MIS 111 exam 1

Ace your homework & exams now with Quizwiz!

In the Information-based Problem Solving Video Case, what was the map that the interviewee (Beth Bluer) was trying to create? a. A map overlying foster homes and registered sex offenders b. A map overlying violent crime and police patrol routes c. A map overlying street lighting and sexual assults d. A map overlying schools, registered sex offenders, and sexual assults e. A map overlying police precincts and violent crime incidents

A map overlying foster home and registered sex offenders

What normative ethical theory expects a corporation to create more value to society that it consumes? a. Stockholder Theory b. Stakeholder Theory c. Social Contract Theory d. Supply Chain Theory

Social Contract Theory

Library: What is the name of the University of Arizona's multidisciplinary learning community and collaborative makerspace in the University Libraries where students can access cutting-edge technologies, such as 3D scanning and printing equipment, a visualization wall, virtual reality headsets, and Raspberry Pis, along with collaborating with interdisciplinary experts? a. iSpace b. Special Collections c. Multimedia Zone d. Collaborative Learning Space

iSpace

How does adding social networking to the VAN allows candidates to improve the effectiveness of their volunteers? a. Leverages personal relationships b. Sending campaign tweets automatically c. Automatically registers new voters d. Eliminates the need for blockwalking e. Replaces campaign volunteers with computer bots

leverages personal relationships

______________ is the right to be left alone and to be free of unreasonable personal intrusions. a. A digital dossier b. Information privacy c. Privacy d. Profiling

privacy

One key differentiator of Zara from competitors is it owns it's supply chain, unlike retailers such as H&M or Uniqlo, and it also owns 50% of it's manufacturing. This approach means Zara is not only more nimble, but in general doesn't have to contend with which of Porter's four external (out side the industry) forces in the same way the other retailers do?. a. Bargaining Power of Suppliers b. Bargaining Power of Buyers c. Threat of Substitute Products d. Threat of new entrants

Bargaining power of suppliers

With respect to Porter's Forces, which of the five factors would have be the LEAST (weakest) impact on Starbuck's business model? a. Bargaining power of suppliers b. Bargaining power of buyers (its customers) c. Threat of substitutes d. Threat of new entrants e. Competitive rivalry

Bargaining power of suppliers

In the Zara case, the company has aligned its information system strategy with what? a. Business strategy b. Product margins c. Decentralized intelligence d. Competitive position e. Efficiency model

Business Strategy

What organization was created in the Eller College of Management in the Spring of 2003 and is designed to be a member organization dedicated to the support of Eller College undergraduate students in their pursuit of co-curricular knowledge, skills, leadership and community activities? a. Federation of Eller Student Organizations (FESO) b. Eller Leadership and Integrity Training for Excellence (ELITE) c. Leadership Empowerment & Academic Development Program (LEAD) d. PACE Freshman Honorary Experience

Federation of Eller student Organization (FESO)

Taxes, FICA and other Payroll Deductions can easily be what percentage of a person's paycheck? a. 15% b. 25% c. 35% d. 45%

35%

Assume you are 22 years old when you graduate from the University of Arizona and have a credit card with a $2,000 credit balance with an 18% annual rate. If you only make minimum payments of 2% of the balance or just $10 (whichever is greater) each month, what birthday will you likely be be celebrating when the the credit card is paid off? a. 52 b. 37 c. 27 d. 32

52

Approximately what percentage of applications for jobs are rejected by potential employers before the interview due to public information posted online by the applicant (e.g.social networking, blogs, media sites, etc.- that is, your online reputation)? a. Less than 5% b. About 10% c. About 30% d. Less than 50% e. 60% or more

60% or more

Which of the following is a support activity in Porter's value chain model? a. Human Resources b. Logistics c. Operations d. Marketing e. Service

Human Resources

The ____________________ is a summary of information needs of the functional areas and of the organization as a whole. a. Application portfolio b. IT environment c. Mission d. Objective of the IT function

IT environment

Thought Question: If you are forming a startup company, and you hope it will grow to be the next Amazon, but there is a great deal of uncertainty about both growth rate and future needs for your financial systems, which option for acquiring your Financial IT applications makes the most sense? a. Develop In-House b. Lease c. Buy

