MIS final exam study guide

Ace your homework & exams now with Quizwiz!

[GoldmanSachs] What term was coined by Goldman Sachs in 2001 to describe the fastest growing market economies?

A. TICK *B. BRIC C. EAGLES D. TIMP

The __________________ test proposes a scenario in which a man and a computer both pretend to be women or men, and a human interviewer has to identify which is the real human. A. Terminator B. Turing C. Google D. SkyNet

B. Turing

Which of the following types of security risks would ben identified weakness in which necessary controls are not present or effective? A. Control B. Vulnerability C. Exploit D. Attack E. Footprint

B. Vulnerability

In the video case for Nestle, data-driven decisions were primarily based on visualizations of information from what source? A. Cost and Production Schedules B. Financial Performance Reports C. SocialMedia Platforms D. Investment Analyst Forecast

C. SocialMedia Platforms

Due to the curvature of the earth, microwave towers generally cannot be spaced more than about how many kilometers apart? A. 18 B. 30 C. 77 D. 48

D. 48

The _________ prohibits an organization from collecting any personal information unless the customer specifically authorizes it. A. information privacy policy B. opt-out model of informed consent C. digital dossier policy D. opt-in model of informed consent

D. opt-in model of informed consent

As a possible password, how many variables would the password MIS111Exam (just the underlined string of characters) have when assessing its security strength? A. 2 B. 5 C. 1 D. 4 E. 3

E. 3

Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? A. Open Source Hacking B. Defense in Depth C. Industrial Sabotage D. Advanced Persistent Threats E. Social Engineering

E. Social Engineering

Approximately what percentage of applications for jobs are rejected by potential employers before the interview due to public information posted online by the applicant (e.g. social networking, blogs, media sites, etc. - that is, your online reputation)? A. 60% or more B. About 10% C. Less than 5% D. Less than 50% E. About 30%

*A. 60% or more

What would be the correct function to find the price of a Caffe Mocha, size Grande? A. =VLOOKUP(A14,$A$2:$D$10,3,FALSE) B. =VLOOKUP(A14,$B$2:$D$10,2,FALSE) C. =VLOOKUP($A$2:$D$10,A14,3,FALSE) D. =VLOOKUP(A14,$A$2:$D$10,"GRANDE",FALSE)

*A. =VLOOKUP(A14,$A$2:$D$10,3,FALSE)

In June of 2018, Exactis, a marketing and data aggregation firm, disclosed that the personal details of over 340,000,000 individuals and businesses had been compromised. What security failure caused this massive security breach? A. A database was able to be accessed on a server open to the internet B. An disgruntled employee of Exactis copied the file after being fired C. Exactis sold a surplus computer and left information on the hard disk D. Unencrypted network traffic was monitored on a wireless network

*A. A database was able to be accessed on a server open to the internet

What is the importance of the triple constraint? A. Any changes to one constraint will likely affect the project outcome B. Security is the most important constraint C. You must funnel all resources into only one of the constraints D. Time, resources, and scope don't matter

*A. Any changes to one constraint will likely affect the project outcome

What approach to knowledge management would best describe the Eller FlexLabs? A. Community of Practice B. Knowledge conversion C. Best Practices D. Knowledge FAQ

*A. Community of Practice

What is the name of software that allows publishing, editing, and modifying content from a central interface, providing procedures to manage workflow in a collaborative environment? A. Content Management Systems B. Self-publishing Platforms C. Customer Relationship Management Systems D. Social Networking Systems

*A. Content Management Systems

What is the name for the path containing the minimum set of tasks that you must traverse in order to reach completion of your project on time? A. Critical Path B. Scope Triangle C. Mythical Man Month D. Project Plan

*A. Critical Path

Which of the following security measures would be considered a "last line defense" for Information Security? A. Cryptography B. Intrusion Detection C. Access Control D. Firewall E. Security SDLC

*A. Cryptography

Which of the following application software packages was acquired by the University as a Software-as-a-Service (SaaS) technology? A. D2L / Brightspace B. Firefox Browser C. Microsoft Office Professional (Not Office 365) D. Eller eSMS E. Sophos Anti-Virus

*A. D2L / Brightspace

In the Ruby Tuesday's sales analysis case, analyzing historical data about the sales dimensions of products categories, sales regions, and months of the year would be best using which of the following approaches we've previously discussed? A. Data Cubes B. Visualization C. Communitites of Practice D. Knowledge Management

*A. Data Cubes

What type of data structure allows us to organize multi-dimensional information from a data warehouse so that it can be viewed using different data abstractions (or projections)? A. Data cube B. Executive dashboard C. Click stream D. Decision support system E. Neural network

*A. Data cube

Converting all MIS 111 students from clickers to response cards without an initial test period is an example of what type of conversion? A. Direct conversion B. Pilot conversion C. Phased conversion D. Primary conversion E. Parallel conversion

*A. Direct conversion

What is the name of the Regents Professor and founding chair of the MIS Department that pioneered the field of Group Decision Support Systems? A. Dr. Jay Nanamaker B. Dr. Sudha Ram C. Dr. Hsinchun Chen D. Dr. Sue Brown

*A. Dr. Jay Nanamaker

A Cost-Benefit Analysis is related mostly to what type of project management feasibility assessment? A. Economic B. Technical C. Operational D. Political E. Ethical

*A. Economic

The pattern of financial fraud undertaken by David Myers, MCI?s Controller, is a good example of what type of ethical situation? A. Ethical Drift B. Gut Check C. Transparency Test D. Lost Opportunity E. Whistleblowing

*A. Ethical Drift

Which of the following security controls would be used to limit access to systems to specific ports or network systems? A. Firewalls B. Data Masking C. Two-factor authentication D. Intrusion Detection Systems E. Encryption

*A. Firewalls

Which of the following terms is used to measures the frequency of analog signals? A. Hertz B. Farad C. Ohm D. Angstroms

*A. Hertz

Similiar to the expansion of telecommunications in the 1800's with the telegraph, what transportation infrastructure was discussed in class that guided the decision the placement of the long-haul fiber-optic cable infrastructure? A. Inter-continental Railroads Network B. Federal Interstate Highway System C. Inter-regional Transmission Electrical Power Lines D. Major Inland Rivers and Waterways

