MIS 111 CCR #1
How VPNs Improve Security Video: What two techniques does a VPN keep someone snooping on a public network from seeing your data?
tunneling and encryption
What name is used to describe the Eller College of Management's commitment to fostering an environment where competition is fair, integrity is promoted, and academic dishonesty is rooted out?
E-tegrity
What type of investrment analysis focuses on historical returns and price changes, to chart patterns that can be used to estimate future price movement for securities and the larger market?
Technical Analysis
In an attempt to counter the increasing popularity of the "rent instead of own" designer fashion, what approach have many designer labels (companies) adopted?
The designer labels threatened to boycott retailers by withholding products from anyone working with RentTheRunway
What was the name of the data and relationship model developed by Peter Chen in 1976 while he was at Louisiana State University?
Entity-Relationship Diagram
As described in the Accenture "Building Your Brand" video case, what should you be scanning for when reviewing descriptions of ideal jobs to help you build an online profile that contributes to your job search process?
Using keywords you find in your online profile
As an example of a debt trap, consider the case of a student that graduates from the University of Arizona with a modest credit card debt of $2,500 on a card with an annual percentage rate (APR) of 15%. If the person only makes the minimum requirement payments each month, approximately how many years will it take them to pay off their $2,500 credit card balance?
14 years
How have manufacturers used IT to enhance the accessibility of Web and graphical user interfaces to provide opportunities for individuals with disability related to impaired vision?
Adding audible screen tips
Which of the following money applications offers borrowers easy access to a short-term (6-week) installment loan, but also has high late penalties?
Afterpay.com
In the "On Message" video case with Paul Argenti, what term was used to describe the importance of maintaining consistency in your personal brand between the reality of who you are and the reality of how you present yourself?
Alignment
From an accounting perspective, what term is used to describe the value of anything you own?
Asset
What accounting statement is a financial snapshot of a company's overall financial condition at a given point in time?
Balance Sheet Statement
As described in our reading, what term was used to describe the Malaysian Experiment's Multimedia Super Corridor (MSC) comprehensive regulatory framework that offered intellectual property protections and cyber laws to facilitate and assist the development of a truly ICT and multimedia environment?
Bill of Guarantees
Which of the following three terms is defined by our reading as an umbrella term that comprises all uses of information and telecommunication technologies in the public sector"?
Digital government
Which UofA MIS Researcher developed a system to use anonymized WiFi Data to identify person-density in buildings and spaces at the University using temporal and spatial data to help fight Covid-19?
Dr. Sudha Ram
According to the Imperial College London, which of the following time horizons should businesses view disruptive technologies such as cryptocurrency, autonomous vehicles, and distributed ledgers (blockchain)?
Happening Now
Created in 1999, what was the name of the service that allowed anyone with a computer and a reasonably fast Internet connection to (illegally) download and trade music for free?
Napster
What model of e-Governance stresses the similarities between e-Government and e-Business, and is focused on delivering high-quality public services and on moving to a more 'self-service' citizenship?
New Economy Model
Which of the following is the most popular language used for searching for information stored in a database?
SQL (Structure Query Language)
Which of the following three types of financial planning focuses on issues such as paying your monthly rent, paying tuition and fees, and cost of food, while still having some funds to use for entertainment, rest and relaxation?
Short-term goals
Based on the Table of Disruptive Technologies developed by the Imperial College London, which of the following themes include precision agriculture, smart energy grid, broadcasting of electricity, and space solar power?
Smart Planet (SP)
According to Siemens Enterprise Communications, what is one of the most effective routes to stealing confidential data from organizations?
Social Engineering
From the perspective of the classical ethical delemma "Who Am I", Cynthia Cooper, who at the time was MCI's VP of Internal Audit, took action based on which of the following perspectives when she reported evidence of criminal internal accounting fraud at MCI to federal law enforcement authorities?
Speaking out - whistleblowing
Court decisions in many countries have determined the right of privacy is not absolute, but must be balanced against what?
