MIS 111 Final Exam
IT __________ be used to create a competitive advantage ___________. a) can; because everyone has access to technology b) can; when it is used effectively c) cannot; because everyone has access to technology d) cannot; even when it is used effectively
can; when it is used effectively
WebMD is a(n) _________ that allows doctors to ___________. a) ERP; diagnose diseases b) expert; diagnose diseases c) ERP; perform long-distance surgery d) expert; perform long-distance surgery
expert; diagnose diseases
Robots are useful ___________. a) as companions (e.g. cyberpooches) b) for driving cars (e.g. cyberchauffer c) for handling monotonous tasks (e.g. factory work) d) only in science fiction (e.g. Terminator)
for handling monotonous tasks (e.g. factory work)
The web ____________ buyer power. a) decreases b) increases c) has no impact on d) has a mixed impact on
has a mixed impact on
The _________ prohibits an organization from collecting any personal information unless the customer specifically authorizes it. a) digital dossier policy b) information privacy policy c) opt-in model of informed consent d) opt-out model of informed consent
opt-in model of informed consent
IT changes managers' job by _________ a) providing near real-time information so managers can make quicker decisions b) making it easier to get all employees to work from one location c) decreasing the volume of information they have to process d) improving an employee's sense of connectedness
providing near real-time information so managers can make quicker decision
The _____________ approach states that an ethical action is the one that provides the most good or does the least harm. a) common good b) fairness c) rights d) utilitarian
utilitarian
Selecting computers with EPEAT power supplies should reduce the annual operating cost of a computer by what? a)$0.50 b) $2.50 c) $4.00 d) $7.00 e) $12.0
$7.00
Selecting an EPEAT compliant technology in place of traditional technology is an example of what order sustainability effect? a) 1st Order -Creation and Use b) 2nd Order -Application Substitution c) 3rd Order -Long-term Structural Change d) 4th Order-Transference e) 5th Order -Value Proposition
1st Order -Creation and Use
Substituting face-to-face meetingswith telecommuting and online distance learning are examples of how technology produces what order sustainability effect? a) 2nd Order -Application Substitution b) 1st Order -Creation and Use c) 3rd Order -Long-term Structural Change d) 4th Order-Transferencee) 5th Order -Value Proposition
2nd Order -Application Substitution
As a possible password, how many variableswould the password MIS111Exam (just the underlined string of characters) have when assessing its security strength? a) 1 b) 2 c) 3 d) 4 e) 5
3
The password '4r1ZoN@' has how many variables ? a) 4 b) 1 c) 2 d) 3 e) 5
4
Approximately what percentage of applications for jobs are rejected by potential employersbefore the interviewdue to public information posted online by the applicant (e.g. social networking, blogs, media sites, etc. -that is, your online reputation)? a) Less than 5% b) About 10% c) About 30% d) Less than 50% e) 60% or more
60% or more
______________ refers to determining who is responsible for actions that were taken. a) Acceptance b) Accountability c) Liability d) Responsibility
Accountability
Which company used software to disrupt the previous market-leading companies in the book industry? a) Amazon b) Barnes and Noble c) Books-a-Million d) Walmart
Amazon
Disclosing personal information such as your race, religion, sex, disabilities, and age on social media undermines what type of protections otherwise provided to you as a citizen in the United States? a) Wage discrimination laws b) Anti-discrimination laws c) Voter eligibility laws d) Commercial driver's license eligbility laws e) Personal credit eligibility laws
Anti-discrimination laws
In the video case study of Porter's Forces, Michael Porter commented that the airport's control of gates represented which of the five forces? a) Bargaining Power of Suppliers b) Potential Threat of New Entrants c) Threat of Substitute Products d) Bargaining Power of Buyers e) Industry Rivalries
Bargaining Power of Suppliers
The equity on a company's balance sheet is most closely related to which of the following? a) Market value b) Operating income c) Share price d) Book value e) Gross margin
Book value
LEED refers to the efficiency of? a) Buildings b) Cars c) Desktop Computers d) Data Centers e) Aircraft
Buildings
