1/226
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
One way to share information with supply chain partners is wireless _________, which is the science of measuring physical phenomena such as temperature, volume, or an on/off condition at a remote point and transmitting the value to a distant recorder or observer
A.RFID
B.mobilization
C.osmosis
D.telemetry
D.telemetry
WiMax and 3G wireless mobile technologies offer telemedicine application opportunities that include all of the following EXCEPT:
A.Reduced threat of malpractice suits because there is no hands-on interaction between the remote physician and the patient.
B.Prescriptions can be transferred electronically to the appropriate pharmacy for a no-wait pick-up by the patient.
C.Real-time consultation between a patient in one location and a medical specialist in another.
D.Wearable heart monitors linked to a cell phone can automatically contact doctors or family members at the first sign of health problems.
A.Reduced threat of malpractice suits because there is no hands-on interaction between the remote physician and the patient.
All of the following about RFID are true EXCEPT:
A.An RFID tag can hold 20 times the amount of information a bar code can hold, and the tag can be read through cardboard, wood, and plastic at a range of up to 100 feet
B.An RFID tag includes an antenna and a chip with information about the item
C.An RFID reader contains a radio transmitter and receiver
D.An RFID tag remains inactive until radio frequency energy from the tag's radio transmitter hits its antenna, giving the chip enough power to emit a 96-bit string of information
A.An RFID tag can hold 20 times the amount of information a bar code can hold, and the tag can be read through cardboard, wood, and plastic at a range of up to 100 feet
Digital Signature is
A.Scanned Signature on Computer
B.Code number of the sender
C.Public Key Encryption
D.Software to recognize signature
D.Software to recognize signature
The method(s) of payment for online consumers are
A.Electronic cash
B.Credit/debit
C.Electronic checks
D.All of the above
D.All of the above
Which of the following statements are INCORRECT about company-centric marketplaces?
A.They are marketplaces which focus on a single company's purchasing needs or selling needs.
B.They are generally public entities owned by that company.
C.They support for buying needs (many to one, or buy-side).
D.They support for selling needs (one to many, or sell-side).
B.They are generally public entities owned by that company.
As in e-commerce, m-commerce B2C applications are concentrated in each of the following areas EXCEPT:
A.retail shopping for products and services
B.telecommunications
C.targeted advertising
D.providing content for a fee through mobile portals
B.telecommunications
All of the following about wireless wide area networks (WWAN) are true EXCEPT:
A.The single WWAN network standard insures compatibility of handsets within and between countries.
B.Most WWANs are cellular phone networks.
C.At the center of each cell is a base station transceiver or cell tower that is used to send and receive signals to and from mobile devices operating within the cell.
D.When a device is turned on, a SIM card inside the device identifies itself to the WWAN.
A.The single WWAN network standard insures compatibility of handsets within and between countries.
Which of the following is an example of edutainment?
A.Two or more students sharing music over the Internet
B.An online science fiction game whose object is to blast as many aliens as possible in a 60 second round
C.A community college providing an online college course on digital media
D.An online game that uses colorful characters to teach young children about numbers
D.An online game that uses colorful characters to teach young children about numbers
Which of the following statements about blogs is not true?
A.A blog is a personal Web site, open to the public, in which the owner expresses his or her feelings or opinions.
B.Blogs became very popular after the September 11, 2001 terrorist attacks when people were looking for as many sources of information as possible and for personal connections to the tragedy.
C.Blogs are limited to one-way communication.
D.The most common types of blogs are professional blogs.
C.Blogs are limited to one-way communication.
P2P systems have all of the following key characteristics EXCEPT:
A.They provide for real-time access to other users through techniques such as instant messaging and multichannel collaboration applications.
B.The users' computers can act as both clients and servers.
C.The overall system is well integrated, but lacks tools for easy creation of content or for adding functionalities.
D.They support cross-networking protocols such as SOAP or XML-RPC, which enables a program on one computer to execute a program on a server computer.
C.The overall system is well integrated, but lacks tools for easy creation of content or for adding functionalities.
More and more people are willing to pay for digital music, as shown by the success of ________.
A.Napster
B.Kazaa
C.Apple's iTunes
D.P2P
C.Apple's iTunes
All of the following are examples of e-government EXCEPT:
A.a company sells army and navy surplus supplies at auction over the Internet.
B.a contractor submits an application for a building permit using a city hall Web site.
C.an unemployed worker consults a Web site operated by the state employment department to learn about job openings in his city.
