Question

In: Operations Management

Which of the following include the three primary network access technologies? A. DSL, Cable Modem, Broadband...

Which of the following include the three primary network access technologies?

A. DSL, Cable Modem, Broadband

B. LAN, WAN, MAN

C. VoIP, UC, IPTV

D. TCP/IP, FTP, DHCP

What are the five elements that are needed to create a connected world or a network?

A. categories, programs, alternatives, people, and core philosophy

B. program, providers, access, mechanics, and teachers

C. categories, providers, access technologies, protocols, and convergence

D. LAN, WAN, MAN, PAN, and SAN

What is a large computer network usually spanning a city or a specific infrastructure like a

college?

A. metropolitan area network (MAN)

B. local area network (LAN)

C. wide area network (WAN)

D. secure area network (SAN)

LANs, WANs, and MANs all provide users with an accessible and reliable network

infrastructure. Which of the below are the most important network differentiating dimensions?

A. reliability and timing

B. confidentiality and performance

C. security and cost

D. cost and performance

The Internet is a hierarchical structure linking different levels of service providers whose

millions of devices supply all the interconnections. The three levels outlined in the book from the

top down include ________.

A. new system provider (NSP), current system provider (CSP), and order entry system provider

(OSP)

B. national service provider (NSP), regional service provider (RSP), and internet service

provider (ISP)

C. net server point (NSP), radio server point (RSP), and internet server point (ISP)

D. None of these are correct.

The speed of transmission of a network is determined by the speed of its smallest ________.

A. unit of time

B. number of computers

C. amount of bandwidth

D. number of customers

What measures bandwidth in terms of numbers transferred or received per unit of time?

A. connection time

B. broadband

C. protocol

D. bit rate

What are the two most prevalent types of broadband access?

A. data subscriber and cable connection

B. digital subscriber line and cable connection

C. digital line and client line

D. digital server and client server

What allows users to work from remote locations such as home or hotel using high-speed

Internet to access business applications and data?

A. telecommuting

B. repeater

C. packet header

D. virtual attenuation

What is traceroute?

A. a single unit of binary data routed through a network

B. lists the destination (for example, in IP packets the destination is the IP address) along with

the length of the message data

C. represents the end of the packet or transmission end

D. a utility application that monitors the network path of packet data sent to a remote computer

What lists the destination (for example in IP packets the destination is the IP address) along with

the length of the message data?

A. traceroute

B. standard packet

C. packet header

D. packet footer

What is a utility application that monitors the network path of packet data sent to a remote

computer?

A. traceroute

B. standard packet

C. packet header

D. packet footer

What is the standard Internet protocol, which provides the technical foundation for the public

Internet?

A. data streaming and DSL protocols

B. transmission control protocol/Internet protocol (TCP/IP)

C. data streaming rules and regulations

D. Internet protocol/Transmission control protocol (IP/TCP)

How do TCP and IP differ?

A. TCP verifies the correct delivery of data in case it is corrupted, where IP verifies the data are

sent to the correct IP address.

B. TCP verifies the information is reliable, and IP verifies that the data is sent.

C. IP verifies the correct delivery of data in case it is corrupted, where TCP verifies the data are

sent to the correct IP address.

D. IP verifies connectivity, and TCP verifies the rate at which the data is sent.

What is the conversion of IP addresses that identifies labels that use a variety of recognizable

naming conventions?

A. domain grades

B. URL spaces

C. domain national sequences (DNS)

D. domain name system (DNS)

What is a benefit of network convergence?

A. the uncoupling of voice, data, and video service

B. multiple services offered from several different vendors

C. multiple devices supported by one provider

D. All of these are correct.

What is the biggest benefit of VoIP?

A. lowers costs

B. clear connection

C. higher expenses

D. All of these are correct.

What is an extension of an intranet that is available only to authorized outsiders?

A. national ISP

B. regional ISP

C. intranet

D. extranet

What is the major challenge of networking or performing business in a connected world?

