MIS 3302 Ch 1 - 14 Final Review

Ace your homework & exams now with Quizwiz!

encompasses all the activities a company performs in selling and buying products and services using computers and communication technologies.

E-business

is a major factor in the widespread use of global information systems.

E-business

All of the following are among the advantages of green computing except:

Eliminates server virtualization needs

Which of the following approaches for developing information systems increases the risk of leaking confidential information to competitors?

Outsourcing

During the implementation phase of the systems development life cycle (SDLC), in ____ conversion, the old and new systems run simultaneously for a short time to ensure the new system works correctly.

Parallel

Which type of access control is used to protect systems from unauthorized access?

Passwords

are community-based marketplaces that enable individuals to communicate directly with each other and conduct e-commerce operations

Peer-to-peer e-commerce platforms

During the ____ phase of the systems development life cycle (SDLC) model, an information systems designer must define the problem an organization faces, taking care not to define symptoms rather than the underlying problem.

Planning

Which geographic object of a geographic information system (GIS) is most likely used to show a particular zip code or a large tourist attraction?

Points

In the context of electronic exchange of information, which is used by companies to improve the efficiency and effectiveness of the supply chain process?

The Internet and established Web protocols

Identify the e-commerce business model that brings sellers and buyers together on the Web and collects commissions on transactions between these parties.

The brokerage model

Context-aware computing

Widespread applications and deployment of devices that know users, their devices, and their locations and serve as intelligent assistants to businesses and individuals is known as:

In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.

confidentiality

In general, _____ last the author's lifetime plus 70 years and do not need to be renewed.

copyrights

A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.

corporate network

When a Web page changes, _____ update their indexes and databases automatically to reflect the change.

crawler-based directories

In the context of intellectual property, ____ is registering, selling, or using a domain name to profit from someone else's trademark.

cybersquatting

Computer networks, database systems, point-of-sale (POS) systems, etc., are a few examples of information technologies that support information systems in__________.

decision making

In a management information system, structuring the data component to define what type of data is collected and in what form is usually easy if an organization has _____

defined its strategic goals, objectives, and critical factors

The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary.

definition

Computer-aided systems engineering (CASE) tools are typically used during the _____ phase of the systems development life cycle (SDLC).

design

Asynchronous software enables team members to work together at _____

different times

Most executive information systems include a _____, which integrates information from multiple sources and presents it in a unified, understandable format, often as charts and graphs

digital dashboard

Which feature of an executive information system (EIS) enables users to examine and analyze information?

digital dashboard

Service and support are more important in e-commerce than in traditional commerce because e-commerce companies _____.

do not have a physical location to help maintain current customers

Jack is a gamer, and every time he plays at a gaming center, he pays five dollars using a card that he recharges electronically every week. It is evident that Jack uses _____ as the mode of payment.

e-cash

In some states, certain computer manufacturers collect a fee called a(n) ____, in order to dispose of a computer after its useful life.

e-waste

A(n) _____ is an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously.

parallel port

In situations where an information system needs to be designed from scratch, the SDLC model is _____.

particularly suitable

Decisions related to _____ are considered structured decisions at the operational management level of an organization

payroll

In a blockchain environment, the distributed network is protected through ___that makes the network accessible only to the authorized users.

permission or private

A _____ agent can be used to perform specific tasks for a user, such as remembering information for filling out Web forms.

personal

In _____ conversion of the implementation phase of the systems development life cycle (SDLC), as each module of a new system is converted, the corresponding part of an old system is retired.

phased-in-phased-out

During the design phase of the systems development life cycle (SDLC), the _____ design is created for a specific platform, such as choosing Dell servers running Ubuntu Linux and Java for the programming language.

physical

In the backward chaining technique, used by the inference engine component of an expert system, the expert system starts with the goal, which is the _____ part, and backtracks to find the right solution

then

The main difference among an electronic payment system and cryptocurrency is not having a(n) ____ between the sender and receiver

third party such as a bank or a financial institution

Identify one advantage of multichannel retailing

Improves customer satisfaction and customer loyalty

Which is true of assembly language?

Uses a series of shortcodes, or mnemonics, to represent data or instructions.

