MIS 111 Part 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the three NFC (Near Field Communication) communication modes allows your phone to act like an "interactive card" for payment, transportation, identification, and physical access?

Card emulation mode

From a data network infrastructure perspective, what type of cabling (wired guided media) is commonly associated with residential subscribers with POTS (plain old telephone service) service?

Category 3 Twisted Pair Cables

Which of the following types of IT Infrastructure implements a distributed processing model that uses personal computers that are connected through a local area networks (LANs) to applications running on a mainframe computer?

Client-server computing

Tracking, traceability, authentication, and control are all associated with what type of benefit provided by RFID (Radio Frequency Identification) tracking?

Operational

According to Adopting the IoT Paradigm: Challenges and Opportunities, using IOT to track packages, containers, and other bulkware are examples of what type of "smart" IOT technologies?

Smart logistics

Google Apps, Apple iCloud, and Salesforce.com are allow examples of which of the following computing models?

Software-as-a-Service

In which of the following cloud models is the customer responsible for managing the fewest of the computing resources?

Software-as-a-Service

Increasingly popular with SMEs (Small-to-Midsize Enterprises), which of the following cloud delivery models is delivered through a browser and avoids the need to manage either hardware or software?

Software-as-a-service (Saas)

Which of the following types of authentication methods would use regular identification (ID) cards, smart ID cards, and tokens to authenticate that someone is an authorized personnel?

Something the user has

As shown below, what "Host name" should be used with WinSCP (or equivalent field for CyberDuck) to connect to the UArizona personal web hosting server?

u.arizona.edu

In the URL "http://www.u.arizona.edu/~wtn", what part of the URL defines the hosting server?

u.arizona.edu

What data communication code was developed in 1835 to transmit messages digitally over a new communications infrastructure?

Morse Code

In comparison to other wireless media channels, which of the following wireless transmission systems experiences the most significant propagation delay?

Satellite

Categories such as access to sensitive data, data segregation (among customers), accountability, malicious insiders, and account control are all concerns about cloud computing related to which of following issues?

Security

As discussed in the Cloud Computing Trends for 2020 case study, what is an important driver for the increasing demand for cloud-based Disaster-Recovery-as-a-Service (DRaaS) services?

Service Outrafes and Natural DIsasters

In our class discussion, which of the following messaging apps was described as using end-to-end encryption to send individual, group, video and voice messages?

Signal

Which of the following uses a flexible system that optimizes performance across an interconnected network that can autonomously operate entire production processes? Question 1 options:

Smart Factory

Which of the following web hosting services is acceptable for the EC Hosting assignment?

U-System (UArizona's Web Hosting Service)

What is the correct "port" number that should be used with the WinSCP or CyberDuck secure file transfer program?

22

According to the Wireless Network Basics video case, which of the following IEEE standards is the designation for all "flavors" (e.g., A, B, G, and N) of WiFi?

802.11

In our discussion of GreenTech, which of the following issues was NOT mentioned as one of the "unique legal and regulatory issues" that the author's recommended using foresight and preparation when developing new legal strategies?

Accessibility and universal design

Cyber-Physical System (CPS) engage with "real space" through interactions with all of the following EXCEPT:

Augmented Reality

According to Forrester, which of the following emerging technologies is likely to have the disruptive potential to "change the world" in the next 3-5 years?

Augmented and Virtual Reality

From a networking infrastructure perspective, which of the following descriptive terms would generally be associated with the transmission of digital data?

Bits per second

In a circuit switched network, which of the following terms describes when a telephone call cannot be made due to the needed resources (e.g. communication links) being unavailable while assigned to another subscriber's call?

Blocked

Which of the following terms describes a short-range wireless network used for communication among computer devices (e.g., telephones, personal digital assistants, smartphones) located close to one person?

Bluetooth

Also known as a "rotation cipher," what is the more common name for a cipher that simply replaces a letter with another letter that is a fixed number of letters away?

Caesar Cipher

As described by the UofA's Autonomic Computing Lab, which of the following would NOT be commonly considered as being one of the challenges for the Future of the IOT (Internet of Things)?