The needs of society and the public's right to know
Although Big Data can be extremely valuable, which of the following is generally NOT considered as a concern or challenge with the use of Big Data?
The rate at which data is flowing into organizations is rapidly increasing
How VPNs Improve Security Video: What technique does a VPN use to allow access to services in a company or on campus to all be accessible to a remote user as if they were on campus or at the workplace?
The user get a company internal IP address
In the "Budgeting" video case discussing personal finance, what did they recommend as a first step in budgeting?
Track your current income and expenses for a month
In the TechInsider video case, hackers we able to defeat the two-factor authentication used to protect the account of Deray McKesson by doing what?
Using social engineering to get Verizon to activate a new SIM card for his phone
When executed, which of the following is returned when an Excel function, such as SUM or COUNT, is executed?
Value
What term is used to describe a tool that is used to transform, manipulate, or select data in order to return a value that can be used in an expression?
function
When entering an Excel expression into a worksheet cell, which of the following symbols must be used as the first character?
=
What term describes the amount of cash available in the short term and indicates the funds needed to operate a business of a given size?
working capital
Which of the following terms describes a segment of computer code requires user action to perform malicious actions and is able to replicate, or spread, by itself (without requiring another computer program)?
worm
Which of the following represents the value 1234.56 when formatted as an Excel "Accounting" value with "Symbol" as "None"?
1,234.56
Plus (+), minus (-), multiply (*) and divide (/) are all examples of what type of arithmetic operator?
binary
A _________ is an intellectual work that is not based on public information.
trade secret
Although 80% to 95% of Americans cherish their privacy as a very important right and principle, what percentage also act in ways that allow others to easily monitor and track their activities through the use of credit cards and online activites?
50% to 70%
According to Social Intelligence, approximately what percentage of employers use information individuals post on social network sites to research job candidates during the hiring process?
90%
Employers often monitor their current employees online behavior to identify potential risks that behavior might represent for the company and its employees. Which of the following actions was NOT discussed as an online action by an employee that could represent a risk for a company?
Accessing websites containing political or religious content
Which of the following terms used with Excel would be most closely related to the concept of a programming named variable?
Cell reference (relative, absolute, or named)
What term is used to describe the business rules governing the relationships connecting entities? Actor
Constraint
In our eGovernment video case discussing how data solves government problems, the state of Maryland used data visualization to help protect minor children in foster care by checking if these children were living at the the same address as what other group?
Convicted sex and violent crime offenders
When developing a company's privacy policy guidelines, all of the following issues that would be relevant for Data Accuracy EXCEPT
Data should not be given to third parties without the individual's knowledge or permission
All of the following items was described as being keys attribute of a creating a good person brand, according to Paul Argenti from the Tuck School of Business at Dartmouth University, EXCEPT:
Embellishing and exaggerating personal accomplishments, experience and qualifications to get noticed
What ethical situation was David Myers, former Controller of WorldCom referring to when he stated "I still don't know that one point when I started to cross the line... when I should have acted differently"?
Ethical drift
All of the following are optional employee contributions made as wither pre- or post-tax payroll deductions EXCEPT:
Federal Insurance Contribution Act (FICA)
Government services such as tax filing, driver's license renewal, and issuing permits and licenses are typically associated with what aspect of technology?
Government-to-citizen (G2C)
Which of the ethical situations that Dr. Gilliland described related to how serotonin, which is part of a biochemical communication system between your brain and your gastrointestinal tract, signals how stress relates to your actions in ethical situations?
Gut Check
What role did Cynthia Cooper play in the MCI/Worldcom case study?
Identified the accounting irregularities during an internal audit
What financial statement reports the economic results of a company over a time period by showing the derivation of earnings and losses?
Income Statement
According to our assigned eGovernment reading, many social problems, from crime to poor educational performance, are the result of multiple interactions and the only way to tackle these issues more effectively is to understand these interactions better by doing what?
Joining up the information that we have
Which of the following criminal actions taken by Martha Stewart in the ImClone case study directly resulted in her serving time in prison?