All of the following are a type of biometric authentication except:

VPN recognition

In the context of machine learning, an artificial neural network (ANN) is most likely used for

oil and gas exploration

A(n) _____ is an input device used to grade multiple-choice and true/false tests.

optical mark recognition system

uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment

Virtual reality

Which is a software component of a management information system (MIS)?

Commercial programs

A ____ is a tool used in systems analysis and design model that shows a process at a more general level and is helpful for showing top management and the task force how a process works.

Context diagram

computing refers to a computing environment that is always present, can feel our surroundings, and-based on who we are, where we are, and whom we are with-offer recommendations

Contextual

Disadvantages of collaboration software include _____

-lack of human touch and other nonverbal cues -unnecessary meetings -security problems

Which is a generic top-level domain (TLD) name used for backbone, regional, and commercial networks?

.net

An American Standard Code for Information Interchange (ASCII) file defines up to _____ characters.

128

WiMAX usually has a range of about _______ for fixed stations.

30 miles

Under the General Data Protection Regulation (GDPR), violators could be fined up to ___ percent of the company's global annual revenue depending on the nature of the violation.

4

In India, nearly _____ of Internet users use their own local language online.

47

As of 2015, approximately _____ percent of Internet content was in English.

55

is one of the most popular password managers.

Dashlane

In the context of fuzzy logic, which defines membership in a black-or-white fashion?

A dynamic set

A ____ is a tool used in systems analysis and design model that helps break down a complex process into simpler, more manageable, and more understandable subprocesses.

Data flow diagram

Identify an advantage of a mouse over a trackball.

A mouse is more precise in positioning the pointer than a trackball.

The international DIY Association wants its users to be able to connect with an off-site infrastructure over the internet. Scalability and collaboration are more important to this organization than security and privacy. Which of the following cloud computing options would be most suitable for the International DIY Association?

A public cloud.

allows data to be stored in multiple places to improve a system's reliability.

A redundant array of independent disks

In a customer relationship management (CRM) system, which is effective in tracking and analyzing customers' buying patterns?

Data-mining tools

Computer networks, database systems, POS systems, RFID tags, etc., are examples of information technologies that support information systems in ___.

Decision making

In the context of business analytics, which method reviews past events, analyzes the data, and reports on what happened in a given period?

Descriptive analytics

are indexes of information, based on keywords embedded in documents, that allow search engines to find what Internet users are looking for.

Directories

In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment.

Disaster Recovery Plan (DRP)

In service organizations, one of the major links in the supply chain includes ____.

Distribution centers

The data _____component of a database management system (DBMS) is used to add, delete, modify, and retrieve records from a database.

AND operator

When using query by example (QBE) in the data manipulation component of a database management system (DBMS), the _____ is used when all the conditions in the QBE form must be met.

AND operator

Which is an example of an e-marketplace

An e-distributor

Which component of an expert system uses forward and backward chaining to manipulate a series of rules

An inference engine

In a natural-language processing (NLP) system, the ______ activity involves using the computer to read large amounts of text and understanding the information well enough to summarize important points and store information so that the system can respond to inquiries about the content

Analysis

Which of the following is not considered an advantage of Power BI?

Analytics may be misinterpreted and offer support for a decision that may not be ethical

______are used when data is fuzzy and uncertainty is involved

Artificial neural networks

help determine the price of goods and services when there is no set price in the marketplace

Auctions

How are desktop and mobile operating systems similar?

Both feature a graphical user interface (GUI).

is high when customers have many choices and low when they have few choices.

Buyer power

is an executive position created for overseeing knowledge management within an organization

Chief knowledge officer

In the context of Web marketing, the ___is computed by dividing the number of clicks an ad gets by the total impressions bought.

Click through rate

which is used for online storage and backup involves multiple virtual servers that are usually hosted by third parties.

Cloud storage

are conducted media that can be used for both data and voice transmissions.

Coaxial cables

is a search for specific information or patterns using input from multiple business partners and data sources

Collaborative filtering

A computer with a 32-bit processor can perform calculations with larger numbers better than a 64-bit system.

False

An object code must be translated into source code for a computer to read and execute it.

False

Data markets focus on business functions for the marketing department of an organization

False

MIS software includes only software developed in-house.

