MIS 111 Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What special character does Excel use as a delimiter following the worksheet name in a cross-sheet reference? ! (Exclamation point) % (Percentage sign) $ (US currency sign) & (Amphersand)

! (Exclamation point)

When entering an Excel expression into a worksheet cell, which of the following symbols must be used as the first character? "@" (at sign) "=" (equals sign) "!" (exclamation mark) "?" (question mark)

"=" (equals sign)

IT __________ be used to create a competitive advantage ___________. 1) can; because everyone has access to technology 2) cannot; because everyone has access to technology 3) cannot; even when it is used effectively 4) can; when it is used effectively

can; when it is used effectively

Companies purchase digital dossiers to ________. engage in electronic surveillance create customer intimacy evaluate the competition track their own reputations

create customer intimacy

Which of the following is the correct order for the KMS cycle? create, capture, refine, store, manage, disseminate create, capture, store, refine, manage, disseminate create, capture, store, manage, refine, disseminate create, capture, refine, manage, store, disseminate

create, capture, refine, store, manage, disseminate

According to IT's About Business 8.6, FedEX launched EDEN (Equipment Detection, Event Notification) to improve the efficiency and effectiveness of its ____________. 1) UPS 2) profitability analysis 3) package tracking 4) dock operations

dock operations

The most common media used for the Internet backbone is a ________ network. 1) radio 2) microwave 3) fiber-optic 4) satellite

fiber-optic

The threat from rivalry is _________ when there is intense competition among many firms in an industry and _________ when competition is not as intense. high; high low; high low; low high; low

high; low

Data warehouses is a repository of _________ data, used primarily by _______ companies. historical; large real-time; large historical; small real-time; small

historical; large

your personal UArizona email address is "[email protected]", which of the following would be the exact URL that you should used when accessing your personal U-System URL website address for the EC Hosting project? http://www.u.arizona.edu/~wwildcat http://www.u.arizona.edu https://www.u.arizona.edu/~wwildcat http://wwildcat.u.arizona.edu

http://www.u.arizona.edu/~wwildcat

If your sales team shows a customer's name is "Johnny Smith" but your shipping department says it is "John A. Smith", this is a data __________ issue. inconsistency security redundancy isolation

inconsistency

Which of the following is the full filename that should be used for your EC Hosting assignment in the public_html directory on the u.arizona.edu (U-System) server? Index.html (first letter is upper case) index.html (all lower case characters) INDEX.HTML (all upper case characters) website.html (all lower case)

index.html (all lower case characters)

Typing in your password to access a system is an example of something the user _________. does knows is has

knows

If you hire a cybersecurity company like FireEye to identify security weaknesses in your information systems so you can enhance your security management to minimize the impact of theats to your business, you are using a risk _________ strategy. transference limitation analysis acceptance

limitation

Buyer power is high when buyers have _________ choices from whom to buy and low when buyers have _________ choices. few; few few; many many; few many; many

many; few

Information about data sources; database, table, and column names; refresh schedules; and data-usage measures are collectively define what issue about the information in a data warehouse. cost quality metadata governance

metadata

Big Data helps companies identify groups of customers that share one or more characteristics. This is called __________. data analyzation experimentation business model creation microsegmentation

microsegmentation

IT makes managers ________ productive and ________ the number of employees who can report to a single manager. more; increases more; decreases less; increases less; decreases

more; increases

If you receive a phishing email on your UA email account, where should you report the phishing email? [email protected] [email protected] [email protected] [email protected]

[email protected]

IT changes managers' job by _________ decreasing the volume of information they have to process. providing near real-time information so managers can make quicker decisions. making it easier to get all employees to work from one location. improving an employee's sense of connectedness.

providing near real-time information so managers can make quicker decisions.

Database systems minimize ________. independence redundancy security integrity

redundancy

You are a marketing manager responsible for planning the budget for your department. This is a(n) ______ task and a(n) _______ decision. 1) unstructured; management control 2) unstructured; strategic planning 3) semistructured; management control 4) semistructured; operational control

semistructured; management control

As a purchasing manager, you have to purchase products every week to replenish your existing items in your inventory. This is a(n) ________ decision. 1) structured 2) unstructured 3) semistructured 4) midstructured

structured

As shown below, what "Host name" should be used with WinSCP (or equivalent field for CyberDuck) to connect to the UArizona personal web hosting server? www.u.arizona.edu websites.arizona.edu hosting.arizona.edu u.arizona.edu

u.arizona.edu

In the URL "http://www.u.arizona.edu/~wtn", what part of the URL defines the hosting server? www http:// ~wtn u.arizona.edu

u.arizona.edu

A data ________ is a repository of historical data that are organized by subject to support decision makers in the organization . shop warehouse table store

warehouse

In the following example, what lookup_value should be used to return the value of 24.53 contained in cell G9? 5 Distance!"D 2" "D 2" Distance!G9

"D 2"

On the U-System (u.arizona.edu) hosting server, ___(a)___ is the directory that contains the ___(b)___ website file. (a) public.html, (b) index_html (a) index_html, (b) public.html (a) index.html, (b) publc_html (a) public_html, (b) index.html

(a) public_html, (b) index.html

In the Project Selection example discussed in the video case on Decision Matricies by Dr. Martin from DePaul University, if a criterion received 5 points as a rating but the criterion's weight was 10%, what would be the score used for that criterion? 10.0 5.0 1.0 0.5

0.5

Which of the following represents the value 1234.56 when formatted as an Excel "Accounting" value with "Symbol" as "None"? $1,234.56 1.23E+03 1234.56 1,234.56

1,234.56

According to Helium.com, about what percentage of applicants are eliminated before the job interview due related specifically to the applicant having posting inappropriate comments about previous jobs? 90% 60% 10% 20%

10%

Geoff Wilson's first product took _________ months to develop; today, his company can bring a minimum viable product to customers in _________ month(s). 18; 3 24; 12 24; 1 18; 6

18; 3

According to the World Economic Forum, of the approximately 50 million tons of electronic e-waste produced each year, what percentage is recycled? 20% 2.3% 50% 90%

20%

What is the correct "port" number that should be used with the WinSCP or CyberDuck secure file transfer program? 80 22 21 25

22

In the following example, if we change the "column_index" value from 3 to 6 (e.g., =VLOOKUP(5, B3:H16, 6,) ), what value will be returned? 24.53 18.78 19.55 12.04

24.53

In the case study "IT's About Business 1.3," (at the beginning of section 1.4 of the textbook), approximately ________ percent of Cuba's citizens have Internet access at home. 5 45 75 95

5

As discussed in the Mythical Man Month, consider the situation shown below where the time to complete each task of the project was estimated to require 3 workers for 4 months, but in actuality, each task will require 2 months if we only use 3 workers. Theoretically, we could still complete the project on-time, if we could complete the remaining 18 months of work in the remaining 2 months. In addition to our original 3 workers, how many additional workers would be need to hire? 2 3 6 9

6

When using more active learning approaches (based on what why say and write), people generally remember what percentage of the material? 10% 30% 50% 70%

70%

According to Social Intelligence, approximately what percentage of employers have decided not to hire a candidate based on inappropriate, discriminatory, or unsafe content they found online? 50% 75% 95% 20%

75%

According to the reading on "Candidates Fielding YouTube Questions", what % of Americans believe "generally speaking, elected officials in Washington lose touch with the people pretty quickly." 1) 79% 2) 25% 3) 98% 4) 6%

79%

_________ is a physical control. A firewall Encryption Virtual Private Network (VPN) A company gate

A company gate

______________ is an electronic profile of you and your habits. A digital dossier Curriculum Vitae Social network Information framework

A digital dossier

_________ is a communications control. Encryption Radio Frequency Identification (RFID) A company gate A firewall

A firewall

________ is an autonomous device that monitors its own condition as well as physical and environmental conditions around it and are an underlying technology of ________. 1) A QR Code; wireless sensors 2) An RFID tag; wireless sensors 3) A wireless sensor; the IoT (Internet of Things) 4) A wireless sensor; RFID (Radio Frequency Identification)

A wireless sensor; the IoT (Internet of Things)

An assignment is due and you cannot get a push to your DuoPlus app on your smart phone. What other options do you have to authenticate yourself for UArizona 2-factor authentication (if you have planned ahead for using the option)? (Select the most complete answer) Generating a passcode locally using the app Sending a passcode using SMS texting Pre-printed bypass codes Calling a lifeline (trusted friend's number) Using a Yubikey hardware token Calling an alternate phone number Calling the 247 for idenity verification ALL of the answers shown are possible options for being able to authenticate when you cannot receive a push message to your DuoPlus app

