MIS 111 Final exam
The characteristics of big data (data science) are described as being related to volume (of the information), velocity (speed at which information is collected), veracity (the accuracy of the information) and what other characteristic?
A. Variety (integrating data from multiples sources)
What type of tag attribute is used with an IMG (image) tag to improve accessibility?
ALT
In the video case about Dr. Chiu's Smartrek application, which of the following was not an incentive used to encourage driver participation?
Ability to find other people for carpooling
According to the "IOT Changes Everything" video case, one of the challenges limiting the widespread deployment of IOT is the transitioning to IPv6. What is the value of using IPv6 to IOT?
Ability to uniquely address billions of IOT devices
According to MIT Sloan Management Review, what percentage of companies have placed sustainability permanently on their management agendas?
About 70%
The following "img" directive uses what type of addressing? <img src="file://C:/Users/Patton/Pictures/NistFigure2.PNG " width="2612" height="1746" alt="Security"/>
Absolute
Assume you are off campus and cannot connect to UAWiFi. Which of the following would be a secure alternative to access the campus network?
Access any open wireless network, and then use a VPN to connect to campus
Assume you are off campus and cannot connect to UAWiFi.Which of the following would be a secure alternative to access the campus network?
Access any open wireless network, and then use a VPN to connect to campus
_______ refers to determining who is responsible for actions that were taken
Accountability
______________ refers to determining who is responsible for actions that were taken.
Accountability
What business unit within most companies produces the periodic reports, statements and analyses, such as annual reports, that are disseminate to investors?
Accounting
What accounting metric a strong indicator of whether a firm has sufficient short-term assets to cover its immediate liabilities?
Acid Test
The advantage of ________________ is they can be read over greater distances.
Active RFID tags
All of the symbols representing tasks and decisions that are shown in single column of a vertical cross-functional diagram are related to the same what?
Actor
One of the origins of the Internet was the result of a project by US government agency?
Advanced Research Project Agency
What term is used to describe an online advertising service developed by Google, where advertisers pay to display advertising, product listings, and video content as a result of Google search.
Adwords
Physical properties (shape, texture, color, etc.) of an object that allow someone to use an object correctly without the need for labels or instructions are known as:
Affordances
Which of the following would motivate businesses to create accessible eCommerce websites for their customers?
All (A-D) of the above
Which company used software to disrupt the previous market-leading companies in the book industry?
Amazon
What is the name of a highly popular crowdsourcing Internet marketplace enabling individuals and businesses (known as Requesters) to coordinate the use of human intelligence to perform tasks that computers are currently unable to do?
Amazon Mechanical Turk
A graphical description of a database that describes the way in which an organization's data and business activities are associated with one another is known as_______________
An Entity Relationship Diagram
What is the term used to describe a graphical description of a database that describes the way in which an organization's data and business activities are associated with one another?
An Entity Relationship Diagram
Disclosing personal information such as your race, religion, sex, disabilities, and age on social media undermines what type of protections otherwise provided to you as a citizen in the United States?
Anti-discrimination laws
What is the importance of the triple constraint?
Any changes to one constraint will likely affect the project outcome
The Internet of Things can be described as three "any"-type connections. What are these three "any" connections?
Any time, any place, any thing
When a company purchases a high-value software package, how is the ownership of the software package represented on the company?s balance sheet?
As an asset
What Data Mining method is similar to the approach used by IS Case-based reasoning?
Association
Which of the following types of distance learning experiences are not taught in the presence of an instructor, but rather independently viewed by student online and at their pace?
Asynchronous classes
Which of the following types of access controls would be the process of validating a claim of identity (e.g., Something you know, have, do, or are)?
Authentication
The ____________________ is a summary of information needs of the functional areas and of the organization as a whole.
IT environment
Which of the following is TRUE?
IT impacts entire industries
In the assigned reading for project management, what type of diagram was used to map the impact of a problem using the axes "Impact" and "Likelihood" that you also used in Applied Business Project 2?
I^2 Diagram
Which of the following types of access controls would be a person?s unique identifier within the security domain, such as Name, SSN, Employee ID?
Identification
[GoldmanSachs] What term was coined by Goldman Sachs in 2001 to describe the fastest growing market economies?
BRIC
Which of the following is NOT a value-adding attribute of mobile computing?
Bandwidth improvement
With respect to Porter's Forces, which of the five factors would have be the LEAST (weakest) impact on Starbuck's business model?
Bargaining power of suppliers
What term is used to describe the most successful solutions or problem-solving methods for achieving a business objective?
Best practices
What implementation approach mixes and matches core ERP modules as well as other extended ERP modules from different software providers to best fit their unique internal processes and value chains?
Best-of-breed approach
The estimated yearly cost of reading privacy policies in the US is in the order of:
Billions of dollars
What low-power, non-directional wireless technology is used to create small personal area networks for cell phones and portable music players?
Bluetooth
What short-range wireless technology is commonly to connect smartphones with hands- free headsets for telephone calls and listening to music?
Bluetooth
Harald Blaatand, who was the King of Demark from 940-981, is associated with what wireless technology?
Bluetooth Technology
The equity on a company's balance sheet is most closely related to which of the following?
Book value
What type of chart essentially adds a third dimension, such as frequency or quantity, to scatter plots?
Bubble Charts
What term is used to describe the behavior where small changes in customer demand that result in large variations in raw material orders causing inefficiency in the supply chain?
Bullwhip effect
What type of security activity provides guidance to people who are tasked with resuming business operations after a major disaster, such as building fire, earthquake, or flood, occurs?
Business continuity
Reintermediation is addressing what business issue that was the result of company's directly selling to their customers as part of disintermediation?
Buying complexity
What term is used to describe the printable, one-time use codes you can generate for NetID+ authentication that are useful when traveling, when cell phone carriers may charge additional fees for calls and texts, or when you do not have access to your primary authentication device?
Bypass codes
What is the name of the system used by Raytheon that allows technical blueprints to come to life so engineers engineers and customers can make quick changes to technical specifications and adjust equipment according to their needs using the "the common language of visualization."
CAVE
Which of the following supply chain technologies eliminates the need for a company to implement the "3-way match" process?
CPFAR
Based on the lecture on Decision Matrices, which alternative(s) do you think we should evaluate further for comparison?AlternativeImpactValue Added PriorityMeets-Firm ObjectivesCRM System H 3 H 3 H 3 H 3 SCM System H 3 H 3 M 2 H 3 Payroll System L 1 M 2 L 1 M 2
CRM & SCM
________________ allows you to access the internet through a coaxial media previously used only for TV connections.
Cable modem
Which of the following states has a Social Media Privacy law specifically related to employers from requesting passwords to personal Internet accounts to get or keep a job, or prohibiting colleges and universities from requiring access to students' social media accounts?
California
As discussed in class, a key concern for a startup business is the "burn rate" for their initial capital.What financial report best describes a company's "burn rate" for investors?
