Quiz 1, quiz 3, quiz 5-version 1, quiz 5- version 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

________ refers to manually adding metadata to media or other content. Select one: a. Tagging b. Netcasting c. Podcasting d. Crowdsourcing e. Phishing

Tagging

Which function is associated with the Domain Name System (DNS)? Select one: a. It provides a list of available domains and allows companies and individuals to buy and register a domain name, such as www.nike.com (when available). b. All of these c. It queries the system for the IP address of the server where the domain is hosted when a user types a domain name into the browser, such as www.nike.com d. The DNS is the organization deciding and maintaining which top level domains are allowed (such as .com, .net, .cn, .de, .edu), who can issue them, and who administers and maintains them

. It queries the system for the IP address of the server where the domain is hosted when a user types a domain name into the browser, such as www.nike.com

Which one of the following best describes "packet switching" vs. "circuit switching"? Select one: a. With packet switching you get a dedicated connection to the receiver on the other side with a fixed path and a constant bandwidth. b. All of the these. c. With packet switching you don't get a dedicated connection to the receiver on the other side and messages get chopped into small pieces and sent across the internet through unpredictable paths and across multiple networks. d. Packet switching is a thing of the past, for the Internet today circuit switching is used, otherwise video conferencing, such as Skype, would never work and be way more expensive.

. With packet switching you don't get a dedicated connection to the receiver on the other side and messages get chopped into small pieces and sent across the internet through unpredictable paths and across multiple networks.

Bandwidth is measured in ________. Select one: a. joules per second b. bits per second c. relays per second d. parts per million e. moles per second

. bits per second

A recent trend in display advertising has been ________ advertising, where the ads placed on a page are in some way related to the content of that page. Select one: a. viral b. affiliate c. contextual d. stealth e. buzz

. contextual

________ use(s) information systems to enhance a person's perception of reality by providing relevant information about the user's surroundings with the use of special glasses or other devices. Select one: a. HoloLens b. 3-D glasses c. Virtual reality d. Teleport e. Augmented reality

Augmented reality

Which of the following is an example of a basic relationship between an outsourcing vendor and client? Select one: a. BelAir sets its system preferences according to STS products. b. STS Systems usually offers BelAir a discount on every purchase it makes. c. STS modifies its product prices according to BelAir's requirements. d. BelAir buys a system from the vendor who offers the cheapest prices. e. STS has a direct stake in the success of BelAir's performance.

BelAir buys a system from the vendor who offers the cheapest prices

TransCorp is an IT firm that is looking to outsource its payroll processes. Which of the following statements, if true, would most strengthen the decision to outsource? Select one: a. Firms across the globe are adopting cloud computing systems. b. Companies in other countries are more efficient in all aspects of work and are also cost effective. c. The firm is enjoying good profit margins. d. Outsourcing has become a trend among most firms in developed nations. e. Companies in other countries can do the same amount of work at a comparable cost.

Companies in other countries are more efficient in all aspects of work and are also cost effective.

________ is the securing of business financing from individuals in the marketplace. Select one: a. Crowdfunding b. Capitalizing c. Self sourcing d. Internet funding e. eLoans

Crowdfunding

________ refers to the use of a computer to communicate obscene, vulgar, or threatening content that causes a reasonable person to endure distress. Select one: a. Viral marketing b. Hacktivism c. Cyberharassment d. Spam filtering e. Bot herding

Cyberharassment

________ can be achieved by rolling up a data cube to the smallest level of aggregation needed, reducing the dimensionality, or dividing continuous measures into discrete intervals. Select one: a. Inferencing b. Data reduction c. Data cleansing d. Clustering e. Normalization

Data reduction

________ help in analyzing why a key indicator is not at an appropriate level or why an exception occurred. Select one: a. Key-indicator reports b. Exception reports c. Activity reports d. Drill-down reports e. Scheduled reports

Drill-down reports

Which of the following is a valid observation about encryption? Select one: a. Encryption is performed only after messages enter the network. b. Encryption is used for data enhancement rather than data protection. c. Encrypted messages cannot be deciphered without the decoding key. d. Encryption implementation is expensive and needs authentication from a relevant authority. e. The encryption approach is not dependent on the type of data transmission.

Encrypted messages cannot be deciphered without the decoding key.

________ is a LAN protocol using packet switching developed by the Xerox Corporation in 1976. Select one: a. Ethernet b. Flash memory c. Primary key d. JavaScript e. Compiler

Ethernet

Which of the following types of ports is used to connect networks in standard local area networks? Select one: a. USB port b. Ethernet port c. VGA port d. serial port e. parallel port

Ethernet port

________ is an XML-based specification for publishing financial information. Select one: a. Enterprise Mashup Markup Language b. Extensible Access Control Markup Language c. Extensible Rights Markup Language d. Extensible Business Reporting Language e. Extensible Application Markup Language

Extensible Business Reporting Language

________ allow(s) designers of Web documents to create their own customized tags, enabling the definition, transmission, validation, and interpretation of data between applications and between organizations. Select one: a. Active Server Pages b. Perl c. MySQL d. Extensible Markup Language e. Unified Modeling Language