ALL of the answers shown are possible options for being able to authenticate when you cannot receive a push message to your DuoPlus app

According to the "What is Blockchain?" video case, blockchain-based Bitcoin was seen as increasing the difficulty of doing what? Correctly identifying ownership of property Providing dated proof of existence Ensure the accuracy of traditional notaries Ability of public authorities to enforce traditional financial regulations

Ability of public authorities to enforce traditional financial regulations

According to the "What is Blockchain?" video case, blockchain-based Bitcoin was seen as increasing the difficulty of doing what? Ensure the accuracy of traditional notaries Ability of public authorities to enforce traditional financial regulations Providing dated proof of existence Correctly identifying ownership of property

Ability of public authorities to enforce traditional financial regulations

Of the over $550 million dollars lent to low-income individuals or to those who do not have access to typical banking services, what was the approximate average size of a loan made by the Kiva microfinance services organization? About $10,000.00 About $1000.00 About $10.00 About $400.00

About $400.00

Which of the following metrics would be used as a measure of the ability of a company to meet its short-term financial obligations? Fixed Assets Acid Test Inventory Turnover Gross Margin

Acid Test

________ use internal batteries for power, and they broadcast radio waves to a reader. 1) Active QR code symbols 2) Passive RFID (Radio Frequency Identification) devices 3) Active RFID (Radio Frequency Identification) devices 4) Passive QR symbols

Active RFID (Radio Frequency Identification) devices

The advantage of ________________ is they can be read over greater distances because they use internal batteries for power. 1) WSNs 2) QR codes 3) Passive RFID tags 4) Active RFID tags

Active RFID tags

In a communication architecture, transmitters and senders are described using what term? Contents Actors Infrastructures Protocols

Actors

According to the Mythical Man Month view, adding resources (addition team members) to a project will improve (shorten) the time required to complete the project by the largest amount under which of the following scenarios? Adding resources to a task with high communication requirements Adding resources to an unpartitionable task Adding resources to a task with complex interrelationships Adding resources to a partitionable task

Adding resources to a partitionable task

In the video case "How Data Solves Government Problems", which of the following categories of data was NOT part of a planned map visualization that would help assess whether resources were being distributed appropriately in the state of Maryland? Addresses of homes where senior citizens live Addresses of homes where registered sex offenders live Addresses of homes where individuals who have committed the most violent crimes live Addresses of homes where foster children live

Addresses of homes where senior citizens live

What is the harm of journalists editing or combining photos to create a 'more compelling scene' which also projects an image that never actually existed? 1) The 'news' the journalist is portraying may be inaccurate and/or biased 2) The deception, when revealed, may erode public trust in journalism 3) If the new scene portrays an individual or country in a negative light it can become propaganda and/or lead to violence 4) All of the above

All of the above

How can you contact the UArizona 247 Support Center (available 24 hours a day, 7 days a week) for free (no-cost) assistance with tecnhology and computer software? (Select the most complete answer) On the web at: http://247.arizona.edu Calling on the phone: (520) 626-TECH [or 520-626-8324] In-person at the 24/7 Lounge in the Student Success District All of the answers are possible ways to contact the 247 Support Center for assistance

All of the answers are possible ways to contact the 247 Support Center for assistance

From the Video Case "It's Getting Harder to Spot a Deep Fake Video" what is a potential positive application of these deepfake videos that benefits individuals struck by disease? 1) Allowing people who have lost their voice to have synthetic voices 2) Turning all existing movies into Nicholas Cage Movies 3) Allowing people caught on video saying extremely offensive things to deny it and insist it was a fake video 4) Committing fraud by creating a fake video that could be used to blackmail an individual or ruin their reputation

Allowing people who have lost their voice to have synthetic voices

Sound waves, such as the human voice, vary continuously over time and are considered what type of data? Secure Transparent Analog Digital

Analog

What was the name of the innovative collaborative classroom pioneered by the Eller College of Management in the early 2000's? Arizona Telesuite Wilbur's Workroom CATs Collabororium Wildcat Classroom

Arizona Telesuite

According to Intel's "power of Entrepreneurship" video case, during the time it took for you to watch the video case, approximately how many new businesses did entrepreneurs start? Around 800 Around 110,000 Around 300,000 Around 110,000,00

Around 800

Which of the following applications would commonly use Ultra High Frequency (UHF 902-928 MHz) wireless communications? Animal Identification Electronic Door Locking Systems Automatic Toll Collection Systems Asset Management in Warehouses

Asset Management in Warehouses

From an accounting perspective, what term is used to describe the value of anything you own? Assets Liabilities Expenses Income

Assets

What term is used to describe any system that increases or improve functional capabilities of individuals with disabilities? Open Technology Disability Enabled Assistive Technology Inclusive Systems

Assistive Technology

What technology was introduced in 1657 that fundamentally changed society? a) Steam engine b) Telegraph c) Moveable-type printing press d) Balance spring

Balance spring

In passive learning environments focused solely on reading and hearing information, would not be an effective way of preparing someone for to be able to do which of the following learnign outcomes? Being able to define the information Being able to list the information Being able to describe the information Being able to apply the information

Being able to apply the information

__________________ are/is the most effective and efficient way of doing things, readily available to a wide range of employees. Knowledge management systems Best practices Knowledge management Intellectual capital

Best practices

Plus (+), minus (-), multiply (*) and divide (/) are all examples of what type of arithmetic operator? Logical Unary Binary Assignment

Binary

In the Bloomberg video case "Killing the Need for Passwords," what term is used to describe the science of measuring features or fuctions of the human body to establish your identity? Physical Security Defense in Depth Biometrics Non-repudiation

Biometrics

Which of the following descriptive terms would generally be associated with the transmission of digital data? Bits per second Cycles per second Hertz (Hz) Continuously variable waves

Bits per second

Which wireless technology offers a single wireless standard to integrate technologies previously connected with with cabling? Radio Frequency Identification (RFID) Microwave Wi-Fi Bluetooth

Bluetooth

What "law" states that "adding manpower to a late software project makes it later"? Gilder's Law Brooks' Law Moore's Law Metcalf's Law

Brooks' Law

What type of chart is similar to a scatter chart, but allows you to add another dimension of data on a third axis? Bubble Chart Combo Chart Stacked Area Chart

Bubble Chart

What type of chart is similar to a scatter chart, but allows you to add another dimension of data on a third axis? Stacked Area Chart Bubble Chart Combo Chart

Bubble Chart

In the video case "The world of micro-loans", what product was being produced by a loan recipient in Lima, Peru that legend says represents financial prosperity? Bear statue Bull statue Tiger statue Lion statue

Bull statue

What term is a measure of the speed in which cash is spent by entrepreneurial firms, which often have negative income and a high growth rate? Burn rate Operating income Investment securities Depreciation and Amortization

Burn rate

What approach do spear phishing emails use to make hacking using phishing emails more effective? By offering a prize or award for responding By requesting an email "read receipt" to the hacker knows the phish has been read By appearing to send a message from a known person or trusted sender By including a deadline that a response is requested from the recipient

By appearing to send a message from a known person or trusted sender

How is the hierarchical order of pivot fields displayed in a pivot table (i.e., major vs. standing as when in the following sample pivot table) determined? By the order of the field names in the "Values" section By the order of the columns in the original worksheet By the order of field names in the "Columns" section By the order of field names in the "Rows" section

By the order of field names in the "Rows" section

What term is used to describe the pre-printed codes that can be used as an alternate authentication method when your DuoMobile app isn't available? Lifelines Hardware Tokens SMS Passcodes Bypass Codes

Bypass Codes

What term is used to describe a pre-printed list of NetID+ authentication codes that can be used when your Duo App cannot be used for authentication? Bypass codes Yubikey tokens SMS Passcodes Lifelines

Bypass codes

What was the name of the steroscopic 3-D (S3D) virtual environment used by the Raytheon Company to display 3-D models? HOLODECK MOOC CAVE DELVE

CAVE

Which of the following Excel functions will return the number of cells in a range by adding the values that match specified criteria? AVERAGEIF SUBTOTAL COUNTIF SUMIF