D.a state purchasing officer places an online order for office supplies from an e-catalog sent to her by a national office supply store.
A.a company sells army and navy surplus supplies at auction over the Internet.
A(n) _____ is a computer system capable of integrating, storing, editing, analyzing, sharing, and displaying spatial information.
A.geographical information system
B.global positioning system
C.l-commerce system
D.on-star system
A.geographical information system
Which of the following statements about blogs is not true?
A.A blog is a personal Web site, open to the public, in which the owner expresses his or her feelings or opinions
B.Blogs became very popular after the September 11, 2001 terrorist attacks when people were looking for as many sources of information as possible and for personal connections to the tragedy
C.Blogs are limited to one-way communication
D.The most common types of blogs are professional blogs
C.Blogs are limited to one-way communication
P2P systems have all of the following key characteristics EXCEPT:
A.They provide for real-time access to other users through techniques such as instant messaging and multichannel collaboration applications
B.The users' computers can act as both clients and servers
C.The overall system is well integrated, but lacks tools for easy creation of content or for adding functionalities
D.They support cross-networking protocols such as SOAP or XML-RPC, which enables a program on one computer to execute a program on a server computer
A.They provide for real-time access to other users through techniques such as instant messaging and multichannel collaboration applications
The tasks of KM include each of the following EXCEPT:
A.creating knowledge repositories where knowledge can be stored and retrieved easily
B.enhancing a knowledge environment in order to conduct more effective knowledge creation, transfer, and use
C.restricting knowledge access to prevent its transfer between individuals
D.managing knowledge as an asset so as to increase the effective use of knowledge assets over time
C.restricting knowledge access to prevent its transfer between individuals
_______ involves using various computer-based tools and techniques to analyze transaction data and generate new ideas
A.Knowledge creation
B.Knowledge capture
C.Knowledge classification
D.Knowledge management
A.Knowledge creation
Most universities use e-learning:
A.exclusively in reaching students who couldn't otherwise attend classes.
B.only when forced by administrators to use it as a way to recruit distant students or reduce costs.
C.as a total replacement for traditional classrooms.
D.as a supplementary channel to traditional classrooms.
D.as a supplementary channel to traditional classrooms.
One initiative underway that could lead to widespread support for the introduction of RFID is the _____, which identifies the manufacturer, producer, version, and serial number of each item and does not require line-of-sight contact to be read.
A.Electronic Product Code
B.Universal Product Code
C.Smart Product Network
D.Sensor Network
A.Electronic Product Code
Wal-Mart and Levi Strauss collaborate on demand forecasting in order to optimize the flow of materials along the supply chain. This is an example of:
A.reducing design cycle time
B.APS (Advanced Planning and Scheduling)
C.CPFR (Collaborative Planning, Forecasting and Replenishment)
D.reducing product development time
C.CPFR (Collaborative Planning, Forecasting and Replenishment)
A major block in the widespread implementation of collaborative commerce is:
A.the theory of collaborative commerce hasn't been proven effective in real-world applications.
B.the technology needed isn't available.
C.collaborative commerce is extremely expensive.
D.the lack of universally accepted standards.
D.the lack of universally accepted standards.
When you have a potential IoT idea you want to develop properly, what must you first define?
A.Its Unique Value Proposition
B.Problem it sets out to solve
C.Route to market
D.How it will work
B.Problem it sets out to solve
What is used to uniquely identify devices connected to the Internet?
A.gateway address
B.IP address
C.device name
D.URL
B.IP address
What data security concerns do IoT devices pose?
A.The device being hijacked to harm another device or system
B.Because they are small and low powered, they can't carry much software including security software leaving them open to data theft or disruption
C.The devices being small and embedded into objects makes them easily vandalised or stolen
B.Because they are small and low powered, they can't carry much software including security software leaving them open to data theft or disruption
Which function in the Arduino IDE is used to set any pin in output or input state?
A.digitalWrite
B.delay
C.pinMode
D.analogRead
C.pinMode
How many PWM pins are present in the Arduino UNO?
A.1
B.3
C.6
D.9
C.6
What among the following is an example of external interrupt for the Arduino?
A.Button
B.Resistor
C.LED
D.Capacitor
A.Button
What will be the correct syntax to make a digital pin (say D2) as an output pin?
