MIS 111
What term is used to describe a regulatory approach requiring that internet service providers (ISPs), including cable companies like Time Warner and wireless providers like Sprint, should treat all internet traffic equally?
Network neutrality
According to Dr. Jay Nunamaker, Regents Professor and Founding Chair, UofA MIS Dept., what do information Systems professionals really do?
"Solves Real Problems for Real People"
Which of the following goals was NOT part of the Democratic National Committee's (DNC's) 2008 Election Strategy to increase voter participation in all 50 states?
Identify and Motivate voters supporting Republican party ideals
Where can you find your assigned company's "ticker symbol"?
In your gradebook on the MIS 111 course page
When off campus, using a VPN when accessing campus information systems affords all of the following advantages except:
Increases the speed of your broadband connection to the internet
What type of voters are targeted primarily by a Get-Out-The-Vote (GOTV) campaign strategy?
Individuals who always vote for our party, but don't always vote in an election
What ethical framework is based on the tenant "If an action is not right for everyone to take, it is not right for anyone"?
Kant's Categorical Imperative
What term is used to describe the process of personalizing information provided to citizens based on their geographic location or interests?
Localization
With respect to ythe grading of your ABP-1 project report, all of the following major errors have a 20-point grading deducation, except:
Not submitting your project report as a PDF file
In Excel, a date, such as 2/1/2022, is represented internally by Excel as:
Numeric Value
Which of the following is NOT a correct statement about the UArizona WiFi wireless network system?
Open access wireless network availabe to guests when on the UArizona campus
What type of feasibility constraint assesses whether we understand the business process?
Operational
Which of the following was NOT discussed as one of the factors that are required in order for deterrents relating to unethical behavior relating to cheating at academic institutions to be effective?
People must feel shame knowing their actions will be exposed to their peers publically
According to our class on "Information System's Impact on Organizations and Society", MIS Integrates what three key dimensions in its Design Perspective?
People, Process, and Technology
Which of the following terms was NOT described as a desirable outcome of a E-Government strategy by the OMB?
Profiting
As described in the "Democracies Online", which of the following would NOT be a considered as aspect associated "Political Organizations"?
Provide User Connectivity, Increase Bandwidth, Lower Costs, and Bring More Users
In the Video Case "Thoughtful Design" what is the most important factor to know when figuring out which shaker has salt and which has pepper?
What the person who filled the shaker thinks about which belongs in which shaker
Rear Admiral Grace Murray Hopper was a pioneer of computer programming the first to devise the theory of machine-independent programming languages. She also noted the first actual computer bug in 1945, what was the bug?
a moth stuck between the contacts of a mechanical relay in the machine
Using the same quiz format, steps required to answer questions, and submission deadlines for both PARs and KCs are examples of which of the Eight Golden Rules for HCI Design?
strive for consistency
What is the name of the project that was developed by University's of Arizona's Dr. Bryan Carter to help students not only study the literature of the Harlem Renniasance, but also be excited and, engage and experience it within a virtual environment?
virtual harlem
What term is used to describe an individual who, without authorization, reveals private or classified information about an organization, commonly related to criminal or civil wrongdoing or misconduct?
whistleblower
What name is used to describe the Eller College of Management's commitment to fostering an environment where competition is fair, integrity is promoted, and academic dishonesty is rooted out?
E-tegrity
In the "Interaction Cycle," the "Gulf of Evaluation occurs between:
A user's perception and a user's interpretation
As the mayor of Fortaleza, Brazil, Roberto Claudio (UA PhD) partnered with the University of Arizona to use data analytics and visualizations to make significant reductions in the occurrence of what type of event in Fortaleza?
Accidental road deaths
_________ refers to determining who is responsible for actions that were taken.
Accountability
Which of the following metrics would be used as a measure of the ability of a company to meet its short-term financial obligations?
Acid Test
_________________ is a decision made by individuals to use a particular technology, and _________________ is a wide adoption and actual use of a technology by producers or consumers.
Adoption; diffusion
Which of the following is a property issue?
How should we handle software piracy (illegally copying copyrighted software)?
In the McGinn model of design, what aspect of a design is the most broadly understood by most users?
Human Sensory Perception
What role did Cynthia Cooper play in the MCI/Worldcom case study?
Identified the accounting irregularities during an internal audit
________ is a suite of enterprise-ready artificial intelligence services, applications, and software tools labeled as cognitive computing.
Watson
In 2000, operating a basic internet application costs businesses approximately ________ per month. By mid-2020, operating the same application in Amazon's cloud cost approximately ________ per month.
$150,000; $100
Which of the following represents the value 1234.56 when formatted as an Excel "Accounting" value with "Symbol" as "None"?
1,234.56
Two-Factor Authentication Video: Two-factor Authentication (2FA) protects your account login from being hacked through what method?
2FA Requires hackers also have your physical device (second factor)
According to Social Intelligence, approximately what percentage of employers check up on current employees on social media?
50%
According to Helium.com, approximately what percentage of job candidates are rejected beforehaving an in-person interview?
65%
According to Social Intelligence, approximately what percentage of employers use social network sites to research job candidates during the hiring process?
