CCR 3: Class 33-42
Selecting computers with EPEAT power supplies should reduce the annual operating cost of a computer by what?
$7.00
Selecting an equivalent replacement for an existing piece of electronic equipment (e.g., replacing an existing monitor with a more energy efficient a new monitor that performs the same functional role) based on the Electronic Product Environmental Assessment Tool (EPEAT) is an example of change in which order of effect on environmental sustainability?
1st order
According to Social Media Today, in 2018, what percentage of online chat conversations were done by chatbots?
30%
LTE is ________ cellular technology.
4G
According to Social Media Today, What percentage of the content of a video message is typically retained by the viewer?
95%
________ is a two-dimensional code that can store much more information than ________.
A QR code; bar codes
In a communication architecture, transmitters and senders are described using what term?
Actors
According to the Mythical Man Month view, adding resources (addition team members) to a project will improve (shorten) the time required to complete the project by the largest amount under which of the following scenarios?
Adding resources to a partitionable task
What is the importance of the triple constraints / the Scope Triangle?
Any chance to one constraint will likely affect another constraint
As described by CapGemini, what aspect of smart products used an Industry 4.0 environment would focus on using sensor technology to give access to condition information regarding products and their environment?
Aware
Which of the following descriptive terms would generally be associated with the transmission of digital data?
Bits per second
_______ is a short-range wireless network
Bluetooth
What "law" states that "adding manpower to a late software project makes it later"?
Brooks Law
LEED refers to the efficiency of?
Buildings
Social computing has vastly altered both the expectations of customers and the capabilities of corporations in the area of _________.
CRM
According to Oracle, after the amount of energy required directly required to run the servers and computer equipment, which of the following is the next largest user of electrical power in an average data center?
Chillers and computer room air conditioning(CRAC)
________ cables are made of copper
Coaxial
If you have an empty building you can move into if your primary location is destroyed, you've implemented a _________ site.
Cold
According to the presenter in the Managing a Website Project video case, what is a critical element for a client to get the most out of a web design team?
Communication
According to IT's About Business 6.2, the main drawback to Google Fiber for Google is ________.
Cost
Selecting EPEAT-compliant technology with a high rating over traditional, less energy efficient technology is an example of focusing on what sustainability effect?
Creation, Use, and Disposal of a product
Which of the following types of wireless communication used as part of a connected vehicle architecture would have a line-of-sight range of approximately 300 meters?
Dedication Short- Range Communication
Which of the following is NOT broadband?
Dial-up
What is the name of the computer software system that translates Uniform Resource Locator (URL's) into IP addresses?
Domain Name System
According to the "Cloud Computing Trends for 2020" video case, what term is used to describe a distributed computing model where information is processed closer to its source?
Edge Computing
Which of the key properties of virtualization supports the goal of creating a more sustainable use of technology by saving an entire virtual machine (VM) into a file so that all VMs can be migrated and consolidated on a single active server?
Encapsulation
_________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.
Encryption
As discussed in the Neuro-ID video case study, in addition to measuring a customer's "friction" (e.g., frustration or satisfaction), the system also is able to measure what security-related aspect of customer "intent"?
Entering data in a way associated with fraudulent behaviors
Using a PERT chart to identify variances from planned project schedule dates is an example of what type of management report that has been previously discussed that identifies business activities that are not achieving a prescribed performance metric?
Exception report
________________ enables secure communication over the Internet using VPNs
Extranet
According to IT's About Business 9.4, GM used ________ to promote jobs and feature new cars.
According to IT's About Business 8.6, ________ launched EDEN to improve the efficiency and effectiveness of its dock operations.
FedEx
When a cloud service vendor fails to meet their commitment to provide a specified level of service, such as system availability, what is the customer usually entitled to receive from the cloud service vendor?
Financial Compensation
Which of the project management documents includes all three of the triple constraints that are in the Scope Triangle?
Gantt Chart
________ computing pools various hardware and software components to create a single IT environment with shared resources.
Grid
What stakeholder role would best describe Dr. Robbins', who is President of the University of Arizona and responsible for guiding the future direction of the university, role with respect to the project to develop a strategic plan for the University of Arizona?
High interest/ Importance and High Influence
___________ was implemented to address smartphones, since they are basically hand-held computers.
IPv6
A(n) ________ is a company that provides Internet connections for a fee
ISP
According to IT's About Business 8.3, under Belgian law, Bobbejaanland Family Park is considered a(n) ________ because
ISP; it offers free Wi-fi to patrons
With the ________ model, cloud computing providers offer remotely accessible servers, networks, and storage capacity.
Iaas
The origins of the IOT-based security breach at Target was related to which of the following dimensions of the IT/IOT converged security model?
Identity Services
The ________________ is a network of networks
Internet
The ________ functions as a transport mechanism; the ________ is an application.
Internet;World Wide Web
According to IT's About Business 6.2, Google Fiber was first deployed in
Kansas City
According to CIO Magazine, where is considered the best place to build a data center in North America?
Kelowna, British Columbia, Canada
Who was Harald Blaatand "Bluetooth" II?
