MIS 111

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The Internet of Things is also called the _______.

1. Internet of Anything 2)All of these answers are correct 3) M2M Communication 4) Internet of Everything 5)Industrial Internet

What is the length of the critical path

17

How long should you plan on waiting to access Adobe Dreamweaver after clicking the link and filling out the form?

24 hours

How wide should you make the images you copy into Dreamweaver?

600 pixels

What type of HTML tag is used to display a file that contains a photo on your website?

<img>

Bitcoin keeps track of it's ledger showing who owns what bitcoins using what technology?

A Public BlockChain

________ is an unauthorized access point into a wireless network.

A rogue access point

________ is an autonomous device that monitors its own condition as well as physical and environmental conditions around it; it is an underlying technology of ________.

A wireless sensor; the IoT

Why are there so many different physical connector types?

A. The function (serial, parallel, video) often defines the number of signals required B.Different symbols, shapes and sizes improves reliability when connecting devices C.Connector design evolves as technology demands faster communication speed

Why is it critical you put your index.html file and website images in the same unique directory before linking the images to the webpage and uploading to the server?

A. image links are relative, so when in the same directory the server can find them B.You will need to find your images so they can be uploaded correctly to a webserver C.We do not allow you to use a link to a different webpage for the image location D.ALL OF THE ABOVE

The Pie Chart used to display the distribution of individuals with disabilities has what limitation(s)?

A.Assumes disabilities are mutually exclusive categories B.Difficult to interpret if you are red/blue color blind C.Color/text contrast makes unit counts hard to read D.All of the abov

What was a major consideration when selecting the paths (routes) for the physical media used for guided media?

A.Right-of-way B.Geographical C.Political boundaries D.All of the above

what HTML tag that you were required to use for images on ABP3 provides assessable descriptions of the images to JAWS

ALT Tag

The advantage of ________________ is they can be read over greater distances.

Active RFID tags

What term is used for the physical properties (shape, texture, color, etc.) of an object that show how to use the object without the need for labels or instructions?

Affordance

What term was used to describe ensuring that how you position yourself professionally in a way that attuned to a company's environment ?

Alignment

If you were her supervisor at the high school, how would you have handled the situation with Stacy's picture being reported?

All of the above

Should social media posts be allowed as part of employment screening?

All of the above

Which of the following would NOT be a motivation for an NFL team to consider using virtual reality training as part of its player development program?

Allowing players to create their own plays and practice schedules

Why are NFL teams beginning to use an immersive virtual reality experience that makes players feel and think as if they are actually on the practice field?

Allows young players additional time to learn the playbook quickly and thoroughly without having "two-a-day" practices

Anything that is capable of being owned or controlled to produce value would be considered as?

An Asset

Which of the following types of security risks would be a technique used to compromise a system.

An Exploit

Which of the following is not one of the dimensions of the Internet of Things?

Any SECURE connection

What is the importance of the triple constraints / the Scope Triangle?

Any changes to one constraint will likely affect another constraint

What impairment for wireless communication actually serves as the basis for spatial multiplexing?

Attenuation

Which of the following types of access controls describes the process of validating a claim of identity (e.g., Something you know, have, do, or are)

Authentication

What type of error prevention describes the technique of requiring a user to select a value from a drop-down list?

Avoldance

Computer data sent over a local area network is an example of what type of data signal?

Binary Signal

Which of the following wireless technologies was associated with Harald Blaatand II?

Bluetooth

What is the name of the modeling system developed by Raytheon that uses stereoscopic 3-D (S3D) and augmented reality technologies?

CAVE (Cave Automatic Virtual Environments)

What organization employed Sir Tim Berners-Lee when he developed the "vague but exciting" concept for the world wide web

CERN-European Organization for Nuclear Research

Which of the following previously discussed Supply Chain technologies would likely be used to replenish an item when an IOT sensor reports that the item has been sold?

CPFAR (Collaborative Planning, Forecasting and Replenishment)

________________ is access to the internet through your TV connection.

Cable modem

What type of Data would Eye Color be?

Categorical - nominal scale

________ is the most recent evolution of the modern IT infrastructure.

Cloud computing

Xerox PARC's Unicomp was a precursor to which of the following topics previously discussed in class?