Competition

In the video case, What are the cyber risks tied to the coronavirus pandemic? all of the following were described as new security challenges facing individuals teleworking during the pandemic for the first time except:

Computing devices are more likely to be stolen from the homes

Which of the following business applications would typically NOT be something that commonly associated with NFC (Near Field Communication) technology?

Connected vehicles, such as Qualcomm's V2X (Vehicle to Everything

For network infrastructures that transmit information using analog signals through a communication channel, what term is used measure the bandwidth?

Cycles per second (Hertz)

The increasing number of connected IOT (Internet of Things) devices has increased security challenges in all of the following areas EXCEPT:

DDOS (Distributed Denial of Service) Attacks

In the discussion of how Internet Bridges the Communications Gap Transparently, which of the following was NOT discussed as a capability of the end-user device?

DNS and Email Services

Used by organizations such as the United Nations, the Electronic Frontier Foundation to protect dissidents, informants, and sources in oppressive countries, what names is used for the portion of the Internet that is a "safe haven" for whistleblowers, activists, and journalists who need to share sensitive information but cannot do so publicly for fear of political persecution or retribution by their governments or employers?

Dark Web

According to the Future of Medtech video case study, what is a potential new source of information to improve preventative care?

Data from consumer-focused technology companies

All of the following are factors contributing to the rapid growth of the cloud computing industry, except:

Declining costs of power, space, and maintenance needed to operate a data computer

What term is used to describe when one physical device, such as a smartphone, provides the functions that previously required many physical devices, such as GPS navigators, flashlights, medical devices, credit cards, texting, and cellular phones?

Dematerialization

What MIS Professor developed a tool for detecting fraud using real-time score of the authenticity of based on an applicant's behaviors?

Dr. Joe Valcich

Which of the following was NOT a known problem with the security of the ENIGMA machine?

ENIGMA machines emitted radios signals that were intercepted

Which of the following cloud computing characteristics allows organizations to share the processing resources of many geographically dispersed computers across a network?

Encompasses the characteristics of grid computing

Also known as an "end office", in the PSTN (Public Switeched Telephone Network), what term is used to describe one of the 19.000 telephone company US switching centers?

Exchanges

Widely used in the areas of business-to-business (B2B) electronic commerce and supply chain management (SCM), what term is used to describe a network that connects parts of the intranets of different organizations and enables business partners to communicate securely over the Internet using virtual private networks (VPNs)?

Extranet

When a cloud service vendor fails to meet their commitment to provide a specified level of service under a Service Level Agreement (SLA), such as system availability, what is the customer most commonly entitled to receive from the cloud service vendor?

Financial compensation

In the Code Breakers Decipher Letters by Mary, Queen of Scots case study, all of the following techniques were used by the cryptologists to decode the letters EXCEPT:

Finding a "rosetta stone" that included both encrypted and decrypted messages

As discussed in our Topic Overview lecture, what city in northeast Brazil, that also has a connection to the UArizona MIS Department, is the primary terminal for most undersea fiber option cables in the Atlantic Ocean ?

Fortaleza, Brazil

What emerging GreenTech clean energy source is created from water using electrolysis produced from renewable power and leaves no by-products other than oxygen?

Green Hydrogen

What type of business continuity facility is a fully configured computer facility with all of the company's services, communications links, and physical plant operations to allow rapid recovery in the event of a major disaster?

Hot site

According to Forrester research, which of the following technologies stands out in the emerging field of "insight technologies"?

IOT and Spatial Analytics

According to the What is The Internet of Things? video case, which of the following IP (Internet Protocol) addressing schemes creates more IP addresses than there are atoms on the surface of the earth?

IPv6

The adoption of which Internet Protocol (IP) has been an important factor in the development of the Internet of Things?

IPv6

Which of the following terms describes a company that provides Internet connections for a fee?

ISP (Internet Service Provider)

As described by the UofA's Autonomic Computing Lab, which of the following challenges for the Future of the IOT (Internet of Things) relates to individuals becoming increasingly associated with a unique IP (Internet Protocol) address?

