BIS TB 7-10

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

26) When tailoring a particular aspect of a system to the way a company does business, enterprise software can provide the company with A) configuration tables. B) Web services. C) data dictionaries. D) middleware.

A

30) An independent computer program that copies itself from one computer to another over a network is called a A) worm. B) Trojan horse. C) bug. D) pest.

A

39) The concept of a future Web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called A) the Web of things. B) the Semantic Web. C) Internet2. D) a 3-D Web.

A

51) In which of the following revenue models does a Web site charge a fee for access to some or all of its offerings on a continual, regular basis? A) subscription B) free/freemium C) transaction fee D) sales

A

51) Instant messaging is a type of ________ service. A) chat B) cellular C) e-mail D) wireless

A

65) A digital certificate system A) uses third-party CAs to validate a user's identity. B) uses digital signatures to validate a user's identity. C) uses tokens to validate a user's identity. D) is used primarily by individuals for personal correspondence.

A

21) Through what channel did e-commerce first evolve? A) online advertising sales B) Internet portals C) online book sales D) Internet service providers

A

21) ________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems. A) "Security" B) "Controls" C) "Benchmarking" D) "Algorithms"

A

22) Which of the following is not one of the current main areas of growth in mobile e-commerce? A) sales of financial services B) retail sales at the top mobile companies C) sales of digital content D) sales of apps

A

25) All of the following are methods of ensuring software quality except for A) systems analysis. B) walkthroughs. C) software testing. D) internal corporate back-end system.

A

25) You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take? A) Select the functions of the system you wish to use. B) Select the business processes you wish to automate. C) Map the company's business processes to the software's business processes. D) Map the software's business processes to the company's business processes.

A

26) In TCP/IP, IP is responsible for A) disassembling and reassembling of packets during transmission. B) establishing an Internet connection between two computers. C) moving packets over the network. D) sequencing the transfer of packets.

A

28) The Internet poses specific security problems because A) it was designed to be easily accessible. B) Internet data is not run over secure lines. C) Internet standards are universal. D) it changes so rapidly.

A

30) To use the analog telephone system for sending digital data, you must also use A) a modem. B) a router. C) DSL. D) twisted wire.

A

31) The lowered costs of information storage, processing, and communication, along with the improvement of data quality, has resulted in which unique quality of e-commerce? A) information density B) richness C) customization D) interactivity

A

32) In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of? A) Trojan horse B) virus C) worm D) spyware

A

32) Which type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate server? A) peer-to-peer B) wireless C) LAN D) Windows domain network

A

35) All of the following are physical components of an RFID system except A) bar code. B) antenna. C) radio transmitters. D) tags.

A

35) Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain? A) safety stock B) continuous replenishment C) just-in-time strategies D) demand planning

A

36) A scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line best describes a ________ strategy. A) just-in-time B) frictionless C) bullwhip D) safety-stock

A

36) Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack. A) DDoS B) DoS C) SQL injection D) phishing

A

36) Which digital cellular standard is used widely throughout the world except the United States? A) GSM B) CDMA C) WLAN D) LTD

A

37) Reducing the business process layers in a distribution channel is called A) disintermediation. B) BPR. C) market segmentation. D) network effects.

A

40) Compared to traditional goods, digital goods have A) greater pricing flexibility. B) lower marketing costs. C) higher production costs. D) higher inventory costs.

A

41) Compared to traditional markets, digital markets have A) lower distributed delivery costs. B) higher marginal costs per unit. C) equivalent copying costs. D) similar inventory costs.

A

41) The total amount of digital information that can be transmitted through any telecommunications medium is measured in A) bps. B) Hertz. C) baud. D) gigaflops.

A

42) Digital subscriber lines A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are very-high-speed data lines typically leased from long-distance telephone companies. D) have up to twenty-four 64-Kbps channels.

A

42) Pharming involves A) redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser. B) pretending to be a legitimate business's representative in order to garner information about a security system. C) setting up fake Web sites to ask users for confidential information. D) using e-mails for threats or harassment.

A

42) eBay is an example of A) C2C e-commerce. B) B2B e-commerce. C) B2C e-commerce. D) M-commerce.

A

43) Capabilities of supply chain execution systems would not include A) identifying the optimal transportation mode. B) tracking the flow of finished goods. C) managing materials. D) managing warehouse operations.

A

44) Which protocol is the Internet based on? A) TCP/IP B) FTP C) packet-switching D) HTTP

A

45) A supply chain driven by actual customer orders or purchases follows a ________ model. A) pull-based model B) build-to-stock C) push-based D) replenishment-driven

A

46) The child domain of the root is the A) top-level domain. B) second-level domain. C) host name. D) domain extension.

A

47) The Gramm-Leach-Bliley Act A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules.