King of Denmark from 940 to 981
Which of the following types of computer ports (mechanical network connectors) would NOT be considered a serial data communication interface?
LPT Port
Which of the following types of website types (as described in the ABP-3 guidelines) best describes use of the Eller website as a marketing hub to connect with new prospective students and potential donors through SEO and a cohesive online presence?
Lead-generation Website
In the Public Switched Telephone Network (PSTN), what is the connection between the local telephone company exchange office and a subscriber's house called?
Local Loop
When comparing the energy consumption of DVD vs. streaming content over the internet, with respect to energy consumption per viewing hour, which of the following viewing methods use the least amount of primary energy and generates the least CO2 emissions?
Mail Rented
_________ suffer most, if not all, of the financial damages in fraudulent transactions.
Merchants
Which of the following is a medium-range wireless network?
Mifi
What % of people like to purchase products from companies that protect the environment?
More than 50%
What communication code was developed in 1835 to send messages digitally over a new communications infrastructure?
Morse Code
________ are exchange points for Internet traffic.
NAPS
When designing a security-in-depth strategy, firewalls and VPNs would be examples of what type of control?
Network Access
In a smart city environment, which of the following was NOT described as a benefit from using IOT to connect traffic signals?
New revenue opportunities
Increased visibility, Tracking, Traceability and Higher Quality are all attributes of what type of benefits for tracking items using RFID tags?
Operational Benefits
In the Eller Website Redesign Process, User Testing was incorporated into each of the following phases except;
Phase 3: Site Production
As discussed in the the video case "Vint Cerf Explains TCP Networking," what example does he use to explain how messages are sent?
Postcards
According to Intel Canada's video "Public, Private and Hybrid Clouds," what type of cloud architecture offers a high level of control of the resources but the *least* (lowest ability for) scalability?
Private
________ allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals
RFID
Which of the following is NOT a basic function of TCP/IP?
Responsible for disassembling, delivering, and reassembling data during transmission
_______________ is a process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan.
Risk mitigation
With the ________ delivery model, cloud computing vendors provide software that is specific to their customers' requirements.
SaaS
What is the purpose of a PERT chart?
Schedule and organize tasks
In project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resources and what other dimension of the planning process?
Scope
________ require massive amounts of electrical power, air conditioning, backup generators, and security.
Server farms
Using IOT to track packages, containers, and other bulkware are examples of what type of "smart" IOT technologies?
Smart logistics
In which of the following cloud models is the customer responsible for managing the fewest of the computing resources?
Software-as-a-Service
On the UofA CatCard, your personal signature is what type of authentication control?
Something you do
According to the Physical vs. Logical Topologies Video Case, what type of network topology is the most common physical topology?
Star Topology
In an RFID system, where would the unique data identifying an item typically be found?
Tag
Which of the following is an example of using Facebook for market research?
Test-market your messages giving people 2-3 options and asking fans which one they prefer and why .
In the following critical path diagram, if the time required to complete "Task B" was increased by 4 days, so that Task B now requires 6 days instead of 2 days, how would the critical path (currently shown as 9 days) be affected?
The critical path will increase to 10 days
According to the Bloomberg Biometric Passwords case study, EyeVerify helps protect enterprise networks and mobile financial services using what type of biometric measurement?
The pattern of the blood vessels in whites of your eye
Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project?
The project milestones and the order they scheduled to be completed
POTS (Plain Old Telephone Service) or basic, voice-grade analog telephone service has been historically most closely associated with what type of network infrastructure?
Twisted- pair cabling
________ allows MIS professionals to search for needed web services by creating public or private searchable directories of these services.
UDDI
Introduced in the 1990's, what industry trend was described as the business model of offering computing resources as a metered (based on actual usage rates)?
Utility Computing
According to the articles what technologies enable businesses and their employees to get in front of clients and customers but do it in a cost-savings manner?
VoIP and web conferencing
In the "Eye on Oversight" video case study, what was the name of a ransomware software that impacted the United Kingdom National Health Service in 2017?
Wannacry
According to IT's About Business 9.3, ________ is a social reading platform and writing community in which authors post articles, stories, fiction, and poems, either online or through the mobile app.
Wattpad
According to Cisco, what was considered the "inflection point" for the Internet of Things?
When the number of connected devices outnumbered people on the planet
In terms of maximum operating range, which of the following correctly orders the sort-range wireless technologies from longest range to shortest range?
Wifi, Bluetooth, RFID, NFC
Many experts believe ________ is the solution to the challenge of making money from social networking sites and social commerce sites.
advertising
An example of a(n) ________________ protocol is SMTP.
application
RFID was developed to replace ________.
bar codes
Security must be balanced with _________ for people to use systems.
convenience
Modern smartphones exhibit a process called __________, which means the functions of many physical devices are included in one other physical device
dematerialization
In the URL "http://www.arizona.edu/index.html", which of the following defines the "domain"?
edu
The Internet backbone is a ________ network.
fiber-optic
BitTorrent is an example of P2P that ____________________.
is open-source, free, P2P file sharing
You want to be able to track the pencils in your store because they seem to be disappearing. You would want to mark the pencils with ________.
passive RFID codes