MIS 111 Final exam

Ace your homework & exams now with Quizwiz!

The characteristics of big data (data science) are described as being related to volume (of the information), velocity (speed at which information is collected), veracity (the accuracy of the information) and what other characteristic?

A. Variety (integrating data from multiples sources)

What type of tag attribute is used with an IMG (image) tag to improve accessibility?

ALT

In the video case about Dr. Chiu's Smartrek application, which of the following was not an incentive used to encourage driver participation?

Ability to find other people for carpooling

According to the "IOT Changes Everything" video case, one of the challenges limiting the widespread deployment of IOT is the transitioning to IPv6. What is the value of using IPv6 to IOT?

Ability to uniquely address billions of IOT devices

According to MIT Sloan Management Review, what percentage of companies have placed sustainability permanently on their management agendas?

About 70%

The following "img" directive uses what type of addressing? <img src="file://C:/Users/Patton/Pictures/NistFigure2.PNG " width="2612" height="1746" alt="Security"/>

Absolute

Assume you are off campus and cannot connect to UAWiFi. Which of the following would be a secure alternative to access the campus network?

Access any open wireless network, and then use a VPN to connect to campus

Assume you are off campus and cannot connect to UAWiFi.Which of the following would be a secure alternative to access the campus network?

Access any open wireless network, and then use a VPN to connect to campus

_______ refers to determining who is responsible for actions that were taken

Accountability

______________ refers to determining who is responsible for actions that were taken.

Accountability

What business unit within most companies produces the periodic reports, statements and analyses, such as annual reports, that are disseminate to investors?

Accounting

What accounting metric a strong indicator of whether a firm has sufficient short-term assets to cover its immediate liabilities?

Acid Test

The advantage of ________________ is they can be read over greater distances.

Active RFID tags

All of the symbols representing tasks and decisions that are shown in single column of a vertical cross-functional diagram are related to the same what?

Actor

One of the origins of the Internet was the result of a project by US government agency?

Advanced Research Project Agency

What term is used to describe an online advertising service developed by Google, where advertisers pay to display advertising, product listings, and video content as a result of Google search.

Adwords

Physical properties (shape, texture, color, etc.) of an object that allow someone to use an object correctly without the need for labels or instructions are known as:

Affordances

Which of the following would motivate businesses to create accessible eCommerce websites for their customers?

All (A-D) of the above

Which company used software to disrupt the previous market-leading companies in the book industry?

Amazon

What is the name of a highly popular crowdsourcing Internet marketplace enabling individuals and businesses (known as Requesters) to coordinate the use of human intelligence to perform tasks that computers are currently unable to do?

Amazon Mechanical Turk

A graphical description of a database that describes the way in which an organization's data and business activities are associated with one another is known as_______________

An Entity Relationship Diagram

What is the term used to describe a graphical description of a database that describes the way in which an organization's data and business activities are associated with one another?

An Entity Relationship Diagram

Disclosing personal information such as your race, religion, sex, disabilities, and age on social media undermines what type of protections otherwise provided to you as a citizen in the United States?

Anti-discrimination laws

What is the importance of the triple constraint?

Any changes to one constraint will likely affect the project outcome

The Internet of Things can be described as three "any"-type connections. What are these three "any" connections?

Any time, any place, any thing

When a company purchases a high-value software package, how is the ownership of the software package represented on the company?s balance sheet?

As an asset

What Data Mining method is similar to the approach used by IS Case-based reasoning?

Association

Which of the following types of distance learning experiences are not taught in the presence of an instructor, but rather independently viewed by student online and at their pace?

Asynchronous classes

Which of the following types of access controls would be the process of validating a claim of identity (e.g., Something you know, have, do, or are)?

Authentication

The ____________________ is a summary of information needs of the functional areas and of the organization as a whole.

IT environment

Which of the following is TRUE?

IT impacts entire industries

In the assigned reading for project management, what type of diagram was used to map the impact of a problem using the axes "Impact" and "Likelihood" that you also used in Applied Business Project 2?

I^2 Diagram

Which of the following types of access controls would be a person?s unique identifier within the security domain, such as Name, SSN, Employee ID?

Identification

[GoldmanSachs] What term was coined by Goldman Sachs in 2001 to describe the fastest growing market economies?

BRIC

Which of the following is NOT a value-adding attribute of mobile computing?

Bandwidth improvement

With respect to Porter's Forces, which of the five factors would have be the LEAST (weakest) impact on Starbuck's business model?

Bargaining power of suppliers

What term is used to describe the most successful solutions or problem-solving methods for achieving a business objective?

Best practices

What implementation approach mixes and matches core ERP modules as well as other extended ERP modules from different software providers to best fit their unique internal processes and value chains?

Best-of-breed approach

The estimated yearly cost of reading privacy policies in the US is in the order of:

Billions of dollars

What low-power, non-directional wireless technology is used to create small personal area networks for cell phones and portable music players?

Bluetooth

What short-range wireless technology is commonly to connect smartphones with hands- free headsets for telephone calls and listening to music?

Bluetooth

Harald Blaatand, who was the King of Demark from 940-981, is associated with what wireless technology?

Bluetooth Technology

The equity on a company's balance sheet is most closely related to which of the following?

Book value

What type of chart essentially adds a third dimension, such as frequency or quantity, to scatter plots?

Bubble Charts

What term is used to describe the behavior where small changes in customer demand that result in large variations in raw material orders causing inefficiency in the supply chain?

Bullwhip effect

What type of security activity provides guidance to people who are tasked with resuming business operations after a major disaster, such as building fire, earthquake, or flood, occurs?

Business continuity

Reintermediation is addressing what business issue that was the result of company's directly selling to their customers as part of disintermediation?

Buying complexity

What term is used to describe the printable, one-time use codes you can generate for NetID+ authentication that are useful when traveling, when cell phone carriers may charge additional fees for calls and texts, or when you do not have access to your primary authentication device?

Bypass codes

What is the name of the system used by Raytheon that allows technical blueprints to come to life so engineers engineers and customers can make quick changes to technical specifications and adjust equipment according to their needs using the "the common language of visualization."

CAVE

Which of the following supply chain technologies eliminates the need for a company to implement the "3-way match" process?

CPFAR

Based on the lecture on Decision Matrices, which alternative(s) do you think we should evaluate further for comparison?AlternativeImpactValue Added PriorityMeets-Firm ObjectivesCRM System H 3 H 3 H 3 H 3 SCM System H 3 H 3 M 2 H 3 Payroll System L 1 M 2 L 1 M 2

CRM & SCM

________________ allows you to access the internet through a coaxial media previously used only for TV connections.

Cable modem

Which of the following states has a Social Media Privacy law specifically related to employers from requesting passwords to personal Internet accounts to get or keep a job, or prohibiting colleges and universities from requiring access to students' social media accounts?

California

As discussed in class, a key concern for a startup business is the "burn rate" for their initial capital.What financial report best describes a company's "burn rate" for investors?