Impersonalization

In a smart city environment, which of the following was NOT described as a benefit from using IOT to connect traffic signals?

Improved emergency services response times

Which of the following is generally NOT considered an advantage of a Virtual Private Network (VPN)?

Improves connection speed from remote devices

Which of the following business opportunities was enabled by the evolution of cellular communication technologies (i.e., 3G, 4G, and 5G networks) allowing cellular network providers to have higher density networks?

Increased Customers

What dimension of the business use of cloud systems focus on the benefits of rapid deployment, on-demand provisioning, and disaster recovery?

Increased Flexibility

According to IOT Innovation Lab video case, one of The Hartford's two main strategic objectives for IOT devices is to help it predict, prevent, detect and mitigate what?

Insurance losses

In the CapGemini IOT Industry 4.0 case, what dimension focuses on the way that Smart Products are equipped with computing power that enables autonomous decision-making and self-learning processes based on algorithms?

Intelligent

Which of the following challenges for wireless communication is commonly caused by unregulated wireless network frequencies (e.g., 2.4 GHz) shared by other devices (e.g., cordless phones) and other general noise sources?

Interference

Which of the following is NOT a characteristic of terrestrial microwave telecommunications links?

Microwave signal sent between data link stations will follow the curvature of the earth

Which of the following supply chain management business functions is RFID commonly used to support in companies in the process industry, such as Cargill or Georgia-Pacific?

Item-level Lot Tracking

What term is used to describe the connection between an internet service provider and their customers, i.e., network connection to your home?

Last Mile

Also known as a subscriber line, in the Public Switched Telephone Network (PSTN), what is the connection between the local telephone company exchange office and a subscriber's house called? Question 1 options:

Local Loop

According to Nicolas Carr, which of the following factors is pushing IT (Information Technology) towards rapid commoditization?

Market forces

All of the following characteristics are considered as advantages of circuit switching data communication networks EXCEPT:

Messages have multiple routing options

Which of the following is NOT a technique that is commonly used by a firewall to manage information sharing between two networks?

Multi-factor Authentication

Which of the following cloud environments helps companies avoid being locked into a particular cloud vendor's infrastructure, add-on services, and pricing model by deploying cloud-native applications that are portable across several cloud vendors services?

Multiple cloud (multicloud)

Which of the following terms describes the marketing strategy where content providers pay their audience to watch or interact with a company's advertisements or other online content?

NOT Popp advertising

When designing a security-in-depth strategy, security measures such as firewalls, VPNs and SLL would be examples of what type of control?

Network Access

As more IOT (Internet of Things) connected cars are connected through though wireless technologies such as DSRV (Dedicated Short Range Communication), urban connectivity is expected to improve traffic management in all of the following ways EXCEPT:

Optimized toll collection

What type of network is most commonly associated with Bluetooth technology?

Piconet or PAN (Personal Area Network)

In the the Physical vs Logical Topologies video case, an analogy was made comparing planning a trip to a network topology. Which of the following was NOT given an example of a characteristic similar to elements of a physical topology?

Planned order of cities to be visited

Which of the following dimensions of the Open Cloud cloud taxonomy would offer services related to business intelligence, database management, and application development and testing?

Platform Services

Which of the following parameters, common to both WinSCP (Windows Secure Copy) and Cyberduck, is a number that uniquely identifies a connection endpoint and directs data to a specific TCP/IP service?

Port

As discussed in the the video case Vint Cerf Explains TCP Networking, what example does he use to explain how messages are sent?

Post Cards

What security application is commonly integrated into email systems to allow messages to be sent securely using encryption?

Pretty Good Privacy

According to Intel Canada's video "Public, Private and Hybrid Clouds," what type of cloud architecture offers a high level of control of the resources but the *least* (lowest ability for) scalability?

Private

Which of the following dimensions of the Internet of Everything (IOE) focuses on delivering the right information to the right person (or machine) at the right time?

Process

What term is used to describe technology that can be owned, actually or effectively, by a single firm (e.g., patents, secrets, exclusive licenses)?

