MIS 111 exam 1
In the Information-based Problem Solving Video Case, what was the map that the interviewee (Beth Bluer) was trying to create? a. A map overlying foster homes and registered sex offenders b. A map overlying violent crime and police patrol routes c. A map overlying street lighting and sexual assults d. A map overlying schools, registered sex offenders, and sexual assults e. A map overlying police precincts and violent crime incidents
A map overlying foster home and registered sex offenders
What normative ethical theory expects a corporation to create more value to society that it consumes? a. Stockholder Theory b. Stakeholder Theory c. Social Contract Theory d. Supply Chain Theory
Social Contract Theory
Library: What is the name of the University of Arizona's multidisciplinary learning community and collaborative makerspace in the University Libraries where students can access cutting-edge technologies, such as 3D scanning and printing equipment, a visualization wall, virtual reality headsets, and Raspberry Pis, along with collaborating with interdisciplinary experts? a. iSpace b. Special Collections c. Multimedia Zone d. Collaborative Learning Space
iSpace
How does adding social networking to the VAN allows candidates to improve the effectiveness of their volunteers? a. Leverages personal relationships b. Sending campaign tweets automatically c. Automatically registers new voters d. Eliminates the need for blockwalking e. Replaces campaign volunteers with computer bots
leverages personal relationships
______________ is the right to be left alone and to be free of unreasonable personal intrusions. a. A digital dossier b. Information privacy c. Privacy d. Profiling
privacy
One key differentiator of Zara from competitors is it owns it's supply chain, unlike retailers such as H&M or Uniqlo, and it also owns 50% of it's manufacturing. This approach means Zara is not only more nimble, but in general doesn't have to contend with which of Porter's four external (out side the industry) forces in the same way the other retailers do?. a. Bargaining Power of Suppliers b. Bargaining Power of Buyers c. Threat of Substitute Products d. Threat of new entrants
Bargaining power of suppliers
With respect to Porter's Forces, which of the five factors would have be the LEAST (weakest) impact on Starbuck's business model? a. Bargaining power of suppliers b. Bargaining power of buyers (its customers) c. Threat of substitutes d. Threat of new entrants e. Competitive rivalry
Bargaining power of suppliers
In the Zara case, the company has aligned its information system strategy with what? a. Business strategy b. Product margins c. Decentralized intelligence d. Competitive position e. Efficiency model
Business Strategy
What organization was created in the Eller College of Management in the Spring of 2003 and is designed to be a member organization dedicated to the support of Eller College undergraduate students in their pursuit of co-curricular knowledge, skills, leadership and community activities? a. Federation of Eller Student Organizations (FESO) b. Eller Leadership and Integrity Training for Excellence (ELITE) c. Leadership Empowerment & Academic Development Program (LEAD) d. PACE Freshman Honorary Experience
Federation of Eller student Organization (FESO)
Taxes, FICA and other Payroll Deductions can easily be what percentage of a person's paycheck? a. 15% b. 25% c. 35% d. 45%
35%
Assume you are 22 years old when you graduate from the University of Arizona and have a credit card with a $2,000 credit balance with an 18% annual rate. If you only make minimum payments of 2% of the balance or just $10 (whichever is greater) each month, what birthday will you likely be be celebrating when the the credit card is paid off? a. 52 b. 37 c. 27 d. 32
52
Approximately what percentage of applications for jobs are rejected by potential employers before the interview due to public information posted online by the applicant (e.g.social networking, blogs, media sites, etc.- that is, your online reputation)? a. Less than 5% b. About 10% c. About 30% d. Less than 50% e. 60% or more
60% or more
Which of the following is a support activity in Porter's value chain model? a. Human Resources b. Logistics c. Operations d. Marketing e. Service
Human Resources
The ____________________ is a summary of information needs of the functional areas and of the organization as a whole. a. Application portfolio b. IT environment c. Mission d. Objective of the IT function
IT environment
Thought Question: If you are forming a startup company, and you hope it will grow to be the next Amazon, but there is a great deal of uncertainty about both growth rate and future needs for your financial systems, which option for acquiring your Financial IT applications makes the most sense? a. Develop In-House b. Lease c. Buy
Lease
School of Arts: What domain of education in the art school emphasizes experimental contemporary studio practice that includes combined media installation, performance, environmental and site-specific art, 3D modeling, digital fabrication, video, audio and AR/VR installations, community based practice, and interactive and relational strategies? a. Extended Media b. Digital Art c. Interdisciplinary Practice d. Visual Culture
