Saturday, May 18, 2019

Mid Term 220

urinate Assessment Midterm mental testing scalawag 1 of 9 MGT220. discipline TECHNOLOGY (MGT220) > TAKE ASSESSMENT MIDTERM EXAM Take Assessment Midterm interrogatory visit Midterm Exam Instructions Always pick the single best answer. Blank answers will be s internalityd as incorrect. Multiple Attempts This Test aloneows 2 attempts. This is attempt number 1. Force Completion This Test cornerst genius be saved and resumed later. mind Completion Status scruple 1 2 points Sellers generally shoot from e-auctions due to the opportunity to bargain for lower prices. keep open real out of true irresolution 2 2 points Nokia has entered the mobile gaming world.It markets near-distance multiplayer gaming over __________ and wide- compass gaming over __________ profits. cede A. cellular local atomic number 18a B. Bluetooth cellular C. GPS wide atomic number 18a D. WiMax analog E. Question 3 2 points Using wireless technologies, one buttocks create applications that atomic number 18 not available with wireline systems. retain True False Question 4 2 points save up 2 points In general, which of the following is true about the transmission of confidential and personalised information between an RFID reader and a back-end database protect? ransom Blogs, mashups, instant messaging, and wikis are examples of A. avatars B. social reckon C. virtual worldsD. wireless communications Question 5 http//coursesite. umtweb. edu/webapps/assessment/ concentrate/launch. jsp? course_assessment_id= 9/25/2012 Take Assessment Midterm Exam knave 2 of 9 A. Those transmissions are sent over proficient networks to keep the information secure. B. Information sent via those transmissions is protected using encryption. C. RFID tags do not yet hold confidential or personal information. D. Firewalls are apply to protect information in transit. Question 6 2 points Remote administ symmetryn Trojans (RATs) are a class of backdoors that are extremely dangerous because they alter remote control over the infected machine. take over True False Question 7 2 points bear 2 points A(n) __________ is an abridgment of the benefits of using a specific business deterrent example. Save Productivity in an opening move can be measured in terms of A. the amount of input per amount of time B. the ratio of the amount of output to the amount of input C. the number of units produced D. market ploughshare Question 8 A. core competency B. exchange C. RFQ D. value proposition Question 9 2 points A valuable belongings of e-tailing is the ability to offer customized products and services to individual customers at a reasonable price and quickly. Save True False Question 10 2 pointsWith two-factor authentication, two fictitious characters of information are used to verify the users identity, such as passwords and botnets. Save True False Question 11 2 points atomic number 53 of the worst and approximately prevalent crimes is identity theft, which has been made worse by widespread electronic sharing and databases. http//coursesite. umtweb. edu/webapps/assessment/take/launch. jsp? course_assessment_id= Save 9/25/2012 Take Assessment Midterm Exam Page 3 of 9 True False Question 12 2 points Directories and hyperlinks from other Web sites and intelligent search agents service buyers find the best introduces and products to match their needsSave True False Question 13 2 points _________ percent of companies that sire a significant data loss die within five years, according to Freeman Mendel, the soften of the FBIs 2006 Infragard National Conference. Save A. 7 B. 23 C. 57 D. 93 Question 14 2 points A risk associated with tools that are meant to improve the productivity and quality of life in general is that they can flatus to abuses such as intruding on an employees or managers personal time. Save True False Question 15 2 points Responsibility for internal control and compliance with information security olicies rests directly on end-users. Save True False Question 16 2 points Packet technologies convert voice, video, and data into packets that can be transmitted together over a single, high-speed network eliminating the need for separate networks. Save True False Question 17 2 points Advances in converged networks, SIP, and tools have eliminated the barriers to full integration and interoperability. Save True http//coursesite. umtweb. edu/webapps/assessment/take/launch. jsp? course_assessment_id= 9/25/2012 Take Assessment Midterm Exam Page 4 of 9 False Question 18 2 pointsThe software system-as-a-service (SaaS) approach is ground on the social movement for developing applications in-house rather than buying them. Save True False Question 19 2 points A(n) __________ is a method of doing business by which a company can generate revenue to sustain itself. Save A. adaptive strategy B. business model C. electronic commerce Web site D. summonss model Question 20 2 points According to the market intelligence firm IDC, organi zations with a 1,000 or to a greater extent knowledge workers lose over $5 million annually because of Save A. time wasted by employees reformatting data as they move among applications.B. data that is out of context or outdated. C. the inability of knowledge workers to share data with others working on the same project. D. the inability to synchronize data. Question 21 2 points One example of an integrated messaging system is __________, which combines wireless communications, vehicle monitoring systems, and vehicle location devices. Save A. collaborative commerce B. supply chain trouble C. voice portal D. wireless telemetry Question 22 2 points Which of the following is not accurate regarding businesses that collect data about employees or customers? SaveA. The data must be available to auditors. B. Businesses have a legal duty to protect this data. C. The data should be accessible only to authorized people. D. Securing the data from abuse by authorized parties is expensive and difficult. Question 23 2 points http//coursesite. umtweb. edu/webapps/assessment/take/launch. jsp? course_assessment_id= Save 9/25/2012 Take Assessment Midterm Exam Page 5 of 9 An example of a mobile enterprise application is sales force mechanization (SFA), which enables sales force employees to type orders straight into an ERP while at a clients site.Benefits include a diminution in clerical mistakes and improved supply chain operations. True False Question 24 2 points Save 2 points Information systems can be organized according to organizational hierarchy (e. g. , departmental, enterprisewide, and interorganizational) or by the nature of supported task (e. g. , operational, managerial, and strategic). Save Web 1. 