MIS 111 Final exam study guide

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

As a possible password, how many variableswould the password MIS111Exam(just the underlined string of characters) have when assessing its security strength? A. 2 B. 5 C. 1 D. 4 E. 3

3

A "Fishbone" process analysis diagram is also known as: A. A correlation graph B. A cause-and-effect diagram C. A numerical analysis diagram D. An organization chart E. A cross-functional flowchart

A cause-and-effect diagram

Which of the following is TRUE? A. IT can eliminate any job. B. IT only helps improve employees' health and safety. C. IT opens up jobs for middle managers. D. IT impacts entire industries

IT impacts entire industries

When describing the invention of the cell phone, who said "For the first time, you were calling a person, not a place..."? A. Eli Pariser B. Norman Abramson C. Martin Cooper D. Thomas Friedman

Martin Cooper

Who said the following quote "You can't use up creativity. The more you use, the more you have." A. Albert Einstein B. Thomas Edison C. Maya Angelou D. Linus Pauling

Maya Angelou

What Center in the Eller College of Management has the mission to help students improve their potential and advance society by developing an entrepreneurial and innovative mindset? A. Eller Center Executive Education B. Center for Mangement Innovations in Healthcare C. McGuire Center for Entrepreneurship D. Economic + Business Research Center

McGuire Center for Entrepreneurship

An unobstructed, straight line-of-sight path between a transmitter and receiver is required by which of the following high-speed, commercial wireless network technologies? A. Broadcast Radio B. 802.11 Wi-Fi C. Microwave D. Bluetooth E. 3G Cellular

Microwave

Which of the following causes of the bullwhip effect is related to a trading partner intentionally sharing inaccurate information with a company's future inventory requirements? A. Shortage Gaming B. Outsourcing C. Forecasting/Trend Analysis D. Batch Purchasing E. Price Promotions

Shortage Gaming

What common function do "HTTP", "TCP" and "IP" share? A. They all define internet-based protocols B. They are abbreviations for physical media C. They are common computer viruses D. They all are data encryption methods E. They all are website domains

They all define internet-based protocols

What technology do companies use to make the links between connection between two corporate intranets more secure? A. SCOR B. VMI C. VPN D. CPFAR

VPN

Which of the following types of security risks would be an identified weakness in which necessary controls are not present or effective? A. Control B. Vulnerability C. Exploit D. Attack E. Footprint

Vulnerability

A firewall is a _______control. A. virtual B. access C. physical D. communication

communication

When you use Google Drive to work on a document with a classmate, this is considered _________. A. teleconferencing B. virtual collaboration C. crowdsourcing D. workflow

virtual collaboration

Due to the curvature of the earth, microwave towers generally cannot be spaced more than about how many kilometers apart? A. 18 B. 30 C. 77 D. 48

48

Assume you are 22 years old when yougraduate from the University of Arizona and have a credit card with a $2,000 credit balance with an 18% annual rate. If you only make minimum payments of 2% of the balance or just $10 (whichever is greater) each month, what birthday will you likely be be celebrating when the the credit card is paid off? A. 52 B. 37 C. 32 D. 27

52

Since our firm's sales are cyclical, we adjust the commissions of our sales team sales each quarter.What HLOOKUP function would be used to determine the correct commission rate for March 15th, as shown below A. =HLOOKUP(C5,C2:F3,3,TRUE) B. =HLOOKUP(C5,C2:F3,2,FALSE) C. =HLOOKUP("Rate",C2:F3,C5,TRUE) D. =HLOOKUP(C5,C2:F3,2,TRUE)

=HLOOKUP(C5,C2:F3,2,TRUE)

In June of 2018, Exactis, a marketing and data aggregation firm, disclosed that the personal details of over 340,000,000 individuals and businesses had been compromised.What security failure caused this massive security breach? A. A database was able to be accessed on a server open to the internet B. An disgruntled employee of Exactis copied the file after being fired C. Exactis sold a surplus computer and left information on the hard disk D. Unencrupted network traffic was monitored on a wireless network