Extended Media
In the Personal Branding Video Case from Tuck Business School, which tool was discussed as being an 'overheard personal conversation' that still needed to be managed in the context of your business personal brand a. Facebook b. Linkedin c. Twitter d. Instagram e. SnapChat
What network security control prevents information from moving between two networks? a. Firewall b. Post Scanner c. Packet Sniffer d. Biometric Identification
Firewall
In the Relationship-based Organizing Video Case, what was being done to improve the effectiveness of campaign volunteers? a. Tracking any online posts about candidates to allow immediate, effective responses by volunteers b. Leveraging personal relationships of campaign volunteers with voters to allow personal networking c. Eliminating the need for block-walking and phone calls by campaign volunteers through online engagement d. Enhancing the call efficiency of volunteers by enabling personalized phone conversations
Leveraging personal relationships of campaign volunteers with voters to allow personal networking
On your personal financial balance sheet, your student loans would be classified in what category? a. Liability b. Assets c. Net Worth d. Prepaid Expense e. Expenditures
Liability
In the Personal Branding video case, which of the following online platforms was idenfied as being primarily a business networking tool? a. Facebook b. LinkedIn c. Democratic voters who sometimes vote d. Wordpress e. Amazon.com
In the Martha Stewart case, which of the following issues resulting in Martha Stewart being convicted of criminal charges that resulted in prison time? a. Lying to the FBI b. Defaulting on a loan c. Selling stocks below book value d. Insider trading e. Falsely advertising her products
Lying to the FBI
Which of the following types of social engineering attacks would be a text or SMS message from someone claiming to be from a reputable or known company asking your to disclose your personal information a. Tailgating b. Vishing c. Smishing d. Spear Phishing
Smishing
Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? a. Defense in Depth b. Industrial Sabotage c. Social Engineering d. Advanced Persistent Threats e. Open Source Hacking
Social Engineering
Information systems professionals understand business needs and analyze processes, methods and data to create customer-oriented solutions. The value proposition for MIS was described more briefly by Dr. Jay Nunamaker, Regents Professor and founding chair of the MIS Department, as a discipline focused on doing what for business? a. Solving real problems b. Computer Design c. Programming d. Academic research e. Marketing software
Solving real problems
In the Biometric Passwords Video Case, what were the two emerging biometric technologies that were explained in detail? a. The patterns of eye veins, heartbeat rythms b. The patterns of fingerprints, brainwave patterns c. The patterns of eye veins, brainwave patterns d. The patterns of fingerprints, heartbeat rythms
The patterns of eye veins, heartbeat rythms
IT __________ be used to create a competitive advantage ___________. a. can; because everyone has access to technology b. can; when it is used effectively c. cannot; because everyone has access to technology d. cannot; even when it is used effectively
can; when it is used effectively
When you get an unexpected email, you should avoid everything but? a. Opening attachments b. Clicking on links c. responding with personal data d. copying a link to a known website and pasting it into your browser
copying a link to a known website and pasting it into your browser
Which of the following security measures would be considered a "last line defense" for Information Security? a. Cryptography b. Access Control c. Firewall d. Intrusion Detection e. Security SDLC
cryptography
The web ____________ buyer power. a. decreases b. increases c. has no impact on d. has a mixed impact on
has a mixed impact on
In the Building Your Brand Video Case, what was a critical part of of building your online professional presence a. Include keywords associated with the jobs you are seeking b. List all the skills you possess to any extent c. Highlight your communication skills through blog posts d. Use Instagram to highlight the keywords for skills you have for potential employers
include keywords associated with the jobs you are seeking
What dimension of Porter's Forces focuses on the decision that a buyer makes when choosing among direct, existing competitors when all of the competitors offer the same identical name-brand product (e.g., an iPhone 6)? a. Industry Rivalry b. Threat of Substitution c. Threat of New Entrants d. Buyer power e. Supplier power
industry Rivalry
Which of the following is the correct order of the traditional System Development Life Cycle (SDLC)? a. analysis, investigation, design, programming and testing, implementation, operation and maintenance b. analysis, investigation, design, implementation, programming and testing, operation and maintenance c. investigation, analysis, design, implementation, programming and testing, operation and maintenance d. investigation, analysis, design, programming and testing, implementation, operation
investigation, analysis, design, programming and testing, implementation, operation