Cash flow statement
Put the following assets in order of increasing liquidity (least to most)
Cash, Inventory, Property & Plant
What are the equivalent concepts in Excel to the following database terms: Field, Record, and a Table, respectively?
Cell, Row, Worksheet
[Disintermediation] What term is describes the conflict when manufacturers (brands) disintermediate their channel partners, such as distributors, retailers, dealers, and sales representatives, by selling their products directly to consumers through general marketing methods and/or over the Internet
Channel Conflict
What type of data mining analysis identifies patterns in the data based on demographic characteristics (e.g., age, gender, income, ethnicity, etc.)?
Classification
Which of the following types of analysis would be used to produce the Clery report, which is a public annual security report (ASR) that includes statistics of campus crime for the preceding 3 calendar years identifying the crimes committed in physical (geographic) proximity to a college campus as an effort to improve campus safety?
Cluster
Identifying patterns in data based on common temporal (time) or spatial (geographic) traits is based on what type of data mining analysis?
Clustering
The "nearest neighbor" IS Strategy is similar to what DM method?
Clustering
What type of data mining analysis identifies patterns in the data based on geographic (physical) or temporal (time) proximity?
Clustering
What term refers to the process where two or more entities (individuals, teams, groups, or organizations) who work together to accomplish certain tasks, such as a work group or virtual team?
Collaboration
What approach to knowledge management would best describe the Eller FlexLabs?
Community of Practice
Which of the following knowledge management concepts includes an organizational culture focused on problem solving, a desire to share knowledge because of mutual interest, and norms that build trust, such as might be found in an MIS 111 FlexLab?
Community of practice
Which of the following decisions would *not* be a quantitative decision?
Comparing project objectives with corporate objectives
Porter?s Forces describes which of the following business issues?
Competition
The "Porter's Forces" model deals with what aspect of globalized business
Competition
The "Porter's Forces" model deals with what aspect of globalized business?
Competition
In the Accenture video case, the presenter emphasizes that project managment is not about lists and linear relationships, but rather about managing what?
Complex inter-relationships
What term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding?
Conceptual model
What MS Excel funtion could be used to implement IS Rule Induction?
Conditional Formatting
What common term was used with both human-computer interaction and In a database entity relationship diagram as a way of limiting choices by the user and also specifying the minimum and maximum possible values that may exist for a relationship between two entities, respectively?
Constraint
When we discussed the design of network infrastructure, we noted that the design of connectors on computers we generally related to the speed of the communication interface, the function being supported (number of signals required), and what other issue related to human-computer interaction?
Constraints to improve reliability
What is the name of software that allows publishing, editing, and modifying content from a central interface, providing procedures to manage workflow in a collaborative environment?
Content Management Systems
What term is used to compare the number of closed sales to the the total number of website visitors? For example, if an ecommerce site receives 200 visitors in a month and has 50 sales, this term would be calcuated as 50 (sales) divided by 200 (visits), or 25%.
Conversion rate
An entrepreneur developing detailed documentation of their business processes so that they can be offered to other individuals as a franchise operation is an example of:
Converting tacit knowledge into explicit knowledge
The task of brainstormingin a group decision support system is similar to what step in the knowledge management cycle?
Create
he task of brainstorming in a group decision support system is similar to what step in the knowledge management cycle?
Create
What is the name for the path containing the minimum set of tasks that you must traverse in order to reach completion of your project on time?
Critical Path
What term is used to describe the set of tasks that must be completed as scheduled in order to ensure the delivery of your project on time
Critical Path
in a project plan, the set of tasks that define the minimum amount of time required to complete the project is known as the:
Critical Path
What is the process of solving problems and producing things by connecting people that you otherwise would not know using the internet?
Crowdsourcing
What technique has been used by companies such as Starbucks and Netflix used to engage large numbers of non-employees to innovate, manage, design and market new products?
Crowdsourcing
What term describes a way of solving problems and producing things by connecting online with people that you otherwise wouldn't know?
Crowdsourcing
Which of the following security measures would be considered a "last line defense" for Information Security?
Cryptography
In the case study discussed in Database Management class, how did marketing use information to improve the profitability of their sales?
Customers were classified according into a status level and market segment
Which of the following application software packages was acquired by the University as a Software-as-a-Service (SaaS) technology?
D2L / Brightspace
In the Ruby Tuesday's sales analysis case, analyzing historical data about the sales dimensions of products categories, sales regions, and months of the year would be best using which of the following approaches we've previously discussed?
Data Cubes
What type of data mining presents information graphically so that users are able to identify patterns in the underlying data?
Data Visualization
What type of data structure allows us to organize multi-dimensional information from a data warehouse so that it can be viewed using different data abstractions (or projections)?
Data cube
What type of data structure allows us to organizemulti-dimensional information from a data warehouse so that it can be viewed using different data abstractions (or projections)?
Data cube
Maintaining multiple copies of the same data in multiple information systems that can be independently updated commonly results in what information management problem?
Data inconsistency
___________ support analysis of data about a business unit or company division, whereas ____________ support analysis of entire organizations.
Data marts; data warehouses
Concerns over discrimination, data contamination, and intellectual property (ownership of information) were legal and ethical issues discussed in relation to what topic?
Data mining
Concerns over using data to illegally discriminate against an individual or group, reaching wrong conclusions due to data contamination, and violating intellectual property (ownership of information) protections were legal and ethical issues discussed in relation to what topic discussed during this module?
Data mining
Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control?
Defense in depth
Requiring students to usea combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control?
Defense in depth
In the management of the Eller College of Management's website, which of the following is considered as the highest priority in the website transformation process?
Defined audience
When the DNC was targeting voters using their data-driven approach, which of these voting groups were the most appropriate to target? (This question is from the online lecture)
Democratic and swing voters who sometimes vote
As discussed in the VAN (Voter Activation Network) case study, if you were supporting a Democratic candidate, which group of voters could be most efficiently reached using only a get-out-the-vote (GOTV) activity?
Democratic voters who sometimes vote
In the decision support process, formulating a module to be evaluated and setting criteria for making a choice would occur during what phase of the decision making process?
Design Phase
During which phase of the website transformation process would the project team for developing perform content analysis, layout the website using wireframes, and define a consistent visual design?
Developing Site Structure
What term is used to describe an individual who was born after the widespread adoption of digital technology and have grown up using technology like the Internet, computers and mobile devices?
Digital Native
A business intelligence tool that uses abstractions such as color and graphical images like instrument gauges to allow executives to grasp business situations quickly is known as a
Digital dashboard
A business intelligence tool that uses abstractions such as color and graphical images like instrument gauges to allow executives to grasp business situations quickly is known as a:
Digital dashboard
Converting all MIS 111 students from clickers to response cards without an initial test period is an example of what type of conversion?
Direct conversion
What is the named used to describe daily spending decisions like eating at a restaurant, buying clothes, drinking Starbucks, or playing a round of golf?
