mis 111
What is considered to be the high-capacity data transmission core of the Internet structure? a. NAP b. Tier 1 ISP c. Tier 3 ISP d. LAN
B. Tier 1 ISP
Customers _____________________ because of Web 2.0. A. are less empowered B. are more empowered C. have seen no difference D. are generally happier
B. are more empowered
*A firewall is a _______ control. A. access B. communication C. physical D. virtual
B. communication
Harald Blaatand, who was the King of Demark from 940-981, is associated with what wireless technology? a) Bluetooth Technology b) Computer Wifi c) Cellular Telephone Networks d) Microwave Transmitters e) Satellite Transmitters
a) Bluetooth Technology
What short-range wireless technology is commonly to connect smartphones with hands-free headsets for telephone calls and listening to music? a) Bluetooth b) WiMax c) Wavelength d) Spectrum e) Photon
a) Bluetooth
Xerox PARC's Unicomp was a precursor to which of the following topics also discussed in class? a) Collaboration b) Globalization c) Entrepreneurship d) Sustainability e) Data Mining
a) Collaboration
What do website project managers consider to be the most critical component of managing website transformation? a) Communication b) Organization c) Innovation d) Dedication e) Compensation
a) Communication
The expansion of telecommunications infrastructure occurred primarily during what era of globalization, as described by Thomas Friedman? a) Companies b) Countries c) Individuals d) Entrepreneurial e) Sustainable
a) Companies
In the video where Vint Cerf described the TCP protocol used to send packets across the internet, what did he use as a metaphor for how data packets are sent? a) Post card b) Taxi cab c) Credit card d) Pay telephone e) Railroad car
a) Post card
The Transmission Control Protocol (TCP) address all of the following issues related to the transmission of data using packets, EXCEPT: a) Privacy for user's message content b) Packets being lost during transmission c) Receiving Packets out of message order d) Recovering packs that were not recevied e) Correctly ordering packets when received
a) Privacy for user's message content
Signals used to send messages can be _______ or digital. a. analog b. discrete c. rotary d. binary
A. analog
________________ allows you to access the internet through a coaxial media previously used only for TV connections. a. Cable modem b. Dial-up modem c. ADSL Modem d. SONET Modem
A. Cable modem
What type of guided media uses light for signaling? a. fiber optics b. twisted pair c. coaxial cable d. open wire
A. Fiber optics
In a packet-switched data communication network, which of the following is true: a. Packets can be lost or become corrupted between the sender and receiver b. All packets from a sender follow the same path through the network to the receiver c. All packets always follow the shortest path (fewest hops) through the network d. All packets from a sender always arrive at the receiver in same order they were sent e. The path packets follow in the network can never be changed if a data link fails
A. Packets can be lost or become corrupted between the sender and receiver
What term is used to describe a physical interface between peripheral devices and the computer? a. port b. session c. app d. signal
A. Port
In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what common problem did his analogy using the postal service to email a page from a book have with sending TCP packets? a. The message might get lost and not delivered b. The message might get changed in route c. The message might not get sent d. The message might be illegible e. The message might be in the wrong language
A. The message might get lost and not delivered
What common function do "HTTP", "TCP" and "IP" share? a. They all define internet-based protocols b. They all are website domains c. They all are data encryption methods d. They are abbreviations for physical media e. They are common computer viruses
A. They all define internet-based protocols
What is NOT an advantage of digital transmission? a. Produces fewer errors b. Permits higher maximum transmission rates c. Harder to encrypt d. Simpler to integrate voice, video, and data
C. Harder to encrypt
Google's main business reason for installing fiber in select US cities is to _____ a. begin competing with the cable distribution giants b. bring the internet to rural areas c. generate more web traffic, which generates more ad revenue for them d. give people an option other than the telecommunications companies who control existing cable networks
C. generate more web traffic, which generates more ad revenue for them