A. personal issues

B. society demands

C. security issues

D. telecommuting demands

Which of the statements below is not accurate in reference to mobile and wireless computing?

A. Mobile technology can travel with the user.

B. Wireless technology is any type of operation accomplished without the use of a hard-wired

connection.

C. Wireless technology is any type of operation accomplished with the use of a hard-wired

connection.

D. Mobile technology allows a user to download software to a laptop or cell phone for portable

reading or reference.

A wireless WAN (WWAN) is a wide area network that uses radio signals to transmit and receive

data and can be divided into which two categories?

A. cellular communications and multiple user communication systems

B. mobile and wireless technologies

C. cellular and satellite communication systems

D. client and server systems

What is mobile device management (MDM)?

A. allows mobile voice calls to be made over broadband networks, creating—under the right

network conditions—clearer audio and fewer dropped calls

B. remotely controls smart phones and tablets, ensuring data security

C. the blending of personal and business use of technology devices and applications

D. administers and delivers applications to corporate and personal smart phones and tablets

Which of the following is not a primary use of GIS?

A. finding what is nearby from a specific location

B. mapping densities

C. routing information

D. ensuring safety equipment is on an airplane before a flight

What allows separate systems to communicate directly with each other, eliminating the need for

manual entry into multiple systems?

A. integration

B. intelligence

C. data interchange

D. demand plan

What is the integration of data from multiple sources, which provides a unified view of all data?

A. backward integration

B. application integration

C. data integration

D. forward integration

What provides enterprisewide support and data access for a firm’s operations and business

processes?

A. enterprise systems

B. enterprise application integration

C. middleware

D. enterprise application integration middleware

What connects the plans, methods, and tools aimed at integrating separate enterprise systems?

A. enterprise systems

B. enterprise application integration

C. middleware

D. enterprise application integration middleware

What are several different types of software that sit between and provide connectivity for two or

more software applications?

A. enterprise systems

B. enterprise application integration

C. middleware

D. enterprise application integration middleware

In which of the five basic supply chain activities do you prepare to manage all resources required

to meet demand?

A. plan

B. source

C. deliver

D. return

In which of the five basic supply chain activities do you plan for the transportation of goods to

customers?

A. plan

B. source

C. deliver

D. return

Where would you find the suppliers' suppler in a typical supply chain?

A. upstream

B. downstream

C. in the middle

D. not on the supply chain

Where would you find the manufacturer and distributor in a typical supply chain?

A. upstream

B. downstream

C. in the middle

D. not on the supply chain

Which of the following is not one of the five basic components of supply chain management?

A. plan

B. source

C. analyze

D. deliver

What can effective and efficient supply chain management systems enable an organization to

accomplish?

A. increase the power of its buyers

B. increase its supplier power

C. increase switching costs to increase the threat of substitute products or services

D. All of these are correct.

Which of the metrics below represents the agreed upon time between the purchase of a product

and the delivery of the product?

A. back order

B. inventory cycle time

C. customer order cycle time

D. inventory turnover

What is the purchasing of goods and services to meet the needs of the supply chain?

A. procurement

B. logistics

C. materials management

D. bullwhip effect

What includes the increasingly complex management of processes, information, and

communication to take a product from cradle to grave?

A. inbound logistics

B. outbound logistics

C. logistics

D. cradle to grave

What are systems are used to create the digital designs and then manufacture the products?

A. computer-aided design/computer-aided manufacturing.

B. maker movement

C. makerspace

D. RFID electronic product code

What is a community center that provides technology, manufacturing equipment, and

educational opportunities to the public that would otherwise be inaccessible or unaffordable?

A. computer-aided design/computer-aided manufacturing

B. maker movement

C. makerspace

D. RFID electronic product code

Which of the following is not a current CRM trend?

A. partner relationship management

B. supplier relationship management

C. employee relationship management

D. distributor relationship management

Which of the following is not a valid way that a CRM system can collect information?