0 was basically organized almost each of the following however A. corporations B. media C. software D. technology Question 25 True False Question 26 2 points Save 2 points Several banks in Japan issued __________ cards to customers.These cards store a template of th e persons palm vein to authenticate the customers identity when withdrawing money. Save The ________ suite is the standard used with almost any network service. A. Internet protocol B. Transport Control protocol C. User Datagram Protocol D. Voice over IP Question 27 A. smart B. RFID C. ATM D. adaptive Question 28 2 points Save Which is the first step in the process of managing business capital punishment? A. Determine how to attain the performance levels. http//coursesite. umtweb. edu/webapps/assessment/take/launch. jsp? course_assessment_id= 9/25/2012 Take Assessment Midterm ExamPage 6 of 9 B. Assess where the organization stands with respect to its goals, objectives, and measures. C. Decide on desired performance levels. D. Set the budget for achieving performance or goals. Question 29 2 points Microsoft releases _________ to update and patch vulnerabilities in its operating systems, including Vista, and other software products, including Office 2007. Save A. firewalls B. podcas ts C. service packs D. workbooks Question 30 2 points Reasons why managers may not be able to trust their data include all of the following except Save A. Data are too synchronized. B. Data are out of context.C. Data are outdated. D. Data are so elicit that they require weeks to analyze. Question 31 2 points A computer system essentially organizes data into a hierarchy that begins with bits and proceeds to bytes, fields, files, databases, and records. Save True False Question 32 2 points Save Databases are the optimal way to store and access organizational data. True False Question 33 2 points Social network analysis (SNA) is the mapping and measuring of relationships and feed ins between people or groups. Nodes in the network are the people or groups, while the links show relationships or flows between the nodes.Save True False Question 34 2 points Save What is significant about 4G networks? http//coursesite. umtweb. edu/webapps/assessment/take/launch. jsp? course_assessment_id= 9/25/2012 Take Assessment Midterm Exam Page 7 of 9 A. 4G has a circuit switched subsystem B. 4G is based purely on the Internet Protocol (IP) C. 4G is the convergence of the features of 2G and 3G D. All of the above Question 35 2 points Save All of the following correctly define the networking technology except A. WAP is an Internet protocol create for transferring information on the Internet to and from wireless clients. B.EV-DO is fast wireless broadband access that runs in a Wi-Fi hotspot. C. Instant messaging has become a mission-critical collaboration tool for over 130 million workers in businesses of all sizes. D. Bluetooth is how mobile phones, mobile and fixed computers, and PDAs can be easily interconnected using a short-range RF wireless connection. Question 36 2 points A supply chain is the flow of materials, information, money, and services from raw material suppliers through factories and warehouses to the end customers. Save True False Question 37 2 points A(n) antivi rus software is a technology that checks Internet packets sent to nd from a network and enforces access-control policies between networks. Save True False Question 38 2 points The virtual elimination of software-upgrade cycles makes applications perpetual worksin-progress and allows fast prototyping using the Web as a platform. Save True False Question 39 2 points When dealing with consumer-facing applications, such as online banking and ecommerce, strong authentication must be balanced with ________. Save A. be B. convenience C. privacy risks D. war driving risks Question 40 2 points Save A wiki is all of the following except http//coursesite. mtweb. edu/webapps/assessment/take/launch. jsp? course_assessment_id= 9/25/2012 Take Assessment Midterm Exam Page 8 of 9 A. a software program B. a discovery tool C. a collaboration site D. a search engine Question 41 2 points Data warehouses are designed as online analytical processing (OLAP) systems, meaning that the data can be queried a nd analyzed some(prenominal) more efficiently than application databases. Save True False Question 42 2 points Save 2 points Fraud detection is too complex to be handled effectively by intelligent analysis engines using advanced data warehousing. SaveWhat is the technology that enables Internet browsing from wireless devices? A. WAP B. EMS C. WiMax D. WLAN Question 43 True False Question 44 2 points Which of the following factors is not a major type of business pressure on enterprises? Save A. Homogenous workforce B. Powerful customers C. Regulatory compliance D. Terrorist attacks and mother country security Question 45 2 points ___________ support functional managers by providing them with periodic reports, such as weekly sales volume and comparisons of actual expenses to budgeted expenses. Save A. Personal information managementsB. Transaction processing systems C. vigilance information systems D. Enterprise systems http//coursesite. umtweb. edu/webapps/assessment/take/launch. jsp? course_assessment_id= 9/25/2012 Take Assessment Midterm Exam Question 46 Page 9 of 9 2 points Mary Kay transformed itself from traditional modes of operation to a business model that enabled rapid growth into new markets by doing all of the following except Save A. networking various applications so they communicate with each other B. using business service management to connect to consultants. C. sing social computing for marketing D. outsourcing its IT infrastructure Question 47 2 points M-commerce B2C applications are concentrated in three major areas, which include each of the following except Save A. sell shopping for products and services B. advertising C. mobile portals D. selling digitized content such as music, movies, or games Question 48 2 points Save Data redundancy wastes physical storage media, makes it difficult to obtain a comprehensive view of customers, and increases the costs of entering and maintaining the data. True False Question 49 2 pointsAt a strategic level, the totality of a companys data resources is nearly irreplaceable. Yet data at this macro-level remains by and large overlooked by corporate leadership. Save True False Question 50 2 points Save Why is auditing a Web site important from the perspective of risk? A. It is a good prophylactic device measure to manage legal risk. B. It is a key part of disaster recovery. C. To insure that biometrics were utilise properly. D. It is a necessary corrective action. http//coursesite. umtweb. edu/webapps/assessment/take/launch. jsp? course_assessment_id= 9/25/2012

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.