False

Networking is one of the five forces named by Michael Porter for analyzing an organization.

False

The arithmetic logic unit and the control unit are part of the BasicFalse Input/Output System.

False

Under the GDPR, users must be notified regarding any types of data breaches within 12 hours of learning of the breach.

False

Very-large-scale integration (VLSI) circuits were introduced in fifth-generation computers.

False

When solving problems, the users of an information system must avoid using informal information—such as rumors, unconfirmed reports, and stories.

False

According to Peter G. Keen, a former MIT professor, which is a benefit of a decision support system (DSS)?

Fast response to unexpected situations

Teletech, an international textile company, uses a database to store data on the number of products, suppliers, and sales personnel. The process component of the information system conducts analysis on the data to provide information about sales. Which can be used by Teletech to generate predictions for its next sales period?

Forecasting models

Explicit knowledge is ____ knowledge.

Formal

All of the following are true about General Data Protection Regulation (GDPR) except:

GDPR does not cover EU employees

mimic the process of natural evolution to generate solutions to optimization and search problems

Genetic algorithms

Which biometric security measure compares the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify users' identities?

Hand geometry

In the context of expert systems, ____ consists of common sense, rules of thumb, educated guesses, and instinctive judgments.

Heuistics

In a ___model, the relationships among records form a treelike structure

Hierarchical Model

Identify a true statement about the General Data Protection Regulation (GDPR).

If any organization's Web site collects any of the regulated data from EU users, it is liable to comply to GDPR.

All of the following are a part of cloud computing services except

Information as a Service (IaaS)

During the ____ phase of the decision-making process, a decision maker examines the organization's environment for conditions that need decision

Intelligence

Which programs carry out repetitive tasks and can be programmed to make decisions based on specified conditions

Intelligent agents

Which software is capable of reasoning and following rule-based processes?

Intelligent agents

James gets a job at a multinational corporation. On his first day at work, he finds out that the numerical code assigned by the Internet Corporation for Assigned Names and Numbers (ICANN) to his computer system is 115.248.178.233. This numerical code is referred to as a(n) _____.

Internet Protocol address

When information is transferred from one network to another, domain names are converted to _____ by the Domain Name System (DNS) protocol.

Internet Protocol addresses

Unstructured decisions are often used in _____.

Introducing a new product

All of the following are true about 5G, or fifth generation of cellular networks except:

It does not mean that a hospital can serve more patients

All of the following are true in agile approach for systems development except:

It does not provide collaboration among team members

All of the following are true about data-driven decision making except

It does not require analytical tools to interpret gathered data

All of the following are true about SQL except:

It does not support relational database design

In a management support system, why is it important to keep lines of communication open?

It ensures support staff feel included in the decision-making process.

Which statement is true of a global information system (GIS)?

It facilitates communication between headquarters and subsidiaries in other countries

In the context of using information technologies for a competitive advantage, which statement is true of a top-line strategy?

It focuses on generating new revenue by offering new products and services.

In the context of a GIS, which is true of high coordination?

It gives flexibility in responding to competitors in different markets.

All of the following is true about an artificial neural network, or ANN except

It is an optimization tool

All of the following is true about CRM, or Customer Relationship Management except

It is replacing the human resource department

Which statement best describes spyware?

It is software that secretly gathers information about users while they browse the Web.

Which statement is true of database marketing?

It makes an organization responsive to the needs of its customers.

In the context of personalization technology, which of the following is a drawback of collaborative filtering (CF)?

It needs a large sample of users and content to work well.

Which statement is true of Web-based electronic data interchange (Open EDI)

It reduces the cost of transmitting documents

External users of an organization's information system are ____.

Its customers, contractors, and suppliers

In the context of information technology in workplaces, which allows adding new tasks to employees' responsibilities?

Job upgrading

The name of Facebook's cryptocurrency is _____.

Libra

Which is considered a key decision in supply chain management (SCM) related to manufacturing

Location

Which of the following is considered a basic task in the context of computer operations?

Logical operations

Marketing strategies in a customer relationship management (CRM) system focus on ____.

Long-term relationships with customers

consists of a series of 0s and 1s representing data or instructions.