Lease

School of Arts: What domain of education in the art school emphasizes experimental contemporary studio practice that includes combined media installation, performance, environmental and site-specific art, 3D modeling, digital fabrication, video, audio and AR/VR installations, community based practice, and interactive and relational strategies? a. Extended Media b. Digital Art c. Interdisciplinary Practice d. Visual Culture

Extended Media

In the Personal Branding Video Case from Tuck Business School, which tool was discussed as being an 'overheard personal conversation' that still needed to be managed in the context of your business personal brand a. Facebook b. Linkedin c. Twitter d. Instagram e. SnapChat

Facebook

What network security control prevents information from moving between two networks? a. Firewall b. Post Scanner c. Packet Sniffer d. Biometric Identification

Firewall

In the Relationship-based Organizing Video Case, what was being done to improve the effectiveness of campaign volunteers? a. Tracking any online posts about candidates to allow immediate, effective responses by volunteers b. Leveraging personal relationships of campaign volunteers with voters to allow personal networking c. Eliminating the need for block-walking and phone calls by campaign volunteers through online engagement d. Enhancing the call efficiency of volunteers by enabling personalized phone conversations

Leveraging personal relationships of campaign volunteers with voters to allow personal networking

On your personal financial balance sheet, your student loans would be classified in what category? a. Liability b. Assets c. Net Worth d. Prepaid Expense e. Expenditures

Liability

In the Personal Branding video case, which of the following online platforms was idenfied as being primarily a business networking tool? a. Facebook b. LinkedIn c. Democratic voters who sometimes vote d. Wordpress e. Amazon.com

LinkedIn

In the Martha Stewart case, which of the following issues resulting in Martha Stewart being convicted of criminal charges that resulted in prison time? a. Lying to the FBI b. Defaulting on a loan c. Selling stocks below book value d. Insider trading e. Falsely advertising her products

Lying to the FBI

Which of the following types of social engineering attacks would be a text or SMS message from someone claiming to be from a reputable or known company asking your to disclose your personal information a. Tailgating b. Vishing c. Smishing d. Spear Phishing

Smishing

Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? a. Defense in Depth b. Industrial Sabotage c. Social Engineering d. Advanced Persistent Threats e. Open Source Hacking

Social Engineering

Information systems professionals understand business needs and analyze processes, methods and data to create customer-oriented solutions. The value proposition for MIS was described more briefly by Dr. Jay Nunamaker, Regents Professor and founding chair of the MIS Department, as a discipline focused on doing what for business? a. Solving real problems b. Computer Design c. Programming d. Academic research e. Marketing software

Solving real problems

In the Biometric Passwords Video Case, what were the two emerging biometric technologies that were explained in detail? a. The patterns of eye veins, heartbeat rythms b. The patterns of fingerprints, brainwave patterns c. The patterns of eye veins, brainwave patterns d. The patterns of fingerprints, heartbeat rythms

The patterns of eye veins, heartbeat rythms

IT __________ be used to create a competitive advantage ___________. a. can; because everyone has access to technology b. can; when it is used effectively c. cannot; because everyone has access to technology d. cannot; even when it is used effectively

can; when it is used effectively

When you get an unexpected email, you should avoid everything but? a. Opening attachments b. Clicking on links c. responding with personal data d. copying a link to a known website and pasting it into your browser

copying a link to a known website and pasting it into your browser

Which of the following security measures would be considered a "last line defense" for Information Security? a. Cryptography b. Access Control c. Firewall d. Intrusion Detection e. Security SDLC

cryptography

The web ____________ buyer power. a. decreases b. increases c. has no impact on d. has a mixed impact on

has a mixed impact on

In the Building Your Brand Video Case, what was a critical part of of building your online professional presence a. Include keywords associated with the jobs you are seeking b. List all the skills you possess to any extent c. Highlight your communication skills through blog posts d. Use Instagram to highlight the keywords for skills you have for potential employers

include keywords associated with the jobs you are seeking

What dimension of Porter's Forces focuses on the decision that a buyer makes when choosing among direct, existing competitors when all of the competitors offer the same identical name-brand product (e.g., an iPhone 6)? a. Industry Rivalry b. Threat of Substitution c. Threat of New Entrants d. Buyer power e. Supplier power

industry Rivalry

Which of the following is the correct order of the traditional System Development Life Cycle (SDLC)? a. analysis, investigation, design, programming and testing, implementation, operation and maintenance b. analysis, investigation, design, implementation, programming and testing, operation and maintenance c. investigation, analysis, design, implementation, programming and testing, operation and maintenance d. investigation, analysis, design, programming and testing, implementation, operation

investigation, analysis, design, programming and testing, implementation, operation

