Saturday, September 10, 2016

Cyber Security and Mobility - Challenge you Existing Knowledge - Quiz

1. What does BYOD stand for?

  • Bring Your Own Device
  • Bring Your Own Destruction
  • Bring Your Own Data
  • Bring Your Own Desk
Coursera Purple CS Design 3 Coursera DS Design 10 Coursera Business Vertical Orange Design 10

2. Which of the following refers to BYOD?

  • It encourages company employees to work on the device they choose
  • It can threaten IT security
  • It can put a company’s sensitive business systems at risk
  • All the above
Learn Marketing Mix Implementation with IE Business School and Coursera. Prepay and receive a 10% discount. Learn Investment Management with University of Geneva and Coursera. Prepay and receive a 10% discount. Learn Entrepreneurship with the Wharton School and Coursera. Prepay and receive a 10% discount.

3. Which of the following is an example of a smartphone that can be used at the workplace?

  • Google Nexus
  • Apple iPhone
  • Samsung Galaxy
  • All of the above
Coursera AH Purple Design 2 Coursera General Design 2 Green Coursera Data Science

4. Which of the following are impacted due to new technology and the expanding role of the Internet?

  • Business models
  • Social relationships
  • Management philosophies
  • All of the above

5. What is a key recommendation on consumerization and enterprise mobility?

  • Articulate a company’s end user workplace and technology philosophy
  • Allow for less security
  • Do not implement a clear business strategy
  • Allow all employees to go home early

Robotics Specialization from University of Pennsylvania Data Science Specialization from Johns Hopkins University Big Data Specialization from UC San Diego

6. Which of the following have impacted the workplace and society in general?

  • Starbucks Coffee locations at every corner
  • Social media
  • Animated videos used in employee training
  • None of the above

7. Which of the following can be a part of mobile governance?

  • Process
  • People
  • Policy
  • All of the above

Coursera CS Coursera Business Vertical Coursera Arts & Humanities

8. What does WLAN stand for?

  • Wishes Local Area Network
  • Wireless Local Area Network
  • Wardens Local Area Network
  • None of the above

9. What does MDM stand for?

  • Mobile Device Management
  • My Document Mailed
  • My Device Managed
  • None of the above

Coursera - Hundreds of Specializations and courses in business, computer science, data science, and more Top Computer Science Specializations on Coursera Top Data Science Specializations on Coursera

10. Which of the following can be considered as tradeoffs when enterprises start the process of creating mobile solutions?

  • Support and management cost
  • Security risk
  • User experience
  • All of the above

11. Use of mobile technologies in the workplace has many benefits, but an area of potential concern is ___________.

  • Work life balance
  • Temporal servitude
  • Temporal irrelevance
  • None of the above

Business Foundations from the Wharton School Business and Financial Modeling from the Wharton School Business Analytics from the Wharton School

12. Work life conflict in an era of the knowledge worker can cause issues such as (check all that apply):

  • high productivity
  • turnover
  • increased flexibility
  • stress

13. The continuous use of mobile technologies in the workplace has raised expectations regarding ____________.


  • Authentication
  • availability
  • Integrity
  • Confidentiality

Machine Learning Specialization from University of Washington Learn SEO with UC Davis and Coursera. Prepay and receive a 10% discount.  Learn Algorithmic Programming Techniques with UCSD/HSE and Coursera. Prepay and receive a 10% discount.

14. Strategies for addressing work life balance issues related to usage of mobile technologies include (check all that apply):

  • integration
  • compensation
  • fulfillment
  • negotiation



Python Specialization from University of Michigan

15. A benefit to employing an effective work life balance strategy at the team and individual level is _______.
  • more complaints
  • high productivity
  • high turnover
  • high stress
 

CyberSecurity and Mobility - Practice Quiz

1. Which of the following is true about the difficulties faced in securing cyberspace (select all that apply)
  • linkages between cyberspace and physical systems
  • it only concerns North America
  • difficulty of reducing vulnerabilities and consequences in complex cyber networks
  • ability of malicious actors to operate from anywhere in the world,
Coursera Purple CS Design 3

2. As we become more reliant on technology, we become vulnerable to the following (select all that apply):
  • corporate security breaches
  • spear phishing
  • highway robberies

Coursera General Design 2 Green

3. _________ is a 24/7 cyber situational awareness, incident response, and management center that is a national nexus of cyber and communications integration for the federal government, intelligence community, and law enforcement.
  • Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)
  • United States Computer Emergency Readiness Team (US-CERT)
  • National Cybersecurity and Communications Integration Center (NCCIC)
Coursera Business Vertical Orange Design 10

4. Cybersecurity ___________ is designed to mitigate losses from a variety of cyber incidents, including data breaches, business interruption, and network damage.
  • turnover
  • protection
  • insurance
Coursera DS Design 10

5. Department of Homeland Security (DHS) employs a ________ approach to privacy oversight for the department’s cybersecurity activities
  • static
  • symbolic
  • layered
Coursera AH Purple Design 2

6. As technology becomes increasingly sophisticated, the demand for an experienced and qualified __________ to protect our nation’s networks and information systems will only continue to grow.

