MIS 111 Exam 3 PAR

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The advantage of ________________ is they can be read over greater distances. 1) Active RFID tags 2) Passive RFID tags 3) QR codes 4) WSNs

Active RFID tags

The Internet of Things is also called the _______. 1) Industrial Internet 2) Internet of Anything 3) Internet of Everything 4) M2M Communication 5) All of the other answers are Correct

All of the other answers are Correct

What is the importance of the triple constraints / the Scope Triangle? 1) You must funnel all resources into only one of the constraints 2) Any changes to one constraint will likely affect another constraint 3) Security is the most important constraint 4) Time, resources, and scope don't matter

Any changes to one constraint will likely affect another constraint

Which of the following is NOT a value-adding attribute of mobile computing? 1) Bandwidth improvement 2) Instant connectivity 3) Localization 4) Ubiquity

Bandwidth improvement

What term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding? 1) Conceptual model 2) Emotional design 3) Design Intention 4) Semiotic Engineering

Conceptual model

What type of innovations are intended to be incompatible with existing standards and value chain, and must develop markets de novo (latin for "from the beginning")? Disruptive Innovation Platform Innovation Profit Innovation Application Innovation Product Innovation

Disruptive Innovation

Which of the following was NOT described as one of the four innovation zones? Category Renewal Zone Customer Intimacy Zone Product Leadership ZoneProduct Leadership Zone Operational Excellence Zone Disruptive Technology Zone

Disruptive Technology Zone

VPN is a type of ________________. 1) Extranet 2) Internet 3) Intranet 4) None of the above

Extranet

Which of the project management documents includes all three of the triple constraints that are in the Scope Triangle? 1) PERT Chart 2) Spiderweb Diagram 3) Gantt Chart 4) Cross-functional Diagram 5) Hierarchical Diagram

Gantt Chart

____________ is installing and operating ultrafast fiber-optic cable service. 1) AT&T 2) Comcast 3) Google 4) Verizon

Google

The web __________ the same thing as the internet. 1) Could be 2) Is 3) Is not 4) I don't know

Is not

What type of customer intimacy zone innovation focuses on making structural modifications to established products in order to create a distinctive sub-category? Experiential Innovation Value-engineering Innovation Line-Extension Innovation Enhancement Innovation Marketing Innovation

Line-Extension Innovation

Which of the following is a business-to-business sharing firm? 1) Amazon 2) LinkedIn 3) LiquidSpace 4) Zipcar

LiquidSpace

The _____________ model at the Miami Children's Hospital is most appropriate for nonemergency, consultative services because the physician is limited to a visual examination. 1) Dynamic 2) Extremely static 3) Mobile 4) Semistatic

Mobile

______________________ refers to the real-time connection between a mobile device and other computing environments. 1) Location-based commerce 2) Mobile computing 3) Mobile commerce 4) Telemetry

Mobile computing

Which of the following is the technology that enables most mobile wallet applications? 1) AFC 2) ERP 3) NFC 4) VRP

NFC

The ____________ protocol places packets on, and receives them from, the network medium. 1) Application 2) Internet 3) Network interface 4) Transport

Network interface

From smallest to largest, which of the following is in the correct order? 1) LAN, PAN, MAN, WAN 2) LAN, MAN, PAN, WAN 3) PAN, LAN, MAN, WAN 4) PAN, MAN, LAN, WAN

PAN, LAN, MAN, WAN

Which of the following is NOT one of the "4 P's" of innovation? Product Process Process Paradigm Shifts Personalization

Personalization

What is an affordance? 1) Being able to pay for something 2) Physical property of an object that shows functionality 3) How well the user likes the interface 4) Safety of users and of data

Physical property of an object that shows functionality

What type of innovation focuses on the supply side, looking for opportunities to remove non-value-adding steps from the workflow? Organic Innovation Value-Engineering Innovation Process Innovation Enhancement Innovation Value Migration Innovation

Process Innovation

Marks & Spencer implemented _______ to track its inventory more effectively. 1) Bar codes 2) Optical scanners 3) QR codes 4) RFID

RFID

What is the purpose of a PERT chart? 1) Schedule and organize tasks 2) View the organizational structure of a company 3) Review the Triple Constraint 4) Find where Product Enhancement, Research, or Training is needed

Schedule and organize tasks

In project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resources and what other dimension of the planning process? 1) Value 2) Scope 3) Agility 4) Alignment 5) Feasibility

Scope

To access the internet ILLEGALLY, Cuban citizens can _________. 1) Pay $5 per hour 2) Share user accounts 3) Show their national ID 4) Sign agreements

Share user accounts

An advantage of a radio transmission system is ____________. 1) Large coverage area 2) Relatively inexpensive 3) Signals pass through walls 4) All of the above

Signals pass through walls

Which of the following is used to conduct market research? 1) Social advertisements 2) Social intelligence 3) Sponsored stories 4) Viral marketing