What action did Stacy Snyder take that resulted in her losing her job? a. Hacking the AP Twitter feed and posting a fraudulent message b. Undertaking accounting fraud at her company c. Posting a photo of herself at a party on her personal social media account d. Infecting her company's network computer with a virus while using Facebook at work e. Being a whistle-blower and reporting the illegal actions of her employer

posting a photo of herself at a party on her personal social media account

Which of the following is generally NOT commonly used as a biometric identification? a. Signature b. Fingerprint c. Facial geometry d. Retinal Pattern

signature

Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? a. Defense in Depth b. Industrial Sabotage c. Social Engineering d. Advanced Persistent Threats e. Open Source Hacking

social engineering

Your username (UANetID) is your claim of identify to a computer system. When the computer system verifies your identify by requiring you to enter a password is an example of what type of authentication? a. Something a user is b. Something a user has c. Something a user does d. Something a user knows e. Something a user inherits

something a user knows

What normative theory of ethics focuses on the belief that manager's actions should be guided by the understanding that they are entrusted with a responsibility to manage and protect the assets of the company for the benefit of all of those who the actions of the firm affect? a. Stockholder b. Stakeholder c. Social Contract d. Organizational e. Loyalty

stakeholder

In the Software Development Lifecycle Process (SDLC), in what SDLC stage is it the most costly to make changes to the system requirements a. Systems Design b. Systems Programming c. Systems Testing d. Systems Operation and Maintenance e. Systems Implementation

systems Operation and Maintenance

What is an Exploit? a. A deliberate act that exploits a vulnerability b. A technique used to compromise a system c. An identified weakness d. A necessary Control

technique used to compromise a system

Porters five forces focuses on what part of competition? a. The Business Environment b. The Five Core Internal Processes of a Business c. The Business Supply Chain d. The Five Core Business Functional Areas

the business environment

Which of the following is a DISADVANTAGE of purchasing prewritten software? a. It may eliminate the need to hire personnel specifically dedicated to a project. b. The company can know what it is getting before it invests in the product. c. The company can try out the software before purchasing it. d. The software is controlled by another company and may be hard to adapt

the software is controlled by another company and may be hard to adapt

A company's "ticker" or stock symbol serves what role on a stock trading exchange? a. Uniquely identifies a traded stock b. The time and date the stock was sold c. The broker selling the stock d. The change (up or down) in price from the last purchase price e. The official company logo used for stock transaction

uniquely identifies a traded stock

The _____________ approach states that an ethical action is the one that provides the most good or does the least harm. a. common good b. fairness c. rights d. utilitarian

utilitarian

If you are just being asked for something you know to get into a system, what is the system attempting to do? a. Validate your identity b. Strongly validate your identity c. Have you tell it your Identity d. Have you show it your Identity

validate your identity

In the Your Personal Brand Video Case, what two things had to be aligned and true for your personal brand to be effective? a. who you are and of how you present yourself b. who you are and your goals and aspirations c. who you are and your proposed career path d. who you are and what your what your resume looks like e. who you are and the environment you are operating in

who you are and of how you present yourself

Which of the following elements present on your CatCard relates to biometric identification? a. Your picture b. Your signature c. Your full name d. Your student ID number e. Your signature

your picture

Thought Question: Walmart's strategic focus is on Everyday low prices and maximum efficiency. You are a Walmart Manager and have been presented with 4 alternative IT ideas, which one should almost automatically float to the top? a. A new system for routing distribution that will save 10% of the total distribution costs b. A new system for customer service that will let customer's checkout 5% faster c. A new system for returns that will automatically track sales so customers can return items without a receipt d. A new system for employee scheduling so employees will have more comfortable and flexible work hours while still providing the stores optimal coverage

A new system for routing distribution that will save 10% of the total distribution costs

Which of the following states has a Social Media Privacy law specifically related to prohibiting employers from requesting passwords to personal Internet accounts to get or keep a job, or prohibiting colleges and universities from requiring access to students' social media accounts? a. California b. Arizona c. Pennsylvania d. New York

