MIS 111 Exam 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

Bitcoin keeps track of it's ledger showing who owns what bitcoin using what technology? A. A Client Server network B. A Private BlockChain C. A relational database D. A Public BlockChain

A Public BlockChain

The advantage of ________ is they can be read over greater distances. A. Passive RFID tags B. WSNs C. QR codes D. Active RFID tags

Active RFID tags

Which of the following would NOT be a motivation for an NFL team to consider using virtual reality training as part of its player development program? A. Allowing players to create their own plays and practice schedules B. Using the technology to "picking up half a coach" C. Providing value in recruiting by letting recruits virtually stand in a locker room with potential teammates D. Teaching incoming freshmen and preparing backup players

Allowing players to create their own plays and practice schedules

Why are NFL teams beginning to use immersive virtual reality experience that makes players feel and think as if they are actually on the practice field? A. Allows players to evaluate possible stadium designs for distractions when playing an actual game B. Allows young players additional time to learn the playbook quickly and thoroughly without having "two-a-day" practices C. Allows fans to watch teams practice sessions online D. Allows grounds workers additional time to improve the playing fields of the league

Allows young players additional time to learn the playbook quickly and thoroughly without having "two-a-day" practices.

What is the importance of the triple constraints/ the Scope Triangle? A. Time, resources, and scope don't matter B. Security is the most important constraint C. Any changes to one constraint will likely affect another constraint D. You must funnel all resources into only one of the constraints

Any changes to one constraint will likely affect another constraint

________ is access to the internet through your TV connection. A. Cable modem B. FTTH C. DSL D. Dial-up

Cable Modem

The design of connectors consider the speed of the communication interface, the function being supported, and what other concept related to human-computer interface design? A. Constraints to improve reliability B. Hidden affordances for security C. Cultural design standards D. Operational and functional causality

Constraints to improve reliability

When backing up your assignment files to the cloud using Arizona.box.com, you are using what? A. End-user Device B. Local Equipment C. Local-Loop/ISP D. Content Service

Content Service

One of the origins of the internet was the result of a project by which US government agency? A. NASA B. DARPA C. NSA D. NSF

DARPA

________ is a privacy policy guideline for Data Collection. A. Data should be kept current, where and when necessary B. Third parties should not be given access to data without the individual's knowledge or permission, except as required by law C. Data should not be disclosed for reasons incompatible with the business objective for which they are collected D. Data should be adequate, relevant, and not excessive in relation to the business objective

Data should be adequate, relevant, and not excessive in relation to the business objective

A blockchain is really just a what? A. Trusted third party B. Cryptocurrency C. Distributed Ledger D. Peer-to-Peer network

Distributed Ledger

Officially called Directive 2009/136/EC, what other name is used for the EU mandate that websites to obtain informed consent before they can store or retrieve information on a visitor's computer or web-enabled device. A. General Data Protection Regulation B. EU Comprehensive Cybersecurity Act C. EU Cookie Law D. EU Safe Harbor Act

EU Cookie Law

Which of the following types of guided media has the highest level of physical security from eavesdropping? A. CAT-3 Cable B. CAT-5 Cable C. Coaxial Cable D. Fiber Optic Cable

Fiber Optic Cable

What is the name of the University of Arizona's primary career management tool that offers UA students and alumni access to jobs, internships, and a range of other services. A. eSMS B. Uaccess C. Handshake D. D2L

Handshake

What term is used to describe a function that uses an algorithm to convert an input of letters and numbers into an encrypted output of a fixed length? A. Transaction B. Hash C. Blockchain Fork D. Data Miner

Hash

Bitcoin's ledger technology is quite complex to prevent fraud, and example of which is given in the paper, what was the example and how did it work? A. It was a 'Double Spend' where the hacker paid two merchants the same bitcoin at the same time and hence doubled their money. B. It was through 'Bitcoin Theft' where a hacker paid a merchant with bitcoins that actually belonged to a different party. C. It was a 'reverse spend' where hackers paid merchants in a bitcoin that didn't actually have underlying value and hence was later reversed. D. It was a 'Double Spend' where the hacker paid a merchant and themselves then invalidated the merchant payment.

