For companies managing their supply chain business processes using CPFAR (Collaborative Planning, Forecasting and Replenishment), the process improvements over the traditional ordering process could be primarily considered as an improvement in which of the following? A. Feasibility B. Effectiveness C. Efficiency D. Agility E. Quality

C

IT has changed the manager's job in many ways. Which of the following is NOT the result of this change? A. Remote supervision B. Real-time information C. Easier to make a decision D. More information to address

C

In a packet-switched data communication network, which of the following is true: A. All packets always follow the shortest path (fewest hops) through the network B. All packets from a sender always arrive at the receiver in same order they were sent C. Packets can be lost or become corrupted between the sender and receiver D. All packets from a sender follow the same path through the network to the receiver E. The path packets follow in the network can never be changed if a data link fails

C

In addition to possessing contextual and relevant information, what other characteristic aspect does knowledge possess? A. It is an entity class B. It solves a structured problem C. It is actionable D . It is consistent E. It is always displayed visually

C

In order to get Excel to display the exact closing date for each month, you need to format the X-axis as: A. Fixed axis B. Special axis C. Text axis D. Continuous axis E. Date axis

C

In the assigned reading on accessibility, the authors note that while WCAG 1.0 focused on the techniques for accomplishing accessibility, WCAG 2.0 focused on what? A. Strategies to avoi lawsuits B. Designing tactile maps of websites C. Principles of accessibilities D. Economics of accessibility

C

In the decision process, problem identification and classification occur during which phase? A. Implementation B. Choice C. Intelligence D. Design

C

In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what common problem did his analogy using the postal service to email a page from a book have with sending TCP packets? A. The message might be illegible B. The message might be in the wrong language *C. The message might get lost and not delivered D. The message might get changed in route E. The message might not get sent

C

In the video case for Nestle, data-driven decisions were primarily based on visualizations of information from what source? A. Cost and Production Schedules B. Financial Performance Reports C. SocialMedia Platforms D. Investment Analyst Forecast

C

Information systems professionals understand business needs and analyze processes, methods and data to create customer-oriented solutions. The value proposition for MIS was described more briefly by Dr. Jay Nunamaker, Regents Professor and founding chair of the MIS Department, as a discipline focused on doing what for business? A. Programming B. Academic research *C. Solving real problems D. Marketing software E. Computer Design

C

Internet-enabled globalization does the following: A. Forces new suppliers to distribute products using traditional distribution networks B. Forces competitors to share sales information and product pricing C. Removes geography as a barrier to relationships D. Creates barriers that protect "olive tree" products

C

Keyword selection and density, image alt tags, and links to content are mostly commonly associated with which of the following concepts? A. PPC B. CPC C. SEO D. SEM E. ROI

C

LEED refers to the efficiency of? A. Cars B. Data Centers C. Buildings D. Aircraft E. Desktop Computers

C

One of the impacts of Globalization is the the Economics of Distance (Transportation Costs) has been replaced by what? A. Econonmies of Time B. Economies of Relationships C. Economies of Attention D. Econonmies of Margin Cost

C

Originally discussed by Dr. Gilliland, David Myers' (former controller of MCI/Worldcom) statement "I still don't know that one point when I started to cross the line...", is an example of how small, incremental repeated compounding of unethical decisions can result in what? A. Gut check B. Defining moment C. Ethical drift D. Whistleblowing E. Transparency test

C

Parking garage passes and access control on employee ID badges are examples of: A. 4G / cellular B. Bluetooth C. RFID D. LEO

C

Pioneered at the University of Arizona, what decision support technology as developed to address problems such as a lack of focus, fear of speaking, hidden agendas and misunderstandings then collaborating with others? A. Executive Dashboard B. Data Mining C. Group Decision Support Systems D. Communities of practice E. Crowdsourcing