Cash flow statement

Put the following assets in order of increasing liquidity (least to most)

Cash, Inventory, Property & Plant

What are the equivalent concepts in Excel to the following database terms: Field, Record, and a Table, respectively?

Cell, Row, Worksheet

[Disintermediation] What term is describes the conflict when manufacturers (brands) disintermediate their channel partners, such as distributors, retailers, dealers, and sales representatives, by selling their products directly to consumers through general marketing methods and/or over the Internet

Channel Conflict

What type of data mining analysis identifies patterns in the data based on demographic characteristics (e.g., age, gender, income, ethnicity, etc.)?

Classification

Which of the following types of analysis would be used to produce the Clery report, which is a public annual security report (ASR) that includes statistics of campus crime for the preceding 3 calendar years identifying the crimes committed in physical (geographic) proximity to a college campus as an effort to improve campus safety?

Cluster

Identifying patterns in data based on common temporal (time) or spatial (geographic) traits is based on what type of data mining analysis?

Clustering

The "nearest neighbor" IS Strategy is similar to what DM method?

Clustering

What type of data mining analysis identifies patterns in the data based on geographic (physical) or temporal (time) proximity?

Clustering

What term refers to the process where two or more entities (individuals, teams, groups, or organizations) who work together to accomplish certain tasks, such as a work group or virtual team?

Collaboration

What approach to knowledge management would best describe the Eller FlexLabs?

Community of Practice

Which of the following knowledge management concepts includes an organizational culture focused on problem solving, a desire to share knowledge because of mutual interest, and norms that build trust, such as might be found in an MIS 111 FlexLab?

Community of practice

Which of the following decisions would *not* be a quantitative decision?

Comparing project objectives with corporate objectives

Porter?s Forces describes which of the following business issues?

Competition

The "Porter's Forces" model deals with what aspect of globalized business

Competition

The "Porter's Forces" model deals with what aspect of globalized business?

Competition

In the Accenture video case, the presenter emphasizes that project managment is not about lists and linear relationships, but rather about managing what?

Complex inter-relationships

What term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding?

Conceptual model

What MS Excel funtion could be used to implement IS Rule Induction?

Conditional Formatting

What common term was used with both human-computer interaction and In a database entity relationship diagram as a way of limiting choices by the user and also specifying the minimum and maximum possible values that may exist for a relationship between two entities, respectively?

Constraint

When we discussed the design of network infrastructure, we noted that the design of connectors on computers we generally related to the speed of the communication interface, the function being supported (number of signals required), and what other issue related to human-computer interaction?

Constraints to improve reliability

What is the name of software that allows publishing, editing, and modifying content from a central interface, providing procedures to manage workflow in a collaborative environment?

Content Management Systems

What term is used to compare the number of closed sales to the the total number of website visitors? For example, if an ecommerce site receives 200 visitors in a month and has 50 sales, this term would be calcuated as 50 (sales) divided by 200 (visits), or 25%.

Conversion rate

An entrepreneur developing detailed documentation of their business processes so that they can be offered to other individuals as a franchise operation is an example of:

Converting tacit knowledge into explicit knowledge

The task of brainstormingin a group decision support system is similar to what step in the knowledge management cycle?

Create

he task of brainstorming in a group decision support system is similar to what step in the knowledge management cycle?

Create

What is the name for the path containing the minimum set of tasks that you must traverse in order to reach completion of your project on time?

Critical Path

What term is used to describe the set of tasks that must be completed as scheduled in order to ensure the delivery of your project on time

Critical Path

in a project plan, the set of tasks that define the minimum amount of time required to complete the project is known as the:

Critical Path

What is the process of solving problems and producing things by connecting people that you otherwise would not know using the internet?

Crowdsourcing

What technique has been used by companies such as Starbucks and Netflix used to engage large numbers of non-employees to innovate, manage, design and market new products?

Crowdsourcing

What term describes a way of solving problems and producing things by connecting online with people that you otherwise wouldn't know?

Crowdsourcing

Which of the following security measures would be considered a "last line defense" for Information Security?

Cryptography

In the case study discussed in Database Management class, how did marketing use information to improve the profitability of their sales?

Customers were classified according into a status level and market segment

Which of the following application software packages was acquired by the University as a Software-as-a-Service (SaaS) technology?

D2L / Brightspace

In the Ruby Tuesday's sales analysis case, analyzing historical data about the sales dimensions of products categories, sales regions, and months of the year would be best using which of the following approaches we've previously discussed?

Data Cubes

What type of data mining presents information graphically so that users are able to identify patterns in the underlying data?

Data Visualization

What type of data structure allows us to organize multi-dimensional information from a data warehouse so that it can be viewed using different data abstractions (or projections)?

Data cube

What type of data structure allows us to organizemulti-dimensional information from a data warehouse so that it can be viewed using different data abstractions (or projections)?

Data cube

Maintaining multiple copies of the same data in multiple information systems that can be independently updated commonly results in what information management problem?

Data inconsistency

___________ support analysis of data about a business unit or company division, whereas ____________ support analysis of entire organizations.

Data marts; data warehouses

Concerns over discrimination, data contamination, and intellectual property (ownership of information) were legal and ethical issues discussed in relation to what topic?

Data mining

Concerns over using data to illegally discriminate against an individual or group, reaching wrong conclusions due to data contamination, and violating intellectual property (ownership of information) protections were legal and ethical issues discussed in relation to what topic discussed during this module?

Data mining

Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control?

Defense in depth

Requiring students to usea combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control?

Defense in depth

In the management of the Eller College of Management's website, which of the following is considered as the highest priority in the website transformation process?

Defined audience

When the DNC was targeting voters using their data-driven approach, which of these voting groups were the most appropriate to target? (This question is from the online lecture)

Democratic and swing voters who sometimes vote

As discussed in the VAN (Voter Activation Network) case study, if you were supporting a Democratic candidate, which group of voters could be most efficiently reached using only a get-out-the-vote (GOTV) activity?

Democratic voters who sometimes vote

In the decision support process, formulating a module to be evaluated and setting criteria for making a choice would occur during what phase of the decision making process?

Design Phase

During which phase of the website transformation process would the project team for developing perform content analysis, layout the website using wireframes, and define a consistent visual design?

Developing Site Structure

What term is used to describe an individual who was born after the widespread adoption of digital technology and have grown up using technology like the Internet, computers and mobile devices?

Digital Native

A business intelligence tool that uses abstractions such as color and graphical images like instrument gauges to allow executives to grasp business situations quickly is known as a

Digital dashboard

A business intelligence tool that uses abstractions such as color and graphical images like instrument gauges to allow executives to grasp business situations quickly is known as a:

Digital dashboard

Converting all MIS 111 students from clickers to response cards without an initial test period is an example of what type of conversion?

Direct conversion

What is the named used to describe daily spending decisions like eating at a restaurant, buying clothes, drinking Starbucks, or playing a round of golf?