A database was able to be accessed on a server open to the internet

In a relational database, what term refers to the collection of items that are all related to a single unique value, where the single value often serves as the primary key? A. A field B. A deposit C. A list D. A record E. A form

A record

What term is used to describe the marketing analysis where two versions of a web page are compared to see which one gives a better conversion rate for similar visitors at the same time? A. PPC Marketing B. A-B (or Split) Testing C. SEO Testing D. SEM Testing

A-B (or Split) Testing

According to MIT Sloan Management Review, what percentage of companies have placed sustainability permanently on their management agendas? A. About 25% B. About 70% C. About 10% D. About 50%

About 70%

What term is used to describe an online advertising service developed by Google, where advertisers pay to display advertising, product listings, and video content as a result of Google search. A. Hashtags B. Responsive C. Adwords D. Pagerank E. Organic

Adwords

Disclosing personal information such as your race, religion, sex, disabilities, and age on social media undermines what type of protections otherwise provided to you as a citizen in the United States? A. Personal credit eligibility laws B. Voter eligibility laws C. Anti-discrimination laws D. Commercial driver's license eligbility laws E. Wage discrimination law

Anti-discrimination laws

What is the importance of the triple constraint? A. Any changes to one constraint will likely affect the project outcome B. Security is the most important constraint C. You must funnel all resources into only one of the constraints D. Time, resources, and scope don't matter

Any changes to one constraint will likely affect the project outcome

[GoldmanSachs]What term was coined by Goldman Sachs in 2001 to describe the fastest growing market economies? A. TICK B. BRIC C. EAGLES D. TIMP

BRIC

With respect to Porter's Forces, which of the five factors would have be the LEAST (weakest) impact on Starbuck's business model? A. Competitive rivalry B. Bargaining power of buyers (its customers) C. Threat of substitutes D. Threat of new entrants E. Bargaining power of suppliers

Bargaining power of suppliers

What term is used to describe the behavior where small changes in customer demand that result in large variations in raw material orders causing inefficiency in the supply chain? A. Reverse Auctions B. Bullwhip effect C. Single-Minute Exchange of Dies (SMED) D. Supply Chain Operations Reference (SCOR) Model E. Just-In-Time Orders

Bullwhip effect

Put the following assets in order of increasing liquidity (least to most) A. Cash, Inventory, Property & Plant B. Accounts Receivable, Cash, Property C. Property, Accounts Receivable, Cash D. Property, Cash, Accounts Receivable E. Cash, Property & Plant, Inventory

Cash, Inventory, Property & Plant

Whattype of data mining analysis identifies patterns in the data based on demographic characteristics (e.g., age, gender, income, ethnicity, etc)? A. Association B. Classification C. Sequencing D. Clustering

Classification

The "Porter's Forces" model deals with what aspect of globalized business? A. Design B. Relationships C. Competition D. Time E. Location

Competition

When we discussed the design of network infrastructure, we noted that the design of connectors on computers we generally related to the speed of the communication interface, the function being supported (number of signals required), and what other issue related to human-computer interaction? A. Hidden affordances for security B. Operational and functional causality C. Constraints to improve reliability D. Cultural design standard

Constraints to improve reliability

What is the name of software that allows publishing, editing, and modifying content from a central interface, providing procedures to manage workflow in a collaborative environment? A. Content Management Systems B. Self-publishing Platforms C. Customer Relationship Management Systems D. Social Networking System

Content Management Systems

When the DNC was targeting voters using their data-driven approach, which of these voting groups were the most appropriate to target? (This question is from the online lecture) A. Republican voters B. Democratic voters who never vote C. Democratic voters who always vote D. Democratic and swing voters who sometimes vote

Democratic and swing voters who sometimes vote

Converting all MIS 111 students from clickers to response cards without an initial test period is an example of what type of conversion? A. Direct conversion B. Pilot conversion C. Phased conversion D. Primary conversion E. Parallel conversion