California

In cybersecurity, what is our last line of defense? a. Data Encryption b. Strong Authentication c. Biometrics (e.g.: retinal scans) d. Physical Security (e.g.: locked data centers)

Data Encryption

Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control? a. Bullwhip effect b. Just-In-Time c. Defense in depth d. Disintermediation e. Social Contract

Defense in Depth

Which group of voters would result in the highest return on investment (i.e., largest number of votes for a DNC candidate) using a get-out-the-vote (GOTV) strategy? a. Democratic voters who sometimes vote b. Independent voters who always vote c. Independent voters who sometimes vote d. Republication voters who sometimes vote e. Democratic voters who always vote

Democratic voters who sometimes vote

Converting all MIS 111 students from clickers to response cards without an initial test period is an example of what type of conversion? a. Direct conversion b. Pilot conversion c. Phased conversion d. Parallel conversion

Direct Conversion

What is the named used to describe daily spending decisions like eating at a restaurant, buying clothes, drinking Starbucks, or playing a round of golf? a. Discretionary b. Fixed c. Variable d. Intermittent

Discretionary

What is the name of the MIS Regents Professor and founding Chair of the MIS Department who described MIS as "Solving real problems for real people"? a .Dr. Sudha Ram b. Dr. Jay Nunamaker c. Dr. Hsinchun Chen d. Dr. Jim LaSalle

Dr. Jay Nunamaker

Car payments and rent are examples of what type of expenses? a. Fixed b. Discretionary c. Variable d. Pre-paid e. Flexible

Fixed

You have a MAC running OSX, which of these is NOT true? a. A.You will be fine just using your computer for assignments and exams b. A.You might find it easier if you can run a MS Windows virtual machine (VM) c. A.You may not be able to run a MS Windows VM d. A.You must have a MS Windows VM for Assignments and Exams

A.You must have a MS Windows VM for Assignments and Exams

What accounting metric a strong indicator of whether a firm has sufficient short-term assets to cover its immediate liabilities? a. Acid Test b. Current ratio c. Earning per common share d. Price to earning ratio

Acid Test

In the IT Strategic Planning Video Case, it discussed showing the _______ between all the IT projects and the overall business strategy? We also discussed this specific topic in class and explained it's meaning and why it mattered. a. Alignment b. Synergy c. Implementation order d. Harmony e. Unity

Alignment

So, what is MIS? In the description of Scope Creep and unintended consequences, we discussed technology leading to unintended consequences... What sport was the example of where technology was leading to judgements about the performance of referees/umpires/ or coaches? a. Baseball and the Strike Box b. Football and the Instant Replay c. Hockey and scoring goals d. Basketball and the three-point-line

Baseball and the strike Box

In the video case study of Porter's Forces, Michael Porter commented that the airport's control of gates represented which of the five forces? a. Bargaining Power of Suppliers b. Potential Threat of New Entrants c. Threat of Substitute Products d. Bargaining Power of Buyers e. Industry Rivalries

Bargaining Power of Suppliers

Critical Thinking Question: Thinking of Porter's five forces, if you are one of the mobile telephone companies upgrading to a 5G network, and the largest supplier of 5G telecom equipment in the world can no longer be purchased from for political reasons, which of the five forces will it impact from your perspective? a. Potential Threat of New Entrants b. Threat of Substitute Products c. Bargaining Power of Suppliers d. Bargaining Power of Buyers e. Industry Competitors

Bargaining power of suppliers

Porter's Forces describes which of the following business issues? a. Profitability b. Competition c. Security d. Product Design

Competition

The "Porter's Forces" model deals with what aspect of globalized business? a. Competition b. Design c. Location d. Relationships e. Time

Competition

What was the name of the legislation adopted by the European Parliament that mandated that all countries within the EU must setup laws requiring websites to obtain informed consent before they can store or retrieve information on a visitor's computer or web-enabled device. a. EU Cookie Law b. EU Cybersecurity Act c. EU Data Protection Directive d. EU General Data Protection Regulation

EU Cookie Law

A Cost-Benefit Analysis is related mostly to what type of project management feasibility assessment? a. Technical b. Operational c. Economic d. Political e. Ethical

Economic

When information systems were first introduced into organizations, the primary focus of their use was what? a. Efficiency b. Effectiveness c. Value Creation d. Strategic Advantage

Efficiency

The Gainesville police department started using the internet to accomplish all of these objectives except? a. Empower businesses to identify high crime areas and determine appropriate levels of security. b. Demystify law enforcement operations for the citizens of Gainesville. c. Enable individual citizens to better protect themselves from criminal activity. d. Motivate community groups to have a stronger hand in addressing crime.