Discretionary
When major airlines (American, Delta, United, etc.) bypass travel agents and directly market tickets to customers from the airline's corporate website, this is an example of using what type of business sales strategy?
Disintermediation
What type of innovations are intended to be incompatible with existing standards and value chain, and must develop markets de novo (latin for "from the beginning")?
Disruptive Innovation
Which of the following was NOT described as one of the four innovation zones?
Disruptive Technology Zone
n the Video Case on Decision Matrices, what is the goal of decision matrices?
Improve the process by which we make decisions
In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does ".edu" define?
Domain
What is the name of the Regents Professor and founding chair of the MIS Department that pioneered the field of Group Decision Support Systems?
Dr. Jay Nanamaker
What type of chart allows you to plot data using two y-axes and a shared x-axis, visualizing a correlation or the lack thereof between the two y-axes data sets?
Dual Axis Chart
[ERPModules] Which of the following is typically not considered a "core" ERP module?
E-Business
[Systems] What term is used to describe interorganizational ERP systems that provide web-enabled links among a company's key business systems—such as inventory and production—and its customers, suppliers, distributors, and other relevant parties?
ERP-II
What was the name of the legislation adopted by the European Parliament that mandated that all countries within the EU must setup laws requiring websites to obtain informed consent before they can store or retrieve information on a visitor's computer or web-enabled device.
EU Cookie Law
IT has changed the manager's job in many ways. Which of the following is NOT the result of this change
Easier to make a decision
IT has changed the manager's job in many ways. Which of the following is NOT the result of this change?
Easier to make a decision
A Cost-Benefit Analysis is related mostly to what type of project management feasibility assessment?
Economic
Purchasing an entire box of screws, even though only a small number are need for the master production schedule is an example of making a purchasing decision based on what approach?
Economic Order Quantity
One of the impacts of Globalization is the the Economics of Distance (Transportation Costs) has been replaced by what?
Economies of Attention
According to our guest speaker who spoke on managing the development of Eller websites, what is the most important skill a business person working with technology should have?
Effective communication skills
In the SCOR model, competitive requirements such as reliability, responsiveness, and agility are all related to what dimension of a vendor's performance?
Effectiveness
The term used to define the degree to which a goal is achieved is
Effectiveness
For companies managing their supply chain business processes using CPFAR (Collaborative Planning, Forecasting and Replenishment), the process improvements over the traditional ordering process could be primarily considered as an improvement in which of the following?
Efficiency
What the name of the undergraduate certificate offered through the McGuire Center for Entrepreneurship that provides Eller undergraduate students with the opportunity to apply their knowledge and skill sets in real-world environments in order to make your community a better place to live and work as well as having a positive social impact?
Eller Social Innovation (ESI) Certificate
What category of location-based services would best describe products such as "location-based gaming", "social networking," and "find a friend"?
Entertainment
With respect to a database, what term is used to describe an abstract representation of all of the information included in a data structure about a particular type of entity?
Entity Class
Besides sensors, radios, and chips, what is the value in the Internet of Things?
Establishment of services on top of the connectivity
The pattern of financial fraud undertaken by David Myers, MCI?s Controller, is a good example of what type of ethical situation?
Ethical Drift
Originally discussed by Dr. Gilliland, David Myers' (former controller of MCI/Worldcom) statement "I still don't know that one point when I started to cross the line...", is an example of how small, incremental repeated compounding of unethical decisions can result in what
Ethical drift
Originally discussed by Dr. Gilliland, David Myers' (former controller of MCI/Worldcom) statement "I still don't know that one point when I started to cross the line...", is an example of how small, incremental repeated compounding of unethical decisions can result in what?
Ethical drift
Often presented visually on an executive dashboard, what type of report focuses attention on business processes whose performance falls outside the range of their defined KPI metrics?
Exception
What is the process of identifying metrics that are outside of acceptable tolerance levels?
Exceptiuon Reporting
When Dr. Sudha Ram used CatCard data (digital traces) as part of her research to analyze students' routines and relationships to predict student retention. What knowledge management term would you use to classify the CatCard transactional data?
Explicit data
_______________ is knowledge that has been codified or documented.
Explicit knowledge
Which of the following types of security risks would be technique used to compromise a system?
Exploit
From a user's perspective, perceived affordances would include actual perceptible design affordances and what other category of perceptual affordances?
False or fake design affordances
Which of the following types of wire media has the highest physical security?
Fiber-optic cable
What term was coined by Eli Pariser to describe a personalized search in which a website algorithm predicts what information a user would like to see based on user location and past searches on the website?
Filter bubble
What term describes the ability of a person to effectively evaluate and manage one's finances in order to make prudent decisions toward reaching life's goals?
Financial Literacy
What network security control prevents information from moving between two networks?
Firewall
Which of the following security controls would be used to limit access to systems to specific ports or network systems?
Firewalls
Planned, recurring expenses that occur on a routine schedule, such rent or car payments that must be paid every month, are examples of what?
Fixed expenses
Planned, recurring expenses that occur on a routine schedule, such rent or car payments that mustbe paid every month, are examples of what?
Fixed expenses
Which of Thomas Freidman's "flattners" related to technologies related to how content can be digitized and therefore shaped, manipulated, and transmitted; how processes can be done at high speed with total ease; and how mobile can be done anywhere and anytime by anyone; and can be done by anyone?
"The Steriods"
Excel uses what character to indicate a row or column reference is absolute addressing?
$ (US Dollar Sign)
What phrase is used to describe the current and developing environment in which disruptive technologies and trends such as the Internet of Things (IoT), robotics, virtual reality (VR) and artificial intelligence (AI) are changing the way we live and work?
Fourth Industrial Revolution
Which of the project management documents includes all three of the triple constraints that are in the Scope Triangle?
Gantt Chart
Which of the project management documents includes all three of the triple constraints?
Gantt Chart
Satellites used for data communications that appear to be stationary from a fixed location on earth are placed in what type of orbit?
Geosynchronous orbit
What term is used to describe the process of adding metadata to digital photos to identify the exact geographical location the photo was taken?
Geotagging
Related to the concepts of globalization, what computer "law" states that the bandwidth (speed) of data networks will double approximately every 24 months?
Gilder's Law
The University of Arizona is nationally recognized for sustainability in its academics, research, operations, and administration by the Assocation for the Advancement of Sustainability in Higher Education. What Sustainability Tracking, Assessment & Rating SystemTM (STARS) rating was the University of Arizona awarded in 2017?
Gold
What term did Thomas Friedman's use to describe the impact of globalization where individual countries must sacrifice some degree of economic sovereignty to global institutions (such as capital markets and multinational corporations)?
Golden Straightjacket
What tool is commonly used to track how, when and from what location users are using website?
Google Analytics
In the Online Democracy model, the "Voter Activation Network" uses voter registration rolls to categorize voters as always/sometimes/never voting by using information obtained from:
Government records
Allowing individuals to file tax returns, renew driver's licenses, and obtain various permits online is an example of what type of eGovernment?