C

The Internet of Things can be described as three "any"-type connections. What are these three "any" connections? A. Any price, any person, any network B. Any place, any person, any industry C. Any time, any place, any thing D. Any time, any place, any network

C

The difference between =vlookup() and =hlookup() is what? A. in vlookup the third variable specifies the row while in hlookup it specifies the column B. They perform the same function and are just alternative spellings C. each record in a vlookup is in a row, and in hlookup is in a column D. each record in a vlookup is in a column, and in hlookup is in a row

C

The old accounting maxim of "promise low" and "deliver high" is related what costing and budget concept? A. Consistency B. Accruals C. Prudence D. Variance

C

Weak passwords are a(n) ___________ threat. A. software B. outside *C. employee D. hardware

C

What Center in the Eller College of Management has the mission to help students improve their potential and advance society by developing an entrepreneurial and innovative mindset? A. Eller Center Executive Education B. Center for Mangement Innovations in Healthcare *C. McGuire Center for Entrepreneurship D. Economic + Business Research Center

C

What IoT technology discussed in class could be used to identify shoppers and allow products to "introduce" (recommend) themselves to a shopper? A. Geotagging B. Crowdsourcing C. RFID Tags D. Folksonomies E. Product Metadata

C

What Leadership in Energy and Environmental Design (LEED) certification was the building where our classroom is located, Environment and Natural Resources 2, awarded by the U.S. Green Building Council? A. Certified B. Silver C. Platinum D. Gold

C

What Regents Professor on the MIS Faculty at the University of Arizona developed the COPLINK system for managing knowledge used in law enforcement? A. Jay Nunamaker B. Sudha Ram C. Hsinchun Chen D. Joe Valacich

C

What are the equivalent concepts in Excel to the following database terms: Field, Record, and a Table, respectively? A. Cell, Range, Worksheet B. Reference, Slice, Workbook C. Cell, Row, Worksheet D. Formula, Worksheet, Workbook

C

What category of location-based services would best describe products such as "location-based gaming", "social networking," and "find a friend"? A. Personal Security B. Social Networking C. Entertainment D. Information Services E. Mobile Resource Management

C

What inventory strategy allows a company's supplier to monitor inventory levels and manage the replenishment process for the supplier's products? A. Bullwhip delivery B. Tier-1 Suppliers C. VMI D. Push Manufacturing

C

What is NOT a benefit of telemedicine? A. It improves access to healthcare B. It reduces the need to move the patient C. It requires traveling so doctors can see their patients in person D. It provides real-time care to isolated areas

C

What is NOT an advantage of digital transmission? A. Produces fewer errors B. Simpler to integrate voice, video, and data C. Harder to encrypt D. Permits higher maximum transmission rates

C

What is an example of something in the Integrated Application layer of the 4 Layer Model? A. GPS B. Data center C. Smart transport D. Search engine

C

What is the name of the system used by Raytheon that allows technical blueprints to come to life so engineers engineers and customers can make quick changes to technical specifications and adjust equipment according to their needs using the "the common language of visualization." A. Glip B. Jive C. CAVE D. Slack

C

What is the name of the wireless technology that is designed to be embedded in mobile devices such as cell phones and credit cards allowing you to pay for items by waving your card within a few centimeters of a point-of-sale terminal? A. Personal Area Networks B. Bluetooth C. Near-field Communication D. MiFi

C

What is used to determe how long an investment will take to double, given a fixed annual rate of interest, allowing investors to get a rough estimate of how many years it will take for the initial investment to duplicate itself. A. Rule of 18 B. 28/36 Rule C. Rule of 72 D. 2% Rule

C

What network security control prevents information from moving between two networks? A. Biometric Identification B. Packet Sniffer C. Firewall D. Post Scanner

C

What phrase is used to describe the current and developing environment in which disruptive technologies and trends such as the Internet of Things (IoT), robotics, virtual reality (VR) and artificial intelligence (AI) are changing the way we live and work? A. Future Shock B. Post-Industrial Society *C. Fourth Industrial Revolution D. Economic Globalization

