MIS 111 PAR/ICQ Exam 3
[PERMISSIONS] If you go to your web page and it says "Forbidden - You don't have permission to access /~<yourNetId>/ on this server", you most likely, you will need to change the permissions on your public_html directory or index.html file to which of the following?
"rwxr-xr-x"
The NotPetya Cyberattack caused how much in damage around the world?
10 Billion
[PORT] What is the correct "port" to use for your secure shell connection when transferring files to the U.Arizona.edu web server?
22
[Curvature] Due to the curvature of the earth, microwave towers generally cannot be spaced more than about how many kilometers apart?
48
[Irridum] When deployed, the Irridium satellite telephone network was based on a constellation of 66 satellites. However, how many operational satellites were originally proposed for the original constellation? (Hint the name Irridum was selected due to this number.)
77
Bitcoin keeps track of it's ledger showing who owns what bitcoins using what technology?
A Public BlockChain
What does the "%20" represent in an src directive?
A Space Character
In the assigned reading, Don Norman makes the case for viewing conceptual models as what?
A story in context
What term is used to describe the marketing analysis where two versions of a web page are compared to see which one gives a better conversion rate for similar visitors at the same time?
A-B (or Split) Testing
How many points are ABP-3A and ABP-3B worth respectively?
ABP-3A is worth 10 points and ABP-3B is worth 90 points
[Accessibility] What type of tag directive is used with an IMG (image) directive to improve accessibility?
ALT
According to the "IOT Changes Everything" video case, one of the challenges limiting the widespread deployment of IOT is the transitioning to IPv6. What is the value of using IPv6 to IOT?
Ability to uniquely address billions of IOT devices
The following "img" directive uses what type of addressing? <img src="file://C:/Users/Patton/Pictures/NistFigure2.PNG " width="2612" height="1746" alt="Security"/>
Absolute
The advantage of ________________ is they can be read over greater distances.
Active RFID tags
What is the importance of the triple constraints / the Scope Triangle?
Any changes to one constraint will likely affect another constraint
Anything that is capable of being owned or controlled to produce value would be considered as what?
Asset
What low-power, non-directional wireless technology is used to create small personal area networks for cell phones and portable music players?
Bluetooth
________________ is access to the internet through your TV connection.
Cable modem
What Nuclear Remediation Site had their computers wiped clean by NotPetya?
Chernobyl
In the Accenture video case, the presenter emphasizes that project managment is not about lists and linear relationships, but rather about managing what?
Complex inter-relationships
What term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding?
Conceptual model
When we discussed the design of network infrastructure, we noted that the design of connectors on computers we generally related to the speed of the communication interface, the function being supported (number of signals required), and what other issue related to human-computer interaction?
Constraints to improve reliability
What is the name of software that allows publishing, editing, and modifying content from a central interface, providing procedures to manage workflow in a collaborative environment?
Content Management Systems
What term is used to compare the number of closed sales to the the total number of website visitors? For example, if an ecommerce site receives 200 visitors in a month and has 50 sales, this term would be calculated as 50 (sales) divided by 200 (visits), or 25%.
Conversion rate
[TASKS] What term is used to describe the set of tasks that must be completed as scheduled in order to ensure the delivery of your project on time?
Critical Path
What term did the textbook author use to describe when the functions of many physical devices are included in one other physical device?
Dematerialization
During which phase of the website transformation processwould the project team for developing perform content analysis, layout the website using wireframes, and define a consistent visual design?
Developing Site Structure
Which of the following is NOT broadband?
Dial-up
What term is used to describe an individual who was born after the widespread adoption of digital technology and have grown up using technology like the Internet, computers and mobile devices?
Digital Native
A blockchain is really just a what?
Distributed Ledger
What type of repeater has the greatest throughput
Double Radio
________ refers to efforts by unauthorized users to access data that are traveling over wireless networks.
Eavesdropping
What type of home ISP connection is typically the fastest
Fiber
Which of the following types of wire media has the highest physical security?
Fiber-optic cable
Which of the project management documents includes all three of the triple constraints that are in the Scope Triangle?
Gantt Chart
[WEBSITE USE] What tool is commonly used to track how, when and from what location users are using website?
Google Analytics
When adding your icon to your ABP-3B website, what section should you add the link directive to your icon file?
HEAD
________ defines how messages are formulated and how their receivers interpret them.
HTTP
What term is used to describe a function that uses an algorithm to convert an input of letters and numbers into an encrypted output of a fixed length?
