MIS 111 Part 3
Which of the three NFC (Near Field Communication) communication modes allows your phone to act like an "interactive card" for payment, transportation, identification, and physical access?
Card emulation mode
From a data network infrastructure perspective, what type of cabling (wired guided media) is commonly associated with residential subscribers with POTS (plain old telephone service) service?
Category 3 Twisted Pair Cables
Which of the following types of IT Infrastructure implements a distributed processing model that uses personal computers that are connected through a local area networks (LANs) to applications running on a mainframe computer?
Client-server computing
Tracking, traceability, authentication, and control are all associated with what type of benefit provided by RFID (Radio Frequency Identification) tracking?
Operational
According to Adopting the IoT Paradigm: Challenges and Opportunities, using IOT to track packages, containers, and other bulkware are examples of what type of "smart" IOT technologies?
Smart logistics
Google Apps, Apple iCloud, and Salesforce.com are allow examples of which of the following computing models?
Software-as-a-Service
In which of the following cloud models is the customer responsible for managing the fewest of the computing resources?
Software-as-a-Service
Increasingly popular with SMEs (Small-to-Midsize Enterprises), which of the following cloud delivery models is delivered through a browser and avoids the need to manage either hardware or software?
Software-as-a-service (Saas)
Which of the following types of authentication methods would use regular identification (ID) cards, smart ID cards, and tokens to authenticate that someone is an authorized personnel?
Something the user has
As shown below, what "Host name" should be used with WinSCP (or equivalent field for CyberDuck) to connect to the UArizona personal web hosting server?
u.arizona.edu
In the URL "http://www.u.arizona.edu/~wtn", what part of the URL defines the hosting server?
u.arizona.edu
What data communication code was developed in 1835 to transmit messages digitally over a new communications infrastructure?
Morse Code
In comparison to other wireless media channels, which of the following wireless transmission systems experiences the most significant propagation delay?
Satellite
Categories such as access to sensitive data, data segregation (among customers), accountability, malicious insiders, and account control are all concerns about cloud computing related to which of following issues?
Security
As discussed in the Cloud Computing Trends for 2020 case study, what is an important driver for the increasing demand for cloud-based Disaster-Recovery-as-a-Service (DRaaS) services?
Service Outrafes and Natural DIsasters
In our class discussion, which of the following messaging apps was described as using end-to-end encryption to send individual, group, video and voice messages?
Signal
Which of the following uses a flexible system that optimizes performance across an interconnected network that can autonomously operate entire production processes? Question 1 options:
Smart Factory
Which of the following web hosting services is acceptable for the EC Hosting assignment?
U-System (UArizona's Web Hosting Service)
What is the correct "port" number that should be used with the WinSCP or CyberDuck secure file transfer program?
22
According to the Wireless Network Basics video case, which of the following IEEE standards is the designation for all "flavors" (e.g., A, B, G, and N) of WiFi?
802.11
In our discussion of GreenTech, which of the following issues was NOT mentioned as one of the "unique legal and regulatory issues" that the author's recommended using foresight and preparation when developing new legal strategies?
Accessibility and universal design
Cyber-Physical System (CPS) engage with "real space" through interactions with all of the following EXCEPT:
Augmented Reality
According to Forrester, which of the following emerging technologies is likely to have the disruptive potential to "change the world" in the next 3-5 years?
Augmented and Virtual Reality
From a networking infrastructure perspective, which of the following descriptive terms would generally be associated with the transmission of digital data?
Bits per second
In a circuit switched network, which of the following terms describes when a telephone call cannot be made due to the needed resources (e.g. communication links) being unavailable while assigned to another subscriber's call?
Blocked
Which of the following terms describes a short-range wireless network used for communication among computer devices (e.g., telephones, personal digital assistants, smartphones) located close to one person?
Bluetooth
Also known as a "rotation cipher," what is the more common name for a cipher that simply replaces a letter with another letter that is a fixed number of letters away?
