MIS 111 Exam 3 PAR
The advantage of ________________ is they can be read over greater distances. 1) Active RFID tags 2) Passive RFID tags 3) QR codes 4) WSNs
Active RFID tags
The Internet of Things is also called the _______. 1) Industrial Internet 2) Internet of Anything 3) Internet of Everything 4) M2M Communication 5) All of the other answers are Correct
All of the other answers are Correct
What is the importance of the triple constraints / the Scope Triangle? 1) You must funnel all resources into only one of the constraints 2) Any changes to one constraint will likely affect another constraint 3) Security is the most important constraint 4) Time, resources, and scope don't matter
Any changes to one constraint will likely affect another constraint
Which of the following is NOT a value-adding attribute of mobile computing? 1) Bandwidth improvement 2) Instant connectivity 3) Localization 4) Ubiquity
Bandwidth improvement
What term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding? 1) Conceptual model 2) Emotional design 3) Design Intention 4) Semiotic Engineering
Conceptual model
What type of innovations are intended to be incompatible with existing standards and value chain, and must develop markets de novo (latin for "from the beginning")? Disruptive Innovation Platform Innovation Profit Innovation Application Innovation Product Innovation
Disruptive Innovation
Which of the following was NOT described as one of the four innovation zones? Category Renewal Zone Customer Intimacy Zone Product Leadership ZoneProduct Leadership Zone Operational Excellence Zone Disruptive Technology Zone
Disruptive Technology Zone
VPN is a type of ________________. 1) Extranet 2) Internet 3) Intranet 4) None of the above
Extranet
Which of the project management documents includes all three of the triple constraints that are in the Scope Triangle? 1) PERT Chart 2) Spiderweb Diagram 3) Gantt Chart 4) Cross-functional Diagram 5) Hierarchical Diagram
Gantt Chart
____________ is installing and operating ultrafast fiber-optic cable service. 1) AT&T 2) Comcast 3) Google 4) Verizon
The web __________ the same thing as the internet. 1) Could be 2) Is 3) Is not 4) I don't know
Is not
What type of customer intimacy zone innovation focuses on making structural modifications to established products in order to create a distinctive sub-category? Experiential Innovation Value-engineering Innovation Line-Extension Innovation Enhancement Innovation Marketing Innovation
Line-Extension Innovation
Which of the following is a business-to-business sharing firm? 1) Amazon 2) LinkedIn 3) LiquidSpace 4) Zipcar
LiquidSpace
The _____________ model at the Miami Children's Hospital is most appropriate for nonemergency, consultative services because the physician is limited to a visual examination. 1) Dynamic 2) Extremely static 3) Mobile 4) Semistatic
Mobile
______________________ refers to the real-time connection between a mobile device and other computing environments. 1) Location-based commerce 2) Mobile computing 3) Mobile commerce 4) Telemetry
Mobile computing
Which of the following is the technology that enables most mobile wallet applications? 1) AFC 2) ERP 3) NFC 4) VRP
NFC
The ____________ protocol places packets on, and receives them from, the network medium. 1) Application 2) Internet 3) Network interface 4) Transport
Network interface
From smallest to largest, which of the following is in the correct order? 1) LAN, PAN, MAN, WAN 2) LAN, MAN, PAN, WAN 3) PAN, LAN, MAN, WAN 4) PAN, MAN, LAN, WAN
PAN, LAN, MAN, WAN
Which of the following is NOT one of the "4 P's" of innovation? Product Process Process Paradigm Shifts Personalization
Personalization
What is an affordance? 1) Being able to pay for something 2) Physical property of an object that shows functionality 3) How well the user likes the interface 4) Safety of users and of data
Physical property of an object that shows functionality
What type of innovation focuses on the supply side, looking for opportunities to remove non-value-adding steps from the workflow? Organic Innovation Value-Engineering Innovation Process Innovation Enhancement Innovation Value Migration Innovation
Process Innovation
Marks & Spencer implemented _______ to track its inventory more effectively. 1) Bar codes 2) Optical scanners 3) QR codes 4) RFID
RFID
What is the purpose of a PERT chart? 1) Schedule and organize tasks 2) View the organizational structure of a company 3) Review the Triple Constraint 4) Find where Product Enhancement, Research, or Training is needed
Schedule and organize tasks
In project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resources and what other dimension of the planning process? 1) Value 2) Scope 3) Agility 4) Alignment 5) Feasibility
Scope
To access the internet ILLEGALLY, Cuban citizens can _________. 1) Pay $5 per hour 2) Share user accounts 3) Show their national ID 4) Sign agreements
Share user accounts
An advantage of a radio transmission system is ____________. 1) Large coverage area 2) Relatively inexpensive 3) Signals pass through walls 4) All of the above
Signals pass through walls