95%
When entering an Excel expression into a worksheet cell, which of the following symbols must be used as the first character?
=
From the Video Case "It's Getting Harder to Spot a Deep Fake Video" what is a potential positive application of these deepfake videos that benefits individuals struck by disease?
Allowing people who have lost their voice to have synthetic voices
From an accounting perspective, what term is used to describe the value of anything you own?
Asset
What accounting statement is a financial snapshot of a company's overall financial condition at a given point in time?
Balance Sheet Statement
As described in our reading, what term was used to describe the Malaysian Experiment's Multimedia Super Corridor (MSC) comprehensive regulatory framework that offered intellectual property protections and cyber laws to facilitate and assist the development of a truly ICT and multimedia environment?
Bill of Guarantees
Plus (+), minus (-), multiply (*) and divide (/) are all examples of what type of arithmetic operator?
Binary
What term is used to describe a pre-printed list of NetID+ authentication codes that can be used when your Duo App cannot be used for authentication?
Bypass codes
Social Engineering Threats Video: In the video, how could a hacker break two-factor authentication on an account of yours without access to your phone and without phishing you?
Call the phone company and pretend to be you, getting the phone company to switch the phone number to a new sim card
What term describes the additional information related to the human-oriented formatting of displayed data and is often called "data about data"?
Cell reference (relative, absolute, or named)
Fromthe prespective of the Democracy Online framework, which group would participate through activities such as commiting time to particiapte, helping others learn, communicating respectfully and responsibily, and starting/volunteering with citizen-based online democracy effots and community networks?
Citizens in the online commons
While e-Inclusion focuses on participation of all individuals and communities in all aspects of the information society no matter their country, gender, age, or wealth, what categoy of e-Empowerment is tightly connected with the concept of e-Democracy and the galaxy of interactions between citizens and government that e-Democracy enables?
Citizenship level
________ are machines designed to be used in ______ where there are interactions with humans within a shared space.
Cobots; collaborative applications
From the Video Case "It's Getting Harder to Spot a Deep Fake Video" what is a potential negative application that could cause great harm to well known people?
Committing fraud by creating a fake video that could be used to blackmail an individual or ruin their reputation
What privacy-related term is used to describe the need to maintain control over the use of an individual's person information by corporations and governments?
Confidentiality
In our video case discussing how data solves government problems, the state of Maryland used data visualization to help protect minor children in foster care by checking if these children were living at the the same address as what other group?
Convicted sex and violent crime offenders
According to our class discussion, which of the following is NOT a characteristic of a Social Entrepreneur as a Change Agent?
Diminished sense of accountability
In the Relationship-based Organizing (NGP VAN) video case, which of the following was discussed as a strategy for motivating supporters to do tasks such as posting on their social media or sending personal emails to friends that the NGP VAN has targeted for outreach?
Displaying points and badges that they have earned on a campaign leaderboard
What type of innovations are intended to be incompatible with existing standards and value chain, and must develop markets de novo (latin for "from the beginning")?
Disruptive Innovation
All of the following items was described as being keys attribute of a creating a good person brand, according to Paul Argenti from the Tuck School of Business at Dartmouth University, EXCEPT:
Embellishing and exaggerating personal accomplishments, experience and qualifications to get noticed
Which of the following stages of e-Government evolution is defined our reading where governments provide more information on public policy and governance through links to archived information that is easily accessible to citizens, such as forms, reports, laws and regulations, and newsletters?
Enhanced
According to our FIP lecture and the slides from Dr. Matt Mars, what term is used to describe development and implementation for advancing innovative solutions to economic, environmental, social, and/or technological problems or opportunities?
Entrepreneurial Leadership
Which of the following academic disciplines was NOT included as one of the disciplines contributing to the study of Human-Computer Interaction?
Entrepreneurship
What ethical situation was David Myers, former Controller of WorldCom referring to when he stated "I still don't know that one point when I started to cross the line... when I should have acted differently"?
Ethical drift
Which of the ethical situations that Dr. Gilliland described considered the aggregate impact of of small ethical deviations?
Ethical drift
As described by Thomas Stoffregen, what type of fidelity (or believability) answers the question "Does the system feel real?" and focuses on the subjective experiences that are associated with an interface or virtual environment?
Experiential
As described in the Relationship-based Organizing video case, information from what social media platform is used to improve the effectiveness of campaign worker's persuasion voter outreach activities?
What term is used to describe an incorrect relationship due to users assuming that the when an action happens that subsequent actions were caused by the original action?
False Causality
Which of the elements of the Interactive Public Commons described in the "Democracies Online" would be most closely aligned with the examples of how Arizona and Minnesota state legislatures use live streaming to expand access to their committee meetings and floor sessions?
Government
Commonly used in the field of broadcast television videography, what technology, also called chroma-key technology, creates the special effect of layering images together in a way that the a video journalist background can be replace an with another setting .
Green screen
Which of the ethical situations that Dr. Gilliland described related to how serotonin, which is part of a biochemical communication system between your brain and your gastrointestinal tract, signals how stress relates to your actions in ethical situations?