In the history of the cell phone case study, the inventor noted that prior to the invention of the cell phone, telephone numbers were generally associated with a place. After the invention of the cellphone, telephone numbers are most commonly associated with what? a) A person b) A place c) A location d) A ciphertext e) A packet
a) A person
In the video case about Dr. Chiu's Smartrek application, which of the following was not an incentive used to encourage driver participation? a) Ability to find other people for carpooling b) Possibility of avoiding traffic congestion c) Ability to earn points for charity d) Ability to help the community e) Ability to earn prizes and gift
a) Ability to find other people for carpooling
What term is used to describe an online advertising service developed by Google, where advertisers pay to display advertising, product listings, and video content as a result of Google search. a) Adwords b) Pagerank c) Organic d) Hashtags e) Responsive
a) Adwords
What part of an "IMG" (image) HTML tag meets the POUR principle of being "perceivable?" a) Alt (alt text) b) Character height c) Character width d) Src (file locaiton) e) Image filename
a) Alt (alt text)
The Internet of Things can be described as three "any"-type connections. What are these three "any" connections? a) Any time, any place, any thing b) Any price, any person, any network c) Any time, any place, any network d) Any place, any person, any industry
a) Any time, any place, any thing
What issue that is normally considered a challenge for wireless communication serves as the basis for spatial multiplexing? a) Attenuation b) Interference c) Multi-path d) Line-of-sight e) Right-of-way
a) Attenuation
Which of the following could always be used to prevent a hacker from compromising a Bluetooth network? a) Attenuation b) Line-of-sight c) Foot-printing d) Intrusion Detection e) Multi-path Reflections
a) Attenuation
Which of the following elements of your ABP-3B website would not normally have an impact on your organic page rank? a) Background Colors for Table Columns b) Keyword Density c) Image Alt tags d) Image Filenames e) Title Tag
a) Background Colors for Table Columns
Which of the following is NOT a value-adding attribute of mobile computing? a) Bandwidth improvement b) Instant connectivity c) Localization d) Ubiquity
a) Bandwidth improvement
Which of the following terms would NOT commonly be associated with analog data? a) Bits per second (bps) b) Frequency c) Continuous d) Cycles per second e) Hertz (Hz)
a) Bits per second (bps)
What type of software system allows a user to publish, edit, and modify websites from central interface and manage the development workflow in a collaborative environment? a) Content Management Systems b) Augmented Reality Systems c) Group Decision Support Systems d) Google Analytics e) Crowdsourcing System
a) Content Management Systems
What is the name for the path containing the minimum set of tasks that you must traverse in order to reach completion of your project on time? a) Critical Path b) Scope Triangle c) Mythical Man Month d) Project Plan
a) Critical Path
Which of the following security measures would be considered a "last line defense" for Information Security? a) Cryptography b) Access Control c) Firewall d) Intrusion Detection e) Security SDL
a) Cryptography
Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control? a) Defense in depth b) Just-In-Time c) Bullwhip effect d) Disintermediation e) Social Contract
a) Defense in depth
What term describes how two or more different authentication mechanisms were used to enhance security? a) Defense-in-depth b) Due Diligence c) Man-in-the-middle d)Intrusion detection e) Social Engineering
a) Defense-in-depth
In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does ".edu" define? a) Domain b) Browser c) Protocol d) Resource e) Serve
a) Domain
What is the most significant threat to information security in the cloud for most companies? a) Employee behavior b) Packet monitoring c) Remote hackers d) WiFi monitoring e) Defective Hardware
a) Employee behavior
Besides sensors, radios, and chips, what is the value in the Internet of Things? a) Establishment of services on top of the connectivity b) Cheaper equipment costs c) Creating less data d) Companies that haven't failed e) Eliminates the need for a value proposition
a) Establishment of services on top of the connectivity
Perceived affordances includes perceptible affordances and what other type of affordance? a) False Affordance b) Hidden Affordance c) Correct Rejections d) Cultural Affordance e) Feasible Affordance
a) False Affordance
Which type of media is least likely to be affected by electronic noise? a) Fiber Optic Cable b) CAT-3 Cable c) CAT-5 Cable d) Coaxial Cable e) Hertz Cable
a) Fiber Optic Cable