COUNTIF

Which of the following Excel functions will return the number of cells in a range by adding the values that match specified criteria? COUNTIF SUMIF AVERAGEIF SUBTOTAL

COUNTIF

Which of the following residential internet connectivity technologies can have degraded performance if many of your neighbors are accessing the Internet at once? Fiber-to-the-home (FTTH) modems Cable modems DSL modems Dial-up modems

Cable modems

According to the Mythical Man Month, all of the following happen when you add workers to a project EXCEPT: Change the project's scope Repartition the work Increase the project team's inter-communication

Change the project's scope

Pivot tables allow data to be easily grouped and analyzed by their values, such residence hall or major. Which of the following data mining methods would use a similar approach? Forecasting Association Classification Sequencing

Classification

If you have an empty building with just rudimentary services and facilities that will allow you to move into quickly if your primary location is destroyed, you've implemented a _________ site. Neutral Hot Warm Cold

Cold

What metadata from your orignal worksheet data is used to identify the Pivot Table Fields? Most frequently used data value in a column Comment fields Worksheet names Column headings (Header row)

Column headings (Header row)

From the Video Case "It's Getting Harder to Spot a Deep Fake Video" what is a potential negative application that could cause great harm to well known people? 1) Committing fraud by creating a fake video that could be used to blackmail an individual or ruin their reputation 2) Allowing people caught on video saying extremely offensive things to deny it and insist it was a fake video 3) Turning all existing movies into Nicholas Cage Movies 4) Allowing people who have lost their voice to have synthetic voices

Committing fraud by creating a fake video that could be used to blackmail an individual or ruin their reputation

According to the "PM Essential Skills" video case, project managment is all about what? Linear relationships Complex Inter-relationships Ensuring nothing ever goes wrong Making to-do lists

Complex Inter-relationships

In a three-tier database architecture, what tier is used to model data? Abstract Physical Conceptual View

Conceptual

What capability in Excel allows you to highlight cells based on their values, add data bars that graph relative values in a range, or highlight duplicate values in a column of data? Pivot Table Sort Function Conditional Formatting Watch Window

Conditional Formatting

What role does the Internet Corporation for Assigned Names and Numbers (ICANN) serve in the global internet? Monitors internet traffic for illegal activity Manages authentication on VPN networks Coordinates the assignment of IP addresses through registrars Operates inter-exchange Network Access Points (NAPs)

Coordinates the assignment of IP addresses through registrars

According to the lecture, what are some possible incentives for innovations? 1) Copyright protection, patents, and prizes 2) Farmer's rights, instant return on investment, and brand protection 3) Trade secrets, commercial expertise, and product monopoly 4) Awards, public acclaim, and service placement

Copyright protection, patents, and prizes

What form of sustainable entrepreneurship focuses specifically on actions that appear to further some social good, beyond the interests of the firm and that which is required by law, and often denotes societal engagement of organizations? Traditional Entrepreneurship Corporate Social Responsibility Ecopreneurship Social Entrepreneurship

Corporate Social Responsibility

Which of the following aspects of a project plan informs the project team about the inter-relationships and inter-dependence of tasks and resouces? Critical Path Analysis Project Milestone Reporting Feasibility Analysis Variance Reporting

Critical Path Analysis

What term is used to describe a specific metric that often determines the success or failure of a task? Variance Analysis Key Performance Indicator Critical Success Factor Drill Down Task

Critical Success Factor

What type of addressing in Excel allows you to reference a cell or range in another worksheet in the same workbook? Worksheet Reference Cross-sheet reference Absolute Reference Relative Reference

Cross-sheet reference

"Collective Intelligence" is a term that is most closely associated with what concept presented in our class discussion? Telemedicine Crowdsourcing Crowdfunding Telepresence

Crowdsourcing

What term is used to describe the practice of evaluating requirements and brining direction and control over data and information? Data Visualization Data Governance Data Quality Data Warehousing

Data Governance

According to the "Future of Medtech" video case study, what is a potential new source of information to improve preventative care? Data from direct patient surveys technology companies Data from urgent care clinics and health-care providers Data from government agencies technology companies Data from consumer-focused technology companies

Data from consumer-focused technology companies

What technology enables natural interaction with virtual objects exclusively by hand gesture recognition? CAVE Data glove Samsung Gear VR Microsoft HoloLens

Data glove

__________________________ is an approach to managing information across an entire organization. Big Data Master data Master data management Data governance

Data governance

In general, a _____ _______ is a repository of historical data that are organized by subject to support central control by decision makers in the organization, while a _____ ________ is designed for the end-user needs in a strategic business unit (SBU) and support local rather than central control. 1) Data marts; data warehouses 2) Data marts; data dictionaries 3) Data warehouses; data dictionaries 4) Data warehouses; data marts

Data warehouses; data marts

In the Dashboard Data Quality case study on Covid 19, what technology decision made by the the Public Health of England (PHE developers) limited the spreadsheet rows of data and resulted in 15k+ covid 19 cases not being properly reported? 1) The PHE chose a Very old Lotus 123 Spreadsheet technology limited to 65,000 rows of data 2) The PHE developers Choose an open source Google Sheets spreadsheet limited to 65,000 rows of data 3) The PHE chose a new untested version of Microsoft Excel that threw errors if anyone loaded more than 65,000 rows of data 4) Data was lost because the PHE used an old Excel XLS file format that was limited to 65,000 rows of data

Data was lost because the PHE used an old Excel XLS file format that was limited to 65,000 rows of data

Which of the following is NOT considered a "fundamental" data type in Excel? Alphanumeric Value Date Null (Empty Cell) Numeric Value

Date

Which of the following types of wireless communication used as part of a connected vehicle architecture would have a line-of-sight range of approximately 300 meters? Satellite Communication Dedicated Short-Range Communication Bluetooth Communication Cellular Communication

Dedicated Short-Range Communication

What security approach are you using for your home network if you combine changing your AP (access point) name, adding a strong password to access your wireless network, and also separately password protecting devices on your network? Intrusion detection Tunneling Two-factor authentication Defense in depth

Defense in depth

When connecting to the U-System (u.arizona.edu) server for the first time, WinSCP displays the warning message "the server's host key was not found in the cache," as shown below. This warning is related to what aspect of creating a channel for secure data transmission? Defining the list of authorized users allowed to upload files to the U-System server Defining the encryption standard (e.g., DES, RSA, AES) to be used during transfers Defining the the U-System server as a trusted endpoint for tunneling Defining the value of the private key to be used during transfers

Defining the the U-System server as a trusted endpoint for tunneling

According to Fred Brooks, the author of the Mythical Man Month, when planning a project, the most time should be planned for which of the following activities? Design Unit/component testing Coding System testing

Design

Validation of the model occurs in the _______ phase of the Decsion Making Process (Intelligence, Design, Choice, or IDC) . 1) Implementation 2) Choice 3) Design 4) Intelligence

Design

You create a screen shot illustrating what the new system will potentially look like. This is part of the ________ stage of the SDLC. Analysis Design Investigation Programming and testing

Design

Which of the following has the strategy "I am better because I am different"? Operational effectiveness Cost leader Innovation Differentiation Customer oriented

Differentiation

What term is used to describe virtual representations of physical assets used for modeling and prediction of energy resources? Smart Monitoring Virtual Energy Reality Digital Twins Fintech Solutions

Digital Twins

A business intelligence tool that uses abstractions such as color and graphical images like instrument gauges to allow executives to grasp business situations quickly is known as a: 1) Expert system 2) Planning Horizon 3) Geographic information system 4) Neural network 5) Digital dashboard

Digital dashboard

What is an example of a Universal Design approach that can be used to improve the accessibility of videos presented in class? Including a URL that links to the video on YouTube Using high-resolution video formats, such as 4K or HD Displaying open captions Including the video PPTs posted prior to class

Displaying open captions

What type of innovations are intended to be incompatible with existing standards and value chain, and must develop markets de novo (latin for "from the beginning")? 1) Application Innovation 2) Disruptive Innovation 3) Profit Innovation 4) Platform Innovation 5) Product Innovation

Disruptive Innovation

Which of the following was NOT described as one of the four innovation zones? 1) Product Leadership Zone 2) Operational Excellence Zone 3) Category Renewal Zone 4) Disruptive Technology Zone 5) Customer Intimacy Zone

Disruptive Technology Zone

What type of DBMS (Database Management System) architecture stores information on an interconnected networked of database servers? Centralized Database Distributed Database Organizational Database Client/Server Database