In the Zara case, the company has aligned its information system strategy with what? a) Business strategy b) Product margins c) Decentralized intelligence d) Competitive position e) Efficiency mode
Business strategy
As discussed in class, a key concern for a startup business is the "burn rate" for their initial capital.What financial report best describes a company's "burn rate" for investors? a) Balance sheet b) General ledger' c) Income statement d) Cash flow statement e) Ticker symbol statement
Cash flow statement
The "Porter's Forces" model deals with what aspect of globalized business? a) Competition b) Design c) Location d) Relationships e) Time
Competition
Selecting EPEAT-compliant technology with a high rating over traditional, less energy efficient technology is an example of focusingon what sustainability effect? a) Use of government regulation to eliminate wasteful products b) Creation, Use and Disposal of a product c) Substitution by using alternative methods d) Impacts of long term structural change e) Increased awareness through the use of metrics
Creation, Use and Disposal of a product
Focusing on improving existing products by extending product lines and improving product features is what type of innovation? a) Customer Intimacy b) Product Leadership c) Operational Excellence d) Category Renewal e) Open-source Development
Customer Intimacy
Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control? a) Bullwhip effect b) Just-In-Time c) Defense in depth d) Disintermediation e) Social Contract
Defense in dept
Which group of voters would result in the highest return on investment (i.e., largest number of votes for a DNC candidate) using a get-out-the-vote (GOTV) strategy? a) Democratic voters who sometimes vote b) Independent voters who always vote c) Independent voters who sometimes vote d) Republication voters who sometimes vote e) Democratic voters who always vote
Democratic voters who sometimes vote
What type of innovations are intended to be incompatible with existing standards and value chain, and must develop markets de novo (latin for "from the beginning")? a) Disruptive Innovation b) Application Innovation c) Platform Innovation d) Product Innovation e) ProfitInnovation
Disruptive Innovation
What type of innovations are intended to be incompatible with existing standards and value chain, and must develop markets de novo (latin for "from the beginning")? a) Disruptive Innovation b) Application Innovation c) Product Innovation d) Platform Innovation e) Profit Innovation
Disruptive Innovation
Which of the following was NOT described as one of the four innovation zones? a) Disruptive Technology Zone b) Product Leadership ZoneProduct Leadership Zone c) Customer Intimacy Zone d) Category Renewal Zone e) Operational Excellence Zone
Disruptive Technology Zone
IT has changed the manager's job in many ways. Which of the following is NOT the result of this change? a) Easier to make a decision b) More information to address c) Remote supervision d) Real-time information
Easier to make a decision
The outcomes of the E-Government Strategy report primarily focuses on improving business processes in which of the following ways ? a) Efficiency b) Desirability c) Feasibility d) Popularity e) Reliability
Efficiency
The Gainesville police department started using the internet to accomplish all of these objectives except? a) Demystify law enforcement operations for the citizens of Gainesville b) Motivate community groups to have a strongerhand in addressing crime. c) Enable individual citizens to better protect themselves from criminal activity. d) Empower businesses to identify high crime areas and determine appropriate levels of security
Empower businesses to identify high crime areas and determine appropriate levels of security
Originally discussed by Dr. Gilliland, David Myers' (former controller of MCI/Worldcom) statement "I still don't know that one point when I started to cross the line...", is an example of how small, incremental repeated compounding of unethical decisions can result in what? a) Gut check b) Transparency test c) Whistleblowing d) Ethical drift e) Defining moment
Ethical drift
ERP systems are an evolution of _____________. a) AI b) CRM c) DSS d) FAIS
FAIS
What term describes the ability of a person to effectively evaluate and manage one's finances in order to make prudent decisions toward reaching life's goals? a) Personal Accounting b) Financial Literacy c) Household Finance d) Expense Management e) Risk Management
Financial Literacy
Car payments and rent are examples of what type of expenses? a) Fixed b) Discretionary c) Variable d) Pre-paid e) Flexible