Which of the following is used to conduct market research? 1) Social advertisements 2) Social intelligence 3) Sponsored stories 4) Viral marketing
Social intelligence
Craigslist is an example of a _____________. 1) Peer-to-peer shopping model 2) Rating, review, and recommendation site 3) Shopping community 4) Social marketplace
Social marketplace
_____________ is a disadvantage of twisted-pair wire. 1) Difficult to work with 2) Relatively expensive and inflexible 3) Subject to interference 4) All of the above are disadvantages
Subject to interference
Which of the following is a benefit of social commerce? 1) Privacy 2) Security 3) Testing 4) All of the above are benefits
Testing
From Don Norman's perspective, what fatal flaw does the BMW iDrive (which he descibed as a well thought out, very logical, and sensible device) have with respect its human interface? The iDrive did not have a hierarchical menu structure The iDrive destroyed spatiality The iDrive only controlled the driving-related functions The iDrive used a confusing set of control knobs
The iDrive destroyed spatiality
Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project? 1) The quality of the work performed during each major project milestone 2) The project milestones and the order they are scheduled to be completed 3) Individual work assignments for persons assigned to the project 4) Whether the major project milestones are being completed on budget 5) Whether project tasks have been organized in the most efficient order
The project milestones and the order they are scheduled to be completed
The Sochi Winter Games were similar to the Vancouver Winter Games in what respect? 1) Both cities had a fairly modern basic IT infrastructure that was improved for the Games. 2) The wireless networks of both were able to handle 4 Tbps per second. 3) Wireless traffic outnumbered wired traffic by 4:1 for both. 4) They both utilized the services of Avaya to get their cities ready for the Games.
They both utilized the services of Avaya to get their cities ready for the Games.
Which of the following is NOT a major advantage of wireless devices to users? 1) They are small enough to easily carry or wear. 2) They can be used to copy and pass on confidential information. 3) They can communicate wirelessly with the Internet and other devices. 4) They have sufficient computing power to perform productive tasks.
They can be used to copy and pass on confidential information.
Which of these is NOT enumerated as a Motivation to Create Accessible Web Content? To improve the reliability of technical functionality (technology centered motivations) To improve the lives of people with disabilities (human-centered motivations) To capitalize on the a wider audience or consumer base (marketing or economic-centered motivations) To avoid lawsuits and/or bad press (public relations and punishment-centered motivations)
To improve the reliability of technical functionality (technology centered motivations)
__________________ refer(s) to word-of-mouth advertising. 1) Social advertising 2) Social apps 3) Social influence 4) Viral marketing
Viral marketing
The Internet is a ______________. 1) LAN 2) MAN 3) PAN 4) WAN
WAN
____________ are networks that aren't contiguous. 1) LAN 2) MAN 3) PAN 4) WAN
WAN
_____________ is the act of locating WLANs while driving around a city. 1) A rogue access point 2) Eavesdropping 3) RF jamming 4) War driving
War driving
One key feature of __________________ is the ability to remix applications and data. 1) Web 1.0 2) Web 2.0 3) Web 3.0 4) None of the above
Web 2.0
The four guiding principles of accessibility (perceivable, operable, understandable, and robust) are included in what document? 1) Americans with Disabilities Act 2) Web Content Accessibility Guide, Version 2.0 3) Web Content Accessibility Guide, Version 1.0 4) Section 508 of the Rehabilitation Act
Web Content Accessibility Guide, Version 2.0
____________ enables peer-to-peer communications and allows users to transfer content among devices without having to rely on a wireless antenna. 1) MiFi 2) Wi-Fi 3) Wi-Fi Direct 4) Super Wi-Fi
Wi-Fi Direct
Cuban citizens primarily have access to _____________. 1) an extranet 2) an intranet 3) the internet 4) nothing internet-related
an intranet
Compared to physical crime, online theft is ____________ likely to become public knowledge because companies __________. 1) less; know they won't be able to keep it a secret and worry about how much money could be stolen from their customers 2) less; worry that the disclosure will inflict more damage than the theft by frightening away customers 3) more; know they won't be able to keep it a secret and worry about how much money could be stolen from their customers 4) more; worry that the disclosure will inflict more damage than the theft by frightening away customers
less; worry that the disclosure will inflict more damage than the theft by frightening away customers
Which of the following is NOT a major threat to wireless networks? 1) eavesdropping 2) tapping 3) rogue access points 4) radio-frequency jamming
tapping