Obstruction of justice
Which of the following is NOT a correct statement about the UArizona WiFi wireless network system?
Open access wireless network availabe to guests when on the UArizona campus
What term is used to describe public/private partnerships, such as the Liverpool Direct call center, that brings together private sector systems and technology expertise with public sector services and values?
Partnership of Place, Not Organization
Which of the following was NOT discussed as one of the factors that are required in order for deterrents relating to unethical behavior relating to cheating at academic institutions to be effective?
People must feel shame knowing their actions will be exposed to their peers publically
In our discussion of eGovernment, what term was used to describe how the City of St. Paul allow its citizens to choose to receive an email notification when any new content is published related to specific content categories or to a specific city neighborhood?
Personalization
Developed by the Imperial College London, the Table of Disruptive Technologies classifies technologies on two dimensions: Time Horizon and what other dimension?
Potential for Socio-Economic Disruption
Which of the following terms was NOT described as a desirable outcome of a E-Government strategy by the OMB (Office of Management and Budget)?
Profiting
Which of the following data structure concepts in Excel would be similar to a database field?
Worksheet column
Which of the following data structure concepts in Excel would be similar to a database record?
Worksheet row
Which of the following responsibilities is managed exclusively by a company's financial accounting business function?
accounting and statements
Which of the following metrics would be used as a measure of the ability of a company to meet its short-term financial obligations?
acid test
________ is an approach to managing information across an entire organization.
data governance
If database fields compose database records, what do database records compose?
database table
Which of the following is NOT considered a "fundamental" data type in Excel?
date
The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action.
deontology
Which of the following three Core Components of eGovernance leverages the public's investment in ICT (Information and Computer Technologies) to foster transparency and accountability within both national and local public institutions, to improve their functioning and effectiveness?
e-Administration
_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.
espionage
Which of the following Excel fundamental data types would NOT be considered as a literal or constant?
expression
The _________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.
fairness
What step in the general framework for ethics considers understanding the relevant facts of the situation, having sufficient information, and ensuring the relevant persons and groups have been consulted?
get the facts
What ethical framework is based on the tenant "Do unto others as you would have them do unto you"?
golden rule
What term is a measure of the speed in which cash is spent by entrepreneurial firms, which often have negative income and a high growth rate?
growth rate
Which of the following was NOT described as one of the perspectives related to the classic ethical dilemma of "Who Am I"?
gut check
What person associated with the Eller College of Management famously said "Integrity Is All You've Got" and encouraged to make absolute integrity the compass that guides everything you do?
karl eller
With respect to financial accounting, the term equity is used to describe the ownership of a company. Which of the following concepts would NOT be another term related to a company's "equity" in this context?
market value
What term is used to describe when information or systems are used beyond their stated objectives?
mission creep
The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
opt-out
The ________ key is an identifier field that uniquely identifies a record so that it can be retrieved, updated, and sorted.
primary
By consolidating same data are stored in multiple locations, database systems minimize the problem of data ________.
redundancy
While working for IBM in the mid-1960's, what did Ted Codd develop to improve upon the hierarchical storage model?
relational database
In relational database modeling, operators that illustrate an association between two entities are known as which of the following?
relationship
Which of the following approaches is commonly used in retail, accounting/banking, and healthcare sectors to indicate candidate's likelihood for theft, fraud, workplace hostility, and job performance?
screening exams
Commonly used successfully in public areas such as in airports and on commuter trains and airplanes, which of the following social engineering techniques occurs when a perpetrator obtains information as they surreptitiously watch an employee's computer screen?
shoulder surfing
What type of social engineering attack, focused on acquiring sensitive, personal information, has a higher likelihood of success by targeting a specific organization or audience with messages that fraudulently appear to come from a legitimate entity, vendor or organization?
spear phishing
What financial statement reports cash receipts and payments over a period with respect to a company's operational, investing, and financial activities?
statement or cashflow
The General Data Protection Regulation, the world's strongest data protection laws, went into effect in ____ on May 25, 2018.
the european union