final exam mis 111

Ace your homework & exams now with Quizwiz!

What British Scientist invented the World Wide Web in 1989 while working at CERN (European Organization for Nuclear Research) in 1989? A. Tim Berners-Lee B. Martin Cooper C. Harald Blatand D. Vint Cerf

A

What approach to knowledge management would best describe the Eller FlexLabs? A. Community of Practice B. Knowledge conversion C. Best Practices D. Knowledge FAQ

A

What is the importance of the triple constraint? A. Any changes to one constraint will likely affect the project outcome B. Security is the most important constraint C. You must funnel all resources into only one of the constraints D. Time, resources, and scope don't matte

A

Which of the following causes of the bullwhip effect is related to a trading partner intentionally sharing inaccurate information with a company's future inventory requirements? A. Shortage Gaming B. Outsourcing C. Forecasting/Trend Analysis D. Batch Purchasing E. Price Promotions

A

Using the Internet of Things to increase the efficiency of a company's operations by allowing it to track, in real time, the movement of raw materials and parts through the manufacturing process to finished products delivered to the customer is related to what business function? A. Cost accounting and financial management B. Supply chain management C. Social media marketing D. Lifecycle product sustainability

B

Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project? A. The quality of the work performed during each major project milestone B. Whether project tasks have been organized in the most efficient order C. The project milestones and the order they are scheduled to be completed D. Whether the major project milestones are being completed on budget E. Individual work assignments for persons assigned to the project

C

The "Porter's Forces" model deals with what aspect of globalized business? A. Design B. Relationships C. Competition D. Time E. Location

C

What is affordance? A. Safety of users and of data B. Being able to pay for something C. How well the user likes the interference D. Physical Property of an object that shows functionality

D

What action did Stacy Snyder take that resulted in her losing her job? A. Undertaking accounting fraud at her company B. Hacking the AP Twitter feed and posting a fraudulent message C. Being a whistle-blower and reporting the illegal actions of her employer D. Infecting her company's network computer with a virus while using Facebook at work E. Posting a photo of herself at a party on her personal social media accout

E

A bill of Materials describes the components that make up an item, the quantity used, and what other information about a finished good? A. The relationships of raw materials and subassemblies B. The value of the material C. The vendor who supplies the material D. The lot sizing used when purchasing raw materi

a

A feature of an object that limits possible (often incorrect) uses of a device is known as: A. A constraint B. A conceptual distinction C. A visible metaphor D. An affordance E. False causality

a

An entrepreneur developing detailed documentation of their business processes so that they can be offered to other individuals as a franchise operation is an example of: A. Converting tacit knowledge into explicit knowledge B. Creating a community of practice C. Converting explicit knowledge into tacit knowledge D. Dependent demand E. A time-delayed response

a

Applications such as "find a friend" (FourSquare), driving directions (Smartrek), roadside assistance (OnStar), and fleet management (UPS and FedEx) are all examples of servicesthat have been enhanced by knowing what? A. The location of the requester B. The age of the requester C. The time the request was made D. The identity of the requester E. The number of people making request

a

Approximately what percentage of applications for jobs are rejected by potential employersbefore the interviewdue to public information posted online by the applicant (e.g. social networking, blogs, media sites, etc. -that is, your online reputation)? A. 60% or more B. About 10% C. Less than 5% D. Less than 50% E. About 30%

a

As part of their Smart Campus research, what MIS researcher is using CatCard data (digital traces) to analytize students' routines and relationships to predict student retention, or their likelihood of returning to campus after their freshman year? A. Sudha Ram B. Jay Nunamaker C. Hsinchen Chen D. Joe Valacic

a

Assume you are 22 years old when yougraduate from the University of Arizona and have a credit card with a $2,000 credit balance with an 18% annual rate. If you only make minimum payments of 2% of the balance or just $10 (whichever is greater) each month, what birthday will you likely be be celebrating when the the credit card is paid off? A. 52 B. 37 C. 32 D. 27

a

Assume you are off campus and cannot connect to UAWiFi.Which of the following would be a secure alternative to access the campus network? A. Access any open wireless network, and then use a VPN to connect to campus B. Only login to systems using NetID+ C. UAWiFi is the only secure option to connect to campus D. Only use your smartphone's WiFi connection if you have to use an open wireless networks

a

COPLINK, developed at the University of Arizona in the MIS Department's Artificial Intelligence Lab, allows law enforcement officers to integrate database information to identify crime suspects based on limited information (e.g., a license plate number or nick name).What term is used to describe the type of information system that is commonly used to maintain collection ofexperiential, reflective and solutions-oriented information? A. Knowledge management B. Telepresence C. Group decision support sytems D. Spiderweb Mapping E. Crowdsourcing

a

Cisco uses the term "the power of in-person" to describe the ability of what technology to improve access to subject matter experts and to open doors to small business people? A. Telepresence B. Crowdsourcing C. Data Mining D. Knowledge Management

a

Converting all MIS 111 students from clickers to response cards without an initial test period is an example of what type of conversion? A. Direct conversion B. Pilot conversion C. Phased conversion D. Primary conversion E. Parallel conversion

a

Cost-Benefit Analysis is related mostly to what type of project management feasibility assessment? A. Economic B. Technical C. Operational D. Political E. Ethica

a

Data ___________ means all applications are able to access the same data, which is ___________ by databases. A. independence; maximized B. independence; minimized C. isolation; maximized D. isolation; minimized

a

Dr. Patton discussed the Hacking Google Glasses video case in class and talked about what it could be a precursor to something else getting hacked in the future. What did he say might be the next thing hacked using the same technique? A. Smart / Autonomous Cars B. IoT Toys and Devices C. Smart Phones D. Stop Light Control System

a

Hierarchical Diagrams are commonly used for all of the following except? A. Time series data B. Organizational Charts C. Project Task Decomposition D. Bill of Materials

a

How does telemedicine improve the delivery of medical care in rural communities? A. Telemedicine reduces the need for patients to travel to physician's offices B. Telemedicine allows patients to make a preliminary self-diagnosis online C. Telemedicine prevents physicians from making errors during surgery D. Telemedicine will allow a physician to meet with multiple patients at the same time E. "Telemedicine Avatars" can perform routine procedures without the physici

a

If the search column for a VLOOKUP contains a duplicate value, which value will be returned? A. VLOOKUP will return a value based on the the first match B. VLOOKUP will return an error (#DUPLICATE), since the search column must be unique C. VLOOKUP will return both values D. VLOOKUP will return a value based on the the last matc

a

In assigned reading, Don Norman makes the case for viewing conceptual models as what? A. A story in context B. Intentional design C. A set of possibilities D. Virtual space

a

In june of 2018, Exactis, a marketing and data aggregation firm, disclosed that the personal details of over 340,000,000 individuals and businesses had been compromised.What security failure caused this massive security breach? A. A database was able to be accessed on a server open to the internet B. An disgruntled employee of Exactis copied the file after being fired C. Exactis sold a surplus computer and left information on the hard disk D. Unencrupted network traffic was monitored on a wireless network

a

In the Accenture video case, the presenter emphasizes that project managment is not about lists and linear relationships, but rather about managing what? A. Complex inter-relationships B. Crisis managment C. Client requirements D. Project costs

a

In the Ruby Tuesday's sales analysis case, analyzing historical data about the sales dimensions of products categories, sales regions, and months of the year would be best using which of the following approaches we've previously discussed? A. Data Cubes B. Visualization C. Communitites of Practice D. Knowledge Management

a

In the assigned reading, Don Norman noted two critical issues withthe original BMW iDrive design:the design failed to provide a good conceptual model (a story) and also what other problem? A. The iDrive destroyed spatiality B. The iDrive was not accessible C. The iDrive provided false affordances D. The iDrive was ergonomically difficult to us

a

Of the items used that identify you uniquely at the University of Arizona, which one can be used as a primary key (unique identifier) outside the University? A. Your UA email address B. Your UA NetID C. Your UA StudentID D. Your UA CatCard Numbe

a

Physical properties (shape, texture, color, etc.) of an object that allow someone to use an object correctlywithout the need for labels or instructions are known as: A. Affordances B. Constraints C. Feedback D. Models E. Distinctions

a

Put the following assets in order of increasing liquidity (least to most) A. Cash, Inventory, Property & Plant B. Accounts Receivable, Cash, Property C. Property, Accounts Receivable, Cash D. Property, Cash, Accounts Receivable E. Cash, Property & Plant, Inventor

a

Related to the concepts of globalization, what computer "law" states that the bandwidth (speed)of data networks will double approximately every 24 months? A. Gilder's Law B. Moore's Law C. Ohm's Law

a

Related to the concepts of globalization, what computer "law" states that value of the internet is related to the number of connections (users)? A. Metcalf's Law B. Gilder's Law C. Moore's Law D. Kepler's Law E. Ohm's Law

a

Select the answer below that orders the media correctly from the lowest to highest bandwith (data rates). A.Twisted pair, Coaxial Cable, Fiber-optic Cable B. Coaxial Cable, Twisted pair, Fiber-optic Cable C. Fiber-optic Cable, Coaxial Cable,Twisted pair D. Twisted pair, Fiber-optic Cable, Coaxial Cab

a

Select the answer the correctly orders the types of computer networks in terms of area span of coverage from largest to smallest? A. WAN, MAN, LAN, PAN B. WAN, LAN, PAN, MAN C. PAN, MAN, LAN, WAN D. PAN, LAN, MAN, WA

a

Signals used to send messages can be _______ or digital. A. analog B. rotary C. binary D. discrete

a

Similar to the expansion of telecommunications in the 1800's with the telegraph, what transportation infrastructure was discussed in class that guided the decision the placement of the long-haul fiber-optic cable infrastructure? A. Inter-continental Railroads Network B. Federal Interstate Highway System C. Inter-regional Transmission Electrical Power Lines D. Major Inland Rivers and Waterwa

a

Subjective knowledge that is based an individual's experiences is known as what? A. Tacit knowledge B. Technical knowledge C. Explicit knowledge D. Procedural knowledge E. Refined knowledg

a

Telepresence and online/distance learning are examples of using technology to produce what order sustainability effect? A. 2nd Order -Applications Alternatives B. 4th Order -Competitive Advantage C. 1st Order -Creation, Use and Disposal D. 3rd Order -Long term Structural Chang