Direct conversion

What is the named used to describe daily spending decisions like eatingat a restaurant, buying clothes, drinking Starbucks, or playing a round of golf? A. Intermittent B. Discretionary C. Variable D. Fixed

Discretionary

ERPModules] Which of the following is typically not considered a "core" ERP module? A. Financial B. Human Resources C. E-Business D. Operations

E-Business

What was the name of the legislation adopted by the European Parliament that mandated that all countries within the EU must setup laws requiring websites to obtain informed consent before they can store or retrieve information on a visitor's computer or web-enabled device. A. EU General Data Protection Regulation B. EU Cybersecurity Act C. EU Data Protection Directive D. EU Cookie Law

EU Cookie Law

Cost-Benefit Analysis is related mostly to what type of project management feasibility assessment? A. Economic B. Technical C. Operational D. Political E. Ethical

Economic

Purchasing an entire box of screws, even though only a small number are need for the master production schedule is an example of making a purchasing decision based on what approach? A. Fixed order quantity B. Lot-for-Lot C. Independent Demand D. Economic Order Quantity

Economic Order Quantity

With respect to a database, what term is used to describe an abstract representation of all of the information included in a data structure about a particular type of entity? A. Entity Key B. Entity Class C. Entity Table D. Entity Attribute E. Entity Model

Entity Class

The pattern of financial fraud undertaken by David Myers, MCI?s Controller, is a good example of what type of ethical situation? A. Ethical Drift B. Gut Check C. Transparency Test D. Lost Opportunity E. Whistleblowing

Ethical Drift

Planned, recurring expenses that occur on a routine schedule, such rent or car payments that must be paid every month, are examples of what? A. Deductions B. Discretionary expenses C. Fixed expenses D. Cash flow E. Flexible expense

Fixed expenses

What phrase is used to describe the current and developing environment in which disruptive technologies and trends such as the Internet of Things (IoT), robotics, virtual reality (VR) and artificial intelligence (AI) are changing the way we live and work? A. Future Shock B. Post-Industrial Society C. Fourth Industrial Revolution D. Economic Globalization

Fourth Industrial Revolution

The University of Arizona is nationally recognized for sustainability in its academics, research, operations, and administration by the Assocation for the Advancement of Sustainability in Higher Education.What Sustainability Tracking, Assessment & Rating System™ (STARS) rating was the University of Arizona awarded in 2017? A. Bronze B. Silver C. Platinum D. Gold

Gold

What tool is commonly used to track how, when and from what location users are using website? A. Project Management B. Wire Frame Design C. Content Management D. Google Analytics

Google Analytics

In the Online Democracy model, the "Voter Activation Network" uses voter registration rolls to categorize voters as always/sometimes/never voting by using information obtained from: A. Private sector polling B. Online media C. Partisan political organization D. Commercially-generated databases E. Government records

Government records

In Thomas Friedman's discussion of globalization, he described the process of globalization as being realized through actions that were first defined by your country, then later defined by multi-national companies, and finally, in the most recent age of globalization is defined by: A. Political parties B. International treaties C. Financial markets D. Social media E. Individuals

Individuals

What dimension of Porter's Forces focuses on the decision that a buyer makes when choosing among direct, existing competitors when all of the competitors offer the same identical name-brand product (e.g., an iPhone 6)? A. Threat of Substitution B. Buyer power C. Threat of New Entrants D. Supplier power E. Industry Rivalry

Industry Rivalry

What term best describes when consumers are able to use their smartphones to obtain information about a company's competitor's product pricing, features, customer reviews and availability while shopping in their company's brink-and mortar store? A. Accessibility B. Multi-path C. Crucial distinctions D. Information transparency E. Interference

Information transparency

Operating unregulated WiFi networks, clickers, Bluetooth headsets, cordless telephones, and microwave ovens using the same 2.4GHz ISM frequency range in close proximity to one another might result in what problem? A. Multi-path B. Interference C. Right-of-way D. Line-of-sight E. Attenuation

Interference

In addition to possessing contextual and relevant information, what other characteristic aspect does knowledge possess? A. It is an entity class B. It solves a structured problem C. It is actionable D. It is consistent E. It is always displayed visually