Discretionary

When major airlines (American, Delta, United, etc.) bypass travel agents and directly market tickets to customers from the airline's corporate website, this is an example of using what type of business sales strategy?

Disintermediation

What type of innovations are intended to be incompatible with existing standards and value chain, and must develop markets de novo (latin for "from the beginning")?

Disruptive Innovation

Which of the following was NOT described as one of the four innovation zones?

Disruptive Technology Zone

n the Video Case on Decision Matrices, what is the goal of decision matrices?

Improve the process by which we make decisions

In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does ".edu" define?

Domain

What is the name of the Regents Professor and founding chair of the MIS Department that pioneered the field of Group Decision Support Systems?

Dr. Jay Nanamaker

What type of chart allows you to plot data using two y-axes and a shared x-axis, visualizing a correlation or the lack thereof between the two y-axes data sets?

Dual Axis Chart

[ERPModules] Which of the following is typically not considered a "core" ERP module?

E-Business

[Systems] What term is used to describe interorganizational ERP systems that provide web-enabled links among a company's key business systems—such as inventory and production—and its customers, suppliers, distributors, and other relevant parties?

ERP-II

What was the name of the legislation adopted by the European Parliament that mandated that all countries within the EU must setup laws requiring websites to obtain informed consent before they can store or retrieve information on a visitor's computer or web-enabled device.

EU Cookie Law

IT has changed the manager's job in many ways. Which of the following is NOT the result of this change

Easier to make a decision

IT has changed the manager's job in many ways. Which of the following is NOT the result of this change?

Easier to make a decision

A Cost-Benefit Analysis is related mostly to what type of project management feasibility assessment?

Economic

Purchasing an entire box of screws, even though only a small number are need for the master production schedule is an example of making a purchasing decision based on what approach?

Economic Order Quantity

One of the impacts of Globalization is the the Economics of Distance (Transportation Costs) has been replaced by what?

Economies of Attention

According to our guest speaker who spoke on managing the development of Eller websites, what is the most important skill a business person working with technology should have?

Effective communication skills

In the SCOR model, competitive requirements such as reliability, responsiveness, and agility are all related to what dimension of a vendor's performance?

Effectiveness

The term used to define the degree to which a goal is achieved is

Effectiveness

For companies managing their supply chain business processes using CPFAR (Collaborative Planning, Forecasting and Replenishment), the process improvements over the traditional ordering process could be primarily considered as an improvement in which of the following?

Efficiency

What the name of the undergraduate certificate offered through the McGuire Center for Entrepreneurship that provides Eller undergraduate students with the opportunity to apply their knowledge and skill sets in real-world environments in order to make your community a better place to live and work as well as having a positive social impact?

Eller Social Innovation (ESI) Certificate

What category of location-based services would best describe products such as "location-based gaming", "social networking," and "find a friend"?

Entertainment

With respect to a database, what term is used to describe an abstract representation of all of the information included in a data structure about a particular type of entity?

Entity Class

Besides sensors, radios, and chips, what is the value in the Internet of Things?

Establishment of services on top of the connectivity

The pattern of financial fraud undertaken by David Myers, MCI?s Controller, is a good example of what type of ethical situation?

Ethical Drift

Originally discussed by Dr. Gilliland, David Myers' (former controller of MCI/Worldcom) statement "I still don't know that one point when I started to cross the line...", is an example of how small, incremental repeated compounding of unethical decisions can result in what

Ethical drift

Originally discussed by Dr. Gilliland, David Myers' (former controller of MCI/Worldcom) statement "I still don't know that one point when I started to cross the line...", is an example of how small, incremental repeated compounding of unethical decisions can result in what?

Ethical drift

Often presented visually on an executive dashboard, what type of report focuses attention on business processes whose performance falls outside the range of their defined KPI metrics?

Exception

What is the process of identifying metrics that are outside of acceptable tolerance levels?

Exceptiuon Reporting

When Dr. Sudha Ram used CatCard data (digital traces) as part of her research to analyze students' routines and relationships to predict student retention. What knowledge management term would you use to classify the CatCard transactional data?

Explicit data

_______________ is knowledge that has been codified or documented.

Explicit knowledge

Which of the following types of security risks would be technique used to compromise a system?

Exploit

From a user's perspective, perceived affordances would include actual perceptible design affordances and what other category of perceptual affordances?

False or fake design affordances

Which of the following types of wire media has the highest physical security?

Fiber-optic cable

What term was coined by Eli Pariser to describe a personalized search in which a website algorithm predicts what information a user would like to see based on user location and past searches on the website?

Filter bubble

What term describes the ability of a person to effectively evaluate and manage one's finances in order to make prudent decisions toward reaching life's goals?

Financial Literacy

What network security control prevents information from moving between two networks?

Firewall

Which of the following security controls would be used to limit access to systems to specific ports or network systems?

Firewalls

Planned, recurring expenses that occur on a routine schedule, such rent or car payments that must be paid every month, are examples of what?

Fixed expenses

Planned, recurring expenses that occur on a routine schedule, such rent or car payments that mustbe paid every month, are examples of what?

Fixed expenses

Which of Thomas Freidman's "flattners" related to technologies related to how content can be digitized and therefore shaped, manipulated, and transmitted; how processes can be done at high speed with total ease; and how mobile can be done anywhere and anytime by anyone; and can be done by anyone?

"The Steriods"

Excel uses what character to indicate a row or column reference is absolute addressing?

$ (US Dollar Sign)

What phrase is used to describe the current and developing environment in which disruptive technologies and trends such as the Internet of Things (IoT), robotics, virtual reality (VR) and artificial intelligence (AI) are changing the way we live and work?

Fourth Industrial Revolution

Which of the project management documents includes all three of the triple constraints that are in the Scope Triangle?

Gantt Chart

Which of the project management documents includes all three of the triple constraints?

Gantt Chart

Satellites used for data communications that appear to be stationary from a fixed location on earth are placed in what type of orbit?

Geosynchronous orbit

What term is used to describe the process of adding metadata to digital photos to identify the exact geographical location the photo was taken?

Geotagging

Related to the concepts of globalization, what computer "law" states that the bandwidth (speed) of data networks will double approximately every 24 months?

Gilder's Law

The University of Arizona is nationally recognized for sustainability in its academics, research, operations, and administration by the Assocation for the Advancement of Sustainability in Higher Education. What Sustainability Tracking, Assessment & Rating SystemTM (STARS) rating was the University of Arizona awarded in 2017?

Gold

What term did Thomas Friedman's use to describe the impact of globalization where individual countries must sacrifice some degree of economic sovereignty to global institutions (such as capital markets and multinational corporations)?

Golden Straightjacket

What tool is commonly used to track how, when and from what location users are using website?

Google Analytics

In the Online Democracy model, the "Voter Activation Network" uses voter registration rolls to categorize voters as always/sometimes/never voting by using information obtained from:

Government records

Allowing individuals to file tax returns, renew driver's licenses, and obtain various permits online is an example of what type of eGovernment?