Fixed
Planned, recurring expenses that occur on a routine schedule, such rent or car payments that must be paid every month, are examples of what? a) Flexible expenses b) Deductions c) Discretionary expenses d) Fixed expenses e) Cash flow
Fixed expenses
Which of the following is an example of how individuals use technology in a way that that allow others easily to monitor and track their activities? a) Geotagging smartphone photos b) Hashtagging posts on Twitter c) Accessing a website d) Reading a blog post online e) Sending emails to friend
Geotagging smartphone photos
In the Online Democracy model, the "Voter Activation Network" uses voter registration rolls to categorize voters as always/sometimes/never voting by using information obtained from: a) Online media b) Commercially-generated databases c) Private sector polling d) Government records e) Partisan political organization
Government records
Allowing individuals to file tax returns, renew driver's licenses, and obtain various permits online is an example of what type of eGovernment? a) Government-to-business (G2B) b) Government-to-citizen (G2C) c) Government-to-employees (G2E) d) Government-to-government (G2G) e) Government-to-suppliers (G2S)
Government-to-citizen (G2C)
In recognizing ethical situations, which of the following is related to a chemical reaction that occurs in your body, specifically your intestinal track? a) Ethical drift b) Gut check c) Transparency test d) Gut punch e) Taste check
Gut check
Which of the following is a support activity in Porter's value chain model? a) Human Resources b) Logistics c) Operations d) Marketing e) Service
Human Resources
Which of the following is TRUE? a)IT can eliminate any job b) IT impacts entire industries c) IT opens up jobs for middle managers d) IT only helps improve employees' health and safety.
IT impacts entire industries
Which of the following groups of voters would the DNC be most likely to contact with a persuasion campaign message? a) Independent voters who sometimes vote b) Democratic voters who sometimes vote c) Independent voters who always vote d) Republication voters who sometimes vote e) Democratic voters who always vote
Independent voters who sometimes vote
Co-location of trading computers at the stock exchange would providewhat type of competitive advantage for a company like Goldman Sachs with respect to Porter's Forces? a) Industry Rivalries b) Potential Threat of New Entrants c) Threat of Substitute Products d) Bargaining Power of Suppliers e) Bargaining Power of Buyer
Industry Rivalries
What dimension of Porter's Forces focuses on the decision that a buyer makes when choosing among direct, existing competitors when all of the competitors offer the same identical name-brand product (e.g., an iPhone 6)? a) Industry Rivalry b) Threat of Substitution c) Threat of New Entrants d) Buyer power e) Supplier power
Industry Rivalry
As an employee of MCI/Worldcom,David Myers faced what classic ethical dilemma also described as a 'Who am I?'? a) Integrity versus Loyality b) Social Contract Theory c) Weak Learning Culture d) Procrastionation Culture e) Profit Maximizing Culture
Integrity versus Loyality
As originally discussed by Dr. Gilliland, the classic values conflict with "Who Am I'" represents what type of ethical dilemma? a) Short-term vs. long-term b) Honesty vs. integrity c) Peer-pressure vs. boss-pressure d) Integrity vs. loyalty e) Organizational ethic
Integrity vs. loyalty
How does adding social networking to the VAN allows candidates toimprove the effectiveness of their volunteers? a) Leverages personal relationships b) Sending campaign tweets automatically c) Automatically registers new voters d) Eliminates the need for blockwalking e) Replaces campaign volunteers with computer bot
Leverages personal relationships
87. On your personal financial balance sheet, your student loans would be classified in what category? a) Liability b) Assets c) Net Worth d) Prepaid Expense e) Expenditures
Liability
______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. a) Accountability b) Due Process c) Liability d) Responsibility
Liability
What type of customer intimacy zone innovation focuses on making structural modifications to established products in order to create a distinctive sub-category? a) Line-ExtensionInnovation b) Enhancement Innovation c) Marketing Innovation d) Experiential Innovation e) Value-engineering Innovation
Line-ExtensionInnovation
In the Personal Branding video case, which of the following online platforms was idenfied as being primarily a business networking tool? a) Facebook b) LinkedIn c) Democratic voters who sometimes vote d) Wordpress e) Amazon.com
