MIS 111 Exam 1 (ICQs/PARs)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The _____________ approach states that an ethical action is the one that provides the most good or does the least harm.

utilitarian

The Gainesville police department started using the internet to accomplish all of these objectives except?

Empower businesses to identify high crime areas and determine appropriate levels of security.

Who said the following quote "You can't use up creativity. The more you use, the more you have."

Maya Angelou

What Center in the Eller College of Management has the mission to help students improve their potential and advance society by developing an entrepreneurial and innovative mindset?

McGuire Center for Entrepreneurship

What is the name of the yearlong, team-based program to learn the principles of entrepreneurship and innovation in the Eller College of Management that allows students to build a new venture from the ground up collaboratively with mentors, industry experts, investors and real-world entrepreneurs?

McGuire New Venture Development Program

Steven Clift has practical online steps for government to support democracy. What was the suggested open standard data format to "Provide access to raw data from decision-making information systems."?

XML

Does IT provide opportunities for people with disabilities?

Yes

Was David Myers treated fairly?

Yes

You decide to use the password "1234" on your computer because you figure nobody cares enough about your information to steal it. This is a risk __________ strategy.

acceptance

Who was quoted as saying,"Integrity is All You've Got"?

Karl Eller

How does adding social networking to the VAN allows candidates to improve the effectiveness of campaign volunteers?

Leverages personal relationships of campaign volunteers with voters

When you are investing on your own, what type of order do the readings say you should be placing?

Limit Order

What type of customer intimacy zone innovation focuses on making structural modifications to established products in order to create a distinctive sub-category?

Line-Extension Innovation

An investors willingness to potentially loose their money in exchange for the potential of higher returns is called their?

Risk Tolerance

In 2000, operating a basic internet application costs businesses approximately ________ per month. In mid-2016, operating the same application in Amazon's cloud cost approximately ________ per month.

$150,000; $1,000

Taxes, FICA and other Payroll Deductions can easily be what percentage of a person's paycheck?

35%

According to the in-class video case study on the Power of Entrepreneurship, approximately how many people live on less than $10.00 per day?

4 Billion

If you graduate from the University of Arizona when you are 22 years old and have a credit card that charges an 18% annual rate. If you just have a $2,000 credit balance with an 18% annual rate, but only make minimum payments of 2% of the balance each month, what birthday will you likely be celebrating when your $2,000 credit card balance is paid off?

52nd bday

According to the reading on "Candidates Fielding YouTube Questions", what % of Americans believe "generally speaking, elected officials in Washington lose touch with the people pretty quickly."

79%

What is the recommended solution covered in a tech tip for keeping track of many secure passwords that could be hard to remember?

A Password Manager App on a Cell phone with a Lock Screen

______________ is an electronic profile of you and your habits.

A digital dossier

_________ is a communications control.

A firewall

What is an Exploit?

A technique used to compromise a system

Assume you are off campus and cannot connect to UAWiFi. Which of the following would be a secure alternative to access the campus network?

Access any open wireless network, and then use a VPN to connect to campus

______________ refers to determining who is responsible for actions that were taken.

Accountability

Making sure your customer's information is correct in your information systems is a(n) _________ issue.

Accuracy

Signs that an email is a phishing attempt often include everything but:

An option to opt out of future emails

Phishing Attacks often contain all the following except what?

Ask you to go to the official site for an institution with the correct link that exactly matches the URL it really goes to when you hover over it

What term is used to describe the printable, one-time use codes you can generate for NetID+ authentication that are useful when traveling, when cell phone carriers may charge additional fees for calls and texts, or when you do not have access to your primary authentication device?

Bypass codes

If you have an empty building you can move into if your primary location is destroyed, you've implemented a _________ site.

Cold

WalMart has a(n) ___________ strategy.

Cost leadership

In cybersecurity, what is our last line of defense?

Data Encryption

______________ is a privacy policy guideline for Data Collection.

Data should be adequate, relevant, and not excessive in relation to the business objective.

When the DNC was targeting voters using their data-driven approach, which of these voting groups were the most appropriate to target?

Democratic and swing voters who sometimes vote

Which group of voters would result in the highest return on investment (i.e., largest number of votes for a DNC candidate) using a get-out-the-vote(GOTV) strategy?