Government-to-citizen (G2C)

Pioneered at the University of Arizona, what decision support technology as developed to address problems such as a lack of focus, fear of speaking, hidden agendas and misunderstandings then collaborating with others?

Group Decision Support Systems

What technology was developed to address problems such as a lack of focus, fear of speaking, hidden agendas and misunderstandings then collaborating with others?

Group Decision Support Systems

In recognizing ethical situations, which of the following is related to a chemical reaction that occurs in your body, specifically your intestinal trac

Gut check

In recognizing ethical situations, which of the following is related to a chemical reaction that occurs in your body, specifically your intestinal track?

Gut check

When adding your icon to your ABP-3B website, what section should you add the link directive to your icon file?

HEAD

What is the collective name for a set of open source programs and procedures, such as MapReduce and Yarn, that commonly provide the "backbone" of their big data operations?

Hadoop

What is the name of the University of Arizona's primary career management tool that offers UA students and alumni access to jobs, internships, and a range of other services?

Handshake

What is NOT an advantage of digital transmission?

Harder to encrypt

Which of the following terms is used to measures the frequency of analog signals?

Hertz

In the "Don Norman: Thoughtful Design" Video Case, what did he say was the most important part / thing to take into account when creating a good and thoughtful design

How the user thinks it should work

What Regents Professor on the MIS Faculty at the University of Arizona developed the COPLINK system for managing knowledge used in law enforcement?

Hsinchun Chen

EPEAT Preformance Categories (e.g., Material section, Energy Conservation, and Packaging Waste) are examples of that order effect of environmental sustainability?

1st Order - Creation, Use and Disposal

Using telepresence and online/distance learning are examples of using technology to produce what order sustainability effect?

2nd Order - Applications Alternatives

As a possible password, how many variables would the password MIS111Exam (just the underlined string of characters) have when assessing its security strength?

3

According to the video on the Power of Entrepreneurship, approximately how many people live on less than $10.00 per day?

4 Billion

Due to the curvature of the earth, microwave towers generally cannot be spaced more than about how many kilometers apart?

48

Assume you are 22 years old when you graduate from the University of Arizona and have a credit card with a $2,000 credit balance with an 18% annual rate. If you only make minimum payments of 2% of the balance or just $10 (whichever is greater) each month, what birthday will you likely be be celebrating when the the credit card is paid off?

52

Approximately what percentage of applications for jobs are rejected by potential employers before the interview due to public information posted online by the applicant (e.g. social networking, blogs, media sites, etc. - that is, your online reputation)?

60% or more

Approximately what percentage of applications for jobs are rejected by potential employersbefore the interviewdue to public information posted online by the applicant (e.g. social networking, blogs, media sites, etc. -that is, your online reputation)?

60% or more

When deployed, the Irridium satellite telephone network was based on a constellation of 66 satellites. However, how many operational satellites were originally proposed for the original constellation? (Hint the name Irridum was selected due to this number.)

77

What does the "%20" represent in an HTML src attribute of a IMG tag?

A Space Character

"Fishbone" process analysis diagram is also known as

A cause-and-effect diagram

A feature of an object that limits possible (often incorrect) uses of a device is known as:

A constraint

feature of an object that limits possible (often incorrect) uses of a device is known as

A constraint

In June of 2018, Exactis, a marketing and data aggregation firm, disclosed that the personal details of over 340,000,000 individuals and businesses had been compromised.What security failure caused this massive security breach?

A database was able to be accessed on a server open to the internet

in June of 2018, Exactis, a marketing and data aggregation firm, disclosed that the personal details of over 340,000,000 individuals and businesses had been compromised. What security failure caused this massive security breach?

A database was able to be accessed on a server open to the internet

What is P3P?

A language for machine-readable privacy policies

What is a privacy/security seal?

A logo demonstrating that a website follows specified privacy protection standards

In a relational database, what term refers to the collection of items that are all related to a single unique value, where the single value often serves as the primary key?

A record

In the assigned reading, Don Norman makes the case for viewing conceptual models as what?

A story in context

What term is used to describe the marketing analysis where two versions of a web page are compared to see which one gives a better conversion rate for similar visitors at the same time?

A-B (or Split) Testing

Which of the following is a support activity in Porter's value chain model?

Human resource management

If your sales system shows a customer's name as "Johnny Smith", but your logistics system for shipping shows the same customer as "John A. Smith", what type of database problem does this represent?

Inconsistency

According to the mythical man-month what is the reason adding people to a project will not speedup your project?

Increased complexity of interpersonal communications

What type of inventory demand is based on the forecasted need for finished products?

Independent demand

In the McGinn model of design, the least common category of design elements would be related to what factor in the McGinn model?

Individual

in the McGinn model of design, the least common category of design elements would be related to what factor in the McGinn model?

Individual

When analyzing the performance of students in MIS 111 on Exam 1, which of the following would not be appropriate as a useful "dimension" in an OLAP data cube?

Individual email addresses

In Thomas Friedman's discussion of globalization, he described the process of globalization as being realized through actions that were first defined by your country, then later defined by multi-national companies, and finally, in the most recent age of globalization is defined by:

Individuals

What dimension of Porter's Forces focuses on the decision that a buyer makes when choosing among direct, existing competitors when all of the competitors offer the same identical name-brand product (e.g., an iPhone 6)?

Industry Rivalry

Building on its initial success of the Voter Activation Network, the Democratic National Committee moved beyond simply classing voters by whether they are likely to cast a vote and their party affiliation to also include what additional aspect of Web2.0?

Influencing voters by having supporters use their social media relationships

[Linkages] When viewing the linkages among trading partners, which of the following is common for both upstream and downstream supply chains?

Information

___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information.

Information extortion

What term best describes when consumers are able to use their smartphones to obtain information about a company's competitor's product pricing, features, customer reviews and availability while shopping in their company's brink-and mortar store?

Information transparency

In the History of the Cell Phone video case, how did the use of cellular phones change the way in which calls were made?

Instead of calling a place, calls to cellular telephones were associated with a person

in the four layer model of the IOT architecture developed by the UofA's Cloud and Autonomic Computer Center, environmental sustainability would be most closely related to what layer?

Integrated application layer

As originally discussed by Dr. Gilliland, the classic values conflict with "Who Am I'" represents what type of ethical dilemma

Integrity vs. loyalty

In the decision process, problem identification and classification occur during which phase?

Intelligence

Similiar to the expansion of telecommunications in the 1800's with the telegraph, what transportation infrastructure was discussed in class that guided the decision the placement of the long-haul fiber-optic cable infrastructure?

Inter-continental Railroads Network

Operating unregulated WiFi networks, clickers, Bluetooth headsets, cordless telephones, and microwave ovens using the same 2.4GHz ISM frequency range in close proximity to one another might result in what problem?

Interference

Which of the following security controls would be used to identify and stop a known user?s access based on a unusual pattern of behavior?

