Exam 1 Study Guide
Exam 1 Study Guide 38107
Popular in MIS 111
verified elite notetaker
Popular in Computer Science and Engineering
CSC 127A - 002
verified elite notetaker
This 15 page Study Guide was uploaded by pauljohnson on Tuesday October 20, 2015. The Study Guide belongs to 38107 at University of Arizona taught by William Neumann in Fall 2015. Since its upload, it has received 70 views. For similar materials see MIS 111 in Computer Science and Engineering at University of Arizona.
Reviews for Exam 1 Study Guide
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 10/20/15
1 Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control A Defense in depth B Bullwhip effect C JustlnTime D Disintermediation E Social Contract 2 As a possible password how many variables would the password ExamP88word just the underlined string of characters have when assessing its security strength A 4 B 1 WP U39IWN 3 Which of the following actions would be considered a biometric authentication A Requiring a user to scan their ngerprint B Requiring a user to enter a secret password C Requiring a user to swipe a CatCard D Requiring a user to sign their signature E Requiring a user to type a group of displayed letters 4 In the video case discussing how governments could leverage web 20 technologies the speaker described an emerging era of quotdatadriven g overnmentquot that had helped the state of Maryland identify where childr en were at risk What approach was used for this solution A Overlaying maps of children in foster care with maps of person convicted of crimes B Online surveys of children current places in foster care homes C Providing communities with maps of accidents and other police repo rts D Using online forums to increase citizen engagement for new laws E Allowing the media to access information on children in foster care 5 As described by Democracies Online what role does the private sec tor have in fostering an active and interactive public commons A Provide user connectivity technical support and open stand ards to the community B Make quotDemocracyquot information fully available and open to the public C Ensure the availability of political and community news at all levels 0 f government D Involve organizations and supporters to enhance participatory demo cracy E Volunteer with citizenbased efforts and community networks to prod uce and share ideas 6 As discussed by Dr Gilliland the classic values con ict with quotWho Am I quot represents what type of ethical dilemma A Integrity vs loyalty B Shortterm vs longterm C Honesty vs integrity D Peerpressure vs bosspressure E Organizational ethics 7 Allowing individuals to le tax returns renew driver s licenses and obtain various permits online is an example of what type of eGovernment A Governmenttocitizen G2C B Governmenttobusiness GZB C Governmenttoemployees GZE D Governmenttogovernment 626 E Governmenttosuppliers GZS 8 In the business world how would a company use the ethical survey you completed in class A Integrity testing job screening B Writing skills assessment C Test of professional standards D As part of a criminal investigation E As part of an exit interview 9 Sending phishing emails that demand users respond immediately or risk losing access to a critical resource such as email is an example of what A Social Engineering B Defense in Depth C Industrial Sabotage D Advanced Persistent Threats E Open Source Hacking 10 On the balance sheet total assets minus total liabilities must equal what A Owner39s Equity B Free Cash ow C Dividends Paid D Stock price E Market Value 11 A company s quottickerquot or stock symbol serves what role on a stock tr ading exchange A Uniquely identi es a traded stock B The time and date the stock was sold C The broker selling the stock D The change up or down in price from the last purchase price E The of cial company logo used for stock transactions 12 Market capitalization is determined by multiplying the stock price b y what A Number of common shares outstanding B Pro ts earned from direct operations C Dividends paid during the last scal year D Book value of the company E Yearend Earnings minus taxes and interest 13 Which of the following is true about folksonomies taxonomies tags and hash tags such as would be used by Twitter users when posting a comment A Both b and c below B Tags are words selected by users to describe a user39s view 0 f the concepts in a posting C Hash tags are terms used to create groupings of unstructure d user postings D Users are allowed to de ne and select the categories used for classi cation in a taxonomy E All a b and c of the above 14 Accessing the internet using UAWi has what advantage over using UAPublic A All b c and d below B Information transmitted over UAWiFi protects privacy throu gh the use of encryption C Your connection speed bandwidth on UAWiFi is higher D Ports are not blocked on UAWiFi allowing access to a greate r number of services E Both a and b of the above 15 What term is used to describe a marketoriented mechanism for ad vancing the value proposition of innovation A Entrepreneurship B Whistleblowing C Folksonomy D Transparency E Social engineering 16 Your username