Collaboration

The expansion of telecommunications infrastructure occurred primarily during while era of globalization, as described by Thomas Friedman?

Companies

According to the speaker from Accenture, project management is not about lists and linear relationships, but rather involves managing what?

Complex inter-relationships

What term did Don Norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding?

Conceptual model

The design of connectors consider the speed of the communication interface, the function being supported, and what other concept related to human- computer interface design?

Constraints to improve reliability

When backing up your assignment files to the cloud using Arizona.box.com, you are using what?

Content Service

According to IT's About Business 6.2, the main drawback to Google Fiber for Google is ________.

Cost

One of the origins of the Internet was the result of a project by US government agency?

DARPA-Defense Advanced Research Project Agency

________ modems use the digital portion of a voice telephone to offer broadband access.

DSL

According to IT's About Business 3.5, Ashley Madison's data was first released on the _________ by ________.

Dark Web; The Impact Team

What is an example of a Universal Design approach that can be used with the video case studies presented in class?

Displaying open captions

What type of innovations are intended to be incompatible with existing standards and value chain, and must develop markets de novo (latin for "from the beginning")?

Disruptive Innovation

Which of the following was NOT described as one of the four innovation zones?

Disruptive Technology Zone

A blockchain is really just a what?

Distributed Ledger

Officially called Directive 2009/136/EC, what other name is used for the EU mandate that websites to obtain informed consent before they can store or retrieve information on a visitor's computer or web-enabled device.

EU Cookie Law

Three Dimensional Vision uses what technique to fool the brain?

Each eye is shown a different image that is taken from a different perspective

________ refers to efforts by unauthorized users to access data that are traveling over wireless networks.

Eavesdropping

________ offer limited accessibility to the ________ of participating companies.

Extranets; intranets

What affordance issue is the label "PUSH" addressing?

False Affordance

How does this this wall safe provide a safe hiding spot

False Affordance (mislead)

Which of the following types of guided media has the highest level of physical security from eavesdropping?

Fiber Optic Cable

When we discussed data communication networks, what city did we indicate was partnering with the UA MIS Department to implement Smart City technology?

Fortaleza, Brazil

What type of project management documentation includes information about all of the Triple Constraints?

Gantt Chart

Which of the project management documents includes all three of the triple constraints that are in the Scope Triangle?

Gantt Chart

DishTV, DirecTV, and SiriusXM radio are all based on what type of satellite technology?

Geostationary Orbit (GEO)

________ is a page-description language for specifying how text, graphics, video, and sound are placed on a web page document.

HTML

________ defines how messages are formulated and how their receivers interpret them.

HTTP

What is the name of the University of Arizona's primary career management tool that offers UA students and alumni access to jobs, internships, and a range of other services?

Handshake

What is the name of a display that includes force feedback?

Haptic Dispaly

What term is used to describe a function that uses an algorithm to convert an input of letters and numbers into an encrypted output of a fixed length?

Hash

hat term is used to measure the signaling rate of analog signals and means cycles-per- second?

Hertz

Most users of these salt- and-pepper shakers would most likely depend on information from what level of the McGinn hierarchy

Human Sensory Perception

What type of Statistics is used for drawing conclusions and/or making decisions concerning a population based only on sample data?

Inferential Statistics

The EcoReps Dashboards installed in residence halls are an example of what layer in the IOT model?

Integrated Application

What transportation infrastructure was discussed in class that guided the decision the placement of the long-haul fiber-optic cable infrastructure?

Inter-continental Railroad Network

What problem might occur when you operate WiFi networks, Bluetooth headsets, baby monitors, and garage door openers all using the same 2.4GHz ISM frequency range in close proximity to one another?

Interference (Noise)

What other major technology initiative previously discussed in class that was initially developed as a government-sponsored research program

Internet

The ________ functions as a transport mechanism; the ________ is an application

Internet; World Wide Web

From lowest to highest, what is the correct order of these satellite types with respect to the altitude of their orbit (LEO, MEO, GEO)?

Irridum, GPS, DishTV

According to IT's About Business 3.5, which of the following is FALSE of the Dark Web?

It is indexed by search engines.

The role Blockchain plays in Bitcoin is?

