• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/57

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

57 Cards in this Set

  • Front
  • Back

What category of location-based services would best describe products such as "location-based gaming", "social networking," and "find a friend"?




a. Entertainment


b. Mobile Resource Management


c. Information Services


d. Personal Security


e. Social Networking

a. Entertainment

n the URL (Uniform Resource Locator) "http://www.arizona.edu", what does "http://" define?




a. Domain


b. Browser


c. Protocol


d. Resource


e. Server

c. Protocol

When major airlines (American, Delta, United, etc.) bypass travel agents and directly market tickets to customers from the airline's corporate website, this is an example of using what type of business sales strategy?




a. reintermediation


b. Crowdsourcing


c. Group Systems


d. Disintermediation


e. Communities of Practice

d. Disintermediation

In a vertical cross-functional business process diagram, the order of items in one column (from top to bottom) shows what relationship among these items?




a. Time


b. Cost


c. Importance


d. Frequency


e. Skill level

a. Time

n the root cause video case, the marble of national monument was wearing prematurely. What was the change identified by the in-depth root cause analysis of the problem?




a. Changing the time the lights illuminating the monument were turned on


b. Changing the acid level in the cleaning solution


c. Changing thebusiness process used to clean the monument


d. Changing the company contracted to perform the cleaning


e. Restricting the areas that visitors to the monument were allowed to walk

a. Changing the time the lights illuminating the monument were turned on

Satellites used for data communications that appear to be stationary from a fixed location on earth are placed in what type of orbit?


a. Mid -earth orbit


b. Polar orbit


c. Geosynchronous orbit


d. Elliptical orbit


e. Commercial orbit

c. Geosynchronous orbit

An unobstructed, straight line-of-sight path between a transmitter and receiver is required by which of the following high-speed, commercial wireless network technologies?




a. 3G Cellular


b. 802.11 Wi-Fi


c. Bluetooth


d. Microwave


e. Broadcast Radio

d. Microwave

In Thomas Friedman's discussion of globalization, he described the process of globalization as being realized through action that were first defined by your country, then later defined by multi-national companies, and finally, in the most recent age of globalization is defined by:




a. Individuals


b. International treaties


c. Social media


d. Financial markets


e. Political parties

a. Individuals

Which of the following does a Fishbone Diagram typically not inform you about a problem?




a. The cost of correcting a problem with a process


b. Identifies the major categories of a problem


c. Identifies many of the root causes of problems


d. Helps guide the process improvement process


e. Organizes the problems associated with a process by the major categories

a. The cost of correcting a problem with a process

In the history of the cell phone case study, the inventor noted that prior to the invention of the cell phone, telephone numbers were generally associated with a place. After the invention of the cellphone, telephone numbers are most commonly associated with what?




a. A ciphertext


b. A place


c. A location


d. A person


e. A packet

d. A person

Google Docs is an example of what cloud-based service model?


a. SaaS


b. GaaS


c. IaaS


d. NaaS


e. PaaS

a. SaaS

In the video case about Dr. Chiu's Smartrek application, which of the following was not an incentive used to encourage driver participation?




a. Ability to find other people for carpooling


b. Possibility of avoiding traffic congestion


c. Ability to earn points for charity


d. Ability to help the communitye. Ability to earn prizes and gift

a. Ability to find other people for carpooling

What short-range wireless technology is commonly to connect smartphones with hands-free headsets for telephone calls and listening to music?




a. Photon


b. WiMax


c. Wavelength


d. Spectrum


e. Bluetooth

e. Bluetooth

In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what analogy in the real world did he use to describe TCP?




a Sending information using secret messages


b. Sending information using radio transmitters


c.Sending information taped to post cards


d. Sending information encoded with barcodes


e. Sending information using the sematic web

c. Sending information taped to post cards

You are multiplying Sales Valus in column A against a Sales Tax Rate in Cell D1. Which of the following formulas is a correct use of Absolute Value to ensure you are always referencing the Sales Tax Rate?