UANetID is your claim of identify to a computer sy stem When the computer system veri es your identify by requiring yo u to enter a password is an example of what type of authentication A Something a user knows B Something a user is C Something a user has D Something a user does E Something a user inherits 17 In MIS 111 clickers are used to collect information about your opini ons domain knowledge and attendance during class Which of the foll owing is NOT an advantage of collecting data using clickers during cas s A Clickers allow students to answer skipped questions later in class B Clickers allow all students to respond to each question C Clickers allow students to see the responses of other students in the class D Responses from clickers are recorded for later grading E Clickers provide feedback to the student when their answer has bee n sent 18 As discussed by Dr Gilliland David Myers former controller of MCI Worldcom statement quotI still don t know that one point when I started t 0 cross the linequot is an example of how small incremental repeated c ompounding of unethical decisions can result in what A Ethical drift B Gut check C Transparency test D Whistleblowing E De ning moment 19 The Democratic National Committee used a software tool called the Voter Activation Network to classify voters considering whether a voter is likely to cast a vote and the party affiliation of the voter The GOTV get out the vote was speci cally targeted at what demographic A Democratic voters who sometimes vote and support Democr atic candidates B Democratic voters who always vote and support Democratic candid ates C Democratic voters who never vote and support Democratic candida tes D Swing voters who sometimes vote but may support Democratic can didates E Republican voters who never vote and support Republican candidat es 20 What eGovernment next generation application allows citizens to r equest that they be noti ed when speci c documents are posted or act ions related to attributes such as geographic region personal interest or speci c policy issues occur A Personalization B Accountability C Streamlining D Simpli cation E Engagement 21 What free service delivers emergency information to registered UA students faculty and staff as well as their friends and family via the ir cell phones mobile devices andor email accounts during a campus e mergency A UAlert B Blackboard C D2L D UAccess E Twitter 22 Based on Google s tracking of incoming links weblinks pointing tot he source in what video case was the in uence of four bloggers seen as comparable to mainstream media outlink such as Forbes magazinin g A Long Tail B Ford Motor Company C Web Evolution D Root Cause Analysis E Business and Technology Alignment 23 The Eller quotGoodCatquot website that allows for anonymous reporting of unethical behavior in Eller classes uses what type of business model A Whistleblower model B Transparency model C Ethical drift model D Loyalty model E Engagement model 24 Requiring students to use a combination of a numeric passcode an d their CatCard to enter a locked door on a UA dorm is an example of a pproach for security control A Defense in depth B Bullwhip effect C JustInTime D Disintermediation E Social Contract 25 In Thomas Friedman s discussion of globalization he described the process of globalization as being realized through action that were rst de ned by your country then later de ned by multinational companie s and nally in the most recent age of globalization is de ned by A Individuals B International treaties C Social media D Financial markets E Political parties 26 Information systems professionals understand business needs and analyze processes methods and data to create customeroriented solu tions The value proposition for MIS was described more brie y by Dr J ay Nunamaker Regents Professor and founding chair of the MIS Depart ment as a discipline focused on doing what for business A Solving real problems B Programming C Computer Design D Marketing software E Academic research 27 The quotPorter s Forcesquot model deals with what aspect of globalization 7 A Competition BDe gn C Location D Relationships E Time 28 What normative theory of ethics focuses on the belief that manage r s actions should be guided by the understanding that they are entrust ed with a responsibility to manage and protect the assets of the compa ny for the bene t of all of those who are impacted by the actions and nancial results of the rm A Stakeholder B Stockholder C Social Contract D Organizational E Loyalty 29 What business model has been developed to assist consumers to m anage the complexity caused by multiple vendors offering products dir ecty on the web A Reintermediation B Reverse Auctions C Disintermediation D Whistleblower Hotlines E Globalization 30 As discussed in class what company was founded in the Globalizati on 20 era based on the business model of selling discontinued product lines directly to consumers by using an new transportation infrastructur e to reach a geographically distributed customer base A Sears Roebuck amp Co B Ebaycom C Overstockcom D WaIMart E BigLots 31 Although globalization has been underway for many