Social intelligence

Craigslist is an example of a _____________. 1) Peer-to-peer shopping model 2) Rating, review, and recommendation site 3) Shopping community 4) Social marketplace

Social marketplace

_____________ is a disadvantage of twisted-pair wire. 1) Difficult to work with 2) Relatively expensive and inflexible 3) Subject to interference 4) All of the above are disadvantages

Subject to interference

Which of the following is a benefit of social commerce? 1) Privacy 2) Security 3) Testing 4) All of the above are benefits

Testing

From Don Norman's perspective, what fatal flaw does the BMW iDrive (which he descibed as a well thought out, very logical, and sensible device) have with respect its human interface? The iDrive did not have a hierarchical menu structure The iDrive destroyed spatiality The iDrive only controlled the driving-related functions The iDrive used a confusing set of control knobs

The iDrive destroyed spatiality

Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project? 1) The quality of the work performed during each major project milestone 2) The project milestones and the order they are scheduled to be completed 3) Individual work assignments for persons assigned to the project 4) Whether the major project milestones are being completed on budget 5) Whether project tasks have been organized in the most efficient order

The project milestones and the order they are scheduled to be completed

The Sochi Winter Games were similar to the Vancouver Winter Games in what respect? 1) Both cities had a fairly modern basic IT infrastructure that was improved for the Games. 2) The wireless networks of both were able to handle 4 Tbps per second. 3) Wireless traffic outnumbered wired traffic by 4:1 for both. 4) They both utilized the services of Avaya to get their cities ready for the Games.

They both utilized the services of Avaya to get their cities ready for the Games.

Which of the following is NOT a major advantage of wireless devices to users? 1) They are small enough to easily carry or wear. 2) They can be used to copy and pass on confidential information. 3) They can communicate wirelessly with the Internet and other devices. 4) They have sufficient computing power to perform productive tasks.

They can be used to copy and pass on confidential information.

Which of these is NOT enumerated as a Motivation to Create Accessible Web Content? To improve the reliability of technical functionality (technology centered motivations) To improve the lives of people with disabilities (human-centered motivations) To capitalize on the a wider audience or consumer base (marketing or economic-centered motivations) To avoid lawsuits and/or bad press (public relations and punishment-centered motivations)

To improve the reliability of technical functionality (technology centered motivations)

__________________ refer(s) to word-of-mouth advertising. 1) Social advertising 2) Social apps 3) Social influence 4) Viral marketing

Viral marketing

The Internet is a ______________. 1) LAN 2) MAN 3) PAN 4) WAN

WAN

____________ are networks that aren't contiguous. 1) LAN 2) MAN 3) PAN 4) WAN

WAN

_____________ is the act of locating WLANs while driving around a city. 1) A rogue access point 2) Eavesdropping 3) RF jamming 4) War driving

War driving

One key feature of __________________ is the ability to remix applications and data. 1) Web 1.0 2) Web 2.0 3) Web 3.0 4) None of the above

Web 2.0

The four guiding principles of accessibility (perceivable, operable, understandable, and robust) are included in what document? 1) Americans with Disabilities Act 2) Web Content Accessibility Guide, Version 2.0 3) Web Content Accessibility Guide, Version 1.0 4) Section 508 of the Rehabilitation Act

Web Content Accessibility Guide, Version 2.0

____________ enables peer-to-peer communications and allows users to transfer content among devices without having to rely on a wireless antenna. 1) MiFi 2) Wi-Fi 3) Wi-Fi Direct 4) Super Wi-Fi

Wi-Fi Direct

Cuban citizens primarily have access to _____________. 1) an extranet 2) an intranet 3) the internet 4) nothing internet-related

an intranet

Compared to physical crime, online theft is ____________ likely to become public knowledge because companies __________. 1) less; know they won't be able to keep it a secret and worry about how much money could be stolen from their customers 2) less; worry that the disclosure will inflict more damage than the theft by frightening away customers 3) more; know they won't be able to keep it a secret and worry about how much money could be stolen from their customers 4) more; worry that the disclosure will inflict more damage than the theft by frightening away customers

less; worry that the disclosure will inflict more damage than the theft by frightening away customers

Which of the following is NOT a major threat to wireless networks? 1) eavesdropping 2) tapping 3) rogue access points 4) radio-frequency jamming

tapping


Set pelajaran terkait

Chapter 10: Biodiversity III - Human Body Systems (homework)

View Set

Practice questions ch 8 & 10 dewit and ch 8 & 9 knecht

View Set

Chapter 17: Caring for Clients in Shock

View Set

STUDY GUIDE FOR NYS LIFE INSURANCE AGENT EXAM 17-51 (ADD ONTO)

View Set

ATI Fundamentals Practice A, B, & Final, ATI Fundamentals Review 2019

View Set

N137 Mental Health & Substance Abuse

View Set