Government-to-citizen (G2C)
Pioneered at the University of Arizona, what decision support technology as developed to address problems such as a lack of focus, fear of speaking, hidden agendas and misunderstandings then collaborating with others?
Group Decision Support Systems
What technology was developed to address problems such as a lack of focus, fear of speaking, hidden agendas and misunderstandings then collaborating with others?
Group Decision Support Systems
In recognizing ethical situations, which of the following is related to a chemical reaction that occurs in your body, specifically your intestinal trac
Gut check
In recognizing ethical situations, which of the following is related to a chemical reaction that occurs in your body, specifically your intestinal track?
Gut check
When adding your icon to your ABP-3B website, what section should you add the link directive to your icon file?
HEAD
What is the collective name for a set of open source programs and procedures, such as MapReduce and Yarn, that commonly provide the "backbone" of their big data operations?
Hadoop
What is the name of the University of Arizona's primary career management tool that offers UA students and alumni access to jobs, internships, and a range of other services?
Handshake
What is NOT an advantage of digital transmission?
Harder to encrypt
Which of the following terms is used to measures the frequency of analog signals?
Hertz
In the "Don Norman: Thoughtful Design" Video Case, what did he say was the most important part / thing to take into account when creating a good and thoughtful design
How the user thinks it should work
What Regents Professor on the MIS Faculty at the University of Arizona developed the COPLINK system for managing knowledge used in law enforcement?
Hsinchun Chen
EPEAT Preformance Categories (e.g., Material section, Energy Conservation, and Packaging Waste) are examples of that order effect of environmental sustainability?
1st Order - Creation, Use and Disposal
Using telepresence and online/distance learning are examples of using technology to produce what order sustainability effect?
2nd Order - Applications Alternatives
As a possible password, how many variables would the password MIS111Exam (just the underlined string of characters) have when assessing its security strength?
3
According to the video on the Power of Entrepreneurship, approximately how many people live on less than $10.00 per day?
4 Billion
Due to the curvature of the earth, microwave towers generally cannot be spaced more than about how many kilometers apart?
48
Assume you are 22 years old when you graduate from the University of Arizona and have a credit card with a $2,000 credit balance with an 18% annual rate. If you only make minimum payments of 2% of the balance or just $10 (whichever is greater) each month, what birthday will you likely be be celebrating when the the credit card is paid off?
52
Approximately what percentage of applications for jobs are rejected by potential employers before the interview due to public information posted online by the applicant (e.g. social networking, blogs, media sites, etc. - that is, your online reputation)?
60% or more
Approximately what percentage of applications for jobs are rejected by potential employersbefore the interviewdue to public information posted online by the applicant (e.g. social networking, blogs, media sites, etc. -that is, your online reputation)?
60% or more
When deployed, the Irridium satellite telephone network was based on a constellation of 66 satellites. However, how many operational satellites were originally proposed for the original constellation? (Hint the name Irridum was selected due to this number.)
77
What does the "%20" represent in an HTML src attribute of a IMG tag?
A Space Character
"Fishbone" process analysis diagram is also known as
A cause-and-effect diagram
A feature of an object that limits possible (often incorrect) uses of a device is known as:
A constraint
feature of an object that limits possible (often incorrect) uses of a device is known as
A constraint
In June of 2018, Exactis, a marketing and data aggregation firm, disclosed that the personal details of over 340,000,000 individuals and businesses had been compromised.What security failure caused this massive security breach?
A database was able to be accessed on a server open to the internet
in June of 2018, Exactis, a marketing and data aggregation firm, disclosed that the personal details of over 340,000,000 individuals and businesses had been compromised. What security failure caused this massive security breach?
A database was able to be accessed on a server open to the internet
What is P3P?
A language for machine-readable privacy policies
What is a privacy/security seal?
A logo demonstrating that a website follows specified privacy protection standards
In a relational database, what term refers to the collection of items that are all related to a single unique value, where the single value often serves as the primary key?
A record
In the assigned reading, Don Norman makes the case for viewing conceptual models as what?
A story in context
What term is used to describe the marketing analysis where two versions of a web page are compared to see which one gives a better conversion rate for similar visitors at the same time?
A-B (or Split) Testing
Which of the following is a support activity in Porter's value chain model?
Human resource management
If your sales system shows a customer's name as "Johnny Smith", but your logistics system for shipping shows the same customer as "John A. Smith", what type of database problem does this represent?
Inconsistency
According to the mythical man-month what is the reason adding people to a project will not speedup your project?
Increased complexity of interpersonal communications
What type of inventory demand is based on the forecasted need for finished products?
Independent demand
In the McGinn model of design, the least common category of design elements would be related to what factor in the McGinn model?
Individual
in the McGinn model of design, the least common category of design elements would be related to what factor in the McGinn model?
Individual
When analyzing the performance of students in MIS 111 on Exam 1, which of the following would not be appropriate as a useful "dimension" in an OLAP data cube?
Individual email addresses
In Thomas Friedman's discussion of globalization, he described the process of globalization as being realized through actions that were first defined by your country, then later defined by multi-national companies, and finally, in the most recent age of globalization is defined by:
Individuals
What dimension of Porter's Forces focuses on the decision that a buyer makes when choosing among direct, existing competitors when all of the competitors offer the same identical name-brand product (e.g., an iPhone 6)?
Industry Rivalry
Building on its initial success of the Voter Activation Network, the Democratic National Committee moved beyond simply classing voters by whether they are likely to cast a vote and their party affiliation to also include what additional aspect of Web2.0?
Influencing voters by having supporters use their social media relationships
[Linkages] When viewing the linkages among trading partners, which of the following is common for both upstream and downstream supply chains?
Information
___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information.
Information extortion
What term best describes when consumers are able to use their smartphones to obtain information about a company's competitor's product pricing, features, customer reviews and availability while shopping in their company's brink-and mortar store?
Information transparency
In the History of the Cell Phone video case, how did the use of cellular phones change the way in which calls were made?
Instead of calling a place, calls to cellular telephones were associated with a person
in the four layer model of the IOT architecture developed by the UofA's Cloud and Autonomic Computer Center, environmental sustainability would be most closely related to what layer?
Integrated application layer
As originally discussed by Dr. Gilliland, the classic values conflict with "Who Am I'" represents what type of ethical dilemma
Integrity vs. loyalty
In the decision process, problem identification and classification occur during which phase?
Intelligence
Similiar to the expansion of telecommunications in the 1800's with the telegraph, what transportation infrastructure was discussed in class that guided the decision the placement of the long-haul fiber-optic cable infrastructure?
Inter-continental Railroads Network
Operating unregulated WiFi networks, clickers, Bluetooth headsets, cordless telephones, and microwave ovens using the same 2.4GHz ISM frequency range in close proximity to one another might result in what problem?