Empower businesses to identify high crime areas and determine appropriate levels of security

David Myers' (former controller of MCI/Worldcom) statement "I still don't know that one point when I started to cross the line...", is an example of how small, incremental repeated compounding of unethical decisions can result in what? a. Gut check b. Transparency test c. Whistleblowing d. Ethical drift e. Defining moment

Ethical drift

When budgeting, the amount you spend for rent is considered as: a. Fixed expenses b. Variable expenses c. Discretionary expenses d. Non-Elective expenses

Fixed expenses

Which of the following is an example of how individuals use technology in a way that that allow others easily to monitor and track their activities? a. Geotagging smartphone photos b. Hashtagging posts on Twitter c. Accessing a website d. Reading a blog post online e. Sending emails to friends

Geotagging smartphone photos

In the Online Democracy model, the "Voter Activation Network" uses voter registration rolls to categorize voters as always /sometimes/never voting by using information obtained from: a. Online media b. Commercially-generated databases c. Private sector polling d. Government records e. Partisan political organizations

Government Records

Allowing individuals to file tax returns, renew driver's licenses, and obtain various permits online is an example of what type of eGovernment? a. Government-to-business (G2B) b. Government-to-citizen (G2C) c. Government-to-employees (G2E) d. Government-to-government (G2G) e. Government-to-suppliers (G2S)

Government-to-citizen (G2C)

In recognizing ethical situations, which of the following is related to a chemical reaction that occurs in your body, specifically your intestinal track? a. Ethical drift b. Gut check c. Transparency test d. Gut punch e. Taste check

Gut check

What is the name of the University of Arizona's primary career management tool that offers UA students and alumni ac cess to jobs, internships, and a range of other services? a. Handshake b. eSMS c. UAccess d. D2L

Handshake

Which of the following groups of voters would the DNC be most likely to contact with a persuasion campaign message? a. Independent voters who sometimes vote b. Democratic voters who sometimes vote c. Independent voters who always vote d. Republication voters who sometimes vote e. Democratic voters who always vote

Independent voters who always vote

___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information. a. Competitive intelligence b. Espionage c. Information extortion d. Intellectual property

Information extortion

As an employee of MCI/Worldcom, David Myers faced what classic ethical dilemma also described as a 'Who am I?'? a. Integrity versus Loyalty b. Social Contract Theory c. Weak Learning Culture d. Procrastination Culture e. Profit Maximizing Culture

Integrity versus Loyalty

The classic values conflict with "Who Am I'" represents what type of ethical dilemma? a. Short-term vs. long-term b. Honesty vs. integrity c. Peer-pressure vs. boss-pressure d. Integrity vs. loyalty e. Organizational ethics

Integrity vs.loyalty

Making the Adobe Creative Cloud is now available to UofA students. What approach for software acquisition did the UoA used to allow students to have access to this software? a. Buy (Ownership of Intellectual Property) b. Lease (Right to Use Product) c. In-House Development (Writing Software) d. Open Source (Non-proprietary software) e. Government Seizure (Right of Eminent Domain)

Lease (Right to Use Product)

The Associated Students of the University of Arizona is a representative organization led by University of Arizona students that serves, engages and empowers the student body through advocacy and the provision of programs and resources. What is the name of the Eller student currently serving as our ASUA Senator? a. Michelle Mendoza b. Olivia Johnson c. Ashin Katwala d. Brennen Feder

Michelle Mendoza

Market capitalization is determined by multiplying the stock price by what? a. Profits earned from direct operations b. Dividends paid during the last fiscal year c. Number of common shares outstanding d. Book value of the company e. Year-end Earnings, minus taxes and interest

Number of common shares outstanding

Understanding the question and responding with the right answer f or a question in the lightning round depends most on what? a. People b. Process c. Technology d. All three equally

