CCR 3: Class 33-42

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Selecting computers with EPEAT power supplies should reduce the annual operating cost of a computer by what?

$7.00

Selecting an equivalent replacement for an existing piece of electronic equipment (e.g., replacing an existing monitor with a more energy efficient a new monitor that performs the same functional role) based on the Electronic Product Environmental Assessment Tool (EPEAT) is an example of change in which order of effect on environmental sustainability?

1st order

According to Social Media Today, in 2018, what percentage of online chat conversations were done by chatbots?

30%

LTE is ________ cellular technology.

4G

According to Social Media Today, What percentage of the content of a video message is typically retained by the viewer?

95%

________ is a two-dimensional code that can store much more information than ________.

A QR code; bar codes

In a communication architecture, transmitters and senders are described using what term?

Actors

According to the Mythical Man Month view, adding resources (addition team members) to a project will improve (shorten) the time required to complete the project by the largest amount under which of the following scenarios?

Adding resources to a partitionable task

What is the importance of the triple constraints / the Scope Triangle?

Any chance to one constraint will likely affect another constraint

As described by CapGemini, what aspect of smart products used an Industry 4.0 environment would focus on using sensor technology to give access to condition information regarding products and their environment?

Aware

Which of the following descriptive terms would generally be associated with the transmission of digital data?

Bits per second

_______ is a short-range wireless network

Bluetooth

What "law" states that "adding manpower to a late software project makes it later"?

Brooks Law

LEED refers to the efficiency of?

Buildings

Social computing has vastly altered both the expectations of customers and the capabilities of corporations in the area of _________.

CRM

According to Oracle, after the amount of energy required directly required to run the servers and computer equipment, which of the following is the next largest user of electrical power in an average data center?

Chillers and computer room air conditioning(CRAC)

________ cables are made of copper

Coaxial

If you have an empty building you can move into if your primary location is destroyed, you've implemented a _________ site.

Cold

According to the presenter in the Managing a Website Project video case, what is a critical element for a client to get the most out of a web design team?

Communication

According to IT's About Business 6.2, the main drawback to Google Fiber for Google is ________.

Cost

Selecting EPEAT-compliant technology with a high rating over traditional, less energy efficient technology is an example of focusing on what sustainability effect?

Creation, Use, and Disposal of a product

Which of the following types of wireless communication used as part of a connected vehicle architecture would have a line-of-sight range of approximately 300 meters?

Dedication Short- Range Communication

Which of the following is NOT broadband?

Dial-up

What is the name of the computer software system that translates Uniform Resource Locator (URL's) into IP addresses?

Domain Name System

According to the "Cloud Computing Trends for 2020" video case, what term is used to describe a distributed computing model where information is processed closer to its source?

Edge Computing

Which of the key properties of virtualization supports the goal of creating a more sustainable use of technology by saving an entire virtual machine (VM) into a file so that all VMs can be migrated and consolidated on a single active server?

Encapsulation

_________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.

Encryption

As discussed in the Neuro-ID video case study, in addition to measuring a customer's "friction" (e.g., frustration or satisfaction), the system also is able to measure what security-related aspect of customer "intent"?

Entering data in a way associated with fraudulent behaviors

Using a PERT chart to identify variances from planned project schedule dates is an example of what type of management report that has been previously discussed that identifies business activities that are not achieving a prescribed performance metric?

Exception report

________________ enables secure communication over the Internet using VPNs

Extranet

According to IT's About Business 9.4, GM used ________ to promote jobs and feature new cars.

Facebook

According to IT's About Business 8.6, ________ launched EDEN to improve the efficiency and effectiveness of its dock operations.

FedEx

When a cloud service vendor fails to meet their commitment to provide a specified level of service, such as system availability, what is the customer usually entitled to receive from the cloud service vendor?

Financial Compensation

Which of the project management documents includes all three of the triple constraints that are in the Scope Triangle?

Gantt Chart

________ computing pools various hardware and software components to create a single IT environment with shared resources.

Grid

What stakeholder role would best describe Dr. Robbins', who is President of the University of Arizona and responsible for guiding the future direction of the university, role with respect to the project to develop a strategic plan for the University of Arizona?

High interest/ Importance and High Influence

___________ was implemented to address smartphones, since they are basically hand-held computers.

IPv6

A(n) ________ is a company that provides Internet connections for a fee

ISP

According to IT's About Business 8.3, under Belgian law, Bobbejaanland Family Park is considered a(n) ________ because

ISP; it offers free Wi-fi to patrons

With the ________ model, cloud computing providers offer remotely accessible servers, networks, and storage capacity.

Iaas

The origins of the IOT-based security breach at Target was related to which of the following dimensions of the IT/IOT converged security model?

Identity Services

The ________________ is a network of networks

Internet

The ________ functions as a transport mechanism; the ________ is an application.

Internet;World Wide Web

According to IT's About Business 6.2, Google Fiber was first deployed in

Kansas City

According to CIO Magazine, where is considered the best place to build a data center in North America?

Kelowna, British Columbia, Canada

Who was Harald Blaatand "Bluetooth" II?

King of Denmark from 940 to 981

Which of the following types of computer ports (mechanical network connectors) would NOT be considered a serial data communication interface?