Hash
[MEASUREMENT] Which of the following terms is used to measures the frequency of analog signals?
Hertz
What is the name of the collaborative effort to advance Blockchain technology by identifying and addressing important features for a cross-industry open standard for distributed ledgers that can transform the way business transactions are conducted globally?
Hyperledger Project
________ consists of 32 bits and is the most commonly used IP addressing scheme.
IPv4.
The adoption of __________ has been an important factor in the development of the Internet.
IPv6
A(n) ________ is a company that provides Internet connections for a fee.
ISP
In the assigned reading for project management, what type of diagram was used to map the impact of a problem using the axes "Impact" and "Likelihood" that you also used in Applied Business Project 2?
I^2 Diagram
What type of image formatting would you want to use if you wanted words to be above and below the image and let the image be centered using the centering alignment
In Line with Text
The default layout if a new image in MS Word, which causes many people problems, is:
In line with text
If you want to insert am image with a caption, and have the caption automatically stay with the image whenever you move the image, your best option is:
Insert both the image and the caption into a text box
In the four layer model of the IOT architecture developed by the UofA's Cloud and Autonomic Computer Center, environmental sustainability would be most closely related to what layer?
Integrated application layer
The ________ functions as a transport mechanism; the ________ is an application.
Internet; World Wide Web
Bitcoin's ledger technology is quite complex to prevent fraud, an example of which is given in the paper, what was the example and how did it work?
It was a 'Double Spend' where the hacker paid a merchant and themselves then invalidated the merchant payment
According to IT's About Business 6.2, Google Fiber was first deployed in ________.
Kansas City
What term is used to describe the percentage value of the number of times a keyword or key phrase appears on a webpage as compared to the total amount of words on the page?
Keyword Density
If you have one wireless access point, for best coverage you should do what?
Mount it in the center of the house
________ are exchange points for Internet traffic.
NAPs
Which of the following is the technology that enables most mobile wallet applications?
NFC
________ advertising is a sales pitch that fits into the flow of information being shown.
Native
What is the name of the wireless technology that is designed to be embedded in mobile devices such as cell phones and credit cards allowing you to pay for items by waving your card within a few centimeters of a point-of-sale terminal?
Near-field Communication
What is the name of the device that of the physical device that interfaces computers with a local area network (LAN)?
Network Interface Card (NIC)
________________ enables secure communication over the Internet using VPNs.
None of these options
Where can I host my ABP-3A and ABP-3B websites?
Only on the U.Arizona.edu web server
Who can submit new transactions to Bitcoin's Ledger?
Open, Pseudonymous contributors
[Search] What name is used to describe results found when a search engine algorithm analyzes all the pages across the web in an unbiased way and reports the pages considered to contain the most relevant information for your search terms?
Organic
Which type of website file contains software that's executed on the host before sending the results to the browser?
PHP
What term does Google use to describe how important a website is based upon counting the number and quality of links to a page, using the underlying assumption is that more important websites are likely to receive more links from other websites?
Page rank
Which of the POUR principles focuses on the concept that web accessibility is based upon the assumption that people need to be able to input the information into their brain so that they can process it?
Perceivable
What is an affordance?
Physical property of an object that shows functionality
In the assigned reading on accessibility, the authors note that while WCAG 1.0 focused on the techniques for accomplishing accessibility, WCAG 2.0 focused on what?
Principles of accessibilities
What term is used to describe the original consensus algorithm in a Blockchain network that is used to confirm transactions and produce new blocks to the chain?
Proof-of-Work
What term is used to describe the chronology of the ownership, custody or location of a historical object?
Provenance
________________ store information horizontally and vertically.
QR codes
Which of the following technologies would *not* require line-of-sight scanning?
RFID Tags
Industry analytsts expect that 5th generation networks will be defined by three characterisitcs over 4th generation cellular networks. Which of the following would is not one of the expected changes?
Reduced signal attenuation
Google Analytics tracks the browser used to access a website. What term was used to describe a website that manages content based on the browser or device accessing the content?
Responsive Web Design
If your internet speed seems slow, before calling your ISP and complaining the very first thing you should do is
Run a speedtest against the ISP's speed test site
What is the purpose of a PERT chart?
Schedule and organize tasks
In project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resources and what other dimension of the planning process?
Scope
[FUNCTIONALITY] What term is used to describe the very common tendancy for projects to accumulate new functionality to fulfil the requirements of project stakeholders?
Scope Creep
Although web users should have an unlimited amount of time to complete tasks on the web, this design goal must be balanced against what other issue?