It was a 'Double Spend' where the hacker paid a merchant and themselves then invalidated the merchant payment.

CAT-3, CAT-5, Coaxial, and Fiber Optic Cable are all examples of what? A. Transmitters B. Media C. Protocols D. Messages

Media

________ is a small, portable wireless device that provides users with a permanent Wi-Fi hotspot wherever they go. A. Wi-Fi Direct B. MiFi C. Super Wi-Fi D. WiMAX

MiFi

Which of the following is the technology that enables most mobile wallet applications? A. NFC B. AFC C. ERP D. VRP

NFC

According to IS's about Business 3.4 ______ does NOT offer usage- based automobile insurance. A. State Farm B. Nationwide C. Allstate D. Progressive

Nationwide

Who can submit new transactions to Bitcoin's Ledger? A. Accredited bankers B. Government regulators C. Open, Pseudonymous contributors D. Trusted pre-vetted participants

Open, Pseudonymous contributors

What is an affordance? A. Being able to pay for something B. Safety of users and of data C. How well the user likes the interface D. Physical property of an object that shows functionality

Physical property of an object that shows functionality

What term is used to describe the temporal chronology of the ownership, custody or location of a historical object? A. Consensus B. Replication C. Provenance D. Immutability

Provenance

________ clouds are shared, easily accessible, multicustomer IT infrastructures that are available nonexclusively to any entity in the general. A. Private B. Vertical C. Hybrid D. Public

Public

Which of the following is NOT a basic function of TCP/IP? A. Manages the movement of data packets between computers by establishing a connection between the computers. B. Responsible for disassembling, delivering, and reassembling data during transmission. C. Sequences the transfer of packets D. Acknowledges the packets have been transmitted

Responsible for disassembling, delivering, and reassembling data during transmission.

What is the purpose of a PERT chart? A. Find where Product Enhancement, Research, or Training is needed B. View the organizational structure of a company C. Review the Triple Constraint D. Schedule and organize tasks

Schedule and organize tasks

What other collaboration technology that was discussed in class is conceptually similar to Raytheon's CAVE? A. Telepresence B. Executive Dashboards C. Group Decision Support Systems D. Data Mining

Telepresence

Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project? A. Individual work assignments for persons assigned to the project B. Whether the major project milestones are being completed on budget C. The quality of the work performed during each major project milestone D. Whether project tasks have been organized in the most efficient order E. The project milestones and the order they are scheduled to be completed

The project milestones and the order they are scheduled to be completed

Which of these is NOT enumerated as a Motivation to Create Accessible Web Content? A. To improve the reliability of technical functionality (technology centered motivations) B. To avoid lawsuits an/or bad press (public relations and punishment-centered motivation) C. To improve the lives of people with disabilities (human-centered motivations) D. To capitalize on the wider audience or consumer base (marketing or economic-centered motivations)

To improve the reliability of technical functionality (technology centered motivations)

Common themes of a blockchain generally include everything but what? A. Uses cryptography and digital signatures to prove identity B. Usually exists over a client-server network C. Usually contains financial transactions D. Is replicated across a number of systems in almost real-time E. Has mechanisms to make it hard to change historical records

Usually exists over a client-server network

The internet is a ________. A. MAN B. WAN C. LAN D. PAN

WAN

________ are networks that aren't contiguous. A. MAN B. WAN C. LAN D. PAN

WAN

The four guiding principles of accessibility (perceivable, operable, understandable, and robust) are included in what document? A. Section 508 of the Rehabilitation Act B. Web Content Accessibility Guide, Version 1.0 C. Web Content Accessibility Guide, Version 2.0 D. Americans with Disabilities Act

Web Content Accessibility Guide, Version 2.0

________ can perform a wide variety of tasks from automating business processes to integrating components of an enterprisewide system to streamlining online buying and selling. A. Vertical clouds B. LANs C. Web services D. RLMs