centuries digit ization networking and connectiveness have dramatically increased w hat A Pace of Change B Number of quotOlive Treequot products and services C Data Redundancy D Revenue per Employee E Worker Productivity 32 When a company purchases standard commodity products availabl e from multiple vendors what purchasing technique is often used to ob tain the best lowest price for the item A Reverse Auctions B Social contract C Forward Auctions D Disintermediation E Product Repositioning 33 In Michael Porter discussion of the quotPorter s Forcesquot what industry was described as an example of a quotzero starquot industry where all of the competitive forces work against pro tabi ity A Airline industry B Soft drink industry C Automobile industry D Forpro t higher education E Healthcare industry 34 In MIS 111 clickers are used to collect information about your opini ons domain knowledge and attendance during class What advantage does collecting data with a clicker have over using written documents such as scantrons or printed answer sheets A Clickers have a lower transactional cost per response than a printed paper form B Clickers allow students to answer questions in any order during class like paper forms C Clickers allow students to selfevaluate their responses agai nst their peers during class D Only a and c are correct E All a b and c are correct 35 What normative approach to business ethics focuses exclusively o n increasing the value of the company by any legal means only for the individuals who have an equity ownership relationship with the busin ess A Stockholder B Individual Value C Stakeholder D Social Contract E Regulatory 36 Noninvasive medical tools such as an MRI or CT Scan Product A 28 Henry Ford s automobile assembly line Process B 29 Commercial sale of military jeeps vehicles re Positioning C 30 Invention of the electronic transistor Paradigm Shifts 37 As discussed in class a key concern for a startup business is the quotb urn ratequot for their initial capital What nancial report best describes a company s quotburn ratequot for investors A Cash ow statement B Balance sheet C General ledger D Income statement E Ticker symbol statement 38 What student funded and managed program provides opportunities for students to pr opose and undertake projects related to sustainability A GreenFund B Students for Sustainability C Compost Cats D ETegrity Program E EPEAT Program 39 As discussed in class journalists have suffered a loss of public trust due by adopting what technology commonly used in the fashion and m arketing industry for reporting news events A Using photoshop to alter photos to match the news story B Advertising news stories on commercial websites C Tracking customer s preferences for news content D Only allowing customers with paid subscriptions to access content E Publishing news stories on blogs and other social media sites 40 What ethical framework considers all stakeholders related to the de cision such as the company s customers employees shareholders th e community and the environment A Social contract B Whistleblowing ethics C Fairness doctrine D Common good approach E Regulatory mandates 41 With respect to a business model the value proposition describes what A How the business39 products or services ful ll the needs of a customer B The product ratio of the material cost to the sales price C The price that we sell our products to distributors D Whether a line of business earns a pro t E A business forecast based on proposed price increases 42 In the quotHigh Frequency Tradingquot case study what action resulted in a stock being traded A Computer algorithms executed orders by identifying opportunities to make pro ts B Investors provided stock brokers with a list of preplanned purchases C Stock brokers entered orders based on personal knowledge D Companies offering shares for new investors E The trading volume of a stock was 150 higher than the volume on the prior trading day 43 What term describes the method of doing business by which a com pany sustains itself A Business Model B Value Proposition C Revenue Model D Production Model E Organizational Model 44 What type of security risks are officialsounding emails that deman d you reply immediately to con rm your personal information or you wi ll lose access to your account A Viruses B Phishing C Sabotage D Spyware EThe 45 Which of the following is the strongest authentication factor on you r UA CatCard A Your Full Name B Your ID Number C Your Picture D Your Signature E Possession of the CatCard 46 Biometrics is what A Something a user has B Something a user knows C Something a user is D Something a user does E Someone that knows the user 47 Which of the following quotlawsquot state that the power of microprocess ors number of transistors doubles about every 18 months A Amdahl s Law B Gilder s Law C Metcalf s Law D Moore39s Law E Ohm s Law 48 How has the Internet affected globalization A Dramatically increased the pace of change B Decreased the availability of quotLexusquottype products C Made someone s location geography a more signi cant issue D Eliminated the presence of quotOlive Treequottype products E Made it more