Distributed Database

What type of DBMS (Database Management System) architecture stores information on an interconnected networked of database servers? Client/Server Database Organizational Database Distributed Database Centralized Database

Distributed Database

As discussed in our Topic Overview lecture, what professor at UArizona developed a virtual simulation experience called Virtual Harlem to allow students to engage, experience and be excited about their studies of the Harlem Renaissance? Dr. Jay Nunamaker Dr. Sudha Ram Dr. Bryan Carter Dr. Hsinchun Chen

Dr. Bryan Carter

What is the name of the MIS professor that is a University of Arizona Regents Professor and founder of the Center for the Management of Information? Dr. Sudha Ram Dr. Hsinchun Chen Dr. Jay Nunamaker Dr. Joe Valacich

Dr. Jay Nunamaker

Who said MIS is about "Solving real problems for real people"? a) Steve Jobs b) Dr. Sudha Ram c) Dr. Jay Nunamaker d) Admiral Grace Hopper

Dr. Jay Nunamaker

Which UofA MIS Researcher developed a system to use anonymized WiFi Data to identify person-density in buildings and spaces at the University using temporal and spatial data to help fight Covid-19? 1) Dr. Hsinchun Chen 2) Dr. Sudha Ram 3) Dr. Sue Brown 4) Dr. Jay Nunamaker

Dr. Sudha Ram

____________, also know as data integration, is one of the growing number of ways that source system data can be handled. SAP ETL SQL EDI

ETL

The EC Hosting process of downloading a file from D2L to your local computer, modifying the file as required by the assignment, and then uploading the file to the U-System (u.arizona.edu) website hosting server is similar to what other process that we discussed earlier in the semester? SDLC (Systems Development Life Cycle) ETL (Extract-Transform-Load) TCP Data Transmission Data Visualization

ETL (Extract-Transform-Load)

IT has changed the manager's job in many ways. Which of the following is NOT the result of this change? Remote supervision More information to address Real-time information Easier to make a decision

Easier to make a decision

When Warren Buffet evaluates a company's past performance based on reviewing their historical earnings per share (EPS) results, what method is being used to make this quantitative decision? Modeling and Simulation Economic Analysis Decision Tree Case-base reasoning

Economic Analysis

What is the name of the fast and secure wireless network that is available to members of the UArizona campus community when visiting other educational and reserarch institutions across the United States and around the world? EduHotspots UAGuest OpenWireless Eduroam

Eduroam

In the case study "IT's About Business 1.3," (at the beginning of section 1.4 of the textbook), ________ is the Internet on a portable hard drive. Vistar AlaMesa El Paquete Semanal Revolico

El Paquete Semanal

All of the following were described by Raytheon as benefits of using the S3D Cave Automatic Virtual Environment as a "common language of visualization" except: Allows much quicker changes to technical specification Allowed Raytheon to upsell customers during product demonstrations Cost savings over creating physical missile prototypes Eliminated the need for consulting clients in the design phase

Eliminated the need for consulting clients in the design phase

All of the following were described by Raytheon as benefits of using the S3D Cave Automatic Virtual Environment as a "common language of visualization" except: Eliminated the need for consulting clients in the design phase Allows much quicker changes to technical specification Cost savings over creating physical missile prototypes Allowed Raytheon to upsell customers during product demonstrations

Eliminated the need for consulting clients in the design phase

In terms of internet speed (bandwidth), which of the following applications generally has the lowest recommended speed (bandwidth) requirements? Social media Video calls and conferencing Email Online gaming

Email

All of the following items was described as being keys attribute of a creating a good person brand, according to Paul Argenti from the Tuck School of Business at Dartmouth University, EXCEPT: Embellishing personal accomplishments, experience and qualifications Assuring that your your brand is attuned to the environment that you're operating in Planning the way in which your imagine, resume, and business cards look Ensuring alignment between who you are and how you present yourself

Embellishing personal accomplishments, experience and qualifications

The Gainesville police department started using the internet to accomplish all of these objectives except? 1) Enable individual citizens to better protect themselves from criminal activity. 2) Demystify law enforcement operations for the citizens of Gainesville. 3) Motivate community groups to have a stronger hand in addressing crime. 4) Empower businesses to identify high crime areas and determine appropriate levels of security.

Empower businesses to identify high crime areas and determine appropriate levels of security.

_________ is an access control. Radio Frequency Identification (RFID) Encryption A firewall A company gate

Encryption

Which of the following is an advantage of the traditional SDLC? Involves many users in the development process Works wells for ill-defined problems Bypasses the IS department and avoids delays Enforces quality by maintaining standards

Enforces quality by maintaining standards

As discussed in the Neuro-ID video case study, in addition to measuring a customer's "friction" (e.g., frustration or satisfaction), the system also is able to measure what security-related aspect of customer "intent"? Changing their physical location while using an application Deactivating VPN encryption before making a purchase Entering data in a way associated with fraudulent behaviors Making a purchase at an unusual time of day

Entering data in a way associated with fraudulent behaviors

According to our FIP lecture and the slides from Dr. Matt Mars, what term is used to describe development and implementation for advancing innovative solutions to economic, environmental, social, and/or technological problems or opportunities? Civic Leadership Entrepreneurial Leadership Social innovators Private-sector Leadership

Entrepreneurial Leadership

What is considered the market-oriented mechanism for advancing the value proposition of innovation? Applications Acquisition Migration Entrepreneurship

Entrepreneurship

________ is NOT a problem caused by computers. Job stress Ergonomics Carpal tunnel syndrome Repetitive strain injuries

Ergonomics

According to IT's About Business 6.1, ________ is the world's most isolated country when it comes to telecommunications access. 1) Ethiopia 2) Cuba 3) Eritrea 4) Belarus

Eritrea

Often presented visually on an executive dashboard, what type of report focuses attention on business processes whose performance falls outside of the tolerance ranges defined a KPI metric? 1) Annual 2) Ad hoc 3) Batch 4) Exception 5) Drill-down

Exception

According to the Accessibility and Inclusion for All video case, what technology are some car manufacturers using on their production lines to open jobs to individuals who might not have been able to perform the job previously? Screen readers Adjustable-height work surfaces Voice-recognition Exoskeletons

Exoskeletons

________ deals with more objective, rational, and technical knowledge. Explicit information Explicit knowledge Tacit information Tacit knowledge

Explicit knowledge

In the Excel expression "=VLOOKUP(5, B4:H16, 3, range_lookup)", what value should be used for range_lookup to return a value only when the lookup value in the table_array matches "5"? =VLOOKUP(lookup_value, table_array, column_index_number, range_lookup) Range=9 TRUE FALSE Row

FALSE

As described in the Relationship-based Organizing video case, information from what social media platform is used to improve the effectiveness of campaign worker's persuasion voter outreach activities? Facebook YouTube LinkedIn Twitter

Facebook

Although it's not commonly available to most homes, which of the following wired technologies would provide the fastest data transmission speeds if all of these were available as choices to an individual for their "last mile" network connectivity? Cable Data Networks POTS (Plain Old Telephone Service) Dial-up Fiber optics (aka, Fiber-to-the-home or FTTH) DSL (Digital Subscriber Lines)

Fiber optics (aka, Fiber-to-the-home or FTTH)

Which of the following was NOT identified by Ted Codd as a weakness of the hierarchical data storage model used for organizing files on a computer system? The same file could be stored in multiple places File names were limited to 8 (eight) characters All searches were required to use a top-down approach The most current version of the file could be stored anywhere

File names were limited to 8 (eight) characters

In the Total Economic Impact methodology, what aspect of the model is based on the Nobel Prize winning work of Black, Merton, and Scholes in finance that is commonly referred to as the Black-Scholes equation? Risk Assessment Finanical Value of an Option Cost Reductions Future Benefits

Finanical Value of an Option

As discussed in the Forrester TEI video case, TEI (Total Economic Impact) helps make a business case that considers not only the traditional ROI (Return on Investment) measures of Costs and Benefits, but add assessments of risk and what other dimension? Sustainability Flexibility Vulnerability Profitability

Flexibility

What type of visualization is often used to show multi-step quantities where there is attrition or refinement? Histogram Chart Funnel Chart Box-and-whisker Chart Pie Chart

Funnel Chart

Which of the following is NOT a dimension that makes up the holistic approach to collaboration? People Process Globalization Technology

