MIS 111 EXAM 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A "Fishbone" process analysis diagram is also known as: a. A cause-and-effect diagram b. A correlation graph c. A cross-functional flowchart d. An organization chart e. A numerical analysis diagram

A cause-and-effect diagram

In the history of the cell phone case study, the inventor noted that prior to the invention of the cell phone, telephone numbers were generally associated with a place. After the invention of the cellphone, telephone numbers are most commonly associated with what? a. A person b. A place c. A location d. A cipher text e. A packet

A person

The Internet of Things can be described as three "any"-type connections. What are these three "any" connections? a. Any time, any place, any thing b. Any price, any person, any network c. Any time, any place, any network d. Any place, any person, any industry

Any time, any place, any thing

Which of the following types of distance learning experiences are not taught in the presence of an instructor, but rather independently viewed by student online and at their pace? a. Asynchronous classes b. Synchronous classes c. Hybrid classes d. Accessible classes e. Globalized classes

Asynchronous classes

What short-range wireless technology is commonly to connect smartphones with hands-free headsets for telephone calls and listening to music? a. Bluetooth b. WiMax c. Wavelength d. Spectrum e. Photon

Bluetooth

Harald Blaatand, who was the King of Demark from 940-981, is associated with what wireless technology? a. Bluetooth Technology b. Computer Wi-Fi c. Cellular Telephone Networks d. Microwave Transmitters e. Satellite Transmitters

Bluetooth Technology

What is the process of solving problems and producing things by connecting people that you otherwise would not know using the internet? a. Data mining b. Knowledge management c. Group decision support systems d. Crowdsourcing e. Distance learning

Crowdsourcing

What term is used to describe the information collected describing the action (i.e., location, time, place, etc.) as opposed to the data itself? a. Metadata b. Hashtagging c. Entities d. Packets e. Accommodations

Metadata

An unobstructed, straight line-of-sight path between a transmitter and receiver is required by which of the following high-speed, commercial wireless network technologies? a. Microwave b. 802.11 Wi-Fi c. Bluetooth d. 3G Cellular e. Broadcast Radio

Microwave

Which of the following actions would be considered a biometric authentication? a. Requiring a user to enter a secret password b. Requiring a user to swipe a CatCard c. Requiring a user to scan their fingerprint d. Requiring a user to sign their signature e. Requiring a user to type a group of displayed letters

Requiring a user to scan their fingerprint

What is an example of something in the Integrated Application layer of the 4 Layer Model? a. GPS b. Data center c. Smart transport d. Search engine

Smart transport

In the VAN (Voter ActivationNetwork) Relationship-Based Political Organizing video case study, the VAN able to identifythe relationships of possible supporters using data from what source? a. Voter registration records b. Direct mail campaigns c. Online surveys d. Supporter's Facebook contacts e. Tax returns of registered voters

Supporter's Facebook contacts

"According to Phil Darg, the largest category of online students that are primarily motivated by due dates and major assignments is known as:" a. Taskers b. Achievers c. Ball Dropers d. Ghosts e. Active Learners

Taskers

How does telemedicine improve the delivery of medical care in rural communities? a. Telemedicine allows patients to make a preliminary self-diagnosis online b. Telemedicine prevents physicians from making errors during surgery c. Telemedicine reduces theneed for patients to travel to physician's offices d. "Telemedicine Avatars" can perform routine procedures without the physician e. Telemedicine will allow a physician to meet with multiple patients at the same time

Telemedicine reduces theneed for patients to travel to physician's offices

What collaboration tool was discussed in class that enhances the participants' contextual awareness by sharing non-verbal information during meetings? a. Teleportation b. Twitter c. Telepresence d. Crowdsourcing e. Six Sigma

Telepresence

Which of the following does a Fishbone Diagram typically not inform you about a problem? a. The cost of correcting a problem with a process b. Identifies the major categories of a problem c. Identifies many of the root causes of problems d. Helps guide the process improvement process e. Organizes the problems associated with a process by the major categories

The cost of correcting a problem with a process

In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cerf, what common problem did his analogy using the postal service to email a page from a book have with sending TCP packets? a. The message might get lost and not delivered b. The message might get changed in route c.The message might not get sent d. The message might be illegiblee. The message might be in the wrong language