*A. Inter-continental Railroads Network

The sequence of activities performed by users of GroupSystems' ThinkTank product directly parallel the steps in what other business process? A. Knowledge management cycle B. Operational CRM C. Just-in-time Inventory Management D. Transaction processing system E. Economic globalization

*A. Knowledge management cycle

______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. A. Liability B. Responsibility C. Due Process D. Accountability

*A. Liability

What name is used to describe results found when a search engine algorithm analyzes all the pages across the web in an unbiased way and reports the pages considered to contain the most relevant information for your search terms? A. Organic B. Sponsored C. Adword D. Promoted

*A. Organic

Which type of website file contains software that's executed on the host before sending the results to the browser? A. PHP B. HTML C. JavaScript D. JPG

*A. PHP

What type of innovation focuses on the supply side, looking for opportunities to remove non-value-adding steps from the workflow? A. Process Innovation B. Value Migration Innovation C. Organic Innovation D. Value-Engineering Innovation E. Enhancement Innovation

*A. Process Innovation

What type of decision based on explicit knowledge and involves analysis using an algortihm and measured data? A. Quantitative B. Collaborative C. Managerial D. Operational E. Qualitative

*A. Quantitative

What term was used to describe a website that can adapt to the type of device being used to access the website? A. Responsive B. Augmented C. Validated D. Optimized E. Transformed

*A. Responsive

Which of the following is a problem with BYOD? A. Security B. Productivity C. Cost D. Satisfaction

*A. Security

Which of the following causes of the bullwhip effect is related to a trading partner intentionally sharing inaccurate information with a company's future inventory requirements? A. Shortage Gaming B. Outsourcing C. Forecasting/Trend Analysis D. Batch Purchasing E. Price Promotions

*A. Shortage Gaming

Dr. Patton discussed the Hacking Google Glasses video case in class and talked about what it could be a precursor to something else getting hacked in the future. What did he say might be the next thing hacked using the same technique? A. Smart / Autonomous Cars B. IoT Toys and Devices C. Smart Phones D. Stop Light Control Systems

*A. Smart / Autonomous Cars

What type of problem has an optimal solution can be reached through single set of steps based on an algorithm? A. Structured B. Strategic C. Management D. Unstructured E. Collaborative

*A. Structured

[ChartingTool] What is the name of the Business Intelligence tool that is used for interactive analytics and data modeling? A. Tableau B. R C. Qualtrics D. Python

*A. Tableau

How does telemedicine improve the delivery of medical care in rural communities? A. Telemedicine reduces the need for patients to travel to physician's offices B. Telemedicine allows patients to make a preliminary self-diagnosis online C. Telemedicine prevents physicians from making errors during surgery D. Telemedicine will allow a physician to meet with multiple patients at the same time E. "Telemedicine Avatars" can perform routine procedures without the physician

*A. Telemedicine reduces the need for patients to travel to physician's offices

Cisco uses the term "the power of in-person" to describe the ability of what technology to improve access to subject matter experts and to open doors to small business people? A. Telepresence B. Crowdsourcing C. Data Mining D. Knowledge Management

*A. Telepresence

Applications such as "find a friend" (FourSquare), driving directions (Smartrek), roadside assistance (OnStar), and fleet management (UPS and FedEx) are all examples of services that have been enhanced by knowing what? A. The location of the requester B. The age of the requester C. The time the request was made D. The identity of the requester E. The number of people making requests

*A. The location of the requester

A Bill-of-Materials describes the components that make up an item, the quantity used, and what other information about a finished good? A. The relationships of raw materials and subassemblies B. The value of the material C. The vendor who supplies the material D. The lot sizing used when purchasing raw materials

*A. The relationships of raw materials and subassemblies

What common function do "HTTP", "TCP" and "IP" share? A. They all define internet-based protocols B. They are abbreviations for physical media C. They are common computer viruses D. They all are data encryption methods E. They all are website domains

*A. They all define internet-based protocols

Treemap Charts largest advantage over bar or column charts is? A. They show individual values relative to the sum of the series as well as other values B. They allow time series data to be displayed C. There is no actual advantage D. They allow multiple series to be displayed

*A. They show individual values relative to the sum of the series as well as other values

What is considered to be the high-capacity data transmission core of the Internet structure? A. Tier 1 ISP B. Tier 3 ISP C. LAN D. NAP

*A. Tier 1 ISP

What British Scientist invented the World Wide Web in 1989 while working at CERN (European Organization for Nuclear Research) in 1989? A. Tim Berners-Lee B. Martin Cooper C. Harald Blatand D. Vint Cerf

*A. Tim Berners-Lee

Hierarchical Diagrams are commonly used for all of the following except? A. Time series data B. Organizational Charts C. Project Task Decomposition D. Bill of Materials

*A. Time series data

Which of these is NOT enumerated as a Motivation to Create Accessible Web Content? A. To improve the reliability of technical functionality (technology centered motivations) B. To improve the lives of people with disabilities (human-centered motivations) C. To capitalize on the a wider audience or consumer base (marketing or economic-centered motivations) D. To avoid lawsuits and/or bad press (public relations and punishment-centered motivations)

*A. To improve the reliability of technical functionality (technology centered motivations)

Select the answer below that orders the media correctly from the lowest to highest bandwith (data rates). A. Twisted pair, Coaxial Cable, Fiber-optic Cable B. Coaxial Cable, Twisted pair, Fiber-optic Cable C. Fiber-optic Cable, Coaxial Cable, Twisted pair D. Twisted pair, Fiber-optic Cable, Coaxial Cable

*A. Twisted pair, Coaxial Cable, Fiber-optic Cable

When applying for advanced standing in the Eller College of Management, the process of selecting your major would be best described as having what characteristics of a decision? A. Unstructured and Strategic B. Semi-structured and Operational C. Structured and Operational D. Structured and Management

*A. Unstructured and Strategic

If the search column for a VLOOKUP contains a duplicate value, which value will be returned? A. VLOOKUP will return a value based on the the first match B. VLOOKUP will return an error (#DUPLICATE), since the search column must be unique C. VLOOKUP will return both values D. VLOOKUP will return a value based on the the last match

*A. VLOOKUP will return a value based on the the first match

The characteristics of big data (data science) are described as being related to volume (of the information), velocity (speed at which information is collected), veracity (the accuracy of the information) and what other characteristic? A. Variety (integrating data from multiples sources) B. Vagueness (using data without a clear definition) C. Vertical (using data related only to one market) D. Valuation (using data that has significant economic value) E. Visual (using data that can be displayed graphically)

