MIS 111 Final exam study guide
As a possible password, how many variableswould the password MIS111Exam(just the underlined string of characters) have when assessing its security strength? A. 2 B. 5 C. 1 D. 4 E. 3
3
A "Fishbone" process analysis diagram is also known as: A. A correlation graph B. A cause-and-effect diagram C. A numerical analysis diagram D. An organization chart E. A cross-functional flowchart
A cause-and-effect diagram
Which of the following is TRUE? A. IT can eliminate any job. B. IT only helps improve employees' health and safety. C. IT opens up jobs for middle managers. D. IT impacts entire industries
IT impacts entire industries
When describing the invention of the cell phone, who said "For the first time, you were calling a person, not a place..."? A. Eli Pariser B. Norman Abramson C. Martin Cooper D. Thomas Friedman
Martin Cooper
Who said the following quote "You can't use up creativity. The more you use, the more you have." A. Albert Einstein B. Thomas Edison C. Maya Angelou D. Linus Pauling
Maya Angelou
What Center in the Eller College of Management has the mission to help students improve their potential and advance society by developing an entrepreneurial and innovative mindset? A. Eller Center Executive Education B. Center for Mangement Innovations in Healthcare C. McGuire Center for Entrepreneurship D. Economic + Business Research Center
McGuire Center for Entrepreneurship
An unobstructed, straight line-of-sight path between a transmitter and receiver is required by which of the following high-speed, commercial wireless network technologies? A. Broadcast Radio B. 802.11 Wi-Fi C. Microwave D. Bluetooth E. 3G Cellular
Microwave
Which of the following causes of the bullwhip effect is related to a trading partner intentionally sharing inaccurate information with a company's future inventory requirements? A. Shortage Gaming B. Outsourcing C. Forecasting/Trend Analysis D. Batch Purchasing E. Price Promotions
Shortage Gaming
What common function do "HTTP", "TCP" and "IP" share? A. They all define internet-based protocols B. They are abbreviations for physical media C. They are common computer viruses D. They all are data encryption methods E. They all are website domains
They all define internet-based protocols
What technology do companies use to make the links between connection between two corporate intranets more secure? A. SCOR B. VMI C. VPN D. CPFAR
VPN
Which of the following types of security risks would be an identified weakness in which necessary controls are not present or effective? A. Control B. Vulnerability C. Exploit D. Attack E. Footprint
Vulnerability
A firewall is a _______control. A. virtual B. access C. physical D. communication
communication
When you use Google Drive to work on a document with a classmate, this is considered _________. A. teleconferencing B. virtual collaboration C. crowdsourcing D. workflow
virtual collaboration
Due to the curvature of the earth, microwave towers generally cannot be spaced more than about how many kilometers apart? A. 18 B. 30 C. 77 D. 48
48
Assume you are 22 years old when yougraduate from the University of Arizona and have a credit card with a $2,000 credit balance with an 18% annual rate. If you only make minimum payments of 2% of the balance or just $10 (whichever is greater) each month, what birthday will you likely be be celebrating when the the credit card is paid off? A. 52 B. 37 C. 32 D. 27
52
Since our firm's sales are cyclical, we adjust the commissions of our sales team sales each quarter.What HLOOKUP function would be used to determine the correct commission rate for March 15th, as shown below A. =HLOOKUP(C5,C2:F3,3,TRUE) B. =HLOOKUP(C5,C2:F3,2,FALSE) C. =HLOOKUP("Rate",C2:F3,C5,TRUE) D. =HLOOKUP(C5,C2:F3,2,TRUE)
=HLOOKUP(C5,C2:F3,2,TRUE)
In June of 2018, Exactis, a marketing and data aggregation firm, disclosed that the personal details of over 340,000,000 individuals and businesses had been compromised.What security failure caused this massive security breach? A. A database was able to be accessed on a server open to the internet B. An disgruntled employee of Exactis copied the file after being fired C. Exactis sold a surplus computer and left information on the hard disk D. Unencrupted network traffic was monitored on a wireless network
A database was able to be accessed on a server open to the internet
In a relational database, what term refers to the collection of items that are all related to a single unique value, where the single value often serves as the primary key? A. A field B. A deposit C. A list D. A record E. A form