Interference
Which of the following security controls would be used to identify and stop a known user?s access based on a unusual pattern of behavior?
Intrusion Detection Systems
Which of the following is FALSE of social computing?
It allows social information to remain anonymous.
In addition to possessing contextual and relevant information, what other characteristic aspect does knowledge possess?
It is actionable
in addition to possessing contextual and relevant information, what other characteristic aspect does knowledge possess?
It is actionable
What is NOT a benefit of telemedicine?
It requires traveling so doctors can see their patients in person
How does the University of Arizona's program called NetID+ to improve password security?
It requires users to confirm their identify with two-factor authentication
What type of inventory management systems deliver the precise number of parts, called work-in-process inventory, to be assembled into a finished product at precisely the right time?
JIT
Business metrics that describe the performance of critical business activities are known as
Key performance indicators
Business metrics that describe the performance of critical business activities are known as:
Key performance indicators
What term is used to describe the percentage value of the number of times a keyword or key phrase appears on a webpage as compared to the total amount of words on the page?
Keyword density
The terms "contextual," "relevant," and "actionable" are commonly related to what term?
Knowledge
What term is used to describe the conversion of tacit knowledge to explicit knowledge, so that the knowledge can be used in the organization by the staff?
Knowledge Codification
COPLINK, developed at the University of Arizona in the MIS Department's Artificial Intelligence Lab, allows law enforcement officers to integrate database information to identify crime suspects based on limited information (e.g., a license plate number or nick name). What term is used to describe the type of information system that is commonly used to maintain collection of experiential, reflective and solutions-oriented information?
Knowledge management
COPLINK, developed at the University of Arizona in the MIS Department's Artificial Intelligence Lab, allows law enforcement officers to integrate database information to identify crime suspects based on limited information (e.g., a license plate number or nick name).Upon what information system technology is this system'sdesign based?
Knowledge management
The sequence of activities performed by users of GroupSystems' ThinkTank product directly parallel the steps in what other business process?
Knowledge management cycle
Making the Adobe Creative Cloud is now available to UofA students. What approach for software acquisition did the UoA used to allow students to have access to this software?
Lease (Right to Use Product)
______ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
Liability
______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or system
Liability
______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
Liability
The risk of a project can be measured on what two scales?
Likelihood and Impact
What type of customer intimacy zone innovation focuses on making structural modifications to established products in order to create a distinctive sub-category?
Line-Extension Innovation
Which of the following issues related to wireless communication would NOT be a problem for an RFID (Radio Frequency Identification) system?
Line-of-sight
In the Personal Branding video case, which of the following online platforms was idenfied as being primarily a business networking tool?
In general, what you think of as the quality of your network connection speed when you are using your PC, iPad, or Smartphone is most influenced by which of the following?
Local Tier-3 ISPs
Although Martha Stewart?s actions related to insider trading, she served prison time for what criminal acts?
Lying about her actions to the FBI
When describing the invention of the cell phone, who said "For the first time, you were calling a person, not a place..."?
Martin Cooper
Who said the following quote "You can't use up creativity. The more you use, the more you have."
Maya Angelou
What Center in the Eller College of Management has the mission to help students improve their potential and advance society by developing an entrepreneurial and innovative mindset
McGuire Center for Entrepreneurship
Related to the concepts of globalization, what computer "law" states that value of the internet is related to the number of connections (users)?
Metcalf's Law
An unobstructed, straight line-of-sight path between a transmitter and receiver is required by which of the following high-speed, commercial wireless network technologies?
Microwave
____________ means that users carry a device with them and can initiate a real-time contact with other systems from wherever they happen to be.
Mobility
1. NetID+ is the University of Arizona's two-step authentication solution provided by Duo that adds two-step authentication as an extra layer of security to your NetID-accessed accounts, including D2L. It was recently announced that NetID+ will be required for all campus logins during 2018.What is the date that usingNetID+ will be required for all freshman students in MIS 111?
Monday, October 8th
Related to the concepts of globalization, what computer "law" states that the density of transistors will double approximately every 18 months?
Moore's Law
The European Union's data protection laws are ___________ strict compared to the US laws.
More
What is the name for the exchange points for Internet traffic used by major ISPs?
NAP
Which of the following is the technology that enables most mobile wallet applications?
NFC
What is the name of the wireless technology that is designed to be embedded in mobile devices such as cell phones and credit cards allowing you to pay for items by waving your card within a few centimeters of a point-of-sale terminal?
Near-field Communication
What is the name of the device that of the physical device that interfaces computers with a local area network (LAN)?
Network Interface Card (NIC)
Market capitalization determined by multiplying the stock price by what
Number of common shares outstanding
Market capitalization is determined by multiplying the stock price by what?
Number of common shares outstanding
Explicit, or "leaky" knowledge, is based on information that is:
Objective and rational
in the video case for telemedicine, Dr. Ana Lopez, who is the Medical Director of the Arizona Telemedicine Program, described how advances pioneered at the University of Arizona in tele-medicine and tele-pathology have improved the standard of health care in what way?
Offering bundled, same-day assessment in the diagnosis of breast cancer
All of the items in one column a cross functional diagram are related to what?
One actor
What name is used to describe results found when a search engine algorithm analyzes all the pages across the web in an unbiased way and reports the pages considered to contain the most relevant information for your search terms?
Organic
What is NOT a factor contributing to the Bullwhip Effect?
Outsourcing
On the balance sheet, total assets minus total liabilities must equal what
Owner equity
On the balance sheet, total assets minus total liabilities must equal what?
Owner's Equity
Which type of website file contains software that's executed on the host before sending the results to the browser?
PHP
Although globalization has been underway for many centuries, digitization, networking, and connectiveness have dramatically increased what?
Pace of Change
In a packet-switched data communication network, which of the following is true:
Packets can be lost or become corrupted between the sender and receiver
What term does Google use to describe how important a website is based upon counting the number and quality of links to a page, using the underlying assumption is that more important websites are likely to receive more links from other websites?
Page rank
The success of a Group Decision Support System (GDSS) is based upon two key features: contributor anonymity (i.e., the identity of the person making the comment or suggestion is not known), and what other important feature?
Parallel Discussions
he success of a Group Decision Support System (GDSS) is based upon two key features:contributor anonymity (i.e., the identity of the person making the comment or suggestion is not known), and what other important feature?
Parallel Discussions
Which of the POUR principles focuses on the concept that web accessibility is based upon the assumption that people need to be able to input the information into their brain so that they can process it?
Perceivable
With respect to an individual, what term describes the process of managing one's earnings, savings, and debt to meet the actual and budgeted expenses?
Personal Finance
With respect to an individual, what term describes the processof managing one's earnings, savings, and debt to meet the actual and budgeted expenses?
Personal Finance
What is an affordance?
Physical property of an object that shows functionality
What type of chart would be show the values of individual components proportional to a whole, allowing you to easily know relative size of a component, such as might be done to analyze the allocation of expenditures in a budget?