A. accounting system

B. order fulfillment system

C. inventory system

D. customer’s personal computer

Which of the following is a common marketing CRM metric?

A. number of new prospective customers

B. average number of service calls per day

C. average time to resolution

D. cost per interaction by marketing campaign

Which question below represents a CRM reporting technology example?

A. Why did sales not meet forecasts?

B. What customers are at risk of leaving?

C. What is the total revenue by customer?

D. All of these are correct.

Which question below represents a CRM predicting technology question?

A. Why did sales not meet forecasts?

B. What customers are at risk of leaving?

C. What is the total revenue by customer?

D. All of these are correct.

Which of the following is not considered a feature in a contact center?

A. automatic call distribution

B. interactive voice response

C. predictive dialing

D. automatic predictive dialing

Which of the following is where customer service representatives answer customer inquiries and

respond to problems through a number of different customer touchpoints?

A. contact center

B. web-based self-service

C. call scripting

D. website personalization

What is the primary difference between contact management and opportunity management?

A. Contact management deals with new customers; opportunity management deals with existing

customers.

B. Contact management deals with existing customers; opportunity management deals with

existing customers.

C. Contact management deals with new customers; opportunity management deals with new

customers.

D. Contact management deals with existing customers; opportunity management deals with new

customers.

Which of the following occurs when everyone involved in sourcing, producing, and delivering

the company’s product works with the same information?

A. eliminates redundancies

B. cuts down wasted time

C. removes misinformation

D. All of these are correct.

Which of the following describes an ERP system?

A. ERP systems provide a foundation for collaboration between departments.

B. ERP systems enable people in different business areas to communicate.

C. ERP systems have been widely adopted in large organizations to store critical knowledge used

to make the decisions that drive the organization’s performance.

D. All of these are correct.

Which of the following is a business-related consequence of successful software?

A. increased revenues

B. damage to brand reputation

C. increased liabilities

D. increased expenses

Which of the following represents the phases in the SDLC?

A. plan, analysis, design, test, maintain, develop, implement

B. analysis, plan, design, test, develop, maintain, implement

C. plan, analysis, design, develop, test, implement, maintain

D. analysis, plan, develop, design, test, implement, maintain

What is a project manager?

A. the application of knowledge, skills, tools, and techniques to project activities in order to meet

or exceed stakeholder needs and expectations from a project

B. any measurable, tangible, verifiable outcome, result, or item that is produced to complete a

project or part of a project

C. the representation of key dates when a certain group of activities must be performed

D. an individual who is an expert in project planning and management

Which of the following does a project manager perform?

A. defines and develops the project plan

B. tracks the plan to ensure all key project milestones are completed on time

C. expert in project planning and management

D. All of these are correct.

Which phase of the SDLC gathers business requirements?

A. plan

B. analysis

C. test

D. design

What is a data flow diagram (DFD)?

A. an illustration of the movement of information between external entities and the processes and

data stores within the system

B. software suites that automate systems analysis, design, and development

C. a formal, approved document that manages and controls the entire project

D. a graphical representation of the processes that capture, manipulate, store, and distribute

information between a system and its environment

Which phase takes all the detailed design documents from the design phase and transforms them

into the actual system?

A. testing phase

B. analysis phase

C. development phase

D. planning phase

What are defects in the code of an information system?

A. testing

B. bugs

C. insects

D. All of these are correct.

What assesses if the entire system meets the design requirements of the users?

A. alpha testing

B. development testing

C. integration testing

D. system testing

What verifies that separate systems can work together passing data back and forth correctly?

A. alpha testing

B. development testing

C. integration testing

D. system testing

What is the implementation phase in the SDLC?

A. Involves establishing a high-level plan of the intended project and determining project goals.

B. Involves analyzing end-user business requirements and refining project goals into defined

functions and operations of the intended system.

C. Involves describing the desired features and operations of the system.

D. Involves placing the system into production so users can begin to perform actual business

operations with the system.

What makes system changes to repair design flaws, coding errors, or implementation issues?