Machine language

In a ____ structure, production, sales, and marketing are decentralized and financial management remains the parent company's responsibility.

Multinational

Rather than containing a set of if-then rules, more sophisticated expert systems use ____, which are designed to mimic the way a human brain learns.

Neural networks

All of the following are true about data science and big data except:

No digital data is stored in traditional databases

Which component of a data model describes methods and calculations that can be performed on data, such as updating and querying data?

Operations

Which of the following are two popular data visualization platforms?

Power BI and Tableau

Which layer of the Open Systems Interconnection (OSI) model formats message packets?

Presentation

Which is included in the goal of the Health Insurance Portability and Accountability Act (HIPAA)?

Protecting patients' computer records

What information can be censored if the content is deemed offensive to a political, religious, or cultural group?

Public

In the context of Internet-enabled supply chain management (SCM), which SCM activity involves bargaining and renegotiating prices and term agreements?

Purchasing/procurement

What can serve as search engines, site reminders, or personal surfing assistants?

Shopping and information agents

Identify a true statement about collaboration software

Shyness is not as much of an issue when using it as in face-to-face meetings

help a person connect with friends, family, and colleagues online and meet people with similar interests and hobbies.

Social networking sites

In the context of application software providers (ASPs), which of the following is also known as on-demand software

Software as a service

of a global information system (GIS) involves broad and long-term goals

Strategic support

Defined its strategic goals, objectives, and critical factors.

Structuring the data component, in a management information system, to define what type of data is collected and in what form is usually easy if the organization has _______.

In the context of computer operations, which of the following is considered an arithmetic operation?

Subtraction

All of the following are true about telepresence except:

Telepresence does not require retrofitting classrooms and equipment

is a series of well-defined phases performed in sequence that serves as a framework for developing an information system or project.

The systems development life cycle

is one of the forces of the Five Forces Model created by Michael Porter

The threat of new entrants

a biometric security measure, translates words into digital patterns, which are recorded and examined for tone and pitch.

Voice recognition

is a technique that combines the strongest features of Wired Equivalent Privacy (WEP) and Extensible Authentication Protocol (EAP) techniques and helps improve the security of wireless networks.

Wi-Fi Protected Access

Which statement is true of application-filtering firewalls?

They are more expensive than packet-filtering firewalls

Which is true of fourth-generation languages (4GLs)?

They are the easiest computer languages to use.

In the context of information privacy, which is true of cookies?

They provide information about users' location.

In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six time slots.

Time Division Multiple Access

_____, a more recent cryptographic protocol, ensures data security and integrity over public networks, such as the Internet.

Transport Layer Security

A knowledge management system must include a decision support tool.

True

Foursquare is a social networking site

True

In a cloud-based enterprise system, cloud providers are responsible for providing hardware, software, and other needed utility programs.

True

Sales constitute one component in a typical enterprise resource planning system.

True

Which statement is true of extreme programming (XP)?

Two programmers perform activities different from the other at different workstations.

In the context of communication media, _____ media provide a physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable, and fiber optics.

conducted

Which type of software enables team members to store, share, and work together on different files?

collaboration software

In the context of the components of a typical expert system, _____ is similar to a database, but in addition to storing facts and figures it keeps track of rules and explanations associated with facts

a knowledge base

In fuzzy logic, a degree of membership indicates _________.

a value between 0 and 1

An omnichannel strategy enables a business to sell its products and services through:

a.Web sites b.Brick-and-mortar stores c.Mobile apps d.All of the above

Horizontal scaling of a client/server architecture means _____.

adding more workstations

Which approach to set up a distributed database management system (DDBMS) combines the fragmentation approach and the replication approach?

allocation

Spoofing happens when:

an illegitimate program poses as a legitimate one.