What action did Stacy Snyder take that resulted in her losing her job? a. Hacking the AP Twitter feed and posting a fraudulent message b. Undertaking accounting fraud at her company c. Posting a photo of herself at a party on her personal social media account d. Infecting her company's network computer with a virus while using Facebook at work e. Being a whistle-blower and reporting the illegal actions of her employer
posting a photo of herself at a party on her personal social media account
Which of the following is generally NOT commonly used as a biometric identification? a. Signature b. Fingerprint c. Facial geometry d. Retinal Pattern
signature
Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? a. Defense in Depth b. Industrial Sabotage c. Social Engineering d. Advanced Persistent Threats e. Open Source Hacking
social engineering
Your username (UANetID) is your claim of identify to a computer system. When the computer system verifies your identify by requiring you to enter a password is an example of what type of authentication? a. Something a user is b. Something a user has c. Something a user does d. Something a user knows e. Something a user inherits
something a user knows
What normative theory of ethics focuses on the belief that manager's actions should be guided by the understanding that they are entrusted with a responsibility to manage and protect the assets of the company for the benefit of all of those who the actions of the firm affect? a. Stockholder b. Stakeholder c. Social Contract d. Organizational e. Loyalty
stakeholder
In the Software Development Lifecycle Process (SDLC), in what SDLC stage is it the most costly to make changes to the system requirements a. Systems Design b. Systems Programming c. Systems Testing d. Systems Operation and Maintenance e. Systems Implementation
systems Operation and Maintenance
What is an Exploit? a. A deliberate act that exploits a vulnerability b. A technique used to compromise a system c. An identified weakness d. A necessary Control
technique used to compromise a system
Porters five forces focuses on what part of competition? a. The Business Environment b. The Five Core Internal Processes of a Business c. The Business Supply Chain d. The Five Core Business Functional Areas
the business environment
Which of the following is a DISADVANTAGE of purchasing prewritten software? a. It may eliminate the need to hire personnel specifically dedicated to a project. b. The company can know what it is getting before it invests in the product. c. The company can try out the software before purchasing it. d. The software is controlled by another company and may be hard to adapt
the software is controlled by another company and may be hard to adapt
A company's "ticker" or stock symbol serves what role on a stock trading exchange? a. Uniquely identifies a traded stock b. The time and date the stock was sold c. The broker selling the stock d. The change (up or down) in price from the last purchase price e. The official company logo used for stock transaction
uniquely identifies a traded stock
The _____________ approach states that an ethical action is the one that provides the most good or does the least harm. a. common good b. fairness c. rights d. utilitarian
utilitarian
If you are just being asked for something you know to get into a system, what is the system attempting to do? a. Validate your identity b. Strongly validate your identity c. Have you tell it your Identity d. Have you show it your Identity
validate your identity
In the Your Personal Brand Video Case, what two things had to be aligned and true for your personal brand to be effective? a. who you are and of how you present yourself b. who you are and your goals and aspirations c. who you are and your proposed career path d. who you are and what your what your resume looks like e. who you are and the environment you are operating in
who you are and of how you present yourself
Which of the following elements present on your CatCard relates to biometric identification? a. Your picture b. Your signature c. Your full name d. Your student ID number e. Your signature
your picture
Thought Question: Walmart's strategic focus is on Everyday low prices and maximum efficiency. You are a Walmart Manager and have been presented with 4 alternative IT ideas, which one should almost automatically float to the top? a. A new system for routing distribution that will save 10% of the total distribution costs b. A new system for customer service that will let customer's checkout 5% faster c. A new system for returns that will automatically track sales so customers can return items without a receipt d. A new system for employee scheduling so employees will have more comfortable and flexible work hours while still providing the stores optimal coverage
A new system for routing distribution that will save 10% of the total distribution costs
Which of the following states has a Social Media Privacy law specifically related to prohibiting employers from requesting passwords to personal Internet accounts to get or keep a job, or prohibiting colleges and universities from requiring access to students' social media accounts? a. California b. Arizona c. Pennsylvania d. New York