In the Martha Stewart case, which of the following issues resulting in Martha Stewart being convicted of criminal charges? a) Lying to the FBI b) Defaulting on a loan c) Selling stocks below book value d) Insider trading e) Falsely advertising her product
Lying to the FBI
The European Union's data protection laws are ___________ strict compared to the US laws. a) Equally b) Less c) More d) Non-existently
More
What % of people like to purchase products from companies that protect the environment? a) More than 10% b) More than 35% c) More than 50% d) More than 75%
More than 50%
Market capitalizationis determined by multiplying the stock price by what? a) Profits earned from direct operations b) Dividends paid during the last fiscal year c) Number of common shares outstanding d) Book value of the company e) Year-end Earnings, minus taxes and interest
Number of common shares outstanding
What was the central issue in the Stacy Snyder in-class discussion case? a) Online Reputation b) Geotagging c) Lying about qualifications d) Age discrimination e) Cheating on an exa
Online Reputation
Which of the following permits the company to collect personal information until the customer specifically requests that the data not be collected? a) Opt-out model of informed consent b) Digital dossier policy c) Personal information privacy policy d) Opt-in model of informed consent e) Privacy Paradox
Opt-out model of informed consent
On the balance sheet, total assets minus total liabilities must equal what? a) Free Cash flow b) Dividends Paid c) Owner's Equity d) Stock price e) Market Value
Owner's Equity
With respect to an individual, what term describes the processof managing one's earnings, savings, and debt to meet the actual and budgeted expenses? a) Personal Accounting b)Financial Literacy c) Personal Finance d) Expense Management e) Risk Management
Personal Finance
Which of the following is NOTone of the "4 P's" of innovation? a) Personalization b) Product c) Process d) Process e) Paradigm Shift
Personalization
Official-sounding emails that demand you reply immediately to confirm your personal information or you will lose access to your account are a software attack known as: a) Phishing Attack b) Trojan Horse c) Zero-day Attack d) Drive-by Attack e) Logic Bomb
Phishing Attack
What action did Stacy Snyder take that resulted in her losing her job? a) Hacking the AP Twitter feed and posting a fraudulent message b) Undertaking accounting fraud at her company c) Posting a photo of herself at a party on her personal social media account d) Infecting her company's network computer with a virus while using Facebook at work e) Being a whistle-blower and reporting the illegal actions of her employe
Posting a photo of herself at a party on her personal social media account
______________ is the right to be left alone and to be free of unreasonable personal intrusions. a) A digital dossier b) Information privacy c) Privacy d) Profiling
Privacy
The specific steps you must perform to earn AP credit in MIS 111 is what dimension the MIS Design Perspective? a) Process b) People c) Technology d) Management e) Financial
Process
What type of innovation focuses on the supply side, looking for opportunities to remove non-value-adding steps from the workflow? a) Process Innovation b) Value-Engineering Innovation c) Value Migration Innovation d) Organic Innovation e) Enhancement Innovation
Process Innovation
______________ is the process of forming a digital dossier .a) Dossiering b) Information privacy c) Privacy d) Profiling
Profiling
Dr. Jay Nunamaker, founding chair of the MIS Department, describes MIS as a discipline focused on "Solving Real Problems" for who? a) Real People b) Financial Analysts c) UA Faculty d) UA Students e) Society at Large
Real People
How does using two-sided printing improve energy efficiency? a) Reduces energy usage by about half b) Increases energy costs by about 10% c) Makes no impact on energy efficiency d) Reduces energy usage by more than 90% e) It is not possible to measure a printer's energy efficiency
Reduces energy usage by about half
Which of the following actions would be considered a biometric authentication? a) Requiring a user to enter a secret password b) Requiring a user to swipe a CatCard c) Requiring a user to scan their fingerprint d) Requiring a user to sign their signature e) Requiring a user to type a group of displayed letter
Requiring a user to scan their fingerprint