a

The "nearest neighbor" IS Strategy is similar to what DM method? A. Clustering B. Sequencing C. Classification D. Associatio

a

The Internet is a ______________. A. WAN B. LAN C. MAN D. PAN

a

The _____________ approach states that an ethical action is the one that provides the most good or does the least harm. A. utilitarian B. common good C. fairness D. rights

a

The characteristics of big data (data science) are described as being related to volume (of the information), velocity (speed at which information is collected), veracity (the accuracy of the information) and what other characteristic? A. Variety (integrating data from multiples sources) B. Vagueness (using data without a clear definition) C. Vertical (using data related only to one market) D. Valuation (using data that has significant economic value) E. Visual (using data that can be displayed graphical

a

The goal of CAPTCHA is to ___________. A. ensure you are not a botnet software B. protect networks against hackers C. remove alien software from your computer D. hack into secure network

a

The pattern of financial fraud undertaken by David Myers, MCI?s Controller, is a good example of what type of ethical situation? A. Ethical Drift B. Gut Check C. Transparency Test D. Lost Opportunity E. Whistleblowing

a

The risk of a project can be measured on what two scales? A. Likelihood and Impact B. Vision and Goals C. Change and Control D. Budget and Management

a

The sequence of activities performed by users of GroupSystems' ThinkTank product directly parallel the steps in what other business process? A. Knowledge management cycle B. Operational CRM C. Just-in-time Inventory Management D. Transaction processing system E. Economic globalizatio

a

The success of a Group Decision Support System (GDSS) is based upon two key features:contributor anonymity (i.e., the identity of the person making the commentor suggestion is not known), and what other important feature? A. Parallel Discussions B. Disintermediation C. Reintermiediation D. Analytical CRM E. Six Sigm

a

Training for the professional "Certified Public Accountant" certification generally focuses on which of the following? A. Tracking and reporting the financial transactions of a business, and reporting financial results to external stakeholders B. Measuring, interpreting, and communicating information to managers for the pursuit of an organization's goals C. The management of money, investments, and other financial instruments to fund the goals of the busines

a

Treemap Charts largest advantage over bar or column charts is? A. They show individual values relative to the sum of the series as well as other values B. They allow time series data to be displayed C. There is no actual advantage D. They allow multiple series to be displaye

a

WebMD is a(n) _________ that allows doctors to ___________. A. expert; diagnose diseases B. ERP; perform long-distance surgery C. expert; perform long-distance surgery D. ERP; diagnose diseas

a

What common function do "HTTP", "TCP" and "IP" share? A. They all define internet-based protocols B. They are abbreviations for physical media C. They are common computer viruses D. They all are data encryption methods E. They all are website domain

a

What common term was used with both human-computer interaction and In a database entity relationship diagram as a way of limiting choices by the user and also specifying the minimum and maximum possible values that may exist for a relationship between two entities, respectively? A. Constraint B. Diagram C. Attribute D. Relationship E. Entity Clas

a

What does the "%20" represent in an HTML src attribute of a IMG tag? A. A Space Character B. A wildcard that matches any lowercase character C. An underscore character D. A repetition count (i.e., repeat the next character 20 time

a

What is considered to be the high-capacity data transmission core of the Internet structure? A. Tier 1 ISP B. Tier 3 ISP C. LAN D. NAP

a

What is the correct filename for your ABP-3A website? A. index.html B. index.www C. Index.html D. INDEX.HTML

a

What is the correct filename to use for your ABP-3B website? A. index.html B. abp3a.html C. website.html D. public.html E. home.html

a

What is the name for the path containing the minimum set of tasks that you must traverse in order to reach completion of your project on time? A. Critical Path B. Scope Triangle C. Mythical Man Month D. Project Plan

a

What is the name of software that allows publishing, editing, and modifying content from a central interface, providing procedures to manage workflow in a collaborative environment? A. Content Management Systems B. Self-publishing Platforms C. Customer Relationship Management Systems D. Social Networking System

a

What is the name of the Business Intelligence tool that is used for interactive analytics and data modeling? A. Tableau B. R C. Qualtrics D. Python

a

What is the name of the Regents Professor and founding chair of the MIS Department that pioneered the field of Group Decision Support Systems? A. Dr. Jay Nanamaker B. Dr. Sudha Ram C. Dr. Hsinchun Chen D. Dr. Sue Brow

a

What name is used to describe results found when a search engine algorithm analyzes all the pages across the web in an unbiased way and reports the pages considered to contain the most relevant information for your search terms? A. Organic B. Sponsored C. Adword D. Promoted

a

What term describes being able to access information and communication in almost any location? A. Ubiquity B. Localization C. Open Source D. Accessibility

a

What term was used to describe a website that can adapt to the type of device being used to access the website? A. Responsive B. Augmented C. Validated D. Optimized E. Transformed

a

What type of chart would be typically be used to show how the an initial value is affected by intermediate values --either positive or negative --and resulted in the composition of a final value? A. Waterfall Charts B. Surface Charts C. Sunburst Chart

a

What type of customer intimacy zone innovation focuses onmaking structural modifications to established products in order to create a distinctive sub-category? A. Line-Extension Innovation B. Value-engineering Innovation C. Marketing Innovation D. Enhancement Innovation E. Experiential Innovatio

a

What type of data structure allows us to organize multi-dimensional information from a data warehouse so that it can be viewed using different data abstractions (or projections)? A. Data cube B. Executive dashboard C. Click stream D. Decision support system E. Neural network

a

What type of decision based on explicit knowledge and involves analysis using an algortihm and measured data? A. Quantitative B. Collaborative C. Managerial D. Operational E. Qualitative

a

What type of innovation focuses on the supply side, looking for opportunities to remove non-value-adding steps from the workflow? A. Process Innovation B. Value Migration Innovation C. Organic Innovation D. Value-Engineering Innovation E. Enhancement Innovation

a

What type of problem has an optimal solution can be reached through single set of steps based on an algorithm? A. Structured B. Strategic C. Management D. Unstructured E. Collaborative

a

What would be the correct function to find the price of a Caffe Mocha, size Grand A.=VLOOKUP(A14,$A$2:$D$10,3,FALSE) B. =VLOOKUP(A14,$B$2:$D$10,2,FALSE) C. =VLOOKUP($A$2:$D$10,A14,3,FALSE) D. =VLOOKUP(A14,$A$2:$D$10,"GRANDE",FALSE)

a

When applying for advanced standing in the Eller College of Management, the process of selecting your major would be best described as having what characteristics of a decision? A. Unstructured and Strategic B. Semi-structured and Operational C. Structured and Operational D. Structured and Managemen

a

Which of the following application software packages was acquired by the University as a Software-as-a-Service (SaaS) technology? A. D2L / Brightspace B. Firefox Browser C. Microsoft Office Professional (Not Office 365) D. Eller eSMS E. Sophos Anti-Virus

a

Which of the following is a problem with BYOD? A. Security B. Productivity C. Cost D. Satisfactio

a

Which of the following security controls would be used to limit access to systems to specific ports or network systems? A. Firewalls B. Data Masking C. Two-factor authentication D.Intrusion Detection Systems E. Encryptio

a

Which of the following security measures would be considered a "last line defense" for Information Security? A. Cryptography B. Intrusion Detection C. Access Control D. Firewall E. Security SDL

a

Which of the following technologies we've discussed was described as a more environmentally friendly "best practice for communication" that could greatly benefit small businesses? A. Telepresence B. Knowledge Management C. Information Security D. Data Mining

a

Which of the following terms is used to measures the frequency of analog signals? A. Hertz B. Farad C. Ohm D. Angstroms

a

Which of the following would motivate businesses to create accessible eCommerce websites for their customers? A. Allof the three reasons shown above B. Only the first two of the above reasons C. To capitalize on a larger base of potential customers D. The website is likely easier for all users to navigate E. To comply with ADA and Section 508 of the Rehabilitation A

a

Which of these is NOT enumerated as a Motivation to Create Accessible Web Content? A. To improve the reliability of technical functionality (technology centered motivations) B. To improve the lives of people with disabilities (human-centered motivations) C. To capitalize on the a wider audience or consumer base (marketing or economic-centered motivations) D. To avoid lawsuits and/or bad press (public relations and punishment-centered motivations)

a

Which type of website file contains software that's executed on the host before sending the results to the browser? A. PHP B. HTML C. JavaScript D. JPG

a

[Linkages] When viewing the linkages among trading partners, which of the following is common for both upstream and downstream supply chains? A. Information B. Orders C. Products D. Payments

a

__________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. A. Liability B. Responsibility C. Due Process D. Accountability

a

__________ means that users carry a device with them and can initiate a real-time contact with other systems from wherever they happen to be. A. Mobility B. Ubiquity C. Instant connectivity D. Broad reac

a

in the history of the Cell Phone video case, how did the use of cellular phones change the way in which calls were made? A. Instead of calling a place, calls to cellular telephones were associated with a person B. Calling a cellular telephone required the assistance of an operator C. Cellular telephones could only call telephones within the local calling area D. Cellular telephones improved the sound quality that customers experiences E. A new system of telephone numbers were required to call cellular phon

a

A "Fishbone" process analysis diagram is also known as:A. A correlation graph B. A cause-and-effect diagram C. A numerical analysis diagram D. An organization chart E. A cross-functional flowchart

b

According to MIT Sloan Management Review, what percentage of companies have placed sustainability permanently on their management agendas? A. About 25% B. About 70% C. About 10% D. About 50%

b

According to the "IOT Changes Everything" video case, one of the challenges limiting the widespread deployment of IOT is the transitioning to IPv6.What is the value of using IPv6 to IOT? A. Lower power consumption for data communication B. Ability to uniquely address billions of IOT devices C. Defining a standard control protocol for all IOT devices D. Extended communication range for wireless communication

b

According to the video on the Power of Entrepreneurship, approximately how many people live on less than $10.00 per day?A. 3 Billion B. 4 Billion C. 6.9 Billion D. 1.2 Billion