C

What technology do companies use to make the links between connection between two corporate intranets more secure? A. SCOR B. VMI *C. VPN D. CPFAR

C

What term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding? A. Emotional design B. Design Intention C. Conceptual model D. Semiotic Engineering

C

What term is used to compare the number of closed sales to the the total number of website visitors? For example, if an ecommerce site receives 200 visitors in a month and has 50 sales, this term would be calcuated as 50 (sales) divided by 200 (visits), or 25%. Fall 2018 Revised 7 Dec 18 Page 77 of 115 MIS 111 - Final Exam Study Guide A. Pay-per-click rate B. Adword ROI C. Conversion rate D. SEM (Search engine marketing) rate

C

What term is used to describe a physical interface between peripheral devices and the computer? A. App B. Signal C. Port D. Session

C

What term is used to describe an individual who was born after the widespread adoption of digital technology and have grown up using technology like the Internet, computers and mobile devices? A. Digital Immigrants B. Millennial C. Digital Native D. Online Generation

C

What term is used to describe an online advertising service developed by Google, where advertisers pay to display advertising, product listings, and video content as a result of Google search. A. Hashtags B. Responsive C. . Adwords D. Pagerank E. Organic

C

What term is used to describe paid-for product ratings and reviews? A. Customer reviews B. Expert reviews C. Sponsored reviews D. Conversational marketing

C

What term is used to describe the percentage value of the number of times a keyword or key phrase appears on a webpage as compared to the total amount of words on the page? A. Page rank B. Conversion rate *C. Keyword density D. Website ROI

C

What term is used to describe the very common tendancy for projects to accumulate new functionality to fulfil the requirements of project stakeholders? A. Quality Triangle B. Critical Path C. Scope Creep D. Change Management

C

What term was coined by Eli Pariser to describe a personalized search in which a website algorithm predicts what information a user would like to see based on user location and past searches on the website? Fall 2018 Revised 7 Dec 18 Page 86 of 115 MIS 111 - Final Exam Study Guide A. Social marketplace B. Shopping community C. Filter bubble D. Conversational marketing

C

What the name of the undergraduate certificate offered through the McGuire Center for Entrepreneurship that provides Eller undergraduate students with the opportunity to apply their knowledge and skill sets in real-world environments in order to make your community a better place to live and work as well as having a positive social impact? A. Small Business Certificate Program B. Certificate in Entrepreneurship and New Venture Development C. Eller Social Innovation (ESI) Certificate D. Nonprofit Leadership Certificate

C

What type of inventory management systems deliver the precise number of parts, called work-in-process inventory, to be assembled into a finished product at precisely the right time? A. SCOR B. Poke-Yoke C. JIT D. Vertical

C

What type of security activity provides guidance to people who are tasked with resuming business operations after a major disaster, such as building fire, earthquake, or flood, occurs? A. Risk acceptance B. Supervisory control and data acquisition C. Business continunity D. Certificate authority

C

When describing the invention of the cell phone, who said "For the first time, you were calling a person, not a place..."? A. Eli Pariser B. Norman Abramson *C. Martin Cooper D. Thomas Friedman

C

When we discussed the design of network infrastructure, we noted that the design of connectors on computers we generally related to the speed of the communication interface, the function being supported (number of signals required), and what other issue related to human-computer interaction? A. Hidden affordances for security B. Operational and functional causality *C. Constraints to improve reliability D. Cultural design standards

C

Which company used software to disrupt the previous market-leading companies in the book industry? A. Books-a-Million B. Walmart C. Amazon D. Barnes and Noble

C

Which of Thomas Freidman's "flattners" related to technologies related to how content can be digitized and therefore shaped, manipulated, and transmitted; how processes can be done at high speed with total ease; and how mobile can be done anywhere and anytime by anyone; and can be done by anyone? A. Uploading B. Informing C. "The Steriods" D. Supply-chaining