Extensible Markup Language

The Game, Inc. company is offering a new game that can expand exponentially to new users. The company is offering the very basic game for free allowing the user to upgrade to several levels of a paid subscription model. Choose the selection below that best exemplifies this revenue model. Select one: a. Subscriptions b. Affiliate marketing c. Freemium d. Channel marketing e. Licensing

Freemium

Which of the following statements is an example of a business case argument based on fear? Select one: a. This system has the potential to reduce required effort by 40 percent. b. The new system is user-friendly and can be implemented almost immediately. c. If we do not implement this system, our competitors could gain a significant advantage over us. d. The system can help us meet both individual as well as organizational goals. e. Using this system will help our employees serve customers more efficiently

If we do not implement this system, our competitors could gain a significant advantage over us.

The convergence of information technology and operations technology, offering the potential for tremendous improvements in efficiency, product quality, agility, and flexibility, allowing companies to mass-produce customized products and better monitor supply chains, refers to which term below? Select one: a. Applications in the Cloud b. Internet of Things c. The Technology of Things d. The Technology Effect e. Industrial Internet of Things

Industrial Internet of Things

Which of the following statements is true about a data mart? Select one: a. It standardizes the format of data retrieved from different systems. b. It is a compilation of data from the database that is organized and produced in printed format. c. It stores master data only. d. It helps to eliminate data duplication. e. It contains selected data from a data warehouse.

It contains selected data from a data warehouse.

Which of the following statements is true about an explicit knowledge asset? Select one: a. It reflects knowledge that can be documented, archived, and codified, often with the help of information systems. b. It reflects the processes and procedures that are located in a person's mind on how to effectively perform a particular task. c. It reflects an individual's special knowledge about a new-to-the-world product. d. It reflects a person's ability to effectively solve a problem without external help. e. It reflects the strategies that can be applied to an enterprise resource planning system

It reflects knowledge that can be documented, archived, and codified, often with the help of information systems.

Which of the following statements is true about an online analytical processing server? Select one: a. It groups related records together on the basis of having similar values for attributes. b. It is a data structure allowing for multiple dimensions to be added to a traditional two-dimensional table. c. It allows you to make hypothetical changes to the data associated with a problem and observe how these changes influence the results. d. It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice. e. It understands how data are organized in a database and has special functions for analyzing the data.

It understands how data are organized in a database and has special functions for analyzing the data.

Which of the following best describes the primary key? Select one: a. It's the password that needs to be entered to open the database b. It's the encryption key that gets exchanged first with another party c. It's a field that uniquely identifies the record d. It's the first item that is entered into the database on a screen

It's a field that uniquely identifies the record

How does the Internet overcome the geographic distances of the oceans? Select one: a. Light signals are sent through fiber-optic cables rolled out from boats lying on the ocean floor b. Electrical signals are sent through copper cables rolled out from boats lying on the ocean floor c. To cross the ocean you can only use a satellite connection d. WIFI is the technology used that bridges even ocean distances

Light signals are sent through fiber-optic cables rolled out from boats lying on the ocean floor

________ languages use common modules which combine properties and behaviors to define the relevant system components. Select one: a. Structured query b. Synchronous c. Object-oriented d. Markup e. Metaprogramming

Object-oriented

Inventory management is an application that is part of the ________ functional area. Select one: a. Accounting b. Operations c. Financial d. Human Resources e. Marketing

Operations

________ software is written by third-party vendors to support standardized and repetitive tasks. Select one: a. Custom b. Packaged c. Process-based d. Practices-based e. Unpacked

Packaged

________ is the use of standardized performance tests to facilitate comparison between systems. Select one: a. Alpha testing b. Beta testing c. Data modeling d. Systems benchmarking e. Systems prototyping

Systems benchmarking

________ are alternative measures of outcomes that help clarify the impact a change will have on the firm. Select one: a. Prototypes b. Proxy variables c. Protocols d. Pseudocodes e. Constants

Proxy variables

________ is the first component of an operational customer relationship management system that supports a broad range of business processes, such as tracking and managing customer history and preferences, account and contact management, and order processing and tracking. Select one: a. Data warehousing b. Execution management c. Enterprise marketing management d. Customer service and support e. Sales force automation

Sales force automation

A company has a five-member team in charge of development and maintenance of its information systems. An information system is in place, and the team performs routine maintenance to keep it running smoothly. Which of the following scenarios is an example of adaptive maintenance? Select one: a. Jason notices a faulty component in the system and modifies the component. b. Kiera detects a fault in the coding, which is hampering system performance, and rectifies it. c. Justin works on the system to make the user interface more user-friendly. d. Dylan predicts that the company's old system may fail under new demands, and takes steps to avert it. e. Sara knows that the company is migrating to a new operating environment next month, and makes the appropriate changes to the system

Sara knows that the company is migrating to a new operating environment next month, and makes the appropriate changes to the system

Which type of innovation is best described as supporting and enhancing the value of an offering? Select one: a. Structure innovation b. Brand innovation c. Service innovation d. Channel innovation e. Process innovation