Globalization

Which of the elements of the Interactive Public Commons described in the "Democracies Online" would be most closely aligned with the examples of how Arizona and Minnesota state legislatures use live streaming to expand access to their committee meetings and floor sessions? Private Sector Media and Commercial Content Government Civic Participation

Government

What term is used to describe a broad array of technologies associated with improving environmental sustainability and energy and other resource efficiencies? Greentech Sustaintech Cleantech Ecotech

Greentech

A smart ID card is something the user _______. Does Has Knows Is

Has

Microsoft Windows uses what type of file system to store your documents? Relational Accessible Flat Hierarchical

Hierarchical

Which of the following would be an example of a programming construct that is a logical function that evaluates a single condition and results in only one value? IF Function WHILE Function FOR Function SUM Function

IF Function

n the "Decision Tree for Buying a Car" example discussed in class, which of the following "IF" statements would correctly identify a "BUY" decision? IF tested = 'no' and mileage = 'low' THEN -> 'BUY' IF tested = 'yes' and mileage = 'high' and age = 'old' THEN -> 'BUY' IF tested = 'yes' and mileage = 'high' and age = 'recent' THEN -> 'BUY' IF tested = "yes" and mileage = 'high' THEN -> 'BUY'

IF tested = 'yes' and mileage = 'high' and age = 'recent' THEN -> 'BUY'

What technology has seen the largest increase in venture funding for products and services related to well-being and care delivery? IOT (Internet of Things) Digital Medical Devices Non-medical Hardware Artifical Intelligence (AI), Machine Learnign (ML), and Deep Learning

IOT (Internet of Things)

________ addresses consist of 32 bits and historically has been the most commonly used IP addressing scheme. 1) IPv2 2) IPv4 3) IPv6 4) IPv8

IPv4

The adoption of __________ has been an important factor in the development and rapid expansion of the Internet of Things. 1) IPv1 2) IPv4 3) IPv6 4) IPv8

IPv6

A(n) ________ is a company that provides Internet connections for a fee. 1) NAP 2) NSP 3) ISP 4) IXP

ISP

According to Wikipedia, what term is used to describe a graphic image (icon) associated with a particular Web page and/or Web site and can serve as a visual reminder of the Web site identity in the address bar or in tabs? Backgrounds Style Sheet CSS Keyframes Icons or Favicons

Icons or Favicons

Which of the following would not be associated with the POUR principle of "operable"? Provide sufficient time to read and use content Include a text alternative for non-text elements Make all functionality available from a keyboard

Include a text alternative for non-text elements

In terms of the "Believability" of the anticipated benefits resulting from an ROI investment, whcih of the following would have he lowest level of believability of achieving the anticipated ROI? Actual reductions in cost Increases in manager productivity Expected reductions in cost Increases in worker productivity

Increases in manager productivity

When off campus, using a VPN when accessing campus information systems affords all of the following advantages except: Transmitted information is protected by encryption Your computer will use an on-campus network (IP) address, hiding your actual physical location Authenticated access to protected UArizona Library resources and and databases Increases the speed of your broadband connection to the internet

Increases the speed of your broadband connection to the internet

What type of voters are most commonly targeted by a Get-Out-The-Vote (GOTV) campaign strategy? Individuals who sometimes vote for our party (swing voters), and always vote in an election Individuals who always vote for our party, and always vote in an election Individuals who sometimes vote for our party (swing voters), but never vote in an election Individuals who always vote for our party, but don't always vote in an election

Individuals who always vote for our party, but don't always vote in an election

______________ is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others. Profiling Code of ethics A digital dossier Information privacy

Information privacy

What project originally began in 1969 as the ARPAnet under the Advanced Research Project Agency (ARPA) of the U.S. Department of Defense? Web browsers Internet Satellities VPNs

Internet

The deliverable for the ________ stage of the SDLC is a go/no go decision. Analysis Design Programming and testing Investigation

Investigation

Biometrics is something the user _______. Does Has Knows Is

Is

With respect to establishing your CatCard as a trusted credential in a multi-factor authentication process, what role does the UArizona CatCard office serve? Intrusion Detection Authority Accountability Authority Proctor Authority Issuing Authority

Issuing Authority

Which of the following would NOT typically be an advantage of renting a DSL or cable home modem from your ISP provider? Your ISP upgrades your modem as technology changes, generally at no additioanl cost It is usually much less expensive in the long run if you stay with the same ISP for years Allows you to return unneeded equipment to your ISP if you move frequently Ensures you modem is compatible with the technical requirements of your ISP's network

It is usually much less expensive in the long run if you stay with the same ISP for years

According to IT's About Business 6.2, Google Fiber was first deployed in ________. 1) San Diego 2) Kansas City 3) Charlotte 4) Atlanta

Kansas City

Business metrics that describe the performance of critical business activities are known as: 1) Key performance indicators 2) Decision trees 3) Business intelligence analyses 4) Business continuity plans 5) Residual risk assessments

Key performance indicators

According to Accenture, what should you be scanning for when reviewing descriptions of ideal jobs to help you build an online profile that contributes to your job search process? Locations where a company plans to hold job fairs Names of hiring managers to call for an interview Keywords to use on your online profile Salary ranges and benefits to request during an interview

Keywords to use on your online profile

Who was Harald Blaatand "Bluetooth" II? Name of a Scandinavian Science Fiction Character The name of the Bluetooth Technology Inventor's Dog Calligrapher who designed the Bluetooth logo King of Denmark from 940 to 981

King of Denmark from 940 to 981

Being able to reuse information that is created contributes to what critical success factor (which is also know as a key factor) for a high ROI (Return on Investment)? Breadth Knowledge Collaboration Cost

Knowledge

Ethernet is a technology most commonly associated with ________s. 1) MAN 2) WAN 3) PAN 4) LAN

LAN

What term is used to describe the connection between an internet service provider and the customer, i.e., into your home? Revenue Mile First Mile Middle Mile Last Mile

Last Mile

Which of the following is a fast-growing company that is disrupting the traditional job recruiting industry? LinkedIn Google Facebook Amazon

LinkedIn

Learning outcomes for Active Learning include empowering people to be able to do all of the following actions, except: Create Analyze List Evalute

List

As Medtech and Healthtech incorportate Artificial Intelligence, Machine Learning and Deep Learning into patient care systems, what risk must be considered and managed? Litigation Risks Related to Using Algorithms to Provide Medical 'Advice' Additional costs of regulation Dramatic increases in the cost of developing new computer systems Refusal of patients to release EMRs (Electronic Medical Records)

Litigation Risks Related to Using Algorithms to Provide Medical 'Advice'

Which of the following is not considered one of the shifts identified by the United Nations related to achieving a sustainable planet in the Digital Age? Accelerate Innovation Enable Alignment Mandate Compliance Mitigate Negative Impacts

Mandate Compliance

With respect to financial accounting, the term equity is used to describe the ownership of a company. Which of the following concepts would NOT be another term related to a company's "equity" in this context? Book value Accounting value Market value Assets - Liabilities

Market value

According to the video "What is a Paradigm Shift?", what company was discussed as being an example of a company capitalized on a paradigm shift due to people wanting to "get their food on the go"? McDonald's Restaurants Circle K Convenience Stores Chili's Restaurants Rudy Tuesday's Restaurants

McDonald's Restaurants

According to the video case on the Productivity Paradox, Goldman Sachs believes which of the following causes is the primary reason for the slowing in productivity growth? Mismangement Redistribution Time Lags Measurement Error

Measurement Error

4.5 As discussed in All ABout Business 4.5, who assumes all of the risk in credit card transactions and suffer most of the financial damages when a fradulent transactions is made? Credit Card Companies Insurance Companies Mechants Customers

Mechants

All of the following industries focus on incorporting virtual reality before the sale to allow clients and customers to "see" and experience projects and products except: Retail (Lowe's, IKEA, and Cruiseabout) Real Estate (Real Estate Agencies) Architectural Design (Architects) Media Companies (Disney)

Media Companies (Disney)

What term is used to describe the approach taken by companies such as MagicLeap.com where physical and digital objects are able to co-exist and interact in real time? Virtual Reality Augmented Reality Blended Reality Mixed Reality

Mixed Reality

For the most residential ADSL and Cable network plans, upload (from the customer's network to the internet) data transmission speeds are generally: Much faster than download (from the internet to the customer's network) data transmission speeds Always the same as the download (from the internet to the customer's network) transmissions speeds Much slower than download (from the internet to the customer's network) data transmission speeds