a.=$A1 * $D1


b. =A1 * D1


c. =A1 * $D1


d.=A1 * D$1


e. =$A$1 * $D$1

c. =A1 * $D1

As discussed in class, what company was founded in the Globalization 2.0 era based on the business model of selling discontinued product lines directly to consumers by using a new transportation infrastructure to reach a geographically distributed customer base?




a. Sears, Roebuck & Co


b. Ebay.com


c. Overstock.com


d. Wal-Mart


e. BigLots!

a. Sears, Roebuck & Co

Besides sensors, radios, and chips, what is the value in the Internet of Things?




a. Establishment of services on top of the connectivity


b. Cheaper equipment costs


c. Creating less data


d. Companies that haven't failed


e. Eliminates the need for a value proposition

Establishment of services on top of the connectivity

In a packet-switched data communication network, which of the following is true:




a. Packets can be lost or become corrupted between the sender and receiver


b. All packets from a sender follow the same path through the network to the receiver


c. All packets always follow the shortest path (fewest hops) through the network


d. All packets from a sender always arrive at the receiver in same order they were sent


e. The path packets follow in the network can never be changed if a data link fails

a. Packets can be lost or become corrupted between the sender and receiver

If your laptop runs an application that needs to securely talk to a server, but isn't executed within a browser, such as Firefox or Safari, what other technique is commonly used?




a. SSL


b. VPN


c. TLS


d. A Leased Line


e. PGP

b. VPN

Which of the information layers in the Internet of Things model focuses on the communication networks that connect the sensors that actually collect the data?




a. Application Layer


b. Generation Layer


c. Processing Layer


d. Transmission Layer


e. Metadata Layer

d. Transmission Layer

The "Porter's Forces" model deals with what aspect of globalized business?




a. Competition


b. Design


c. Location


d. Relationships


e. Time

a. Competition

What is the two-factor authentication method used by the UofA that enhances the security of VPN connections by requiring a user to acknowledge a login request using a smartphone app or code number?




a. NetID+


b. CatVPN


c. NetPackets


d. CatCipher


e. CatKey

a. NetID+

All of the symbols representing tasks and decisions that are shown in single column of a vertical cross-functional diagram are related to the same what?




a. Actor


b. Root Cause


c. Decision Model


d. Organization


e. Entity

a. actor

In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what analogy in the real world did he use to describe TCP?




a. Sending information taped to post cards


b. Sending information using radio transmitters


c. Sending information using secret messages


d. Sending information encoded with barcodes


e. Sending information using the sematic web

a. Sending information taped to post cards

Which of the following issues related to wireless communication would NOT be a problem for an RFID (Radio Frequency Identification) system?




a. Attenuation


b. Monitoring


c. Line-of-sight


d. Interference


e. Multi-path

c. Line-of-sight

The benefits of using RFID from what category (driver) include offering new services, new and enhanced product features, and improved customer relationship management (CRM)?




a. Meeting legal requirements


b. Cost reduction


c. Increased Security


d. Value Generation


e. Increasing customer satisfaction

d. Value Generation

Applications such as "find a friend" (FourSquare), driving directions (Smartrek), roadside assistance (OnStar), and fleet management (UPS and FedEx) are all examples of services that have been enhanced by knowing what?




a. The location of the requester


b. The identity of the requester


c. The time the request was made


d. The age of the requester


e. The number of people making requests

a. The location of the requester

What IOT technology discussed in class could be used to identify shoppers and allow products to "introduce" (recommend) themselves to a shopper?




a. RFID Tags


b. Geotagging


c. Product Metadata


d. Crowdsourcing


e. Folksonomies

a. RFID Tags

The command shown in class, to 'touch' another computer over the internet using its address and the command line, was what?




a. Ping


b. Tap


c. Touch


d. Seek


e. Find

a. Ping

Which of the following is the correct method, or formula syntax, when using the COUNTIF function?