Web services

With respect to maximum operating range, what is the correct order of the following technologies from maximum to minimum range? A. RFID, WiFi, NFC, Bluetooth B. WiFi, Bluetooth, RFID, NFC C. Bluetooth, RFID, WiFi, NFC D. WiFi, RFID, NFC, Bluetooth

WiFi, Bluetooth, RFID, NFC

According to IT's About Business 6.1, Eriteans who have access to the internet typically use ________. A. dial-up B. fiber C. cable D. DSL

dial-up

The web ________ the same thing as the internet. A. is not B. could be C. I don't know D. is

is not

The _____ prohibits an organization from collecting any personal information unless the customer specifically authorizes it. A. digital dossier policy B. opt-in model of informed consent C. opt-out model of informed consent D. information privacy policy

opt-in model of informed consent

A disadvantage of a microwave transmission system is ________. A. susceptible to environmental interference B. creates electrical interference problems C. signals experience propagation delay D. none of these options

susceptible to environmental interference

________ cellular networks use digital signals and can transmit voice and data at different speeds based on how fast the user is moving; it supports video, web browsing, and instant messaging. A. 1G B. 2G C. 3G D. 4G

3G

_______ is an autonomous device that monitors its own condition as well as physical and environmental conditions around it; it is an underlying technology of __________. A. RFID; a wireless sensor B. The IoT; a wireless sensor C. A wireless sensor; the Iot D. A wireless sensor; RFID

A wireless sensor; the IoT

What term was used to describe ensuring that how you position yourself professionally in a way that attuned to a company's environment? A. Alignment B. Backgrounding C. Personalizing D. Targeting

Alignment

What was a major consideration when selecting the paths (routes) for the physical media used for guided media? A. Right-of-way B. Geographical C. Political Boundaries D. All of the above

All of the above

Why are there so many different physical connector types? A. The function (serial, parallel, video) often defines the number of signals required B. Different symbols, shapes and sizes improves reliability when connecting devices C. Connector design evolves as technology demands faster communication speed D. All of the above

All of the above

Anything that is capable of being owned or controlled to produce value would be considered as? A. A Hash B. An Asset C. A Ledger D. A Contract

An Asset

Which of the following is not one of the dimensions of the Internet of things? A. Any PLACE B. Any SECURE C. Any THING D. Any TIME

Any SECURE

What impairment for wireless communication actually serves as the basis for spatial multiplexing? A. Interface B. Attenuation C. Multi-path D. Distortion

Attenuation

What is the name of the modeling system developed by Raytheon that uses stereoscopic 3-D (S3D) and augmented reality technologies? A. STEM (Stereoscopic-Technology Engineering Models) B. VDC (Virtual Design Space) C. CAVE (Cave Automatic Virtual Environments) D. iSpace Design Studio (IDS)

CAVE (Cave Automatic Virtual Environments)

Which of the following previously discussed Supply Chain technologies would likely be used to replenish an item when an IOT sensor reports that the item has been sold? A. SCOR B. CPFAR C. Six Sigma D. MRP-II

CPFAR

Xerox PARC's Unicomp was a precursor to which of the following topics also discussed in class? A. Globalization B. Entrepreneurship C. Collaboration D. Sustainability

Collaboration

The expansion of telecommunications infrastructure occurred primarily during what era of globalization, as described by Thomas Friedman? A. Countries B. Companies C. Individuals

Companies

What term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding? A. Semiotic Engineering B. Emotional design C. Design Intention D. Conceptual Model

Conceptual Model

________ satellites are the most expensive to build and launch. A. SEO B. LEO C. GEO D. MEO

GEO

Which of the project management documents includes all three of the triple constraints that are in the Scope Triangle? A. Spiderweb Diagram B. Cross-functional Diagram C. Hierarchical Diagram D. PERT Chart E. Gantt Chart

Gnatt Chart

_________ is an advantage of coaxial cable. A. Cost B. High bandwidth C. Security D. Easy to work with

High Bandwidth

The EcoReps Dashboards installed in residence halls are an example of what layer in the IoT model? A. Sensing and Identification B. Network Construction C. Information Processing D. Integrated Application