*A. Variety (integrating data from multiples sources)

The Internet is a ______________. A. WAN B. LAN C. MAN D. PAN

*A. WAN

What type of chart would be typically be used to show how the an initial value is affected by intermediate values -- either positive or negative -- and resulted in the composition of a final value? A. Waterfall Charts B. Surface Charts C. Sunburst Charts D. Histogram Charts

*A. Waterfall Charts

Of the items used that identify you uniquely at the University of Arizona, which one can be used as a primary key (unique identifier) outside the University? A. Your UA email address B. Your UA NetID C. Your UA StudentID D. Your UA CatCard Number

*A. Your UA email address

Signals used to send messages can be _______ or digital. A. analog B. rotary C. binary D. discrete

*A. analog

The goal of CAPTCHA is to ___________. A. ensure you are not a botnet software B. protect networks against hackers C. remove alien software from your computer D. hack into secure networks

*A. ensure you are not a botnet software

What is the correct filename for your ABP-3A website? A. index.html B. index.www C. Index.html D. INDEX.HTML

*A. index.html

What is the correct filename to use for your ABP-3B website? A. index.html B. abp3a.html C. website.html D. public.html E. home.html

*A. index.html

According to the video on the Power of Entrepreneurship, approximately how many people live on less than $10.00 per day? A. 3 Billion B. 4 Billion C. 6.9 Billion D. 1.2 Billion

*B. 4 Billion

A "Fishbone" process analysis diagram is also known as: A. A correlation graph B. A cause-and-effect diagram C. A numerical analysis diagram D. An organization chart E. A cross-functional flowchart

*B. A cause-and-effect

What term is used to describe the marketing analysis where two versions of a web page are compared to see which one gives a better conversion rate for similar visitors at the same time? A. PPC Marketing B. A-B (or Split) Testing C. SEO Testing D. SEM Testing

*B. A-B (or Split) Testing

According to MIT Sloan Management Review, what percentage of companies have placed sustainability permanently on their management agendas? A. About 25% *B. About 70% C. About 10% D. About 50%

*B. About 70%

What is the name of a highly popular crowdsourcing Internet marketplace enabling individuals and businesses (known as Requesters) to coordinate the use of human intelligence to perform tasks that computers are currently unable to do? A. Bing Collaborative Interpreter B. Amazon Mechanical Turk C. Azure Web Services D. Google Answers

*B. Amazon Mechanical Turk

When a company purchases a high-value software package, how is the ownership of the software package represented on the company?s balance sheet? A. As owner equity B. As an asset C. It would not be listed D. As retained earnings E. As a liability

*B. As an asset

Which of the following types of access controls would be the process of validating a claim of identity (e.g., Something you know, have, do, or are)? A. Identification B. Authentication C. Authorization D. Accountability E. Non-repudiation

*B. Authentication

What implementation approach mixes and matches core ERP modules as well as other extended ERP modules from different software providers to best fit their unique internal processes and value chains? A. Vanilla approach B. Best-of-breed approach C. Custom approach D. Software-as-a-service approach

*B. Best-of-breed approach

What term is used to describe the behavior where small changes in customer demand that result in large variations in raw material orders causing inefficiency in the supply chain? A. Reverse Auctions B. Bullwhip effect C. Single-Minute Exchange of Dies (SMED) D. Supply Chain Operations Reference (SCOR) Model E. Just-In-Time Orders

*B. Bullwhip effect

What type of data mining analysis identifies patterns in the data based on demographic characteristics (e.g., age, gender, income, ethnicity, etc.)? A. Association B. Classification C. Sequencing D. Clustering

*B. Classification

What MS Excel funtion could be used to implement IS Rule Induction? A. IF Statements B. Conditional Formatting C. Pivot Table Slicers D. Table Filters

*B. Conditional Formatting

In the decision support process, formulating a module to be evaluated and setting criteria for making a choice would occur during what phase of the decision making process? A. Intelligence Phase B. Design Phase C. Choice Phase D. Operational Phase E. Functional Phase

*B. Design Phase

What is the named used to describe daily spending decisions like eating at a restaurant, buying clothes, drinking Starbucks, or playing a round of golf? A. Intermittent B. Discretionary C. Variable D. Fixed

*B. Discretionary

In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does ".edu" define? A. Resource B. Domain C. Server D. Protocol E. Browser

*B. Domain

In the SCOR model, competitive requirements such as reliability, responsiveness, and agility are all related to what dimension of a vendor's performance? A. Productivity B. Effectiveness C. Modeling D. Mapping E. Efficiency

*B. Effectiveness

With respect to a database, what term is used to describe an abstract representation of all of the information included in a data structure about a particular type of entity? A. Entity Key B. Entity Class C. Entity Table D. Entity Attribute E. Entity Model

*B. Entity Class

Often presented visually on an executive dashboard, what type of report focuses attention on business processes whose performance falls outside the range of their defined KPI metrics? A. Ad hoc B. Exception C. Annual D. Drill-down E. Batch

*B. Exception

Which of the following types of wire media has the highest physical security? A. CAT-5 Twisted pair cable B. Fiber-optic cable C. Coaxial cable D. CAT-3 Twisted pair cable

*B. Fiber-optic cable

In the assigned reading for project management, what type of diagram was used to map the impact of a problem using the axes "Impact" and "Likelihood" that you also used in Applied Business Project 2? A. Radar Diagram B. I^2 Diagram C. Cross-functional Diagram D. Ishikawa Diagram

*B. I^2 Diagram

In the McGinn model of design, the least common category of design elements would be related to what factor in the McGinn model? A. Group B. Individual C. Culture D. Human Sensory E. Context

*B. Individual

Operating unregulated WiFi networks, clickers, Bluetooth headsets, cordless telephones, and microwave ovens using the same 2.4GHz ISM frequency range in close proximity to one another might result in what problem? A. Multi-path B. Interference C. Right-of-way D. Line-of-sight E. Attenuation

*B. Interference

The terms "contextual," "relevant," and "actionable" are commonly related to what term? A. Information B. Knowledge C. Relationship D. Repository E. Alignment

*B. Knowledge

What term is used to describe the conversion of tacit knowledge to explicit knowledge, so that the knowledge can be used in the organization by the staff? A. Knowledge Interpretation B. Knowledge Codification C. Knowledge Representation D. Knowledge Cycle