b

As i move farther away from campus, I notice that my UAWiFi connection gets progressively weaker. What factor will always cause this to occur? A. The signal blocked by strong encryption B. The signal strength is lost due to attenuation C. The signal cannot be received due to interference D. The signal is blocked due to right-of-way restrictions

b

Before paying an invoice in the procurement process, the accounting team checks that the purchase order, the goods receipt document (bill-of-lading), and the vendor's invoice all match. What is the term that is used to describe this auditing process? A. Order fulfillment B. Three-way Match C. Batch processing D. Cross-department proces

b

Besides sensors, radios, and chips, what is the value in the Internet of Things? A. Cheaper equipment costs B. Establishment of services on top of the connectivity C. Eliminates the need for a value proposition D. Companies that haven't failed E. Creating less dat

b

Businesses like to use Virtual Private Networks for every reason except? A. Data from web-browsers may not be encrypted B. Virtual networks are faster than ordinary internet connections C. Data from applications other than web browsers may not be encrypted D. They have no control over the path data takes between business sites E. Virtual networks are cheaper than leased line

b

Creating a business process that can be franchised is an example of what type of knowledge management conversion? A. Explicit to Tacit B. Tacit to Explicit C. Explicit to Explicit D. Tacit to Tacit

b

ERP address information silos by _____________. A. simplifying system creation B. integrating functional areas C. correcting a lack of communication between TPSs D. reducing the amount of information presented

b

Excel uses what character to indicate a row or column reference is absolute addressing? A. = (Equal Sign) B. $ (US Dollar Sign) C. ! (Exclamation Point) D. & (Amphersand

b

From Don Norman's perspective, what fatal flaw does theBMW iDrive (which hedescibed as a well thought out, very logical, and sensibledevice) have with respect its human interface? A. The iDrive did not have a hierarchical menu structure B. The iDrive destroyed spatiality C. The iDrive used a confusing set of control knobs D. The iDriveonly controlled the driving-related functions

b

GoldmanSachs]What term was coined by Goldman Sachs in 2001 to describe the fastest growing market economies? A. TICK B. BRIC C. EAGLES D. TIMP

b

In a decision matrix, a "weighting" allows what additional information to be included in the analysis? A. Order of analysis B. Relative importance C. Number of employees on the project team D. Cost of capital

b

In the Decision support process, formulating a module to be evaluated and setting criteria for making a choice would occur during what phase of the decision making process? A. Intelligence Phase B. Design Phase C. Choice Phase D. Operational Phase E. Functional Phase

b

In the McGinn model of design, the least commoncategory of design elements would be related to what factor inthe McGinn model? A. Group B. Individual C. Culture D. Human Sensory E. Context

b

In the Personal Branding video case, which of the following online platforms was idenfied as being primarily a business networking tool? A. Facebook B. LinkedIn C. Amazon.com D. Wordpress E. Democratic voters who sometimes vot

b

In the SCOR model, competitive requirements such as reliability, responsiveness, and agility are all related to what dimension of a vendor's performance? A. Productivity B. Effectiveness C. Modeling D. Mapping E. Efficienc

b

In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does ".edu" define? A. Resource B. Domain C. Server D. Protocol E. Browser

b

In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does "http://" define? A. Domain B. Protocol C. Browser

b

In the assigned reading for project management, what type of diagram was used to map the impact of a problem using the axes "Impact" and "Likelihood" that you also used in Applied Business Project 2? A. Radar Diagram B. I^2 Diagram C. Cross-functional Diagram D. Ishikawa Diagram

b

In the decision matrix example shown below, which of the answers would have the highest score for Project A? A. Affects other projects B. Time to complete C. Financial gain D. Project cost

b

In the video case about Dr. Chiu's Smartrek application, which of the following was not an incentive used to encourage driver participation? A. Ability to help the community B. Ability to find other people for carpooling C. Ability to earn prizes and gift D. Possibility of avoiding traffic congestion E. Ability to earn points for charit

b

Industry analytsts expect that 5th generation networks will be defined by three characterisitcs over 4th generation cellular networks. Which of the following would is notone of the expected changes? A. Reduced power consumption B. Reduced signal attenuation C. Low latency D. Improved transmission rate

b

Maintaining multiple copies of the same data in multiple information systems that can be independently updated commonly results in what information management problem? A. Data validation B. Data inconsistency C. Data compression D. Data devaluation E. Data isolation

b

Often presented visually on an executive dashboard, what type of report focuses attention on business processes whose performance falls outside the range of their defined KPI metrics? A. Ad hoc B. Exception C. Annual D. Drill-down E. Batch

b

On the balance sheet, total assets minus total liabilities must equal what? A. Market Value B. Owner's Equity C. Free Cash flow D. Stock price E. Dividends Pai

b

Opperating unregulated WiFi networks, clickers, Bluetooth headsets, cordless telephones, and microwave ovens using the same 2.4GHz ISM frequency range in close proximity to one another might result in what problem? A. Multi-path B. Interference C. Right-of-way D. Line-of-sight E. Attenuation

b

Originally spun out of Stanford University as a research project, what big data tool started out by offering visualization techniques for exploring and analyzing relational databases and data cubes and has expanded to include Big Data research? A. VMware B. Tableau C. Oracle D.PowerBI

b

Paying Google to display marketing advertisements when a user searches for a specific Adword is most commonly associated with which of the following concepts? A. Pagerank B. SEM C. Organic D. SEO E. Hashtags

b

Stacked Area chart is good for showing relative contributions of different series to a total over time, but they have one big limitation, which is? A. They tend to lack color and not draw the eye B. They can't show negative values C. They can only show four points in time D. They can onlyinclude 3 series E. One series can be hidden behind another serie

b

Tacit or "sticky" knowledge, is based on information that is: A. Easily communicated using cross-functional diagrams B. Subjective and cognitive C. Easily understood with little domain knowledge D. Objective and rational E. Described using algorithms and processes diagra

b

Telepresence is a version of ____________. A. email B. videoconferencing C. a portal D. unified communication

b

Telepresence systems seamlessly integrate _____ and _____. A. sentiment analysis; contextual software B. contextual awareness; content management C. content awareness; hardware D. Ethernet; WiF

b

The following "img" directive uses what type of addressing?<img src="file://C:/Users/Patton/Pictures/NistFigure2.PNG " width="2612" height="1746" alt="Security"/> A. Relative B. Absolute C. File D. Named

b

The terms "contextual," "relevant," and "actionable" are commonly related to what term?A. Information B. Knowledge C. Relationship D. Repository E. Alignmen

b

The__________________ test proposes a scenario in which a man and a computer both pretend to be women or men, and a human interviewer has to identify which is the real human. A. Terminator B. Turing C. Google D. SkyNetIn

b

The____________________ is a summary of information needs of the functional areas and of the organization as a whole. A. Application portfolio B. IT environment C. Objective of the IT function D. Mission

b

Thomas Friedman was quoted as saying, "We're in the middle of 3 accelerations; the market, mother nature, and Moore's law. Moore's law says the power of microchips will double every 24 months, mother nature is climate change, biodiversity loss and population, and the market is digital globalization."What is Moore's Law? A. The effect of a telecommunications network is proportional to the square of the number of connected users of the system B. The number of transistors in a dense integrated circuit doubles about every two years C. The theoretical maximum information transfer rate of communicatiions channel

b

What MS Excel funtion could be used to implement IS Rule Induction? A. IF Statements B. Conditional Formatting C. Pivot Table Slicers D. Table Filters

b

What implementation approach mixes and matches core ERP modules as well as other extendedERP modules from different software providers to best fit their unique internal processes and value chains? A. Vanilla approach B. Best-of-breed approach C. Custom approach D. Software-as-a-service approac

b

What is NOTa factor contributing to the Bullwhip Effect? A. Batch Purchasing B. Outsourcing C. Forecasting/Trend Analysis D. Shortage Gaming E. Price Promotion

b

What is the correct order of switching sites for packet P5 in the following routing diagram? A. New York, Los Angeles B. New York, Dallas, Los Angeles C. New York, Chicago, Dallas, Los Angeles D. New York, Atlanta, Los Angele

b

What is the name for the exchange points for Internet traffic used by major ISPs? A. MAC B. NAP C. TCP D. ISDN

b

What is the name of a highly popular crowdsourcing Internet marketplace enabling individuals and businesses (known as Requesters) to coordinate the use of human intelligence to perform tasks that computers are currently unable to do? A. Bing Collaborative Interpreter B. Amazon Mechanical Turk C. Azure Web Services D. Google Answers

b

What is the name of the criterion of intelligence where depends on the ability of a computer program to impersonate a human in a real-time written conversation with a human judge, sufficiently well that the judge is unable to distinguish reliably—on the basis of the conversational content alone—between the program and a real human? A. Augmented Reality B. Turing Test C. Ephemeral content D. Content sharing

b

What is the name of the device that of the physical device that interfaces computers with a local area network (LAN)? A. Transmission Control Protocol (TCP) B. Network Interface Card (NIC) C. Internet Service Provider (ISP) D. Peer-to-peer Processing (P2

b

What is the named used to describe daily spending decisions like eatingat a restaurant, buying clothes, drinking Starbucks, or playing a round of golf? A. Intermittent B. Discretionary C. Variable D. Fixed

b

What low-power, non-directional wireless technology is used to create small personal area networks for cell phones and portable music players? A. Near-field Communication B. Bluetooth C. Radio Frequency Identification D. Cellular radio

b

What technology has been used for such diverse applications as healthcare, tracking lost pets, and toll collecting on highways?A. SCOR B. RFID C. CFAR D. MRP-II E. Infrared

b

What term describes a way ofsolving problems and producing things by connecting online with people that you otherwise wouldn't know? A. Group Systems B. Crowdsourcing C. Knowledge Management D. Communities of Practic

b

What term does Google use to describe how important a website is based upon counting the number and quality of links to a page, using the underlying assumption is that more important websites are likely to receive more links from other websites? A. Website ROI B. Page rank C. Conversion rate D. Keyword density

b

What term is used to describe how telemedicine uses wireless transmission and receipt of data gathered from remote sensors to allow doctors can monitor patients and control medical equipment from a distance? A. Propagation B. Telemetry C. Attenuation D. Multiplexing

