MIS 111 CCR #1

Ace your homework & exams now with Quizwiz!

How VPNs Improve Security Video: What two techniques does a VPN keep someone snooping on a public network from seeing your data?

tunneling and encryption

What name is used to describe the Eller College of Management's commitment to fostering an environment where competition is fair, integrity is promoted, and academic dishonesty is rooted out?

E-tegrity

What type of investrment analysis focuses on historical returns and price changes, to chart patterns that can be used to estimate future price movement for securities and the larger market?

Technical Analysis

In an attempt to counter the increasing popularity of the "rent instead of own" designer fashion, what approach have many designer labels (companies) adopted?

The designer labels threatened to boycott retailers by withholding products from anyone working with RentTheRunway

What was the name of the data and relationship model developed by Peter Chen in 1976 while he was at Louisiana State University?

Entity-Relationship Diagram

As described in the Accenture "Building Your Brand" video case, what should you be scanning for when reviewing descriptions of ideal jobs to help you build an online profile that contributes to your job search process?

Using keywords you find in your online profile

As an example of a debt trap, consider the case of a student that graduates from the University of Arizona with a modest credit card debt of $2,500 on a card with an annual percentage rate (APR) of 15%. If the person only makes the minimum requirement payments each month, approximately how many years will it take them to pay off their $2,500 credit card balance?

14 years

How have manufacturers used IT to enhance the accessibility of Web and graphical user interfaces to provide opportunities for individuals with disability related to impaired vision?

Adding audible screen tips

Which of the following money applications offers borrowers easy access to a short-term (6-week) installment loan, but also has high late penalties?

Afterpay.com

In the "On Message" video case with Paul Argenti, what term was used to describe the importance of maintaining consistency in your personal brand between the reality of who you are and the reality of how you present yourself?

Alignment

From an accounting perspective, what term is used to describe the value of anything you own?

Asset

What accounting statement is a financial snapshot of a company's overall financial condition at a given point in time?

Balance Sheet Statement

As described in our reading, what term was used to describe the Malaysian Experiment's Multimedia Super Corridor (MSC) comprehensive regulatory framework that offered intellectual property protections and cyber laws to facilitate and assist the development of a truly ICT and multimedia environment?

Bill of Guarantees

Which of the following three terms is defined by our reading as an umbrella term that comprises all uses of information and telecommunication technologies in the public sector"?

Digital government

Which UofA MIS Researcher developed a system to use anonymized WiFi Data to identify person-density in buildings and spaces at the University using temporal and spatial data to help fight Covid-19?

Dr. Sudha Ram

According to the Imperial College London, which of the following time horizons should businesses view disruptive technologies such as cryptocurrency, autonomous vehicles, and distributed ledgers (blockchain)?

Happening Now

Created in 1999, what was the name of the service that allowed anyone with a computer and a reasonably fast Internet connection to (illegally) download and trade music for free?

Napster

What model of e-Governance stresses the similarities between e-Government and e-Business, and is focused on delivering high-quality public services and on moving to a more 'self-service' citizenship?

New Economy Model

Which of the following is the most popular language used for searching for information stored in a database?

SQL (Structure Query Language)

Which of the following three types of financial planning focuses on issues such as paying your monthly rent, paying tuition and fees, and cost of food, while still having some funds to use for entertainment, rest and relaxation?

Short-term goals

Based on the Table of Disruptive Technologies developed by the Imperial College London, which of the following themes include precision agriculture, smart energy grid, broadcasting of electricity, and space solar power?

Smart Planet (SP)

According to Siemens Enterprise Communications, what is one of the most effective routes to stealing confidential data from organizations?

Social Engineering

From the perspective of the classical ethical delemma "Who Am I", Cynthia Cooper, who at the time was MCI's VP of Internal Audit, took action based on which of the following perspectives when she reported evidence of criminal internal accounting fraud at MCI to federal law enforcement authorities?

Speaking out - whistleblowing

Court decisions in many countries have determined the right of privacy is not absolute, but must be balanced against what?

The needs of society and the public's right to know

Although Big Data can be extremely valuable, which of the following is generally NOT considered as a concern or challenge with the use of Big Data?