*B. Knowledge Codification

What is NOT a factor contributing to the Bullwhip Effect? A. Batch Purchasing B. Outsourcing C. Forecasting/Trend Analysis D. Shortage Gaming E. Price Promotions

*B. Outsourcing

What term does Google use to describe how important a website is based upon counting the number and quality of links to a page, using the underlying assumption is that more important websites are likely to receive more links from other websites? A. Website ROI B. Page rank C. Conversion rate D. Keyword density

*B. Page rank

With respect to an individual, what term describes the process of managing one's earnings, savings, and debt to meet the actual and budgeted expenses? A. Expense Management B. Personal Finance C. Personal Accounting D. Risk Management E. Financial Literacy

*B. Personal Finance

Which of the following terms are related to production based on the mass customization initiated by a customer's order? A. Forecast model B. Pull model C. Push model D. Make-to-stock model

*B. Pull model

In a decision matrix, a "weighting" allows what additional information to be included in the analysis? A. Order of analysis B. Relative importance C. Number of employees on the project team D. Cost of capital

*B. Relative importance

When classifying items on an I^2 diagram, we depend on individuals with domain knowledge and consultants about the items. When discussing knowlege management, what name did we use to describe an individual with domain knowledge? A. Franchisee B. Subject-matter Expert C. Community of Practice D. Expert System

*B. Subject-matter Expert

Using the Internet of Things to increase the efficiency of a company's operations by allowing it to track, in real time, the movement of raw materials and parts through the manufacturing process to finished products delivered to the customer is related to what business function? A. Cost accounting and financial management B. Supply chain management C. Social media marketing D. Lifecycle product sustainability

*B. Supply chain management

Originally spun out of Stanford University as a research project, what big data tool started out by offering visualization techniques for exploring and analyzing relational databases and data cubes and has expanded to include Big Data research? A. VMware B. Tableau C. Oracle D. PowerBI

*B. Tableau

As I move farther away from campus, I notice that my UAWiFi connection gets progressively weaker. What factor will always cause this to occur? A. The signal blocked by strong encryption B. The signal strength is lost due to attenuation C. The signal cannot be received due to interference D. The signal is blocked due to right-of-way restrictions

*B. The signal strength is lost due to attenuation

A Stacked Area chart is good for showing relative contributions of different series to a total over time, but they have one big limitation, which is? A. They tend to lack color and not draw the eye B. They can't show negative values C. They can only show four points in time D. They can only include 3 series E. One series can be hidden behind another series

*B. They can't show negative values

In the decision matrix example shown below, which of the answers would have the highest score for Project A? A. Affects other projects B. Time to complete C. Financial gain D. Project cost

*B. Time to complete

Businesses like to use Virtual Private Networks for every reason except? A. Data from web-browsers may not be encrypted B. Virtual networks are faster than ordinary internet connections C. Data from applications other than web browsers may not be encrypted D. They have no control over the path data takes between business sites E. Virtual networks are cheaper than leased lines

*B. Virtual networks are faster than ordinary internet connections

Which of the following is *NOT* a behavioral issue for meetings? A. Domination B. Wrong people C. Misunderstandings D. Hidden Agendas

*B. Wrong people

What type of guided media uses light for signaling? A. twisted pair B. fiber optics C. open wire D. coaxial cable

*B. fiber optics

ERP address information silos by _____________. A. simplifying system creation B. integrating functional areas C. correcting a lack of communication between TPSs D. reducing the amount of information presented

*B. integrating functional areas

Which of the following is the correct order of the traditional System Development Life Cycle (SDLC)? A. investigation, analysis, design, implementation, programming and testing, operation and maintenance B. investigation, analysis, design, programming and testing, implementation, operation and maintenance C. analysis, investigation, design, programming and testing, implementation, operation and maintenance D. analysis, investigation, design, implementation, programming and testing, operation and maintenance

*B. investigation, analysis, design, programming and testing, implementation, operation and maintenance

When you use Google Drive to work on a document with a classmate, this is considered _________. A. teleconferencing B. virtual collaboration C. crowdsourcing D. workflow

*B. virtual collaboration

What term is used to describe an online advertising service developed by Google, where advertisers pay to display advertising, product listings, and video content as a result of Google search. A. Hashtags B. Responsive C. Adwords D. Pagerank E. Organic

*C. Adwords

Disclosing personal information such as your race, religion, sex, disabilities, and age on social media undermines what type of protections otherwise provided to you as a citizen in the United States? A. Personal credit eligibility laws B. Voter eligibility laws C. Anti-discrimination laws D. Commercial driver's license eligbility laws E. Wage discrimination laws

*C. Anti-discrimination laws

Which of the following types of analysis would be used to produce the Clery report, which is a public annual security report (ASR) that includes statistics of campus crime for the preceding 3 calendar years identifying the crimes committed in physical (geographic) proximity to a college campus as an effort to improve campus safety? A. Sequencing B. Classification C. Cluster D. Forecasting

*C. Cluster

The "Porter's Forces" model deals with what aspect of globalized business? A. Design B. Relationships C. Competition D. Time E. Location

*C. Competition

When we discussed the design of network infrastructure, we noted that the design of connectors on computers we generally related to the speed of the communication interface, the function being supported (number of signals required), and what other issue related to human-computer interaction? A. Hidden affordances for security B. Operational and functional causality C. Constraints to improve reliability D. Cultural design standards

*C. Constraints to improve reliability

What term is used to describe an individual who was born after the widespread adoption of digital technology and have grown up using technology like the Internet, computers and mobile devices? A. Digital Immigrants B. Millennial C. Digital Native D. Online Generation

*C. Digital Native

[ERPModules] Which of the following is typically not considered a "core" ERP module? A. Financial B. Human Resources C. E-Business D. Operations

*C. E-Business

For companies managing their supply chain business processes using CPFAR (Collaborative Planning, Forecasting and Replenishment), the process improvements over the traditional ordering process could be primarily considered as an improvement in which of the following? A. Feasibility B. Effectiveness C. Efficiency D. Agility E. Quality

*C. Efficiency

What network security control prevents information from moving between two networks? A. Biometric Identification B. Packet Sniffer C. Firewall D. Post Scanner