A. corrective maintenance

B. preventative maintenance

C. pilot implementation

D. phased implementation

What is an activity-based process in which each phase in the SDLC is performed sequentially

from planning through implementation and maintenance?

A. RAD methodology

B. agile methodology

C. waterfall methodology

D. extreme programming

Which of the following is an issue related to the waterfall methodology?

A. flaws in accurately defining and articulating the business problem

B. managing costs, resources, and time constraints

C. assumes users can specify all business requirements in advance

D. All of these are correct.

What breaks a project into tiny phases, and developers cannot continue on to the next phase until

the first phase is complete?

A. RAD methodology

B. agile methodology

C. waterfall methodology

D. extreme programming

Which gate in the RUP methodology expands on the agreed-upon details of the system,

including the ability to provide an architecture to support and build it?

A. inception

B. elaboration

C. construction

D. transition

Which gate in the RUP methodology includes building and developing the project?

A. inception

B. elaboration

C. construction

D. transition

Which methodology begins or ends each day with a stand-up meeting to monitor and control the

development effort?

A. Scrum

B. XP

C. RUP

D. RAD

What measures how well the solution will be accepted in a given opportunity?

A. political feasibility

B. operational feasibility

C. schedule feasibility

D. legal feasibility

What is the number one reason that IT projects fall behind schedule or fail?

A. change in business goals during the project

B. lack of support from business management

C. unclear or missing business requirements

D. change in technology during the project

What defines the how, what, when, and who regarding the flow of project information to

stakeholders and is key for managing expectations?

A. communication plan

B. executive sponsor

C. project assumptions

D. project deliverable

Which of the following is not a characteristic of a well-defined project plan?

A. prepared by the project manager

B. easy to read

C. appropriate to the project’s size

D. communicated to all key participants

What is the most important part of the project plan?

A. Gantt chart

B. specification

C. communication

D. None of these are correct.

What type of chart typically displays the critical path?

A. Gantt chart

B. PERT chart

C. All of these are correct.

D. None of these are correct.

Which of the following is the primary reason why companies outsource?

A. tap outside sources of expertise for a low cost

B. concentrate resources on core business

C. reduce headcount and related expenses

D. better manage the costs of internal processes

Which of the following is the least common reason why companies outsource?

A. tap outside sources of expertise for a low cost

B. concentrate resources on core business

C. reduce headcount and related expenses

D. better manage the costs of internal processes

Solutions

Expert Solution

Q1) the three primary network access technologies are:

a) DSL, Cable Modem, broadband

Q2) the five elements that are needed to create a connected world or a network are:

c) categories, providers, access technologies, protocols, and convergence

Q3) large computer network usually spanning a city or a specific infrastructure like a college is:

a) Metropolitan Area network

Q4) the most important network differentiating dimensions:

d) Cost and performance

Q5) The Internet is a hierarchical structure linking different levels of service providers whose millions of devices supply all the interconnections. The three levels outlined in the book from the top down include:

b) national service provider (NSP), regional service provider (RSP), and internet service provider (ISP)

Q6) The speed of transmission of a network is determined by the speed of its smallest:

c) Amount of Bandwidth

Q7) what measures bandwidth in terms of numbers transferred or received per unit of time:

d) Bit rate

Q8) What are the two most prevalent types of broadband access:

b) digital subscriber line and cable connection

Q9) What allows users to work from remote locations such as home or hotel using high-speed Internet to access business applications and data:

a) Telecommuting

Q10) What is traceroute?:

d) a utility application that monitors the network path of packet data sent to a remote computer