It is the ledger of who owns what Bitcoins

Bitcoin's ledger technology is quite complex to prevent fraud, an example of which is given in the paper, what was the example and how did it work?

It was a 'Double Spend' where the hacker paid a merchant and themselves then invalidated the merchant payment

According to IT's About Business 6.2, Google Fiber was first deployed in ________.

Kansas City

Ethernet is a technology associated with ________s

LAN

With the ________ model, cloud computing providers offer remotely accessible servers, networks, and storage capacity.

LaaS

Which of the following wireless issues would NOT be a problem for short range wireless communications technologies, such as RFID and NFC?

Line- of- Sight (Visual Path)

What type of customer intimacy zone innovation focuses on making structural modifications to established products in order to create a distinctive sub-category?

Line-Extension Innovation

In general, what you think of as the quality of your network connection speed when you are using your PC, iPad, or Smartphone is most influenced by which of the following?

Local Tier-3 ISPS

______________ satellites require medium-powered transmitters.

MEO

CAT-3, CAT-5, Coaxial and Fiber Optic Cable are all examples of what?

Media

What term is used to describe the information collected describing the action (i.e., location, time, place, etc.) as opposed to the data itself?

Metadata

Which of the following is a medium-range wireless network?

MiFi

If a customer is at a dealership looking at a car through a screen where they can change features and see the changes in real time, what type of reality is it?

Mixed Reality

________ are exchange points for Internet traffic.

NAPs

Which of the following is the technology that enables most mobile wallet applications?

NFC

According to IS's About Business 3.4, _________ does NOT offer usage-based automobile insurance.

Nationwide

this IMG directive correct? <img alt="Sears Logo" ="Sears_logo.png" height="200" width="300" />

No, the quotations are not the standard vertical quotations, they are the angled word processor quotation marks (" img.png" vs "img.png")

________________ enables secure communication over the Internet using VPNs.

None of these options

Who can submit new transactions to Bitcoin's Ledger?

Open, Pseudonymous contributors

From smallest to largest, which of the following is in the correct order of networks?

PAN, LAN, MAN, WAN

Which of the following is NOT one of the "4 P's" of innovation?

Personalization

What is an affordance?

Physical property of an object that shows functionality

______________ is a privacy tool available to consumers that automatically communicates privacy policies between an electronic commerce web site and the visitors to that site.

Platform for Privacy Preferences (P3P)

______________ is the right to be left alone and to be free of unreasonable personal intrusions.

Privacy

The Transmission Control Protocol (TCP) address all of the following issues related to the transmission of data using packets, EXCEPT

Privacy for user's message content

________ clouds are IT infrastructures that can be accessed only by a single entity or by an exclusive group of related entities that share the same purpose and requirements, such as all of the business units within a single organization.

Private

What type of innovation focuses on the supply side, looking for opportunities to remove non-value-adding steps from the workflow?

Process Innovation

What term is used to describe the original consensus algorithm in a Blockchain network that is used to confirm transactions and produce new blocks to the chain?

Proof-of-Work

What term is used to describe the temporal chronology of the ownership, custody or location of a historical object?

Provenance

What type of data do we need if we want to perform the highest level of analytics?

Ratio or Interval Data (e.g. GPA)

The mythical man month focuses on which of the triple constraints

Resources

The collection of web services that are used to build a firm's IT applications constitutes a(n) ________.

SOA

What is the purpose of a PERT chart?

Schedule and organize tasks

In project management, the "Iron Triangle" or "Triple Constraint" includes a project's time, resources and what other dimension of the planning process?

Scope

Which of the following "laws" we've discussed determines the maximum bandwidth (signaling rate) of a given type of communication media (e.g., copper cable, fiber optic, etc.)?

Shannon's Law

Which of the following "laws" we've discussed determines the maximum bandwidth (signaling rate) of a given type of communication media (e.g., copper cable, fiber optic, etc.)?

Shannon's Law

As I move farther away from campus, my the signal strength of my UAWiFi connection gets weaker. What wireless impairment will always cause this to occur?

Signal strength is lost due to attenuation?

Intelligently monitoring and managing parking, urban noise, waste management and road congestion are examples of what application of IOT technology?

Smart Cities

What did the NASA project manager indicate was the greatest risk he faced in managing projects for NASA

Social and political risk

________ networks are an emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks.

Software-defined

Which of the following multiplexing approaches increases the total bandwidth available to users?