A

49) Which of the following best describes why small world theory is important to e-commerce? A) The products bought online by one individual will influence purchases by others. B) The greater the number of people using your product, the more valuable it becomes. C) You do not need to attract a large consumer base to become profitable. D) Global products create a global community.

A

51) Application controls A) can be classified as input controls, processing controls, and output controls. B) govern the design, security, and use of computer programs and the security of data files in general throughout the organization. C) apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment. D) include software controls, computer operations controls, and implementation controls.

A

53) Customer relationship management systems typically provide software and online tools for sales, customer service, and A) marketing. B) account management. C) advertising. D) public relations.

A

53) Which of the following best illustrates the transaction fee revenue model? A) eBay receives a small fee from a seller if a seller is successful in selling an item. B) Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase. C) Flickr provides basic services for free, but charges a premium for advanced services. D) Apple accepts micropayments for single music track downloads.

A

54) A VPN A) is an encrypted private network configured within a public network. B) is more expensive than a dedicated network. C) provides secure, encrypted communications using Telnet. D) is an Internet-based service for delivering voice communications.

A

54) A(n) ________ system is used to identify and authorize different categories of system users and specify which portions of the organization's systems each user can access. A) identity management B) AUP C) authentication D) firewall

A

54) ________ describes the concept that a large group of people is better at making correct decisions than a single person. A) The wisdom of crowds B) Outsourcing C) Crowdsourcing D) Social graphing

A

56) Customer service modules in CRM systems provide tools for A) assigning and managing customer service requests. B) capturing prospect and customer data. C) identifying profitable and unprofitable customers. D) managing sales prospect and contact information.

A

56) Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n) A) uniform resource locator. B) IP address. C) third-level domain. D) root domain.

A

59) A firewall allows the organization to A) prevent unauthorized communication both into and out of the network. B) monitor network hot spots for signs of intruders. C) prevent known spyware and malware from entering the system. D) all of the above.

A

59) ________ management is an important capability for customer service processes that is found in most major CRM software products. A) Returns B) Lead C) Account D) Events

A

60) In which technique are network communications analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver? A) stateful inspection B) intrusion detection system C) application proxy filtering D) packet filtering

A

62) E-hubs are more ________ than private industrial networks. A) transaction-oriented B) collaborative C) independent D) supply-chain oriented

A

64) A third-party Net marketplace that connects many buyers and suppliers for spot purchasing is called a(n) A) exchange. B) vertical market. C) private exchange. D) e-hub.

A

65) Which process is used to protect transmitted data in a VPN? A) tunneling B) PPP C) VOIP D) packet-switching

A

69) Enterprise application vendors have created ________ to make their own customer relationship management, supply chain management, and enterprise systems work closely together with each other. A) e-business suites B) ERP systems C) middleware D) legacy systems

A

70) You are advising an accounting firm that wants to establish its first Web site. Approximately how much of the Web site budget should you assign to purchasing software? A) 10 percent B) 25 percent C) 50 percent D) none, as no software will need to be purchased

A

threats from malware were detected by Internet security firms in 2012? A) 400 thousand B) 4 million C) 40 million D) 400 million

A

23) The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called A) multiplexing. B) packet switching. C) packet routing. D) ATM.

B

23) Which of the following is an example of a geosocial mobile service? A) Kickstarter.com B) Foursquare C) Shopkick D) Facebook

B

26) Sniffing is a security challenge that is most likely to occur in which of the following points of a corporate network? A) client computer B) communications lines C) corporate servers D) internal corporate back-end system

B

27) In a telecommunications network architecture, a protocol is A) a device that handles the switching of voice and data in a local area network. B) a standard set of rules and procedures for control of communications in a network. C) a communications service for microcomputer users. D) the main computer in a telecommunications network.

B

31) Which type of network is used to connect digital devices within a half-mile or 500-meter radius? A) Wi-Fi B) LAN C) WAN D) MAN

B

33) Redirecting a Web link to a different address is a form of A) snooping. B) spoofing. C) sniffing. D) war driving.

B

35) Information ________ exists when one party in a transaction has more information that is important for the transaction than the other party. A) transparency B) asymmetry C) complexity D) discrimination

B

47) In the domain name "http://books.azimuth-interactive.com", which element is the second-level domain? A) books B) azimuth-interactive C) com D) none; there is no second-level domain in this name

B

47) Transaction brokers A) generate revenue from advertising or from directing buyers to sellers. B) save users money and time by processing online sales transactions. C) provide a digital environment where buyers and sellers can establish prices for products. D) sell physical products directly to consumers or individual businesses.

B

55) Web browser software requests Web pages from the Internet using which protocol? A) URL B) HTTP C) DNS D) HTML

B

61) Which of the following is the greatest threat that employees pose to an organization's information systems? A) forgetting passwords B) lack of knowledge C) entering faulty data D) introducing software errors

B

63) A mapping of a person's significant online, personal relationships is called a social A) Web. B) graph. C) community. D) map.