A record
What term is used to describe the marketing analysis where two versions of a web page are compared to see which one gives a better conversion rate for similar visitors at the same time? A. PPC Marketing B. A-B (or Split) Testing C. SEO Testing D. SEM Testing
A-B (or Split) Testing
According to MIT Sloan Management Review, what percentage of companies have placed sustainability permanently on their management agendas? A. About 25% B. About 70% C. About 10% D. About 50%
About 70%
What term is used to describe an online advertising service developed by Google, where advertisers pay to display advertising, product listings, and video content as a result of Google search. A. Hashtags B. Responsive C. Adwords D. Pagerank E. Organic
Adwords
Disclosing personal information such as your race, religion, sex, disabilities, and age on social media undermines what type of protections otherwise provided to you as a citizen in the United States? A. Personal credit eligibility laws B. Voter eligibility laws C. Anti-discrimination laws D. Commercial driver's license eligbility laws E. Wage discrimination law
Anti-discrimination laws
What is the importance of the triple constraint? A. Any changes to one constraint will likely affect the project outcome B. Security is the most important constraint C. You must funnel all resources into only one of the constraints D. Time, resources, and scope don't matter
Any changes to one constraint will likely affect the project outcome
[GoldmanSachs]What term was coined by Goldman Sachs in 2001 to describe the fastest growing market economies? A. TICK B. BRIC C. EAGLES D. TIMP
BRIC
With respect to Porter's Forces, which of the five factors would have be the LEAST (weakest) impact on Starbuck's business model? A. Competitive rivalry B. Bargaining power of buyers (its customers) C. Threat of substitutes D. Threat of new entrants E. Bargaining power of suppliers
Bargaining power of suppliers
What term is used to describe the behavior where small changes in customer demand that result in large variations in raw material orders causing inefficiency in the supply chain? A. Reverse Auctions B. Bullwhip effect C. Single-Minute Exchange of Dies (SMED) D. Supply Chain Operations Reference (SCOR) Model E. Just-In-Time Orders
Bullwhip effect
Put the following assets in order of increasing liquidity (least to most) A. Cash, Inventory, Property & Plant B. Accounts Receivable, Cash, Property C. Property, Accounts Receivable, Cash D. Property, Cash, Accounts Receivable E. Cash, Property & Plant, Inventory
Cash, Inventory, Property & Plant
Whattype of data mining analysis identifies patterns in the data based on demographic characteristics (e.g., age, gender, income, ethnicity, etc)? A. Association B. Classification C. Sequencing D. Clustering
Classification
The "Porter's Forces" model deals with what aspect of globalized business? A. Design B. Relationships C. Competition D. Time E. Location
Competition
When we discussed the design of network infrastructure, we noted that the design of connectors on computers we generally related to the speed of the communication interface, the function being supported (number of signals required), and what other issue related to human-computer interaction? A. Hidden affordances for security B. Operational and functional causality C. Constraints to improve reliability D. Cultural design standard
Constraints to improve reliability
What is the name of software that allows publishing, editing, and modifying content from a central interface, providing procedures to manage workflow in a collaborative environment? A. Content Management Systems B. Self-publishing Platforms C. Customer Relationship Management Systems D. Social Networking System
Content Management Systems
When the DNC was targeting voters using their data-driven approach, which of these voting groups were the most appropriate to target? (This question is from the online lecture) A. Republican voters B. Democratic voters who never vote C. Democratic voters who always vote D. Democratic and swing voters who sometimes vote
Democratic and swing voters who sometimes vote
Converting all MIS 111 students from clickers to response cards without an initial test period is an example of what type of conversion? A. Direct conversion B. Pilot conversion C. Phased conversion D. Primary conversion E. Parallel conversion
Direct conversion
What is the named used to describe daily spending decisions like eatingat a restaurant, buying clothes, drinking Starbucks, or playing a round of golf? A. Intermittent B. Discretionary C. Variable D. Fixed