a. =COUNTIF(range, criteria)


b. =COUNTIF(criteria, range)


c. =COUNTIF(criteria, range, [average_range])


d. =COUNT(IF(range, criteria))


e. =COUNT(IF(criteria, range))

a. =COUNTIF(range, criteria)

Dr. Neumann's being able to purchase his "Globalization Tie" directlyfrom a merchant in China is an example of what "era" of globalization?




a. Country-based globalization


b. Industry-based globalization


c. Individual-based globalization


d. Company-based globalization


e. Cloud-based globalization

c. Individual-based globalization

Although globalization has been underway for many centuries, digitization, networking, and connectiveness have dramatically increased what?




a. The pace of Change


b. The number of "Olive Tree" products and services


c. Data Redundancy


d. Revenue per Employee


e. Worker Productivity

a. The pace of Change

As confirmed by our in-class poll, what is the most likely action an owner will take with their old computer or telephone after purchasing a new device?




a. Store it


b. Recycle it


c. Sell it


d. Discard it


e. Donate it

a. Store it

What term is used to describe the ethically-questionable practice of consumers buying products online after examining them in brick-and-mortar stores?




a. Showrooming


b. P-commerce


c. Semantic Web


d. Hybrid Business


e. Non-repudiation

a. Showrooming

Operating unregulated WiFi networks, clickers, Bluetooth headsets, cordless telephones, and microwave ovens using the same 2.4GHz ISM frequency range in close proximity to one another might result in what problem?




a. Multi-path


b. Attenuation


c. Interference


d. Line-of-sight


e. Right-of-way

c. Interference

With respect to a product's design, who forms (determines) the "mental model" of a system's user interface?




a. The government regulators overseeing the industry


b. The designers of the product


c. The company's senior management


d. The writers of the product's instructional manual


e. The users of the product

e. The users of the product

Harald Blaatand, who was the King of Demark from 940-981, is associated with what wireless technology?




a. Bluetooth Technology


b. Computer Wifi


c. Cellular Telephone Networks


d. Microwave Transmitters


e. Satellite Transmitters

a. Bluetooth Technology

What is a description of a structure or process used in a business that explains how it will work in the real world?




a. impairment


b. Cipher


c. model


d. Packet


e. Authentication

c. model

As I move farther away from campus, I notice that my UAWiFi connection gets progressively weaker. What factor will always cause this to occur?




a. The signal strength is lost due to attenuation


b. The signal blocked by strong encryption


c. The signal cannot be received dueto interference


d. The signal is blocked due to right-of-way restrictions


e. The maximum packet hop count is exceeded

a. The signal strength is lost due to attenuation

Similar to trends in computing hardware, what is the trend for wireless network hardware?




a. Less, but bigger network antennas


b. Interference and attenuation are being eliminated


c. Virtualization and merging with the cloud


d. Putting networks onto chips


e. Sensors that don't need batteries

c. Virtualization and merging with the cloud

What technology has been used for such diverse applications as reducing counterfeitingtickets at the 2008 Beijing Olympics, tracking lost pets, and toll collecting on highways?




a. RFID


b. SCOR


c. MRP-II


d. Infrared


e. CFAR

a. RFID

In the video case describing the TCP (Transmission Control Protocol) presented by Vint Cref, what common problem did his analogy using the postal service to email a page from a book have with sending TCP packets?




a. The message might get lost and not delivered


b. The message might get changed in route


c. The message might not get sent


d. The message might be illegible


e. The message might be in the wrong language

a. The message might get lost and not delivered

What is software architecture in which a single instance of software runs on a server and serves multiple a group of users who share a common access with specific privileges to the software instance?




a. Asymmetric Algorithm


b. Software multi-tenancy


c. Fragmentation


d. Resiliency


e. Contingency

b. Software multi-tenancy

What dimension of Porter's Forces focuses on the decision that a buyer makes when choosing among direct, existing competitors when all of the competitors offer the same identical name-brand product (e.g., an iPhone 6)?