Related Solutions

An attacker is attempting to gain unauthorized access to a WiR network that uses WPA2-PSK. Which...
An attacker is attempting to gain unauthorized access to a WiR network that uses WPA2-PSK. Which of the following attack vectors would the attacker MOST likely use? Capture a three-way handshake and crack it. Capture a mobile device and crack its encryption. Create a rogue wireless access point. Capture a four-way handshake and crack it.
1.Which transmission media has the highest transmission speed in a network? a. Coaxial cable b.Twisted pair...
1.Which transmission media has the highest transmission speed in a network? a. Coaxial cable b.Twisted pair cable c.Optical fiber d.Electrical cable 2.Bits can be send over guided and unguided media as analog signal by a.Digital modulation b.Amplitude modulation c.Frequency modulation d.Phase modulation 3.Loss in signal power as light travels down the fiber is called? a.Attenuation b.Propagation c.Scattering d.Interruption 4.Which of the following is not a transmission medium? a.Telephone lines b.Coaxial cables c.Modem d.Microwave systems 5.The copper wire is the example...
A television network is attempting to decide during the summer which of the following three football...
A television network is attempting to decide during the summer which of the following three football games to televise on the Saturday following Thanksgiving Day: Alabama vs. Auburn, Georgia vs. Georgia Tech, Miami vs. Virginia Tech. The estimated viewer ratings (millions of homes) for the games depend on the win-loss records of the six teams, as shown in the following payoff table. Determine the best game (most viewers) to televise using the following decision criteria. States of Nature - Number...
A television network is trying to decide during the summer which of the following three football...
A television network is trying to decide during the summer which of the following three football games to televise on the Saturday following Thanksgiving Day: Alabama versus Auburn, Georgia versus Georgia Tech, or Army versus Navy. The estimated viewer ratings for the games depend on the win–loss records of the six teams, as shown in the following payoff table:                 Number of Viewers (1,000,000s)                              One Team Has Both Teams       Winning Record; One      Both Teams Have Winning      Team Has Losing...
The FASB had three primary goals in developing the Codification: 1. Simplify user access by codifying...
The FASB had three primary goals in developing the Codification: 1. Simplify user access by codifying all authoritative US GAAP in one spot. 2. Ensure that the codified content accurately represented authoritative US GAAP as of July 1, 2009. 3. Create a codification research system that is up to date for the released results of standard-setting activity. My question is do you think all of the goals have been realized?
The Affordable Care Act (ACA) has three primary goals: expand access to health insurance, protect patients...
The Affordable Care Act (ACA) has three primary goals: expand access to health insurance, protect patients against arbitrary actions by insurance companies, and reduce costs. Did the 2010 Act achieve these goals? How has the ACA impacted the overall compensation of today’s workers? Please support your response through examples
Which one of the following is a local area network?
Which one of the following is a local area network?A: Two local area networks connected by a switch •B: Two local area networks connected by a UTP •C: Two local area networks connected by a switch •D: Two local area networks connected by a hub •E: Two local area networks connected by a router •F: Two computers connected by a router •G: Two computers connected by s switch •H: Two computers connected by a hub •I: Two computer connected by...
For each of the following questions, you need to include the information from both the primary...
For each of the following questions, you need to include the information from both the primary and secondary surveys BUT you need to include/address what is unique for each of these three separate situations. Case Study 2 Situation for Assessment Donald D. is a 32 year-old man who just arrived to your ED after falling from a roof into a rock garden. His femur is protruding through his skin. The paramedics report that he was found in a large pool...
For each of the following questions, you need to include the information from both the primary...
For each of the following questions, you need to include the information from both the primary and secondary surveys BUT you need to include/address what is unique for each of these three separate situations. Case Study 1 Situation for Assessment Rodney G. is a 35-year-old auto repair mechanic who sustained a gunshot wound to the left chest during a robbery. Upon arrival of the rescue squad his BP was faintly palpable at 48 mmHg, his HR was 132 and his...
Indicate which of the following are general, which are primary, and which are secondary sources: (a)...
Indicate which of the following are general, which are primary, and which are secondary sources: (a) Encyclopedia of Psychology (b) Time Magazine (c) Statistics for People Who (Think They) Hate Statistics (textbook) (d) Journal of Sport Health (e) Facts on File (f) A review of Freud¡¯s dream interpretations (g) Dissertation Abstracts Online.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT