Skip to content

Quiz: HCI and Emerging Topics

Test your understanding of how IS presents itself to humans, plus a forward-looking tour of emerging IS topics.


1. Nielsen's usability heuristics are best described as:

  1. A specific software product for usability testing
  2. Ten general principles for user interface design — visibility of system status, match between system and real world, user control, and so on
  3. A set of strict legal requirements for accessibility
  4. A type of database query optimization
Show Answer

The correct answer is B. Jakob Nielsen's ten heuristics — visibility of system status, match between system and real world, user control and freedom, consistency, error prevention, recognition over recall, flexibility, aesthetic and minimalist design, error recovery, help and documentation — are general design principles widely used as an inexpensive evaluation method. They are heuristics, not laws or products.

Concept Tested: Nielsen Heuristics


2. WCAG (Web Content Accessibility Guidelines) provides:

  1. A standard set of guidelines for making web content accessible to people with disabilities, organized around the principles of perceivable, operable, understandable, and robust
  2. The exact pixel dimensions every web page must use
  3. A list of approved fonts only
  4. A specific browser plugin
Show Answer

The correct answer is A. WCAG, maintained by the W3C, organizes accessibility around four principles (POUR — Perceivable, Operable, Understandable, Robust) and three conformance levels (A, AA, AAA). It is the de facto standard referenced by accessibility laws (ADA in the U.S., EN 301 549 in the EU, AODA in Ontario). The other options misstate the guidelines.

Concept Tested: Accessibility WCAG


3. A user persona is most useful as:

  1. A real customer's full personal data
  2. A composite, evidence-based archetype representing a target user segment, used to keep design decisions grounded in real user needs
  3. A regulatory compliance document
  4. A marketing tagline
Show Answer

The correct answer is B. Personas synthesize research about real users into representative archetypes — names, goals, frustrations, contexts — that the design team can refer to when making decisions ("would Maria the night-shift nurse find this screen useful?"). A good persona is grounded in research; a bad one is a marketing fantasy that justifies whatever the team wanted to build.

Concept Tested: Persona


4. Sustainable IT (sometimes called green computing) primarily focuses on:

  1. Marketing IT services as environmentally friendly
  2. Using only recycled paper in offices
  3. Reducing the energy use, carbon footprint, and waste generated by IT operations across the lifecycle of hardware and software
  4. Replacing all data centers with on-premise servers
Show Answer

The correct answer is C. Sustainable IT addresses energy use, embodied carbon, e-waste, water use in cooling, and circular hardware lifecycles. Modern programs measure and report these metrics, often integrating them with FinOps for combined cost-and-carbon optimization. Marketing claims and surface-level changes do not capture the full discipline.

Concept Tested: Sustainable IT


5. Post-quantum cryptography (PQC) is being developed to address:

  1. The risk that future large-scale quantum computers could break widely used asymmetric algorithms (such as RSA and elliptic-curve), requiring transition to quantum-resistant algorithms
  2. The energy cost of running today's data centers
  3. The need to encrypt data faster
  4. The cost of password-reset workflows
Show Answer

The correct answer is A. PQC algorithms are designed to resist attacks from sufficiently large quantum computers, which would compromise current public-key cryptography. NIST has standardized initial PQC algorithms, and organizations are now planning crypto-agility — the ability to swap algorithms without re-architecting systems — to manage the eventual transition.

Concept Tested: Post-Quantum Cryptography


6. Edge computing for IS is most relevant when:

  1. All processing must happen in a single central data center
  2. The application has no users
  3. The organization wants to disable all local processing
  4. Latency, bandwidth, intermittent connectivity, or data sovereignty makes processing closer to the data source advantageous
Show Answer

The correct answer is D. Edge computing pushes computation closer to where data is generated — factory floors, retail stores, vehicles, IoT sensors — when central-cloud processing is too slow, too bandwidth-intensive, or constrained by sovereignty rules. The tradeoff is operational complexity and the need for fleet management. The other options misread when edge applies.

Concept Tested: Edge Computing for IS


7. A digital twin is best characterized as:

  1. A copy of an employee's user account
  2. A virtualized digital replica of a physical asset, process, or system, fed by real-time data and used for simulation, monitoring, and optimization
  3. A backup of the corporate database
  4. A type of social-media account
Show Answer

The correct answer is B. Digital twins (jet engines, factory lines, buildings, even human organs in some healthcare research) mirror physical assets in software, fed by sensor data, to enable simulation, predictive maintenance, and "what-if" analysis. They are central to Industry 4.0 strategies. The other options are unrelated.

Concept Tested: Digital Twin


8. A team designing a form considers users with low vision, screen-reader users, motor-impaired users, and users on low-bandwidth connections. The discipline that frames designing for the full range of human ability and context is:

  1. Aggressive A/B testing
  2. Inclusive design
  3. Premium user experience for high-value customers only
  4. Mobile-only design
Show Answer

The correct answer is B. Inclusive design considers the full range of human diversity — abilities, contexts, situations — and produces solutions that work better for everyone, not only those traditionally classified as "disabled." Curb cuts are a classic example: built for wheelchairs, used by parents with strollers, delivery workers, and travelers with luggage. The other options miss the principle.

Concept Tested: Inclusive Design


9. Industry 4.0 refers broadly to:

  1. The fourth release of Microsoft Office
  2. A specific factory in Germany
  3. The convergence of cyber-physical systems, IoT, AI, cloud, and analytics in industrial environments to enable smart factories and connected supply chains
  4. A type of network protocol
Show Answer

The correct answer is C. Industry 4.0 is the umbrella term for the integration of IoT, cyber-physical systems, AI, cloud, and analytics in manufacturing and industrial operations — the digitization of the factory floor. It builds on prior industrial revolutions (steam, electricity, computing) by deeply connecting physical and digital systems. The other options are not the term's meaning.

Concept Tested: Industry 4.0


10. An organization plans to migrate sensitive long-lived data that may be subject to "harvest now, decrypt later" attacks. Analyzing the chapter's framing, what is the most appropriate response?

  1. Begin a crypto-agility program: inventory cryptographic dependencies, plan transition to post-quantum algorithms for long-lived sensitive data, and ensure the architecture can swap algorithms without re-engineering
  2. Stop encrypting data, since quantum computers will eventually decrypt it anyway
  3. Delete all sensitive data immediately
  4. Do nothing — large quantum computers do not exist yet
Show Answer

The correct answer is A. "Harvest now, decrypt later" describes adversaries collecting encrypted data today to decrypt once large quantum computers arrive. For long-lived sensitive data, the rational response is crypto-agility: inventory current cryptography, plan a phased transition to post-quantum algorithms, and architect systems to allow algorithm swaps. Doing nothing or removing encryption are not defensible responses.

Concept Tested: Crypto Agility