What network security control prevents information from moving between two networks? a) Firewall b) Post Scanner c) Packet Sniffer d) Biometric Identification
a) Firewall
Which project management documentation includes information about all of the Triple Constraints? a) Gantt Chart b) Organization c) Time Line d) Pert Chart e) Work Breakdown
a) Gantt Chart
Satellites used for data communications that appear to be stationary from a fixed location on earth are placed in what type of orbit? a) Geosynchronous orbit b) Polar orbit c) Mid-earth orbit d) Elliptical orbit e) Commercial orbit
a) Geosynchronous orbit
According to the mythical man-month what is the reason adding people to a project will not speedup your project? a) Increased complexity of interpersonal communications b) Increased spending on personnel c) Increased critical path milestones for the project d) Each increase in the staff requires a corresponding extension to the project due
a) Increased complexity of interpersonal communications
Which of the four IOT (Internet of Things) layers includes technology such as data centers, information security and data mining? a) Information Processing b) Integrated applications c) Network Construction d) Sensing and Identification
a) Information Processing
What term best describes when consumers are able to use their smartphones to obtain information about a company's competitor's product pricing, features, customer reviews and availability while shopping in their company's brink-and mortar store? a) Information transparency b) Crucial distinctions c) Accessibility d) Interference e) Multi-path
a) Information transparency
In the History of the Cell Phone video case, how did the use of cellular phones change the way in which calls were made? a) Instead of calling a place, calls to cellular telephones were associated with a person b) Calling a cellular telephone required the assistance of an operator c) A new system of telephone numbers were required to call cellular phones d) Cellular telephones could only call telephones within the local calling area e) Cellular telephones improved the sound quality that customers experiences
a) Instead of calling a place, calls to cellular telephones were associated with a person
Operating unregulated WiFi networks, clickers, Bluetooth headsets, cordless telephones, and microwave ovens using the same 2.4GHz ISM frequency range in close proximity to one another might result in what problem? a) Interference b) Attenuation c) Multi-path d) Line-of-sight e) Right-of-way
a) Interference
The risk of a project can be measured on what two scales? a) Likelihood and Impact b) Budget and Management c) Change and Control d) Vision and Goal
a) Likelihood and Impact
Which of the following issues related to wireless communication would NOT be a problem for an RFID (Radio Frequency Identification) system? a) Line-of-sight b) Monitoring c) Attenuation d) Interference e) Multi-path
a) Line-of-sight
Which of the following wireless issues would NOT be a problem for short range wireless applications, such as RFID, Bluetooth and NFC? a) Line-of-sight b) Interference c) Attenuation d) Multi-path e) Right-of-way
a) Line-of-sight
In general, what you think of as the quality of your network connection speed when you are using your PC, iPad, or Smartphone is most influenced by which of the following? a) Local Tier-3 ISPs b) Backbone Tier-1 ISPs c) Regional Tier-2 ISPs d) Location of the content provider's servers e) Protocols used for Layer-1 transmission
a) Local Tier-3 ISPs
An unobstructed, straight line-of-sight path between a transmitter and receiver is required by which of the following high-speed, commercial wireless network technologies? a) Microwave b) 802.11 Wi-Fi c) Bluetooth d) 3G Cellular e) Broadcast Radio
a) Microwave
Since cell phones are "uniquely personal," the use of passive geolocation has raised what concern among users of mobile commerce? a) Privacy of personal information b) Accuracy of driving directions c) Identification of Showrooming d) Receiving accurate credit for incentives e) Incorrect shipping addresses for packages
a) Privacy of personal information
The old accounting maxim of "promise low" and "deliver high" is related what costing and budget concept? a) Prudence b) Accruals c) Consistency d) Variance
a) Prudence
What technology has been used for such diverse applications as healthcare, tracking lost pets, and toll collecting on highways? a) RFID b) SCOR c) MRP-II d) Infrared e) CFA
a) RFID
What IoT technology discussed in class could be used to identify shoppers and allow products to "introduce" (recommend) themselves to a shopper? a) RFID Tags b) Geotagging c) Product Metadata d) Crowdsourcing e) Folksonomie
a) RFID Tags
