MIS 111 Final Exam Questions and Answers All Correct
5 keer bekeken 0 keer verkocht
Vak
MIS 111
Instelling
MIS 111
MIS 111 Final Exam Questions and Answers All Correct
What term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding?
a. Conceptual model
b. Semiotic...
MIS 111 Final Exam Questions and
Answers All Correct
What term did Don Norman define as story that puts the operation of the system into
context, weaving together all of the essential components, providing a framework, a
context, and reasons for understanding?
a. Conceptual model
b. Semiotic Engineering
c. Design Intention
d. Emotional design - Answer-a. Conceptual model
Selecting EPEAT-compliant technology with a high rating over traditional, less energy
efficient technology is an example of focusing on what sustainability effect?
a. Use of government regulation to eliminate wasteful products
b. Creation, Use and Disposal of a product
c. Substitution by using alternative methods
d. Impacts of long term structural change
e. Increased awareness through the use of metrics - Answer-b. Creation, Use and
Disposal of a product
What action did Stacy Snyder take that resulted in her losing her job?
a. Hacking the AP Twitter feed and posting a fraudulent message
b. Undertaking accounting fraud at her company
c. Posting a photo of herself at a party on her personal social media account
d. Infecting her company's network computer with a virus while using Facebook at work
e. Being a whistle-blower and reporting the illegal actions of her employer - Answer-c.
Posting a photo of herself at a party on her personal social media account
Approximately what percentage of applications for jobs are rejected by potential
employers before the interview due to public information posted online by the applicant
(e.g. social networking, blogs, media sites, etc. - that is, your online reputation)?
a. Less than 5%
b. About 10%
c. About 30%
d. Less than 50%
e. 60% or more - Answer-e. 60% or more
,According to the article "How your digital identity will be used" all of the following but
one are unchangeable:
a. Date of Birth
b. Passport Number
c. Heartbeat Signature
d. Biometric Data
e. DNA Analysis - Answer-b. Passport Number
In the Personal Branding video case, which of the following online platforms was
idenfied as being primarily a business networking tool?
a. Facebook
b. LinkedIn
c. Democratic voters who sometimes vote
d. Wordpress
e. Amazon.com - Answer-b. LinkedIn
The _________ prohibits an organization from collecting any personal information
unless the customer specifically authorizes it.
a. digital dossier policy
b. information privacy policy
c. opt-in model of informed consent
d. opt-out model of informed consent - Answer-c. opt-in model of informed consent
As originally discussed by Dr. Gilliland, the classic values conflict with "Who Am I'"
represents what type of ethical dilemma?
a. Short-term vs. long-term
b. Honesty vs. integrity
c. Peer-pressure vs. boss-pressure
d. Integrity vs. loyalty
e. Organizational ethics - Answer-d. Integrity vs. loyalty
Which of the project management documents includes all three of the triple constraints?
a. Spiderweb Diagram
b. PERT Chart
c. Gantt Chart
d. Cross-functional Diagram
e. Hierarchical Diagram - Answer-c. Gantt Chart
,1. IT has changed the manager's job in many ways. Which of the following is NOT the
result of this change?
a. Easier to make a decision
b. More information to address
c. Remote supervision
d. Real-time information - Answer-a. Easier to make a decision
2. Which of the following is TRUE?
a. IT can eliminate any job.
b. IT impacts entire industries.
c. IT opens up jobs for middle managers.
d. IT only helps improve employees' health and safety. - Answer-b. IT impacts entire
industries.
3. Which company used software to disrupt the previous market-leading companies in
the book industry?
a. Amazon
b. Barnes and Noble
c. Books-a-Million
d. Walmart - Answer-a. Amazon
4. IT changes managers' job by _________
a. providing near real-time information so managers can make quicker decisions.
b. making it easier to get all employees to work from one location.
c. decreasing the volume of information they have to process.
d. improving an employee's sense of connectedness. - Answer-a. providing near real-
time information so managers can make quicker decisions.
5. WebMD is a(n) _________ that allows doctors to ___________.
a. ERP; diagnose diseases
b. expert; diagnose diseases
c. ERP; perform long-distance surgery
d. expert; perform long-distance surgery - Answer-b. expert; diagnose diseases
6. Robots are useful ___________.
a. as companions (e.g. cyberpooches)
b. for driving cars (e.g. cyberchauffer)
c. for handling monotonous tasks (e.g. factory work)
d. only in science fiction (e.g. Terminator) - Answer-c. for handling monotonous tasks
(e.g. factory work)
, 7. IT allows the workplace to expand to 24 hours a day at _______________, which is a
benefit for ___________.
a. a central location; only employees
b. any location; only employers
c. a central location; employers and employees
d. any location; employers and employees - Answer-d. any location; employers and
employees
8. Requiring students to use a combination of a numeric passcode and their CatCard to
enter a locked door on a UA dorm is an example of approach for security control?
a. Bullwhip effect
b. Just-In-Time
c. Defense in depth
d. Disintermediation
e. Social Contract - Answer-c. Defense in depth
9. As a possible password, how many variables would the password MIS111Exam (just
the underlined string of characters) have when assessing its security strength?
a. 1
b. 2
c. 3
d. 4
e. 5 - Answer-c. 3
10. Which of the following actions would be considered a biometric authentication?
a. Requiring a user to enter a secret password
b. Requiring a user to swipe a CatCard
c. Requiring a user to scan their fingerprint
d. Requiring a user to sign their signature
e. Requiring a user to type a group of displayed letters - Answer-c. Requiring a user to
scan their fingerprint
11. Sending phishing emails that demand users respond immediately or risk losing
access to a critical resource, such as email, is an example of what?
a. Defense in Depth
b. Industrial Sabotage
c. Social Engineering
d. Advanced Persistent Threats
e. Open Source Hacking - Answer-c. Social Engineering
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Scholarsstudyguide. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €14,57. Je zit daarna nergens aan vast.