Intrusion Detection Systems

Which of the following is FALSE of social computing?

It allows social information to remain anonymous.

In addition to possessing contextual and relevant information, what other characteristic aspect does knowledge possess?

It is actionable

in addition to possessing contextual and relevant information, what other characteristic aspect does knowledge possess?

It is actionable

What is NOT a benefit of telemedicine?

It requires traveling so doctors can see their patients in person

How does the University of Arizona's program called NetID+ to improve password security?

It requires users to confirm their identify with two-factor authentication

What type of inventory management systems deliver the precise number of parts, called work-in-process inventory, to be assembled into a finished product at precisely the right time?

JIT

Business metrics that describe the performance of critical business activities are known as

Key performance indicators

Business metrics that describe the performance of critical business activities are known as:

Key performance indicators

What term is used to describe the percentage value of the number of times a keyword or key phrase appears on a webpage as compared to the total amount of words on the page?

Keyword density

The terms "contextual," "relevant," and "actionable" are commonly related to what term?

Knowledge

What term is used to describe the conversion of tacit knowledge to explicit knowledge, so that the knowledge can be used in the organization by the staff?

Knowledge Codification

COPLINK, developed at the University of Arizona in the MIS Department's Artificial Intelligence Lab, allows law enforcement officers to integrate database information to identify crime suspects based on limited information (e.g., a license plate number or nick name). What term is used to describe the type of information system that is commonly used to maintain collection of experiential, reflective and solutions-oriented information?

Knowledge management

COPLINK, developed at the University of Arizona in the MIS Department's Artificial Intelligence Lab, allows law enforcement officers to integrate database information to identify crime suspects based on limited information (e.g., a license plate number or nick name).Upon what information system technology is this system'sdesign based?

Knowledge management

The sequence of activities performed by users of GroupSystems' ThinkTank product directly parallel the steps in what other business process?

Knowledge management cycle

Making the Adobe Creative Cloud is now available to UofA students. What approach for software acquisition did the UoA used to allow students to have access to this software?

Lease (Right to Use Product)

______ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

Liability

______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or system

Liability

______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

Liability

The risk of a project can be measured on what two scales?

Likelihood and Impact

What type of customer intimacy zone innovation focuses on making structural modifications to established products in order to create a distinctive sub-category?

Line-Extension Innovation

Which of the following issues related to wireless communication would NOT be a problem for an RFID (Radio Frequency Identification) system?

Line-of-sight

In the Personal Branding video case, which of the following online platforms was idenfied as being primarily a business networking tool?

LinkedIn

In general, what you think of as the quality of your network connection speed when you are using your PC, iPad, or Smartphone is most influenced by which of the following?

Local Tier-3 ISPs

Although Martha Stewart?s actions related to insider trading, she served prison time for what criminal acts?

Lying about her actions to the FBI

When describing the invention of the cell phone, who said "For the first time, you were calling a person, not a place..."?

Martin Cooper

Who said the following quote "You can't use up creativity. The more you use, the more you have."

Maya Angelou

What Center in the Eller College of Management has the mission to help students improve their potential and advance society by developing an entrepreneurial and innovative mindset

McGuire Center for Entrepreneurship

Related to the concepts of globalization, what computer "law" states that value of the internet is related to the number of connections (users)?

Metcalf's Law

An unobstructed, straight line-of-sight path between a transmitter and receiver is required by which of the following high-speed, commercial wireless network technologies?

Microwave

____________ means that users carry a device with them and can initiate a real-time contact with other systems from wherever they happen to be.

Mobility

1. NetID+ is the University of Arizona's two-step authentication solution provided by Duo that adds two-step authentication as an extra layer of security to your NetID-accessed accounts, including D2L. It was recently announced that NetID+ will be required for all campus logins during 2018.What is the date that usingNetID+ will be required for all freshman students in MIS 111?

Monday, October 8th

Related to the concepts of globalization, what computer "law" states that the density of transistors will double approximately every 18 months?

Moore's Law

The European Union's data protection laws are ___________ strict compared to the US laws.

More

What is the name for the exchange points for Internet traffic used by major ISPs?

NAP

Which of the following is the technology that enables most mobile wallet applications?

NFC

What is the name of the wireless technology that is designed to be embedded in mobile devices such as cell phones and credit cards allowing you to pay for items by waving your card within a few centimeters of a point-of-sale terminal?

Near-field Communication

What is the name of the device that of the physical device that interfaces computers with a local area network (LAN)?

Network Interface Card (NIC)

Market capitalization determined by multiplying the stock price by what

Number of common shares outstanding

Market capitalization is determined by multiplying the stock price by what?

Number of common shares outstanding

Explicit, or "leaky" knowledge, is based on information that is:

Objective and rational

in the video case for telemedicine, Dr. Ana Lopez, who is the Medical Director of the Arizona Telemedicine Program, described how advances pioneered at the University of Arizona in tele-medicine and tele-pathology have improved the standard of health care in what way?

Offering bundled, same-day assessment in the diagnosis of breast cancer

All of the items in one column a cross functional diagram are related to what?

One actor

What name is used to describe results found when a search engine algorithm analyzes all the pages across the web in an unbiased way and reports the pages considered to contain the most relevant information for your search terms?

Organic

What is NOT a factor contributing to the Bullwhip Effect?

Outsourcing

On the balance sheet, total assets minus total liabilities must equal what

Owner equity

On the balance sheet, total assets minus total liabilities must equal what?

Owner's Equity

Which type of website file contains software that's executed on the host before sending the results to the browser?

PHP

Although globalization has been underway for many centuries, digitization, networking, and connectiveness have dramatically increased what?

Pace of Change

In a packet-switched data communication network, which of the following is true:

Packets can be lost or become corrupted between the sender and receiver

What term does Google use to describe how important a website is based upon counting the number and quality of links to a page, using the underlying assumption is that more important websites are likely to receive more links from other websites?

Page rank

The success of a Group Decision Support System (GDSS) is based upon two key features: contributor anonymity (i.e., the identity of the person making the comment or suggestion is not known), and what other important feature?

Parallel Discussions

he success of a Group Decision Support System (GDSS) is based upon two key features:contributor anonymity (i.e., the identity of the person making the comment or suggestion is not known), and what other important feature?

Parallel Discussions

Which of the POUR principles focuses on the concept that web accessibility is based upon the assumption that people need to be able to input the information into their brain so that they can process it?

Perceivable

With respect to an individual, what term describes the process of managing one's earnings, savings, and debt to meet the actual and budgeted expenses?

Personal Finance

With respect to an individual, what term describes the processof managing one's earnings, savings, and debt to meet the actual and budgeted expenses?

Personal Finance

What is an affordance?

Physical property of an object that shows functionality

What type of chart would be show the values of individual components proportional to a whole, allowing you to easily know relative size of a component, such as might be done to analyze the allocation of expenditures in a budget?

Pie Chart

What Leadership in Energy and Environmental Design (LEED) certification was the building where our classroom is located, Environment and Natural Resources 2, awarded by the U.S. Green Building Council?