C

Which of the following factors related to the bullwhip effect was due to deception between two trading partners? A. Forecasting and Trend analysis B. Price promotion C. Shortage gaming D. Batch purchasing

C

Which of the following is NOT a value-adding attribute of mobile computing? A. Instant connectivity B. Localization C. Bandwidth improvement D. Ubiquity

C

Which of the following types of analysis would be used to produce the Clery report, which is a public annual security report (ASR) that includes statistics of campus crime for the preceding 3 calendar years identifying the crimes committed in physical (geographic) proximity to a college campus as an effort to improve campus safety? A. Sequencing B. Classification C. Cluster D. Forecasting

C

Which of these is NOT enumerated as a Motivation to Create Accessible Web Content? A. To capitalize on the a wider audience or consumer base (marketing or economic-centered motivations) B. To avoid lawsuits and/or bad press (public relations and punishment-centered motivations) C. To improve the reliability of technical functionality (technology centered motivations) D. To improve the lives of people with disabilities (human-centered motivations)

C

Who said the following quote "You can't use up creativity. The more you use, the more you have." A. Albert Einstein B. Thomas Edison C. Maya Angelou D. Linus Pauling

C

[ERPModules] Which of the following is typically not considered a "core" ERP module? A. Financial B. Human Resources *C. E-Business D. Operations

C

_________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information. A. Competitive intelligence B. Espionage C. Information extortion D. Intellectual property

C

______________ is the right to be left alone and to be free of unreasonable personal intrusions. A. Profiling B. Information privacy C. Privacy D. A digital dossier

C

In recognizing ethical situations, which of the following is related to a chemical reaction that occurs in your body, specifically your intestinal track? A. Taste check B. Transparency test C. Ethical drift D. Gut check E. Gut punch

D

In the NASA project management video case, what did the speaker indicate was the greatest risk he faced in managing projects for NASA? A. Cost overruns B. Technology failues C. Lack of individuals with technical expertise D. Social and political risk

D

In the case study presented in class, Nestle's Digital Acceleration Team training program focuses on developing skills in all of the following business issues, except: A. Engaging B. Listening C. Inspiring and Transforming D. Validating

D

In the video case about Transmission Control Protocol (TCP), Vint Cerf described TCP using an analogy of the sending postcard through the US postal system. Which of the following was not an issue discussed in the case study? A. That the sender would know when to retransmit packets based on receiving a message from the receiver B. That packets could arrive out of sequence C. That packets could be lost during transmission D. The cost of sending the packets making up a message

D

Porters five forces focuses on what part of competition? A. The Business Supply Chain B. The Five Core Business Functional Areas C. The Five Core Internal Processes of a Business D. The Business Environment

D

Purchasing an entire box of screws, even though only a small number are need for the master production schedule is an example of making a purchasing decision based on what approach? A. Fixed order quantity B. Lot-for-Lot C. Independent Demand *D. Economic Order Quantity

D

Since our firm's sales are cyclical, we adjust the commissions of our sales team sales each quarter. What HLOOKUP function would be used to determine the correct commission rate for March 15th, as shown below? A. =HLOOKUP(C5,C2:F3,3,TRUE) B. =HLOOKUP(C5,C2:F3,2,FALSE) C. =HLOOKUP("Rate",C2:F3,C5,TRUE) *D. =HLOOKUP(C5,C2:F3,2,TRUE)

D

The University of Arizona is nationally recognized for sustainability in its academics, research, operations, and administration by the Assocation for the Advancement of Sustainability in Higher Education. What Sustainability Tracking, Assessment & Rating SystemTM (STARS) rating was the University of Arizona awarded in 2017? A. Bronze B. Silver C. Platinum *D. Gold

D

The advantage of ________________ is they can be read over greater distances. A. WSNs B. QR codes C. Passive RFID tags D. Active RFID tags