Discretionary
ERPModules] Which of the following is typically not considered a "core" ERP module? A. Financial B. Human Resources C. E-Business D. Operations
E-Business
What was the name of the legislation adopted by the European Parliament that mandated that all countries within the EU must setup laws requiring websites to obtain informed consent before they can store or retrieve information on a visitor's computer or web-enabled device. A. EU General Data Protection Regulation B. EU Cybersecurity Act C. EU Data Protection Directive D. EU Cookie Law
EU Cookie Law
Cost-Benefit Analysis is related mostly to what type of project management feasibility assessment? A. Economic B. Technical C. Operational D. Political E. Ethical
Economic
Purchasing an entire box of screws, even though only a small number are need for the master production schedule is an example of making a purchasing decision based on what approach? A. Fixed order quantity B. Lot-for-Lot C. Independent Demand D. Economic Order Quantity
Economic Order Quantity
With respect to a database, what term is used to describe an abstract representation of all of the information included in a data structure about a particular type of entity? A. Entity Key B. Entity Class C. Entity Table D. Entity Attribute E. Entity Model
Entity Class
The pattern of financial fraud undertaken by David Myers, MCI?s Controller, is a good example of what type of ethical situation? A. Ethical Drift B. Gut Check C. Transparency Test D. Lost Opportunity E. Whistleblowing
Ethical Drift
Planned, recurring expenses that occur on a routine schedule, such rent or car payments that must be paid every month, are examples of what? A. Deductions B. Discretionary expenses C. Fixed expenses D. Cash flow E. Flexible expense
Fixed expenses
What phrase is used to describe the current and developing environment in which disruptive technologies and trends such as the Internet of Things (IoT), robotics, virtual reality (VR) and artificial intelligence (AI) are changing the way we live and work? A. Future Shock B. Post-Industrial Society C. Fourth Industrial Revolution D. Economic Globalization
Fourth Industrial Revolution
The University of Arizona is nationally recognized for sustainability in its academics, research, operations, and administration by the Assocation for the Advancement of Sustainability in Higher Education.What Sustainability Tracking, Assessment & Rating System™ (STARS) rating was the University of Arizona awarded in 2017? A. Bronze B. Silver C. Platinum D. Gold
Gold
What tool is commonly used to track how, when and from what location users are using website? A. Project Management B. Wire Frame Design C. Content Management D. Google Analytics
Google Analytics
In the Online Democracy model, the "Voter Activation Network" uses voter registration rolls to categorize voters as always/sometimes/never voting by using information obtained from: A. Private sector polling B. Online media C. Partisan political organization D. Commercially-generated databases E. Government records
Government records
In Thomas Friedman's discussion of globalization, he described the process of globalization as being realized through actions that were first defined by your country, then later defined by multi-national companies, and finally, in the most recent age of globalization is defined by: A. Political parties B. International treaties C. Financial markets D. Social media E. Individuals
Individuals
What dimension of Porter's Forces focuses on the decision that a buyer makes when choosing among direct, existing competitors when all of the competitors offer the same identical name-brand product (e.g., an iPhone 6)? A. Threat of Substitution B. Buyer power C. Threat of New Entrants D. Supplier power E. Industry Rivalry
Industry Rivalry
What term best describes when consumers are able to use their smartphones to obtain information about a company's competitor's product pricing, features, customer reviews and availability while shopping in their company's brink-and mortar store? A. Accessibility B. Multi-path C. Crucial distinctions D. Information transparency E. Interference
Information transparency
Operating unregulated WiFi networks, clickers, Bluetooth headsets, cordless telephones, and microwave ovens using the same 2.4GHz ISM frequency range in close proximity to one another might result in what problem? A. Multi-path B. Interference C. Right-of-way D. Line-of-sight E. Attenuation
Interference