b

What term is used to describe the behavior where small changes in customer demand that result in large variations in raw material orders causing inefficiency in the supply chain? A. Reverse Auctions B. Bullwhip effect C. Single-Minute Exchange of Dies (SMED) D. Supply Chain Operations Reference (SCOR) Model E. Just-In-Time Orders

b

What term is used to describe the conversion of tacit knowledge to explicit knowledge, so that the knowledge can be used in the organization by the staff? A. Knowledge Interpretation B. Knowledge Codification C. Knowledge Representation D. Knowledge Cycle

b

What term is used to describe the marketing analysis where two versions of a web page are compared to see which one gives a better conversion rate for similar visitors at the same time? A. PPC Marketing B. A-B (or Split) Testing C. SEO Testing D. SEM Testing

b

What term refers to the process where two or more entities (individuals, teams, groups, or organizations) who work togetherto accomplish certain tasks, such as a work group or virtual team? A. Communities of Practice B. Collaboration C. Cross-function Teams D. Group System

b

What type of business systems have the capability to place automatic requests to buy products fromvendors in real time? A. AI (Artificial Intelligence) B. SCM (Supply Chain Management) C. DSS (Decision Support System) D. CRM (Customer Relationship Managemen

b

What type of chart allows you to plot data using two y-axes and a shared x-axis, visualizing a correlation or the lack thereof between the two y-axes data sets?A. Box and Whisker Chart B. Dual Axis Chart C. Radar Chart D. Funnel Chart

b

What type of data mining analysis identifies patterns in the data based on demographic characteristics (e.g., age, gender, income, ethnicity, etc.)? A. Association B. Classification C. Sequencing D. Clustering

b

Whatt type of guided media uses light for signaling? A. twisted pair B. fiber optics C. open wire D. coaxial cable

b

When Dr. Sudha Ram used CatCard data (digital traces) as part of her research to analyze students' routines and relationships to predict student retention. What knowledge management term would you use to classify the CatCard transactional data? A. Feasible data B. Explicit data C. Tacit data D. Sticky data

b

When a company purchases a high-value software package, how is the ownership of the software package represented on the company?s balance sheet? A. As owner equity B. As an asset C. It would not be listed D. As retained earnings E. As a liabilit

b

When classifying items on an I^2 diagram, we depend on individuals with domain knowledge and consultants about the items.When discussing knowlege management, what name did we use to describe an individual with domain knowledge? A. Franchisee B. Subject-matter Expert C. Community of Practice D. Expert System

b

When deployed, the Irridium satellite telephone network was based on a constellation of 66 satellites.However, how many operational satellites were originally proposed for the original constellation?(Hint the name Irridum was selected due to this number.) A. 18 B. 77 C. 30 D. 48

b

When you use Google Drive to work on a document with a classmate, this is considered _________. A. teleconferencing B. virtual collaboration C. crowdsourcing D. workflow

b

Which of the following is *NOT* a behavioral issue for meeting A. Domination B. Wrong people C. Misunderstandings D. Hidden Agenda

b

Which of the following is the correct order of the traditional System Development Life Cycle (SDLC)? A. investigation, analysis, design, implementation, programming and testing, operation and maintenance B. investigation, analysis, design, programming and testing, implementation, operation and maintenance C. analysis, investigation, design, programming and testing, implementation, operation and maintenance D. analysis, investigation, design, implementation, programming and testing, operation and maintenance

b

Which of the following issues related to wireless communication would NOT be a problem for an RFID (Radio Frequency Identification) system? A. Attenuation B. Line-of-sight C. Multi-path D. Monitoring E. Interference

b

Which of the following terms are related to production based on the mass customization initiated by a customer's order? A. Forecast model B. Pull model C. Push model D. Make-to-stock mode

b

Which of the following types of access controls would be the process of validatinga claim of identity (e.g., Something you know, have, do, or are)? A. Identification B. Authentication C. Authorization D. Accountability E. Non-repudiation

b

Which of the following types of security risks would ben identified weakness in which necessary controls are not present or effective? A. Control B. Vulnerability C. Exploit D. Attack E. Footprint

b

Which of the following types of wire media has the highest physical security? A. CAT-5 Twisted pair cable B. Fiber-optic cable C. Coaxial cable D. CAT-3 Twisted pair cable

b

Which of the following was NOT described as one of the four innovation zones? A. Category Renewal Zone B. Disruptive Technology Zone C. Product Leadership ZoneProduct Leadership Zone D. Operational Excellence Zone E. Customer Intimacy Zone

b

With respect to a database, what term is used to describe an abstract representation of all of the information included in a data structure about a particular type of entity? A. Entity Key B. Entity Class C. Entity Table D. Entity Attribute E. Entity Model

b

____________ is knowledge that has been codified or documented. A. Data B. Explicit knowledge C. Information D. Tacit knowledge

b

respect to an individual, what term describes the process of managing one's earnings, savings, and debt to meet the actual and budgeted expenses? A. Expense Management B. Personal Finance C. Personal Accounting D. Risk Management E. Financial Literacy

b

the big advantage of bubble chartsover scatter charts is? A. There is no advantage B. They add another dimension C. They allow negative values on the Y axis D. They are more colorfu

b

According to the articles what technologies enable businesses and theiremployees to get in front of clients and customers but do it in a cost-savingsmanner? A. Telemedicine B. email C. VoIP and web conferencing D. Telecommuting E. eFax

c

Although Martha Stewart?s actions related to insider trading, she served prison time for what criminal acts? A. Accounting statement fraud to the SEC B. Financial embezzlement at Omnimedia C. Lying about her actions to the FB

c

An unobstructed, straight line-of-sight path between a transmitter and receiver is required by which of the following high-speed, commercial wireless network technologies? A. Broadcast Radio B. 802.11 Wi-Fi C. Microwave D. Bluetooth E. 3G Cellular

c

Bandwidth is the transmission capacity of a network, stated in bits per second. Which of the following "laws" we've discussed determines the maximum bandwidth (signalling rate) of a given type of communication media (e.g., copper cable, fiber optic, etc.)? A. Metcalf's Law B. Gilder's Law C. Shannon's Law D. Moore's Law

c

Current information systems have evolved to focus on what role with respect to their services? A. Strategic B. Productivity C. Value creation D. Efficiency E. Effectivenes

c

Disclosing personal information such as your race, religion, sex, disabilities, and age on social media undermines what type of protections otherwise provided to you as a citizen in the United States? A. Personal credit eligibility laws B. Voter eligibility laws C. Anti-discrimination laws D. Commercial driver's license eligbility laws E. Wage discrimination law

c

During which phase of the website transformation process would the project team for developing perform content analysis, layout the website using wireframes, and define a consistent visual design? A. Production B. Training, Launch and Buildout C. Developing Site Structure D. Defining the Project E. Site and CMS Maintenanc

c

EPEAT Preformance Categories (e.g., Material section, Energy Conservation, and Packaging Waste) are examples of that order effect of environmental sustainability? A. 3rd Order -Long term Structural Change B. 2nd Order -Applications Alternatives C. 1st Order -Creation, Use and Disposal D. 4th Order -Competitive Advantag

c

ERPModules] Which of the following is typically not considered a "core" ERP module?A. Financial B. Human Resources C. E-Business D. Operations

c

Explicit, or "leaky" knowledge, is based on information that is: A. Customized by each user B. Subjective and cognitive C. Objective and rational D. Dependent on an employee's experience E. Informally communicated with an organization

c

For ABP-1, your "ticker symbol" identifies what? A. The time of the last stock trade B. Your assigned Stock Exchange C. Your assigned Company D. Your project team?s IconE. The due date for your projec

c

For companies managing their supply chain business processes using CPFAR (Collaborative Planning, Forecasting and Replenishment), the process improvements over the traditional ordering process could be primarily considered as an improvement in which of the following? A. Feasibility B. Effectivenes C. Efficiency D. Agility E. Quality

c

Google Analytics tracks the browser used to access a website.What term was used to describe a website that manages content based on the browser or device accessing the content? A. Content Management System B. Ephemeral Content Design C. Responsive Web Design D. Website Transformation Proces

c

Harald Blaatand, who was the King of Demark from 940-981, is associated with what wireless technology? A. Satellite Transmitters B. Microwave Transmitters C. Bluetooth Technology D. Computer Wifi E. Cellular Telephone Network

c

IT changes managers' job by _________ A. decreasing the volume of information they have to process. B. improving an employee's sense of connectedness. C. providing near real-time information so managers can make quicker decisions. D. making it easier to get all employees to work from one locatio

c

IT has changed the manager's job in many ways. Which of the following is NOT the result of this change? A. Remote supervision B. Real-time information C. Easier to make a decision D. More information to address

c

IT__________ be used to create a competitive advantage ___________. A. cannot; even when it is used effectively B. cannot; because everyone has access to technology C. can; when it is used effectively D. can; because everyone has access to technolog

c

In a packet-switched data communication network, which of the following is true: A. All packets always follow the shortest path (fewest hops) through the network B. All packets from a sender always arrive at the receiver in same order they were sent C. Packets can be lost or become corrupted between the sender and receiver D. All packets from a sender follow the same path through the network to the receiver E. The path packets follow in the network can never be changed if a data link fails

c

In a vertical cross-functional business process diagram, the order of items in one column (from top to bottom) shows what relationship among these items? A. Importance B. Skill level C. Time D. Cost E. Frequency

c

In addition to possessing contextual and relevant information, what other characteristic aspect does knowledge possess? A. It is an entity class B. It solves a structured problem C. It is actionable

c

In general, what you think of as the quality of your network connection speed when you are using your PC, iPad, or Smartphone is most influenced by which of the following? A. Location of the content provider's servers B. Protocols used for Layer-1 transmission C. Local Tier-3 ISPs D. Regional Tier-2 ISPs E. Backbone Tier-1 ISPs

c

In order to get Excel to display the exact closing date for each month, you need to format the X-axis as: A. Fixed axis B. Special axis C. Text axis D. Continuous axis E. Date axi

c

In project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resourcesand what other dimension of the planning process? A. Agility B. Feasibility C. Scope D. Value E. Alignment