Spatial Division Multiplexing

_____________ is a disadvantage of twisted-pair wire.

Subject to interference

What other collaboration technology that was discussed in class is conceptually similar to Raytheon's CAVE?

Telepresence

Why is this SRC directive wrong? <img alt="Sears Logo" src ="../Sears_logo.png" height="200" width= "300" />

The ../ in front of the image name means the server is looking in a different directory, and not the webpage directory

Developed by the US Navy, a PERT (Program Evaluation Review Technique) chart would help a project manager understand what aspect of a project?

The project milestones and the order they are scheduled to be completed

Which of these is NOT enumerated as a Motivation to Create Accessible Web Content?

To improve the reliability of technical functionality (technology centered motivations)

Along with many engineering application, which of the following VR applications would NOT be primarily focused on allowing clients to engage with new designs before making a purchasing or design decision?

Training

Which of the following is a short-range wireless network?

UWB

Packets sent over which route will arrive first (shortest transmission time)?

Unknown - Can't be determined based only on hop count

Which of the following is NOT a barrier to Wi-Fi expansion?

Usability

Common themes of a blockchain generally include everything but what

Usually exists over a client-server network

Common themes of a blockchain generally include everything but what?

Usually exists over a client-server network

Which of these is true about Augmented Reality?

Virtual objects are superimposed into the real-world view

Which of the following cloud computing characteristics allows organizations to use a single physical server for multiple purposes?

Virtualization

The Internet is a ______________.

WAN

____________ are networks that aren't contiguous.

WAN

The four guiding principles of accessibility (perceivable, operable, understandable, and robust) are included in what document?

Web Content Accessibility Guide, Version 2.0

If the mean (average) is generally used, when would we consider using the median

When the Data has extreme values

With respect to maximum operating range, what is the correct order of the following technologies from maximum to minimum range?

WiFi, Bluetooth, RFID, NFC

What did "vague but exciting" concept was developed at CERN - European Organization for Nuclear Research by Sir Tim Berners-Lee?

World Wide Web

Which of the following is voluntary standard for website accessibility?

World Wide Web Consortium (W3C)

if you are in Dreamweaver and you can't seem to edit your webpage what is most likely the problem?

You are in Live view

The Human Voice is a (an)

analog signal

Companies purchase digital dossiers to ________.

create customer intimacy

Photo tagging is a type of _________ technology.

facial recognition

From Don Norman's perspective, what fatal flaw does the BMW iDrive (which he described as a well thought out, very logical, and sensible device) have with respect its human interface?

he iDrive destroyed spatiality

<img alt="My House" height="200" src="http://www.cnn.com/My%20House.JPG" width="141" /> What string within this "IMG" tag makes this absolute addressing for the image?

http://www.cnn.com/in src directive

What filename should you use for your ABP-3 webpage

index.html

What filename should you use for your ABP-3 webpage?

index.html

The ________________ is a network of networks.

internet

Which of the following security controls would be used to identify and stop a known user's access based on a unusual pattern of behavior?

intrusion detection system

The web __________ the same thing as the internet.

is not

Providing a lecture presentation in multiple formats (e.g., a video recording, a written transcript, and an audio podcast) is an example of which of the UDL learning principles?

multiple means of representation

The _________ prohibits an organization from collecting any personal information unless the customer specifically authorizes it.

opt-in model of informed consent

The _________ permits the company to collect personal information until the customer specifically requests that the data not be collected.

opt-out model of informed consent

In our Excel example, the correlation coefficient r = .733, what do we need to remember when interpreting that?

r is objective but our interpretation is subjective

Client/server computing links two or more computers in an arrangement in which powerful ________ provide computing services for ________.

servers; user PCs

NFC is an example of ______________ wireless networks.

short-range

What is the name of the University of Arizona's server that students can use to host a personal website?u.

u.arizona.edu


Set pelajaran terkait

AWS Certified Cloud Practitioner - Practice Test #5

View Set

CHEM 225 Prelab and Postlab Quizzes

View Set

Unit 9 Musculoskeletal System and Unit 10 Multi

View Set

Mastering A&P Vertebral Column - Unit 2

View Set