Codes written for one type of computer using _____ do not work on another type of computer.

assembly language

A _____ is a type of an intentional computer and network threat.

backdoor

Syndication feeds are one way of announcing the availability of a _____.

backlink

Bandwidth is often expressed as _____.

bits per second

Intelligent agents are also known as _____.

bots

Information literacy is understanding the role of information in gathering and using _____.

business intelligence

A(n) _____ is a secure network that uses the Internet and Web technologies to connect intranets of business partners so that communication between organizations is possible.

extranet

A redundant array of independent disks (RAID) is considered a ________ security system?

fault-tolerant

A cloud-based enterprise system offers more _____ than traditional computing methods

flexibility and scale

While designing a management support system, it's important to remember that executives' main concern is _____.

getting the information they need in the simplest way

In the context of green computing, properly recycling an unwanted digital device is considered _______.

green disposal

In a global information system (GIS), high coordination:

helps maintain control of market needs around the world

In a(n) _____, nodes with the same parents are called twins or siblings.

hierarchical model

A _____ works well for companies that are geographically dispersed.

hierarchical topology

In the third-party exchange marketplace model, media buying is an example of a _____.

horizontal market

The Web organizes information by using _____, meaning documents that include embedded references to audio, text, images, video, or other documents.

hypermedia

The embedded references in hypermedia documents are called _____.

hypertext

During the _____ phase of the decision-making process, ideas are converted into actions

implementation

In the context of Web marketing, the term ad _____ refers to one user viewing one ad.

impression

In the context of computer crimes and attacks, the difference between phishing and spear phishing is that:

in spear phishing, the attack is targeted toward a specific person or a group.

In the context of the components of an expert system, a(n) _____ is similar to the model base component of a decision support system

inference engine

Which is an artificial intelligence application that can be used for Web marketing?

intelligent agent

E-commerce activities that take place within an organization's data communication network are part of _____ e-commerce.

intrabusiness

Identify one advantage of multichannel retailing

involves using more than one channel to sell and deliver merchandise and services to consumers

In the context of information privacy, which of the following is true of spam?

it is sent in bulk using automated mailing software.

During the maintenance phase of the software development life cycle, the maintenance team takes steps to _____.

keep the system up and running

Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal details to the banker who is responsible for sanctioning loans. The banker uses Clement's personal information to sell him insurance policies. In this scenario, the banker's action is considered _____.

legal, but unethical

A(n) _____ is a common output device for soft copy.

liquid crystal display

Compared to campus-based learning, MOOCs offer __________.

lower costs and greater flexibility

During the _____ of the systems development life cycle (SDLC), an information system is operating, enhancements and modifications to the system have been developed and tested, and hardware and software components have been added or replaced.

maintenance

During the _____ phase of the systems development life cycle (SDLC), a team assesses how a system is working and takes steps to keep the system up and running.

maintenance

The four Ms of resources in information systems are _____.

manpower, machinery, materials, and money

A customer relationship management (CRM) system uses customer contact information for targeted _____.

marketing

In the context of the knowledge base component of an expert system, _____ knowledge, enables an expert system to learn from experience and examine and extract relevant facts to determine the path to a solution

meta-

In data warehouses, _____ is information about data-its content, quality, condition, origin, and other characteristics.

metadata

Which system performs tasks similar to a database management system (DBMS)?

model base management

In the _____ sales channel, a customer uses only one channel of a given business to purchase an item, including in-store, on a cell phone, or on the company's Web site.

multichannel

A _____ is an organization with assets and operations in at least one country other than its home country.

multinational corporation

Researchers are using nanotechnology to develop _____ for a "clot-busting" drug

nanocapsules

In a(n)___, each record can have multiple parent and child records.

network model

In the context of grid computing, each participant in a grid is referred to as a(n) _____.

node

A routing table lists _____.

nodes on a network

The purpose of an information system's _____ component is to generate the most useful type of information for making decisions.

process

In the context of a manufacturing firm's supply chain management (SCM) system, the _____ flow area manages the movement of goods all the way from suppliers to customers, including customer service and support

product

The goal of the Health Insurance Portability and Accountability Act (HIPAA) includes:

protecting medical providers' notes and records.