Integrated Application

What problem might occur when you operate WiFi networks, Bluetooth headsets, baby monitors, and garage door openers all using the same 2.4GHz ISM frequency range in close proximity to one another? A. Attenuation (signal loss) B. Multi-path (echoes) C. Interference (noise) D. Distortion (signal alteration)

Interference

The ________ is a network of networks. A. Extranet B. None of these options C. Intranet D. Internet

Internet

From lowest to highest, what is the correct order of these satellite types with respect to the altitude of their orbit (LEO, MEO, GEO) A. Irridium, DishTV, GPS B. GPS, Irridium, DishTV C. Irridium, GPS, DishTv D. DishTV, GPS, Irridium

Irridium, GPS, DishTV

According to IT's About Business 6.2, Google Fiber was first deployed in ________. A. Atlanta B. San Diego C. Kansas City D. Charlotte

Kansas City

Which of the following wireless issues would NOT be a problem for short range wireless communications technologies, such as RFID and NFC? A. Attenuation B. Interference C. Line-of-sight D. Multi-path

Line-of-sight

In general, what you think of as quality of your network connection speed when you are using your PC, iPad, or Smartphone is most influenced by which of the following? A. Backbone Tier-1 ISPs B. Regional Tier-2 ISPs C. Local Tier-3 ISPs

Local Tier-3 ISPs

What term is used to describe the information collected describing the action (i.e., location, time, place, etc.) as opposed to the data itself? A. Hashtagging B. Metadata C. Entities D. Packets

Metadata

_________ are exchanging points for Internet traffic. A. ISP's B. IAP's C. NAP's D. NSP's

NAP's

________ is the right to be left alone and to be free of unreasonable personal intrusions. A. Privacy B. Information privacy C. Profiling D. A digital dossier

Privacy

The Transmission Control Protocol (TCP) address all of the following issues related to the transmission of data using packets, EXCEPT: A. Packets being lost during transmission B. Receiving Packets out of message order C. Privacy for user's message content

Privacy for user's message content

What term is used to describe the original consensus algorithm in a blockchain network that is used to confirm transactions and produce new blocks to the chain? A. Immutability B. Cryptography C. Provenance D. Proof-of-Work

Proof-of-Work

The mythical man month focuses of which of the triple constraints?

Resources

In project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resources and what other dimension of the planning process? A. Agility B. Value C. Scope D. Feasibility E. Alignment

Scope

________ requires massive amounts of electrical power, air conditioning, backup generators, and security. A. Utility computers B. Virtualized servers C. Self-Service mainframes D. Server farms

Server farms

Which of the following "laws" we've discussed determines the maximum bandwidth of a given type of communication media. A. Moore's Law B. Gilder's Law C. Metcalf's Law D. Shannon's Law

Shannon's Law

Which of the following multiplexing approaches increases the total bandwidth available to users? A. Frequency Division Multiplexing B. Time Division Multiplexing C. Spatial Division Multiplexing

Spatial Division Multiplexing

From Don Norman's perspective, what fatal flaw does the BMW iDrive (which he described as a well thought out, very logical, and sensible device) have with respect to human interface? A. The iDrive did not have a hierarchical menu structure B. The iDrive destroyed spatiality C. The iDrive used a confusing set of control knobs D. The iDrive only controlled the driving-related functions

The iDrive destroyed spatiality

Along with many engineering applications, which of the following VR applications would NOT be primarily focused on allowing clients to engage with new designs before making a purchasing or design decision? A. Retail B. Training C. Real estate D. Architectural design

Training

The right of privacy ________ absolute. A. is B. is not C. cannot be D. can be

is not


Conjuntos de estudio relacionados

Chapter 5: Competitive Advantage, Firm Performance, and Business Models

View Set

Chem 1220: Thermodynamics, Electrochemistry, and Nuclear Chemistry

View Set

Chapter 49.1 Disorders of the Pituitary EAQ

View Set

2.3 Definitions and Their Purposes - Terminology

View Set