It is actionable

What term is used to describe the percentage value of the number of times a keyword or key phrase appears on a webpage as compared to the total amount of words on the page? A. Page rank B. Conversion rate C. Keyword density D. Website ROI

Keyword density

The sequence of activities performed by users of GroupSystems' ThinkTank product directly parallel the steps in what other business process? A. Knowledge management cycle B. Operational CRM C. Just-in-time Inventory Management D. Transaction processing system E. Economic globalization

Knowledge management cycle

Related to the concepts of globalization, what computer "law" states that the density of transistors will double approximately every 18 months? A. Metcalf's Law B. Ohm's Law C. Moore's Law D. Kepler's Law E. Gilder's Law

Moore's Law

Which of the following is the technology that enables most mobile wallet applications? A. VRP B. ERP C. AFC D. NFC

NFC

Explicit, or "leaky" knowledge, is based on information that is: A. Customized by each user B. Subjective and cognitive C. Objective and rational D. Dependent on an employee's experience E. Informally communicated with an organization

Objective and rational

What name is used to describe results foundwhen a search engine algorithm analyzes all the pages across the web in an unbiased way and reports the pages considered to contain the most relevant information for your search terms? A. Organic B. Sponsored C. Adword D. Promoted

Organic

What is NOTa factor contributing to the Bullwhip Effect? A. Batch Purchasing B. Outsourcing C. Forecasting/Trend Analysis D. Shortage Gaming E. Price Promotions

Outsourcing

Which type of website file contains software that's executed on the host before sending the results to the browser? A. PHP B. HTML C. JavaScript D. JPG

PHP

What term does Google use to describe how important a website is based upon counting the number and quality of links to a page, using the underlying assumption is that more important websites are likely to receive more links from other websites? A. Website ROI B. Page rank C. Conversion rate D. Keyword density

Page rank

What is an affordance? A. Safety of users and of data B. Being able to pay for something C. How well the user likes the interface D. Physical property of an object that shows functionality

Physical property of an object that shows functionality

What Leadership in Energy and Environmental Design (LEED) certification was the building where our classroom is located, Environment and Natural Resources 2, awarded by the U.S. Green Building Council? A. Certified B. Silver C. Platinum D. Gold

Platinum

What term is used to describe a physical interface between peripheral devices and the computer? A. App B. Signal C. Port D. Session

Port

What action did Stacy Snyder take that resulted in her losing her job? A. Undertaking accounting fraud at her company B. Hacking the AP Twitter feed and posting a fraudulent message C. Being a whistle-blower and reporting the illegal actions of her employer D. Infecting her company's network computer with a virus while using Facebook at work E. Posting a photo of herself at a party on her personal social media account

Posting a photo of herself at a party on her personal social media account

Which of the following are similar actions in the DM, KCC, and GDSS cycles? A. Modeling, Document, Disseminate B. Data Evaluation, Capture, Document C. Problem Definition, Create, Brainstorm D. Data Evaluation, Manage, Organize

Problem Definition, Create, Brainstorm

Which of the following business component are *not* included in an MRP-II planning cycle? A. Workforce B. Plant and Equipment C. Raw Materials D. Product Margins

Product Margins

What is the term used to describe the process of reducing the number of dimensions of a multi-dimensional data cube (e.g., from three dimensions, perhaps season, location, and product, into two dimensions, such as season and location)? A. Variable B. Context C. Function D. Simplification E. Projection

Projection

An I^2 diagram helps identify opportunities that are "low hanging fruit". What does the term "low hanging fruit" mean in this context? A. Projects that correct major errors in the software B. Projects that will require significant effort, but are easily planned C. Projects that design new features requested by our customers D. Projects that easy to do and also have a high value proposition

Projects that easy to do and also have a high value proposition

What type of decision based on explicit knowledge and involves analysis using an algortihm and measured data? A. Quantitative B. Collaborative C. Managerial D. Operational E. Qualitative