c

In the assigned reading on accessibility, the authors note that while WCAG 1.0 focused on the techniques for accomplishing accessibility, WCAG 2.0 focused on what? A. Strategies to avoi lawsuits B. Designing tactile maps of websites C. Principles of accessibilities D. Economics of accessibilit

c

In the decision process, problem identification and classification occur during which phase? A. Implementation B. Choice C. Intelligence D. Design

c

In the four layer model of the IOT architecture developed by the UofA's Cloud and Autonomic Computer Center, environmental sustainability would be most closely related to what layer? A. Sensing and identification layer B. Network construction layer C. Integrated application layer D. Information processing laye

c

In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what common problem did his analogy using the postal service to email a page from a book have with sending TCP packets? A. The message might be illegible B. The message might be in the wrong language C. The message might get lost and not delivered

c

In the video case for Nestle, data-driven decisions were primarily based on visualizations of information from what source? A. Cost and Production Schedules B. Financial Performance Reports C. SocialMedia Platforms D. Investment Analyst Forecast

c

Information systems professionals understand business needs and analyze processes, methods and data to create customer-oriented solutions.The value proposition for MIS was described more briefly by Dr. Jay Nunamaker, Regents Professor and founding chair of the MIS Department, as a discipline focused on doing what for business? A. Programming B. Academic research C. Solving real problems D. Marketing software E. Computer Desig

c

Internet enabled globalization does the following: A. Forces new suppliers to distribute products using traditional distribution networks B. Forces competitors to share sales information and product pricing C. Removes geography as a barrier to relationships D. Creates barriers that protect "olive tree" product

c

Keyword selection and density, image alt tags, and links to content are mostly commonly associated with which of the following concepts? A. PPC B. CPC C. SEO D. SEM E. ROI

c

LEED refers to the efficiency of? A. Cars B. Data Centers C. Buildings D. Aircraft E. Desktop Computer

c

Long term weather predictions are generally considered what typeof problem? A. Physical B. Structured C. Unstructured D. Optimal

c

One of the impacts of Globalization is the the Economics of Distance (Transportation Costs) has been replaced by what? A. Econonmies of Time B. Economies of Relationships C. Economies of Attention D. Econonmies of Margin Cos

c

One of the origins of the Internet was the result of a project by US government agency? A. National Security Agency B. National Aeronautics and Space Administration C. Advanced Research Project Agency D. National Science Foundatio

c

Originally discussed by Dr. Gilliland, David Myers' (former controller of MCI/Worldcom) statement "I still don't know that one point when I started to cross the line...", is an example of how small, incremental repeated compounding of unethical decisions can result in what? A. Gut check B. Defining moment C. Ethical drift D. Whistleblowing E. Transparency tes

c

Parking garage passes and access control on employee ID badges are examples of: A. 4G / cellular B. Bluetooth C. RFID D. LEO

c

Pioneered at the University of Arizona, what decision support technology as developed to address problems suchas a lack of focus, fear of speaking, hidden agendas and misunderstandings then collaborating with others? A. Executive Dashboard B. Data Mining C. Group Decision Support Systems D. Communities of practice E. Crowdsourcing

c

Planned, recurring expenses that occur on a routine schedule, such rent or car payments that must be paid every month, are examples of what? A. Deductions B. Discretionary expenses C. Fixed expenses D. Cash flow E. Flexible expense

c

Related to the concepts of globalization, what computer "law" states that the density of transistors will double approximately every 18 months? A. Metcalf's Law B. Ohm's Law C. Moore's Law D. Kepler's Law E. Gilder's Law

c

The difference between =vlookup() and =hlookup() is what? A. in vlookupthe third variable specifies the row while in hlookup it specifies the column B. They perform the same function and are just alternative spellings C. each record in a vlookup is in a row, and in hlookup is in a column D. each record in a vlookup is in a column, and in hlookup is in a row

c

The internet of Things can be described as three "any"-type connections. What are these three "any" connections? A. Any price, any person, any network B. Any place, any person, any industry C. Any time, any place, any thing D. Any time, any place, any networ

c

The old accounting maxim of "promise low" and "deliver high" is related what costing and budget concept? A. Consistency B. Accruals C. Prudence

c

Weak passwords are a(n) ___________ threat. A. software B. outside C. employee D. hardware

c

What Center in the Eller College of Management has the mission to help students improve their potential and advance society by developing an entrepreneurial and innovative mindset? A. Eller Center Executive Education B. Center for Mangement Innovations in Healthcare C. McGuire Center for Entrepreneurship D. Economic + Business Research Center

c

What IoT technology discussed in class could be used to identify shoppers and allow products to "introduce" (recommend) themselves to a shopper? A. Geotagging B. Crowdsourcing C. RFID Tags D. Folksonomies E. Product Metadata

c

What Leadership in Energy and Environmental Design (LEED) certification was the building where our classroom is located, Environment and Natural Resources 2, awarded by the U.S. Green Building Council? A. Certified B. Silver C. Platinum D. Gold

c

What Regents Professor on the MIS Faculty at the Universityof Arizona developed the COPLINK system for managing knowledge used in law enforcement? A. Jay Nunamaker B. Sudha Ram C. Hsinchun Chen D. Joe Valacic

c

What are the equivalent concepts in Excel to the following database terms:Field, Record, and a Table, respectively? A. Cell, Range, Worksheet B. Reference, Slice, Workbook C. Cell, Row, Worksheet D. Formula, Worksheet, Workbook

c

What category of location-based services would best describe products such as "location-based gaming", "social networking," and "find a friend"?A. Personal Security B. Social Networking C. Entertainment D. Information Services E. Mobile Resource Managemen

c

What inventory strategy allows a company's supplier to monitor inventory levels and manage the replenishment process for the supplier's products? A. Bullwhip delivery B. Tier-1 Suppliers C. VMI D. Push Manufacturin

c

What is NOT a benefit of telemedicine? A. It improves access to healthcare B. It reduces the need to move the patient C. It requires traveling so doctors can see their patients in person D. It provides real-time care to isolated areas

c

What is NOT an advantage of digital transmission? A. Produces fewer errors B. Simpler to integrate voice, video, and data C. Harder to encrypt D. Permits higher maximum transmission rate

c

What is an example of something in the Integrated Application layer of the 4 Layer Model? A. GPS B. Data center C. Smart transport D. Search engin

c

What is the name of the system used by Raytheon that allows technical blueprints to come to life so engineers engineers and customers can make quick changes to technical specifications and adjust equipment according to their needs using the "the common language of visualization." A. Glip B. Jive C. CAVE D. Slack

c

What is the name of the wireless technology that is designed to be embedded in mobile devices such as cell phones and credit cards allowing you to pay for items by waving your card within a few centimeters of a point-of-sale terminal? A. Personal Area Networks B. Bluetooth C. Near-field Communication D. MiFi

c

What is the name used to describe when a person visits a brick-and-mortar store only to check physical characteristics of a product but intends to purchase theproduct online? A. Disintermediating B. Hybrid shopping C. Showrooming D. Multiplexing

c

What is the purpose of a PERT chart? A. Review the Triple Constraint B. View the organizational structure of a company C. Schedule and organize tasks D. Find where Product Enhancement, Research,or Training is needed

c

What is used to determe how long an investment will take to double, given a fixed annual rate of interest, allowing investors to get a rough estimate of how many years it will take for the initial investment to duplicate itself. A. Rule of 18 B. 28/36 Rule C. Rule of 72 D. 2% Rul

c

What network security control prevents information from moving between two networks? A. Biometric Identification B. Packet Sniffer C. Firewall D. Post Scanne

c

What phrase is used to describe the current and developing environment in which disruptive technologies and trends such as the Internet of Things (IoT), robotics, virtual reality (VR) and artificial intelligence (AI) are changing the way we live and work? A. Future Shock B. Post-Industrial Society C. Fourth Industrial Revolution D. Economic Globalization

c

What technology do companies use to make the links between connection between two corporate intranets more secure? A. SCOR B. VMI C. VPN D. CPFAR

c

What term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding? A. Emotional design B. Design Intention C. Conceptual model D. Semiotic Engineerin

c

What term did Thomas Friedman's use to describe the impact of globalization where individual countries must sacrifice somedegree of economic sovereignty to global institutions (such as capital markets and multinational corporations)? A. Golden Arches Theory B. The World Is Flat C. Golden Straightjacket D. The Lexus and the Olive Tre

c

What term is used to compare the number of closed sales to the the total number of website visitors? For example, if an ecommerce site receives 200 visitors in a month and has 50 sales, this term would be calcuated as 50 (sales) divided by 200 (visits), or 25%. A. Pay-per-click rate B. Adword ROI C. Conversion rate D. SEM (Search engine marketing) rat

c

What term is used to describe a physical interface between peripheral devices and the computer? A. App B. Signal C. Port D. Session

c

What term is used to describe an individual who was born after the widespread adoption of digital technology and have grown up using technology like the Internet,computers and mobile devices? A. Digital Immigrants B. Millennial C. Digital Native D. Online Generatio

c

What term is used to describe an online advertising service developed by Google, where advertisers pay to display advertising, product listings, and video content as a result of Google search. A. Hashtags B. Responsive C. Adwords D. PagerankE. Organic

c

What term is used to describe paid-for product ratings and reviews? A. Customer reviews B. Expert review C. Sponsored reviews D. Conversational marketin

c

What term is used to describe the percentage value of the number of times a keyword or key phrase appears on a webpage as compared to the total amount of words on the page? A. Page rank B. Conversion rate C. Keyword density D. Website RO

c

What term is used to describe the very common tendancy for projects to accumulate new functionality to fulfil the requirements of project stakeholders? A. Quality Triangle B. Critical Path C. Scope Creep D. Change Management

c

What term was coined by Eli Pariser to describe a personalized search in which a website algorithm predicts what information a user would like to see based on user location and past searches on the website? A. Social marketplace B. Shopping community C. Filter bubble D. Conversational marketin

c

What the name of the undergraduate certificate offered through the McGuire Center for Entrepreneurship that provides Eller undergraduate students with the opportunity to apply their knowledge and skill sets in real-world environments in order to make your community a better place to live and work as well as having a positive social impact? A. Small Business Certificate Program B. Certificate in Entrepreneurship and New Venture Development C. Eller Social Innovation (ESI) Certificate D. NonprofitLeadership Certificat