D

The equity on a company's balance sheet is most closely related to which of the following? A. Gross margin B. Operating income C. Share price D. Book value E. Market value

D

The three security challenges of wireless communication are confidentiality, accessibility, and _____. A. incorporation B. importance C. Internet D. integrity

D

Tracking what products are delivered to users, and when, is a form of what? A. Scheduling Control B. Acceptance Control C. Maintenance Control D. Release Control

D

What Data Mining method is similar to the approach used by IS Case-based reasoning? A. Classification B. Forecasting C. Clustering D. Association

D

What accounting metric a strong indicator of whether a firm has sufficient short-term assets to cover its immediate liabilities? A. Price to earning ratio B. Current ratio C. Earning per common share D. Acid Test

D

What collaboration tool was discussed in class that enhances the participants' contextual awareness by sharing non-verbal information during meetings? A. Twitter B. Crowdsourcing C. Teleportation D. Telepresence E. Six Sigma

D

What information systems standard allows trading partners to move routine documents, such as purchasing orders, using standard data formats as messages over the Internet. A. Answer Choice A B. Answer Choice C C. Answer Choice D *D. Answer Choice B

D

What is an affordance? A. Safety of users and of data B. Being able to pay for something C. How well the user likes the interface D. Physical property of an object that shows functionality

D

What is the collective name for a set of open source programs and procedures, such as MapReduce and Yarn, that commonly provide the "backbone" of their big data operations? A. Cognos B. Sybase C. Terradata D. Hadoop

D

What is the name of the University of Arizona's primary career management tool that offers UA students and alumni access to jobs, internships, and a range of other services? A. eSMS B. D2L C. UAccess D. Handshake

D

What is the name of the directory where the files for your websites for ABP-3A and ABP- 3B will be stored on the U.Arizona.Edu web server? A. www_html B. index_html C. public.html *D. public_html

D

What is the term used to describe a graphical description of a database that describes the way in which an organization's data and business activities are associated with one another? A. A Model of Efficiency B. An Enterprise Resource Design C. An Artificial Database Scheme D. An Entity Relationship Diagram E. A Throughput Analysis

D

What normative ethical theory expects a corporation to create more value to society that it consumes? A. Value Chain Theory B. Stakeholder Theory C. Stockholder Theory D. Social Contract Theory E. Return on Investment Theory

D

What normative theory of ethics focuses on the belief that manager's actions should be guided by the understanding that they are entrusted with a responsibility to manage and protect the assets of the company for the benefit of all of those who the actions of the firm affect? A. Social Contract B. Organizational C. Stockholder D. Stakeholder E. Loyalty

D

What short-range wireless technology is commonly to connect smartphones with hands- free headsets for telephone calls and listening to music? A. WiMax B. Photon C. Spectrum D. Bluetooth E. Wavelength

D

Who was the founding director of the Arizona Telemedicine Program? A. John Po, M.D., Ph.D. B. Ana Maria Lopez, M.D., M.P.H. C. Richard A. McNeely, M.A. D. Ronald S. Weinstein, M.D.

D

What technique has been used by companies such as Starbucks and Netflix used to engage large numbers of non-employees to innovate, manage, design and market new products? A. Click-stream analysis B. Executive dashboards C. Capacity planning D. Crowdsourcing E. Six Sigma

D

What term best describes when consumers are able to use their smartphones to obtain information about a company's competitor's product pricing, features, customer reviews and availability while shopping in their company's brink-and mortar store? A. Accessibility B. Multi-path C. Crucial distinctions *D. Information transparency E. Interference

D

What term describes individuals with tactic knowledge about a particular domain? A. Community Leaders B. Knowledge Guides C. Expert Systems D. Subject-matter Experts

D

What term is used to describe the printable, one-time use codes you can generate for NetID+ authentication that are useful when traveling, when cell phone carriers may charge additional fees for calls and texts, or when you do not have access to your primary authentication device? A. YubiKey passcode B. Lifeline codes C. SMS passcodes D. Bypass codes