Quantitative

Who was the founding director of the Arizona Telemedicine Program? A. John Po, M.D., Ph.D. B. Ana Maria Lopez, M.D., M.P.H. C. Richard A. McNeely, M.A. D. Ronald S. Weinstein, M.D

Ronald S. Weinstein, M.D

Keyword selection and density, image alt tags, and links to content are mostly commonly associated with which of the following concepts? A. PPC B. CPC C. SEO D. SEM E. ROI

SEO

What is the name used to describe when a person visits a brick-and-mortar store only to check physical characteristics of a product but intends to purchase the product online? A. Disintermediating B. Hybrid shopping C. Showrooming D. Multiplexing

Showrooming

In the Jack Welch Video Case in the SCM Lecture, What approach was he discussing as key to providing customer value? A. the SCOR Model -the Supply Chain Operations Reference Model B. CPFAR -Collaborative Planning, Forecasting And Replenishment C. Total Quality Management D. Lean Manufacturing, using JIT and SMED E. Six Sigma

Six Sigma

Dr. Patton discussed the Hacking Google Glasses video case in class and talked about what it could be a precursor to something else getting hacked in the future. What did he say might be the next thing hacked using the same technique? A. Smart / Autonomous Cars B. IoT Toys and Devices C. Smart Phones D. Stop Light Control System

Smart / Autonomous Cars

What normative ethical theory expects a corporation to create more value to society that it consumes? A. Value Chain Theory B. Stakeholder Theory C. Stockholder Theory D. Social Contract TheoryE. Return on Investment Theory

Social Contract TheoryE. Return on Investment Theory

Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? A. Open Source Hacking B. Defense in Depth C. Industrial Sabotage D. Advanced Persistent Threats E. Social Engineering

Social Engineering

In the video case for Nestle, data-driven decisions were primarily based on visualizations of information from what source? A. Cost and Production Schedules B. Financial Performance Reports C. Social Media Platforms D. Investment Analyst Forecast

Social Media Platforms

Information systems professionals understand business needs and analyze processes, methods and data to create customer-oriented solutions.The value proposition for MIS was described more briefly by Dr. Jay Nunamaker, Regents Professor and founding chair of the MIS Department, as a discipline focused on doing what for business? A. Programming B. Academic research C. Solving real problems D. Marketing software E. Computer Design

Solving real problems

Donut Charts are difficult to read, Microsoft recommends what as an alternative? A. Cake Charts B. Pie Charts C. Scatter Charts D. Stacked Column or Bar Char

Stacked Column or Bar Char

When classifying items on an I^2 diagram, we depend on individuals with domain knowledge and consultants about the items.When discussing knowlege management, what name did we use to describe an individual with domain knowledge? A. Franchisee B. Subject-matter Expert C. Community of Practice D. Expert System

Subject-matter Expert

Using the Internet of Things to increase the efficiency of a company's operations by allowing it to track, in real time, the movement of raw materials and parts through the manufacturing process to finished products delivered to the customer is related to what business function? A. Cost accounting and financial management B. Supply chain management C. Social media marketing D. Lifecycle product sustainability

Supply chain management

Applications such as "find a friend" (FourSquare), driving directions (Smartrek), roadside assistance (OnStar), and fleet management (UPS and FedEx) are all examples of services that have been enhanced by knowing what? A. The location of the requester B. The age of the requester C. The time the request was made D. The identity of the requester E. The number of people making requests

The location of the requester

In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what common problem did his analogy using the postal service to email a page from a book have with sending TCP packets? A. The message might be illegible B. The message might be in the wrong language C. The message might get lost and not deliver D. The message might get changed in route E. The message might not get sent

The message might get lost and not deliver

Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project? A. The quality of the work performed during each major project milestone B. Whether project tasks have been organized in the most efficient order C. The project milestones and the order they are scheduled to be completed D. Whether the major project milestones are being completed on budget E. Individual work assignments for persons assigned to the project