The message might get lost and not delivered

As I move farther away from campus, I notice that my UAWiFi connection gets progressively weaker. What factor will always cause this to occur? a. The signal strength is lost due to attenuation b. The signal blocked by strong encryption c. The signal cannot be received due to interference d. The signal is blocked due to right-of-way restrictions e. The maximum packet hop count is exceeded

The signal strength is lost due to attenuation

Requiring students to use a combination of a numeric passcode and their CatCard to enter a locked door on a UA dorm is an example of approach for security control? a. Bullwhip effect b. Just-In-Time c. Defense in depth d. Disintermediation e. social contract

Defense in depth

In the VAN (Voter Activation Network) case study, if you were supporting a Democratic candidate, which group of voters could be most efficiently reached using only a get-out-the-vote (GOTV) activity? a. Independent voters who always vote b. Independent voters who sometimes vote c. Democratic voters who always vote d. Democratic voters who sometimes vote e. Democratic voters who never vote

Democratic voters who sometimes vote

What is NOT an advantage of digital transmission? a. Produces fewer errors b. Permits higher maximum transmission rates c. Harder to encrypt d. Simpler to integrate voice, video, and data

Harder to encrypt

All of the symbols representing tasks and decisions that are shown in single column of a vertical cross-functional diagram are related to the same what? a. Actor b. Root Cause c. Decision Model d. Organization e. Entity

Actor

In the Online Democracy model, the "Voter Activation Network" uses voter registration rolls to categorize voters as always/sometimes/never voting by using information obtained from: a. Online media b. Commercially-generated databases c. Private sector polling d. Government records e. Partisan political organizations

Government records

Allowing individuals to file tax returns, renew driver's licenses, and obtain various permits online is an example of what type of eGovernment? a. Government-to-business (G2B) b. Government-to-citizen (G2C) c. Government-to-employees (G2E) d. Government-to-government (G2G) e. Government-to-suppliers (G2S)

Government-to-citizen (G2C)

Your username (UANetID) is your claim of identify to a computer system.When the computer system verifies your identify by requiring you to enter a password is an example of what type of authentication? a. Something a user is b. Something a user has c. Something a user does d. Something a user knows e. Something a user inherits

Something a user knows

The benefits of using RFID from what category (driver) include offering new services, new and enhanced product features, and improved customer relationship management (CRM)? a. Value Generation b. Cost reduction c. Increased Security d. Meeting legal requirements e. Increasing customer satisfaction

Value Generation

Sending phishing emails that demand users respond immediately or risk losing access to a critical resource, such as email, is an example of what? a. Defense in Depth b. Industrial Sabotage c. Social Engineering d. Advanced Persistent Threats e. Open Source Hacking

Social Engineering

The lack of what issue in online learning communities leads to a lack of commitment to a course, distrust and poor engagement in the class by students? a. Social presence b. Synchronous communication c. Learning Management Systems d. Sufficient communication bandwidth e. Accurate user model

Social presence

In the root cause video case, the marble of national monument was wearing prematurely. What was the change identified by thein-depth root cause analysis of the problem? a. Changing the time the lights illuminating the monument were turned on b. Changing the acid level in the cleaning solution c. Changing the business process used to clean the monument d. Changing the company contracted to perform the cleaning e. Restricting the areas that visitors to the monument were allowed to walk

Changing the time the lights illuminating the monument were turned on

Technologies such as Blackboard, Desire-to-Learn (D2L), Moodle, and Sakai represent what category of E-Learning technology? a. Course Management Systems b. Searching facilities c. Life-course studies d. Student-led inquiry e. Correspondence education

Course Management Systems

Which category of learner-instructor interaction focuses on course navigation and administrative requirements? a. Creating structure b. Directing learning c. Providing performance feedback d. Promoting content understanding e. Supporting learning

Creating structure

What other approach used incentives to motivate people to share their influence and intellectual property? a. Globalization b. Internet Of Things c. Six-Sigma d. Crowdsourcing

Crowdsourcing

What technique has beenused by companies such as Starbucks and Netflix used to engage large numbers of non-employees to innovate, manage, design and market new products? a. Executive dashboards b. Click-stream analysis c. Capacity planning d. Crowdsourcing e. Six Sigma

Crowdsourcing

The Democratic National Committee used a software tool called the Voter Activation Network to classify voters considering whether a voter is likely to cast a vote and the party affiliation of the voter.The GOTV (get out the vote) was specifically targeted at what demographic? a. Democratic voters who always vote, and support Democratic candidates b. Democratic voters who sometimes vote, and support Democratic candidates c. Democratic voters who never vote, and support Democratic candidates d. Swing voters who sometimes vote, but may support Democratic candidates e. Republican voters who never vote, and support Republican candidates

Democratic voters who sometimes vote, and support Democratic candidates

Besides sensors, radios, and chips, what is the value in the Internet of Things? a. Establishment of services on top of the connectivity b. Cheaper equipment costs c. Creating less data d. Companies that haven't failed e. Eliminates the need for a value proposition

Establishment of services on top of the connectivity

What type of guided media uses light for signaling? a. Fiber Optics b. twisted pair c. coaxial cable d. open wire

Fiber Optics

Building on its initial success of the Voter Activation Network, the Democratic National Committee moved beyond simply classing voters by whether they are likely to cast a vote and their party affiliation to also include what additional aspect of Web2.0? a. Identifying voters who were likely to blog for a candidate or issue b.Using "mash-ups" to select efficient driving routes on election day for GOTV drivers c. Using a "long tail" strategy to every voter to building support through niche issues d. Influencing voters by having supporters use their social media relationships e. Creating issue-related folkonomies to inform voters of important issues

Influencing voters by having supporters use their social media relationships

In the History of the Cell Phone video case, how did the use of cellular phones change the way in which calls were made? a. Instead of calling a place, calls to cellular telephones were associated with a person b. Calling a cellular telephone required the assistance of an operator c. A new system of telephone numbers were required to call cellular phones d. Cellular telephones could only call telephones within the local calling area e. Cellular telephones improved the sound quality that customers experiences

Instead of calling a place, calls to cellular telephones were associated with a person

Operating unregulated WiFi networks, clickers, Bluetooth headsets, cordless telephones, and microwave ovens using the same 2.4GHz ISM frequency range in close proximity to one another might result in what problem? a. Interference b. Attenuation c. Multi-path d. Line-of-sight e. Right-of-way

Interference

What is NOT a benefit of telemedicine? a. It improves access to healthcare b. It provides real-time care to isolated areas c. It reduces the need to move the patient d. It requires traveling so doctors can see their patients in person

It requires traveling so doctors can see their patients in person

An ubiquitous learner is someone who: a. Learns in everyday life b. Learns in the classroom only c. Learns in an online space only d. Often has poor academic skills and doesn't interact with the course

Learns in everyday life

Which of the following issues related to wireless communication would NOT be a problem for an RFID (Radio Frequency Identification) system? a. Line-of-sight b. Monitoring c. Attenuation d. Interference e. Multi-path

Line-of-sight

In general, what you think of as the quality of your network connection speed when you are using your PC, iPad, or Smartphone is most influenced by which of the following? a. Local Tier-3 ISPs b. Backbone Tier-1 ISPs c. Regional Tier-2 ISPs d. Location of the content provider's servers e. Protocols used for Layer-1 transmission

Local Tier-3 ISPs

Which of the following projects is considered the first instance of a educational institution adopting a MOOC approach to the delivery of content (i.e., massive, open, online, and course-related)? a. MIT's OpenCourseware Project b. Kahn Academy c. Coursera d. Semester Onlinee. Udacity

MIT's OpenCourseware Project

The Gainesville Police Department P2C (Police-to-Citizen) website uses visualization tools that allow citizens to help themselves in what way? a. Contact police officers b. Make a police report c. Pay traffic fines d. Map crime incidents e. File a complaint

Map crime incidents

In a packet-switched data communication network, which of the following is true: a. Packets can be lost or become corrupted between the sender and receiver b. All packets from a sender follow the same path through the network to the receiver c. All packets always follow the shortest path (fewest hops) through the network d. All packets from a sender always arrive at the receiver in same order they were sent e. The path packets follow in the network can never be changed if a data link fails