D

What term is used to describe the set of tasks that must be completed as scheduled in order to ensure the delivery of your project on time? A. Scope Creep B. Change Management C. Quality Triangle D. Critical Path

D

What tool is commonly used to track how, when and from what location users are using website? A. Project Management B. Wire Frame Design C. Content Management *D. Google Analytics

D

What type of data mining presents information graphically so that users are able to identify patterns in the underlying data? A. Nearest-neighbor Techniques B. Case-based Reasoning C. Neural Networks D. Data Visualization E. Rule Induction

D

What type of electronic commerce helps shoppers connect with one another based on tastes, location, age, gender, and other selected attributes allowing them to share information using voting, comments, discussions, and reviews focused on shopping? A. Crowdsourcing B. Business value chains C. Globalization D. Social shopping

D

What was the name of the legislation adopted by the European Parliament that mandated that all countries within the EU must setup laws requiring websites to obtain informed consent before they can store or retrieve information on a visitor's computer or web-enabled device. A. EU General Data Protection Regulation B. EU Cybersecurity Act C. EU Data Protection Directive *D. EU Cookie Law

D

When adding your icon to your ABP-3B website, what section should you add the link directive to your icon file? A. ALT B. HTML C. BODY D. HEAD

D

When analyzing the performance of students in MIS 111 on Exam 1, which of the following would not be appropriate as a useful "dimension" in an OLAP data cube? A. Class section B. Class standing C. Academic major D. Individual email addresses

D

When displaying a webpage, such as http://www.u.arizona.edu/~wilbur, what is the name of the directory the web browser will check in the "wilbur" account for the "index.html" website? A. The "wilbur" directory B. The "home" directory C. The "www" directory D. The "public_html" directory

D

When the DNC was targeting voters using their data-driven approach, which of these voting groups were the most appropriate to target? (This question is from the online lecture) A. Republican voters B. Democratic voters who never vote C. Democratic voters who always vote *D. Democratic and swing voters who sometimes vote

D

When you check your credit score for incorrect information, you're responding to which of the "4 V's" discussed for "big data" in the financial reporting business sector? A. Velocity B. Volume C. Variety D. Veracity

D

Which of the following decisions would *not* be a quantitative decision? A. Approving a person's loan based on total debt and their age B. Price-to-Earnings Stock Analysis C. Return on Investment Analysis D. Comparing project objectives with corporate objectives

D

Which of the following is FALSE of social computing? A. It combines social behavior and IT to create value. B. It focuses on improving collaboration. C. It encourages user-generated content. D. It allows social information to remain anonymous.

D

Which of the following is TRUE? A. IT can eliminate any job. B. IT only helps improve employees' health and safety. C. IT opens up jobs for middle managers. *D. IT impacts entire industries.

D

Which of the following is generally NOT commonly used as a biometric identification? A. Retinal Pattern B. Facial geometry C. Fingerprint D. Signature

D

Which of the following is the technology that enables most mobile wallet applications? A. VRP B. ERP C. AFC *D. NFC

D

Which of the following knowledge management concepts includes an organizational culture focused on problem solving, a desire to share knowledge because of mutual interest, and norms that build trust, such as might be found in an MIS 111 FlexLab? A. Knowledge management cycle B. Click-stream analysis C. Intellectual capital community D. Community of practice E. Best practices community

D

Which of the following supply chain technologies eliminates the need for a company to implement the "3-way match" process? A. Lean Manufacturing B. SCOR C. Six Sigma D. CPFAR

D

Which of the following technologies would *not* require line-of-sight scanning? A. QR Code Tags B. Price Label Tags C. Bar Code Tags D. RFID Tags

D

Which of the following types of access controls would be a person?s unique identifier within the security domain, such as Name, SSN, Employee ID? A. Accountability B. Non-repudiation C. Authorization D. Identification E. Authentication