Proprietary

As market forces push IT toward rapid commoditization, Nicholas Carr recommends companies shift their priorities in all of the following ways EXCEPT:

Recognize higher levels of risk are required to innovate IT (Information Technology)

How does adding a repeater or booster in a home data network impact data transmission latency?

Repeater retransmissions significantly add to network data transmission latency

As discussed in the Eye on Oversight - Cybersecurity video case, which of the following security areas does the Department of Health and Human Services (HHS) security work focus on being proactive and identify vulnerabilities?

Risk Management

What the name of the device that is accessed using a public IP (Internet Protocol) address for the external internet while forwarding traffic from your home network devices that use private addresses assigned using Network Address Translation (NAT)?

Router

Which of the following terms describes a technique used with the electric telegraph in which information is sent to an intermediate station where it is received and then sent at a later time to the final destination or to another intermediate station?

Store-and-forward

Which of the following was not discussed as one of the three factors that should be considerd when a company considers developing a new telecom service?

Sustainability

In the Breakthrough Energy Catalyst video case, investments are being made to develop technologies to convert biological inputs, including municipal waste, into what product?

Sustainable Aviation Fuel

During which industrial revolution did electronics and information and communication (ICT) technology create a "digital revolution" that further advanced automation?

Third Industrial Revolution

During which period of accelerated societal change, often described as an industrial revolution, did electronic and IT system have a significant impact for the first time as technology such as programmable logic controllers helped automate production?

Third Industrial Revolution

Which type of signal multiplexing offers each user full bandwidth, but is only periodically on (shared availability), as shown in the example below for circuit utilization?

Time-division Multiplexing

According to A Cloudy History of Time, Honeywell, IBM, and Xerox the dominant companies in what industry in 1975? Question 1 options:

Timesharing Industry

As described in the Bloomberg Killing the Need for Passwords With Biometrics video case study, what type of biometric measure was developed by EyeVerify to determine someone's identity with only a smartphone?

Vein patterns in your eye

Analog VGA and digital DVI computer ports provide are interfaces to what type of computer peripheral?

Video Monitors

Which of the following is NOT a prediction discussed in the Perkin's Coie's report on emerging technology trends for the impact of COVID-19 on retail spaces?

Virtually all (more than 90%) of the pandemic-related digital shift will be permanent

According to the Creating a Cyber Secure Home video case, which of the following three types of encryption is an older, weaker form of encryption that should not be used to secure home wireless access points?

WEP (Wired Equivalent Privacy)

Which of the dimensions of Cisco's Smart Building infrastructure was mentioned by The Hartfor in the IOT Innovation Lab video as an opportunity for offering services related to risk prevention and conservation?

Water Sensors

Which of the following is an autonomous device that monitors its own condition as well as physical and environmental conditions around it, such as temperature, sound, pressure, vibration, and movement?

Wireless sensor

Led by their Chief Scientist Mark Weiser, what organization was one of the first groups to explore Ubiquitous Computing?

Xerox PARC (Palo Alto Research Park)

Used for our RAHosting template file, which of the following is a common file format that's used to compress one or more files together into a single location making them easier to transport or store?

ZIP file

If your personal UArizona email address is "[email protected]", which of the following would be the exact URL that you should used when accessing your personal U-System URL website address for the EC Hosting project?

http://www.u.arizona.edu/~wilbur

Which of the following is the full filename that should be used for your EC Hosting assignment in the public_html directory on the u.arizona.edu (U-System) server?

index.html (all lower case characters)


Set pelajaran terkait

Vocabulario- Benchmark (Unidad 2)

View Set

CAPA : Potatoes, Grains, and Pastas

View Set

Psych Midterm review (college board 2 and 3)

View Set

Module 4: Oral and Topical Medications

View Set

Linux Security 1st In-Class Exam

View Set

text chapter 7 quiz natural disasters

View Set

Chapter 36 Geriatric & Hospice Care

View Set

Chapter 5 - Safety and Infection Control

View Set

Chapter 5: Adaptations to Anaerobic Training Programs

View Set