c

What topic from Data Mining is closely related to decision trees? A. Case-based reasoning B. Neural networks C. Rule Induction D. Nearest Neighbor Techniqu

c

What type of inventory management systems deliver the precise number of parts, called work-in-process inventory, to be assembled into a finished product at precisely the right time? A. SCOR B. Poke-Yoke C. JIT D. Vertical

c

What typeof security activity provides guidance to people who are tasked with resuming business operations after a major disaster, such as building fire, earthquake, or flood, occurs? A. Risk acceptance B. Supervisory control and data acquisition C. Business continunity D. Certificate authority

c

When describing the invention of the cell phone, who said "For the first time, you were calling a person, not a place..."? A. Eli Pariser B. Norman Abramson C. Martin Cooper D. Thomas Friedma

c

When we discussed the design of network infrastructure, we noted that the design of connectors on computers we generally related to the speed of the communication interface, the function being supported (number of signals required), and what other issue related to human-computer interaction? A. Hidden affordances for security B. Operational and functional causality C. Constraints to improve reliability D. Cultural design standards

c

Which company used software to disrupt the previous market-leading companies in the book industry? A. Books-a-Million B. Walmart C. Amazon D. Barnes and Noble

c

Which of Thomas Freidman's "flattners" related to technologies related to how content can be digitized and therefore shaped, manipulated, and transmitted; how processes can be done at high speed with total ease; and how mobile can be done anywhere and anytime by anyone; and can be done by anyone? A. Uploading B. Informing C. "The Steriods" D. Supply-chaining

c

Which of the POUR principles focuses on the concept that web accessibility is based upon the assumption that people need to be able to input the information into their brain so that they can process it? A. Robust B. Operable C. Perceivable D. Understandable

c

Which of the following are similar actions in the DM, KCC, and GDSS cycles? A. Modeling, Document, Disseminate B. Data Evaluation, Capture, Document C. Problem Definition, Create, Brainstorm D. Data Evaluation, Manage, Organ

c

Which of the following factors related to the bullwhip effect was due to deception between two trading partners? A. Forecasting and Trend analysis B. Price promotion C. Shortage gaming D. Batch purchasing

c

Which of the following is NOT a value-adding attribute of mobile computing? A. Instant connectivity B. Localization C. Bandwidth improvemen

c

Which of the following is an informational role? A. Figurehead B. Entrepreneur C. Disseminator D. Disturbance handle

c

Which of the following types of analysis would be used to produce the Clery report, which is a public annual security report (ASR) that includes statistics of campus crime for the preceding 3 calendar years identifying the crimes committed in physical (geographic) proximity to a college campus as an effort to improve campus safety? A. Sequencing B. Classification C. Cluster D. Forecastin

c

Which of these is NOT enumerated as a Motivation to Create Accessible Web Content? A. To capitalize on the a wider audience or consumer base (marketing or economic-centered motivations) B. To avoid lawsuits and/or bad press (public relations and punishment-centered motivations) C. To improve the reliability of technical functionality (technology centered motivations) D. To improve the lives of people with disabilities (human-centered motivations

c

Who said the following quote "You can't use up creativity. The more you use, the more you have." A. Albert Einstein B. Thomas Edison C. Maya Angelou D. Linus Paulin

c

________ is the right to be left alone and to be free of unreasonable personal intrusions. A. Profiling B. Information privacy C. Privacy D. A digital dossie

c

__________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information. A. Competitive intelligence B. Espionage C. Information extortion D. Intellectual property

c

A business intelligence tool that uses abstractions such as color and graphical images like instrument gauges to allow executives to grasp business situations quickly is knownas a: A. Neural network B. Expert system C. Geographic information system D. Digital dashboard E. Planning Horizon

d

A firewall is a _______control. A. virtual B. access C. physical D. communication

d

A mekko, or Marimekko or market map chart, which paints a picture of the overall market and helps to drive discussions about growth opportunities or acquisitions by showing the relationship between each segment or bar to the total. A Mekko chart is similar to what other type of chart discussed in class? A. Scatter Plot B. Surface Chart C. Donut Chart D. Stacked Bar Char

d

According to the mythical man-month what is the reason adding people to a project will not speedup your project? A. Each increase in the staff requires a corresponding extension to the project due date B. Increased critical pathmilestones for the project C. Increased spending on personnel D. Increased complexity of interpersonal communications

d

All of the items in one column a cross functional diagram are related to what? A. One decision B. One business process C. One connection D. One actor

d

Allowing individuals to file tax returns, renew driver's licenses, and obtain various permits online is an example of what type of eGovernment? A. Government-to-business (G2B) B. Government-to-suppliers (G2S) C. Government-to-government (G2G) D. Government-to-citizen (G2C) E. Government-to-employees (G2E

d

Although globalization has been underway for many centuries, digitization, networking, and connectiveness have dramatically increased what? A. Data Redundancy B. Number of "Olive Tree" products and services C. Revenue per Employee D. Pace of Change E. Worker Productivity

d

Although web users should have an unlimited amount of time to complete tasks on the web, this design goal must be balanced against what other issue? A. Communication Bandwidth B. Cost of Data Transmission C. Availability of Equipment D. Security and ris

d

An I^2 diagram helps identify opportunities that are "low hanging fruit". What does the term "low hanging fruit" mean in this context?A. Projects that correct major errors in the software B. Projects that will require significant effort, but are easily planned C. Projects that design new features requested by our customers D. Projects that easy to do and also have a high value propositin

d

As discussed in class, what company was founded in the Globalization 2.0 era based on the business model of selling discontinued product lines directly to consumers by using a new transportation infrastructure to reach a geographically distributed customer base? A. Wal-Mart B. Overstock.com C. BigLots! D. Sears, Roebuck & Co .E. Ebay.com

d

Assume you need to put a sign that says "PUSH" on a door handle to explain the correct way to operate the door.The "PUSH" sign helps a user understand what aspect of usability? A. The sign explains a correct rejection B. The sign explains a consistent affordance C. The sign explains a perceptible affordance D. The sign explains a false affordance E. The sign explains a hidden affordance

d

Assuming orders are currently being processed correctly, adding CPFAR inventory management practices would improve a company in all of the following ways except: A. Administrative overhead B. Process efficiency C. Process latency D. Process effectiveness

d

Business metrics that describe the performance of critical business activities are known as: A. Decision trees B. Residual risk assessments C. Business intelligence analyses D. Key performance indicators E. Business continuity plan

d

CODASYL,the Conference/Committee on Data Systems Languages, is remembered almost entirely for two activities: its work on the development of the COBOL language and its activities in standardizing database interfaces. We've learned about the pioneers of databases (Chen and Codd) today, who is credited for developing FLOW-MATIC, which evoled into the COBOL, the widely used business programming language? A. Charles Babbage B. Ada Lovelace C. Dennis Richie D. Rear Admiral Grace Murray Hopper E. Niklaus Wirth

d

Concerns over using data to illegally discriminate against an individual or group, reaching wrong conclusions due to data contamination, and violating intellectual property (ownership of information) protections were legal and ethical issues discussed in relation to what topic discussed during this module? A. Crowdsourcing B. Project management C. Click-stream analysis D. Data mining E. Telemedicine

d

Customers _____________________ because of Web 2.0. A. are less empowered B. have seen no difference C. are generally confused D. are more empowered

d

Disermediation] What term is describes the conflict when manufacturers (brands) disintermediate their channel partners, such as distributors, retailers, dealers, and sales representatives, by selling their products directly to consumers through general marketing methods and/or over the Internet. A. Globalization B. Porter's Forces C. Balance of Trade D. Channel Conflic

d

Donut Charts are difficult to read, Microsoft recommends what as an alternative? A. Cake Charts B. Pie Charts C. Scatter Charts D. Stacked Column or Bar Char

d

Due to the curvature of the earth, microwave towers generally cannot be spaced more than about how many kilometersapart? A. 18 B. 30 C. 77 D. 48

d

Google's main business reason for installing fiber in select US cities is to _______. A. bring the internet to rural areas B. begin competing with the cable distribution giants C. give people an option other than the telecommunications companies who control existing cable networks D. generate more web traffic, which generates more ad revenue for them

d

IT allows the workplace to expand to 24 hours a day at _______________, which is a benefit for ___________. A. a central location; employers and employees B. a central location; only employees C. any location; only employers D. any location; employers and employee

d

If we change the FOQ quantity to 75 units, what value will replace the projected available in week four? A. 80 B. 25 C. 100 D. 55

d

If your sales system shows a customer's name as "Johnny Smith", but your logistics system for shipping shows the same customer as "John A. Smith", what type of database problem does this represent? A. Security B. Isolation C. Redundancy D. Inconsistency

d

In a relational database, what term refers to the collection of items that are all related to a single unique value, where the single value often serves as the primary key? A. A field B. A deposit C. A list D. A record E. A form

d

In a vertical cross-functional diagram, items are ordered in one coumn relates to what? A. Economic value B. Feasibility C. Frequency of occurence D. Time

d

In recognizing ethical situations, which of the following is related to a chemical reaction that occurs in your body, specifically your intestinal track? A. Taste check B. Transparency test C. Ethical drift D. Gut check E. Gut punch

d

In the NASA project management video case, what did the speaker indicate was the greatest risk he faced in managing projects for NASA? A. Cost overruns B. Technology failues C. Lack of individuals with technical expertise D. Social and political risk

d

In the VAN (Voter Activiation Network) Relationship-Based Political Organizing video case study, the VAN was able to idenify the relationships of possible supporters using data from what source? A. Online surveys B. Voter registration records C. Tax returns of registered voters D. Supporter's Facebook contacts E. Direct mail campaign

d

In the case study presented in class, Nestle's Digital Acceleration Team training program focuses on developing skills in all of the following business issues, except: A. Engaging B. Listening C. Inspiring and Transforming D. Validating

d

In the video case about Transmission Control Protocol (TCP), Vint Cerf described TCP using an analogy of the sending postcard through the US postal system.Which of the following was not an issue discussed in the case study? A. That the sender would know when to retransmit packets based on receiving a message from the receiver B. That packets could arrive out of sequence C. That packets could be lost during transmission D. The cost of sending the packets making up a mess