D

Which of the following types of security risks would be technique used to compromise a system? A. Control B. Footprint C. Vulnerability D. Exploit E. Attack

D

Which of the project management documents includes all three of the triple constraints that are in the Scope Triangle? A. Hierarchical Diagram B. Spiderweb Diagram C. Cross-functional Diagram D. Gantt Chart E. PERT Chart

D

[Disintermediation] What term is describes the conflict when manufacturers (brands) disintermediate their channel partners, such as distributors, retailers, dealers, and sales representatives, by selling their products directly to consumers through general marketing methods and/or over the Internet. A. Globalization B. Porter's Forces C. Balance of Trade D. Channel Conflict

D

[RelativeSize] What type of chart would be show the values of individual components proportional to a whole, allowing you to easily know relative size of a component, such as might be done to analyze the allocation of expenditures in a budget? A. Bar Chart B. Line Chart C. Bubble Chart D. Pie Chart

D

[Systems] What term is used to describe interorganizational ERP systems that provide web-enabled links among a company's key business systems—such as inventory and production—and its customers, suppliers, distributors, and other relevant parties? A. MRP B. ERP C. MRP-II D. ERP-II

D

___________ support analysis of data about a business unit or company division, whereas ____________ support analysis of entire organizations. A. Data marts; data dictionaries B. Data warehouses; data marts C. Data warehouses; data dictionaries D. Data marts; data warehouses

D

______________ is the process of forming a digital dossier. A. Information privacy B. Privacy C. Dossiering D. Profiling

D

______________ refers to determining who is responsible for actions that were taken. A. Liability B. Responsibility C. Acceptance D. Accountability

D

________________ allows you to access the internet through a coaxial media previously used only for TV connections. A. ADSL Modem B. Dial-up modem C. SONET Modem D. Cable modem

D

All of the symbols representing tasks and decisions that are shown in single column of a vertical cross-functional diagram are related to the same what? A. Root Cause B. Organization C. Entity D. Decision Model E. Actor

E

In the Jack Welch Video Case in the SCM Lecture, What approach was he discussing as key to providing customer value? A. the SCOR Model - the Supply Chain Operations Reference Model B. CPFAR - Collaborative Planning, Forecasting And Replenishment C. Total Quality Management D. Lean Manufacturing, using JIT and SMED *E. Six Sigma

E

In the Online Democracy model, the "Voter Activation Network" uses voter registration rolls to categorize voters as always/sometimes/never voting by using information obtained from: A. Private sector polling B. Online media C. Partisan political organizations D. Commercially-generated databases E. Government records

E

In the Software Development Lifecycle Process (SDLC), in what SDLC stage is it the most costly to make changes to the system requirements A. Systems Implementation B. Systems Design C. Systems Testing D. Systems Programming E. Systems Operation and Maintenance

E

Making the Adobe Creative Cloud is now available to UofA students. What approach for software acquisition did the UoA used to allow students to have access to this software? A. Government Seizure (Right of Eminent Domain) B. Buy (Ownership of Intellectual Property) C. In-House Development (Writing Software) D. Open Source (Non-proprietary software) E. Lease (Right to Use Product)

E

Market capitalization is determined by multiplying the stock price by what? A. Profits earned from direct operations B. Year-end Earnings, minus taxes and interest C. Dividends paid during the last fiscal year D. Book value of the company E. Number of common shares outstanding

E

Pie charts have several limitations, including all of the following except? A. They cannot show negative values B. They can only show one series C. When two or more items are close in value it can be hard to determine which is larger D. Values near zero may not show up and be hidden E. They have limited color and don't draw the eye and attention

E

Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control? A. Social Contract B. Just-In-Time C. Bullwhip effect D. Disintermediation E. Defense in depth

