MIS 111 exam 3 (PAR + ICQ)
Due to the curvature of the earth, microwave towers generally cannot be spaced more than about how many kilometers apart?
48
Approximately ____ percent of consumers consult reviews before making an online purchase
50
When deployed, the Irridium satellite telephone network was based on a constellation of 66 satellites. However, how many operational satellites were originally proposed for the original constellation? (Hint the name Irridum was selected due to this number.)
77
What type of tag directive is used with an IMG (image) directive to improve accessibility?
ALT
what type of tag directive is used with an IMG directive to improve accessibility
ALT
one of the origins of the internet was the result of a project by US government agency
ARPA - advanced research project agency
During which phase of the website transformation processwould the project team for developing perform content analysis, layout the website using wireframes, and define a consistent visual design?
Developing site structure
When adding your icon to your ABP-3B website, what section should you add the link directive to your icon file?
HEAD
Which of the following terms is used to measures the frequency of analog signals?
Hertz
_______ consists of 32 bits and is the most commonly used IP addressing scheme
IPv4
In the assigned reading for project management, what type of diagram was used to map the impact of a problem using the axes "Impact" and "Likelihood" that you also used in Applied Business Project 2?
I^2 Diagram
the ______ is a network of networks
Internet
________ are exchange points for internet traffic
NAP
Which of the following is the technology that enables most mobile wallet applications?
NFC
which of the following is the technology that enables most mobile wallet applications
NFC
What is the name of the device that of the physical device that interfaces computers with a local area network (LAN)?
Network Interface Card (NIC)
what type of website file contains software that is executed by the browser on the user's computer
PHP
which type of website file contains software that's executed on the host before sending the results to the browser
PHP
what type of hack occurs when a web form allows a database command........
SQL injection
[LAWS] Bandwidth is the transmission capacity of a network, stated in bits per second. Which of the following "laws" we've discussed determines the maximum bandwidth (signallin rate) of a given type of communication media (e.g., copper cable, fiber optic, etc.)?
Shannons law
In the assigned reading, the acronym SMART was suggested as a way to remember the characteristics needed when defining requirements. Which letter focused on the ability of the project team to prove that a requirement has been satisfied and delivered?
T
What British Scientist invented the World Wide Web in 1989 while working at CERN (European Organization for Nuclear Research) in 1989?
Tim Berners-Lee
which of these is NOT enumerated as a Motivation to Create Accessible Web Content
To improve the reliability of technical functionality
Select the answer below that orders the media correctly from the lowest to highest bandwith (data rates).
Twisted pair, coaxial cable, fiber optics
which of the following is a short-range wireless network
UWB
_______ are non contagious networks
WAN
the internet is a ______
WAN
Select the answer the correctly orders the types of computer networks in terms of area span of coverage from largest to smallest?
WAN, MAN, LAN, PAN
Bobbejaanland family park implemented _____ technology to track its customers
WIFI
The four guiding principles of accessibility (perceivable, operable, understandable, and robust) are included in what document?
Web Content Accessibility Guide, Version 2.0
what does the "%20" represent in an src directive
a space character
In the assigned reading, Don Norman makes the case for viewing conceptual models as what?
a story in context
The following "img" directive uses what type of addressing? <img src="file://C:/Users/Patton/Pictures/NistFigure2.PNG " width="2612" height="1746" alt="Security"/>
absolute
many experts believe _______ is the solution to the challenge of making money from social networking sites and social commerce sites
advertising
what POUR design recommendation might create security risks for banking systems and online testing environments
allowing users unlimited time to complete tasks
the human voice is a
analog signal
what is the importance of the triple constraints / the Scope Triangle
any changes to one constraint will likely affect another constraint
an example of a ______ protocol is SMTP
application
What issue that would normally be considered an impairment for wireless communications serves as the basis for spatial multiplexing
attenuation
bandwidth is stated in ______ per second
bits
What low-power, non-directional wireless technology is used to create small personal area networks for cell phones and portable music players
bluetooth
_______ is access to the internet through your TV cable
cable modem
the expansion of telecommunications infrastructure occurred. primarily during which era of globalizations as described by Thomas Friedman
companies
What term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding?
conceptual model
what term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reason for understanding
conceptual model
What is the name of software that allows publishing, editing, and modifying content from a central interface, providing procedures to manage workflow in a collaborative environment?
content management system
what is the name of software that allows publish, editing, and modifying content from a central
content management systems
wordpress, joomla, drupal are examples of what type of system
content management systems
the main drawback to google fiber is
cost
What term is used to describe the set of tasks that must be completed as scheduled in order to ensure the delivery of your project on time?