*C. Firewall

Planned, recurring expenses that occur on a routine schedule, such rent or car payments that must be paid every month, are examples of what? A. Deductions B. Discretionary expenses C. Fixed expenses D. Cash flow E. Flexible expenses

*C. Fixed expenses

What phrase is used to describe the current and developing environment in which disruptive technologies and trends such as the Internet of Things (IoT), robotics, virtual reality (VR) and artificial intelligence (AI) are changing the way we live and work? A. Future Shock B. Post-Industrial Society C. Fourth Industrial Revolution D. Economic Globalization

*C. Fourth Industrial Revolution

What term did Thomas Friedman's use to describe the impact of globalization where individual countries must sacrifice some degree of economic sovereignty to global institutions (such as capital markets and multinational corporations)? A. Golden Arches Theory B. The World Is Flat C. Golden Straightjacket D. The Lexus and the Olive Tree

*C. Golden Straightjacket

Pioneered at the University of Arizona, what decision support technology as developed to address problems such as a lack of focus, fear of speaking, hidden agendas and misunderstandings then collaborating with others? A. Executive Dashboard B. Data Mining C. Group Decision Support Systems D. Communities of practice E. Crowdsourcing

*C. Group Decision Support Systems

What is NOT an advantage of digital transmission? A. Produces fewer errors B. Simpler to integrate voice, video, and data C. Harder to encrypt D. Permits higher maximum transmission rates

*C. Harder to encrypt

What type of inventory management systems deliver the precise number of parts, called work-in-process inventory, to be assembled into a finished product at precisely the right time? A. SCOR B. Poke-Yoke C. JIT D. Vertical

*C. JIT

What term is used to describe the percentage value of the number of times a keyword or key phrase appears on a webpage as compared to the total amount of words on the page? A. Page rank B. Conversion rate C. Keyword density D. Website ROI

*C. Keyword density

In general, what you think of as the quality of your network connection speed when you are using your PC, iPad, or Smartphone is most influenced by which of the following? A. Location of the content provider's servers B. Protocols used for Layer-1 transmission C. Local Tier-3 ISPs D. Regional Tier-2 ISPs E. Backbone Tier-1 ISPs

*C. Local Tier-3 ISPs

When describing the invention of the cell phone, who said "For the first time, you were calling a person, not a place..."? A. Eli Pariser B. Norman Abramson C. Martin Cooper D. Thomas Friedman

*C. Martin Cooper

Who said the following quote "You can't use up creativity. The more you use, the more you have." A. Albert Einstein B. Thomas Edison C. Maya Angelou D. Linus Pauling

*C. Maya Angelou

What Center in the Eller College of Management has the mission to help students improve their potential and advance society by developing an entrepreneurial and innovative mindset? A. Eller Center Executive Education B. Center for Mangement Innovations in Healthcare C. McGuire Center for Entrepreneurship D. Economic + Business Research Center

*C. McGuire Center for Entrepreneurship

An unobstructed, straight line-of-sight path between a transmitter and receiver is required by which of the following high-speed, commercial wireless network technologies? A. Broadcast Radio B. 802.11 Wi-Fi C. Microwave D. Bluetooth E. 3G Cellular

*C. Microwave

Related to the concepts of globalization, what computer "law" states that the density of transistors will double approximately every 18 months? A. Metcalf's Law B. Ohm's Law C. Moore's Law D. Kepler's Law E. Gilder's Law

*C. Moore's Law

What is the name of the wireless technology that is designed to be embedded in mobile devices such as cell phones and credit cards allowing you to pay for items by waving your card within a few centimeters of a point-of-sale terminal? A. Personal Area Networks B. Bluetooth C. Near-field Communication D. MiFi

*C. Near-field Communication

Explicit, or "leaky" knowledge, is based on information that is: A. Customized by each user B. Subjective and cognitive C. Objective and rational D. Dependent on an employee's experience E. Informally communicated with an organization

*C. Objective and rational

Which of the POUR principles focuses on the concept that web accessibility is based upon the assumption that people need to be able to input the information into their brain so that they can process it? A. Robust B. Operable C. Perceivable D. Understandable

*C. Perceivable

What Leadership in Energy and Environmental Design (LEED) certification was the building where our classroom is located, Environment and Natural Resources 2, awarded by the U.S. Green Building Council? A. Certified B. Silver C. Platinum D. Gold

*C. Platinum

What term is used to describe a physical interface between peripheral devices and the computer? A. App B. Signal C. Port D. Session

*C. Port

Which of the following are similar actions in the DM, KCC, and GDSS cycles? A. Modeling, Document, Disseminate B. Data Evaluation, Capture, Document C. Problem Definition, Create, Brainstorm D. Data Evaluation, Manage, Organize

*C. Problem Definition, Create, Brainstorm

The old accounting maxim of "promise low" and "deliver high" is related what costing and budget concept? A. Consistency B. Accruals C. Prudence D. Variance

*C. Prudence

What topic from Data Mining is closely related to decision trees? A. Case-based reasoning B. Neural networks C. Rule Induction D. Nearest Neighbor Technique

*C. Rule Induction

Keyword selection and density, image alt tags, and links to content are mostly commonly associated with which of the following concepts? A. PPC B. CPC C. SEO D. SEM E. ROI

*C. SEO

In project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resources and what other dimension of the planning process? A. Agility B. Feasibility C. Scope D. Value E. Alignment

*C. Scope

Which of the following factors related to the bullwhip effect was due to deception between two trading partners? A. Forecasting and Trend analysis B. Price promotion C. Shortage gaming D. Batch purchasing

*C. Shortage gaming

What is the name used to describe when a person visits a brick-and-mortar store only to check physical characteristics of a product but intends to purchase the product online? A. Disintermediating B. Hybrid shopping C. Showrooming D. Multiplexing

*C. Showrooming

Information systems professionals understand business needs and analyze processes, methods and data to create customer-oriented solutions. The value proposition for MIS was described more briefly by Dr. Jay Nunamaker, Regents Professor and founding chair of the MIS Department, as a discipline focused on doing what for business? A. Programming B. Academic research C. Solving real problems D. Marketing software E. Computer Design

*C. Solving real problems

In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what common problem did his analogy using the postal service to email a page from a book have with sending TCP packets? A. The message might be illegible B. The message might be in the wrong language C. The message might get lost and not delivered D. The message might get changed in route E. The message might not get sent