Social networking sites can reduce organizations' costs by _____.

providing an inexpensive medium for targeting a large customer base

Communication media that use an antenna for transmitting data through air or water are called _____.

radiated media

Transmission of data across satellites is an example of data communication through _____.

radiated media

In a(n) _____ access file structure, records can be accessed in any order, regardless of their physical locations in storage media.

random

Convergence is possible now because of a combination of technological innovation, changes in market structure, and ________.

regulatory reform

Nanomaterials, if added to golf balls, can increase the _____ of the golf balls

responsiveness

One instance of regulatory practices hindering the success of a global information system occurs when a country _____.

restricts the type of hardware and software that can be imported or used

In the context of the features of a decision support system (DSS), ______ analysis enables you to apply different variables in decision making.

sensitivity analysis

A collaboration system supports decision makers by providing access to_____

shared environment and information

The ___ pillar of hypersociality realizes that the benefits of leveraging social media are much greater than its negatives.

social messiness versus process hierarchy

With the _____ model, users do not need to be concerned with new software versions and compatibility problems because the application service providers (ASPs) offer the most recent version of the software

software as a service

In the context of information privacy, junk e-mail is also known as _____.

spam

A geographic information system (GIS) with analytical capabilities evaluates the impact of decisions by interpreting ______data.

spatial

In the field of pharmaceutical research, quantum computing can be used to ______.

speed up the time it takes to bring a new drug to market

One of the issues with a global information system is that too much _____ can decrease an organization's flexibility in responding to local preferences-even time differences.

standardization

Using the _____ model, e-commerce sites sell digital products and services.

subscription

Quantum units of information deploy the properties of entanglement and ____ to offer exponentially greater computing power.

superposition

In a typical intranet configuration, the ___________ must define each user's level of access.

system administrator

Identify one difference between task management software and project management software.

task management software is relatively easy to learn and is accessible nearly on all platforms whereas project management software is all about collaboration and coordination in order to finish a project.

In the decision support system (DSS) environment, the _____ focuses on how a DSS is implemented and usually addresses questions about data storage, user access, response time, and security measures

technical designer

The variety dimension of big data refers to the combination of _____.

the diversity of types of forms of data

The data component of an information system is

the input to the information system

Blockchain technology can be used in the mortgage approval process to give borrowers _____.

the option of storing their financial information in a secure network

During the implementation phase of the systems development life cycle (SDLC), _____.

the solution is transferred from paper to action, and a team configures the system and procures components for it

In the context of big data, velocity is _________.

the speed with which the data has to be gathered and processed

During the maintenance phase of the software development life cycle, the team may decide to start the SDLC cycle over if:

the system is not working correctly

Control in a global information system requires _____.

the use of defined behaviors for different processes

In an organization with a(n) ____ structure, the parent company and all subsidiaries work together in designing policies, procedures, and logistics for delivering products and services.

transnational

In the context of the types of organizations that do business across national borders, the architecture of the global information system (GIS) in a(n) _____ structure requires a higher level of standardization and uniformity for global efficiency, and yet it must maintain local responsiveness

transnational

When a user accidentally enters an incorrect Web site address, he or she may be directed to an alternative Web site. This is an example of _____.

typosquatting

In _____, a geographic information system (GIS) is used to track changes in ridership on mass-transit systems

urban planning

Unlike data in databases, data in data warehouses is:

used for analytical purposes.

In the context of networking, on-demand computing is also known as ____ computing

utility

In the context of a global information system (GIS), _____ networks offer electronic data interchange standards, encryption, secure e-mail, data synchronization, and other services to conduct international business.

value-added

In the context of executive information systems (EISs), _______ allows managers to flag data that is unusual or out of normal boundaries.

variance reporting

In the third-party exchange marketplace model, the sale of medical products is an example of a ____.

vertical market

In the third-party exchange marketplace model, the sale of medical products is an example of a _______.

vertical market

In the context of decision makers using information technology, which decision-making analyses is available in spreadsheet programs, such as Microsoft Excel

what-if analysis

In the context of the types of decision-making analyses, what type of analysis is commonly used in transaction-processing systems and management information systems?

what-is

support m-commerce applications.

wireless wide area networks

In the uniform resource locator (URL) http://www.csub.edu/~hbidgoli/books.html, _____ represents the name of the directory in which files are stored.

www.csub.edu


Related study sets

Project Management Chapter 1-5 TEST REVIEW

View Set

Econ 380 exam 1 - labor economics ch 1-5

View Set

Fund Exam 3 - Module 15 & 18 urinary catherization

View Set

Occurs when energy is added or removed

View Set