Caesar Cipher
As described by the UofA's Autonomic Computing Lab, which of the following would NOT be commonly considered as being one of the challenges for the Future of the IOT (Internet of Things)?
Competition
In the video case, What are the cyber risks tied to the coronavirus pandemic? all of the following were described as new security challenges facing individuals teleworking during the pandemic for the first time except:
Computing devices are more likely to be stolen from the homes
Which of the following business applications would typically NOT be something that commonly associated with NFC (Near Field Communication) technology?
Connected vehicles, such as Qualcomm's V2X (Vehicle to Everything
For network infrastructures that transmit information using analog signals through a communication channel, what term is used measure the bandwidth?
Cycles per second (Hertz)
The increasing number of connected IOT (Internet of Things) devices has increased security challenges in all of the following areas EXCEPT:
DDOS (Distributed Denial of Service) Attacks
In the discussion of how Internet Bridges the Communications Gap Transparently, which of the following was NOT discussed as a capability of the end-user device?
DNS and Email Services
Used by organizations such as the United Nations, the Electronic Frontier Foundation to protect dissidents, informants, and sources in oppressive countries, what names is used for the portion of the Internet that is a "safe haven" for whistleblowers, activists, and journalists who need to share sensitive information but cannot do so publicly for fear of political persecution or retribution by their governments or employers?
Dark Web
According to the Future of Medtech video case study, what is a potential new source of information to improve preventative care?
Data from consumer-focused technology companies
All of the following are factors contributing to the rapid growth of the cloud computing industry, except:
Declining costs of power, space, and maintenance needed to operate a data computer
What term is used to describe when one physical device, such as a smartphone, provides the functions that previously required many physical devices, such as GPS navigators, flashlights, medical devices, credit cards, texting, and cellular phones?
Dematerialization
What MIS Professor developed a tool for detecting fraud using real-time score of the authenticity of based on an applicant's behaviors?
Dr. Joe Valcich
Which of the following was NOT a known problem with the security of the ENIGMA machine?
ENIGMA machines emitted radios signals that were intercepted
Which of the following cloud computing characteristics allows organizations to share the processing resources of many geographically dispersed computers across a network?
Encompasses the characteristics of grid computing
Also known as an "end office", in the PSTN (Public Switeched Telephone Network), what term is used to describe one of the 19.000 telephone company US switching centers?
Exchanges
Widely used in the areas of business-to-business (B2B) electronic commerce and supply chain management (SCM), what term is used to describe a network that connects parts of the intranets of different organizations and enables business partners to communicate securely over the Internet using virtual private networks (VPNs)?
Extranet
When a cloud service vendor fails to meet their commitment to provide a specified level of service under a Service Level Agreement (SLA), such as system availability, what is the customer most commonly entitled to receive from the cloud service vendor?
Financial compensation
In the Code Breakers Decipher Letters by Mary, Queen of Scots case study, all of the following techniques were used by the cryptologists to decode the letters EXCEPT:
Finding a "rosetta stone" that included both encrypted and decrypted messages
As discussed in our Topic Overview lecture, what city in northeast Brazil, that also has a connection to the UArizona MIS Department, is the primary terminal for most undersea fiber option cables in the Atlantic Ocean ?
Fortaleza, Brazil
What emerging GreenTech clean energy source is created from water using electrolysis produced from renewable power and leaves no by-products other than oxygen?
Green Hydrogen
What type of business continuity facility is a fully configured computer facility with all of the company's services, communications links, and physical plant operations to allow rapid recovery in the event of a major disaster?
Hot site
According to Forrester research, which of the following technologies stands out in the emerging field of "insight technologies"?
IOT and Spatial Analytics
According to the What is The Internet of Things? video case, which of the following IP (Internet Protocol) addressing schemes creates more IP addresses than there are atoms on the surface of the earth?
IPv6
The adoption of which Internet Protocol (IP) has been an important factor in the development of the Internet of Things?
