• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/47

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

47 Cards in this Set

  • Front
  • Back

What term is used to describe the information collected describing an action (i.e., location, time, place, etc.) as opposed to the data itself?




a. Hashtagging


b. Metadata


c. Entities


d. Packets


e. Accommodations

metadata

The University of Arizona Green Fund is an example of what type of sustainability program?




a. Student engagement


b. Faculty scholarship


c. Campus operations


d. Administrative leadership


e. Facilities planning

a. Student engagement

As confirmed by our in-class poll, what is the most likely action an ownerwill take with their old computer or cellular telephone after purchasing a new device?




a. Sell it to another person


b. Store it at home


c. Recycle it as a trade-in


d. Discard it in the trash


e. Donate it to a crisis center

b. Store it at home

Requiring students to usea combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control?




a. Bullwhip effect


b. Just-In-Time


c. Defense in depth


d. Disintermediation


e. Social Contract

c. Defense in depth

As a possible password, how many variableswould the password MIS111Exam(just the underlined string of characters) have when assessing its security strength?




a. 1


b. 2


c. 3


d. 4


e. 5

c. 3

Which of the following actions would be considered a biometric authentication?




a. Requiring a user to enter a secret password


b. Requiring a user to swipe a CatCard


c. Requiring a user to scan their fingerprint


d. Requiring a user to sign their signature


e. Requiring a user to type a group of displayed letters

c. Requiring a user to scan their fingerprint

As originally discussed by Dr. Gilliland, the classic values conflict with “Who Am I’” represents what type of ethical dilemma?




a. Short-term vs. long-term


b. Honesty vs. integrity


c. Peer-pressure vs. boss-pressure


d. Integrity vs. loyalty


e. Organizational ethics

d. Integrity vs. loyalty

As discussed in class, a key concern for a startup business is the “burn rate” for their initial capital.What financial report best describes a company’s “burn rate” for investors?




a. Balance sheet


b. General ledger


c. Income statement


d. Cash flow statement


e. Ticker symbol statement

d. Cash flow statement

Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what?




a. Defense in Depth


b. Industrial Sabotage


c. Social Engineering


d.Advanced Persistent Threats


e. Open Source Hacking

c. Social Engineering

A company’s “ticker” or stock symbol serves what role on a stock trading exchange?




a. Uniquely identifies a traded stock


b. The time and date the stock was sold


c. The broker selling the stock


d. The change (up or down) in price from the last purchase price


e. The official company logo used for stock transactions

a. Uniquely identifies a traded stock

Market capitalization is determined by multiplying the stock price by what?




a. Profits earned from direct operations


b. Dividends paid during the last fiscal year


c. Number of common shares outstanding


d. Book value of the company


e. Year-end Earnings, minus taxes and interest

c. . Number of common shares outstanding

Your username (UANetID) is your claim of identify to a computer system.When the computer system verifies your identify by requiring you to enter a password is an example of what type of authentication?




a. Something a user is


b. Something a user has


c. Something a user does


d. Something a user knows


e. Something a user inherits

d. Something a user knows

What ethical framework considers all stakeholders related to the decision, such as the company’s customers, employees, shareholders, the community and the environment?




a. Whistleblowing ethics


b. Social contract


c. Fairness doctrine


d. Common good approach


e. Regulatory mandates

b. Social contract

Originally discussed by Dr. Gilliland, David Myers’ (former controller of MCI/Worldcom) statement “I still don’t know that one point when I started to cross the line...”, is an example of how small, incremental repeated compounding of unethical decisions can result in what?




a. Gut check


b. Transparency test


c. Whistleblowing


d. Ethical drift


e. Defining moment

d. Ethical drift

The Democratic National Committee used a software tool called the Voter Activation Network to classify voters considering whether a voter is likely to cast a vote and the party affiliation of the voter.The GOTV (get out the vote) was specifically targeted at what demographic?




a. Democratic voters who always vote, and support Democratic candidates


b. Democratic voters who sometimes vote, and support Democratic candidates


c. Democratic voters who never vote, and support Democratic candidates


d. Swing voters who sometimes vote, but may support Democratic candidates


e. Republican voters who never vote, and support Republican candidates

b. Democratic voters who sometimes vote, and support Democratic candidates

As discussed in class, journalists have suffered a loss of public trust due by adopting what technology commonly used in the fashion and marketing industry for reporting news events?


a. Advertising news stories on commercial websites


b. Tracking customer’s preferences for news content


c. Using Photoshop to alter photos to match the news story


d. Only allowing customers with paid subscriptions to access content


e. Publishing news stories on blogs and other social media sites

c. Using Photoshop to alter photos to match the news story

What free service delivers emergency information to registered UA students, faculty and staff –as well as their friends and family –via their cell phones, mobile devices and/or email accounts during a campus emergency?