In addition to possessing contextual and relevant information, what other characteristic aspect does knowledge possess? A. It is an entity class B. It solves a structured problem C. It is actionable D. It is consistent E. It is always displayed visually
It is actionable
What term is used to describe the percentage value of the number of times a keyword or key phrase appears on a webpage as compared to the total amount of words on the page? A. Page rank B. Conversion rate C. Keyword density D. Website ROI
Keyword density
The sequence of activities performed by users of GroupSystems' ThinkTank product directly parallel the steps in what other business process? A. Knowledge management cycle B. Operational CRM C. Just-in-time Inventory Management D. Transaction processing system E. Economic globalization
Knowledge management cycle
Related to the concepts of globalization, what computer "law" states that the density of transistors will double approximately every 18 months? A. Metcalf's Law B. Ohm's Law C. Moore's Law D. Kepler's Law E. Gilder's Law
Moore's Law
Which of the following is the technology that enables most mobile wallet applications? A. VRP B. ERP C. AFC D. NFC
NFC
Explicit, or "leaky" knowledge, is based on information that is: A. Customized by each user B. Subjective and cognitive C. Objective and rational D. Dependent on an employee's experience E. Informally communicated with an organization
Objective and rational
What name is used to describe results foundwhen a search engine algorithm analyzes all the pages across the web in an unbiased way and reports the pages considered to contain the most relevant information for your search terms? A. Organic B. Sponsored C. Adword D. Promoted
Organic
What is NOTa factor contributing to the Bullwhip Effect? A. Batch Purchasing B. Outsourcing C. Forecasting/Trend Analysis D. Shortage Gaming E. Price Promotions
Outsourcing
Which type of website file contains software that's executed on the host before sending the results to the browser? A. PHP B. HTML C. JavaScript D. JPG
PHP
What term does Google use to describe how important a website is based upon counting the number and quality of links to a page, using the underlying assumption is that more important websites are likely to receive more links from other websites? A. Website ROI B. Page rank C. Conversion rate D. Keyword density
Page rank
What is an affordance? A. Safety of users and of data B. Being able to pay for something C. How well the user likes the interface D. Physical property of an object that shows functionality
Physical property of an object that shows functionality
What Leadership in Energy and Environmental Design (LEED) certification was the building where our classroom is located, Environment and Natural Resources 2, awarded by the U.S. Green Building Council? A. Certified B. Silver C. Platinum D. Gold
Platinum
What term is used to describe a physical interface between peripheral devices and the computer? A. App B. Signal C. Port D. Session
Port
What action did Stacy Snyder take that resulted in her losing her job? A. Undertaking accounting fraud at her company B. Hacking the AP Twitter feed and posting a fraudulent message C. Being a whistle-blower and reporting the illegal actions of her employer D. Infecting her company's network computer with a virus while using Facebook at work E. Posting a photo of herself at a party on her personal social media account
Posting a photo of herself at a party on her personal social media account
Which of the following are similar actions in the DM, KCC, and GDSS cycles? A. Modeling, Document, Disseminate B. Data Evaluation, Capture, Document C. Problem Definition, Create, Brainstorm D. Data Evaluation, Manage, Organize
Problem Definition, Create, Brainstorm
Which of the following business component are *not* included in an MRP-II planning cycle? A. Workforce B. Plant and Equipment C. Raw Materials D. Product Margins
Product Margins
What is the term used to describe the process of reducing the number of dimensions of a multi-dimensional data cube (e.g., from three dimensions, perhaps season, location, and product, into two dimensions, such as season and location)? A. Variable B. Context C. Function D. Simplification E. Projection
Projection
An I^2 diagram helps identify opportunities that are "low hanging fruit". What does the term "low hanging fruit" mean in this context? A. Projects that correct major errors in the software B. Projects that will require significant effort, but are easily planned C. Projects that design new features requested by our customers D. Projects that easy to do and also have a high value proposition
