Take Assessment: Midterm Examination Web page 1 of 9 MGT220. INFORMATION TECHNOLOGY (MGT220) > TAKE ASSESSMENT: MIDTERM EXAM Take Assessment: Midterm Examination Identify Midterm Examination Directions All the time choose the only finest reply. Clean solutions will probably be scored as incorrect. A number of Makes an attempt This Check permits 2 makes an attempt. That is try #1. Drive Completion This Check could be saved and resumed later. Question Assignment Completion Standing: Question Assignment 1 2 factors Sellers usually profit from e-auctions as a result of alternative to discount for decrease costs. Save True False Question Assignment 2 2 factors Nokia has entered the cellular gaming world.
It markets near-distance multiplayer gaming over __________ and wide-area gaming over __________ networks. Save A. mobile; native space B. Bluetooth; mobile C. GPS; extensive space D. WiMax; analog E. Question Assignment three 2 factors Utilizing wi-fi applied sciences, one can create purposes that aren’t out there with wireline techniques. Save True False Question Assignment four 2 factors Save 2 factors Normally, which of the next is true in regards to the transmission of confidential and private data between an RFID reader and a back-end database shield? Save Blogs, mashups, prompt messaging, and wikis are examples of A. avatars B. social computing C. digital worlds
D. wi-fi communications Question Assignment 5 http://coursesite. umtweb. edu/webapps/Assessment/take/launch. jsp? course_assessment_id=… 9/25/2012 Take Assessment: Midterm Examination Web page 2 of 9 A. These transmissions are despatched over safe networks to maintain the data safe. B. Data despatched by way of these transmissions is protected utilizing encryption. C. RFID tags don’t but comprise confidential or private data. D. Firewalls are used to guard data in transit. Question Assignment 6 2 factors Distant administration Trojans (RATs) are a category of backdoors which are extraordinarily harmful as a result of they allow distant management over the contaminated machine.

Save True False Question Assignment 7 2 factors Save 2 factors A(n) __________ is an Assessment of the advantages of utilizing a particular enterprise mannequin. Save Productiveness in an enterprise could be measured when it comes to: A. the quantity of enter per period of time B. the ratio of the quantity of output to the quantity of enter C. the variety of models produced D. market share Question Assignment eight A. core competency B. alternate C. RFQ D. worth proposition Question Assignment 9 2 factors A useful property of e-tailing is the flexibility to supply personalized services to particular person clients at an inexpensive value and rapidly. Save True False Question Assignment 10 2 factors
With two-factor authentication, two sorts of data are used to confirm the person’s identification, comparable to passwords and botnets. Save True False Question Assignment 11 2 factors One of many worst and most prevalent crimes is identification theft, which has been made worse by widespread digital sharing and databases. http://coursesite. umtweb. edu/webapps/Assessment/take/launch. jsp? course_assessment_id=… Save 9/25/2012 Take Assessment: Midterm Examination Web page three of 9 True False Question Assignment 12 2 factors Directories and hyperlinks from different Websites and clever search brokers Help consumers discover the perfect shops and merchandise to match their wants
Save True False Question Assignment 13 2 factors _________ p.c of firms that undergo a big knowledge loss die inside 5 years, in accordance with Freeman Mendel, the chair of the FBI’s 2006 Infragard Nationwide Convention. Save A. 7 B. 23 C. 57 D. 93 Question Assignment 14 2 factors A danger related to instruments that are supposed to enhance the productiveness and high quality of life usually is that they will result in abuses comparable to intruding on an worker’s or supervisor’s private time. Save True False Question Assignment 15 2 factors Duty for inner management and compliance with data safety olicies rests straight on end-users. Save True False Question Assignment 16 2 factors Packet applied sciences convert voice, video, and knowledge into packets that may be transmitted collectively over a single, high-speed community eliminating the necessity for separate networks. Save True False Question Assignment 17 2 factors Advances in converged networks, SIP, and instruments have eradicated the boundaries to full integration and interoperability. Save True http://coursesite. umtweb. edu/webapps/Assessment/take/launch. jsp? course_assessment_id=… 9/25/2012 Take Assessment: Midterm Examination Web page four of 9 False Question Assignment 18 2 factors
The software-as-a-service (SaaS) method is predicated on the pattern for creating purposes in-house quite than shopping for them. Save True False Question Assignment 19 2 factors A(n) __________ is a technique of doing enterprise by which an organization can generate income to maintain itself. Save A. adaptive technique B. enterprise mannequin C. digital commerce Website D. operations mannequin Question Assignment 20 2 factors In response to the market intelligence agency IDC, organizations with a 1,000 or extra data employees lose over $5 million yearly due to: Save A. time wasted by staff reformatting knowledge as they transfer amongst purposes.