d

Porter?s Forces describes which of the following business issues? A. Profitability B. Security C. Stock Trading D. Competition E. Product Design

d

Porters five forces focuses on what part of competition? A. The Business Supply Chain B. The Five Core Business Functional Areas C. The FiveCore Internal Processes of a Business D. The Business Environme

d

Purchasing an entire box of screws, even though only a small number are need for the master production schedule is an example of making a purchasing decision based on what approach? A. Fixed order quantity B. Lot-for-Lot C. Independent Demand D. Economic Order Quantity

d

Reintermediation is addressing what business issue that was the result of company's directly selling to their customers as part of disintermediation? A. Production scheduling B. Product availability C. Value proposition D. Buying complexit

d

Robots are useful ___________. A. for driving cars (e.g. cyberchauffer) B. only in science fiction (e.g. Terminator) C. as companions (e.g. cyberpooches) D. for handling monotonous tasks (e.g. factory wor

d

Short-range wireless technology is commonly to connect smartphones with hands-free headsets for telephone calls and listening to music? A. WiMax B. Photon C. Spectrum D. Bluetooth E. Wavelength

d

Similar to trends in computing hardware, what is the trend for wireless network hardware? A. Less, but bigger network antennas B. Interference and attenuation are being eliminated C. Putting networks onto chips D. Virtualization and merging with the cloud E. Sensors that don't need batterie

d

Since our firm's sales are cyclical, we adjust the commissions of our sales team sales each quarter.What HLOOKUP function would be used to determine the correct commission rate for March 15th, as shown below? A. =HLOOKUP(C5,C2:F3,3,TRUE) B. =HLOOKUP(C5,C2:F3,2,FALSE) C.=HLOOKUP("Rate",C2:F3,C5,TRUE) D. =HLOOKUP(C5,C2:F3,2,TRUE)

d

The European Union's data protection laws are ___________ strict compared to the US laws. A. Equally B. Less C. Non-existently D. More

d

The University of Arizona is nationally recognized for sustainability in its academics, research, operations, and administration by the Assocation for the Advancement of Sustainability in Higher Education.What Sustainability Tracking, Assessment & Rating System™ (STARS) rating was the University of Arizona awarded in 2017? A. Bronze B. Silver C. Platinum D. Gold

d

The ________ prohibits an organization from collecting any personal information unless the customer specifically authorizes it. A.information privacy policy B. opt-out model of informed consent C. digital dossier policy D. opt-in model of informed consent

d

The advantage of ________________ is they can be readover greater distances. A. WSNs B. QR codes C. Passive RFID tags D. Active RFID tag

d

The equity on a company's balance sheet is most closely related to which of the following? A. Gross margin B. Operating income C. Share price D. Book value E. Market value

d

The three security challenges of wireless communication are confidentiality, accessibility, and _____. A. incorporation B. importance C. Internet D. integrity

d

The web ____________ buyer power. A. has no impact on B. decreases C. increases D. has a mixed impact on

d

Tracking what products are delivered to users, and when, is a form of what? A. Scheduling Control B. Acceptance Control C. Maintenance Control D. Release Contro

d

What Data Mining method is similar to the approach used by IS Case-based reasoning? A. Classification B. Forecasting C. Clustering D. Association

d

What accounting metric a strong indicator of whether a firm has sufficient short-term assets to cover its immediate liabilities? A. Price to earning ratio B. Current ratio C. Earning per common share D. Acid Test

d

What collaboration tool was discussed in class that enhances the participants' contextual awareness by sharing non-verbal information during meetings A. Twitter B. Crowdsourcing C. Teleportation D. Telepresence E. Six Sigm

d

What is the collective name for a set of open source programs and procedures, such as MapReduce and Yarn, that commonly provide the "backbone" of their big data operations? A. Cognos B. Sybase C. Terradata D. Hadoop

d

What is the name of the University of Arizona's primary career management tool that offers UA students and alumni access to jobs, internships, and a range of other services? A. eSMS B. D2L C. UAccess D. Handshake

d

What is the name of the agile framework for managing the work of developmentteams who break their work into actions that can be completed within timeboxed iterations, called sprints (30 days or less)? A. Rapid Application Development B. Waterfall C. Prototyle Methodology D. SCRUM

d

What is the name of the directory where the files for your websites for ABP-3A and ABP-3B will be stored on the U.Arizona.Edu web server? A. www_html B. index_html C. public.html D. public_html

d

What is the name of the social engineering attack that frightens computer users into visiting malware-infested websites by appearing to be legitimate warnings from antivirus software companies that your computer's files have been infected with theintent of tricking a user into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection? A. Pretexting B. Tailgating C. Quid Pro Quo D. Scareware

d

What is the process of identifying metrics that are outside of acceptable tolerance levels? A. Classification B. Visualization C. Drill Down D. Exceptiuon Reportin

d

What is the term used to describe a graphical description of a database that describes the way in which an organization's data and business activities are associated with one another? A. A Model of Efficiency B. An Enterprise Resource Design C. An Artificial Database Scheme D. An Entity Relationship Diagram

d

What normative ethical theory expects a corporation to create more value to society that it consumes? A. Value Chain Theory B. Stakeholder Theory C. Stockholder Theory D. Social Contract Theory E. Return on Investment Theor

d

What normative theory of ethics focuses on the belief that manager's actions should be guided by the understanding that they are entrusted with a responsibility to manage and protect the assets ofthe company for the benefit of all of those who the actions of the firm affect? A. Social Contract B. Organizational C. Stockholder D. Stakeholder E. Loyalty

d

What technique has been used by companies such as Starbucks and Netflix used to engage large numbers of non-employees to innovate, manage, design and market new products? A. Click-stream analysis B. Executive dashboards C. Capacity planning D. Crowdsourcing E. Six Sigm

d

What term best describes when consumers are able to use their smartphones to obtain information about a company's competitor's product pricing, features, customer reviews and availability while shopping in their company's brink-and mortar store? A. Accessibility B. Multi-path C. Crucial distinctions D. Information transparency E. Interference

d

What term describes individuals with tactic knowledge about a particular domain? A. Community Leaders B. Knowledge Guides C. Expert System D. subject- matter experts

d

What term is used to describe interorganizational ERP systems that provide web-enabled links among a company's key business systems—such as inventory and production—and its customers, suppliers, distributors, and other relevant parties? A. MRP B. ERP C. MRP-II D. ERP-II

d

What term is used to describe the most successful solutions or problem-solving methods for achieving a business objective?A. Agility B. Bottom line C. Decision support D. Best practices

d

What term is used to describe the one column for an actor in a cross -functional diagram? A. Timeline B. Thread C. Path D. Swimlane

d

What term is used to describe the printable, one-time use codes you can generate for NetID+ authentication that are useful when traveling, when cell phone carriers may charge additional fees for calls and texts, or when you do not have access to your primary authentication device? A. YubiKey passcode B. Lifeline codes C. SMS passcodes D. Bypass code

d

What term is used to describe the set of tasks that must be completed as scheduled in order to ensure the delivery of your project on time? A. Scope Creep B. Change Management C. Quality Triangle D. Critical Path

d

What tool is commonly used to track how, when and from what location users are using website?A. Project Management B. Wire Frame Design C. Content Management D. Google Analytic

d

What type of chart essentially adds a third dimension, such as frequency or quantity, to scatter plots? A. Donut Charts B. Treemap Charts C. Stacked Area Charts D. Bubble Charts

d

What type of data mining presents information graphically so that users are able to identify patterns in the underlying data? A. Nearest-neighbor Techniques B. Case-based Reasoning C. Neural Networks D. Data Visualization E. Rule Induction

d

What type of electronic commerce helps shoppers connect with one another based on tastes, location, age, gender, and other selected attributes allowing them to share information using voting, comments, discussions, and reviews focused on shopping? A. Crowdsourcing B. Business value chains C. Globalization D. Social shoppin

d

What type of inventory demand is based on the forecasted need for finished products? A. Expected demand B. Shortage demand C. Dependent demand D. Independent demand

d

What type of tag attribute is used with an IMG (image) tag to improve accessibility? A. BODY B. HTML C. HEAD D. ALT

d

What was the name of the legislation adopted by the European Parliament that mandated that all countries within the EU must setup laws requiring websites to obtain informed consent before they can store or retrieve information on a visitor's computer or web-enabled device. A. EU General Data Protection Regulation B. EU Cybersecurity Act C. EU Data Protection Directive D. EU Cookie Law

d

When adding your icon to your ABP-3B website, what section should you add the link directive to your icon file? A. ALT B. HTML C. BODY D. HEAD

d

When analyzing the performance of students in MIS 111 on Exam 1, which of the following would not be appropriate as a useful "dimension" in an OLAP data cube? A. Class section B. Class standing C. Academic major D. Individual email addresses

d

When displaying a webpage, such as http://www.u.arizona.edu/~wilbur,what is the name of the directory the web browser will check in the "wilbur" account for the "index.html" website? A. The "wilbur" directory B. The "home" directory C. The "www" directory D. The "public_html" director

d

When the DNC was targeting voters using their data-driven approach, which of these voting groups were the most appropriate to target? (This question is from the online lecture) A. Republican voters B. Democratic voters who never vote C. Democratic voters who always vote D. Democratic and swing voters who sometimes vote

d

When you check your credit score for incorrect information, you're responding to which of the "4 V's" discussed for "big data" in the financial reporting business sector? A. Velocity B. Volume C. Variety D. Veracity

d

Which of the following business component are *not* included in an MRP-II planning cycle? A. Workforce B. Plant and Equipment C. Raw Materials D. Product Margins

d

Which of the following decisions would *not* be a quantitative decision? A. Approving a person's loan based on total debt and their age B. Price-to-Earnings Stock Analysis C. Return on Investment Analysis D. Comparing project objectives with corporate objectives

d

Which of the following is FALSE of social computing? A. It combines social behavior and IT to create value. B. It focuses on improving collaboration. C. It encourages user-generated content. D. It allows social information to remain anonymous

d

Which of the following is TRUE? A. IT can eliminate any job. B. IT only helps improve employees' health and safety. C. IT opens up jobs for middle managers. D. IT impacts entire industries

