Two-Factor Authentication Video: Two-factor Authentication (2FA) protects your account login
from being hacked through what method? correct answers 2FA Requires hackers also have your
physical device (second factor)
What term is used to describe a pre-printed list of NetID+ authentication codes that can be used
when your Duo App cannot be used for authentication? correct answers Bypass codes
What term is used to describe a pre-printed list of NetID+ passcodes that you can use if the
DuoMobile app is not working? correct answers Bypass Codes
Which of the following terms describes a segment of computer code that requires user action to
perform malicious actions by attaching to another computer program? correct answers virus
Ensuring that the entire organization takes security policies and procedures seriously and
determining whether employees are following security procedures are related to what factor
related to managing the vulnerability of an organization's information resources? correct answers
Management Support
When considering the question "What is MIS?", what business dimension must be considered in
order for an MIS professional to design a safe entry system for a residence halls using a
networked database of residents and CatCard scanners? correct answers Cybersecurity
What term is used to describe when information or systems are used beyond their stated
objectives? correct answers Mission Creep
Generating over $11 billions dollars through streaming services, record label receive
approximately how much revenue each time a song is streamed? correct answers About 0.3 cents
Notwithstanding that many books are now electronic (or digital) products, in 2020, physical
books still accounted for approximately what percent of total book sales? correct answers 81
percent
How have manufacturers used IT to enhance the accessibility of Web and graphical user
interfaces to provide opportunities for individuals with disability related to impaired vision?
correct answers Adding audible screen tips
Which UofA MIS Researcher developed a system to use anonymized WiFi Data to identify
person-density in buildings and spaces at the University using temporal and spatial data to help
fight Covid-19? correct answers Dr. Sudha Ram
,Commonly used in the field of broadcast television videography, what technology, also called
chroma-key technology, creates the special effect of layering images together in a way that
allows a video journalist to appear to be in another location by replacing their background with
another setting? correct answers Green Screen
Based on the Table of Disruptive Technologies developed by the Imperial College London,
which of the following themes include precision agriculture, smart energy grid, broadcasting of
electricity, and space solar power? correct answers Smart Planet (SP)
Developed by the Imperial College London, the Table of Disruptive Technologies classifies
technologies on two dimensions: Time Horizon and what other dimension? correct answers
Potential for Socio-Economic Disruption
In an attempt to counter the increasing popularity of the "rent instead of own" designer fashion,
what approach have many designer labels (companies) adopted? correct answers The designer
labels threatened to boycott retailers by withholding products from anyone working with
RentTheRunway
Cyber-Physical System (CPS) engage with "real space" through interactions with all of the
following EXCEPT: correct answers Augmented Reality
Led by their Chief Scientist Mark Weiser, what organization was one of the first groups to
explore Ubiquitous Computing? correct answers Xerox PARC (Palo Alto Research Park)
As augmented reality was explored at Xerox PARC (Palo Alto Research Center), which of the
following was NOT one of the dimensions of context-aware interaction? correct answers Privacy
Which of the following was NOT discussed as an essential factor related to the rapid deployment
of the IOT (Internet of Things)? correct answers Ability of IOT sensors to be added to massive
botnets easily
Which of the following was NOT identified as a reason that IOT (Internet of Thing) security
should be a concern? correct answers If an IOT sensors fails, then another one can pick up the
data
According to IOT Innovation Lab video case, one of The Hartford's two main strategic
objectives for IOT devices is to help it predict, prevent, detect and mitigate what? correct
answers Insurance losses
As described by CapGemini, what aspect of smart products used an Industry 4.0 environment
would focus on using sensor technology to give access to condition information regarding
products and their environment? correct answers Aware
In the A Day with IOT video case, connected IOT (Internet of Things) devices are able not only
to react intelligently with the user but also to refine their behaviors by doing what? correct
answers Sharing data with other devices
, Which of the following dimensions of the Internet of Everything (IOE) focuses on delivering the
right information to the right person (or machine) at the right time? correct answers Process
The increasing number of connected IOT (Internet of Things) devices has increased security
challenges in all of the following areas EXCEPT: correct answers DDOS (Distributed Denial of
Service) Attacks
Which of the following terms is determined by subtracting the cost of producing an item (e.g.,
cost of goods sold, or COGS) from the revenue received from selling a product? correct answers
Gross Margin
With respect to financial accounting, the term equity is used to describe the ownership of a
company. Which of the following concepts would NOT be another term related to a company's
"equity" in this context? correct answers Market value
From an accounting perspective, what term is used to describe the value of anything you own?
correct answers Asset
What financial statement reports cash receipts and payments over a period with respect to a
company's operational, investing, and financial activities? correct answers Statement of Cash
Flows
Which of the following responsibilities is managed exclusively by a company's financial
accounting business function? correct answers Accounting and Statements
What ethical framework is based on the tenant "Assume that virtually all tangible and intangible
objects are owned by someone unless there is a specific declaration otherwise"? correct answers
Ethical "No Free Lunch Rule"
What term is used to describe the ethical theory that anything held in common that can be used
by all freely without regulation will naturally result in everyone will attempt to maximize his
own benefit to the detriment of the shared community resource? correct answers Tragedy of the
Commons
What term is used to describe a collection of principles developed by many companies and
professional organizations and intended to guide decision making by members of the
organization? correct answers Code of Ethics
_________ issues involve the authenticity, fidelity, and correctness of information that is
collected and processed. correct answers Accuracy
_________ issues revolve around who should have access to information and whether companies
can charge a fee for permitting access to the information. correct answers Accessibility
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.99. You're not tied to anything after your purchase.