B. knowledge that’s out of context or outdated. C. the shortcoming of information employees to share knowledge with others engaged on the identical mission. D. the shortcoming to synchronize knowledge. Question Assignment 21 2 factors One instance of an built-in messaging system is __________, which mixes wi-fi communications, car monitoring techniques, and car location gadgets. Save A. collaborative commerce B. provide chain administration C. voice portal D. wi-fi telemetry Question Assignment 22 2 factors Which of the next just isn’t correct relating to companies that acquire knowledge about staff or clients? Save
A. The info should be out there to auditors. B. Companies have a authorized responsibility to guard this knowledge. C. The info ought to be accessible solely to approved individuals. D. Securing the info from abuse by approved events is dear and tough. Question Assignment 23 2 factors http://coursesite. umtweb. edu/webapps/Assessment/take/launch. jsp? course_assessment_id=… Save 9/25/2012 Take Assessment: Midterm Examination Web page 5 of 9 An instance of a cellular enterprise software is gross sales power automation (SFA), which permits gross sales power staff to kind orders straight into an ERP whereas at a shopper’s web site.
Advantages embrace a discount in clerical errors and improved provide chain operations. True False Question Assignment 24 2 factors Save 2 factors Data techniques could be organized in accordance with organizational hierarchy (e. g. , departmental, enterprisewide, and interorganizational) or by the character of supported activity (e. g. , operational, managerial, and strategic). Save Net 1. zero was principally organized round every of the next besides: A. firms B. media C. software program D. expertise Question Assignment 25 True False Question Assignment 26 2 factors Save 2 factors A number of banks in Japan issued __________ playing cards to clients.
These playing cards retailer a template of the individual’s palm vein to authenticate the shopper’s identification when withdrawing cash. Save The ________ suite is the usual used with nearly any community service. A. Web protocol B. Transport Management Protocol C. Consumer Datagram Protocol D. Voice over IP Question Assignment 27 A. good B. RFID C. ATM D. adaptive Question Assignment 28 2 factors Save Which is step one within the means of managing enterprise efficiency? A. Decide the best way to attain the efficiency ranges. http://coursesite. umtweb. edu/webapps/Assessment/take/launch. jsp? course_assessment_id=… 9/25/2012 Take Assessment: Midterm Examination
Web page 6 of 9 B. Assess the place the group stands with respect to its objectives, targets, and measures. C. Determine on desired efficiency ranges. D. Set the finances for reaching efficiency or objectives. Question Assignment 29 2 factors Microsoft releases _________ to replace and patch vulnerabilities in its working techniques, together with Vista, and different software program merchandise, together with Workplace 2007. Save A. firewalls B. podcasts C. service packs D. workbooks Question Assignment 30 2 factors Explanation why managers might not be capable to belief their knowledge embrace all the following besides: Save A. Knowledge are too synchronized. B. Knowledge are out of context.
C. Knowledge are outdated. D. Knowledge are so overwhelming that they require weeks to investigate. Question Assignment 31 2 factors A pc system primarily organizes knowledge right into a hierarchy that begins with bits and proceeds to bytes, fields, recordsdata, databases, and data. Save True False Question Assignment 32 2 factors Save Databases are the optimum solution to retailer and entry organizational knowledge. True False Question Assignment 33 2 factors Social community Assessment (SNA) is the mapping and measuring of relationships and flows between individuals or teams. Nodes within the community are the individuals or teams, whereas the hyperlinks present relationships or flows between the nodes.