*C. The message might get lost and not delivered

Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project? A. The quality of the work performed during each major project milestone B. Whether project tasks have been organized in the most efficient order C. The project milestones and the order they are scheduled to be completed D. Whether the major project milestones are being completed on budget E. Individual work assignments for persons assigned to the project

*C. The project milestones and the order they are scheduled to be completed D. Whether the major project milestones are being completed on budget

In a vertical cross-functional business process diagram, the order of items in one column (from top to bottom) shows what relationship among these items? A. Importance B. Skill level C. Time D. Cost E. Frequency

*C. Time

Long term weather predictions are generally considered what type of problem? A. Physical B. Structured C. Unstructured D. Optimal

*C. Unstructured

What inventory strategy allows a company's supplier to monitor inventory levels and manage the replenishment process for the supplier's products? A. Bullwhip delivery B. Tier-1 Suppliers C. VMI D. Push Manufacturing

*C. VMI

What technology do companies use to make the links between connection between two corporate intranets more secure? A. SCOR B. VMI C. VPN D. CPFAR

*C. VPN

Current information systems have evolved to focus on what role with respect to their services? A. Strategic B. Productivity C. Value creation D. Efficiency E. Effectiveness

*C. Value creation

According to the articles what technologies enable businesses and their employees to get in front of clients and customers but do it in a cost-savings manner? A. Telemedicine B. email C. VoIP and web conferencing D. Telecommuting E. eFax

*C. VoIP and web conferencing

IT __________ be used to create a competitive advantage ___________. A. cannot; even when it is used effectively B. cannot; because everyone has access to technology C. can; when it is used effectively D. can; because everyone has access to technology

*C. can; when it is used effectively

Weak passwords are a(n) ___________ threat. A. software B. outside C. employee D. hardware

*C. employee

Since our firm's sales are cyclical, we adjust the commissions of our sales team sales each quarter. What HLOOKUP function would be used to determine the correct commission rate for March 15th, as shown below? A. =HLOOKUP(C5,C2:F3,3,TRUE) B. =HLOOKUP(C5,C2:F3,2,FALSE) C. =HLOOKUP("Rate",C2:F3,C5,TRUE) D. =HLOOKUP(C5,C2:F3,2,TRUE)

*D. =HLOOKUP(C5,C2:F3,2,TRUE)

In a relational database, what term refers to the collection of items that are all related to a single unique value, where the single value often serves as the primary key? A. A field B. A deposit C. A list D. A record E. A form

*D. A record

What type of tag attribute is used with an IMG (image) tag to improve accessibility? A. BODY B. HTML C. HEAD D. ALT

*D. ALT

What term is used to describe the most successful solutions or problem-solving methods for achieving a business objective? A. Agility B. Bottom line C. Decision support D. Best practices

*D. Best practices

What short-range wireless technology is commonly to connect smartphones with hands- free headsets for telephone calls and listening to music? A. WiMax B. Photon C. Spectrum D. Bluetooth E. Wavelength

*D. Bluetooth

The equity on a company's balance sheet is most closely related to which of the following? A. Gross margin B. Operating income C. Share price D. Book value E. Market value

*D. Book value

Porter?s Forces describes which of the following business issues? A. Profitability B. Security C. Stock Trading D. Competition E. Product Design

*D. Competition

When the DNC was targeting voters using their data-driven approach, which of these voting groups were the most appropriate to target? (This question is from the online lecture) A. Republican voters B. Democratic voters who never vote C. Democratic voters who always vote D. Democratic and swing voters who sometimes vote

*D. Democratic and swing voters who sometimes vote

A business intelligence tool that uses abstractions such as color and graphical images like instrument gauges to allow executives to grasp business situations quickly is known as a: A. Neural network B. Expert system C. Geographic information system D. Digital dashboard E. Planning Horizon

*D. Digital dashboard

[Systems] What term is used to describe interorganizational ERP systems that provide web-enabled links among a company's key business systems—such as inventory and production—and its customers, suppliers, distributors, and other relevant parties? A. MRP B. ERP C. MRP-II D. ERP-II

*D. ERP-II

What was the name of the legislation adopted by the European Parliament that mandated that all countries within the EU must setup laws requiring websites to obtain informed consent before they can store or retrieve information on a visitor's computer or web-enabled device. A. EU General Data Protection Regulation B. EU Cybersecurity Act C. EU Data Protection Directive D. EU Cookie Law

*D. EU Cookie Law

Purchasing an entire box of screws, even though only a small number are need for the master production schedule is an example of making a purchasing decision based on what approach? A. Fixed order quantity B. Lot-for-Lot C. Independent Demand D. Economic Order Quantity

*D. Economic Order Quantity

What is the process of identifying metrics that are outside of acceptable tolerance levels? A. Classification B. Visualization C. Drill Down D. Exceptiuon Reporting

*D. Exceptiuon Reporting

Which of the project management documents includes all three of the triple constraints that are in the Scope Triangle? A. Hierarchical Diagram B. Spiderweb Diagram C. Cross-functional Diagram D. Gantt Chart E. PERT Chart

*D. Gantt Chart

The University of Arizona is nationally recognized for sustainability in its academics, research, operations, and administration by the Assocation for the Advancement of Sustainability in Higher Education. What Sustainability Tracking, Assessment & Rating SystemTM (STARS) rating was the University of Arizona awarded in 2017? A. Bronze B. Silver C. Platinum D. Gold

*D. Gold

What tool is commonly used to track how, when and from what location users are using website? A. Project Management B. Wire Frame Design C. Content Management D. Google Analytics

*D. Google Analytics

Allowing individuals to file tax returns, renew driver's licenses, and obtain various permits online is an example of what type of eGovernment? A. Government-to-business (G2B) B. Government-to-suppliers (G2S) C. Government-to-government (G2G) D. Government-to-citizen (G2C) E. Government-to-employees (G2E)

*D. Government-to-citizen (G2C)

When adding your icon to your ABP-3B website, what section should you add the link directive to your icon file? A. ALT B. HTML C. BODY D. HEAD

*D. HEAD

Which of the following is TRUE? A. IT can eliminate any job. B. IT only helps improve employees' health and safety. C. IT opens up jobs for middle managers. D. IT impacts entire industries.

*D. IT impacts entire industries.

