MIS Module 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

________ is an unauthorized access point into a wireless network. 1)A rogue access point 2)War driving 3)Eavesdropping 4)An evil twin attack

1)A rogue access point

________ offer limited accessibility to the ________ of participating companies. 1)Extranets; intranets 2)Intranets; internets 3)Extranets; internets 4)Intranets; extranets

1)Extranets; intranets

Which of the project management documents includes all three of the triple constraints that are in the Scope Triangle? 1)Gantt Chart 2)Cross-functional Diagram 3)Hierarchical Diagram 4)PERT Chart 5)Spiderweb Diagram

1)Gantt Chart

________ is the number of shares of the company's stock outstanding multiplied by the price per share of the stock. 1)Market capitalization 2)Customer life cycle 3)Lifetime value 4)Customer churn

1)Market capitalization

Which of the following is the technology that enables most mobile wallet applications? 1)NFC 2)ERP 3)VRP 4)AFC

1)NFC

________ CRM systems are hosted by an external vendor in the vendor's data center. 1)On-demand 2)On-premise 3)Social 4)Mobile

1)On-demand

What is the purpose of a PERT chart? 1)Schedule and organize tasks 2)View the organizational structure of a company 3)Find where Product Enhancement, Research, or Training is needed 4)Review the Triple Constraint

1)Schedule and organize tasks

In project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resources and what other dimension of the planning process? 1)Scope 2)Value 3)Agility 4)Alignment 5)Feasibility

1)Scope

________ is the amount of bandwidth actually available for you to use. 1)Throughput 2)Connection speed 3)Broadband 4)Downloadability

1)Throughput

Bandwidth is stated in ________ per second. 1)bits 2)blips 3)bytes 4)beeps

1)bits

The human voice is a (an): 1.Analog Signal 2.Digital Signal 3.Hybrid Signal 4.Natural Signal

1.Analog Signal

________________ is access to the internet through your TV connection. 1)DSL 2)Cable modem 3)Dial-up 4)FTTH

2)Cable modem

What term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding? 1)Design Intention 2)Conceptual model 3)Semiotic Engineering 4)Emotional design

2)Conceptual model

The ________ functions as a transport mechanism; the ________ is an application. 1)Internet; intranet 2)Internet; World Wide Web 3)World Wide Web; Internet 4)World Wide Web; intranet

2)Internet; World Wide Web

Ethernet is a technology associated with ________s. 1)PAN 2)LAN 3)MAN 4)WAN

2)LAN

What is an affordance? 1)Being able to pay for something 2)Physical property of an object that shows functionality 3)Safety of users and of data 4)How well the user likes the interface

2)Physical property of an object that shows functionality

________________ store information horizontally and vertically. 1)Passive RFID tags 2)QR codes 3)Active RFID tags 4)Bar codes

2)QR codes

From Don Norman's perspective, what fatal flaw does the BMW iDrive (which he described as a well thought out, very logical, and sensible device) have with respect its human interface? 1)The iDrive did not have a hierarchical menu structure 2)The iDrive destroyed spatiality 3)The iDrive used a confusing set of control knobs 4)The iDrive only controlled the driving-related functions

2)The iDrive destroyed spatiality

__________________ refer(s) to word-of-mouth advertising. 1)Social influence 2)Viral marketing 3)Social apps 4)Social advertising

2)Viral marketing

The Internet is a ______________. 1)PAN 2)WAN 3)LAN 4)MAN

2)WAN

________ is a medium-range wireless network. 1)LTE 2)Wi-Fi 3)Cellular radio 4)UWB

2)Wi-Fi

Many experts believe ________ is the solution to the challenge of making money from social networking sites and social commerce sites. 1)company buy-in 2)advertising 3)crowdsourcing 4)employee use

2)advertising

Social computing increases _________. 1)threat of new entrants 2)buyer power 3)threat of substitutes 4)supplier power

2)buyer power

The web __________ the same thing as the internet. 1)could be 2)is not 3)is 4)I don't know

2)is not

You purchase the raw metal, glass, and leather to manufacture your new car from various suppliers. You are conducting business ________. 1)downstream 2)upstream 3)foolishly 4)internally

2)upstream

______________ satellites are the most expensive to build and launch. 1)SEO 2)MEO 3)GEO 4)LEO

3)GEO

________ is an analytical CRM technology. 1)OLTP 2)SFA 3)OLAP 4)CMA

3)OLAP

Which of these is NOT enumerated as a Motivation to Create Accessible Web Content? 1)To improve the lives of people with disabilities (human-centered motivations) 2)To capitalize on the a wider audience or consumer base (marketing or economic-centered motivations) 3)To improve the reliability of technical functionality (technology centered motivations) 4)To avoid lawsuits and/or bad press (public relations and punishment-centered motivations)