Pie Chart
What Leadership in Energy and Environmental Design (LEED) certification was the building where our classroom is located, Environment and Natural Resources 2, awarded by the U.S. Green Building Council?
Platinum
What term is used to describe a physical interface between peripheral devices and the computer?
Port
What action did Stacy Snyder take that resulted in her losing her job?
Posting a photo of herself at a party on her personal social media account
In the assigned reading on accessibility, the authors note that while WCAG 1.0 focused on the techniques for accomplishing accessibility, WCAG 2.0 focused on what?
Principles of accessibilities
In the Video Case on Decision Matrices, what is the goal of weighting decision matrices?
Prioritize the most important quantitative decision criteria
______________ is the right to be left alone and to be free of unreasonable personal intrusions.
Privacy
Which of the following are similar actions in the DM, KCC, and GDSS cycles?
Problem Definition, Create, Brainstorm
What type of innovation focuses on the supply side, looking for opportunities to remove non-value-adding steps from the workflow?
Process Innovation
Assuming orders are currently being processed correctly, adding CPFAR inventory management practices would improve a company in all of the following ways except:
Process effectiveness
Which of the following business component are *not* included in an MRP-II planning cycle?
Product Margins
______________ is the process of forming a digital dossier.
Profiling
What is the term used to describe the process of reducing the number of dimensions of a multi-dimensional data cube (e.g., from three dimensions, perhaps season, location, and product, into two dimensions, such as season and location)?
Projection
An I^2 diagram helps identify opportunities that are "low hanging fruit". What does the term "low hanging fruit" mean in this context?
Projects that easy to do and also have a high value proposition
In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does "http://" define?
Protocol
The old accounting maxim of "promise low" and "deliver high" is related what costing and budget concept?
Prudence
Which of the following terms are related to production based on the mass customization initiated by a customer's order?
Pull model
What type of decision based on explicit knowledge and involves analysis using an algortihm and measured data?
Quantitative
According to the Video Case on Decision Matrices, what factors should be used when making a decision?
Quantitative and Qualitative Factors
Parking garage passes and access control on employee ID badges are examples of:
RFID
What technology has been used for such diverse applications as healthcare, tracking lost pets, and toll collecting on highways?
RFID
What IoT technology discussed in class could be used to identify shoppers and allow products to "introduce" (recommend) themselves to a shopper?
RFID Tags
Which of the following technologies would *not* require line-of-sight scanning?
RFID Tags
CODASYL, the Conference/Committee on Data Systems Languages, is remembered almost entirely for two activities: its work on the development of the COBOL language and its activities in standardizing database interfaces. We've learned about the pioneers of databases (Chen and Codd) today, who is credited for developing FLOW-MATIC, which evoled into the COBOL, the widely used business programming language?
Rear Admiral Grace Murray Hopper
Industry analytsts expect that 5th generation networks will be defined by three characterisitcs over 4th generation cellular networks. Which of the following would is not one of the expected changes?
Reduced signal attenuation
In a decision matrix, a "weighting" allows what additional information to be included in the analysis?
Relative importance
Tracking what products are delivered to users, and when, is a form of what?
Release Control
Internet-enabled globalization does the following
Removes geography as a barrier to relationships
Which of the following actions would be considered a biometric authentication?
Requiring a user to scan their fingerprint
What term was used to describe a website that can adapt to the type of device being used to access the website?
Responsive
Google Analytics tracks the browser used to access a website. What term was used to describe a website that manages content based on the browser or device accessing the content
Responsive Web Design
Who was the founding director of the Arizona Telemedicine Program?
Ronald S. Weinstein, M.D.
What topic from Data Mining is closely related to decision trees?
Rule Induction
What is used to determine how long an investment will take to double, given a fixed annual rate of interest, allowing investors to get a rough estimate of how many years it will take for the initial investment to duplicate itself.
Rule of 72
What is used to determinehow long an investment will take to double, given a fixed annual rate of interest, allowing investors to get a rough estimate of how many years it will take for the initial investment to duplicate itself.
Rule of 72
What type of business systems have the capability to place automatic requests to buy products from vendors in real time?
SCM (Supply Chain Management)
What is the name of the agile framework for managing the work of development teams who break their work into actions that can be completed within timeboxed iterations, called sprints (30 days or less)?
SCRUM
Paying Google to display marketing advertisements when a user searches for a specific Adword is most commonly associated with which of the following concepts?
SEM
Keyword selection and density, image alt tags, and links to content are mostly commonly associated with which of the following concepts?
SEO
In the Thoughtful Designvideo case, Don Norman explained cultural perceptions in design through the use of what common, everyday item?
Salt and pepper shakers
What is the name of the social engineering attack that frightens computer users into visiting malware-infested websites by appearing to be legitimate warnings from antivirus software companies that your computer's files have been infected with the intent of tricking a user into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection?
Scareware
What is the purpose of a PERT chart?
Schedule and organize tasks
In project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resources and what other dimension of the planning process?
Scope
in project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resources and what other dimension of the planning process?
Scope
What term is used to describe the very common tendancy for projects to accumulate new functionality to fulfil the requirements of project stakeholders?
Scope Creep
As discussed in class, what company was founded in the Globalization 2.0 era based on the business model of selling discontinued product lines directly to consumers by using a new transportation infrastructure to reach a geographically distributed customer base?
Sears, Roebuck & Co.
Although web users should have an unlimited amount of time to complete tasks on the web, this design goal must be balanced against what other issue?
Security and risk
Bandwidth is the transmission capacity of a network, stated in bits per second. Which of the following "laws" we've discussed determines the maximum bandwidth (signalling rate) of a given type of communication media (e.g., copper cable, fiber optic, etc.)?
Shannon's Law
Which of the following causes of the bullwhip effect is related to a trading partner intentionally sharing inaccurate information with a company's future inventory requirements?
Shortage Gaming
Which of the following factors related to the bullwhip effect was due to deception between two trading partners?
Shortage gaming
What is the name used to describe when a person visits a brick-and-mortar store only to check physical characteristics of a product but intends to purchase the product online?
Showrooming
Which of the following is generally NOT commonly used as a biometric identification?
Signature
In the Jack Welch Video Case in the SCM Lecture, What approach was he discussing as key to providing customer value?
Six Sigma
Dr. Patton discussed the Hacking Google Glasses video case in class and talked about what it could be a precursor to something else getting hacked in the future. What did he say might be the next thing hacked using the same technique?
Smart / Autonomous Cars
What is an example of something in the Integrated Application layer of the 4 Layer Model?
Smart transport
What normative ethical theory expects a corporation to create more value to society that it consumes?
Social Contract Theory
Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what?
Social Engineering
In the video case for Nestle, data-driven decisions were primarily based on visualizations of information from what source?
Social Media Platforms
In the NASA project management video case, what did the speaker indicate was the greatest risk he faced in managing projects for NASA?