B

66) The measurement of the number of customers who stop using or purchasing products or services from a company is called A) switching costs. B) churn rate. C) CLTV. D) switch rate.

B

67) You are building an e-commerce Web site that will sell e-books and are looking for a hosted solution. Which of the following functionalities is least important for your business goals? A) site tracking system B) inventory management C) digital catalog D) customer database

B

69) The development and use of methods to make computer systems resume their activities more quickly after mishaps is called A) high availability computing. B) recovery oriented computing. C) fault tolerant computing. D) disaster recovery planning.

B

21) The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n) A) hub. B) switch. C) router. D) NIC.

B

24) How are the Internet and e-commerce causing severe disruption to the existing advertising business model? A) Ties between customer and businesses are being rethought. B) Technology players such as Yahoo! seek to dominate online advertising and expand into offline ad brokerage. C) New methods of advertising, such as blog advertising, are emerging. D) The market entry costs for online advertising services are extremely low.

B

27) Inputting data into a poorly programmed Web form in order to disrupt a company's systems and networks is called A) a Trojan horse. B) an SQL injection attack. C) key logging. D) a DDoS attack.

B

27) Which of the following is not one of the unique features of e-commerce technology? A) information density B) transparency C) richness D) social technology

B

29) A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a A) distribution channel. B) supply chain. C) value chain. D) marketing channel.

B

32) The effort required to locate a suitable product is called A) price discrimination. B) search costs. C) menu costs. D) shopping costs.

B

34) WSNs are designed for A) connecting multiple wireless computing devices. B) monitoring the physical environment. C) increasing the reach of Wi-Fi networks. D) tracking the movement of goods in a supply chain.

B

37) A network that spans a city, and sometimes its major suburbs as well, is called a A) CAN. B) MAN. C) LAN. D) WAN.

B

37) Which of the following is not one of the key challenges facing global supply chains? A) geographical distances B) increased costs C) time zones D) cultural differences

B

40) An example of phishing is A) setting up bogus Wi-Fi hot spots. B) setting up a fake medical Web site that asks users for confidential information. C) pretending to be a utility company's employee in order to garner information from that company about their security system. D) sending bulk e-mail that asks for financial aid under a false pretext.

B

40) Supply chain planning systems A) track the physical status of goods. B) identify the transportation mode to use for product delivery. C) track the financial information involving all parties. D) track the status of orders.

B

43) You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm? A) wireless network B) employees C) authentication procedures D) lack of data encryption

B

44) Consumers selling goods and services electronically to other consumers best describes A) disintermediation. B) C2C e-commerce. C) M-commerce. D) B2C e-commerce.

B

44) Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called A) sniffing. B) social engineering. C) phishing. D) pharming.

B

44) Which of the following is not one of the main challenges in implementing enterprise applications? A) high cost of software B) loss of ownership of data C) complex to install and configure D) dependence on third-party vendors

B

45) How do software vendors correct flaws in their software after it has been distributed? A) issue bug fixes B) issue patches C) re-release software D) issue updated versions

B

45) What service converts IP addresses into more recognizable alphanumeric names? A) HTML B) DNS C) IP D) HTTP

B

46) A build-to-order supply-chain model is also called a ________ model. A) supply-based B) demand-driven C) replenishment-driven D) push-based

B

47) Which of the following is not a potential "switching cost"? A) employee training B) upgrading software C) nw hardware D) nw documentation

B

48) Market creators A) save users money and time by processing online sales transactions. B) provide a digital environment where buyers and sellers can establish prices for products. C) create revenue by providing digital content over the Web. D) sell physical products directly to consumers or individual businesses.

B

49) A ________ is a method of interaction with a customer, such as telephone or customer service desk. A) point of presence B) touch point C) sales point D) client channel

B

49) IPv6 is being developed in order to A) update the packet transmission protocols for higher bandwidth. B) create more IP addresses. C) allow for different levels of service. D) support Internet2.

B

50) Electronic evidence on computer storage media that is not visible to the average user is called ________ data. A) defragmented B) ambient C) forensic D) fragmented

B

52) Which of the following best illustrates the affiliate revenue model? A) eBay receives a small fee from a seller if a seller is successful in selling an item. B) Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase. C) Flickr provides basic services for free, but charges a premium for advanced services. D) Apple accepts micropayments for single music track downloads.

B

55) ________ software deals with employee issues that are closely related to CRM, such as setting objectives, employee performance management, performance-based compensation, and employee training. A) Enterprise B) ERM C) PRM D) ERP

B

56) Exposing an individual to ads that are chosen and based on the recorded and analyzed online behavior of the individual is referred to as A) clickstream advertising. B) behavioral targeting. C) online profiling. D) long tail marketing.

B

56) Rigorous password systems A) are one of the most effective security tools. B) may hinder employee productivity. C) are costly to implement. D) are often disregarded by employees.

B

58) What technology allows people to have content pulled from Web sites and fed automatically to their computers? A) FTP B) RSS C) HTTP D) Bluetooth

B

58) Which of the following statements about B2B commerce is not true? A) Eighty percent of online B2B e-commerce is still based on EDI. B) B2B e-commerce represents approximately three-quarters of the overall B2B marketplace. C) B2B e-commerce only includes commercial transactions between firms. D) B2B e-commerce revenues in 2012 were over $4 trillion.

B

59) EDI is A) the use of Internet technologies for electronic data transactions. B) the exchange between two organizations of standard transactions through a network. C) electronic data invoicing. D) electronic delivery infrastructure.

B

60) Which of the following is an important capability for sales processes that is found in most major CRM software products? A) returns management B) lead management C) channel promotions management D) events management

B

61) Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance best describes ________ applications. A) operational CRM B) analytical CRM C) operational SCM D) analytical SFA

B

64) Analyzing customer buying patterns is an example of A) CLTV. B) analytical CRM. C) operational CRM. D) demand planning.

B

64) In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key? A) SSL B) symmetric key encryption C) public key encryption D) private key encryption

B

65) Goods that are involved in the actual production process are referred to as A) raw materials. B) direct goods. C) purchasing goods. D) indirect goods.

B

65) Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company? A) churn rate B) CLTV C) cost per lead D) cost per sale

B

66) Downtime refers to periods of time in which a A) computer system is malfunctioning. B) computer system is not operational. C) company or organization is not operational. D) computer is not online.

B

66) One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as A) touch points. B) hotspots. C) hot points. D) wireless hubs.

B

68) In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data. A) high availability computing B) deep-packet inspection C) application proxy filtering D) stateful inspection

B

69) Passive RFID tags A) have their own power source. B) have a range of several feet. C) enable data to be rewritten and modified. D) are used in automated toll-collection systems.

B

69) Which of the following is the least costly way to build a Web site? A) Outsource the Web site development to overseas vendors. B) Use a hosted solution and pre-built templates. C) Build your site yourself from scratch using existing software. D) Use a site-building package.

B

70) Based on your reading of the examples in the chapter, what would be the best use of RFID for a business? A) logging transactions B) managing the supply chain C) lowering network costs D) enabling client communication

B

23) Enterprise software is built around thousands of predefined business processes that reflect A) the firm's organization. B) industry goals. C) best practices. D) cutting edge workflow analyses.

C

37) Which of the following is not an example of a computer used as a target of crime? A) knowingly accessing a protected computer to commit fraud B) accessing a computer system without authority C) illegally accessing stored electronic communication D) threatening to cause damage to a protected computer

C

57) An authentication token is a(n) A) device the size of a credit card that contains access permission data. B) type of smart card. C) gadget that displays passcodes. D) electronic marker attached to a digital authorization file.

C

58) Selling a customer with a checking account a home improvement loan is an example of A) operational CRM. B) direct marketing. C) cross-selling. D) cross-channel promotions.

C

67) The 802.11 set of standards is known as A) WLAN. B) WSN. C) Wi-Fi. D) WiMax.

C

22) The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP B) TCP/IP, HTTP, and packet switching C) client/server computing, packet switching, and the development of communications standards for linking networks and computers D) client/server computing, packet switching, and HTTP

C

23) Which of the following is not one of the challenges in securing wireless networks? A) broadcasted SSIDs B) scannability of radio frequency bands C) SQL injection attacks D) geographic range of wireless signals

C

52) ________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage. A) Software B) Administrative C) Data security D) Implementation

C

52) ________ modules deal with issues such as setting objectives, employee performance management, and performance-based compensation. A) SCM B) SFA C) ERM D) PRM

C

53) Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n) A) security policy. B) AUP. C) risk assessment. D) business impact analysis.

C

57) Marketing modules in CRM systems would provide tools for A) assigning and managing customer service requests. B) capturing prospect and customer data. C) identifying profitable and unprofitable customers. D) managing sales prospect and contact information.

C

57) The most common Web server today, controlling 59 percent of the market, is A) Microsoft IIS. B) WebSTAR. C) Apache HTTP Server. D) Netscape Server.

C

58) Which of the following is not a trait used for identification in biometric systems? A) retinal image B) voice C) hair color D) face

C

60) The process of sourcing goods and materials, negotiating with suppliers, paying for goods, and making delivery arrangements is called A) e-procurement. B) SCM. C) procurement. D) sourcing.

C

62) 4G networks are also known as ________ networks. A) GSM B) CDMA C) LTD D) T-Mobile

C

62) Operational CRM applications include tools for A) identifying buying patterns. B) calculating CLTV. C) salesforce automation. D) pinpointing unprofitable customers.

C

63) Analytical CRM applications A) include tools for marketing automation. B) provide consolidated data for operational CRM applications. C) are based on data consolidated from operational CRM applications. D) provide customer-facing applications.

C

64) Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. A) four B) six C) eight D) ten

C

67) For 100% availability, online transaction processing requires A) high-capacity storage. B) a multi-tier server network. C) fault-tolerant computer systems. D) dedicated phone lines.

C

68) The WiMax standard can transmit up to a distance of approximately A) 30 meters. B) 500 meters. C) 30 miles. D) 5 miles.

C

68) Which of the following is not an example of next-generation enterprise applications? A) open-source solutions B) social CRM C) solutions incorporating SCM D) solutions incorporating SOA

C

70) Smaller firms may outsource some or many security functions to A) ISPs. B) MISs. C) MSSPs. D) CAs.

C

34) Why is overstocking warehouses not an effective solution for a problem of low availability? A) It does not speed product time to market. B) It is an inefficient use of raw materials. C) It increases sales costs. D) It increases inventory costs.

D

39) Compared to digital markets, traditional markets have A) lower search costs. B) stronger network effects. C) higher delayed gratification effects. D) higher transaction costs.

D

41) Evil twins are A) Trojan horses that appears to the user to be a legitimate commercial software application. B) e-mail messages that mimic the e-mail messages of a legitimate business. C) fraudulent Web sites that mimic a legitimate business's Web site. D) bogus wireless network access points that look legitimate to users.

D

43) Selling products and services directly to individual consumers via the Internet best describes A) B2B e-commerce. B) C2C e-commerce. C) M-commerce. D) B2C e-commerce.

D

59) The process of employing techniques to help a Web site achieve a higher ranking with the major search engines is called A) VPN. B) IAB. C) SEM. D) SEO.

D

21) From your reading of the chapter's opening case, NVIDIA implemented nw information systems in order to achieve which of the following business objectives? A) customer and supplier intimacy B) operational excellence C) survival D) improved decision making

D

22) Which of the following is not an example of the benefits enterprise systems provide to firms? A) Products are shipped to stores more quickly. B) When products are ordered, the manufacturing and logistics teams are notified immediately. C) There is more accurate sales information for managers to analyze. D) The cost of information systems falls, making the firm more productive.

D

22) ________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards. A) "Legacy systems" B) "SSID standards" C) "Vulnerabilities" D) "Controls"

D

24) The telephone system is an example of a ________ network. A) peer-to-peer B) wireless C) packet-switched D) circuit-switched

D

25) The quality of ubiquity, as it relates to e-commerce, is illustrated by A) the same set of standards being used across the globe. B) the spread of plentiful, cheap information. C) the enabling of commerce worldwide. D) the availability of the Internet everywhere and anytime.

D

29) The act of engaging consumers in a dialog that dynamically adjusts the experience to the individual describes which dimension of e-commerce technology? A) ubiquity B) personalization/customization C) richness D) interactivity

D

29) Which signal types are represented by a continuous waveform? A) laser B) optical C) digital D) analog

D

30) Components or parts of finished products are referred to as A) upstream materials. B) raw materials. C) secondary products. D) intermediate products.

D

32) A company's organizations and processes for distributing and delivering products to the final customers is the A) supplier's internal supply chain. B) external supply chain. C) upstream portion of the supply chain. D) downstream portion of the supply chain.

D

33) Uncertainties arise in any supply chain because of A) inaccurate or untimely information. B) poor integration between systems of suppliers, manufacturers, and distributors. C) inefficient or inaccurate MIS. D) unforeseeable events.

D

34) A keylogger is a type of A) worm. B) Trojan horse. C) virus. D) spyware.

D

34) Selling the same goods to different targeted groups at different prices is called A) cost customization. B) cost optimization. C) price gouging. D) price discrimination.

D

38) A network that covers entire geographical regions is most commonly referred to as a(n) A) local area network. B) intranet. C) peer-to-peer network. D) wide area network.

D

38) Supply chain software can be classified as either supply chain ________ systems or supply chain ________ systems. A) push; pull B) demand; continual C) upstream; downstream D) planning; execution

D

38) Which of the following is not an example of a computer used as an instrument of crime? A) theft of trade secrets B) intentionally attempting to intercept electronic communication C) unauthorized copying of software D) breaching the confidentiality of protected computerized data

D

42) Supply chain ________ systems manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner. A) demand B) delivery C) planning D) execution

D

46) The HIPAA Act A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules.

D

46) Which of the following Internet business models does Amazon.com use? A) content provider B) portal C) market creator D) e-tailer

D

48) The business value of an effective supply chain management system includes all of the following except A) faster time to market. B) cost reduction. C) supply matched to demand. D) increased inventory levels.

D

48) Which organization helps define the overall structure of the Internet? A) none (no one "owns" the Internet) B) W3C C) ICANN D) IAB

D

49) The most common type of electronic evidence is A) voice-mail. B) spreadsheets. C) instant messages. D) e-mail.

D

50) Which of the following best illustrates the sales revenue model? A) eBay receives a small fee from a seller if a seller is successful in selling an item. B) Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase. C) Flickr provides basic services for free, but charges a premium for advanced services. D) Apple accepts micropayments for single music track downloads.

D

50) Which of the following services enables logging on to one computer system and working on another? A) FTP B) World Wide Web C) nwsgroups D) telnet

D

51) ________ modules use many of the same data, tools, and systems as CRM to enhance collaboration between a company and its selling partners. A) SCM B) SFA C) ERM D) PRM

D

52) Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact to be read.

D

53) ________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience. A) Wireless networks B) Intranets C) Virtual private networks D) Unified communications

D

54) SFA modules in CRM systems would provide tools for A) assigning and managing customer service requests. B) capturing prospect and customer data. C) identifying profitable and unprofitable customers. D) managing sales prospect and contact information.

D

55) Netflix's public announcement of a reward for a technology solution to its movie recommendation system is an example of A) prediction markets. B) behavioral targeting. C) long-tail marketing. D) crowdsourcing.

D

55) Which of the following is not one of the main firewall screening techniques? A) application proxy filtering B) static packet filtering C) NAT D) secure socket filtering

D

57) Which of the following was the leading online advertising format in 2012? A) display ads B) e-mail C) classifieds D) search engine

D

60) Which of the following statements is not true about search engines? A) They are arguably the Internet's "killer app." B) They have solved the problem of how users instantly find information on the Internet. C) They are monetized almost exclusively by search engine marketing. D) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

D

61) An extranet that links a large firm to its suppliers and other key business partners is called a(n) A) e-hub. B) marketspace. C) exchange. D) private industrial network.

D

61) Which of the following is the first generation of cellular systems suitable for watching videos? A) 2G B) 2.5G C) 3G D) 4G

D

62) Currently, the protocols used for secure information transfer over the Internet are A) TCP/IP and SSL. B) S-HTTP and CA. C) HTTP and TCP/IP. D) SSL, TLS, and S-HTTP.

D

63) Most antivirus software is effective against A) only those viruses active on the Internet and through e-mail. B) any virus. C) any virus except those in wireless communications applications. D) only those viruses already known when the software is written.

D

63) The most appropriate wireless networking standard for creating PANs is A) I-mode. B) IEEE 802.11b. C) Wi-Fi. D) Bluetooth.

D

66) Which of the following statements about m-commerce is not true? A) In 2012, m-commerce represented less than 10 percent of all e-commerce. B) M-commerce is the fastest growing form of e-commerce. C) M-commerce annual revenues are approximately $30 billion. D) In 2012, the top-grossing category of m-commerce was e-book sales.

D

67) Which of the following statements about enterprise applications is not true? A) Enterprise applications require organizational learning. B) Enterprise applications introduce "switching costs." C) Enterprise applications are based on organization-wide definitions of data. D) Enterprise applications are best implemented when few changes in business processes are required.

D

68) You are planning the requirements for a site tracking and reporting system for your company Web site. Which of the following information requirements would not be essential for this function? A) number of unique visitors B) pages visited C) products purchased D) secure credit card clearing

D

70) The bullwhip effect is countered by A) globalization. B) disintermediation. C) implementing an SCM. D) reducing information uncertainty.

D

12) In a pull-based model of SCM systems, production master schedules are based on forecasts of demand for products.

FALSE

13) The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes.

FALSE

6) Safety stock acts as an inexpensive buffer for the lack of flexibility in the supply chain.

FALSE

1) A drive-by download is a technique used by hackers to enable accessing files on a wireless network.

FALSE

1) E-commerce refers to the use of any networking technologies to transact business.

FALSE

10) Amazon's recommender system is an example of the network notification feature of social e-commerce.

FALSE

10) DoS attacks are used to destroy information and access restricted areas of a company's information system.

FALSE

10) Over 80% of U.S. Internet users access the Internet via mobile devices.

FALSE

11) In a push-based model of SCM systems, actual customer orders or purchases trigger events in the supply chain.

FALSE

11) In a walkthrough, hackers are able to bypass security controls of a system with little opposition.

FALSE

11) Podcasting allows subscribers to listen to live, streaming radio and other audio content.

FALSE

12) Intellectual property refers to all forms of human expression, both tangible and intangible.

FALSE

13) An acceptable use policy defines the acceptable level of access to information assets for different users.

FALSE

13) Dell Inc. is an example of a push-based model.

FALSE

14) Behavioral targeting occurs at two levels: individual Web sites and through ISPs.

FALSE

15) All CRM packages contain modules for PRM and ERM.

FALSE

15) Packet filtering catches most types of network attacks.

FALSE

17) Exchanges have become one of the most popular types of Net marketplace because they encourage competitive bidding that drives prices down.

FALSE

18) TCP/IP was developed in the 1960s to enable university scientists to locate other computers on the Internet.

FALSE

19) High-availability computing is also referred to as fault tolerance.

FALSE

2) Consumer e-commerce is still growing at approximately 25% annually.

FALSE

20) Because of outsourcing and increased automation, the costs of system maintenance and content creation have fallen and typically make up less than a quarter of Web site budgets.

FALSE

20) RFID technology is being gradually replaced by less costly technologies such as WSNs.

FALSE

3) An NOS must reside on a dedicated server computer in order to manage a network.

FALSE

3) Enterprise systems are strictly internally oriented; other types of enterprise applications must be used for communicating with customers and suppliers.

FALSE

4) A hub is a networking device that connects network components and is used to filter and forward data to specified destinations on the network.

FALSE

4) Eighty-five percent of online retailers now have m-commerce Web sites.

FALSE

4) The upstream portion of the supply chain consists of the organizations and processes for distributing and delivering products to the final customers.

FALSE

6) A computer network consists of at least three computers.

FALSE

6) Disintermediation provides major benefits to the distributor.

FALSE

7) Central large mainframe computing has largely replaced client/server computing.

FALSE

8) Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching.

FALSE

8) Supply chain execution systems enable the firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product.

FALSE

9) An example of the content provider business model is Barnesandnoble.com, a retailer of printed books.

FALSE

12) Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

TRUE

13) Ninety-six percent of all U.S. households with Internet access use a broadband connection.

TRUE

18) CRM software can help organizations identify high-value customers for preferential treatments.

TRUE

18) Public key encryption uses two keys.

TRUE

19) In general, the cost of hardware, software, and telecommunications for building and operating a Web site has fallen by over 50 percent since 2000.

TRUE

19) Mobile search makes up 20% of all Internet searches.

TRUE

6) Viruses can be spread through e-mail.

TRUE

1) Firms can use social networking sites to improve their efficiency in customer service.

TRUE

1) Telephone networks are fundamentally different from computer networks.

TRUE

10) Inefficiencies in a supply chain are primarily caused by inaccurate information.

TRUE

11) Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.

TRUE

12) Fiber-optic cable is more expensive and harder to install than wire media.

TRUE

14) Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

TRUE

14) The Domain Name System (DNS) converts IP addresses to domain names.

TRUE

14) Total supply chain costs represent the majority of operating expenses for many businesses and in some industries approach 75 percent of the total operating budget.

TRUE

15) VoIP technology delivers video information in digital form using packet switching.

TRUE

16) Major CRM application software vendors include Oracle and SAP.

TRUE

16) NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

TRUE

16) Net marketplaces may either support contractual purchasing based on long-term relationships with designated suppliers or short-term spot purchasing.

TRUE

16) Web 3.0 is an effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information.

TRUE

17) Cross-selling is the marketing of complementary products to customers.

TRUE

17) In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.

TRUE

17) SSL is a protocol used to establish a secure connection between two computers.

TRUE

18) Automobile manufacturing is an example of a vertical market.

TRUE

19) Analytical CRM uses tools to analyze customer data collected from the firm's customer touch points and from other sources.

TRUE

2) Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.

TRUE

2) PRM provides a firm and its distributors trade information and distributes leads about customers.

TRUE

2) Wikis allow visitors to change or add to the original posted material.

TRUE

20) Enterprise systems require fundamental changes in the way the business operates.

TRUE

20) Unauthorized access is a security challenge that is most likely to occur in a network at the point of client computers.

TRUE

3) The Internet shrinks information asymmetry.

TRUE

3) Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.

TRUE

4) Mobile devices are not targeted as extensively by malware as traditional computers.

TRUE

5) A Trojan horse is a software program that appears to be benign but then does something other than expected.

TRUE

5) All previous mass media in modern history, including the printing press, use a broadcast model where content is created in a central location by experts.

TRUE

5) In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.

TRUE

5) Supply chain inefficiencies can waste as much as 25 percent of a company's operating costs.

TRUE

7) Computer worms spread much more rapidly than computer viruses.

TRUE

7) In general, for digital goods, the marginal cost of producing another unit is about zero.

TRUE

7) The bullwhip effect is the distortion of information about the demand for a product as it passes from one entity to the next across the supply chain.

TRUE

8) One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

TRUE

8) Telecommunications hardware and software is typically the least costly portion of a Web site budget.