If your sales system shows a customer's name as "Johnny Smith", but your logistics system for shipping shows the same customer as "John A. Smith", what type of database problem does this represent? A. Security B. Isolation C. Redundancy D. Inconsistency

*D. Inconsistency

What term best describes when consumers are able to use their smartphones to obtain information about a company's competitor's product pricing, features, customer reviews and availability while shopping in their company's brink-and mortar store? A. Accessibility B. Multi-path C. Crucial distinctions D. Information transparency E. Interference

*D. Information transparency

The European Union's data protection laws are ___________ strict compared to the US laws. A. Equally B. Less C. Non-existently D. More

*D. More

Which of the following is the technology that enables most mobile wallet applications? A. VRP B. ERP C. AFC D. NFC

*D. NFC

All of the items in one column a cross functional diagram are related to what? A. One decision B. One business process C. One connection D. One actor

*D. One actor

What is an affordance? A. Safety of users and of data B. Being able to pay for something C. How well the user likes the interface D. Physical property of an object that shows functionality

*D. Physical property of an object that shows functionality

[RelativeSize] What type of chart would be show the values of individual components proportional to a whole, allowing you to easily know relative size of a component, such as might be done to analyze the allocation of expenditures in a budget? A. Bar Chart B. Line Chart C. Bubble Chart D. Pie Chart

*D. Pie Chart

Which of the following business component are *not* included in an MRP-II planning cycle? A. Workforce B. Plant and Equipment C. Raw Materials D. Product Margins

*D. Product Margins

______________ is the process of forming a digital dossier. A. Information privacy B. Privacy C. Dossiering D. Profiling

*D. Profiling

An I^2 diagram helps identify opportunities that are "low hanging fruit". What does the term "low hanging fruit" mean in this context? A. Projects that correct major errors in the software B. Projects that will require significant effort, but are easily planned C. Projects that design new features requested by our customers D. Projects that easy to do and also have a high value proposition

*D. Projects that easy to do and also have a high value proposition

Which of the following technologies would *not* require line-of-sight scanning? A. QR Code Tags B. Price Label Tags C. Bar Code Tags D. RFID Tags

*D. RFID Tags

CODASYL, the Conference/Committee on Data Systems Languages, is remembered almost entirely for two activities: its work on the development of the COBOL language and its activities in standardizing database interfaces. We've learned about the pioneers of databases (Chen and Codd) today, who is credited for developing FLOW-MATIC, which evoled into the COBOL, the widely used business programming language? A. Charles Babbage B. Ada Lovelace C. Dennis Richie D. Rear Admiral Grace Murray Hopper E. Niklaus Wirth

*D. Rear Admiral Grace Murray Hopper

Who was the founding director of the Arizona Telemedicine Program? A. John Po, M.D., Ph.D. B. Ana Maria Lopez, M.D., M.P.H. C. Richard A. McNeely, M.A. D. Ronald S. Weinstein, M.D.

*D. Ronald S. Weinstein, M.D.

What is the name of the agile framework for managing the work of development teams who break their work into actions that can be completed within timeboxed iterations, called sprints (30 days or less)? A. Rapid Application Development B. Waterfall C. Prototyle Methodology D. SCRUM

*D. SCRUM

What is the name of the social engineering attack that frightens computer users into visiting malware-infested websites by appearing to be legitimate warnings from antivirus software companies that your computer's files have been infected with the intent of tricking a user into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection? A. Pretexting B. Tailgating C. Quid Pro Quo D. Scareware

*D. Scareware

What normative ethical theory expects a corporation to create more value to society that it consumes? A. Value Chain Theory B. Stakeholder Theory C. Stockholder Theory D. Social Contract Theory E. Return on Investment Theory

*D. Social Contract Theory

What type of electronic commerce helps shoppers connect with one another based on tastes, location, age, gender, and other selected attributes allowing them to share information using voting, comments, discussions, and reviews focused on shopping? A. Crowdsourcing B. Business value chains C. Globalization D. Social shopping

*D. Social shopping

A Mekko, or Marimekko or market map chart, which paints a picture of the overall market and helps to drive discussions about growth opportunities or acquisitions byshowing the relationship between each segment or bar to the total. A Mekko chart is similar to what other type of chart discussed in class? A. Scatter Plot B. Surface Chart C. Donut Chart D. Stacked Bar Chart

*D. Stacked Bar Chart

Donut Charts are difficult to read, Microsoft recommends what as an alternative? A. Cake Charts B. Pie Charts C. Scatter Charts D. Stacked Column or Bar Charts

*D. Stacked Column or Bar Charts

What normative theory of ethics focuses on the belief that manager's actions should be guided by the understanding that they are entrusted with a responsibility to manage and protect the assets of the company for the benefit of all of those who the actions of the firm affect? A. Social Contract B. Organizational C. Stockholder D. Stakeholder E. Loyalty

*D. Stakeholder

What term describes individuals with tactic knowledge about a particular domain? A. Community Leaders B. Knowledge Guides C. Expert Systems D. Subject-matter Experts

*D. Subject-matter Experts

In the VAN (Voter Activiation Network) Relationship-Based Political Organizing video case study, the VAN was able to idenify the relationships of possible supporters using data from what source? A. Online surveys B. Voter registration records C. Tax returns of registered voters D. Supporter's Facebook contacts E. Direct mail campaigns

*D. Supporter's Facebook contacts

What term is used to describe the one column for an actor in a cross -functional diagram? A. Timeline B. Thread C. Path D. Swimlane

*D. Swimlane

What collaboration tool was discussed in class that enhances the participants' contextual awareness by sharing non-verbal information during meetings? A. Twitter B. Crowdsourcing C. Teleportation D. Telepresence E. Six Sigma

*D. Telepresence

When displaying a webpage, such as http://www.u.arizona.edu/~wilbur, what is the name of the directory the web browser will check in the "wilbur" account for the "index.html" website? A. The "wilbur" directory B. The "home" directory C. The "www" directory D. The "public_html" directory

*D. The "public_html" directory

Porters five forces focuses on what part of competition? A. The Business Supply Chain B. The Five Core Business Functional Areas C. The Five Core Internal Processes of a Business D. The Business Environment

*D. The Business Environment

Assume you need to put a sign that says "PUSH" on a door handle to explain the correct way to operate the door. The "PUSH" sign helps a user understand what aspect of usability? A. The sign explains a correct rejection B. The sign explains a consistent affordance C. The sign explains a perceptible affordance D. The sign explains a false affordance E. The sign explains a hidden affordance