Social and political risk
___________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords
Social engineering
What type of electronic commerce helps shoppers connect with one another based on tastes, location, age, gender, and other selected attributes allowing them to share information using voting, comments, discussions, and reviews focused on shopping?
Social shopping
Information systems professionals understand business needs and analyze processes, methods and data to create customer-oriented solutions. The value proposition for MIS was described more briefly by Dr. Jay Nunamaker, Regents Professor and founding chair of the MIS Department, as a discipline focused on doing what for business?
Solving real problems
Your username (UANetID) is your claim of identify to a computer system. When the computer system verifies your identify by requiring you to enter a password is an example of what type of authentication
Something a user knows
What term is used to describe paid-for product ratings and reviews?
Sponsored reviews
Donut Charts are difficult to read, Microsoft recommends what as an alternative?
Stacked Column or Bar Charts
What normative theory of ethics focuses on the belief that manager's actions should be guided by the understanding that they are entrusted with a responsibility to manage and protect the assets of the company for the benefit of all of those who the actions of the firm affect?
Stakeholder
As confirmed by our in-class poll, what is the most likely action an ownerwill take with their old computer or cellular telephone after purchasing a new device?
Store it at home
What type of problem has an optimal solution can be reached through single set of steps based on an algorithm?
Structured
The University of Arizona Green Fund is an example of what type of sustainability program?
Student engagement
When classifying items on an I^2 diagram, we depend on individuals with domain knowledge and consultants about the items. When discussing knowlege management, what name did we use to describe an individual with domain knowledge?
Subject-matter Expert
What term describes individuals with tactic knowledge about a particular domain?
Subject-matter Experts
Tacit or "sticky" knowledge, is based on information that is
Subjective and cognitive
As part of their Smart Campus research, what MIS researcher is using CatCard data (digital traces) to analytize students' routines and relationships to predict student retention, or their likelihood of returning to campus after their freshman year?
Sudha Ram
Using the Internet of Things to increase the efficiency of a company's operations by allowing it to track, in real time, the movement of raw materials and parts through the manufacturing process to finished products delivered to the customer is related to what business function?
Supply chain management
When analyzing a set of click-stream data, what term is used describe the percentage of rows containing an item relative to the total number of rows?
Support
As discussed in the VAN (Voter Activiation Network) Relationship-Based Political Organizing video case study, the VAN able to idenify the relationships of possible supporters using data from what source?
Supporter's Facebook contacts
In the VAN (Voter Activiation Network) Relationship-Based Political Organizing video case study, the VAN was able to idenify the relationships of possible supporters using data from what source?
Supporter's Facebook contacts
What term is used to describe the one column for an actor in a cross -functional diagram?
Swimlane
In the Software Development Lifecycle Process (SDLC), in what SDLC stage is it the most costly to make changes to the system requirements
Systems Operation and Maintenance
Originally spun out of Stanford University as a research project, what big data tool started out by offering visualization techniques for exploring and analyzing relational databases and data cubes and has expanded to include Big Data research?
Tableau
What is the name of the Business Intelligence tool that is used for interactive analytics and data modeling?
Tableau
Subjective knowledge that is based an individual's experiences is known as what?
Tacit knowledge
Creating a business process that can be franchised is an example of what type of knowledge management conversion?
Tacit to Explicit
Determining whether your personal computer has appropriate hardware to take an online exam proctored by Examity is what type of assessment?
Technical feasibility
How does telemedicine improve the delivery of medical care in rural communities?
Telemedicine reduces the need for patients to travel to physician's offices
What term is used to describe how telemedicine uses wireless transmission and receipt of data gathered from remote sensors to allow doctors can monitor patients and control medical equipment from a distance?
Telemetry
Cisco uses the term "the power of in-person" to describe the ability of what technology to improve access to subject matter experts and to open doors to small business people?
Telepresence
What collaboration tool was discussed in class that enhances the participants' contextual awareness by sharing non-verbal information during meetings?
Telepresence
Which of the following technologies we've discussed was described as a more environmentally friendly "best practice for communication" that could greatly benefit small businesses?
Telepresence
In order to get Excel to display the exact closing date for each month, you need to format the X-axis as:
Text axis
When displaying a webpage, such as http://www.u.arizona.edu/~wilbur, what is the name of the directory the web browser will check in the "wilbur" account for the "index.html" website?
The "public_html" directory
Porters five forces focuses on what part of competition?
The Business Environment
Which of the following does a Fishbone Diagram typically not inform you about a problem?
The cost of correcting a problem with a process
In the video case about Transmission Control Protocol (TCP), Vint Cerf described TCP using an analogy of the sending postcard through the US postal system. Which of the following was not an issue discussed in the case study?
The cost of sending the packets making up a message
From Don Norman's perspective, what fatal flaw does the BMW iDrive (which he descibed as a well thought out, very logical, and sensible device) have with respect its human interface?
The iDrive destroyed spatiality
Applications such as "find a friend" (FourSquare), driving directions (Smartrek), roadside assistance (OnStar), and fleet management (UPS and FedEx) are all examples of services that have been enhanced by knowing what?
The location of the requester
In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what common problem did his analogy using the postal service to email a page from a book have with sending TCP packets?
The message might get lost and not delivered
Thomas Friedman was quoted as saying, "We're in the middle of 3 accelerations; the market, mother nature, and Moore's law. Moore's law says the power of microchips will double every 24 months, mother nature is climate change, biodiversity loss and population, and the market is digital globalization." What is Moore's Law?
The number of transistors in a dense integrated circuit doubles about every two years
Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project?
The project milestones and the order they are scheduled to be completed
A Bill-of-Materials describes the components that make up an item, the quantity used, and what other information about a finished good?
The relationships of raw materials and subassemblies
Assume you need to put a sign that says "PUSH" on a door handle to explain the correct way to operate the door. The "PUSH" sign helps a user understand what aspect of usability?
The sign explains a false affordance
Assume you need to put a sign that says "PUSH" on a door handle to explain the correct way to operate the door.The "PUSH" sign helps a user understand what aspect of usability?
The sign explains a false affordance
As I move farther away from campus, I notice that my UAWiFi connection gets progressively weaker. What factor will always cause this to occur?
The signal strength is lost due to attenuation
Which of the following is a DISADVANTAGE of purchasing prewritten software?
The software is controlled by another company.
The big advantage of bubble charts over scatter charts is?
They add another dimension
What common function do "HTTP", "TCP" and "IP" share?
They all define internet-based protocols
A Stacked Area chart is good for showing relative contributions of different series to a total over time, but they have one big limitation, which is?
They can't show negative values
Pie charts have several limitations, including all of the following except?
They have limited color and don't draw the eye and attention
Treemap Charts largest advantage over bar or column charts is?