critical path
What term did the textbook author use to describe when the functions of many physical devices are included in one other physical device?
dematerialization
modern smartphones exhibit a process called _______, which means the functions of many physical devices are included in one other physical device
dematerialization
which of the following is not a broadband
dial up
What term is used to describe an individual who was born after the widespread adoption of digital technology and have grown up using technology like the Internet, computers and mobile devices?
digital native
_____ offer limited accessibility to the _____ of participating companies
extranets, intranets
Which of the following types of wire media has the highest physical security?
fiber optic cable
which type of media is least likely to be affected by electronic noise
fiber optic cable
Which of the project management documents includes all three of the triple constraints?
gantt chart
what tool is commonly used to track how, when and from what location users are using websites
google analytics
how does this wall safe provide a safe hiding spot
hidden affordance
what affording tissue is the label "PUSH" addressing
hidden affordance
what string within this "IMG" tag makes this absolute addressing for the image
http:// ..... in alt
Most users of these salt-and-pepper shakers would most likely depend on information from what level of the McGinn hierarchy?
human sensory perception
From Don Norman's perspective, what fatal flaw does the BMW iDrive have with respect to its human interface
iDrive destroyed spatiality
what is the correct filename for your ABP-3A website
index.html
what transportation infrastructure was discussed in class that guided the decision the placement of the long-haul fiber-optic cable infrastructure
inter continental railroads network
the ______ functions as a transport mechanism ; the _______ is an application
internet, WWW
the web _____ the same thing as the internet
is not
What is the name of the wireless technology that is designed to be embedded in mobile devices such as cell phones and credit cards allowing you to pay for items by waving your card within a few centimeters of a point-of-sale terminal?
near field communication
_______ enables secure communications over the internet using VPNs
none?
What name is used to describe results found when a search engine algorithm analyzes all the pages across the web in an unbiased way and reports the pages considered to contain the most relevant information for your search terms?
organic
Which of the POUR principles focuses on the concept that web accessibility is based upon the assumption that people need to be able to input the information into their brain so that they can process it?
perceivable
what is an affordance
physical property of an object that shows
In the assigned reading on accessibility, the authors note that while WCAG 1.0 focused on the techniques for accomplishing accessibility, WCAG 2.0 focused on what?
principles of accessibility
the transmission control protocol addresses all of the following issues related to the transmission of data using packets switched networks, EXCEPT
privacy for user's message content
what is the name of the directory where the files for your websites for ABP-3A and ABP-3B will be stored on the U.arizona.edu web server
public_html
Industry analytsts expect that 5th generation networks will be defined by three characterisitcs over 4th generation cellular networks. Which of the following would is not one of the expected changes?
reduced signal attenuation
______ transmission systems can have a large coverage area but their signals experience propagation delay
satellite
What is the purpose of a PERT chart
schedule and organize tasks
in project management, the "iron triangle" or "triple constraint" includes a project's time, resources and what other dimension of the planning process
scope
the guidelines for MIS 111 lab projects are examples of which of the triple constraints
scope
What term is used to describe the very common tendancy for projects to accumulate new functionality to fulfil the requirements of project stakeholders?
scope creep
the biggest problem with using wireless networks is
security
As I move farther away from campus, my connection to UAWiFi gets weaker. What will always cause this to occur?
signal strength has limited power
In the NASA project management video case, what did the speaker indicate was the greatest risk he faced in managing projects for NASA
social and political risk
Which of the following is used to conduct market research
social intelligence
social ______ is the monitoring, collection, and analysis of socially generated data to make strategic decisions
social intelligence
_______ networks are an emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks
software denied networks
A disadvantage of a microwave transmission system is ____________.
susceptible to environmental interference
Which of the following is an example of using twitter for market research
take advantage of the tools that enable you to find people in the industries in which they operate
which of the following is an example of using Facebook for market research
test-market your messages, giving people 2-3 options and asking fans which one they prefer and why.
Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project?
the project milestones and the order they are scheduled to be completed
______ is the amount of bandwidth actually available for you to use
throughput
the _____ layer of TCP/IP is responsible for addressing, routing, and packaging data packets
transport
What is the name of the criterion of intelligence where depends on the ability of a computer program to impersonate a human in a real-time written conversation with a human judge, sufficiently well that the judge is unable to distinguish reliably—on the basis of the conversational content alone—between the program and a real human?
turing test
________ is the most prevalent form of communications wiring
twisted pair wiring
according to the textbook, ______ is the most widely available cabe medium
twister pair
many GM owners used _____ to share tips and put pressure on GM to provide better customer service
what type of content on the web is growing the fastest
videos