The rate at which data is flowing into organizations is rapidly increasing

How VPNs Improve Security Video: What technique does a VPN use to allow access to services in a company or on campus to all be accessible to a remote user as if they were on campus or at the workplace?

The user get a company internal IP address

In the "Budgeting" video case discussing personal finance, what did they recommend as a first step in budgeting?

Track your current income and expenses for a month

In the TechInsider video case, hackers we able to defeat the two-factor authentication used to protect the account of Deray McKesson by doing what?

Using social engineering to get Verizon to activate a new SIM card for his phone

When executed, which of the following is returned when an Excel function, such as SUM or COUNT, is executed?

Value

What term is used to describe a tool that is used to transform, manipulate, or select data in order to return a value that can be used in an expression?

function

When entering an Excel expression into a worksheet cell, which of the following symbols must be used as the first character?

=

What term describes the amount of cash available in the short term and indicates the funds needed to operate a business of a given size?

working capital

Which of the following terms describes a segment of computer code requires user action to perform malicious actions and is able to replicate, or spread, by itself (without requiring another computer program)?

worm

Which of the following represents the value 1234.56 when formatted as an Excel "Accounting" value with "Symbol" as "None"?

1,234.56

Plus (+), minus (-), multiply (*) and divide (/) are all examples of what type of arithmetic operator?

binary

A _________ is an intellectual work that is not based on public information.

trade secret

Although 80% to 95% of Americans cherish their privacy as a very important right and principle, what percentage also act in ways that allow others to easily monitor and track their activities through the use of credit cards and online activites?

50% to 70%

According to Social Intelligence, approximately what percentage of employers use information individuals post on social network sites to research job candidates during the hiring process?

90%

Employers often monitor their current employees online behavior to identify potential risks that behavior might represent for the company and its employees. Which of the following actions was NOT discussed as an online action by an employee that could represent a risk for a company?

Accessing websites containing political or religious content

Which of the following terms used with Excel would be most closely related to the concept of a programming named variable?

Cell reference (relative, absolute, or named)

What term is used to describe the business rules governing the relationships connecting entities? Actor

Constraint

In our eGovernment video case discussing how data solves government problems, the state of Maryland used data visualization to help protect minor children in foster care by checking if these children were living at the the same address as what other group?

Convicted sex and violent crime offenders

When developing a company's privacy policy guidelines, all of the following issues that would be relevant for Data Accuracy EXCEPT

Data should not be given to third parties without the individual's knowledge or permission

All of the following items was described as being keys attribute of a creating a good person brand, according to Paul Argenti from the Tuck School of Business at Dartmouth University, EXCEPT:

Embellishing and exaggerating personal accomplishments, experience and qualifications to get noticed

What ethical situation was David Myers, former Controller of WorldCom referring to when he stated "I still don't know that one point when I started to cross the line... when I should have acted differently"?

Ethical drift

All of the following are optional employee contributions made as wither pre- or post-tax payroll deductions EXCEPT:

Federal Insurance Contribution Act (FICA)

Government services such as tax filing, driver's license renewal, and issuing permits and licenses are typically associated with what aspect of technology?

Government-to-citizen (G2C)

Which of the ethical situations that Dr. Gilliland described related to how serotonin, which is part of a biochemical communication system between your brain and your gastrointestinal tract, signals how stress relates to your actions in ethical situations?

Gut Check

What role did Cynthia Cooper play in the MCI/Worldcom case study?

Identified the accounting irregularities during an internal audit

What financial statement reports the economic results of a company over a time period by showing the derivation of earnings and losses?

Income Statement

According to our assigned eGovernment reading, many social problems, from crime to poor educational performance, are the result of multiple interactions and the only way to tackle these issues more effectively is to understand these interactions better by doing what?

Joining up the information that we have

Which of the following criminal actions taken by Martha Stewart in the ImClone case study directly resulted in her serving time in prison?

Obstruction of justice

Which of the following is NOT a correct statement about the UArizona WiFi wireless network system?

Open access wireless network availabe to guests when on the UArizona campus

What term is used to describe public/private partnerships, such as the Liverpool Direct call center, that brings together private sector systems and technology expertise with public sector services and values?