3)To improve the reliability of technical functionality (technology centered motivations)

The four guiding principles of accessibility (perceivable, operable, understandable, and robust) are included in what document? 1)Section 508 of the Rehabilitation Act 2)Web Content Accessibility Guide, Version 1.0 3)Web Content Accessibility Guide, Version 2.0 4)Americans with Disabilities Act

3)Web Content Accessibility Guide, Version 2.0

The guidelines for provided for ABP3 would be an example of which of the triple constraints? 1.Time 2.Resources 3.Scope

3.Scope

According to IT's About Business 9.3, ________ is writing repurposed for a mobile society in which readers' attention is fleeting. 1) Self-publishing 2) Traditional publishing 3) Online fiction 4) Serialized fiction

4) Serialized fiction

The advantage of ________________ is they can be read over greater distances. 1)Passive RFID tags 2)WSNs 3)QR codes 4)Active RFID tags

4)Active RFID tags

What is the importance of the triple constraints / the Scope Triangle? 1)Time, resources, and scope don't matter 2)Security is the most important constraint 3)You must funnel all resources into only one of the constraints 4)Any changes to one constraint will likely affect another constraint

4)Any changes to one constraint will likely affect another constraint

________ are exchange points for Internet traffic. 1)NSPs 2)IAPs 3)ISPs 4)NAPs

4)NAPs

________ clouds are IT infrastructures that can be accessed only by a single entity or by an exclusive group of related entities that share the same purpose and requirements, such as all of the business units within a single organization. 1)Hybrid 2)Vertical 3)Public 4)Private

4)Private

Which of the following is an example of using LinkedIn for market research? 1)Test market your messages, giving people 2-3 options and asking fans which one they prefer and why. 2)Following what a company is saying and following what everyone is saying back. 3)Obtain feedback from followers on advertising campaigns or market research. 4)Solicit advice regarding a topic or issue by going to specific groups.

4)Solicit advice regarding a topic or issue by going to specific groups.

Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project? 1)Individual work assignments for persons assigned to the project 2)The quality of the work performed during each major project milestone 3)Whether project tasks have been organized in the most efficient order 4)The project milestones and the order they are scheduled to be completed 5)Whether the major project milestones are being completed on budget

4)The project milestones and the order they are scheduled to be completed

________ computing allows service providers to make computing resources and infrastructure management available to customers as needed and then charges a ________ rate. 1)Utility; fixed 2)Grid; fixed 3)Grid; variable 4)Utility; variable

4)Utility; variable

________ can perform a wide variety of tasks from automating business processes to integrating components of an enterprisewide system to streamlining online buying and selling. 1)Vertical clouds 2)RLMs 3)LANs 4)Web services

4)Web services

The ____________ protocol enables client application programs to access the other layers. 1)Internet 2)transport 3)network interface 4)application

4)application

A ________ system tracks all communications between the company and the customer, the purpose of each communication, and any necessary follow-up. 1)sales forecasting 2)sales lead tracking 3)product knowledge 4)contact management

4)contact management

According to the textbook, ________ is the most commonly used and widely available cable medium. 1)fiber-optic 2)microwave 3)radio 4)twisted-pair

4)twisted-pair

Which of the following types of guided media has the highest level of physical security from eavesdropping? 1.CAT-3 Cable 2.CAT-5 Cable 3.Coaxial Cable 4.Fiber Optic Cable

4.Fiber Optic Cable

Which of the following "laws" we've discussed determines the maximum bandwidth (signaling rate) of a given type of communication media (e.g., copper cable, fiber optic, etc.)? 1.Moore's Law 2.Gilder's Law 3.Metcalf's Law 4.Shannon's Law

4.Shannon's Law

What organization employed Sir Tim Berners-Lee when he developed the "vague but exciting" concept for the world wide web? A. CERN-European Organization for Nuclear Research B. Defense Advanced Research Projects Agency C. Stanford Research Institute D. MIT Lincoln Labs

A. CERN-European Organization for Nuclear Research

In Terms of SEO Panda is what? A. Google's Filer to promote high quality web pages B. A large cute bear that mostly eats meat C. Google's Filter to eliminate low quality web pages D. Google's replacement for the page-rank system

A. Google's Filer to promote high quality web pages

What type of HTML tag is used to display a file that contains a photo on your website? A.<img> B.<jpg> C.<photo> D.<file>