A.pinMode(2,output)
B.pinMode(2,Output)
C.pinMode(2,OUTPUT)
D.pinmode(2,OUTPUT)
C.pinMode(2,OUTPUT)
Which of the following digital pins can be used in Arduino Nano/Uno to give interrupt?
A.D2
B.D6
C.D4,D5
D.D2,D3
D.D2,D3
What is the size of EEPROM of the Arduino UNO?
A.1 KB
B.2 KB
C.4 KB
D.8 KB
A.1 KB
Which function in the Arduino is used to start the serial communication using the COM port?
A.Serial.available()
B.Serial.begin()
C.serial.begin()
D.setup()
B.Serial.begin()
The action that will be performed using this switch case will be:switch (2): {case 1: digitalWrite(11,HIGH); case 2: analogRead(A3)}
A.D11 will become HIGH
B.Analog value of A3 will be read
C.D11 will become LOW
D.None of the other
B.Analog value of A3 will be read
While taking the input from the user in Arduino, which of these function is used in Sketch?
A.Serial.print
B.Serial.println
C.Serial.available
D.None of the other
C.Serial.available
What is the Tinkercad Circuits?
A.Its a just s software to create games
B.Tinkercad is a free online collection of software tools that help people create and simulation circuits.
C.Its a software for playing and create games.
D.None of the other
B.Tinkercad is a free online collection of software tools that help people create and simulation circuits.
How do you zoom in on Tinkercad?
A.Spacebar
B.Use the arrows on the keyboard
C.Use the scroll wheel
D.Right Click
C.Use the scroll wheel
A photoresistor is an electronic component whose electrical resistance _______ when it is exposed to light.
A.changes
B.increases
C.doesn't change
A.changes
What does this syntax mean? myservo.attach(9)
A.Connect the control wire 9 to GND pin
B.Connect the control wire for 9 seconds
C.Connect the control wire to 9 volts
D.Connect the control wire to digital pin 9
D.Connect the control wire to digital pin 9
In remote control terms, IR stands for what?
A.indirect radio
B.infrared
C.inside remote
D.instant reception
B.infrared
Infrared remote controls use what to carry signals between the remote control and the device it controls?
A.radio waves
B.sound
C.light
C.light
Infrared signals can be used for ______.
A.(a) long-range communication
B.(b) short-range communication
C.Both (a) and (b)
D.None of the other
B.(b) short-range communication
Which sensor is LM35?
A.Pressure sensor
B.Humidity sensor
C.Temperature sensor
D.Touch sensor
C.Temperature sensor
LM35 provides _______ Volt for each degree count?
A.1
B.0.01
C.0.001
D.10
B.0.01
What is the main purpose of the SRF05 sensor?
A.Water level sensor
B.Sound intensity sensor
C.Ranging sensor
D.Temperature sensor
C.Ranging sensor
What is the purpose of the pin named ECHO of HC-SR04 sensor?
A.Allows the ultrasonic sound wave to be sent from the sensor.
B.Provides the information that the ultrasonic sound wave is returned.
C.Allows the sensor to be fed with energy.
D.Provides the chassis connection of the sensor.
B.Provides the information that the ultrasonic sound wave is returned.
What does the AREF pin on the Arduino UNO?
A.Used to trigger a interrupt.
B.Reference voltage for analog inputs.
C.To reset the microcontroller.
D.Provides 8-bit PWM signal.
B.Reference voltage for analog inputs.
What pins can the Arduino UNO board communicate with the computer?
A.PWM pins
B.ADC pins
C.I2C pins
D.UART pins
D.UART pins
What case is called serialEvent() interrupt?
A.Serial port shuts down.
B.When data is sent from the serial port.
C.When data comes from the serial port.
D.When the voltage is applied to the Arduino.
C.When data comes from the serial port.
Each computer has its own Internet search engine.
A.True
B.False
B.False
What does CRM stand for?
A.Customer Research Management
B.Customer Relationship Management
C.Customized Research Management
D.Customer Research Metrics
B.Customer Relationship Management
How has e-commerce revolutionized business?
A.It has allowed businesses to utilize new avenues of advertising, selling, and distribution.
B.It attempts to level the playing field.
C.It transcends geographic boundaries.
D.All of the above
D.All of the above
A _____ allows customers to continue browsing after selecting each item they wish to purchase
A.Shopping Cart
B.Forms-based interface
C.SSL connection
D.Virtual memory
A.Shopping Cart
Which of the following is NOT a standard used in E-Commerce?
A.EDI
B.XML
C.SETI
D.X12
C.SETI
Which of the following is NOT the characteristics of consumer when studying about EC Consumer Behavior Model?
A.Age
B.Gender
C.E-mail
D.Education
C.E-mail
Mechanism to protect private networks from outside attack is
A.Firewall
B.Antivirus
C.Digital signature
D.Formatting
A.Firewall
While making payment using electronic check, credit and debit cards, the server authenticates the customers and verifies with the bank that funds are adequate before purchase
A.True
B.False
A.True
A computer communication technology that provides a way to interconnect multiple computer across short distance is
A.LAN
B.WAN
C.MAN
D.Wireless network
A.LAN
DNS is
A.The distributed hierarchical naming system
B.The vertical naming system
C.The horizontal naming system
D.The client server system
C.The horizontal naming system
Which of the following is a technology constraint from the e-commerce macro-environment?
A.Propensity for consumers to purchase online.
B.Opt-in to e-mail required to avoid SPAM
C.Likelihood of fraudulent transactions
D.Taxation at source of purchase
C.Likelihood of fraudulent transactions
In E-Commerce, HTTPS is a communication protocol that uses
A.Public key encryption
B.Secret key encryption
C.Private key encryption
D.Data key encryption
A.Public key encryption
The concept of electronic cash is to execute payment by
A.Credit Card
B.ATM Card
C.Using computers over network
D.Cheque
C.Using computers over network
A chemical manufacturer has transactions that are predominantly:
A.business to consumer.
B.consumer to consumer.
C.consumer to business
D.business to business
C.consumer to business.
A B2B reverse auction is:
A.the same as a seller auction.
B.intended to reduce the price by increasing competition from suppliers.
C.always run through a B2B marketplace.
D.both the second and third answers above.
B.intended to reduce the price by increasing competition from suppliers.
A computer system that permits multiple users to run programs at same time
A.Real time system
B.Multi programming system
C.Time sharing system
D.Multi tasking system
D.Multi tasking system
The mercantile process model consists of the following phase(s):
A.The pre-purchase phase
B.Purchase consummation phase
C.Post-purchase Interaction phase
D.All of the above
D.All of the above
The most serious disadvantage of e-auctions is:
A.the risk of fraud.
B.Logistics.
C.unreliable auction software.
D.payment delays.
A.the risk of fraud.
Many companies use intermediaries or trading assistants instead of implementing e-auctions themselves for each of the following reasons EXCEPT:
A.The company name is not widely recognized.
B.To bring many more buyers to the auction.
C.To avoid tax and legal fees.
D.Costs of auction intermediaries or assistants are less than the costs of physical auctions.
C.To avoid tax and legal fees.
All of the following are potential benefits from auctions to sellers EXCEPT:
A.auctions can broaden the customer base and reduce cycle time.
B.sellers receive valuable price sensitivity information.
C.sellers are always anonymous.
D.sellers can liquidate large quantities of obsolete items very quickly.
C.sellers are always anonymous.
Select the correct answer from the choices below which is corresponding with the following statement in STRATEGIC PLANNING TOOLS" : It is a methodology that surveys external opportunities and threats and relates them to internal strengths and weaknesses.
A.SWOT analysis
B.strategy map
C.balanced scorecard
D.BCG matrix
A.SWOT analysis
A major shortcoming with authentication services is:
A.two different authenticators may come up with different opinions regarding the authenticity and description of a given item.
B.it is impossible to tell whether many items are reproductions or genuine.
C.dishonest authenticators are the primary sources of fraud on the Internet.
D.most auction sites forbid the use of authentication services.
A.two different authenticators may come up with different opinions regarding the authenticity and description of a given item.
_____ work best with many buyers and many sellers.
A.Bartering
B.Dynamic exchanges
C.Forward auctions
D.Reverse auctions
A.Bartering
The services provided through location-based m-commerce focus on key factors which include all of the following EXCEPT:
A.Geocaching, or determining the topography of an area.
B.Navigation, or plotting a route from one location to another.
C.Tracking, or monitoring the movement of a person or thing.
D.Timing, or determining the precise time at a specific location
A.Geocaching, or determining the topography of an area.
Infrastructures that "support" the wireless connection are:
A.network access points, mobile communications server switches, and cellular transmitters and receivers.
B.WAP gateways, GPS locators, and GPS satellites.
C.PDAs, smartphones, and portable computers.
D.web servers, mobile devices, and microbrowsers.