Democratic voters who sometimes vote

What type of innovations are intended to be incompatible with existing standards and value chain, and must develop markets de novo (latin for "from the beginning")?

Disruptive Innovation

Which of the following was NOT described as one of the four innovation zones?

Disruptive Technology Zone

Humanities: Using the latest technology such as avatars, 3D glasses and green screens, what Humanities professor has created a virtual environment that allows students to take a step back in time and truly immerse themselves in the nuances of the Harlem Renaissance?

Dr. Bryan Carter

NetID+ is the University of Arizona's two-step authentication solution that adds two-step authentication as an extra layer of security to your NetID-accessed accounts, including D2L. NetID+ is now required for all campus logins during 2019. What is the name of the phone app that works with NetID+

Duo

What is the official Smartphone app that helps facilitate logging in with NetID+?

Duo Mobile

IT has changed the manager's job in many ways. Which of the following is NOT the result of this change?

Easier to make a decision

What type of feasibility was a barrier to the prior leadership in Maryland producing the map that overlaid the foster care sites with locations of known violent criminals?

Economic Feasibility

When you're travelling and on the campus of another university, what is a secure, worldwide roaming access service that allows students, researchers, and staff to obtain fast and secure Internet connectivity?

Eduroam

The outcomes of the E-Government Strategy OMB report primarily focuses on improving business processes in which of the following ways ?

Efficiency

In the case study "IT's About Business 1.3," (at the beginning of section 1.4 of the textbook), ________ is the Internet on a portable hard drive.

El Paquete Semanal

What is the name of the undergraduate certificate offered through the McGuire Center for Entrepreneurship that provides Eller undergraduate students with the opportunity to apply their knowledge and skill sets in real-world environments in order to make your community a better place to live and work as well as having a positive social impact

Eller Social Innovation (ESI) Certificate

What is MIS?

Finance, Accounting, Security, convince, privacy, personal safety (Apple iTunes: online sales, royalty payments to artists, downloads etc.) ( getting into your own dorm room)

A public company's annual report is also called its?

Form 10-K

Embraced by the University of Arizona's strategic plan, what term is used to describe how the velocity, scope, and systems impact of breakthroughs is disrupting almost every industry in every country and heralds a transformation of entire systems of production, management, and governance?

Fourth Industrial Revolution

How do you check or report a suspicious phishing email at the UofA?

Go to https://security.arizona.edu/

What type of eCommercemodel focuses on increasing the efficiency of the University by allowing its employees to submit time card information using UAccess?

Government-to-employee (G2C)

Which of the following is TRUE? (IT)

IT impacts entire industries.

Which one of these is not one of the three listed techniques to rebalance your portfolio?

If you are drawing down your investments in retirement, you can alter your disbursements so more come from an over weighted category

Which group of voters would result in the highest return on investment (i.e., largest number of votes for a DNC candidate) using a persuasioncampaign strategy?

Independent voters who always vote

SCADA attacks typically occur on ___________.

Industrial control systems

___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information.

Information extortion

______________ is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others.

Information privacy

What do Informational systems actually do?

Information systems create solutions and focused on a customer's business needs

_________ is an example of a primary activity for most firms.

Operations

Which of the following is NOT a characteristic of alignment?

Organizations view their IT department employees as supremely important

If you miss a class what course technology will allow you to watch a podcast of it?

Panapto

looking at this problem from an MIS perspective...

People - human factors (understandability, capability, cost of knowledge acquisition, and acceptance) Process - design factors (algorithm, parameters, complexity, accuracy) Technology - systems factors (operational accuracy and reliability, implementation and operating costs, technical feasibility, complexing/interdependence)

Hampton Virginia is stimulating Citizen Engagement in government in many ways. According to a study, Hampton citizens quality information included all of the following characteristics except?

Personal

Which of the following is NOT one of the "4 P's" of innovation?

Personalization

Knowing what kind of surveillance an employer can use on its employees is a(n) _________ issue.

Privacy

______________ is the right to be left alone and to be free of unreasonable personal intrusions.

Privacy

What type of innovation focuses on the supply side, looking for opportunities to remove non-value-adding steps from the workflow?

Process Innovation

Which of the following "4 P's" of Innovation discussed by Dr. Mars related to the instruction of the MRI for diagnosing internal illnesses?

Product

Determining whether or not corporate computers can be used for private purposes is a(n) _________ issue.