California
In cybersecurity, what is our last line of defense? a. Data Encryption b. Strong Authentication c. Biometrics (e.g.: retinal scans) d. Physical Security (e.g.: locked data centers)
Data Encryption
Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control? a. Bullwhip effect b. Just-In-Time c. Defense in depth d. Disintermediation e. Social Contract
Defense in Depth
Which group of voters would result in the highest return on investment (i.e., largest number of votes for a DNC candidate) using a get-out-the-vote (GOTV) strategy? a. Democratic voters who sometimes vote b. Independent voters who always vote c. Independent voters who sometimes vote d. Republication voters who sometimes vote e. Democratic voters who always vote
Democratic voters who sometimes vote
Converting all MIS 111 students from clickers to response cards without an initial test period is an example of what type of conversion? a. Direct conversion b. Pilot conversion c. Phased conversion d. Parallel conversion
Direct Conversion
What is the named used to describe daily spending decisions like eating at a restaurant, buying clothes, drinking Starbucks, or playing a round of golf? a. Discretionary b. Fixed c. Variable d. Intermittent
Discretionary
What is the name of the MIS Regents Professor and founding Chair of the MIS Department who described MIS as "Solving real problems for real people"? a .Dr. Sudha Ram b. Dr. Jay Nunamaker c. Dr. Hsinchun Chen d. Dr. Jim LaSalle
Dr. Jay Nunamaker
Car payments and rent are examples of what type of expenses? a. Fixed b. Discretionary c. Variable d. Pre-paid e. Flexible
Fixed
You have a MAC running OSX, which of these is NOT true? a. A.You will be fine just using your computer for assignments and exams b. A.You might find it easier if you can run a MS Windows virtual machine (VM) c. A.You may not be able to run a MS Windows VM d. A.You must have a MS Windows VM for Assignments and Exams
A.You must have a MS Windows VM for Assignments and Exams
What accounting metric a strong indicator of whether a firm has sufficient short-term assets to cover its immediate liabilities? a. Acid Test b. Current ratio c. Earning per common share d. Price to earning ratio
Acid Test
In the IT Strategic Planning Video Case, it discussed showing the _______ between all the IT projects and the overall business strategy? We also discussed this specific topic in class and explained it's meaning and why it mattered. a. Alignment b. Synergy c. Implementation order d. Harmony e. Unity
Alignment
So, what is MIS? In the description of Scope Creep and unintended consequences, we discussed technology leading to unintended consequences... What sport was the example of where technology was leading to judgements about the performance of referees/umpires/ or coaches? a. Baseball and the Strike Box b. Football and the Instant Replay c. Hockey and scoring goals d. Basketball and the three-point-line
Baseball and the strike Box
In the video case study of Porter's Forces, Michael Porter commented that the airport's control of gates represented which of the five forces? a. Bargaining Power of Suppliers b. Potential Threat of New Entrants c. Threat of Substitute Products d. Bargaining Power of Buyers e. Industry Rivalries
Bargaining Power of Suppliers
Critical Thinking Question: Thinking of Porter's five forces, if you are one of the mobile telephone companies upgrading to a 5G network, and the largest supplier of 5G telecom equipment in the world can no longer be purchased from for political reasons, which of the five forces will it impact from your perspective? a. Potential Threat of New Entrants b. Threat of Substitute Products c. Bargaining Power of Suppliers d. Bargaining Power of Buyers e. Industry Competitors
Bargaining power of suppliers
Porter's Forces describes which of the following business issues? a. Profitability b. Competition c. Security d. Product Design
Competition
The "Porter's Forces" model deals with what aspect of globalized business? a. Competition b. Design c. Location d. Relationships e. Time
Competition
What was the name of the legislation adopted by the European Parliament that mandated that all countries within the EU must setup laws requiring websites to obtain informed consent before they can store or retrieve information on a visitor's computer or web-enabled device. a. EU Cookie Law b. EU Cybersecurity Act c. EU Data Protection Directive d. EU General Data Protection Regulation
EU Cookie Law
A Cost-Benefit Analysis is related mostly to what type of project management feasibility assessment? a. Technical b. Operational c. Economic d. Political e. Ethical
Economic
When information systems were first introduced into organizations, the primary focus of their use was what? a. Efficiency b. Effectiveness c. Value Creation d. Strategic Advantage
Efficiency
The Gainesville police department started using the internet to accomplish all of these objectives except? a. Empower businesses to identify high crime areas and determine appropriate levels of security. b. Demystify law enforcement operations for the citizens of Gainesville. c. Enable individual citizens to better protect themselves from criminal activity. d. Motivate community groups to have a stronger hand in addressing crime.