LPT Port

Which of the following types of website types (as described in the ABP-3 guidelines) best describes use of the Eller website as a marketing hub to connect with new prospective students and potential donors through SEO and a cohesive online presence?

Lead-generation Website

In the Public Switched Telephone Network (PSTN), what is the connection between the local telephone company exchange office and a subscriber's house called?

Local Loop

When comparing the energy consumption of DVD vs. streaming content over the internet, with respect to energy consumption per viewing hour, which of the following viewing methods use the least amount of primary energy and generates the least CO2 emissions?

Mail Rented

_________ suffer most, if not all, of the financial damages in fraudulent transactions.

Merchants

Which of the following is a medium-range wireless network?

Mifi

What % of people like to purchase products from companies that protect the environment?

More than 50%

What communication code was developed in 1835 to send messages digitally over a new communications infrastructure?

Morse Code

________ are exchange points for Internet traffic.

NAPS

When designing a security-in-depth strategy, firewalls and VPNs would be examples of what type of control?

Network Access

In a smart city environment, which of the following was NOT described as a benefit from using IOT to connect traffic signals?

New revenue opportunities

Increased visibility, Tracking, Traceability and Higher Quality are all attributes of what type of benefits for tracking items using RFID tags?

Operational Benefits

In the Eller Website Redesign Process, User Testing was incorporated into each of the following phases except;

Phase 3: Site Production

As discussed in the the video case "Vint Cerf Explains TCP Networking," what example does he use to explain how messages are sent?

Postcards

According to Intel Canada's video "Public, Private and Hybrid Clouds," what type of cloud architecture offers a high level of control of the resources but the *least* (lowest ability for) scalability?

Private

________ allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals

RFID

Which of the following is NOT a basic function of TCP/IP?

Responsible for disassembling, delivering, and reassembling data during transmission

_______________ is a process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan.

Risk mitigation

With the ________ delivery model, cloud computing vendors provide software that is specific to their customers' requirements.

SaaS

What is the purpose of a PERT chart?

Schedule and organize tasks

In project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resources and what other dimension of the planning process?

Scope

________ require massive amounts of electrical power, air conditioning, backup generators, and security.

Server farms

Using IOT to track packages, containers, and other bulkware are examples of what type of "smart" IOT technologies?

Smart logistics

In which of the following cloud models is the customer responsible for managing the fewest of the computing resources?

Software-as-a-Service

On the UofA CatCard, your personal signature is what type of authentication control?

Something you do

According to the Physical vs. Logical Topologies Video Case, what type of network topology is the most common physical topology?

Star Topology

In an RFID system, where would the unique data identifying an item typically be found?

Tag

Which of the following is an example of using Facebook for market research?

Test-market your messages giving people 2-3 options and asking fans which one they prefer and why .

In the following critical path diagram, if the time required to complete "Task B" was increased by 4 days, so that Task B now requires 6 days instead of 2 days, how would the critical path (currently shown as 9 days) be affected?

The critical path will increase to 10 days

According to the Bloomberg Biometric Passwords case study, EyeVerify helps protect enterprise networks and mobile financial services using what type of biometric measurement?

The pattern of the blood vessels in whites of your eye

Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project?

The project milestones and the order they scheduled to be completed

POTS (Plain Old Telephone Service) or basic, voice-grade analog telephone service has been historically most closely associated with what type of network infrastructure?

Twisted- pair cabling

________ allows MIS professionals to search for needed web services by creating public or private searchable directories of these services.

UDDI

Introduced in the 1990's, what industry trend was described as the business model of offering computing resources as a metered (based on actual usage rates)?

Utility Computing

According to the articles what technologies enable businesses and their employees to get in front of clients and customers but do it in a cost-savings manner?

VoIP and web conferencing

In the "Eye on Oversight" video case study, what was the name of a ransomware software that impacted the United Kingdom National Health Service in 2017?

Wannacry

According to IT's About Business 9.3, ________ is a social reading platform and writing community in which authors post articles, stories, fiction, and poems, either online or through the mobile app.

Wattpad

According to Cisco, what was considered the "inflection point" for the Internet of Things?

When the number of connected devices outnumbered people on the planet

In terms of maximum operating range, which of the following correctly orders the sort-range wireless technologies from longest range to shortest range?

Wifi, Bluetooth, RFID, NFC

Many experts believe ________ is the solution to the challenge of making money from social networking sites and social commerce sites.

advertising

An example of a(n) ________________ protocol is SMTP.

application

RFID was developed to replace ________.

bar codes

Security must be balanced with _________ for people to use systems.

convenience

Modern smartphones exhibit a process called __________, which means the functions of many physical devices are included in one other physical device

dematerialization

In the URL "http://www.arizona.edu/index.html", which of the following defines the "domain"?

edu

The Internet backbone is a ________ network.

fiber-optic

BitTorrent is an example of P2P that ____________________.

is open-source, free, P2P file sharing

You want to be able to track the pencils in your store because they seem to be disappearing. You would want to mark the pencils with ________.

passive RFID codes


Ensembles d'études connexes

ECON 2306 Chapter 28 and 29 Practice Test

View Set

Chapter 4: Project Integration Management

View Set

Chapter 5 (Functions) - Questions

View Set

Chapter 10; short-term liabilities exam 3

View Set