Property

What major piece of legislation impacting business followed the MCI and Enron bankruptcies?

Sarbanes-Oxley Act

What is the name of the social engineering attack that frightens computer users into visiting malware-infested websites by appearing to be legitimate warnings from antivirus software companies that your computer's files have been infected with the intent of tricking a user into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection?

Scareware

Information systems professionals understand business needs and analyze processes, methods and data to create customer-oriented solutions. The value proposition for MIS was described more briefly by Dr. Jay Nunamaker, Regents Professor and founding chair of the MIS Department, as a discipline focused on doing what for business?

Solving real problems for real people

What is the name of the secure password storage product offered to student sthrough the UofA Information Security Office? (Hint: see https://security.arizona.edu in the "Student" section.)

Stache

Which of the following normative business ethics approach is most commonly used by businesses?

Stakeholder Theory

Medicine: What is the name of the University of Arizona's state-of-the-art, technology-driven, clinical simulation training facility supporting the innovative educational needs of the medical school and its clinical affiliates, including industry health care partners and the community? This facility is dedicated, in every sense, to providing truly experiential, innovative and immersive simulation education. With 33,000 square feet of dedicated space, it represents one of the largest simulation facilities housed within a university in the U.S..

The Center for Simulation and Innovation

All investments involve some degree of risk, what is the reward for taking on risk?

The potential for a greater investment return

_________ is any danger to which a system may be exposed.

Threat

support the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data.

Transaction processing systems (TPS)

If you are just being asked for something you know to get into a system, what is the system attempting to do?

Validate your identity

Which of the following can be used to confirm you have correctly submitted the correct assignment report document before the deadline?

all of the above (A. Reviewing the document displayed when uploading your assignment report, B.Reviewing the Digital Receipt email from D2L confirming your submission, C.Using the "Submission History" screen to see the filename and display the report)

IT __________ be used to create a competitive advantage ___________.

can; when it is used effectively

When you get an unexpected email, you should avoid everything but?

copying a link to a known website and pasting it into your browser

Anthropology: Lead by Drs. Sudha Ram (MIS) and Dr. Barbara Mills (School of Anthropology), what "Big Data" knowledge discovery project is a collaboration between the College of Social and Behavioral Sciences and the Eller College of Management that focuses specifically on pre-Hispanic archaeological data from the American Southwest — Arizona, Utah, New Mexico and Colorado — from A.D. 800 to the 1500s, shortly after the arrival of the Spanish in the region?

cyberSW Project

What is the named used to describe daily spending decisions like eating at a restaurant, buying clothes, drinking Starbucks, or playing a round of golf?

discretionary

Weak passwords are a(n) ___________ threat.

employee

The _________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource.

exposure

The web ____________ buyer power.

has a mixed impact on

UA Libraries: What is the name of the collaborative working environment and makerspace at the University of Arizona Science and Engineering Library that is a collaboration among Innovate UA, the College of Humanities, and the UA Libraries. that is equipped with monitors, computers, basic office essentials, sleek communal tables, massive wall boards, 3D printing and scanning, motion capture instruments, open source microcontroller kits, a soldering station, and usability and play testing lab?

iSpace

Car and technology companies are currently competing over who can offer the first self-driving car. This is an example of a(n) _________ strategy.

innovation

On your personal financial balance sheet, your student loans would be classified in what category?

liability

The _________ prohibits an organization from collecting any personal information unless the customer specifically authorizes it.

opt-in model of informed consent

You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is _________ and is _________.

piracy; illegal

Trustev was created to _________.

reduce online fraud

What are the 4 topics about IT?

reduce the number of middle managers IT changes the manager's job Can IT eliminate jobs? (no but creates them) impacts employees at work


Set pelajaran terkait

Path to Field Tech I and II (to advance to FT III)

View Set

Business Essentials Review (Unit 3)

View Set

Databricks Certified Associate Developer for Apache Spark 3.0 - Python

View Set

NURS 3108 - Ch 15 Depression EAQs

View Set

Municipal Securities- Analysis, Trading and Taxation

View Set

exam #2 principles of strength and conditioning

View Set

Child Health Growth & Development Crecimiento y desarrollo de la salud infantil.

View Set

exam 4: human growth hormone (HGH)

View Set

HSK-1 Lesson 3 What's your name ? 第三课 你叫什么名字?

View Set