Gut check
What term is used in the category renewal zone to describe the strategy used in declining markets with respect to optimizing returns (sales and profits) for the remainder of a category's useful life?
Harvest and exit
In the "Drunken Pirate" case discussion, why was the picture, captioned "Drunken Pirate", that Stacy Snyder posted of herself on her personal MySpace account considered as being an "unprofessional" act for a high school teacher-in-training?
Her online posting promoted drinking in the "virtual view" of her students
Having information about person's voting history (i.e., submitting a ballot on election day, early voting site, a mail-in ballot, or participation in a partisian primary) would most likely be used by a blockwalker (campaign outreach worker) as a part of a strategy for engaging persons who are classified as "sometimes voters" for the campaign worker's political party in what way?
Providing accistance on how, when and where to cast a ballot in an upoming election
According to our class discussion on Enterpreneurship, the amount of value accumulation over time will be the greatest with what type of innovation?
Radical innovation
What U.S. federal law was enacted as a result of the Enron and MCI/Worldcom accounting scandals that helps protect investors by making corporate disclosures, accounting and auditing more reliable and accurate?
Sarbanes-Oxley Act (SOX Act)
What term is used to describe the process of "hacking into a person" using psychological manipulation, trickery or deception for the purpose of stealing valuable information?
Social Engineering
According to Siemens Enterprise Communications, what is one of the most effective routes to stealing confidential data from organizations?
Social engineering
From the perspective of the classical ethical delemma "Who Am I", Cynthia Cooper, who at the time was MCI's VP of Internal Audit, took action based on which of the following perspectives when she reported evidence of criminal internal accounting fraud at MCI to federal law enforcement authorities?
Speaking out - whistleblowing
What type of entrepreneurship focuses on preservation of nature, life support, and community in the pursuit of perceived opportunities to bring into existence future products, processes, and services for gain, where gain is broadly construed to include economic and non-economic gains to individuals, the economy, and society?
Sustainable Entrepreneurship
According to the Voter Identification Matrix analysis of eligible (registered) possible voters, which of the following groups of voters were NOTseen as being in a category that campaigns were advised "Don't waste your resources on.." when planning campaign outreach?
Swing voters who always vote
How VPNs Improve Security Video: What technique does a VPN use to allow access to services in a company or on campus to all be accessible to a remote user as if they were on campus or at the workplace?
The user get a company internal IP address
What term is used to describe the ethical theory that anything held in common that can be used by all freely without regulation will naturally result in everyone will attempt to maximize his own benefit to the detriment of the shared community resource?
Tragedy of the Commons
How VPNs Improve Security Video: What two techniques does a VPN keep someone snooping on a public network from seeing your data?
Tunneling, encryption
As described in the Accenture "Building Your Brand" video case, what should you be scanning for when reviewing descriptions of ideal jobs to help you build an online profile that contributes to your job search process?
Using keywords you find in your online profile
In the TechInsider video case, hackers we able to defeat the two-factor authentication used to protect the account of Deray McKesson by doing what?
Using social engineering to get Verizon to activate a new SIM card for his phone
What term is used for innovation the operational excellence zone to describe reducing the materials cost of products by substituting low-cost standard parts and pre-integrated subsystems for an earlier design's high-cost manually integrated custom components?
Value Engineering
What term is used to describe how an object's appearance is able to show a user the functional properties and how to use an object without the need for labels or instructions?
affordance
Which of the following terms used with Excel would be most closely related to the concept of a programming named variable?
cell reference (relative, absolute, or named)
What term does Don Norman use to describe a a story that puts the operation of the system into context, in that, it weaves together all of the essential components, providing a framework, a context, and reasons for understanding?
conceptual model
What form of sustainable entrepreneurship focuses specifically on actions that appear to further some social good, beyond the interests of the firm and that which is required by law, and often denotes societal engagement of organizations?
corporate social responsibility
By purchasing digital dossiers, companies are seeking to know their customers better through a process called
create customer intimacy
Which of the following is NOT considered a "fundamental" data type in Excel?
date
Which of the following terms is definted by our reading as an umbrella term that comprises all uses of information and telecommunication technologies in the public sector"?
digital government
Photo tagging is the process of assigning names to to images of people using what type of technology?
facial recognition
In the following image, the "PUSH" sign on the door is most closely related to which of the following Human-Computer Interaction factors?
false affordance
What term is used to describe a tool that is used to transform, manipulate, or select data in order to return a value that can be used in an expression?
function
What type of innovation is a response to need, economic conditions, and burning problems such as labor shortages, drought, and energy crises?
induced inovation
According to our assigned reading, many social problems are the result of multiple interactions. What term was used to describe connecting information in order to allow policy makers to understand these interactions better?
joining up
What term describes the additional information related to the human-oriented formatting of displayed data and is often called "data about data"?
metadata
Which of the following criminal actions taken by Martha Stewart in the ImClone case study directly resulted in her serving time in prison?
obstruction of justice
The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
opt-out
As described in the "Democracies Online", which of the following would NOT be an aspect associated "Media and Commerical Content"?
regulatory factors and support
The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.
rights