WAS HOOD NIGGERS

Is this your test? Login to manage it. If not, you can develop an assessment just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
match the action taken by a business with their innovation category:

Adding fingerprint scanning to the iphone 5 product
2.
1 point
n our discussion of the “Democracy Online” framework, what group should take responsibility for providing information about positions, candidates, and advocacy efforts, and work to involve supporters through online interactive spaces?
3.
1 point
As described by Democracies Online, what role does the private sector have in fostering an active and interactive public commons?
4.
1 point
In the business world, how would a company use the ethical survey you completed in class?
5.
1 point
As a possible password, how many variables would the password MIS1113x@m have when assessing its security strength?
6.
1 point
Approximately what percentage of applications for jobs are rejected by potential employers before the interview due to public information posted online by the applicant (e.g. social networking, blogs, media sites, etc. – that is, your online reputation)?
7.
1 point
In the video case that discussed a recent market crash that was caused by high-volume automated stock trading computer systems, what action caused the sudden stock sell-off?
8.
1 point
Dr. Jay Nunamaker, Regents Professor and founding chair of the MIS Department, described MIS as a discipline focused on doing what for business?
9.
1 point
As discussed by Dr. Gilliland, David Myers’ (former controller of MCI/Worldcom) statement “I still don’t know that one point when I started to cross the line...”, is an example of how small, incremental repeated compounding of unethical decisions can result in what?
10.
1 point
What free service delivers emergency information to registered UA students, faculty and staff – as well as their friends and family – via their cell phones, mobile devices and/or email accounts during a campus emergency?
11.
1 point
In the video case regarding tracking customers while they were shopping in a store, how were the customers’ movements being tracked?
12.
1 point
What action did Stacy Snyder take that resulted in her losing her job?
13.
1 point
What financial reporting document provides a financial snapshot of a company at a given point in time with respect to assets, liabilities, and shareholder equity?
14.
1 point
Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what?
15.
1 point
match the action taken by a business with their innovation category:

Microsoft acquiring Nokia's existing phone products
16.
1 point
On the balance sheet, total assets minus total liabilities must equal what?
17.
1 point
The Eller “GoodCat” website that allows for anonymous reporting of unethical behavior in Eller classes uses what business model?
18.
1 point
Allowing individuals to file tax returns, renew driver’s licenses, and obtain various permits online is an example of what type of eGovernment?
19.
1 point
match the action taken by a business with their innovation category

Apple introducing ipads as an alternative to laptops
20.
1 point
match the action taken by a business with their innovation category:

Governments being more effective using online systems
21.
1 point
A company’s “ticker” or stock symbol serves what role on a stock trading exchange?
22.
1 point
How are social media screening services such as companies like “Social Intelligence” used in the hiring process?
23.
1 point
match the action taken by a business with their innovation category:

Microsoft acquiring Nokia's existing phone products
24.
1 point
What type of authentication about the cardholder (you) occurred when you swiped your UofA CatCard to record your attendance as your entered the MIS 111 Exam today?
25.
1 point
In class, we discussed how digital photos now include “metatdata” (embedded information along with the photo). Metadata about the latitude and longitude of where a photo was taken in the digital image file is known as what?
26.
1 point
Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control?
27.
1 point
As discussed by Dr. Gilliland, the classic values conflict with “Who Am I’” represents what type of ethical dilemma?
28.
1 point
A stock’s “beta” provides an investor what type of information about the company’s stock?
29.
1 point
What normative theory of ethics focuses on the belief that managers actions should be guided by the understanding that they are entrusted with a responsibility to manage and protect the assets of the company for the benefit of all of those who are impacted by the actions and financial results of the firm?
30.
1 point
As described by Democracies Online, what role does the private sector have in fostering an active and interactive public commons?
31.
1 point
The Gainesville Police Department P2C (Police-to-Citizen) website uses visualization tools that allow citizens to help themselves in what way?
32.
1 point
Which of the following actions would be considered a biometric authentication?