a. Blackboard


b. D2L


c. UAccess


d. UAlert


e. Twitter

d. UAlert

The Eller “GoodCat” website that allows for anonymous reporting of unethical behavior in Eller classes uses what type of business model?a. Transparency model


b. Ethical drift model


c. Whistleblower model


d. Loyalty model


e. Engagement model

c. Whistleblower model

On the balance sheet, total assets minus total liabilities must equal what?


a. Free Cash flow


b. Dividends Paid


c. Owner’s Equity


d. Stock price


e. Market Value

c. Owner’s Equity

Information systems professionals understand business needs and analyze processes, methods and data to create customer-oriented solutions.The value proposition for MIS was described more briefly by Dr. Jay Nunamaker, Regents Professor and founding chair of the MIS Department, as a discipline focused on doing what for business?




a. Programming


b. Solving real problems


c. Computer Design


d. Marketing software


e. Academic research

b. Solving real problems

What action did Stacy Snyder take that resulted in her losing her job?




a. Hacking the AP Twitter feed and posting a fraudulent message


b. Undertaking accounting fraud at her company


c. Posting a photo of herself at a party on her personal social media account


d. Infecting her company’s network computer with a virus while using Facebook at work


e. Being a whistle-blower and reporting the illegal actions of her employer

c. Posting a photo of herself at a party on her personal social media account

Approximately what percentage of applications for jobs are rejected by potential employersbefore the interviewdue to public information posted online by the applicant (e.g. social networking, blogs, media sites, etc. –that is, youronline reputation)?




a. Less than 5%


b. About 10%


c. About 30%


d. Less than 50%


e. 60% or more

e. 60% or more

What normative theory of ethics focuses on the belief that manager’s actions should be guided by the understanding that they are entrusted with a responsibility to manage and protect the assets of the company for the benefit of all of those who are impacted by the actions and financial results of the firm?




a. Stockholder


b. Stakeholder


c. Social Contract


d. Organizational


e. Loyalty

b. Stakeholder

What business unit within most companies produces the periodic reports, statements and analyses, such as annual reports, that are disseminate to investors?




a. Marketing


b. Accounting


c. Finance


d. Public Relations


e. Logistics and Operations

b. Accounting

What term describes the ability of a person to effectively evaluate and manage one’s finances in order to make prudent decisions toward reaching life’s goals?




a. Personal Accounting


b. Financial Literacy


c. Household Finance


d. Expense Management


e. Risk Management

b. Financial Literacy

With respect to an individual, what term describes the processof managing one’s earnings, savings, and debt to meet the actual and budgeted expenses?




a. Personal Accounting


b. Financial Literacy


c. Personal Finance


d. Expense Management


e. Risk Management

c. Personal Finance

Building on its initial success of the Voter Activation Network, the Democratic National Committee moved beyond simply classing voters by whether they are likely to cast a vote and their party affiliation to also include what additional aspect of Web2.0?




a. Identifying voters who were likely to blog for a candidate or issue


b. Using “mash-ups” to select efficient driving routes on election day for GOTV drivers


c. Using a “long tail” strategy to every voter to building support through niche issues


d.Influencing voters by having supporters use their social media relationships


e. Creating issue-related folkonomies to inform voters of important issues

*d.Influencing voters by having supporters use their social media relationships

Planned, recurring expenses that occur on a routine schedule, such rent or car payments that mustbe paid every month, are examples of what?




a. Flexible expenses


b. Deductions


c. Discretionary expenses


d. Fixed expenses


e. Cash flow

d. Fixed expenses

Allowing individuals to file tax returns, renew driver’s licenses, and obtain various permits online is an example of what type of eGovernment?




a. Government-to-business (G2B)


b. Government-to-citizen (G2C)


c. Government-to-employees (G2E)


d. Government-to-government (G2G)


e. Government-to-suppliers (G2S)

b. Government-to-citizen (G2C)

In our discussion of the “Democracy Online” framework, what group should take responsibility for providing information about positions, candidates, and advocacy efforts, and work to involve supporters through online interactive spaces?




a. Media and commercial content


b. Government


c. Private sector


d. Political organizations


e. Civic participation center

d. Political organizations

In class, we discussed how digital photos now include “metatdata” (embedded information along with the photot).Metadata about the latitude and longitude of where a photo was taken in the digital image file is known as what?




a. Posting


b. Hashtagging


c. Bookmarking


d. Geotagging


e. Stalking

d. Geotagging

What type of authentication about the cardholder (you) occurred when you swiped your UofA CatCard as your entered the MIS 111 Exam today?