Projects that easy to do and also have a high value proposition
What type of decision based on explicit knowledge and involves analysis using an algortihm and measured data? A. Quantitative B. Collaborative C. Managerial D. Operational E. Qualitative
Quantitative
Who was the founding director of the Arizona Telemedicine Program? A. John Po, M.D., Ph.D. B. Ana Maria Lopez, M.D., M.P.H. C. Richard A. McNeely, M.A. D. Ronald S. Weinstein, M.D
Ronald S. Weinstein, M.D
Keyword selection and density, image alt tags, and links to content are mostly commonly associated with which of the following concepts? A. PPC B. CPC C. SEO D. SEM E. ROI
SEO
What is the name used to describe when a person visits a brick-and-mortar store only to check physical characteristics of a product but intends to purchase the product online? A. Disintermediating B. Hybrid shopping C. Showrooming D. Multiplexing
Showrooming
In the Jack Welch Video Case in the SCM Lecture, What approach was he discussing as key to providing customer value? A. the SCOR Model -the Supply Chain Operations Reference Model B. CPFAR -Collaborative Planning, Forecasting And Replenishment C. Total Quality Management D. Lean Manufacturing, using JIT and SMED E. Six Sigma
Six Sigma
Dr. Patton discussed the Hacking Google Glasses video case in class and talked about what it could be a precursor to something else getting hacked in the future. What did he say might be the next thing hacked using the same technique? A. Smart / Autonomous Cars B. IoT Toys and Devices C. Smart Phones D. Stop Light Control System
Smart / Autonomous Cars
What normative ethical theory expects a corporation to create more value to society that it consumes? A. Value Chain Theory B. Stakeholder Theory C. Stockholder Theory D. Social Contract TheoryE. Return on Investment Theory
Social Contract TheoryE. Return on Investment Theory
Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? A. Open Source Hacking B. Defense in Depth C. Industrial Sabotage D. Advanced Persistent Threats E. Social Engineering
Social Engineering
In the video case for Nestle, data-driven decisions were primarily based on visualizations of information from what source? A. Cost and Production Schedules B. Financial Performance Reports C. Social Media Platforms D. Investment Analyst Forecast
Social Media Platforms
Information systems professionals understand business needs and analyze processes, methods and data to create customer-oriented solutions.The value proposition for MIS was described more briefly by Dr. Jay Nunamaker, Regents Professor and founding chair of the MIS Department, as a discipline focused on doing what for business? A. Programming B. Academic research C. Solving real problems D. Marketing software E. Computer Design
Solving real problems
Donut Charts are difficult to read, Microsoft recommends what as an alternative? A. Cake Charts B. Pie Charts C. Scatter Charts D. Stacked Column or Bar Char
Stacked Column or Bar Char
When classifying items on an I^2 diagram, we depend on individuals with domain knowledge and consultants about the items.When discussing knowlege management, what name did we use to describe an individual with domain knowledge? A. Franchisee B. Subject-matter Expert C. Community of Practice D. Expert System
Subject-matter Expert
Using the Internet of Things to increase the efficiency of a company's operations by allowing it to track, in real time, the movement of raw materials and parts through the manufacturing process to finished products delivered to the customer is related to what business function? A. Cost accounting and financial management B. Supply chain management C. Social media marketing D. Lifecycle product sustainability
Supply chain management
Applications such as "find a friend" (FourSquare), driving directions (Smartrek), roadside assistance (OnStar), and fleet management (UPS and FedEx) are all examples of services that have been enhanced by knowing what? A. The location of the requester B. The age of the requester C. The time the request was made D. The identity of the requester E. The number of people making requests
The location of the requester
In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what common problem did his analogy using the postal service to email a page from a book have with sending TCP packets? A. The message might be illegible B. The message might be in the wrong language C. The message might get lost and not deliver D. The message might get changed in route E. The message might not get sent