Security and risk
According to IT's About Business 9.3, ________ is writing repurposed for a mobile society in which readers' attention is fleeting.
Serialized fiction
[LAWS] Bandwidth is the transmission capacity of a network, stated in bits per second. Which of the following "laws" we've discussed determines the maximum bandwidth (signallin rate) of a given type of communication media (e.g., copper cable, fiber optic, etc.)?
Shannon's Law
In the NASA project management video case, what did the speaker indicate was the greatest risk he faced in managing projects for NASA?
Social and political risk
Which of the following is an example of using LinkedIn for market research?
Solicit advice regarding a topic or issue by going to specific groups.
Using the Internet of Things to increase the efficiency of a company's operations by allowing it to track, in real time, the movement of raw materials and parts through the manufacturing process to finished products delivered to the customer is related to what business function?
Supply chain management
In the assigned reading, the acronym SMART was suggested as a way to remember the characteristics needed when defining requirements. Which letter focused on the ability of the project team to prove that a requirement has been satisfied and delivered?
T
________ is the protocol of the Internet.
TCP/IP
What term is used to describe how telemedicine uses wireless transmission and receipt of data gathered from remote sensors to allow doctors can monitor patients and control medical equipment from a distance?
Telemetry
Which of the following would *NOT* be a characteristic of a blockchain data store:
The data store is managed as a single database using cloud technology
From Don Norman's perspective, what fatal flaw does the BMW iDrive (which he described as a well thought out, very logical, and sensible device) have with respect its human interface?
The iDrive destroyed spatiality
In the assigned reading, Don Norman noted two critical issues with the original BMW iDrive design: the design failed to provide a good conceptual model (a story) and also what other problem?
The iDrive destroyed spatiality
Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project?
The project milestones and the order they are scheduled to be completed
Which of these is not an advantage of an all-in-one router, switch, WiFi access point, and Modem
They are cheap to upgrade
Which of the following is NOT a limitation of bar codes?
They don't identify the manufacturer.
[WWW} What British Scientist invented the World Wide Web in 1989 while working at CERN (European Organization for Nuclear Research) in 1989?
Tim Berners-Lee
Which of these is NOT enumerated as a Motivation to Create Accessible Web Content?
To improve the reliability of technical functionality (technology centered motivations)
What is the name of the criterion of intelligence where depends on the ability of a computer program to impersonate a human in a real-time written conversation with a human judge, sufficiently well that the judge is unable to distinguish reliably—on the basis of the conversational content alone—between the program and a real human?
Turing Test
Select the answer below that orders the media correctly from the lowest to highest bandwith (data rates).
Twisted pair, Coaxial Cable, Fiber-optic Cable
According to IT's About Business 9.4, many GM owners used ________ to share tips and put pressure on GM to provide better customer service.
________ is a high-bandwidth wireless technology with transmission speeds in excess of 100 Mbps. It is a ______-range wireless network technology.
UWB; short
Common themes of a blockchain generally include everything but what?
Usually exists over a client-server network
The Internet is a ______________.
WAN
Select the answer the correctly orders the types of computer networks in terms of area span of coverage from largest to smallest?
WAN, MAN, LAN, PAN
The four guiding principles of accessibility (perceivable, operable, understandable, and robust) are included in what document?
Web Content Accessibility Guide, Version 2.0
If you are creating a template for a team, so each team member can work on a different section of the document, which is the most important thing to standardize before distributing the template?
What Styles will be used and When
What type of sensor is an autonomous device that monitors its own condition, as well as physical and environmental conditions around it, such as temperature, sound, pressure, vibration, and movement and can also control physical systems, like opening and closing a valve and controlling the fuel mixture in your car?
Wireless sensor
Many experts believe ________ is the solution to the challenge of making money from social networking sites and social commerce sites.
advertising
RFID was developed to replace ________.
bar codes
According to IT's About Business 6.1, Eriteans who have access to the Internet typically use ________.
dial-up
What is the correct filename for your ABP-3A website?
index.html
The ________________ is a network of networks.
internet
The web __________ the same thing as the internet.
is not
Hotspots are an example of ______________ wireless networks.
medium-range
If everything stops working and connecting to the internet, and you have no idea what to do, the first thing you should try is?
powering the modem and router off then on again
What is the name of the directory where the files for your websites for ABP-3A and ABP-3B will be stored on the U.Arizona.Edu web server?
public_html
The biggest problem with using wireless networks is ________.
security