Empower businesses to identify high crime areas and determine appropriate levels of security
David Myers' (former controller of MCI/Worldcom) statement "I still don't know that one point when I started to cross the line...", is an example of how small, incremental repeated compounding of unethical decisions can result in what? a. Gut check b. Transparency test c. Whistleblowing d. Ethical drift e. Defining moment
Ethical drift
When budgeting, the amount you spend for rent is considered as: a. Fixed expenses b. Variable expenses c. Discretionary expenses d. Non-Elective expenses
Fixed expenses
Which of the following is an example of how individuals use technology in a way that that allow others easily to monitor and track their activities? a. Geotagging smartphone photos b. Hashtagging posts on Twitter c. Accessing a website d. Reading a blog post online e. Sending emails to friends
Geotagging smartphone photos
In the Online Democracy model, the "Voter Activation Network" uses voter registration rolls to categorize voters as always /sometimes/never voting by using information obtained from: a. Online media b. Commercially-generated databases c. Private sector polling d. Government records e. Partisan political organizations
Government Records
Allowing individuals to file tax returns, renew driver's licenses, and obtain various permits online is an example of what type of eGovernment? a. Government-to-business (G2B) b. Government-to-citizen (G2C) c. Government-to-employees (G2E) d. Government-to-government (G2G) e. Government-to-suppliers (G2S)
Government-to-citizen (G2C)
In recognizing ethical situations, which of the following is related to a chemical reaction that occurs in your body, specifically your intestinal track? a. Ethical drift b. Gut check c. Transparency test d. Gut punch e. Taste check
Gut check
What is the name of the University of Arizona's primary career management tool that offers UA students and alumni ac cess to jobs, internships, and a range of other services? a. Handshake b. eSMS c. UAccess d. D2L
Handshake
Which of the following groups of voters would the DNC be most likely to contact with a persuasion campaign message? a. Independent voters who sometimes vote b. Democratic voters who sometimes vote c. Independent voters who always vote d. Republication voters who sometimes vote e. Democratic voters who always vote
Independent voters who always vote
___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information. a. Competitive intelligence b. Espionage c. Information extortion d. Intellectual property
Information extortion
As an employee of MCI/Worldcom, David Myers faced what classic ethical dilemma also described as a 'Who am I?'? a. Integrity versus Loyalty b. Social Contract Theory c. Weak Learning Culture d. Procrastination Culture e. Profit Maximizing Culture
Integrity versus Loyalty
The classic values conflict with "Who Am I'" represents what type of ethical dilemma? a. Short-term vs. long-term b. Honesty vs. integrity c. Peer-pressure vs. boss-pressure d. Integrity vs. loyalty e. Organizational ethics
Integrity vs.loyalty
Making the Adobe Creative Cloud is now available to UofA students. What approach for software acquisition did the UoA used to allow students to have access to this software? a. Buy (Ownership of Intellectual Property) b. Lease (Right to Use Product) c. In-House Development (Writing Software) d. Open Source (Non-proprietary software) e. Government Seizure (Right of Eminent Domain)
Lease (Right to Use Product)
The Associated Students of the University of Arizona is a representative organization led by University of Arizona students that serves, engages and empowers the student body through advocacy and the provision of programs and resources. What is the name of the Eller student currently serving as our ASUA Senator? a. Michelle Mendoza b. Olivia Johnson c. Ashin Katwala d. Brennen Feder
Michelle Mendoza
Market capitalization is determined by multiplying the stock price by what? a. Profits earned from direct operations b. Dividends paid during the last fiscal year c. Number of common shares outstanding d. Book value of the company e. Year-end Earnings, minus taxes and interest
Number of common shares outstanding
Understanding the question and responding with the right answer f or a question in the lightning round depends most on what? a. People b. Process c. Technology d. All three equally
People
Official-sounding emails that demand you reply immediately to confirm your personal information or you will lose access to your account are a software attack known as: a. Phishing Attack b. Trojan Horse c. Zero-day Attack d. Drive-by Attack e. Logic Bomb