*D. The sign explains a false affordance

In a vertical cross-functional diagram, items are ordered in one coumn relates to what? A. Economic value B. Feasibility C. Frequency of occurence D. Time

*D. Time

When you check your credit score for incorrect information, you're responding to which of the "4 V's" discussed for "big data" in the financial reporting business sector? A. Velocity B. Volume C. Variety D. Veracity

*D. Veracity

A firewall is a _______ control. A. virtual B. access C. physical D. communication

*D. communication

Google's main business reason for installing fiber in select US cities is to _______. A. bring the internet to rural areas B. begin competing with the cable distribution giants C. give people an option other than the telecommunications companies who control existing cable networks D. generate more web traffic, which generates more ad revenue for them

*D. generate more web traffic, which generates more ad revenue for them

The web ____________ buyer power. A. has no impact on B. decreases C. increases D. has a mixed impact on

*D. has a mixed impact on

What is the name of the directory where the files for your websites for ABP-3A and ABP- 3B will be stored on the U.Arizona.Edu web server? A. www_html B. index_html C. public.html D. public_html

*D. public_html

With respect to Porter's Forces, which of the five factors would have be the LEAST (weakest) impact on Starbuck's business model? A. Competitive rivalry B. Bargaining power of buyers (its customers) C. Threat of substitutes D. Threat of new entrants E. Bargaining power of suppliers

*E. Bargaining power of suppliers

Identifying patterns in data based on common temporal (time) or spatial (geographic) traits is based on what type of data mining analysis? A. Sequencing B. Association C. Classification D. Forecasting E. Clustering

*E. Clustering

The "Porter's Forces" model deals with what aspect of globalized business? A. Relationships B. Location C. Design D. Time E. Competition

*E. Competition

Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control? A. Social Contract B. Just-In-Time C. Bullwhip effect D. Disintermediation E. Defense in depth

*E. Defense in depth

From a user's perspective, perceived affordances would include actual perceptible design affordances and what other category of perceptual affordances? A. Correct rejection of design characteristics that are not affordances B. Accessible affordances C. Hidden design affordances D. Design mitigation affordances E. False or fake design affordances

*E. False or fake design affordances

Satellites used for data communications that appear to be stationary from a fixed location on earth are placed in what type of orbit? A. Mid-earth orbit B. Commercial orbit C. Elliptical orbit D. Polar orbit E. Geosynchronous orbit

*E. Geosynchronous orbit

In the Online Democracy model, the "Voter Activation Network" uses voter registration rolls to categorize voters as always/sometimes/never voting by using information obtained from: A. Private sector polling B. Online media C. Partisan political organizations D. Commercially-generated databases E. Government records

*E. Government records

In Thomas Friedman's discussion of globalization, he described the process of globalization as being realized through actions that were first defined by your country, then later defined by multi-national companies, and finally, in the most recent age of globalization is defined by: A. Political parties B. International treaties C. Financial markets D. Social media E. Individuals

*E. Individuals

What dimension of Porter's Forces focuses on the decision that a buyer makes when choosing among direct, existing competitors when all of the competitors offer the same identical name-brand product (e.g., an iPhone 6)? A. Threat of Substitution B. Buyer power C. Threat of New Entrants D. Supplier power E. Industry Rivalry

*E. Industry Rivalry

What action did Stacy Snyder take that resulted in her losing her job? A. Undertaking accounting fraud at her company B. Hacking the AP Twitter feed and posting a fraudulent message C. Being a whistle-blower and reporting the illegal actions of her employer D. Infecting her company's network computer with a virus while using Facebook at work E. Posting a photo of herself at a party on her personal social media account

*E. Posting a photo of herself at a party on her personal social media account

What is the term used to describe the process of reducing the number of dimensions of a multi-dimensional data cube (e.g., from three dimensions, perhaps season, location, and product, into two dimensions, such as season and location)? A. Variable B. Context C. Function D. Simplification E. Projection

*E. Projection

In the Jack Welch Video Case in the SCM Lecture, What approach was he discussing as key to providing customer value? A. the SCOR Model - the Supply Chain Operations Reference Model B. CPFAR - Collaborative Planning, Forecasting And Replenishment C. Total Quality Management D. Lean Manufacturing, using JIT and SMED E. Six Sigma

*E. Six Sigma

Determining whether your personal computer has appropriate hardware to take an online exam proctored by Examity is what type of assessment? A. Economic feasibility B. Management feasibility C. Behavioral feasibility D. Customer feasibility E. Technical feasibility

*E. Technical feasibility

Pie charts have several limitations, including all of the following except? A. They cannot show negative values B. They can only show one series C. When two or more items are close in value it can be hard to determine which is larger D. Values near zero may not show up and be hidden E. They have limited color and don't draw the eye and attention

*E. They have limited color and don't draw the eye and attention

A company's "ticker" or stock symbol serves what role on a stock trading exchange? A. The change (up or down) in price from the last purchase price B. The official company logo used for stock transactions C. The time and date the stock was sold D. The broker selling the stock E. Uniquely identifies a traded stock

*E. Uniquely identifies a traded stock

Assume you are 22 years old when you graduate from the University of Arizona and have a credit card with a $2,000 credit balance with an 18% annual rate. If you only make minimum payments of 2% of the balance or just $10 (whichever is greater) each month, what birthday will you likely be be celebrating when the the credit card is paid off? A. 52 B. 37 C. 32 D. 27

A. 52

In addition to possessing contextual and relevant information, what other characteristic aspect does knowledge possess? A. It is an entity class B. It solves a structured problem C. It is actionable D. It is consistent E. It is always displayed visually

It is actionable

A. Cash, Inventory, Property & Plant

Put the following assets in order of increasing liquidity (least to most) A. Cash, Inventory, Property & Plant B. Accounts Receivable, Cash, Property C. Property, Accounts Receivable, Cash D. Property, Cash, Accounts Receivable E. Cash, Property & Plant, Inventory


Related study sets

PEDS: Practice Questions (Exam 4)

View Set

NU270 Week 11 PrepU: Quality Improvement

View Set

Chapter 5: Descriptive and Causal Research

View Set

AWS Practice Exam 5 (Security & Compliance)

View Set

NU272 HESI Case Study: Compound Fracture (Preschooler)

View Set

Health 011 Cowgill Chapter 4 Quiz

View Set