People

Official-sounding emails that demand you reply immediately to confirm your personal information or you will lose access to your account are a software attack known as: a. Phishing Attack b. Trojan Horse c. Zero-day Attack d. Drive-by Attack e. Logic Bomb

Phishing Attack

Which of the following actions would be considered a biometric authentication? a. Requiring a user to scan their fingerprint b. Requiring a user to enter a secret password c. Requiring a user to swipe a CatCard d. Requiring a user to sign their signature e. Requiring a user to type a group of displayed letters

Requiring a user to scan their fingerprint

An investors willingness to potentially loose their money in exchange for the potential of higher returns is called their? a. Risk Tolerance b. Diversification c. Investing Tolerance d. Aggressiveness Quotient

Risk Tolerance

What is used to determine how long an investment will take to double, given a fixed annual rate of interest, allowing investors to get a rough estimate of how many years it will take for the initial investment to duplicate itself. a. Rule of 72 b. 28/36 Rule c. 2% Rule d. Rule of 18

Rule of 72

What is the name of the agile framework for managing the work of development teams who break their work into actions that can be completed within time boxed iterations, called sprints (30 days or less)? a. SCRUM b. Waterfall c. Prototyle Methodology d. Rapid Application Development

SCRUM

In the VAN (Voter Activiation Network) Relationship-Based Political Organizing video case study, the VAN was able to idenify the relationships of possible supporters using data from what source? a. Voter registration records b. Direct mail campaigns c. Online surveys d. Supporter's Facebook contacts e. Tax returns of registered voters

Supporter's Facebook contact

In the Video Case on Michael Porters Competitive Forces What Industry was described as being Terrible in Every Category? a. The Airline Industry b. The Railroad Industry c. The Supermarket Industry d. The Cattle Industry

The Airline Industry

In the Cybersecurity 101 Video Case, the reason for many of the insecurities currently found on the internet is due to what? a. The internet was not originally designed to experience the massive growth it underwent b. The internet was originally designed as a Game and not as a serious business network c. The internet was originally limited to short distances so distant countries couldn't be connected d. The internet was originally designed for use in space relaying data between satellites so human hackers were not a concern

The internet was not originally designed to experience the massive growth it underwent

All of the following are Information System Professional Specialties Except? a. Project management b. Business analyst c. Network management d. Database administrator e. Website designer f. Security analyst g. These are all Information System Professional Specialties

These are all Information System Professional Specialties

92. _________ is any danger to which a system may be exposed. a. Exposure b. Informati on security c. Threat d. Security

Threat

What term would be used to describe any danger to which is system my be exposed? a. Threat b. Audit c. Espionage d. Visibility e. Violation

Threat

In the 'How Technology Changes Us' Video Case, what was the fundamental technology that was being discussed as totally changing the world and how people function? a. Timekeeping b. Electricity c. Steam Engines d. Food Storage

Timekeeping

in the College Money Management 101 Video Case- what was Lesson 1, the very first thing students should start doing? a. Track Expenses b. Pick the right bank c. Minimize Debt d. Get a part-time job e. Keep an emergency fund f. Avoid stupid moves

Track Expenses

In financial markets, a "ticker symbol" identifies what? a. Traded Company b. Stock Exchange c. Sales Transaction Record d. Stock Broker's Identification e. Customer's Identification

Traded company

Which of the following would NOT be considered a type of social engineering ? a. Torjan Horse b. Spear Phis hing c. Tailgating d. Vishing e. Smishing

Trojan Horse

The Dow Jones Industrial Average is a market indicator comprised of 30 large publicly traded companies, and is intended to to gauge the performance of the industrial sector within the American economy. Recently, General Electric, who had been part of the DJIA for over 100 years, was replaced by another company. What company replaced GE in the DJIA? a. Walgreens b. Google c. Tesla d. American Airlines

Walgreens

What is the recommended solution covered in a tech tip for keeping track of many secure passwords that could be hard to remember? a. A Password Manager App on a Cell phone with a Lock Screen b. A locking notebook with passwords kept in your bag c. a wallet card d. a secure encrypted usb stick like IronKey

a Password managerApp on a Cell phone with a Lock Screen


Related study sets

The use of electric current in physical therapy

View Set

History 10-3 The Protestant Reformation

View Set

BSC 2010 Ch 6 Dynamic Study Module

View Set

Module 1 C7 Insurance - Annuities

View Set