The message might get lost and not deliver
Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project? A. The quality of the work performed during each major project milestone B. Whether project tasks have been organized in the most efficient order C. The project milestones and the order they are scheduled to be completed D. Whether the major project milestones are being completed on budget E. Individual work assignments for persons assigned to the project
The project milestones and the order they are scheduled to be completed
Assume you need to put a sign that says "PUSH" on a door handle to explain the correct way to operate the door.The "PUSH" sign helps a user understand what aspect of usability? A. The sign explains a correct rejection B. The sign explains a consistent affordance C. The sign explains a perceptible affordance D. The sign explains a false affordance E. The sign explains a hidden affordance
The sign explains a false affordance
Pie charts have several limitations, including all of the following except? A. They cannot show negative values B. They can only show one series C. When two or more items are close in value it can be hard to determine which is larger. Values near zero may not show up and be hidden E. They have limited color and don't draw the eye and attention
They have limited color and don't draw the eye and attention
What is considered to be the high-capacity data transmission core of the Internet structure? A. Tier 1 ISP B. Tier 3 ISP C. LAN D. NAP
Tier 1 ISP
What British Scientist invented the World Wide Web in 1989 while working at CERN (European Organization for Nuclear Research) in 1989? A. Tim Berners-Lee B. Martin Cooper C. Harald Blatand D. Vint Cerf
Tim Berners-Lee
In a vertical cross-functional business process diagram, the order of items in one column (from top to bottom) shows what relationship among these items? A. Importance B. Skill level C. Time D. Cost E. Frequency
Time
In the decision matrix example shown below, which of the answers would have the highest score for Project A? A. Affects other projects B. Time to complete C. Financial gain D. Project cost
Time to complete
The __________________ test proposes a scenario in which a man and a computer both pretend to be women or men, and a human interviewer has to identify which is the real human. A. Terminator B. Turing C. Google D. SkyNe
Turing
According to the articles what technologies enable businesses and their employees to get in front of clients and customers but do it in a cost-savings manner? A. Telemedicine B. email C. VoIP and web conferencing D. Telecommuting E. eFax
VoIP and web conferencing
Which of the following is *NOT* a behavioral issue for meeting A. Domination B. Wrong people C. Misunderstandings D. Hidden Agenda
Wrong people
Signals used to send messages can be _______ or digital. A. analog B. rotary C. binary D. discrete
analog
Weak passwords are a(n) ___________ threat. A. software B. outside C. employee D. hardware
employee
What type of guided media uses light for signaling? A. twisted pair B. fiber optics C. open wire D. coaxial cable
fiber optics
What is the correct filename for your ABP-3A website? A. index.html B. index.www C. Index.html D. INDEX.HTML
index.html
ERP address information silos by _____________. A. simplifying system creation B. integrating functional areas C. correcting a lack of communication between TPSs D. reducing the amount of information presented
integrating functional areas
Which of the following is the correct order of the traditional System Development Life Cycle (SDLC)?A. investigation, analysis, design, implementation, programming and testing, operation and maintenance B. investigation, analysis, design, programming and testing, implementation, operation and maintenance C. analysis, investigation, design, programming and testing, implementation, operation and maintenance D. analysis, investigation, design, implementation, programming and testing, operation and maintenance
investigation, analysis, design, programming and testing, implementation, operation and maintenance
The _________ prohibits an organization from collecting any personal information unless the customer specifically authorizes it. A.information privacy policy B. opt-out model of informed consent C. digital dossier policy D. opt-in model of informed consent
opt-in model of informed consent
What is the name of the directory where the files for your websites for ABP-3A and ABP-3B will be stored on the U.Arizona.Edu web server? A. www_html B. index_html C. public.html D. public_html
public_html