Phishing Attack
Which of the following actions would be considered a biometric authentication? a. Requiring a user to scan their fingerprint b. Requiring a user to enter a secret password c. Requiring a user to swipe a CatCard d. Requiring a user to sign their signature e. Requiring a user to type a group of displayed letters
Requiring a user to scan their fingerprint
An investors willingness to potentially loose their money in exchange for the potential of higher returns is called their? a. Risk Tolerance b. Diversification c. Investing Tolerance d. Aggressiveness Quotient
Risk Tolerance
What is used to determine how long an investment will take to double, given a fixed annual rate of interest, allowing investors to get a rough estimate of how many years it will take for the initial investment to duplicate itself. a. Rule of 72 b. 28/36 Rule c. 2% Rule d. Rule of 18
Rule of 72
What is the name of the agile framework for managing the work of development teams who break their work into actions that can be completed within time boxed iterations, called sprints (30 days or less)? a. SCRUM b. Waterfall c. Prototyle Methodology d. Rapid Application Development
SCRUM
In the VAN (Voter Activiation Network) Relationship-Based Political Organizing video case study, the VAN was able to idenify the relationships of possible supporters using data from what source? a. Voter registration records b. Direct mail campaigns c. Online surveys d. Supporter's Facebook contacts e. Tax returns of registered voters
Supporter's Facebook contact
In the Video Case on Michael Porters Competitive Forces What Industry was described as being Terrible in Every Category? a. The Airline Industry b. The Railroad Industry c. The Supermarket Industry d. The Cattle Industry
The Airline Industry
In the Cybersecurity 101 Video Case, the reason for many of the insecurities currently found on the internet is due to what? a. The internet was not originally designed to experience the massive growth it underwent b. The internet was originally designed as a Game and not as a serious business network c. The internet was originally limited to short distances so distant countries couldn't be connected d. The internet was originally designed for use in space relaying data between satellites so human hackers were not a concern
The internet was not originally designed to experience the massive growth it underwent
All of the following are Information System Professional Specialties Except? a. Project management b. Business analyst c. Network management d. Database administrator e. Website designer f. Security analyst g. These are all Information System Professional Specialties
These are all Information System Professional Specialties
92. _________ is any danger to which a system may be exposed. a. Exposure b. Informati on security c. Threat d. Security
Threat
What term would be used to describe any danger to which is system my be exposed? a. Threat b. Audit c. Espionage d. Visibility e. Violation
Threat
In the 'How Technology Changes Us' Video Case, what was the fundamental technology that was being discussed as totally changing the world and how people function? a. Timekeeping b. Electricity c. Steam Engines d. Food Storage
Timekeeping
in the College Money Management 101 Video Case- what was Lesson 1, the very first thing students should start doing? a. Track Expenses b. Pick the right bank c. Minimize Debt d. Get a part-time job e. Keep an emergency fund f. Avoid stupid moves
Track Expenses
In financial markets, a "ticker symbol" identifies what? a. Traded Company b. Stock Exchange c. Sales Transaction Record d. Stock Broker's Identification e. Customer's Identification
Traded company
Which of the following would NOT be considered a type of social engineering ? a. Torjan Horse b. Spear Phis hing c. Tailgating d. Vishing e. Smishing
Trojan Horse
The Dow Jones Industrial Average is a market indicator comprised of 30 large publicly traded companies, and is intended to to gauge the performance of the industrial sector within the American economy. Recently, General Electric, who had been part of the DJIA for over 100 years, was replaced by another company. What company replaced GE in the DJIA? a. Walgreens b. Google c. Tesla d. American Airlines
Walgreens
What is the recommended solution covered in a tech tip for keeping track of many secure passwords that could be hard to remember? a. A Password Manager App on a Cell phone with a Lock Screen b. A locking notebook with passwords kept in your bag c. a wallet card d. a secure encrypted usb stick like IronKey
a Password managerApp on a Cell phone with a Lock Screen