Partnership of Place, Not Organization

Which of the following was NOT discussed as one of the factors that are required in order for deterrents relating to unethical behavior relating to cheating at academic institutions to be effective?

People must feel shame knowing their actions will be exposed to their peers publically

In our discussion of eGovernment, what term was used to describe how the City of St. Paul allow its citizens to choose to receive an email notification when any new content is published related to specific content categories or to a specific city neighborhood?

Personalization

Developed by the Imperial College London, the Table of Disruptive Technologies classifies technologies on two dimensions: Time Horizon and what other dimension?

Potential for Socio-Economic Disruption

Which of the following terms was NOT described as a desirable outcome of a E-Government strategy by the OMB (Office of Management and Budget)?

Profiting

Which of the following data structure concepts in Excel would be similar to a database field?

Worksheet column

Which of the following data structure concepts in Excel would be similar to a database record?

Worksheet row

Which of the following responsibilities is managed exclusively by a company's financial accounting business function?

accounting and statements

Which of the following metrics would be used as a measure of the ability of a company to meet its short-term financial obligations?

acid test

________ is an approach to managing information across an entire organization.

data governance

If database fields compose database records, what do database records compose?

database table

Which of the following is NOT considered a "fundamental" data type in Excel?

date

The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action.

deontology

Which of the following three Core Components of eGovernance leverages the public's investment in ICT (Information and Computer Technologies) to foster transparency and accountability within both national and local public institutions, to improve their functioning and effectiveness?

e-Administration

_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.

espionage

Which of the following Excel fundamental data types would NOT be considered as a literal or constant?

expression

The _________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.

fairness

What step in the general framework for ethics considers understanding the relevant facts of the situation, having sufficient information, and ensuring the relevant persons and groups have been consulted?

get the facts

What ethical framework is based on the tenant "Do unto others as you would have them do unto you"?

golden rule

What term is a measure of the speed in which cash is spent by entrepreneurial firms, which often have negative income and a high growth rate?

growth rate

Which of the following was NOT described as one of the perspectives related to the classic ethical dilemma of "Who Am I"?

gut check

What person associated with the Eller College of Management famously said "Integrity Is All You've Got" and encouraged to make absolute integrity the compass that guides everything you do?

karl eller

With respect to financial accounting, the term equity is used to describe the ownership of a company. Which of the following concepts would NOT be another term related to a company's "equity" in this context?

market value

What term is used to describe when information or systems are used beyond their stated objectives?

mission creep

The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.

opt-out

The ________ key is an identifier field that uniquely identifies a record so that it can be retrieved, updated, and sorted.

primary

By consolidating same data are stored in multiple locations, database systems minimize the problem of data ________.

redundancy

While working for IBM in the mid-1960's, what did Ted Codd develop to improve upon the hierarchical storage model?

relational database

In relational database modeling, operators that illustrate an association between two entities are known as which of the following?

relationship

Which of the following approaches is commonly used in retail, accounting/banking, and healthcare sectors to indicate candidate's likelihood for theft, fraud, workplace hostility, and job performance?

screening exams

Commonly used successfully in public areas such as in airports and on commuter trains and airplanes, which of the following social engineering techniques occurs when a perpetrator obtains information as they surreptitiously watch an employee's computer screen?

shoulder surfing

What type of social engineering attack, focused on acquiring sensitive, personal information, has a higher likelihood of success by targeting a specific organization or audience with messages that fraudulently appear to come from a legitimate entity, vendor or organization?

spear phishing

What financial statement reports cash receipts and payments over a period with respect to a company's operational, investing, and financial activities?

statement or cashflow

The General Data Protection Regulation, the world's strongest data protection laws, went into effect in ____ on May 25, 2018.

the european union


Related study sets

MICRO: CH 14 Staphylococcus, Micrococcus and similar organisms

View Set

PreAP Computer Science- 6.4-9 Quiz

View Set

MacroEconomics; Exam Four; Chapters 25-28

View Set

NURB 3030 Nursing as a Profession Exam 1

View Set

NUR 222 Multiple Choice Questions

View Set

Peds - Ch 21: Alteration in Urinary Elimination/Genitourinary Disorder

View Set