MIS 111 Final Exam Questions and Answers All Correct
5 views 0 purchase
Course
MIS 111
Institution
MIS 111
MIS 111 Final Exam Questions and Answers All Correct
What term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding?
a. Conceptual model
b. Semiotic...
MIS 111 Final Exam Questions and
Answers All Correct
What term did Don Norman define as story that puts the operation of the system into
context, weaving together all of the essential components, providing a framework, a
context, and reasons for understanding?
a. Conceptual model
b. Semiotic Engineering
c. Design Intention
d. Emotional design - Answer-a. Conceptual model
Selecting EPEAT-compliant technology with a high rating over traditional, less energy
efficient technology is an example of focusing on what sustainability effect?
a. Use of government regulation to eliminate wasteful products
b. Creation, Use and Disposal of a product
c. Substitution by using alternative methods
d. Impacts of long term structural change
e. Increased awareness through the use of metrics - Answer-b. Creation, Use and
Disposal of a product
What action did Stacy Snyder take that resulted in her losing her job?
a. Hacking the AP Twitter feed and posting a fraudulent message
b. Undertaking accounting fraud at her company
c. Posting a photo of herself at a party on her personal social media account
d. Infecting her company's network computer with a virus while using Facebook at work
e. Being a whistle-blower and reporting the illegal actions of her employer - Answer-c.
Posting a photo of herself at a party on her personal social media account
Approximately what percentage of applications for jobs are rejected by potential
employers before the interview due to public information posted online by the applicant
(e.g. social networking, blogs, media sites, etc. - that is, your online reputation)?
a. Less than 5%
b. About 10%
c. About 30%
d. Less than 50%
e. 60% or more - Answer-e. 60% or more
,According to the article "How your digital identity will be used" all of the following but
one are unchangeable:
a. Date of Birth
b. Passport Number
c. Heartbeat Signature
d. Biometric Data
e. DNA Analysis - Answer-b. Passport Number
In the Personal Branding video case, which of the following online platforms was
idenfied as being primarily a business networking tool?
a. Facebook
b. LinkedIn
c. Democratic voters who sometimes vote
d. Wordpress
e. Amazon.com - Answer-b. LinkedIn
The _________ prohibits an organization from collecting any personal information
unless the customer specifically authorizes it.
a. digital dossier policy
b. information privacy policy
c. opt-in model of informed consent
d. opt-out model of informed consent - Answer-c. opt-in model of informed consent
As originally discussed by Dr. Gilliland, the classic values conflict with "Who Am I'"
represents what type of ethical dilemma?
a. Short-term vs. long-term
b. Honesty vs. integrity
c. Peer-pressure vs. boss-pressure
d. Integrity vs. loyalty
e. Organizational ethics - Answer-d. Integrity vs. loyalty
Which of the project management documents includes all three of the triple constraints?
a. Spiderweb Diagram
b. PERT Chart
c. Gantt Chart
d. Cross-functional Diagram
e. Hierarchical Diagram - Answer-c. Gantt Chart
,1. IT has changed the manager's job in many ways. Which of the following is NOT the
result of this change?
a. Easier to make a decision
b. More information to address
c. Remote supervision
d. Real-time information - Answer-a. Easier to make a decision
2. Which of the following is TRUE?
a. IT can eliminate any job.
b. IT impacts entire industries.
c. IT opens up jobs for middle managers.
d. IT only helps improve employees' health and safety. - Answer-b. IT impacts entire
industries.
3. Which company used software to disrupt the previous market-leading companies in
the book industry?
a. Amazon
b. Barnes and Noble
c. Books-a-Million
d. Walmart - Answer-a. Amazon
4. IT changes managers' job by _________
a. providing near real-time information so managers can make quicker decisions.
b. making it easier to get all employees to work from one location.
c. decreasing the volume of information they have to process.
d. improving an employee's sense of connectedness. - Answer-a. providing near real-
time information so managers can make quicker decisions.
5. WebMD is a(n) _________ that allows doctors to ___________.
a. ERP; diagnose diseases
b. expert; diagnose diseases
c. ERP; perform long-distance surgery
d. expert; perform long-distance surgery - Answer-b. expert; diagnose diseases
6. Robots are useful ___________.
a. as companions (e.g. cyberpooches)
b. for driving cars (e.g. cyberchauffer)
c. for handling monotonous tasks (e.g. factory work)
d. only in science fiction (e.g. Terminator) - Answer-c. for handling monotonous tasks
(e.g. factory work)
, 7. IT allows the workplace to expand to 24 hours a day at _______________, which is a
benefit for ___________.
a. a central location; only employees
b. any location; only employers
c. a central location; employers and employees
d. any location; employers and employees - Answer-d. any location; employers and
employees
8. Requiring students to use a combination of a numeric passcode and their CatCard to
enter a locked door on a UA dorm is an example of approach for security control?
a. Bullwhip effect
b. Just-In-Time
c. Defense in depth
d. Disintermediation
e. Social Contract - Answer-c. Defense in depth
9. As a possible password, how many variables would the password MIS111Exam (just
the underlined string of characters) have when assessing its security strength?
a. 1
b. 2
c. 3
d. 4
e. 5 - Answer-c. 3
10. Which of the following actions would be considered a biometric authentication?
a. Requiring a user to enter a secret password
b. Requiring a user to swipe a CatCard
c. Requiring a user to scan their fingerprint
d. Requiring a user to sign their signature
e. Requiring a user to type a group of displayed letters - Answer-c. Requiring a user to
scan their fingerprint
11. Sending phishing emails that demand users respond immediately or risk losing
access to a critical resource, such as email, is an example of what?
a. Defense in Depth
b. Industrial Sabotage
c. Social Engineering
d. Advanced Persistent Threats
e. Open Source Hacking - Answer-c. Social Engineering
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $15.39. You're not tied to anything after your purchase.