a. Industry Rivalry


b. Threat of Substitution


c. Threat of New Entrants


d. Buyer power


e. Supplier power

a. Industry Rivalry

What term describes the method of doing business by which a company sustains itself?




a. Revenue Model


b. Value Proposition


c. Business Model


d. Production Model


e. Organizational Model

c. Business Model

The algorithm commonly described as a Caesar Shift Cipher is:




a. An encryption algorithm developed by Julius Caesar


b. The algorithm developed by a group of hackers called Caesar Shift in 1983


c. An unbreakable encryption algorithm developed in ancient times


d. An encryption algorithm that does not produce a cipher text message


e. The public key used for all asymmetric encryption algorithms

a. An encryption algorithm developed by Julius Caesar

In general, what you think of as the quality of your network connection speed when you are using your PC, iPad, or Smartphone is most influenced by which of the following?




a. Local Tier-3 ISPs


b. Backbone Tier-1 ISPs


c. Regional Tier-2 ISPs


d. Location of the content provider's servers


e. Protocols used for Layer-1 transmission

a. Local Tier-3 ISPs

In the History of the Cell Phone video case, how did the use of cellular phones change the way in which calls were made?




a. Instead of calling a place, calls to cellular telephones were associated with a person


b. Calling a cellular telephone required the assistance of an operator


c. A new system of telephone numbers were required to call cellular phones


d. Cellular telephones could only call telephones within the local calling area


e. Cellular telephones improved the sound quality that customers experiences

a. Instead of calling a place, calls to cellular telephones were associated with a person

What term is used to describe the information collected describing the action (i.e., location, time, place, etc.) as opposed to the data itself?




a. entities


b. Hashtagging


c. Metadata


d. Packets


e. Accommodations

c. Metadata

A graphical description of a database that describes the way in which an organization's data and business activities are associated with one another is known as _______________:




a. An Enterprise Resource Design


b. A Model of Efficiency


c. An Entity Relationship Diagram


d. A Throughput Analysis


e. An Artificial Database Scheme

c. An Entity Relationship Diagram

In a VLOOKUP formula, what does the column_index_number argument, the third argument in the formula, mean?




a. This is the number of the column within the selected table_array where the lookup result is located.


b. This is the hidden col_num number that each column in an Excel worksheet has.


c. This is a numerical representation of the letters at the top of a worksheet. For example, A = 1, B = 2, etc.


d. This is numbers you assign to columns in your worksheet.


e. There is no argument column_index_number

a. This is the number of the column within the selected table_array where the lookup result is located.

What term is used to describe how a product or service offered by a business fulfills the needs of its customers?




a. Business Model


b. Value Proposition


c. Revenue Model


d. Production Model


e. Organizational Model

b. Value Proposition

A "Fishbone" process analysis diagram is also known as:




a. A cause-and-effect diagram


b. A correlation graph


c. A cross-functional flowchart


d. An organization chart


e. A numerical analysis diagram

a. A cause-and-effect diagram

Businesses like to use Virtual Private Networks for every reason except?




a. Virtual networks are faster than ordinary internet connections


b. They have no control over the path data takes between business sites


c. Data from web-browsers may not be encrypted


d. Data from applications other than web browsers may not be encrypted


e. Virtual networks are cheaper than leased lines

a. Virtual networks are faster than ordinary internet connections

Which of the following does a Fishbone Diagram typically not inform you about a problem?




a. Identifies the major categories of a problem


b. The cost of correcting a problem with a process


c. Identifies many of the root causes of problems


d. Helps guide the process improvement process


e. Organizes the problems associated with a process by the major categorie

b. The cost of correcting a problem with a process

n the URL (Uniform Resource Locator) "http://www.arizona.edu", what does ".edu" define?




a. Domain


b. Browser


c. Protocol


d. Resource


e. Server

a. Domain

What common function do "HTTP", "TCP" and "IP" share?




a. They all define internet-based protocols


b. They all are website domains


c. They all are data encryption methods


d. They are abbreviations for physical media


e. They are common computer viruses

a. They all define internet-based protocols