Much slower than download (from the internet to the customer's network) data transmission speeds

________ are exchange points for Internet traffic. 1) NAPs 2) ISPs 3) IAPs 4) NSPs

NAPs

According to IS's About Business 3.4, which of the following insurance companies was NOT identified as offering usage-based automobile insurance. Progressive Allstate Nationwide State Farm

Nationwide

The Decision Support Rule Induction strategy commonly uses which of the following programming constructs to make a recommendation? Conditional Formatting Statements Iterative FOR Statements Nested IF Statements Conditional WHILE Statements

Nested IF Statements

What company offered a cash prize as part of their product development strategy that was similar to the approach discussed in the crowdsourcing video case where the British government in 1714 to find a way to make sailing the oceans safer? Starbucks Netflix Royal Paper Kiva

Netflix

When designing a security-in-depth strategy, firewalls and VPNs would be examples of what type of control? User Privileges Application Intrusion Detection System Network Access

Network Access

In order to reduce the physical wear and tear of contact practicing plays when training for competition, the NFL has used virutal reality to limit all of the following except: Training camp "two-a-day" practices Off-season practices Number of plays in a team's playbook Contact practices

Number of plays in a team's playbook

In Excel, a date, such as 2/1/2022, is represented internally by Excel as: Comment Numeric Value Alphanumeric String Operator

Numeric Value

Films produced using what VR recording technology permit the audience to view an entire envornment in every scene? Optical storage devices Omnidirectional cameras Wearable computers Gesture recognition interfaces

Omnidirectional cameras

What term is used to descript a set of functionalities that facilitate multi-dimensional data analysis for faster, more informed decision making? Knowledge Management On-Line Analytical Processing Weighted Decision Making Artifical Intelligence

On-Line Analytical Processing

Commonly occurring and well-defined business activities such as scheduling employees work hours would be what category of organizational decision? Operational Strategic Management Fuzzy

Operational

___________________ control is executing specific tasks efficiently and effectively. 1) Operational 2) Tactical 3) Management 4) Strategic

Operational

Increased visibility, Tracking, Traceability and Higher Quality are all attributes of what type of benefits for tracking items using RFID tags? Operational Benefits Legal Benefits Technical Benefits Product Benefits

Operational Benefits

________ rely entirely on readers for their power, are less expensive, and can be read only up to 20 feet. 1) Active QR symbols 2) Passive QR symbols 3) Active RFID (Radio Frequency Identification) devices 4) Passive RFID (Radio Frequency Identification) devices

Passive RFID (Radio Frequency Identification) devices

Which of the following terms is considered as an excellent measure of risk and provides an estimate of the time period needed before the net savings equals the initial cost? Equity Value Analysis Net Present Value Payback Period Internal Rate of Return

Payback Period

Hampton Virginia is stimulating Citizen Engagement in government in many ways. According to a study, Hampton citizens quality information included all of the following characteristics except? 1) Timely 2) Accurate 3) Personal 4) Complete

Personal

In the Neuro-ID video case "Intention, Friction and Fraud", all of the following are used to assess the behavior of online users, except: Advanced Machine Learning Personally Identifiable Information Real-time Behavioral Analytics Neuro-Cognative Research

Personally Identifiable Information

You decide to implement the manufacturing component of SAP followed by the financial component next. This is called a __________________ conversion. Parallel Pilot Direct Phased

Phased

What name is used to describe a network of connected Bluetooth devices? NFCnet Piconet Bluenet MiFiNet

Piconet

______________ is a privacy tool available to consumers that automatically communicates privacy policies between an electronic commerce web site and the visitors to that site. Photo tagging A digital dossier An information privacy policy Platform for Privacy Preferences (P3P)

Platform for Privacy Preferences (P3P)

What term is used to describe the use of real-time data, analysis and automated application technologies to optimize the use of inputs such as fertilizer, pesticides and water enabling farmers to produce more and waste less? Sustainable Agriculture Upstream Precision Agriculture Controlled Environment Agriculture Vertical Farming

Precision Agriculture

Although not an exact equivalent, the first column in a VLOOKUP table_array serves a role that is similar to what database concept? Primary Key Database record Foreign Key Database table

Primary Key

According to enhanced reality pioneer George Papagiannakis, creating a believiable interface using the tools of immersion, presentation, and interaction depends on correctly mapping all of the following elements except: Personality Physical Information Emotion Prior experience

Prior experience

What type of innovation focuses on the supply side, looking for opportunities to remove non-value-adding steps from the workflow? 1) Enhancement Innovation 2) Process Innovation 3) Value-Engineering Innovation 4) Organic Innovation 5) Value Migration Innovation

Process Innovation

What term is used to describe the checkpoints that occur during a project that also represent critical success factors (CSFs) for the project? Work Breakdown Structures Variance Reports Project Milestones Feasibility Studies

Project Milestones

When analyzing information using a data cube, what term is used to describe the process of combining (summing) all data for one dimension of a data cube into a single value, such as adding quarterly sales amounts into the total sales for a year? Reduction Consolidation Projection Aggregation

Projection

Meaning "the place or source of origin", what term did IBM use as one of the benefits of using blockchain as the technology to create a system of record? Finality Concensus Provenance Immutability

Provenance

Having information about person's voting history (i.e., submitting a ballot on election day, early voting site, a mail-in ballot, or participation in a partisian primary) would most likely be used by a blockwalker (campaign outreach worker) as a part of a strategy for engaging persons who are classified as "sometimes voters" for the campaign worker's political party in what way? Providing assistance with changing a voter's party affiliation Offering information about times and places that would be easy for the "sometimes voter" to donate money to a candidate's campaign Offering persuasive information about candidate's positions Providing accistance on how, when and where to cast a ballot in an upoming election

Providing accistance on how, when and where to cast a ballot in an upoming election

Which of the following data protection principles enshrined in the Eurpoean Union's General Data Protection Regulation (GDPR) should be considered when your analysis include fields whose data was not originally collected to be part of your analysis, such as the example in class where we included information about whether a student lived in a reidence hall when analyzing exam grades? Data Minimization Storage Limitations Accountabilty Purpose Limitation

Purpose Limitation

Which of the following data protection principles enshrined in the Eurpoean Union's General Data Protection Regulation (GDPR) should be considered when your analysis include fields whose data was not originally collected to be part of your analysis, such as the example in class where we included information about whether a student lived in a reidence hall when analyzing exam grades? Storage Limitations Accountabilty Purpose Limitation Data Minimization

Purpose Limitation

________________ are smaller because they store information both horizontally and vertically. 1) QR codes 2) Bar codes 3) Passive RFID tags 4) Active RFID tags

QR codes

What type of decision method relies on information that is NOT easily measureable, such as assessing the business alignment of a project with corporate objectives? Economic Decisions Qualitative Decisions Quantitative Decisions Backward Decisions

Qualitative Decisions

Which of the following visualizations is used to compare common trends and characteristics using the area and shape of the displayed information? Line Chart Scatter Chart Candlestick Chart Radar Chart

Radar Chart

According to our FIP lecture, the amount of value accumulation over time will be the greatest with what type of innovation? Sustaining innovation Incremental innovation Novelty innovation Radical innovation

Radical innovation

Which of the following was NOT considered a challenge confronting the widespread adoption of telemedicine? Licensure of caregivers Reduced travel for physicians Reimbursement by insurance Accreditional of telemedicine programs

Reduced travel for physicians

Although useful in a variety of applications, which of the following applications of VR technology was considered the logical starting point by the NFL? Helping injured players continue their training Assisting coaches in recruiting players on the road Teaching new players who do not get as much training time as starters Reinforcing actual practice repetitions for quaterbacks

Reinforcing actual practice repetitions for quaterbacks

How does adding a repeater in a home data network impact data tranmission latency? Repeater retransmissions significantly add to network data tranmission latency Network latency is not impacted by adding a repeater Repeater retransmissions are used to eliminate network data tranmission latency entirely Repeater retransmissions significantly reduce network data tranmission latency

Repeater retransmissions significantly add to network data tranmission latency

Which of the following is a decisional role? 1) Analyzer 2) Spokesperson 3) Liaison 4) Resource allocator

Resource allocator

n the Total Economic Impact methodology, using best and worst case estimates to determine the overall estimated value for costs is an example of which of the following four dimensions? Risk Adjustment Impact on Business Processes Options Available Impact on IT Services