Save True False Question Assignment 34 2 factors Save What is important about 4G networks? http://coursesite. umtweb. edu/webapps/Assessment/take/launch. jsp? course_assessment_id=… 9/25/2012 Take Assessment: Midterm Examination Web page 7 of 9 A. 4G has a circuit switched subsystem B. 4G is predicated purely on the Web Protocol (IP) C. 4G is the convergence of the options of 2G and 3G D. The entire above Question Assignment 35 2 factors Save The entire following appropriately outline the networking expertise besides: A. WAP is an Web protocol developed for transferring data on the Web to and from wi-fi shoppers. B.
EV-DO is quick wi-fi broadband entry that runs in a Wi-Fi hotspot. C. Instantaneous messaging has grow to be a mission-critical collaboration software for over 130 million employees in companies of all sizes. D. Bluetooth is how cell phones, cellular and stuck computer systems, and PDAs could be simply interconnected utilizing a short-range RF wi-fi connection. Question Assignment 36 2 factors A provide chain is the stream of supplies, data, cash, and providers from uncooked materials suppliers by means of factories and warehouses to the tip clients. Save True False Question Assignment 37 2 factors A(n) antivirus software program is a expertise that checks Web packets despatched to nd from a community and enforces access-control insurance policies between networks. Save True False Question Assignment 38 2 factors The digital elimination of software-upgrade cycles makes purposes perpetual worksin-progress and permits speedy prototyping utilizing the Net as a platform. Save True False Question Assignment 39 2 factors When coping with consumer-facing purposes, comparable to on-line banking and ecommerce, robust authentication should be balanced with ________. Save A. prices B. comfort C. privateness dangers D. conflict driving dangers Question Assignment 40 2 factors Save A wiki is all the following besides: http://coursesite. mtweb. edu/webapps/Assessment/take/launch. jsp? course_assessment_id=… 9/25/2012 Take Assessment: Midterm Examination Web page eight of 9 A. a software program program B. a discovery software C. a collaboration web site D. a search engine Question Assignment 41 2 factors Knowledge warehouses are designed as on-line analytical processing (OLAP) techniques, which means that the info could be queried and analyzed far more effectively than software databases. Save True False Question Assignment 42 2 factors Save 2 factors Fraud detection is simply too complicated to be dealt with successfully by clever Assessment engines utilizing superior knowledge warehousing. Save
What’s the expertise that allows Web searching from wi-fi gadgets? A. WAP B. EMS C. WiMax D. WLAN Question Assignment 43 True False Question Assignment 44 2 factors Which of the next components just isn’t a serious kind of enterprise stress on enterprises? Save A. Homogenous workforce B. Highly effective clients C. Regulatory compliance D. Terrorist assaults and homeland safety Question Assignment 45 2 factors ___________ help practical managers by offering them with periodic reviews, comparable to weekly gross sales quantity and comparisons of precise bills to budgeted bills. Save A. Private data managements
B. Transaction processing techniques C. Administration data techniques D. Enterprise techniques http://coursesite. umtweb. edu/webapps/Assessment/take/launch. jsp? course_assessment_id=… 9/25/2012 Take Assessment: Midterm Examination Question Assignment 46 Web page 9 of 9 2 factors Mary Kay remodeled itself from conventional modes of operation to a enterprise mannequin that enabled speedy progress into new markets by doing all the following besides: Save A. networking varied purposes so they impart with one another B. utilizing enterprise service administration to hook up with consultants. C. sing social computing for advertising and marketing D. outsourcing its IT infrastructure Question Assignment 47 2 factors M-commerce B2C purposes are concentrated in three main areas, which embrace every of the next besides: Save A. retail purchasing for services B. promoting C. cellular portals D. promoting digitized content material comparable to music, films, or video games Question Assignment 48 2 factors Save Knowledge redundancy wastes bodily storage media, makes it tough to acquire a complete view of consumers, and will increase the prices of getting into and sustaining the info. True False Question Assignment 49 2 factors
At a strategic stage, the totality of an organization’s knowledge sources is sort of irreplaceable. But knowledge at this macro-level stays largely missed by company management. Save True False Question Assignment 50 2 factors Save Why is auditing a Website essential from the angle of danger? A. It’s a good safety measure to handle authorized danger. B. It’s a key a part of catastrophe restoration. C. To insure that biometrics have been applied correctly. D. It’s a needed corrective motion. http://coursesite. umtweb. edu/webapps/Assessment/take/launch. jsp? course_assessment_id=… 9/25/2012

Published by
Write
View all posts