TRUE

9) In the pre-Internet environment, supply chain coordination was hampered by the difficulties of making information flow smoothly among different internal supply chain processes.

TRUE

9) Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.

TRUE

9) Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.

TRUE

24) Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that A) are usually bound up in legacy systems that are difficult to access and difficult to correct in case of error. B) are not secure because the technology to secure them did not exist at the time the files were created. C) have the potential to be accessed by large numbers of people and by groups outside of the organization. D) are frequently available on the Internet.

c

15) EDI standards that take advantage of network communications have yet to be fully implemented at the industry level

false

24) Which of the following is not true about enterprise systems? A) Enterprise systems help firms respond rapidly to customer requests for information or products. B) Enterprise system data have standardized definitions and formats that are accepted by the entire organization. C) Enterprise software is expressly built to allow companies to mimic their unique business practices. D) Enterprise software includes analytical tools to evaluate overall organizational performance.

C

25) Which of the following is not a characteristic of packet switching? A) Packets travel independently of each other. B) Packets are routed through many different paths. C) Packet switching requires point-to-point circuits. D) Packets include data for checking transmission errors.

C

26) Which of the following is not a recent development in e-commerce? A) Mobile e-commerce takes off. B) Social networking sites become a new platform for e-commerce. C) The music recording industry is disrupted as music creation and distribution become decentralized. D) Online entertainment business models surge.

C

27) In order to achieve maximum benefit from an enterprise software package, a business A) customizes the software to match all of its business processes. B) uses only the processes in the software that match its own processes. C) changes the way it works to match the software's business processes. D) selects only the software that best matches its existing business processes.

C

28) Supply chain complexity and scale increases when firms A) move to globalization. B) manage the procurement, manufacturing, and distribution functions themselves. C) produce products and services that coordinate with hundreds or more firms and suppliers. D) modify their existing workflows to comply with supply-chain management systems.

C

28) What are the four layers of the TCP/IP reference model? A) physical, application, transport, and network interface B) physical, application, Internet, and network interface C) application, transport, Internet, and network interface D) application, hardware, Internet, and network interface

C

28) Which feature of Internet technology has had the most effect in the Internet's rapid spread across the globe? A) ubiquity B) global reach C) universal standards D) social technology

C

29) Which of the following statements about the Internet security is not true? A) The use of P2P networks can expose a corporate computer to outsiders. B) A corporate network without access to the Internet is more secure than one provides access. C) VoIP is more secure than the switched voice network. D) Instant messaging can provide hackers access to an otherwise secure network.

C

30) The integration of video, audio, and text marketing messages into a single marketing message and consumer experience describes which dimension of e-commerce technology? A) ubiquity B) personalization/customization C) richness D) interactivity

C

31) A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the A) supplier's internal supply chain. B) external supply chain. C) upstream portion of the supply chain. D) downstream portion of the supply chain.

C

33) Information density refers to the A) richness—complexity and content—of a message. B) total amount and quantity of information delivered to consumers by merchants. C) total amount and quantity of information available to all market participants. D) amount of information available to reduce price transparency.

C

33) Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents? A) MAN B) Domain-based LAN C) Peer-to-peer network D) WAN

C

35) Hackers create a botnet by A) infecting Web search bots with malware. B) using Web search bots to infect other computers. C) causing other people's computers to become "zombie" PCs following a master computer. D) infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door.

C

36) Varying a product's price according to the supply situation of the seller is called ________ pricing. A) menu B) flexible C) dynamic D) asymmetric

C

38) Digital goods are goods that are A) produced digitally. B) sold over digital networks. C) delivered digitally. D) used with digital equipment.

C

39) Systems that enable a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product best describes supply chain ________ systems. A) demand B) delivery C) planning D) execution

C

40) Bandwidth is the A) number of frequencies that can be broadcast through a medium. B) number of cycles per second that can be sent through a medium. C) difference between the highest and lowest frequencies that can be accommodated on a single channel. D) total number of bytes that can be sent through a medium per second.

C

41) Which supply chain planning function determines how much product is needed to satisfy all customer demands? A) distribution management B) replenishment planning C) demand planning D) order planning

C

43) T1 lines A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are high-speed, leased data lines providing guaranteed service levels. D) have up to twenty-four 64-Kbps channels.

C

45) Which of the following businesses utilizes the content provider Internet business model? A) Amazon.com B) eBay.com C) CNN.com D) Motocross.com

C

48) The Sarbanes-Oxley Act A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules.

C

50) Which of the following would not be considered a contact point? A) e-mail B) Web site C) Intranet D) retail store

C


संबंधित स्टडी सेट्स

Erikson, Piaget, and Freud's Stages of Development

View Set

Artificial Intelligence (AI)(ch. 15)

View Set

Drugs and Society Chapter 7 Test Review

View Set

Participation and Voting (Chapter 7)

View Set