Platinum

What term is used to describe a physical interface between peripheral devices and the computer?

Port

What action did Stacy Snyder take that resulted in her losing her job?

Posting a photo of herself at a party on her personal social media account

In the assigned reading on accessibility, the authors note that while WCAG 1.0 focused on the techniques for accomplishing accessibility, WCAG 2.0 focused on what?

Principles of accessibilities

In the Video Case on Decision Matrices, what is the goal of weighting decision matrices?

Prioritize the most important quantitative decision criteria

______________ is the right to be left alone and to be free of unreasonable personal intrusions.

Privacy

Which of the following are similar actions in the DM, KCC, and GDSS cycles?

Problem Definition, Create, Brainstorm

What type of innovation focuses on the supply side, looking for opportunities to remove non-value-adding steps from the workflow?

Process Innovation

Assuming orders are currently being processed correctly, adding CPFAR inventory management practices would improve a company in all of the following ways except:

Process effectiveness

Which of the following business component are *not* included in an MRP-II planning cycle?

Product Margins

______________ is the process of forming a digital dossier.

Profiling

What is the term used to describe the process of reducing the number of dimensions of a multi-dimensional data cube (e.g., from three dimensions, perhaps season, location, and product, into two dimensions, such as season and location)?

Projection

An I^2 diagram helps identify opportunities that are "low hanging fruit". What does the term "low hanging fruit" mean in this context?

Projects that easy to do and also have a high value proposition

In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does "http://" define?

Protocol

The old accounting maxim of "promise low" and "deliver high" is related what costing and budget concept?

Prudence

Which of the following terms are related to production based on the mass customization initiated by a customer's order?

Pull model

What type of decision based on explicit knowledge and involves analysis using an algortihm and measured data?

Quantitative

According to the Video Case on Decision Matrices, what factors should be used when making a decision?

Quantitative and Qualitative Factors

Parking garage passes and access control on employee ID badges are examples of:

RFID

What technology has been used for such diverse applications as healthcare, tracking lost pets, and toll collecting on highways?

RFID

What IoT technology discussed in class could be used to identify shoppers and allow products to "introduce" (recommend) themselves to a shopper?

RFID Tags

Which of the following technologies would *not* require line-of-sight scanning?

RFID Tags

CODASYL, the Conference/Committee on Data Systems Languages, is remembered almost entirely for two activities: its work on the development of the COBOL language and its activities in standardizing database interfaces. We've learned about the pioneers of databases (Chen and Codd) today, who is credited for developing FLOW-MATIC, which evoled into the COBOL, the widely used business programming language?

Rear Admiral Grace Murray Hopper

Industry analytsts expect that 5th generation networks will be defined by three characterisitcs over 4th generation cellular networks. Which of the following would is not one of the expected changes?

Reduced signal attenuation

In a decision matrix, a "weighting" allows what additional information to be included in the analysis?

Relative importance

Tracking what products are delivered to users, and when, is a form of what?

Release Control

Internet-enabled globalization does the following

Removes geography as a barrier to relationships

Which of the following actions would be considered a biometric authentication?

Requiring a user to scan their fingerprint

What term was used to describe a website that can adapt to the type of device being used to access the website?

Responsive

Google Analytics tracks the browser used to access a website. What term was used to describe a website that manages content based on the browser or device accessing the content

Responsive Web Design

Who was the founding director of the Arizona Telemedicine Program?

Ronald S. Weinstein, M.D.

What topic from Data Mining is closely related to decision trees?

Rule Induction

What is used to determine how long an investment will take to double, given a fixed annual rate of interest, allowing investors to get a rough estimate of how many years it will take for the initial investment to duplicate itself.

Rule of 72

What is used to determinehow long an investment will take to double, given a fixed annual rate of interest, allowing investors to get a rough estimate of how many years it will take for the initial investment to duplicate itself.

Rule of 72

What type of business systems have the capability to place automatic requests to buy products from vendors in real time?

SCM (Supply Chain Management)

What is the name of the agile framework for managing the work of development teams who break their work into actions that can be completed within timeboxed iterations, called sprints (30 days or less)?

SCRUM

Paying Google to display marketing advertisements when a user searches for a specific Adword is most commonly associated with which of the following concepts?

SEM

Keyword selection and density, image alt tags, and links to content are mostly commonly associated with which of the following concepts?

SEO

In the Thoughtful Designvideo case, Don Norman explained cultural perceptions in design through the use of what common, everyday item?

Salt and pepper shakers

What is the name of the social engineering attack that frightens computer users into visiting malware-infested websites by appearing to be legitimate warnings from antivirus software companies that your computer's files have been infected with the intent of tricking a user into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection?

Scareware

What is the purpose of a PERT chart?

Schedule and organize tasks

In project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resources and what other dimension of the planning process?

Scope

in project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resources and what other dimension of the planning process?

Scope

What term is used to describe the very common tendancy for projects to accumulate new functionality to fulfil the requirements of project stakeholders?

Scope Creep

As discussed in class, what company was founded in the Globalization 2.0 era based on the business model of selling discontinued product lines directly to consumers by using a new transportation infrastructure to reach a geographically distributed customer base?

Sears, Roebuck & Co.

Although web users should have an unlimited amount of time to complete tasks on the web, this design goal must be balanced against what other issue?

Security and risk

Bandwidth is the transmission capacity of a network, stated in bits per second. Which of the following "laws" we've discussed determines the maximum bandwidth (signalling rate) of a given type of communication media (e.g., copper cable, fiber optic, etc.)?

Shannon's Law

Which of the following causes of the bullwhip effect is related to a trading partner intentionally sharing inaccurate information with a company's future inventory requirements?

Shortage Gaming

Which of the following factors related to the bullwhip effect was due to deception between two trading partners?

Shortage gaming

What is the name used to describe when a person visits a brick-and-mortar store only to check physical characteristics of a product but intends to purchase the product online?

Showrooming

Which of the following is generally NOT commonly used as a biometric identification?

Signature

In the Jack Welch Video Case in the SCM Lecture, What approach was he discussing as key to providing customer value?

Six Sigma

Dr. Patton discussed the Hacking Google Glasses video case in class and talked about what it could be a precursor to something else getting hacked in the future. What did he say might be the next thing hacked using the same technique?

Smart / Autonomous Cars

What is an example of something in the Integrated Application layer of the 4 Layer Model?

Smart transport

What normative ethical theory expects a corporation to create more value to society that it consumes?

Social Contract Theory

Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what?

Social Engineering

In the video case for Nestle, data-driven decisions were primarily based on visualizations of information from what source?

Social Media Platforms

In the NASA project management video case, what did the speaker indicate was the greatest risk he faced in managing projects for NASA?

Social and political risk

___________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords

Social engineering

What type of electronic commerce helps shoppers connect with one another based on tastes, location, age, gender, and other selected attributes allowing them to share information using voting, comments, discussions, and reviews focused on shopping?