  • messengers
  • workforce
  • prison guards

Coursera CS

7. ___________ program is a dynamic approach to fortifying the cybersecurity of government networks and systems.

  • Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)
  • ICSS-CIIT
  • Continuous Diagnostics and Mitigation (CDM)
Coursera CS

8. __________ is essential to the protection of critical infrastructure and to furthering cybersecurity for the nation.
  • Information overload
  • Information hiding
  • Information sharing
Coursera Data Science

Monday, September 5, 2016

IEEEx: RTSIx Introduction to Real-Time Systems

Quiz

Multiple Choice

Top Computer Science Specializations on Coursera Coursera CS


  • Which of the following is the most important distinguishing feature of a real-time system?

  1. very fast hardware and response times 
  2. mission critical application
  3. temporal correctness


Learn Business Analytics with UPenn and Coursera Become a Web Developer in 2016 with Coursera

  • Which of the following are most likely to be hard real-time systems?

  1. weapons delivery system, library of congress database, automatic teller machine
  2. weapons delivery system, nuclear power plant controller, seat belt deployment system 
  3. automated weed killing system, nuclear power plant controller, pasta sauce bottling factory control

Learn Data Science, Digital Marketing, Business Foundations & More. Start Learning. Master Big Data with UCSD and Coursera


  • Real-time systems engineering is most likely to incorporate which of the following?

  1. determination of response time requirements and determining hardware and software strategies for meeting those requirements 
  2. selection of hardware and configuration of off-the-shelf operating systems products 
  3. formal derivation of mathematical models for the schedule

Learn Social Media Marketing with Northwestern and Coursera


  • Which of the following scheduling strategies is the most likely scheduling discipline to be used when “fairness” is the main requirement?

  1. round-robin
  2. cyclic executive
  3. rate-monotonic

Cyclic executive is not fair because one task can be much longer than another, hogging CPU time. Rate-monotonic is not fair because it is preemptive. Round-robin is based on equal sharing of processor time.


  • Which of the following scheduling strategies does not require interrupts?

  1. round-robin
  2. cyclic executive
  3. rate-monotonic

Build Project Management Skills with Coursera Learn Data Science, Digital Marketing, Business Foundations & More. Start Learning.


  • Rate-monotonic scheduling is used for all but the following?

  1. determining the theoretical best case scenario for CPU utilization 
  2. providing some confidence that deadlines can or cannot be met 
  3. for determining how the interrupt priorities should be assigned
It is important not to blindly apply rate-monotonic theorem. In some cases, the lowest frequency task should have the highest priority.


  • True or False: It is important to rely only on language constructs for intertask synchronization and communication because they are the most reliable and predictable.

  1. True 
  2. False

Programming languages cannot be relied upon to provide safe synchronization mechanisms, even when advertised as such. It is better for the real-time systems engineer to carefully study the underlying implementation of these mechanisms for each compiler and environment and consider building these mechanisms from scratch if necessary.

Master Computer Science on Coursera Coursera Project Management - Qualify for 35 PDUs

  • True or False: The best programming languages for real-time are those that relieve the software engineer from having to understand the core mechanisms of process scheduling and intertask synchronization and communication.

  1. True 
  2. False

It is generally inadvisable to let the compiler handle these things without “supervision” by the engineer.

  • True or False: Testing real-time systems is no different than testing any other type of system.
  1. True 
  2. False
The requirement for temporal correctness adds a new dimension to testing the system.

Coursera - Hundreds of Specializations and courses in business, computer science, data science, and more Discover Data Science with Coursera

  • Which of the following is not a challenge that is specific to real-time systems engineer?

  1. automatic determination of code execution time is generally not possible at compile time 
  2. estimation of costs to complete and schedule is extremely difficult 
  3. hardware mechanisms that improve average case performance can adversely impact worst case performance

Schedule and cost estimation is difficult for any kind of system. The other two problems are of special concern to real-time systems engineers.


https://courses.edx.org/courses/course-v1:IEEEx+RTSIx+1T2016/courseware/69441abcf7404bddb1bc57d337f912bd/b8b4fc22e4b64ce495d812a6ed3f0e4a/