difficult to individuals to start businesses 49 For both spreadsheets and databases descriptive information abou t the attributes and formatting of the data is known as A Content B Parameters C Metadata D Instances E Primary Keys 50 Our class discussion of American Airline s decision not to list its ig hts on Expedia and Orbitz focused on how this decision was an exampl e of what model of competition A Porter39s Forces B Value Chains C Information Security D Business Ethics E Database Management 51 What is NOT a factor contributing to the Bullwhip Effect A Shortage Gaming B Outsourcing C Price Promotions D Batch Purchasing E ForecastingTrend Analysis 52 The quotPorter s Forcesquot model deals with what aspect of globalization A Competition BDe gn C Location D Relationships E Time 53 Which security threat is most likely to create an exposure ie risk for a computer system A Threat B Exposure C Vulnerability D Control E Biometric 54 Photojournalists digitally altering images without disclosing that changes have been made would mostly likely raise what type of concerns A Artistic Concerns B Economic Concerns C Ethical Concerns D Legal Concerns E Technical Concerns 55 What is true about a primary key in a database table A It is the password for an encrypted table B It uniquely identi es a record within a table C It de nes the metadata for the table D It de nes the order of elds in a table E It must be a text string 56 eCommerce businesses such as Orbitzcom that offer consumers products from several vendors is an example of what A Forward Auctions B Reverse Auctions C Disintermediation D Reintermediation E Critical Path 57 Which best describes when a business uses the internet to supply consumers directly with services information and or products A Business to Business B2B B Business to Consumer BZC C Consumer to Consumer C2C D Consumer to Business C2B E Peer to Peer P2P 58 Which business model is likely to result in the disintermediation of the value chain A BusinesstoBusiness B2B B BusinesstoConsumer BZC C ConsumertoConsumer C2C D PeertoPeer P2P E GovernmenttoGovernment 626 59 What type of eGovernment transactions allow city county state and federal jurisdictions to exchange the data that COPLINK uses to assist law enforcement identify criminal suspects A GZC GovernmenttoCitizens B GZB GovernmenttoBusiness C G2G GovernmenttoGovernment D GZE GovernmenttoEmployees E GZA GovernmenttoAf iiates 60 An ad hoc method of organizing information and determining relationships based on the way people actually use the information is known as A Knowledge Management B Taxonomy C Folksonomy D Object Model E Expert Model 61 Which of the following is not one of the factors in quotPorter s Competitive Forces Modelquot A Customers B Disintermediation C lndustry Rivalry D New Entrants E Substitution 62 Simple one word descriptions used to create folksonomies are kno wn as A Links B Signals C Tags D Metadata E Relationships 63 As discussed in Online Democracy model the quotVoter Activation Networkquot is an example of encouraging citizen participation in elections by which of the following a Government b Media and Commercial Content c Private Sector d Political Organizations 64 What business unit within most companies produces the periodic reports statements and analyses such as annual reports that are disseminate to investors a Marketing b Accounting cHnance d Public Relations 65 On a balance sheet assets must equal the sum of liabilities and what other nancial measure a Gross Margin b Net Income c Retained Earnings d Equity e Inventory Value 66 FICA Can Include A Health and Disability Insurance B Federal and State Taxes C Social Security and Medicare Taxes 67 What business unit within most companies produces the periodic reports statements and analyses such as annual reports that are disseminate to investors A Marketing B Accounting C Finance D Public Relations 68 What term is used to describe the process of adding metadata to digital photos to identify the exact geographical location the photo was taken A Hashtagging B Bookmarking C Geotagging D Data mining 69 What aspect of IBM s Enterprise 20 business model would be de ned by terms such as quotemployee satisfactionquot quotcustomer insightquot and quotprocess improvementquot A Economic model B Production model C Value proposition D Revenue model E Physical model 70 Which of the following would be a sales channel focused on leveraging the quotLong Tailquot A Circle K B iTunes C Costco D Macy s E Target 71 If your decision to study your current major at the UofA vs another university was based only on the cost of tuition which of Porter s Forces guided your decision A Rivalry B Substitution C New Entrants D Customers E Suppliers 72 As de ned by Friedman in quotThe Lexus and The Olive Treequot an example of an olive tree issue would be one related to A Agriculture B Local culture C Labor D Productivity ECap al 73 Which business model is likely to result in the disintermediation of the value chain A Businesstobusiness B2B B BusinesstoConsumer BZC C ConsumertoConsumer C2C D PeertoPeer P2P E GovernmenttoGovernment GZG
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'