Unit 14

¡Supera tus tareas y exámenes ahora con Quizwiz!

The Internet consists of a series of networks that include A. Gateways to allow networks to connect to each other. B. Routers to strengthen data signals between distant computers. C. Bridges to direct messages through the optimum data path. D. Repeaters to physically connect separate local area networks (LANs).

A. Gateways to allow networks to connect to each other. The Internet facilitates information transfer among computers. Gateways are hardware or software products that allow translation between two different protocol families. For example, a gateway can be used to exchange messages between different email systems.

Organizations that move to implement EDI often use value-added networks (VANs). Which of the following would not normally be performed by a VAN? A. Provide translations from clients' computer applications to a standard protocol used for EDI communication. B. Provide common interfaces across organizations thereby eliminating the need for one organization to establish direct computer communication with a trading partner. C. Store electronic purchase orders of one organization to be accessed by another organization. D. Maintain a log of all transactions of an organization with its trading partner.

A. Provide translations from clients' computer applications to a standard protocol used for EDI communication. Companies must purchase their own software to translate their data to a national standard protocol for EDI purposes, either ANSI X.12 in the U.S. or EDIFACT in Europe and most of the rest of the world. Once the data are in the standard format, the VAN handles all aspects of the communication. VANs are privately owned telecommunications carriers that sell capacity to outside users. Among other things, a VAN provides a mailbox service permitting EDI messages to be sent, sorted, and held until needed in the recipient's computer system.

Which one of the following is not a reason for a company to use EFT with an EDI system? A. To take advantage of the time lag associated with negotiable instruments. B. To improve its cash management program. C. To reduce input time and input errors. D. To allow the company to negotiate discounts with EDI vendors based upon prompt payment.

A. To take advantage of the time lag associated with negotiable instruments. The time lag between transmittal of a check (a negotiable instrument) and its clearance through regular banking channels is called float. Float is eliminated by EFT.

A research-based firm in the medical field could use each of the following Internet-based tools for collaboration except A. Videoconferencing. B. Electronic data interchange. C. Groupware systems. D. An e-mail application.

B. Electronic data interchange Electronic data interchange is a method used specifically for carrying on business-to-business e-commerce. This would not be an important tool for collaboration in a research-based firm in the medical field.

Which one of the following is likely to be a concern in performing an assessment of an electronic data interchange (EDI) purchasing system? A. Decreased competition in the market. B. Increased turnover of the information technology staff. C. Increased competition in the market. D. Increased transaction volume.

B. Increased turnover of the information technology staff. EDI systems rely on technically trained personnel for operations. Changes in personnel suggest that crucial expertise may have been lost.

Which of the following networks provides the least secure means of data transmission? A. Private. B. Public-switched. C. Local area. D. Value-added.

B. Public-switched Public-switched networks are wide area networks that use public telephone lines. This arrangement may be the most economical, but data transmission may be of lower quality, no connection may be available, and security measures may be ineffective.

Which of the following statements about personal and notebook computers and servers is true? A. Servers must be programmed directly in machine language while personal and notebook computers use higher-level language. B. The cost per transaction to process on each type of computer has decreased in recent years. C. Because of the increased use of personal and notebook computers, there will be little need for servers in the near future. D. Personal and notebook computers usually cost more than servers but less than mainframes.

B. The cost per transaction to process on each type of computer has decreased in recent years. Advances in technology have resulted in less expensive computers and increased computing power. The cost to process transactions on all kinds of computers has therefore decreased.

Which one of the following network configurations is distinguished by the possibility of spreading the cost of ownership among multiple organizations? A. Value-added network. B. Wide area network. C. Local area network. D. Baseband network.

B. Wide area networks Wide area networks consist of a conglomerate of local area networks (LANs) over widely separated locations. The key aspect here is that a WAN can be either publicly or privately owned.

Which of the following is a correct statement regarding Hadoop? A. It analyzes text data from the web, comment fields, books, and other text-based sources through the use of machine learning or natural language processing technology. B. It is a technology that uses data, statistical algorithms, and machine-learning techniques to identify the likelihood of future outcomes based on historical data. C. It is open source software framework that stores large amounts of data and runs applications on clusters of commodity hardware. D. It analyzes data from system memory instead of hard drives.

C. It is open source software framework that stores large amounts of data and runs applications on clusters of commodity hardware. Hadoop is an open source software framework that stores large amounts of data and runs applications on clusters of commodity hardware.

A digital signature is used primarily to determine that a message is A. Sent to the correct address. B. Received by the intended recipient. C. Unaltered in transmission. D. Not intercepted en route.

C. Unaltered in transmission. A digital signature is a means of authenticating an electronic document, such as a purchase order, acceptance of a contract, or financial information. Because digital signatures use public-key encryption, they are a highly secure means of ensuring security over the Internet.

Engaging in traditional electronic data interchange (EDI) provides which of the following benefits? A. Enhanced audit trails. B. Guaranteed payments from customers. C. Added flexibility to entice new partners. D. Reduced likelihood of stock-out costs.

D. Reduced likelihood of stock-out costs. Stock-out costs are the opportunity cost of missing a customer order. EDI systems reduce the business cycle by eliminating delays and help prevent stock-outs.


Conjuntos de estudio relacionados

MDX-DNA POLYMORHISM AND HUMAN IDENTIFICATION

View Set

ILLINOIS BROKER PRELICENSE Unit 1-12 REVIEW QUESTIONS

View Set

Biology Unit 8- Ecology PowerPoint

View Set

casey chemistry chapter 10, 11, 12 practice test

View Set

Probability and statistics unit 2

View Set