Social shopping

Information systems professionals understand business needs and analyze processes, methods and data to create customer-oriented solutions. The value proposition for MIS was described more briefly by Dr. Jay Nunamaker, Regents Professor and founding chair of the MIS Department, as a discipline focused on doing what for business?

Solving real problems

Your username (UANetID) is your claim of identify to a computer system. When the computer system verifies your identify by requiring you to enter a password is an example of what type of authentication

Something a user knows

What term is used to describe paid-for product ratings and reviews?

Sponsored reviews

Donut Charts are difficult to read, Microsoft recommends what as an alternative?

Stacked Column or Bar Charts

What normative theory of ethics focuses on the belief that manager's actions should be guided by the understanding that they are entrusted with a responsibility to manage and protect the assets of the company for the benefit of all of those who the actions of the firm affect?

Stakeholder

As confirmed by our in-class poll, what is the most likely action an ownerwill take with their old computer or cellular telephone after purchasing a new device?

Store it at home

What type of problem has an optimal solution can be reached through single set of steps based on an algorithm?

Structured

The University of Arizona Green Fund is an example of what type of sustainability program?

Student engagement

When classifying items on an I^2 diagram, we depend on individuals with domain knowledge and consultants about the items. When discussing knowlege management, what name did we use to describe an individual with domain knowledge?

Subject-matter Expert

What term describes individuals with tactic knowledge about a particular domain?

Subject-matter Experts

Tacit or "sticky" knowledge, is based on information that is

Subjective and cognitive

As part of their Smart Campus research, what MIS researcher is using CatCard data (digital traces) to analytize students' routines and relationships to predict student retention, or their likelihood of returning to campus after their freshman year?

Sudha Ram

Using the Internet of Things to increase the efficiency of a company's operations by allowing it to track, in real time, the movement of raw materials and parts through the manufacturing process to finished products delivered to the customer is related to what business function?

Supply chain management

When analyzing a set of click-stream data, what term is used describe the percentage of rows containing an item relative to the total number of rows?

Support

As discussed in the VAN (Voter Activiation Network) Relationship-Based Political Organizing video case study, the VAN able to idenify the relationships of possible supporters using data from what source?

Supporter's Facebook contacts

In the VAN (Voter Activiation Network) Relationship-Based Political Organizing video case study, the VAN was able to idenify the relationships of possible supporters using data from what source?

Supporter's Facebook contacts

What term is used to describe the one column for an actor in a cross -functional diagram?

Swimlane

In the Software Development Lifecycle Process (SDLC), in what SDLC stage is it the most costly to make changes to the system requirements

Systems Operation and Maintenance

Originally spun out of Stanford University as a research project, what big data tool started out by offering visualization techniques for exploring and analyzing relational databases and data cubes and has expanded to include Big Data research?

Tableau

What is the name of the Business Intelligence tool that is used for interactive analytics and data modeling?

Tableau

Subjective knowledge that is based an individual's experiences is known as what?

Tacit knowledge

Creating a business process that can be franchised is an example of what type of knowledge management conversion?

Tacit to Explicit

Determining whether your personal computer has appropriate hardware to take an online exam proctored by Examity is what type of assessment?

Technical feasibility

How does telemedicine improve the delivery of medical care in rural communities?

Telemedicine reduces the need for patients to travel to physician's offices

What term is used to describe how telemedicine uses wireless transmission and receipt of data gathered from remote sensors to allow doctors can monitor patients and control medical equipment from a distance?

Telemetry

Cisco uses the term "the power of in-person" to describe the ability of what technology to improve access to subject matter experts and to open doors to small business people?

Telepresence

What collaboration tool was discussed in class that enhances the participants' contextual awareness by sharing non-verbal information during meetings?

Telepresence

Which of the following technologies we've discussed was described as a more environmentally friendly "best practice for communication" that could greatly benefit small businesses?

Telepresence

In order to get Excel to display the exact closing date for each month, you need to format the X-axis as:

Text axis

When displaying a webpage, such as http://www.u.arizona.edu/~wilbur, what is the name of the directory the web browser will check in the "wilbur" account for the "index.html" website?

The "public_html" directory

Porters five forces focuses on what part of competition?

The Business Environment

Which of the following does a Fishbone Diagram typically not inform you about a problem?

The cost of correcting a problem with a process

In the video case about Transmission Control Protocol (TCP), Vint Cerf described TCP using an analogy of the sending postcard through the US postal system. Which of the following was not an issue discussed in the case study?

The cost of sending the packets making up a message

From Don Norman's perspective, what fatal flaw does the BMW iDrive (which he descibed as a well thought out, very logical, and sensible device) have with respect its human interface?

The iDrive destroyed spatiality

Applications such as "find a friend" (FourSquare), driving directions (Smartrek), roadside assistance (OnStar), and fleet management (UPS and FedEx) are all examples of services that have been enhanced by knowing what?

The location of the requester

In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what common problem did his analogy using the postal service to email a page from a book have with sending TCP packets?

The message might get lost and not delivered

Thomas Friedman was quoted as saying, "We're in the middle of 3 accelerations; the market, mother nature, and Moore's law. Moore's law says the power of microchips will double every 24 months, mother nature is climate change, biodiversity loss and population, and the market is digital globalization." What is Moore's Law?

The number of transistors in a dense integrated circuit doubles about every two years

Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project?

The project milestones and the order they are scheduled to be completed

A Bill-of-Materials describes the components that make up an item, the quantity used, and what other information about a finished good?

The relationships of raw materials and subassemblies

Assume you need to put a sign that says "PUSH" on a door handle to explain the correct way to operate the door. The "PUSH" sign helps a user understand what aspect of usability?

The sign explains a false affordance

Assume you need to put a sign that says "PUSH" on a door handle to explain the correct way to operate the door.The "PUSH" sign helps a user understand what aspect of usability?

The sign explains a false affordance

As I move farther away from campus, I notice that my UAWiFi connection gets progressively weaker. What factor will always cause this to occur?

The signal strength is lost due to attenuation

Which of the following is a DISADVANTAGE of purchasing prewritten software?

The software is controlled by another company.

The big advantage of bubble charts over scatter charts is?

They add another dimension

What common function do "HTTP", "TCP" and "IP" share?

They all define internet-based protocols

A Stacked Area chart is good for showing relative contributions of different series to a total over time, but they have one big limitation, which is?

They can't show negative values

Pie charts have several limitations, including all of the following except?

They have limited color and don't draw the eye and attention

Treemap Charts largest advantage over bar or column charts is?

They show individual values relative to the sum of the series as well as other values

_________ is any danger to which a system may be exposed.

Threat

Before paying an invoice in the procurement process, the accounting team checks that the purchase order, the goods receipt document (bill-of-lading), and the vendor's invoice all match. What is the term that is used to describe this auditing process?

Three-way Match

What is considered to be the high-capacity data transmission core of the Internet structure?