Packets can be lost or become corrupted between the sender and receiver

In the "Democracy Online" framework, what group should take responsibility for providing information about positions, candidates, and advocacy efforts, and work to involve supporters through online interactive spaces? a. Media and commercial content b. Government c. Private sector d. Political organizations e. Civic participation center

Political organizations

Parking garage passes and access control on employee ID badges are examples of: a. Bluetooth b. LEO c. RFID d. 4G / cellular

RFID

What technology has been used for such diverse applications as healthcare, tracking lost pets, and toll collecting on highways? a. RFID b. SCOR c. MRP-II d. Infrared e. CFAR

RFID

What IOT technology discussed in class could be used to identify shoppers and allow products to "introduce" (recommend) themselves to a shopper? a. RFID Tags b. Geotagging c. Product Metadata d. Crowdsourcing e. Folksonomies

RFID Tags

What common function do "HTTP", "TCP" and "IP" share? a. They all define internet-based protocols b. They all are website domains c. They all are data encryption methods d. They are abbreviations for physical media e. They are common computer viruses

They all define internet-based protocols

What is considered to be the center of the Internet structure? a. NAP b. Tier 1 ISP c. Tier 3 ISP d. LAN

Tier 1 ISP

In a vertical cross-functional business process diagram, the order of items in one column (from top to bottom) shows what relationship among these items? a. Time b. Cost c. Importance d. Frequency e. Skill level

Time

Which of the information layers in the Internet of Things model focuses on the communication networks that connect the sensors that actually collect the data? a. Transmission Layer b. Generation Layer c. Processing Layer d. Application Layer e. Metadata Layer

Transmission Layer

What free service delivers emergency information to registered UA students, faculty and staff -as well as their friends and family -via their cell phones, mobile devices and/or email accounts during a campus emergency? a. Blackboard b. D2L c. UAccess d. UAlert e. Twitter

UAlert

If your laptop runs an application that needs to securely talk to a server, but isn't executed within a browser, such as Firefox or Safari, what other technique is commonly used? a. VPN b. SSL c. TLS d. A Leased Line e. PGP

VPN

Businesses like to use Virtual Private Networks for every reason except? a. Virtual networks are faster than ordinary internet connections b. They have no control over the path data takes between business sites c. Data from web-browsers may not be encrypted d. Data from applications other than web browsers may not be encrypted e. Virtual networks are cheaper than leased lines

Virtual networks are faster than ordinary internet connections

Similar to trends in computing hardware, what is the trend for wireless network hardware? a. Virtualization and merging with the cloud b. Interference and attenuation are being eliminated c. Less, but bigger network antennas d. Putting networks onto chips e. Sensors that don't need batteries

Virtualization and merging with the cloud

What is an example of a social trend in e-learning? a. If the Internet doesn't work, you can't go to class b. You're expected to be connected to others in the online space c. You can search Google for whatever you need d. Books are now digital instead of on paper

You're expected to be connected to others in the online space

Satellites used for data communications that appear to be stationary from a fixed location on earth are placed in what type of orbit? a. Geosynchronous orbit b. Polar orbit c. Mid-earth orbit d. Elliptical orbit e. Commercial orbit

a. Geosynchronous orbit

Signals used to send messages can be _______ or digital. a. analog b. discrete c. rotary d. binary

analog

Telepresence systemsseamlessly integrate _____ and _____. a. contextual awareness; content management b. content awareness; hardware c. sentiment analysis; contextual software d. Ethernet; WiFi

contextual awareness; content management

The three security challenges of wireless communication are confidentiality, accessibility, and _____. a. importance b. Internet c. integrity d. incorporation

integrity


Ensembles d'études connexes

PSYC-1300 (LEARNING FRAMEWORKS) - MIDTERM

View Set

Top 50 Machine Learning Interview Questions & Answers

View Set

Chapter 36: Management of Patients with Musculoskeletal Disorders

View Set

PHI3626 Obojobo - Utilitarianism

View Set

Biology 101 Human Biology Chapter 5

View Set

CH 7: Blood and Blood-Forming Organs Diseases and Disorders

View Set

Chapter 11 The t Test for Two Related Samples

View Set

World History A Cumulative Exam Review

View Set

Chapter 2 Marketing Communications

View Set