A.network access points, mobile communications server switches, and cellular transmitters and receivers.
A ______ is suitable for mobile users who need to make very short-range device-to-device wireless connections within a small space, such as a single room, and most commonly with Bluetooth.
A.personal area network
B.local area network
C.wireless area network
D.metropilitan area network
A.personal area network
You are walking near a coffee shop and suddenly your cell phone beeps with a message: "Come inside and get a free biscotti with any purchase." This is an example of:
A.permission marketing
B.location-based advertising
C.customer relationship management
D.m-commerce
C.customer relationship management
A resistor's first three colour bands are brown, green and red. What is its value?
A.1500 ohms
B.250 ohms
C.2000 ohms
D.510 ohms
A.1500 ohms
Which colour represents the digit 6 in the resistor colour code?
A.red
B.blue
C.pink
D.green
B.blue
Which of these colours is NOT used in the resistor value colour code?
A.black
B.turquoise
C.white
D.violet
B.turquoise
A micro-controller is...
A.small CPU made of transistors and conductors of heat and sound sensor
B.portable circuits capable of making other circuits
C.small computer on a single integrated circuit containing a processor core, memory, and programmable input/output peripherals
D.small chip made of silver
A.small CPU made of transistors and conductors of heat and sound sensor
What does GPIO stand for?
A.General Purpose Inner Outer Propeller
B.General Purpose Interested Old People
C.General Purpose Input Output Pins
D.General Purpose Input Output Processor
C.General Purpose Input Output Pins
Before your program "code" can be sent to the board, it needs to be converted into instructions that the board understands. This process is called...
A.Stop
B.Create Sketch
C.Compile
D.Serial Monitor
C.Compile
This shows you what the IDE is currently doing and is also where error messages display if you make a mistake in typing your program. (often called a syntax error)
A.Sketch Editor
B.Text Console
C.Line Number
D.Serial Monitor
B.Text Console
This shows you what line number your cursor is on. It is useful since the compiler gives error messages with a line number.
A.Sketch Editor
B.Text Console
C.Line Number
D.Serial Monitor
C.Line Number
A function is a series of programming statements that can be called by name. Which command is called once when the program starts:
A.loop()
B.(output)
C.setup()
D.(input)
C.setup()
A function is a series of programming statements that can be called by name. Which command is called repetitively over and over again as long as the Arduino has power.
A.loop()
B.(output)
C.setup()
D.(input)
A.loop()
A function is a series of programming statements that can be called by name. Which command delays the LED by a number of milliseconds is.
A.loop()
B.delay()
C.setup()
D.stop()
B.delay()
What is this line of code: // the loop function runs over and over again forever
A.A statement
B.A single line comment
C.A function definition
D.A bowl of cereal
B.A single line comment
What is this line of code: void loop() {
A.A statement
B.A single line comment
C.Part of a function definition
D.A banana
C.Part of a function definition
Which pin has a built-in LED?
A.Pin 13
B.Pin 10
C.Pin 8
D.Pin 7
A.Pin 13
What are two two main types of Arduino pins?
A.Digital and analog.
B.Digital and modulation.
C.Pulse and analog.
A.Digital and analog.
If you make a voltage divider circuit with R1 = 10K and R2 = 10K, and your Vin is 12V, what will be your Vout?
A.12V
B.10V
C.6V
D.5V
C.6V
How many bits are there in a byte?
A.256
B.8
C.16
D.10
B.8
On a breadboard, where do you put a DIP package?
A.In the middle of the board
B.On the bottom side of the board
C.In the power rails
D.With the potato chips
A.In the middle of the board
What is the nominal voltage of 6 AAA batteries connected in parallel?
A.6V
B.9V
C.12V
D.1.5V
D.1.5V
This is an unsigned data type that occupies 1 byte of memory. Same as the byte datatype. It encodes numbers from 0 to 255.
A.highByte()
B.unsigned char
C.unsigned long
D.volatile
B.unsigned char
This is used to include outside libraries in your sketch. This gives the programmer access to a large group of standard C libraries (groups of pre-made functions), and also libraries written especially for Arduino.
A.#include
B.break
C.void
D.#define
A.#include
This clears (writes a 0 to) a bit of a numeric variable.
A.bitClear
B.sizeof()
C.pinMode
D.#include
A.bitClear
The void keyword is used only in function declarations. It indicates that the function is expected to return no information to the function from which it was called.
A.HIGH
B.void
C.pin
D.LOW
B.void