A.<img>

You were instructed not to include your any personally identifiable information, such as your name, on your ABP-3 website to avoid a violation of FERPA (Family Educational Rights and Privacy Act). This addresses which of the following cybersecurity goals? A.Confidentiality B.Integrity C.Accessibility

A.Confidentiality

The design of connectors consider the speed of the communication interface, the function being supported, and what other concept related to human-computer interface design? A.Constraints to improve reliability B.Hidden affordances for security C.Cultural design standards D.Operational and functional causality

A.Constraints to improve reliability

DishTV, DirecTV, and SiriusXM radio are all based on what type of satellite technology? A.Geostationary Orbit (GEO) B.Middle Earth Orbit (MEO) C.Low Earth Orbit (LEO

A.Geostationary Orbit (GEO)

How would you describe the stakeholder role of Eller's Dean and the Mar/Comm Team in the project to transform the Eller College's website into a "marketing hub"? A.High Interest / Importance, High Influence B.High Interest / Importance, Low Influence C.Low Interest / Importance, High Influence D.Low Interest / Importance, Low Influence

A.High Interest / Importance, High Influence

What is the domain for the following ABP3 website? http://www.u.arizona.edu/~wtn A.edu B.arizona C.http:// D.~wtn

A.edu

What impairment for wireless communication actually serves as the basis for spatial multiplexing? A.Interference B.Attenuation C.Multi-path D.Distortion

B.Attenuation

What is the most important component of website project management? A.Keeping an open mind B.Communicating effectively and often C.Using tools to give you the upper hand D.Creating and revising, creating and revising

B.Communicating effectively and often

The expansion of telecommunications infrastructure occurred primarily during while era of globalization, as described by Thomas Friedman? A.Countries B.Companies C.Individuals

B.Companies

According to the speaker from Accenture, project management is not about lists and linear relationships, but rather involves managing what? A.Client requirements B.Complex inter-relationships C.Crisis management D.Project costs

B.Complex inter-relationships

What affordance issue is the label "PUSH" addressing? A.Perceptible Affordance B.False Affordance C.Correct Rejection D.Hidden Affordance

B.False Affordance

What term is used to describe the information collected describing the action (i.e., location, time, place, etc.) as opposed to the data itself? A.Hashtagging B.Metadata C.Entities D.Packets

B.Metadata

What term did we use to describe customer sale generated from a website lead (potential customer)? A.Purchasing Lead Time B.Sales Conversion C.Collaborative Planning, Forecasting and Replenishment D.Customer Opt-in

B.Sales Conversion

<imgalt="My House" height="200"src ="http://www.cnn.com/My%20House.JPG" width="141" /> What string within this "IMG" tag makes this absolute addressing for the image? A.alt="My House" directive B.http://www.cnn.com/ in src directive C. height="200" and width="141" D. Using the "%20" in the filename

B.http://www.cnn.com/ in src directive

Which of the Following is NOT true A. SEM stands for search engine marketing B. SEM is almost Completely Controllable C. SEO is almost Completely Controllable D. SEO stands for search engine optimization,

C. SEO is almost Completely Controllable

Google Analytics Reports include everything except what? A. Total Monthly Visits from Google Search B. Total Monthly Visits C. Total Monthly Visits from YouTube Referrals D. Total Monthly Visits from Google ads

C. Total Monthly Visits from YouTube Referrals

What is the most common mistake that increases page loading times? A. Failing to use a content Management System like WordPress B. Using MS Word to edit the webpage, creating huge documents C. Using huge images D. Using too many hyperlinks

C. Using huge images

f you are using a normal flat screen television (these are 1080P) what is the speed to you need to stream using any of the listed services? A.At least 2.5 Mbps B.At least 5 Mbps C.At least 9 Mbps D.At least 25 Mbps

C.At least 9 Mbps

Xerox PARC's Unicomp was a precursor to which of the following topics previously discussed in class? A.Globalization B.Entrepreneurship C.Collaboration D.Sustainability

C.Collaboration

What type of repeater has the greatest throughput? A.Single Band B.Double Band C.Double Radio

C.Double Radio

When we discussed data communication networks, what city did we indicate was partnering with the UA MIS Department to implement Smart City technology? A.Tokyo, Japan B.Hyderabad, India C.Fortaleza, Brazil D.Paris, France

C.Fortaleza, Brazil

What type of project management documentation includes information about all of the Triple Constraints? A.Timeline / Pipeline Chart B.PERT Chart C.Gantt Chart D.Work Breakdown Structure Char

C.Gantt Chart

What problem might occur when you operate WiFi networks, Bluetooth headsets, baby monitors, and garage door openers all using the same 2.4GHz ISM frequency range in close proximity to one another? A.Attenuation B.Multi-path C.Interference D.Distortion