The project milestones and the order they are scheduled to be completed

Assume you need to put a sign that says "PUSH" on a door handle to explain the correct way to operate the door.The "PUSH" sign helps a user understand what aspect of usability? A. The sign explains a correct rejection B. The sign explains a consistent affordance C. The sign explains a perceptible affordance D. The sign explains a false affordance E. The sign explains a hidden affordance

The sign explains a false affordance

Pie charts have several limitations, including all of the following except? A. They cannot show negative values B. They can only show one series C. When two or more items are close in value it can be hard to determine which is larger. Values near zero may not show up and be hidden E. They have limited color and don't draw the eye and attention

They have limited color and don't draw the eye and attention

What is considered to be the high-capacity data transmission core of the Internet structure? A. Tier 1 ISP B. Tier 3 ISP C. LAN D. NAP

Tier 1 ISP

What British Scientist invented the World Wide Web in 1989 while working at CERN (European Organization for Nuclear Research) in 1989? A. Tim Berners-Lee B. Martin Cooper C. Harald Blatand D. Vint Cerf

Tim Berners-Lee

In a vertical cross-functional business process diagram, the order of items in one column (from top to bottom) shows what relationship among these items? A. Importance B. Skill level C. Time D. Cost E. Frequency

Time

In the decision matrix example shown below, which of the answers would have the highest score for Project A? A. Affects other projects B. Time to complete C. Financial gain D. Project cost

Time to complete

The __________________ test proposes a scenario in which a man and a computer both pretend to be women or men, and a human interviewer has to identify which is the real human. A. Terminator B. Turing C. Google D. SkyNe

Turing

According to the articles what technologies enable businesses and their employees to get in front of clients and customers but do it in a cost-savings manner? A. Telemedicine B. email C. VoIP and web conferencing D. Telecommuting E. eFax

VoIP and web conferencing

Which of the following is *NOT* a behavioral issue for meeting A. Domination B. Wrong people C. Misunderstandings D. Hidden Agenda

Wrong people

Signals used to send messages can be _______ or digital. A. analog B. rotary C. binary D. discrete

analog

Weak passwords are a(n) ___________ threat. A. software B. outside C. employee D. hardware

employee

What type of guided media uses light for signaling? A. twisted pair B. fiber optics C. open wire D. coaxial cable

fiber optics

What is the correct filename for your ABP-3A website? A. index.html B. index.www C. Index.html D. INDEX.HTML

index.html

ERP address information silos by _____________. A. simplifying system creation B. integrating functional areas C. correcting a lack of communication between TPSs D. reducing the amount of information presented

integrating functional areas

Which of the following is the correct order of the traditional System Development Life Cycle (SDLC)?A. investigation, analysis, design, implementation, programming and testing, operation and maintenance B. investigation, analysis, design, programming and testing, implementation, operation and maintenance C. analysis, investigation, design, programming and testing, implementation, operation and maintenance D. analysis, investigation, design, implementation, programming and testing, operation and maintenance

investigation, analysis, design, programming and testing, implementation, operation and maintenance

The _________ prohibits an organization from collecting any personal information unless the customer specifically authorizes it. A.information privacy policy B. opt-out model of informed consent C. digital dossier policy D. opt-in model of informed consent

opt-in model of informed consent

What is the name of the directory where the files for your websites for ABP-3A and ABP-3B will be stored on the U.Arizona.Edu web server? A. www_html B. index_html C. public.html D. public_html

public_html


संबंधित स्टडी सेट्स

Chapter 14 - Miscellaneous Commercial Lines Coverage

View Set

Life Insurance Questions I Keep Getting Wrong

View Set

All Rise for the Honorable Perry T Cook

View Set

Свідомість як фундаментальна категорія філософії та психології

View Set

Zkouška z genetiky - genealogie

View Set

Computer Maintenance - Advanced Computer Hardware

View Set

Foundations in Nursing: Therapeutic Communication

View Set

Chapter 19 Waste Environmental Science Test 5/13/16

View Set

Bodies of Water and Rivers of Eastern Europe

View Set

Warriors Don't Cry Quizlet - Emily, Caroline, and Noah

View Set