They show individual values relative to the sum of the series as well as other values
_________ is any danger to which a system may be exposed.
Threat
Before paying an invoice in the procurement process, the accounting team checks that the purchase order, the goods receipt document (bill-of-lading), and the vendor's invoice all match. What is the term that is used to describe this auditing process?
Three-way Match
What is considered to be the high-capacity data transmission core of the Internet structure?
Tier 1 ISP
What British Scientist invented the World Wide Web in 1989 while working at CERN (European Organization for Nuclear Research) in 1989?
Tim Berners-Lee
In a vertical cross-functional business process diagram, the order of items in one column (from top to bottom) shows what relationship among these items?
Time
In a vertical cross-functional diagram, items are ordered in one coumn relates to what?
Time
Hierarchical Diagrams are commonly used for all of the following except?
Time series data
Which of these is NOT enumerated as a Motivation to Create Accessible Web Content?
To improve the reliability of technical functionality (technology centered motivations
Training for the professional "Certified Public Accountant" certification generally focuses on which of the following?
Tracking and reporting the financial transactions of a business, and reporting financial results to external stakeholders
Which of the information layers in the Internet of Things model focuses on the communication networks that connect the sensors that actually collect the data?
Transmission Layer
The __________________ test proposes a scenario in which a man and a computer both pretend to be women or men, and a human interviewer has to identify which is the real human.
Turing
What is the name of the criterion of intelligence where depends on the ability of a computer program to impersonate a human in a real-time written conversation with a human judge, sufficiently well that the judge is unable to distinguish reliably—on the basis of the conversational content alone—between the program and a real human?
Turing Test
Select the answer below that orders the media correctly from the lowest to highest bandwith (data rates).
Twisted pair, Coaxial Cable, Fiber-optic Cable
What term describes being able to access information and communication in almost any location?
Ubiquity
A company's "ticker" or stock symbol serves what role on a stock trading exchange
Uniquely identifies a traded stock
A company's "ticker" or stock symbol serves what role on a stock trading exchange?
Uniquely identifies a traded stock
Long term weather predictions are generally considered what type of problem?
Unstructured
When applying for advanced standing in the Eller College of Management, the process of selecting your major would be best described as having what characteristics of a decision?
Unstructured and Strategic
Universal or accessible design should be viewed as a subset of what larger design issue?
Usability
If the search column for a VLOOKUP contains a duplicate value, which value will be returned?
VLOOKUP will return a value based on the the first match
What inventory strategy allows a company's supplier to monitor inventory levels and manage the replenishment process for the supplier's products?
VMI
What technology do companies use to make the links between connection between two corporate intranets more secure?
VPN
In the case study presented in class, Nestle's Digital Acceleration Team training program focuses on developing skills in all of the following business issues, except:
Validating
Current information systems have evolved to focus on what role with respect to their services?
Value creation
The characteristics of big data (data science) are described as being related to volume (of the information), velocity (speed at which information is collected), and what other characteristic?
Variety (integrating data from multiples sources)
When you check your credit score for incorrect information, you're responding to which of the "4 V's" discussed for "big data" in the financial reporting business sector?
Veracity
Businesses like to use Virtual Private Networks for every reason except?
Virtual networks are faster than ordinary internet connections
Similar to trends in computing hardware, what is the trend for wireless network hardware?
Virtualization and merging with the cloud
According to the articles what technologies enable businesses and their employees to get in front of clients and customers but do it in a cost-savings manner?
VoIP and web conferencing
Which of the following types of security risks would ben identified weakness in which necessary controls are not present or effective?
Vulnerability
The Internet is a
WAN
Select the answer the correctly orders the types of computer networks in terms of area span of coverage from largest to smallest?
WAN, MAN, LAN, PAN
What type of chart would be typically be used to show how the an initial value is affected by intermediate values -- either positive or negative -- and resulted in the composition of a final value?
Waterfall Charts
In our discussion of the Eller websites, issues such as user interface consistency, design standards, and branding are all components contributing to what larger issue?
Website Value Proposition
Which of the POUR principles of accessibility focuses on the need to convert non-textual information into another format, such as from audio to text?
Which of the POUR principles of accessibility focuses on the need to convert non-textual information into another format, such as from audio to text?
Which of the following is *NOT* a behavioral issue for meetings?
Wrong people
Of the items used that identify you uniquely at the University of Arizona, which one can be used as a primary key (unique identifier) outside the University?
Your UA email address
For ABP-1, your "ticker symbol" identifies what?
Your assigned Company
Signals used to send messages can be _______ or digital
analog
IT allows the workplace to expand to 24 hours a day at _______________, which is a benefit for ___________
any location; employers and employee
T allows the workplace to expand to 24 hours a day at _______________, which is a benefit for ___________.
any location; employers and employees
Customers _____________________ because of Web 2.0.
are more empowered
LEED refers to the efficiency of?
buildings
IT __________ be used to create a competitive advantage ___________.
can; when it is used effectively
A firewall is a _______ control
communication
Telepresence systems seamlessly integrate _____ and _____.
contextual awareness; content management
WalMart has a(n) ___________ strategy.
cost leadership
Which of the following is an informational role?
disseminator
The difference between =vlookup() and =hlookup() is what?
each record in a vlookup is in a row, and in hlookup is in a column
Weak passwords are a(n) ___________ threat.
employee
The goal of CAPTCHA is to ___________.
ensure you are not a botnet software
WebMD is a(n) _________ that allows doctors to _________
expert; diagnose disease
WebMD is a(n) _________ that allows doctors to ___________.
expert; diagnose diseases
What type of guided media uses light for signaling?
fiber optics
Robots are useful ___________.
for handling monotonous tasks (e.g. factory work)
Google's main business reason for installing fiber in select US cities is to _______.
generate more web traffic, which generates more ad revenue for them
The web ____________ buyer power.
has a mixed impact on
Data ___________ means all applications are able to access the same data, which is ___________ by databases
independence; maximized
What is the correct filename for your ABP-3A website?
index.html
What is the correct filename to use for your ABP-3B website?
index.html
ERP address information silos by _____________.
integrating functional areas
The three security challenges of wireless communication are confidentiality, accessibility, and _____.
integrity
Which of the following is the correct order of the traditional System Development Life Cycle (SDLC)?
investigation, analysis, design, programming and testing, implementation, operation and maintenance
The _________ prohibits an organization from collecting any personal information unless the customer specifically authorizes it.
opt-in model of informed consent
IT changes managers' job by?
providing near real-time information so managers can make quicker decisions
IT changes managers' job by _________
providing near real-time information so managers can make quicker decisions.
What is the name of the directory where the files for your websites for ABP-3A and ABP- 3B will be stored on the U.Arizona.Edu web server?
public_html
Which of the following is a problem with BYOD?
security
The _____________ approach states that an ethical action is the one that provides the most good or does the least harm.
utilitarian
Telepresence is a version of ____________.
videoconferencing
When you use Google Drive to work on a document with a classmate, this is considered _________.
virtual collaboration