What technology uses radio-frequency one-way communication path to allow objects identify themselves by transmitting information stored in the object? a) Radio Frequency Identification b) Bluetooth c) Near Field Communication d) WiFi (802.11xx) e) Geostationary Communication
a) Radio Frequency Identification
Tracking what products are delivered to users, and when, is a form of what? a) Release Control b) Acceptance Control c) Maintenance Control d) Scheduling Control
a) Release Control
Which of the following actions would be considered a biometric authentication? a) Requiring a user to scan their fingerprint b) Requiring a user to enter a secret password c) Requiring a user to swipe a CatCard d) Requiring a user to sign their signature e) Requiring a user to type a group of displayed letters
a) Requiring a user to scan their fingerprint
What term was used to describe a website that can adapt to the type of device being used to access the website? a) Responsive b) Augmented c) Optimized d) Transformed e) Validated
a) Responsive
Paying Google to display marketing advertisements when a user searches for a specific Adword is most commonly associated with which of the following concepts? a) SEM b) SEO c) Organic d) Pagerank e) Hashtags
a) SEM
Keyword selection and density, image alt tags, and links to content are mostly commonly associated with which of the following concepts? a) SEO b) CPC c) SEM d) PPC e) ROI
a) SEO
What type of hack occurs when a web form allows a database command to be entered that results in the database's information being compromised? a) SQL Injection b) Brute-force compromise c) Web page hijacking d) Cross-site Scripting e) Social Engineering
a) SQL Injection
Google Docs is an example of what type of service? a) SaaS b) IaaS c) GaaS d) PaaS e) TasS
a) SaaS
The guidelines for an Applied Business Project is an example of which of the triple constraints? a) Scope b) Time c) Resources d) Feasibility e) Profitability
a) Scope
In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what analogy in the real world did he use to describe TCP? a) Sending information taped to post cards b) Sending information using radio transmitters c) Sending information using secret messages d) Sending information encoded with barcodes e) Sending information using the sematic web
a) Sending information taped to post cards
What is the name used to describe when a person visits a brick-and-mortar store only to check physical characteristics of a product but intends to purchase the product online? a) Showrooming b) Disintermediating c) Multiplexing d) Hybrid shopping
a) Showrooming
Which of the following is generally NOT commonly used as a biometric identification? a) Signature b) Fingerprint c) Facial geometry d) Retinal Patter
a) Signature
What term is used to describe a user who common access with specific privileges to a shared software instance? a) Tenant b) Community c) Honeynet d) Platform e) Vendor
a) Tenant
In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what common problem did his analogy using the postal service to email a page from a book have with sending TCP packets? a) The message might get lost and not delivered b) The message might get changed in route c) The message might not get sent d) The message might be illegible e) The message might be in the wrong language
a) The message might get lost and not delivered
As I move farther away from campus, I notice that my UAWiFi connection gets progressively weaker. What factor will always cause this to occur? a) The signal strength is lost due to attenuation b) The signal blocked by strong encryption c) The signal cannot be received due to interference d) The signal is blocked due to right-of-way restrictions
a) The signal strength is lost due to attenuation
Which of these is NOT enumerated as a Motivation to Create Accessible Web Content? a) To improve the reliability of technical functionality (technology centered motivations) b) To improve the lives of people with disabilities (human-centered motivations) c) To capitalize on the a wider audience or consumer base (marketing or economic-centered motivations) d) To avoid lawsuits and/or bad press (public relations and punishment-centered motivations)
a) To improve the reliability of technical functionality (technology centered motivations)
Which of the information layers in the Internet of Things model focuses on the communication networks that connect the sensors that actually collect the data? a) Transmission Layer b) Generation Layer c) Processing Layer d) Application Layer e) Metadata Laye
a) Transmission Layer