d

Which of the following is a DISADVANTAGE of purchasing prewritten software? A. The company can try out the software before purchasing it. B. It may eliminate the need to hire personnel specifically dedicated to a project. C. The company can know what it is getting before it invests in the product. D. The software is controlled by another compan

d

Which of the following is generally NOT commonly used as a biometric identification? A. Retinal Pattern B. Facial geometry C. Fingerprint D. Signature

d

Which of the following is the technology that enables most mobile wallet applications? A. VRP B. ERP C. AFC D. NFC

d

Which of the following knowledge management concepts includes an organizational culture focused on problem solving, a desire to share knowledge because of mutual interest, and norms that build trust, such as might be found in an MIS 111 FlexLab? A. Knowledge management cycle B. Click-stream analysis C. Intellectual capital community D. Community of practice E. Best practices communit

d

Which of the following security controls would be used to identify and stop a known user?s access based on a unusual pattern of behavior? A. Data Masking B. Two-factor authentication C. Firewalls D. Intrusion Detection Systems E. Encryptio

d

Which of the following supply chain technologies eliminates the need for a company to implement the "3-way match" process? A. Lean Manufacturing B. SCOR C. Six Sigma D. CPFAR

d

Which of the following technologies would *not* require line-of-sight scanning? A. QR Code Tags B. Price Label Tags C. Bar Code Tags D. RFID Tags

d

Which of the following types of access controls would be a person?s unique identifier within the security domain, such as Name, SSN, Employee ID? A. Accountability B. Non-repudiation C. Authorization D. Identification E. Authentication

d

Which of the following types of security risks would be technique used to compromise a system? A. Control B. Footprint C. Vulnerability D. Exploit E. Attack

d

Which of the project management documents includes all three of the triple constraints that are in the Scope Triangle? A. Hierarchical Diagram B. Spiderweb Diagram C. Cross-functional Diagram D. Gantt Chart E. PERT Char

d

Who was the founding director of the Arizona Telemedicine Program? A. John Po, M.D., Ph.D. B. Ana Maria Lopez, M.D., M.P.H. C. Richard A. McNeely, M.A. D. Ronald S. Weinstein, M.D

d

[RelativeSize]What type of chart would be show the values of individual components proportional to a whole, allowing you to easily know relative size of a component, such as might be done to analyze the allocation of expenditures in a budget? A. Bar Chart B. Line Chart C. Bubble Char D. Pie Chart

d

___ is any danger to which a system may be exposed. A. Information security B. Exposure C. Security D. Threat

d

___ is the process of forming a digital dossier. A. Information privacy B. Privacy C. Dossiering D. Profiling

d

___________ support analysis of data about a business unit or company division, whereas ____________ support analysis of entire organizations. A. Data marts; data dictionaries B. Data warehouses; data marts C. Data warehouses; data dictionaries D. Data marts; data warehouses

d

____________ allows you to access the internet through a coaxial media previously used only for TV connections. A. ADSL Modem B. Dial-up modem C. SONET Modem D. Cable modem

d

____________ refers to determining who is responsible for actions that were taken. A. Liability B. Responsibility C. Acceptance D. Accountability

d

A company's "ticker" or stock symbol serves what role on a stock trading exchange? A. The change (up or down) in price from the last purchase price B. The official company logo used for stock transactions C. The time and date the stock was sold D. The broker selling the stock E. Uniquely identifies a traded stock

e

All of the symbols representing tasks and decisions that are shown in single column of a vertical cross-functional diagram are related to the same what? A. Root Cause B. Organization C. Entity D. Decision Model E. Actor

e

As a possible password, how many variableswould the password MIS111Exam(just the underlined string of characters) have when assessing its security strength? A. 2 B. 5 C. 1 D. 4 E. 3

e

As originally discussed by Dr. Gilliland, the classic values conflict with "Who Am I'" represents what type of ethical dilemma? A. Short-term vs. long-term B. Organizational ethics C. Peer-pressure vs. boss-pressure D. Honesty vs. integrity E. Integrity vs. loyalt

e

Determining whether your personal computer has appropriate hardware to take an online examproctored by Examity is what type of assessment? A. Economic feasibility B. Management feasibility C. Behavioral feasibility D. Customer feasibility E. Technical feasibilit

e

From a user's perspective, perceived affordances would include actual perceptible design affordances and what other category of perceptual affordances? A. Correct rejection of design characteristics that are not affordances B. Accessible affordances C. Hidden design affordances D. Design mitigation affordances E. False or fake design affordance

e

Identifying patterns in data based on common temporal (time) or spatial (geographic) traits is based on what type of data mining analysis? A. Sequencing B. Association C. Classification D. Forecasting E. Clustering

e

In Thomas Friedman's discussion of globalization, he described the process of globalization as being realized through actions that were first defined by your country, then later defined by multi-national companies, and finally, in the most recent age of globalization is defined by: A. Political parties B. International treaties C. Financial markets D. Social media E. Individuals

e

In the Jack Welch Video Case in the SCM Lecture, What approach was he discussing as key to providing customer value? A. the SCOR Model -the Supply Chain Operations Reference Model B. CPFAR -Collaborative Planning, Forecasting And Replenishment C. Total Quality Management D. Lean Manufacturing, using JIT and SMED E. Six Sigma

e

In the Online Democracy model, the "Voter Activation Network" uses voter registration rolls to categorize voters as always/sometimes/never voting by using information obtained from: A. Private sector polling B. Online media C. Partisan political organizations D. Commercially-generated databases E. Government records

e

In the Software Development Lifecycle Process (SDLC), in what SDLC stage is it the most costly to make changes to the system requirements A. Systems Implementation B. Systems Design C. Systems Testing D. Systems Programming E. Systems Operation and Maintenance

e

Making the Adobe Creative Cloud is now available to UofA students.What approach for software acquisition did the UoA used to allow students to have access to this software? A. Government Seizure(Right of Eminent Domain) B. Buy (Ownership of Intellectual Property) C. In-House Development (Writing Software) D. Open Source (Non-proprietary software) E. Lease (Right to Use Product

e

Market capitalization is determined by multiplying the stock price by what? A. Profits earned from direct operations B. Year-end Earnings, minus taxes and interest C. Dividends paid during the last fiscal year D. Book value of the company E. Number of common shares outstandin

e

Pie charts have several limitations, including all of the following except? A. They cannot show negative values B. They can only show one series C. When two or more items are close in value it can be hard to determine which is larger D. Values near zero may not show up and be hidden E. They have limited color and don't draw the eye and attention

e

Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control? A. Social Contract B. Just-In-Time C. Bullwhip effect D. Disintermediation E. Defense in depth

e

Satelites used for data communications that appear to be stationary from a fixed location on earth are placed in what type of orbit? A. Mid-earth orbit B. Commercial orbit C. Elliptical orbit D. Polar orbit E. Geosynchronous orbi

e

Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? A. Defense in Depth B. Advanced Persistent Threats C. Industrial Sabotage D. Open Source Hacking E. Social Engineerin

e

Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? A. Open Source Hacking B. Defense in Depth C. Industrial Sabotage D. Advanced Persistent Threats E. Social Engineerin

e

The "Porter's Forces" model deals with what aspect of globalized business? A. Relationships B. Location C. Design D. Time E. Competition

e

The task of brainstormingin a group decision support system is similar to what step in the knowledge management cycle?A. Refine B. Publish C. Disseminate D. Store E. Create

e

What dimension of Porter's Forces focuses on the decision that a buyer makes when choosing among direct, existing competitors when all of the competitors offer the same identical name-brand product (e.g., an iPhone 6)? A. Threat of Substitution B. Buyer power C. Threat of New Entrants D. Supplier power E. Industry Rivalry

e

What is the term used to describe the process of reducing the number of dimensions of a multi-dimensional data cube (e.g., from three dimensions, perhaps season, location, and product, into two dimensions, such as season and location)? A. Variable B. Context C. Function D. Simplification E. Projection

e

What term describes the ability of a person to effectively evaluate and manage one's finances in order to make prudent decisions toward reaching life's goals? A. Personal Accounting B. Risk Management C. Household Finance D. Expense Management E. Financial Literac

e

What type of innovations are intended to be incompatible with existing standards and value chain, and must develop markets de novo (latin for "from the beginning")? A. Platform Innovation B. Profit Innovation C. Product Innovation D. Application Innovation E. Disruptive Innovation

e

When major airlines (American, Delta, United, etc.) bypass travel agents and directly market tickets to customers from the airline's corporate website, this is an example of using what type of business sales strategy? A. Crowdsourcing B. Communities of Practice C. Group Systems D. Reintermediation E. Disintermediation

e

Which of the following actions would be considered a biometric authentication? A. Requiring a user to sign their signature B. Requiring a user to enter a secret password C. Requiring a user to type a group of displayed letters D. Requiring a user to swipe a CatCard E. Requiring a user to scan their fingerprin

e

Which of the following does a Fishbone Diagram typically not inform you about a problem? A. Identifies the major categories of a problem B. Identifies many of the root causes of problems C. Helps guide the process improvement process D. Organizes the problems associated with a process by the major categories E. The cost of correcting a problem with a proces

e

Which of the information layers in the Internet of Things model focuses on the communication networks that connect the sensors that actually collect the data? A. Metadata Layer B. Generation Layer C. Application Layer D. Processing Layer E. Transmission Laye

e

With respect to Porter's Forces, which of the five factors would have be the LEAST (weakest) impact on Starbuck's business model? A. Competitive rivalry B. Bargaining power of buyers (its customers) C. Threat of substitutes D. Threat of new entrants E. Bargaining power of suppliers

e

Your username (UANetID) is your claim of identify to a computer system.When the computer system verifies your identify by requiring you to enter a password is an example of what type of authentication? A. Something a user inherits B. Something a user has C. Something a user is D. Something a user does E. Something a user know

e


Related study sets

Examples of Conduction, Convection, and Radiation, Earth Science - The Water Cycle

View Set

DODI 5040.02, VISUAL INFORMATION (VI)

View Set

Advertising & Promotions Study Guide - QUIZ 1

View Set

Module 7: Finance- TVM and Multiple Cash Flows

View Set

MRKT 640 Consumer Behavior Module 3

View Set