Tier 1 ISP

What British Scientist invented the World Wide Web in 1989 while working at CERN (European Organization for Nuclear Research) in 1989?

Tim Berners-Lee

In a vertical cross-functional business process diagram, the order of items in one column (from top to bottom) shows what relationship among these items?

Time

In a vertical cross-functional diagram, items are ordered in one coumn relates to what?

Time

Hierarchical Diagrams are commonly used for all of the following except?

Time series data

Which of these is NOT enumerated as a Motivation to Create Accessible Web Content?

To improve the reliability of technical functionality (technology centered motivations

Training for the professional "Certified Public Accountant" certification generally focuses on which of the following?

Tracking and reporting the financial transactions of a business, and reporting financial results to external stakeholders

Which of the information layers in the Internet of Things model focuses on the communication networks that connect the sensors that actually collect the data?

Transmission Layer

The __________________ test proposes a scenario in which a man and a computer both pretend to be women or men, and a human interviewer has to identify which is the real human.

Turing

What is the name of the criterion of intelligence where depends on the ability of a computer program to impersonate a human in a real-time written conversation with a human judge, sufficiently well that the judge is unable to distinguish reliably—on the basis of the conversational content alone—between the program and a real human?

Turing Test

Select the answer below that orders the media correctly from the lowest to highest bandwith (data rates).

Twisted pair, Coaxial Cable, Fiber-optic Cable

What term describes being able to access information and communication in almost any location?

Ubiquity

A company's "ticker" or stock symbol serves what role on a stock trading exchange

Uniquely identifies a traded stock

A company's "ticker" or stock symbol serves what role on a stock trading exchange?

Uniquely identifies a traded stock

Long term weather predictions are generally considered what type of problem?

Unstructured

When applying for advanced standing in the Eller College of Management, the process of selecting your major would be best described as having what characteristics of a decision?

Unstructured and Strategic

Universal or accessible design should be viewed as a subset of what larger design issue?

Usability

If the search column for a VLOOKUP contains a duplicate value, which value will be returned?

VLOOKUP will return a value based on the the first match

What inventory strategy allows a company's supplier to monitor inventory levels and manage the replenishment process for the supplier's products?

VMI

What technology do companies use to make the links between connection between two corporate intranets more secure?

VPN

In the case study presented in class, Nestle's Digital Acceleration Team training program focuses on developing skills in all of the following business issues, except:

Validating

Current information systems have evolved to focus on what role with respect to their services?

Value creation

The characteristics of big data (data science) are described as being related to volume (of the information), velocity (speed at which information is collected), and what other characteristic?

Variety (integrating data from multiples sources)

When you check your credit score for incorrect information, you're responding to which of the "4 V's" discussed for "big data" in the financial reporting business sector?

Veracity

Businesses like to use Virtual Private Networks for every reason except?

Virtual networks are faster than ordinary internet connections

Similar to trends in computing hardware, what is the trend for wireless network hardware?

Virtualization and merging with the cloud

According to the articles what technologies enable businesses and their employees to get in front of clients and customers but do it in a cost-savings manner?

VoIP and web conferencing

Which of the following types of security risks would ben identified weakness in which necessary controls are not present or effective?

Vulnerability

The Internet is a

WAN

Select the answer the correctly orders the types of computer networks in terms of area span of coverage from largest to smallest?

WAN, MAN, LAN, PAN

What type of chart would be typically be used to show how the an initial value is affected by intermediate values -- either positive or negative -- and resulted in the composition of a final value?

Waterfall Charts

In our discussion of the Eller websites, issues such as user interface consistency, design standards, and branding are all components contributing to what larger issue?

Website Value Proposition

Which of the POUR principles of accessibility focuses on the need to convert non-textual information into another format, such as from audio to text?

Which of the POUR principles of accessibility focuses on the need to convert non-textual information into another format, such as from audio to text?

Which of the following is *NOT* a behavioral issue for meetings?

Wrong people

Of the items used that identify you uniquely at the University of Arizona, which one can be used as a primary key (unique identifier) outside the University?

Your UA email address

For ABP-1, your "ticker symbol" identifies what?

Your assigned Company

Signals used to send messages can be _______ or digital

analog

IT allows the workplace to expand to 24 hours a day at _______________, which is a benefit for ___________

any location; employers and employee

T allows the workplace to expand to 24 hours a day at _______________, which is a benefit for ___________.

any location; employers and employees

Customers _____________________ because of Web 2.0.

are more empowered

LEED refers to the efficiency of?

buildings

IT __________ be used to create a competitive advantage ___________.

can; when it is used effectively

A firewall is a _______ control

communication

Telepresence systems seamlessly integrate _____ and _____.

contextual awareness; content management

WalMart has a(n) ___________ strategy.

cost leadership

Which of the following is an informational role?

disseminator

The difference between =vlookup() and =hlookup() is what?

each record in a vlookup is in a row, and in hlookup is in a column

Weak passwords are a(n) ___________ threat.

employee

The goal of CAPTCHA is to ___________.

ensure you are not a botnet software

WebMD is a(n) _________ that allows doctors to _________

expert; diagnose disease

WebMD is a(n) _________ that allows doctors to ___________.

expert; diagnose diseases

What type of guided media uses light for signaling?

fiber optics

Robots are useful ___________.

for handling monotonous tasks (e.g. factory work)

Google's main business reason for installing fiber in select US cities is to _______.

generate more web traffic, which generates more ad revenue for them

The web ____________ buyer power.

has a mixed impact on

Data ___________ means all applications are able to access the same data, which is ___________ by databases

independence; maximized

What is the correct filename for your ABP-3A website?

index.html

What is the correct filename to use for your ABP-3B website?

index.html

ERP address information silos by _____________.

integrating functional areas

The three security challenges of wireless communication are confidentiality, accessibility, and _____.

integrity

Which of the following is the correct order of the traditional System Development Life Cycle (SDLC)?

investigation, analysis, design, programming and testing, implementation, operation and maintenance

The _________ prohibits an organization from collecting any personal information unless the customer specifically authorizes it.

opt-in model of informed consent

IT changes managers' job by?

providing near real-time information so managers can make quicker decisions

IT changes managers' job by _________

providing near real-time information so managers can make quicker decisions.

What is the name of the directory where the files for your websites for ABP-3A and ABP- 3B will be stored on the U.Arizona.Edu web server?

public_html

Which of the following is a problem with BYOD?

security

The _____________ approach states that an ethical action is the one that provides the most good or does the least harm.

utilitarian

Telepresence is a version of ____________.

videoconferencing

When you use Google Drive to work on a document with a classmate, this is considered _________.

virtual collaboration


Related study sets

AH I PrepU - Chapter 11: Older Adult

View Set

Physics 201- Exam 1,2,3 questions

View Set

Chemistry Honors Chapter 7 Section 1: Nomenclature Naming Compounds

View Set

UNIT 2: Dance Appreciation and Composition (Quipper)

View Set

The most common, prevalent, and frequent

View Set