Businesses like to use Virtual Private Networks for every reason except? a) Virtual networks are faster than ordinary internet connections b) They have no control over the path data takes between business sites c) Data from web-browsers may not be encrypted d) Data from applications other than web browsers may not be encrypted e) Virtual networks are cheaper than leased line
a) Virtual networks are faster than ordinary internet connections
Similar to trends in computing hardware, what is the trend for wireless network hardware? a) Virtualization and merging with the cloud b) Interference and attenuation are being eliminated c) Less, but bigger network antennas d) Putting networks onto chips e) Sensors that don't need batteries
a) Virtualization and merging with the cloud
Weak passwords are a(n) ___________ threat. a) employee b) outside c) hardware d) software
a) employee
The goal of CAPTCHA is to ___________. a) ensure you are not a botnet software b) hack into secure networks c) protect networks against hackers d) remove alien software from your computer
a) ensure you are not a botnet software
What is the correct filename to use for your ABP-3B website? a) index.html b) abp3a.html c) website.html d) public.html e) home.html
a) index.html
The human voice is a (an): a. Analog Signal b. Digital Signal c. Hybrid Signal d. Natural Signal e. Weighted Signal
a. Analog Signal
In the URL (Uniform Resource Locator) "http://www.arizona.edu", what does "http://" define? a. Protocol b. Browser c. Domain d. Resource e. Serve
a. Protocol
YouTube's main revenue stream is ________ a) Subscription membership b) Advertising c) A-la-carte/spot video purchasing d) Selling storage space
b) Advertising
Physical properties (shape, texture, color, etc.) of an object that allow someone to use an object correctly without the need for labels or instructions are known as: a) Constraints b) Affordances c) Distinctions d) Feedback e) Models
b) Affordances
What is the importance of the triple constraint? a) You must funnel all resources into only one of the constraints b) Any changes to one constraint will likely affect the project outcome c) Security is the most important constraint d) Time, resources, and scope don't matter
b) Any changes to one constraint will likely affect the project outcome
Users first started bringing their PCs to work to improve their productivity in the 1970s; this is similar to the __________ phenomenon today. a) AI b) BYOD c) ERP d) RFI
b) BYOD
What term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding? a) Semiotic Engineering b) Conceptual model c) Emotional design d) Design Intention
b) Conceptual model
What category of location-based services would best describe products such as "location-based gaming", "social networking," and "find a friend"? a) Information Services b) Entertainment c) Mobile Resource Management d) Personal Security e) Social Networking
b) Entertainment
With respect to authentication, a smart ID card is something the user ____ a) Does b) Has c) Is d) Knows
b) Has
With ____________, the customer manages applications, data, and the operating system while the vendor manages the servers, virtualization, storage, and networking. a) DaaS b) IaaS c) PaaS d) Saa
b) IaaS
______________ clouds are the most secure because they can be placed behind an organization's firewall. a) Hybrid b) Private c) Public d) Vertical
b) Private
In the Thoughtful Design video case, Don Norman explained cultural perceptions in design through the use of what common, everyday item? a) Opening and closing a door b) Salt and pepper shakers c) A shopping cart d) The signs on restroom doors e) Trash and cigarette waste container
b) Salt and pepper shakers
When displaying a webpage, such as http://www.u.arizona.edu/~wilbur,what is the name ofthe directory the web browser will check in the "wilbur" account for the "index.html" website? a) The "home" directory b) The "public_html" directory c) The "www" directory d) The "wilbur" director
b) The "public_html" directory
Which of the following is NOT a major advantage of wireless devices to users? a) They are small enough to easily carry or wear. b) They can be used to copy and pass on confidential information. c) They can communicate wirelessly with the Internet and other devices. d) They have sufficient computing power to perform productive tasks
b) They can be used to copy and pass on confidential information.
_________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information a) Competitive intelligence b) Espionage c) Information extortion d) Intellectual property
c) Information extortion
Which of the following is FALSE of social computing? a) It focuses on improving collaboration. b) It encourages user-generated content. c) It allows social information to remain anonymous. d) It combines social behavior and IT to create value.
c) It allows social information to remain anonymous.