a. Something auser is


b. Something a user has


c. Something a user does


d. Something a user knows


e. Something a user believes

b. Something a user has

In the video case that discussed a recent market crash that was caused by high-volume automated stock trading computer systems, what action caused the sudden stock sell-off?




a. A previously undetected error in the trading program’s algorithm


b. A false news “tweet” was posted on Twitter


c. Incorrect stock price information was downloaded by the system


d. A human trader entered an invalidquantity in a “sell order”


e. So many automated trades were submitted at once that the market’s computers crashed

b. A false news “tweet” was posted on Twitter

According to the article “How your digital identity will be used” all of the following but one are unchangeable:




a. Date of Birth


b. Passport Number


c. Heartbeat Signature


d. Biometric Data


e. DNA Analysis

b. Passport Number

Selecting EPEAT-compliant technology with a high rating over traditional, less energy efficient technology is an example of focusing on what sustainability effect?




a. Use of government regulation to eliminate wasteful products


b. Creation, Use and Disposal of a product


c. Substitution by using alternative methods


d. Impacts of long term structural change


e. Increased awareness through the use of metrics

b. Creation, Use and Disposal of a product

As discussed in Online Democracy model, the "Voter Activation Network" uses voter registration rolls to categorize voters as always/sometimes/never voting by using information obtained from:




a. Online media


b. Commercially-generated databases


c. Private sector polling


d. Government records


e. Partisan political organizations

d. Government records

Selecting among technology products based solely upon thier EPEAT ranking is an example of what order sustainability effects?




a. Capital Order


b. First Order


c. Second Order


d. Third Order


e. Consumer Order

b. First Order

What term is used to describe the process of adding metadata to digital photos to identify the exact geographical location the photo was taken?




a. Hashtagging


b. Bookmarking


c. Geotagging


d. Data mining


e. Phishing

c. Geotagging

As discussed in the VAN (Voter Activation Network) case study, if you were supporting a Democratic candidate, which group of voters could be most efficiently reached using only a get-out-the-vote (GOTV) activity?




a. Independent voters who always vote


b. Independent voters who sometimes vote


c. Democratic voters who always vote


d. Democratic voters who sometimes vote


e. Democratic voters who never vote

d. Democratic voters who sometimes vote

As discussed in the VAN (Voter Activiation Network) Relationship-Based Political Organizing video case study, the VAN able to idenify the relationships of possible supporters using data from what source?




a. Voter registration records


b. Direct mail campaigns


c. Online surveys


d. Supporter's Facebook contacts


e. Tax returns of registered voters

d. Supporter's Facebook contacts

In the Personal Branding video case, which of the following online platforms was idenfied as being primarily a business networking tool?




a. Facebook


b. LinkedIn


c. Democratic voters who sometimes vote


d. Wordpress


e. Amazon.com

b. LinkedIn

Disclosing personal information such as your race, religion, sex, disabilities, and age on social media undermines what type of protections otherwise provided to you as a citizen in the United States?




a. Wage discrimination laws


b. Anti-discrimination laws


c. Voter eligibility laws


d. Commercial driver's license eligbility laws


e. Personal credit eligibility laws

b. Anti-discrimination laws

What term describes the ability of a person to effectively evaluate and manage one's finances in order to make prudent decisions toward reaching life's goals?




a. Personal Accounting


b. Personal Finance


c. Financial Literacy


d. Household Finance


e. Personal Budgeting

c. Financial Literacy

In recognizing ethical situations, which of the following is related to a chemical reaction that occurs in your body, specifically your intestinal track?




a. Ethical drift


b. Gut check


c. Transparency test


d. Gut punch


e. Taste check

b. Gut check

The equity on a company's balance sheet is most closely related to which of the following?




a. Market value


b. Operating income


c. Share price


d. Book value


e. Gross margin

d. Book value

How does the University of Arizona's program called NetID+ to improve password security?




a. It requires users to use additional variables for their passwords


b. It requires users to change their password more frequently


c. It requires users touse longer passwords


d. It requires users to confirm their identify with two-factor authentication


e. It requires users to have different NetIDs for on-campus and off-campus access

d. It requires users to confirm their identify with two-factor authentication

Information systems professionals understand business needs and analyze processes, methods and data to create customer-oriented solutions. The value proposition for MIS was described more briefly by Dr. Jay Nunamaker, Regents Professor and founding chair of the MIS Department, as a discipline focused on doing what for business?




a. Programming


b. Solving real problems


c. Computer Design


d. Marketing software


e. Academic research

b. Solving real problems