Risk Adjustment

As discussed in the "Eye on Oversight" video case, what term is used to describe an agency's ability to be proactive and identify vulnerabilities? Risk Management IT Controls Cybersecurity Resiliency

Risk Management

_______________ is a process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan. Risk Risk analysis Risk management Risk mitigation

Risk mitigation

What the name of the device that is accessed using a public IP (Internet Protocol) address for the external internet while forwarding traffic from your home network devices that use private addresses assigned using Network Address Translation (NAT)? Bridge Modem Router Codec

Router

Which of the following Decision Support Strategies use conditional execution to make a recommendation? Case-based Reasoning Nearest Neighbor Technique Rule Induction Neural Networks

Rule Induction

Which of the following Decision Support Strategies use conditional execution to make a recommendation? Neural Networks Rule Induction Case-based Reasoning Nearest Neighbor Technique

Rule Induction

According to the "what is a database" video case, what is the name of the database language that makes it possible to easily manage the requested data? COBOL (Common Business Oriented Language) HTML (Hypertext Markup Language) SQL (Structured Query Language) NLP (Natural Language Processing)

SQL (Structured Query Language)

Which of the following Excel functions will return the total value of a number of cells in a range by adding the values that match specified criteria? SUMIF AVERAGEIF COUNTIF SUBTOTAL

SUMIF

Which of the following is NOT commonly considered to be one of the project management "triple constraints"? Scale/Quantity Schedule/Time Cost/Resource Scope/Quality

Scale/Quantity

When determining the critical path for a project, which of the "triple contraints" determines the critical path? Scope/Quality Cost/Resources Schedule/Time

Schedule/Time

Internet Assigned Numbers Authority (IANA) distinguishes the following groups as valid Top Level Domains (TLDs), except: Secure top-level domains (sTLD) Internationalized country code top-level domains (IDN ccTLD) Country-code top-level domains (ccTLD) Generic top-level domains (gTLD)

Secure top-level domains (sTLD)

What term refers to structures that use data collection, integrated processes, smart engineering or creative design to self-regulate and optimize the building's environment and operations which can capture changes within the building and enable the building to self-learn and automatically modify or customize its settings? 3D Printed Buildings Disruptive Buildings Smart Buildings Digital Building Passports

Smart Buildings

According to Siemens Enterprise Communications, what is one of the most effective routes to stealing confidential data from organizations? Brute-force Hacking Keyloggers Social Engineering Denial of Service Attacks

Social Engineering

Phishing emails use what approach to acquire personal information and exploit victims for financial gain? Keyloggers Brute force password cracking Social Engineering Denial of Service

Social Engineering

In the video case for Nestle, data-driven decisions were primarily based on visualizations of information from what source? Cost and Production Schedules Financial Performance Reports Investment Analyst Forecasts Social Media Platforms

Social Media Platforms

According to the Physical vs. Logical Topologies Video Case, what type of network topology is the most common physical topology? Bus Topology Mesh Topology Star Topology Ring Topology

Star Topology

What type of Intrusion Detection and Prevention System (IDPS) uses a normal traffic baseline, alerts when traffic levels fall outside expected clipping (acceptable or anticipated) levels? Network-based Signature-based Statistical Anomaly-based Host-based

Statistical Anomaly-based

Identifying majors with specific language and mathematics requirements using the Degree Search selection filters help you solve what type of business problem? Strategic Fuzzy Structured Unstructured

Structured

_____________ is a disadvantage of twisted-pair wire. 1) Difficult to work with 2) All of these options are disadvantages 3) Relatively expensive and inflexible 4) Subject to interference

Subject to interference

In the Breakthrough Energy Catalyst video case, investments are being made to develop technologies to convert biological inputs, including municipal waste, into what product? Green Hydrogen Long-duration Energy Storage Direct Air Capture Sustainable Aviation Fuel

Sustainable Aviation Fuel

According to the Voter Identification Matrix analysis of eligible (registered) possible voters, which of the following groups of voters were NOT seen as being in a category that campaigns were advised "Don't waste your resources on.." when planning campaign outreach? Swing voters who always vote People who always vote, and vote for our party People who always vote against our party People who will never vote

Swing voters who always vote

Which of the following is software modeling tool that is commonly used for more advanced business intelligence visualizations? Tableau Linux Adobe Illustrator Python

Tableau

________ is the cumulative store of subjective or experiential learning. Explicit knowledge Tacit information Explicit information Tacit knowledge

Tacit knowledge

_______________ is knowledge that is generally imprecise, costly to transfer, and difficult to formalize or codify. 1) Data 2) Explicit knowledge 3) Tacit knowledge 4) Information

Tacit knowledge

In an RFID system, where would the unique data identifying an item typically be found? Tag Computer Reader Receiving Antenna

Tag

In 2006, the National Federation of the Blind filed a lawsuit against company because their ecommerce website was not accessible as required by ADA? Amazon Target Walmart Macy's

Target

What type of investrment analysis focuses on historical returns and price changes, to chart patterns that can be used to estimate future price movement for securities and the larger market? Technical Analysis Quantitative Analysis Transactional Analysis Fundamental Analysis

Technical Analysis

All of the following were discussed as "ingredients" that make up a successful approach to the Universal Design for Learning (UDL) methodology EXCEPT what? Variability Context Goals Technology

Technology

Which of the following technologies would provide the level of social interaction necessary to build relationships? Web conferencing Contact management Telepresence Video streaming

Telepresence

_________ is a system in which any object, natural or manmade, has a unique identity and is able to send and receive information over a network without human interaction. 1) The IoT (Internet of Things) 2) A mobile portal 3) UWB (Ultra Wideband) 4) A wireless network

The IoT (Internet of Things)

What does an SSID (Service Set Indentifier) identify on wireless network? Type of data encryption (e.g., WEP, AES, etc.) to be used when connecting to the wireless network The protocol used by the NICs (Network Interface Cards) on the wireless network The name of the base station (aka access point name) a computer uses to connect to the wireless network The name of the DNS (Domain Name Service) to be used by devices on the wireless network

The name of the base station (aka access point name) a computer uses to connect to the wireless network

What basis did an NFL executive use for recommending the VR company STriVR charge professional football teams $250,000 for its product? The system would be like "picking up half a coach" The NFL teams cannot spend more than $250,000 for software without approval of the league NFL teams were not buying the STriVR application because the original price of $500,000 proposed by STriVR was considered as too high The average salary for new players in the NFL was $250,000

The system would be like "picking up half a coach"

If the evaluation of the first parameter of an Excel IFERROR function (shown in bold/underlined in the example below) does NOT return an error (e.g., #N/A), what value does the IFERROR function return? =IFERROR( VLOOKUP(H15,D$11:F$19,3,FALSE), "Unknown" ) The value of the second parameter The value "FALSE" The value of the first parameter The value "TRUE"

The value of the first parameter

According to the video case discussing economic opportunities to make money with AR, VR, and 360 video content, what is the major difference between virtual reality and 360 video? VR video content has lower resolution than 360 video content The way the user moves through the content Social media sites, such as YouTube and Facebook, do not support 360 video content The cost of producing 360 video content is significantly higher

The way the user moves through the content

In a cross-sheet reference, why would it be necessary to enclose the worksheet name in single quote marks (e.g., 'Customer Data'!A1)? The worksheet name has an embedded space The worksheet being referened is read-only The worksheet name includes a reserved word The data being referenced is a text string

The worksheet name has an embedded space

In the "Introducing Cellular V2X" video case, all of the following were identified as common benefits of using vehicle communications technologies such as 802.11p DSRC (Dedicated Short Range Communications) except: Fewer Accidents Less Congestion Reduced Emissions Theft Prevention

Theft Prevention

All of the following are limitations of bar codes, except: 1) They can be easily ripped, soiled, or lost. 2) They don't identify the item's manufacturer and product 3) They require line of sight to be scanned 4) They don't identify individual item by serial number

They don't identify the item's manufacturer and product

Which of the following issues discussed in our class discussion related to explaning the productivity paradox in terms of the experience of the employees or fully integrating a new information systems with other existing (legacy) information systems? Measurement Problems Redistribution Mismangement Time Lags

Time Lags

Which of the following issues discussed in our class discussion related to explaning the productivity paradox in terms of the experience of the employees or fully integrating a new information systems with other existing (legacy) information systems? Measurement Problems Time Lags Mismangement Redistribution