The accounting value of a firm is equal to what? a) Shareholder Equity b) Assets c) Liabilities d) Stock Price e) Annual Dividend
Shareholder Equity
Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? a) Defense in Depth b) Industrial Sabotage c) Social Engineering d) Advanced Persistent Threats e) Open Source Hacking
Social Engineering
The doughnut model describes a "Safe And Just Space for Humanity" as a space bounded by the environmental ceiling and what other construct as the floor? a) Social foundation b) Planetary Boundaries c) Sustainable Development Goals (SDG�s) d) Ecosystem Assessment e) Ethical Framework
Social foundation
Your username (UANetID) is your claim of identify to a computer system.When the computer system verifies your identify by requiring you to enter a password is an example of what type of authentication? a) Something a user is b) Something a user has c) Something a user does d) Something a user knows e) Something a user inherits
Something a user knows
What normative theory of ethics focuses on the belief that manager's actions should be guided by the understanding that they are entrusted with a responsibility to manage and protect the assets of the company for the benefit of all of those who the actions of the firm affect? a) Stockholder b) Stakeholder c) Social Contract d) Organizational e) Loyalty
Stakeholder
On a balance sheet, assets must equal the sum of liabilities and what other financial measure? a) Stockholder's Equity b) Gross Margin c) RetainedEarnings d) Net Income e) Dividend Yield
Stockholder's Equity
In the VAN (Voter Activiation Network) Relationship-Based Political Organizing video case study, the VAN was able to idenify the relationships of possible supporters using data from what source? a) Voter registration records b) Direct mail campaigns c) Online surveys d) Supporter's Facebook contacts e) Tax returns of registered voter
Supporter's Facebook contacts
In the Video Case on Michael Porters Competitive Forces What Industry was described as being Terrible in Every Category? a) The Airline Industry b) The Railroad Industry c) The Supermarket Industry d) The Cattle Industry
The Airline Industry
Porters five forces focuses on what part of competition? a) The Business Environment b) The FiveCore Internal Processes of a Business c) The Business Supply Chain d) The Five Core Business Functional Area
The Business Environment
What term would be used to describe any danger to which is system my be exposed? a) Threat b) Audit c) Espionage d) Visibility e) Violation
Threat
_________ is any danger to which a system may be exposed. a) Exposure b) Information security c) Threat d) Security
Threat
Which of the following would NOT be considered a type of social engineering ? a) Torjan Horse b) Spear Phishing c) Tailgating d) Vishing e) Smishing
Torjan Horse
In financial markets, a "ticker symbol" identifies what? a) Traded Company b) Stock Exchange c) Sales Transaction Record d) Stock Broker's Identification e) Customer's Identification
Traded Company
A company's "ticker" or stock symbol serves what role on a stock trading exchange? a) Uniquely identifies a traded stock b) The time and date the stock was sold c) The broker selling the stock d) The change (up or down) in price from the last purchase price e) The official company logo used for stock transaction
Uniquely identifies a traded stock
Entrepreneurship is a market-oriented mechanism for advancing what aspect of innovation? a) Value Proposition b) Product Feasibility c) Profitability d) Marketability e) Globalization
Value Proposition
According to the articles what technologies enable businesses and theiremployees to get in front of clients and customers but do it in a cost-savingsmanner? a) VoIP and web conferencing b) Telecommuting c) Telemedicine d) eFax e) email
VoIP and web conferencing
The Eller "GoodCat" website that allows for anonymous reporting of unethical behavior in Eller classes uses what type of business model? a) Transparency model b) Ethical drift model c) Whistleblower model d) Loyalty model e) Engagement mode
Whistleblower model
Which of the following elements present on your CatCard releates to biometric identification? a) Your picture b) Your signature c) Your full name d) Your student ID number e) Your signature
Your picture
IT allows the workplace to expand to 24 hours a day at _______________, which is a benefit for ___________. a) a central location; only employees b) any location; only employers c) a central location; employers and employees d) any location; employers and employee
any location; employers and employee