IPv6
Which of the following terms describes a company that provides Internet connections for a fee?
ISP (Internet Service Provider)
As described by the UofA's Autonomic Computing Lab, which of the following challenges for the Future of the IOT (Internet of Things) relates to individuals becoming increasingly associated with a unique IP (Internet Protocol) address?
Impersonalization
In a smart city environment, which of the following was NOT described as a benefit from using IOT to connect traffic signals?
Improved emergency services response times
Which of the following is generally NOT considered an advantage of a Virtual Private Network (VPN)?
Improves connection speed from remote devices
Which of the following business opportunities was enabled by the evolution of cellular communication technologies (i.e., 3G, 4G, and 5G networks) allowing cellular network providers to have higher density networks?
Increased Customers
What dimension of the business use of cloud systems focus on the benefits of rapid deployment, on-demand provisioning, and disaster recovery?
Increased Flexibility
According to IOT Innovation Lab video case, one of The Hartford's two main strategic objectives for IOT devices is to help it predict, prevent, detect and mitigate what?
Insurance losses
In the CapGemini IOT Industry 4.0 case, what dimension focuses on the way that Smart Products are equipped with computing power that enables autonomous decision-making and self-learning processes based on algorithms?
Intelligent
Which of the following challenges for wireless communication is commonly caused by unregulated wireless network frequencies (e.g., 2.4 GHz) shared by other devices (e.g., cordless phones) and other general noise sources?
Interference
Which of the following is NOT a characteristic of terrestrial microwave telecommunications links?
Microwave signal sent between data link stations will follow the curvature of the earth
Which of the following supply chain management business functions is RFID commonly used to support in companies in the process industry, such as Cargill or Georgia-Pacific?
Item-level Lot Tracking
What term is used to describe the connection between an internet service provider and their customers, i.e., network connection to your home?
Last Mile
Also known as a subscriber line, in the Public Switched Telephone Network (PSTN), what is the connection between the local telephone company exchange office and a subscriber's house called? Question 1 options:
Local Loop
According to Nicolas Carr, which of the following factors is pushing IT (Information Technology) towards rapid commoditization?
Market forces
All of the following characteristics are considered as advantages of circuit switching data communication networks EXCEPT:
Messages have multiple routing options
Which of the following is NOT a technique that is commonly used by a firewall to manage information sharing between two networks?
Multi-factor Authentication
Which of the following cloud environments helps companies avoid being locked into a particular cloud vendor's infrastructure, add-on services, and pricing model by deploying cloud-native applications that are portable across several cloud vendors services?
Multiple cloud (multicloud)
Which of the following terms describes the marketing strategy where content providers pay their audience to watch or interact with a company's advertisements or other online content?
NOT Popp advertising
When designing a security-in-depth strategy, security measures such as firewalls, VPNs and SLL would be examples of what type of control?
Network Access
As more IOT (Internet of Things) connected cars are connected through though wireless technologies such as DSRV (Dedicated Short Range Communication), urban connectivity is expected to improve traffic management in all of the following ways EXCEPT:
Optimized toll collection
What type of network is most commonly associated with Bluetooth technology?
Piconet or PAN (Personal Area Network)
In the the Physical vs Logical Topologies video case, an analogy was made comparing planning a trip to a network topology. Which of the following was NOT given an example of a characteristic similar to elements of a physical topology?
Planned order of cities to be visited
Which of the following dimensions of the Open Cloud cloud taxonomy would offer services related to business intelligence, database management, and application development and testing?
Platform Services
Which of the following parameters, common to both WinSCP (Windows Secure Copy) and Cyberduck, is a number that uniquely identifies a connection endpoint and directs data to a specific TCP/IP service?
Port
As discussed in the the video case Vint Cerf Explains TCP Networking, what example does he use to explain how messages are sent?
Post Cards
What security application is commonly integrated into email systems to allow messages to be sent securely using encryption?