C.Interference

Which of the following wireless issues would NOT be a problem for short range wireless communications technologies, such as RFID and NFC? A.Attenuation B.Interference C.Line-of-sight D.Multi-path

C.Line-of-sight

In general, what you think of as the quality of your network connection speed when you are using your PC, iPad, or Smartphone is most influenced by which of the following? A.Backbone Tier-1 ISPs B.Regional Tier-2 ISPs C.Local Tier-3 ISPs

C.Local Tier-3 ISPs

If you have one wireless access point, for best coverage you should do what? A.Mount it on your roof B.Mount it next to the front windows C.Mount it in the center of the house D.Mount it on a metal plate

C.Mount it in the center of the house

The Transmission Control Protocol (TCP) address all of the following issues related to the transmission of data using packets, EXCEPT: A.Packets being lost during transmission B.Receiving Packets out of message order C.Privacy for user's message content

C.Privacy for user's message content

What is the primary purpose of the Eller College website? A.Disseminate academic programs info B.Tell stories about students and alumni C.Serve as a marketing hub D.Provide resources for current students

C.Serve as a marketing hub

As I move farther away from campus, my connection to UAWiFi gets weaker. What will always cause this to occur? A.Signal blocked by strong encryption B.Signal has Multi-path propagation C.Signal strength has limited power D.Signal interference from other sources

C.Signal strength has limited power

Which of these is not an advantage of an all-in-one router, switch, WiFi access point, and Modem? A.You don't have to worry about connecting different network equipment together B.They are easy to upgrade C.They are cheap to upgrade D.They have one management interface

C.They are cheap to upgrade

What part of this "IMG" tag meets the POUR principle of being "perceivable"? A.height="200" width="141" B.http://www.cnn.com/ C.alt="My House" D."%20" in filename

C.alt="My House"

Before we redesigned our site, how many distinct Eller websites were there? A.1 B.7 C.27 D.37

D.37

What was a major consideration when selecting the paths (routes) for the physical media used for guided media? A.Right-of-way B.Geographical C.Political boundaries D.All of the above

D.All of the above

Why are there so many different physical connector types? A.The function (serial, parallel, video) often defines the number of signals required B.Different symbols, shapes and sizes improves reliability when connecting devices C.Connector design evolves as technology demands faster communication speed D.All of the above

D.All of the above

What is the most important component of website project management? A.Organization B.Participation C.Data analysis and reporting D.Communication

D.Communication

When printing from your phone or computer to a CatPrints station, you are printing to an: A.End-user Device B.Local Equipment C.Local-Loop/ISP D.Content Service

D.Content Service

How does this this wall safe provide a safe hiding spot? (outlet) A.Perceptible Affordance B.False Affordance C.Correct Rejection D.Hidden Affordance

D.Hidden Affordance

Most users of these salt-and-pepper shakers would most likely depend on information from what level of the McGinn hierarchy? A.Individual B.User Group C.Cultural D.Human Sensory Perception

D.Human Sensory Perception

The EcoReps Dashboards installed in residence halls are an example of what layer in the IOT model? A.Sensing and Identification B.Network Construction C.Information Processing D.Integrated Application

D.Integrated Application

Eller's Dean, Dr. Paulo Goes, routinely sends an email newsletter called "Dean's Update" with information about the college to alumni and donors. Which web marketing strategy does this use? A.Law of the Dean End Street B.Law of Giving and Selling C.Law of Trust D.Law of Push and Pull

D.Law of Push and Pull

What did the NASA project manager indicate was the greatest risk he faced in managing projects for NASA? A.Lack of individuals with technical expertise B.Technology failures C.Cost overruns D.Social and political risk

D.Social and political risk

Packets sent over which route will arrive first (shortest transmission time)? A.P1 Route B.P4 Route C.P6 Route D.Unknown-Can't be determined from information shown

D.Unknown-Can't be determined from information shown

Which of the following is NOT a listed technique to make websites mobile friendly? A. Using easy-to-tap navigation and links B. Structured data available on both desktop and mobile platforms C. Content readable on mobile devices without zooming D. Utilizing responsive design E. Using technologies like flash to enhance your websites capablities

E. Using technologies like flash to enhance your websites capablities


संबंधित स्टडी सेट्स

Mr. Dye Period 5 AP classroom questions and Khan questions

View Set

p. 55 ex. 1 - Mise en pratique - Les Invites

View Set

Ch.15 Professional Practice Models, Leadership Exam #3

View Set

Thermochemical Equations assignment and quiz

View Set

NCLEX questions, answers, rationals

View Set