___________ means that users carry a device with them and can initiate a real-time contact with other systems from wherever they happen to be. a) Broad reach b) Instant connectivity c) Mobility d) Ubiquity
c) Mobility
Which of the following is the technology that enables most mobile wallet applications? a) AFC b) ERP c) NFC d) VRP
c) NFC
From smallest to largest, which of the following is in the correct order? a) LAN, PAN, MAN, WAN b) LAN, MAN, PAN, WAN c) PAN, LAN, MAN, WAN d) PAN, MAN, LAN, WA
c) PAN, LAN, MAN, WAN
________________ clouds are proprietary data centers that integrate servers, storage, networks, data, and applications. a) Hybrid b) Public c) Private d) Vertica
c) Private
Parking garage passes and access control on employee ID badges are examples of: a) Bluetooth b) LEO c) RFID d) 4G / cellular
c) RFID
When a site like Google Docs becomes unavailable for any period of time, this fuels the cloud computing concern of _______ a) Legacy IT systems b) Privacy c) Reliability d) Security
c) Reliability
What is an example of something in the Integrated Application layer of the 4 Layer Model? a) GPS b) Data center c) Smart transport d) Search engine
c) Smart transport
Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? a) Defense in Depth b) Industrial Sabotage c) Social Engineering d) Advanced Persistent Threats e)Open Source Hacking
c) Social Engineering
Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project? a) Whether the major project milestones are being completed on budget b) Individual work assignments for persons assigned to the project c) The project milestones and the order they are scheduled to be completed d) Whether project tasks have been organized in the most efficient order e) The quality of the work performed during each major project milestone
c) The project milestones and the order they are scheduled to be completed
____________ is the most prevalent form of communications wiring. a) Coaxial cable b) Fiber optics c) Twisted-pair wire d) Wireless
c) Twisted-pair wire
The three security challenges of wireless communication are confidentiality, accessibility, and ______ a) importance b) Internet c) integrity d) incorporation
c) integrity
Which of the following is true about a Hybrid Cloud? a) Is owned by the firm using it b) Is leased from another company c) It provided by government agencies d) Combines private and outsourced resource
d) Combines private and outsourced resource
From a user's perspective, perceived affordances would include actual perceptible design affordances and what other category of perceptual affordances? a) Correct rejection of design characteristics that are not affordances b) Hidden design affordances c) Design mitigation affordances d) False or fake design affordances e) Accessible affordance
d) False or fake design affordances
Which of the following is a benefit of cloud computing? a) Privacy b) Reliability c) Security d) Productivity
d) Productivity
In project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resources and what other dimension of the planning process? a) Alignment b) Feasibility c) Agility d) Scope e) Value
d) Scope
_____________________ is the wireless transmission and receipt of data gathered from remote sensors. a) A mobile portal b) A voice portal c) The Internet of Things d) Telemetry
d) Telemetry
Applications such as "find a friend" (FourSquare), driving directions (Smartrek), roadside assistance (OnStar), and fleet management (UPS and FedEx) are all examples of services that have been enhanced by knowing what? a) The identity of the requester b) The time the request was made c) The age of the requester d) The location of the requester e) The number of people making request
d) The location of the requester
Assume you need to put a sign that says "PUSH" on a door handle to explain the correct way to operate the door.The "PUSH" sign helps a user understand what aspect of usability? a) The sign explains a perceptible affordance b) The sign explains a correct rejection c) The sign explains a hidden affordance d) The sign explains a false affordance e) The sign explains a consistent affordance
d) The sign explains a false affordance
What does it mean to use a "SaaS" product? a) Deploy customer-created applications to a cloud b) Rent fundamental computing resources c) Have limited elasticity d) Use provider's applications over a network
d) Use provider's applications over a network
__________ is the act of locating WLANswhile driving around a city. a) A rogue access point b) Eavesdropping c) RF jamming d) War driving
d) War driving
A feature of an object that limits possible (often incorrect) uses of a device is known as: a) False causality b) A visible metaphor c) A conceptual distinction d) An affordance e) A constraint
e) A constraint
Which of the following would motivate businesses to create accessible eCommerce websites for their customers? a) To comply with ADA and Section 508 of the Rehabilitation Act b) To capitalize on a larger base of potential customers c) The website is likely easier for all users to navigate d) Only the first two of the above reasons e) All of the three reasons shown above
e) All of the three reasons shown above
Which of these is NOT an essential Cloud Computing characteristic? a) On-Demand Service b) Resource Pooling c) Elasticity(ability to change or scale) d) Measured Service, (Pay for like a utility, what you need) e) Compliance (HIPPA, PCI)
e) Compliance (HIPPA, PCI)
In the "Don Norman: Thoughtful Design" Video Case, what did he say was the most important part / thing to take into account when creating a good and thoughtful design? a) Simplicity b) Flexibility c) How will it works d) How the designer thinks it should work e) How the user thinks it should work
e) How the user thinks it should work
In the video case on the "Business Value of RFID," RFID improved the business operations of American Apparel EXCEPT: a) Shoplifting (Shrinkage) b) Stockouts c) Selling products at full price d) Finding misplaced inventory e) Identifying defective merchandise
e) Identifying defective merchandise
In the McGinn model of design, the least commoncategory of design elements would be related to what factor in the McGinn model? a) Context b) Culture c) Human Sensory d) Group e) Individual
e) Individual