Time Lags

Which of these is NOT enumerated as a Motivation to Create Accessible Web Content? 1) To capitalize on the a wider audience or consumer base (marketing or economic-centered motivations) 2) To improve the lives of people with disabilities (human-centered motivations) 3) To improve the reliability of technical functionality (technology centered motivations) 4) To avoid lawsuits and/or bad press (public relations and punishment-centered motivations)

To improve the reliability of technical functionality (technology centered motivations)

Using force feedback is an example of how virtual reality systems incorporate what human sense into their virtual environments? Sound Touch Sight Smell

Touch

In the video case "RFID Creates Value in Retail," all of the following were identified as steps businesses should take to create actionable information through the use of RFID (Radio Frequency Identification) except: Training retail employees on how RFID sensors are able to collect data from tagged products Tagging products with RFID tags at the item level Using business intelligence tools to provide real-time insights for decision making Integrating data from RFID tagged products into information systems to give the data shape and meaning

Training retail employees on how RFID sensors are able to collect data from tagged products

The process used to move data from one data repository to another is referred to as Extract, ________, and Load. Analyze Translate Migrate Transform

Transform

Which of the following scanning and analysis risk management techniques would not commonly be considers as a type of vulnerability assessment focused on profiling? Trap-and-Trace Honeypots Footprinting and FIngerprinting Packet Sniffers Port Scanning Utilities

Trap-and-Trace Honeypots

What type of visualization allows a decision make to compare the releative amounts of subcategories to each other, but also to understand their relative portion of the whole category? Scatter Chart Treemap Waterfall Chart Bubble Chart

Treemap

_____________ is the most prevalent form of communications wiring. 1) Wireless 2) Twisted-pair wire 3) Fiber optics 4) Coaxial cable

Twisted-pair wire

Which of the following web hosting services is acceptable for the EC Hosting assignment? Wix Hosting Service GoDaddy Hosting Service Any Commercial Web Hosting Service U-System (UArizona's Web Hosting Service)

U-System (UArizona's Web Hosting Service)

Which of the following computer ports is a multi-function, bus-oriented (up to 127 devices), high-speed serial interface? Modem Port VGA Port USB Port DVI Port

USB Port

Your attitude, existing relationships, professional role, education, skills and training, and philanthropic efforts all contribute to identify what aspect of your personal brand? Brand risk Digital dossier Unique Selling Proposition Economic Value

Unique Selling Proposition

During the "Define Interaction" phase of a User Centered Design process, what method is used to model user behaviors prior to the actual design of the UI? Decision Trees Prototypes Use Cases Surveys

Use Cases

What recommendation did Don Norman have to improve a design model when designing for the disabled? Translating instructions into a braille format Using rapid prototyping Hiring designers with specific disabilities Offering users better training

Using rapid prototyping

In the TechInsider video case, hackers we able to defeat the two-factor authentication used to protect the account of Deray McKesson by doing what? By stealing Deray McKesson's telephone in order to receive the authentication codes Using social engineering to get Deray McKesson to send them a 6-digit authentication code By getting Deray McKesson to text the hackers an authentication within 60 seconds Using social engineering to get Verizon to activate a new SIM card for his phone

Using social engineering to get Verizon to activate a new SIM card for his phone

When adding a pivot table comparison (analysis) field, where would you define the calculation (e.g., SUM, AVERAGE, COUNT, etc.) to be used when displaying the value for a group of data? As a "Filter" setting on the fields list pulldown menu By adding an equation to the field under "Rows" field setting Using the "Format Cells" option Using the "Value Field Setting" in the Values area pulldown menu

Using the "Value Field Setting" in the Values area pulldown menu

When adding a pivot table comparison (analysis) field, where would you define the calculation (e.g., SUM, AVERAGE, COUNT, etc.) to be used when displaying the value for a group of data? Using the "Format Cells" option As a "Filter" setting on the fields list pulldown menu By adding an equation to the field under "Rows" field setting Using the "Value Field Setting" in the Values area pulldown menu

Using the "Value Field Setting" in the Values area pulldown menu

In the Data-Driven Decisions at Nestlé video case study, Nestlé's Digital Acceleration Team training program focuses on developing skills in all of the following business issues, except: Listening Validating Inspiring and Transforming Engaging

Validating

The comparison (analysis) values, such as the "grade" field used in our in-class discussion of pivot tables, would be displayed in which section of an Excel PivotTable control panel, as shown below: Values Filters Columns Rows

Values

All of the following benefits and management strategies would commonly be associated with a "good" likelihood of achievability except: Directly quantifiable saving from reductions in cost Measurements and results based on prior corporate history Direct observations of a pilot site implementation Vendor-supplied estimates of cost savings

Vendor-supplied estimates of cost savings

Which of the following would be an example of a programming control structure that repeatedly executes a statement or a series of statements while a specific condition is true or until a specific condition becomes true? IF Statement Nested IF Statement Conversion Statement WHILE statement

WHILE statement

Which of the following would be an example of a programming control structure that repeatedly executes a statement or a series of statements while a specific condition is true or until a specific condition becomes true? Nested IF Statement Conversion Statement WHILE statement IF Statement

WHILE statement

What term is commonly used to describe a system of universally accepted standards for storing, retrieving, formatting, and displaying information over the internet through a client/server architecture? URL (Uniform Resource Locator) NAP (Network Access Points) WWW (World Wide Web) TLD (Top-Level Domain)

WWW (World Wide Web)

In the "Eye on Oversight" video case study, what was the name of a ransomware software that impacted the United Kingdom National Health Service in 2017? PC Cyborg Wannacry CryptoLocker TeslaCrypt

Wannacry

What term is used to describe the approach an attacker often uses to find open (unprotected) wireless networks by searching around a geographic area? Phishing Distributed Denial Of Service (DDOS) Man-in-the-Middle War driving

War driving

What type of visualization is commonly used to display data when components leading to a total can involve negative values? Bubble Chart Waterfall Chart

Waterfall Chart

Which of the following would NOT be generally considered as a good chart to use for comparing the relative magnitudes data? Line Chart Waterfall Chart Bar Chart Column Chart

Waterfall Chart

In terms of maximum operating range, which of the following correctly orders the sort-range wireless technologies from longest range to shortest range? NFC, RFID, Bluetooth, Wi-Fi Wi-Fi, RFID, NFC, Bluetooth Bluetooth, WiFi, RFID, NFC WiFi, Bluetooth, RFID, NFC

WiFi, Bluetooth, RFID, NFC

Which of the following is a voluntary standard for website accessibility? Americans with Disabilities Act World Wide Web Consortium (W3C) Section 504 of the Rehabilitation Act Section 508 of the Rehabilitation Act

World Wide Web Consortium (W3C)

Steven Clift has practical online steps for government to support democracy. What was the suggested open standard data format to "Provide access to raw data from decision-making information systems."? 1) XML 2) JSON 3) CVS 4) TXT

XML

Sarbanes-Oxley is an example of ________ 1) an ethical issue 2) customer focus 3) our social responsibility 4) a government regulation

a government regulation

Rear Admiral Grace Murray Hopper was a pioneer of computer programming the first to devise the theory of machine-independent programming languages. She also noted the first actual computer bug in 1945, what was the bug? 1) a moth stuck between the contacts of a mechanical relay in the machine 2) A beetle shorting out a mechanical switch 3) A butterfly blocking an optical relay switch 4) Termite destroying the computer mounting board supporting the vacuum tubes

a moth stuck between the contacts of a mechanical relay in the machine

The ____________ protocol enables client application programs to access the other layers. 1) transport 2) Internet 3) application 4) network interface

application

RFID was developed to replace ________. 1) bar codes 2) UWB (Ultra Wideband) 3) QR codes 4) NFC (Near Field Communication)

bar codes

Which of the following is the correct order of the data hierarchy, from smallest to largest? byte, bit, field, file, record, database bit, byte, field, record, file, database byte, bit, field, record, file, database bit, byte, field, file, record, database

bit, byte, field, record, file, database

You live in a small town with only retailer offering certain products or services. This means there is low ______. threat of substitutes threat of new entrants supplier power buyer power

buyer power


Set pelajaran terkait

Principles of Finance Chapter 10

View Set

Pharm Lecture 18: Anti-fungal and non-hiv antiviral agents (In progress)

View Set

sports management 110 final (drexel) chapter 12 and 13, 17, 16

View Set