Pretty Good Privacy
According to Intel Canada's video "Public, Private and Hybrid Clouds," what type of cloud architecture offers a high level of control of the resources but the *least* (lowest ability for) scalability?
Private
Which of the following dimensions of the Internet of Everything (IOE) focuses on delivering the right information to the right person (or machine) at the right time?
Process
What term is used to describe technology that can be owned, actually or effectively, by a single firm (e.g., patents, secrets, exclusive licenses)?
Proprietary
As market forces push IT toward rapid commoditization, Nicholas Carr recommends companies shift their priorities in all of the following ways EXCEPT:
Recognize higher levels of risk are required to innovate IT (Information Technology)
How does adding a repeater or booster in a home data network impact data transmission latency?
Repeater retransmissions significantly add to network data transmission latency
As discussed in the Eye on Oversight - Cybersecurity video case, which of the following security areas does the Department of Health and Human Services (HHS) security work focus on being proactive and identify vulnerabilities?
Risk Management
What the name of the device that is accessed using a public IP (Internet Protocol) address for the external internet while forwarding traffic from your home network devices that use private addresses assigned using Network Address Translation (NAT)?
Router
Which of the following terms describes a technique used with the electric telegraph in which information is sent to an intermediate station where it is received and then sent at a later time to the final destination or to another intermediate station?
Store-and-forward
Which of the following was not discussed as one of the three factors that should be considerd when a company considers developing a new telecom service?
Sustainability
In the Breakthrough Energy Catalyst video case, investments are being made to develop technologies to convert biological inputs, including municipal waste, into what product?
Sustainable Aviation Fuel
During which industrial revolution did electronics and information and communication (ICT) technology create a "digital revolution" that further advanced automation?
Third Industrial Revolution
During which period of accelerated societal change, often described as an industrial revolution, did electronic and IT system have a significant impact for the first time as technology such as programmable logic controllers helped automate production?
Third Industrial Revolution
Which type of signal multiplexing offers each user full bandwidth, but is only periodically on (shared availability), as shown in the example below for circuit utilization?
Time-division Multiplexing
According to A Cloudy History of Time, Honeywell, IBM, and Xerox the dominant companies in what industry in 1975? Question 1 options:
Timesharing Industry
As described in the Bloomberg Killing the Need for Passwords With Biometrics video case study, what type of biometric measure was developed by EyeVerify to determine someone's identity with only a smartphone?
Vein patterns in your eye
Analog VGA and digital DVI computer ports provide are interfaces to what type of computer peripheral?
Video Monitors
Which of the following is NOT a prediction discussed in the Perkin's Coie's report on emerging technology trends for the impact of COVID-19 on retail spaces?
Virtually all (more than 90%) of the pandemic-related digital shift will be permanent
According to the Creating a Cyber Secure Home video case, which of the following three types of encryption is an older, weaker form of encryption that should not be used to secure home wireless access points?
WEP (Wired Equivalent Privacy)
Which of the dimensions of Cisco's Smart Building infrastructure was mentioned by The Hartfor in the IOT Innovation Lab video as an opportunity for offering services related to risk prevention and conservation?
Water Sensors
Which of the following is an autonomous device that monitors its own condition as well as physical and environmental conditions around it, such as temperature, sound, pressure, vibration, and movement?
Wireless sensor
Led by their Chief Scientist Mark Weiser, what organization was one of the first groups to explore Ubiquitous Computing?
Xerox PARC (Palo Alto Research Park)
Used for our RAHosting template file, which of the following is a common file format that's used to compress one or more files together into a single location making them easier to transport or store?
ZIP file
If your personal UArizona email address is "[email protected]", which of the following would be the exact URL that you should used when accessing your personal U-System URL website address for the EC Hosting project?
http://www.u.arizona.edu/~wilbur
Which of the following is the full filename that should be used for your EC Hosting assignment in the public_html directory on the u.arizona.edu (U-System) server?
index.html (all lower case characters)