E

Satellites used for data communications that appear to be stationary from a fixed location on earth are placed in what type of orbit? A. Mid-earth orbit B. Commercial orbit C. Elliptical orbit D. Polar orbit E. Geosynchronous orbit

E

Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? A. Defense in Depth B. Advanced Persistent Threats C. Industrial Sabotage D. Open Source Hacking E. Social Engineering

E

Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? A. Open Source Hacking B. Defense in Depth C. Industrial Sabotage D. Advanced Persistent Threats *E. Social Engineering

E

The task of brainstorming in a group decision support system is similar to what step in the knowledge management cycle? A. Refine B. Publish C. Disseminate D. Store E. Create

E

What action did Stacy Snyder take that resulted in her losing her job? A. Undertaking accounting fraud at her company B. Hacking the AP Twitter feed and posting a fraudulent message C. Being a whistle-blower and reporting the illegal actions of her employer D. Infecting her company's network computer with a virus while using Facebook at work E. Posting a photo of herself at a party on her personal social media account

E

What dimension of Porter's Forces focuses on the decision that a buyer makes when choosing among direct, existing competitors when all of the competitors offer the same identical name-brand product (e.g., an iPhone 6)? A. Threat of Substitution B. Buyer power C. Threat of New Entrants D. Supplier power E. Industry Rivalry

E

What is the term used to describe the process of reducing the number of dimensions of a multi-dimensional data cube (e.g., from three dimensions, perhaps season, location, and product, into two dimensions, such as season and location)? A. Variable B. Context C. Function D. Simplification *E. Projection

E

What term describes the ability of a person to effectively evaluate and manage one's finances in order to make prudent decisions toward reaching life's goals? A. Personal Accounting B. Risk Management C. Household Finance D. Expense Management E. Financial Literacy

E

What type of innovations are intended to be incompatible with existing standards and value chain, and must develop markets de novo (latin for "from the beginning")? A. Platform Innovation B. Profit Innovation C. Product Innovation D. Application Innovation E. Disruptive Innovation

E

When major airlines (American, Delta, United, etc.) bypass travel agents and directly market tickets to customers from the airline's corporate website, this is an example of using what type of business sales strategy? A. Crowdsourcing B. Communities of Practice C. Group Systems D. Reintermediation E. Disintermediation

E

Which of the following actions would be considered a biometric authentication? A. Requiring a user to sign their signature B. Requiring a user to enter a secret password C. Requiring a user to type a group of displayed letters D. Requiring a user to swipe a CatCard E. Requiring a user to scan their fingerprint

E

Which of the following does a Fishbone Diagram typically not inform you about a problem? A. Identifies the major categories of a problem B. Identifies many of the root causes of problems C. Helps guide the process improvement process D. Organizes the problems associated with a process by the major categories E. The cost of correcting a problem with a process

E

Which of the information layers in the Internet of Things model focuses on the communication networks that connect the sensors that actually collect the data? A. Metadata Layer B. Generation Layer C. Application Layer D. Processing Layer E. Transmission Layer

E

With respect to Porter's Forces, which of the five factors would have be the LEAST (weakest) impact on Starbuck's business model? A. Competitive rivalry B. Bargaining power of buyers (its customers) C. Threat of substitutes D. Threat of new entrants *E. Bargaining power of suppliers

E

Your username (UANetID) is your claim of identify to a computer system. When the computer system verifies your identify by requiring you to enter a password is an example of what type of authentication? A. Something a user inherits B. Something a user has C. Something a user is D. Something a user does E. Something a user knows

E


Ensembles d'études connexes

Chapter 37: Drugs Therapy for Peptic Ulcer Disease and Hyperacidity

View Set

NU371 Week 8 PrepU: Sexually Transmitted Infections (STIs)

View Set

Public Speaking Review Questions Chapters 10, 11, 13,14,15

View Set

APHG Semester Bellringers Unit 1-5

View Set

FTC1 Macro Ch 7 "CPI & Cost of Living..."

View Set