Service innovation

________ is the creation of a categorization system by users. Select one: a. Webcasting b. Crowdsourcing c. Social cataloging d. Podcasting e. Social blogging

Social cataloging

________ refers to the use of key performance indicators to monitor performance of the entire supply chain, including sourcing, planning, production, and distribution. Select one: a. Supply chain optimization b. Supply chain visibility c. Supply chain analytics d. Supply chain strategy e. Supply chain integration

Supply chain analytics

________ is the extent to which a company's supply chain is focusing on maximizing customer service with lesser focus on procurement, production, and transportation costs. Select one: a. Supply chain efficiency b. Supply network collaboration c. Supply chain effectiveness d. Supply chain visibility e. Supply chain analytics

Supply chain effectiveness

A company needs a new information system to manage increasing customer orders and changing demands. The company's five-member information system (IS) team is competent and capable of developing a new system, but decides against developing a system in-house. Which of the following, if true, would most weaken the company's decision? Select one: a. The company's preferred vendor is willing to provide a basic information system at a reduced rate. b. The costs of outsourcing systems development are greater than those of adapting an off-the-shelf system. c. The company's requirements for the new system are very specialized. d. The company's IS team is short-staffed, and is finding it difficult to cope with increased work. e. The company's IS department has the qualifications to develop the new system.

The company's requirements for the new system are very specialized.

Which of the following statements is true about user agents? Select one: a. They are agents that automatically perform a task for a user. b. They are agents that search to find the best price for a particular product a user wishes to purchase. c. They are agents that continuously analyze large data warehouses to detect changes deemed important by a user. d. They are also known as Web spiders. e. They are agents designed by spammers and other Internet attackers to farm e-mail addresses off Web sites or deposit spyware on machines

They are agents that automatically perform a task for a user.

Which of the following is NOT one of Porter's five primary forces? Select one: a. Substitute products from another industry b. Rivalry among competing sellers in an industry c. Bargaining power of suppliers in an industry d. Threat of potential new entrants in an industry e. Threat of flooding the industry with excellent products

Threat of flooding the industry with excellent products

Which of the following portrays the improved integration benefit of a customer relationship management (CRM) system? Select one: a. Integrated information removes information handoffs, speeding both sales and support processes. b. Information from the CRM can be integrated with other systems to streamline business processes and gain business intelligence as well as make other cross-functional systems more efficient and effective. c. Tracking customer behavior over time helps to identify future opportunities for product and service offerings. d. Improved record keeping and efficient methods of capturing customer complaints help to identify and solve problems faster. e. Integrate all information for all points of contact with the customers-marketing, sales, and service-so that all who interact with customers have the same view and understanding of current issues.

Tracking customer behavior over time helps to identify future opportunities for product and service offerings.

One main protocol used to transfer data on the Internet is called the ________. Select one: a. Address Resolution Protocol (ARP) b. Transmission Control Protocol (TCP) c. Trivial File Transfer Protocol (TFTP) d. TOC protocol e. Dynamic Host Configuration Protocol (DHCP)

Transmission Control Protocol (TCP)

Some people see ________ as the "contextual Web," where the immense amounts of content available to users will be filtered by contextual factors such as time, location, social activities, and so on. Select one: a. Web 2.0 b. Web 1.0 c. Web 3.0 d. Web 5.0 e. Web 4.0

Web 3.0

Which of the following is a reason for the development of the semantic Web? Select one: a. Users are skeptical while making purchases online due to the fear of getting cheated. b. Web pages were designed to be understood by people, but not by computers. c. Users are able to use any device in any network for any service. d. Users provide a lot of unnecessary personal information on social networking sites. e. Widgets cannot be integrated into Web pages.

Web pages were designed to be understood by people, but not by computers.

________ is the distribution of digital media, such as audio or video files, via syndication feeds for on-demand playback on digital media players. Select one: a. Webcasting b. Blogging c. Phishing d. Narrowcasting e. Crowdsourcing

Webcasting

The ________ is a system of interlinked documents on the Internet, or a graphical user interface to the Internet that provides users with a simple, consistent interface to access a wide variety of information. Select one: a. point to point protocol b. Media Access Control Address c. parameter random access memory d. private branch exchange e. World Wide Web

World Wide Web

Which of the following defines marginal cost? Select one: a. It is the cost of producing an additional unit of output. b. It is the cost of an alternative that must be forgone in order to pursue a certain action. c. It is the cost incurred in making an economic exchange. d. It is the cost that has already been incurred and cannot be recovered. e. It is the cost that is independent of the level of goods or services produced by the business.

a. It is the cost of producing an additional unit of output.

Identify the policy that lists procedures for adding new users to systems and removing users who have left the organization. Select one: a. information policy b. use policy c. account management policy d. incident handling procedures e. disaster recovery plan

account management policy

How do comparison shopping sites generate revenue? Select one: a. by increasing the click count on their sites b. by charging a commission on transactions c. by charging distribution fees to consumers d. by charging a virtual shelf space fee to manufacturers e. by selling their products in physical stores as well

by charging a commission on transactions

Bookseller Barnes & Noble is an example of a ________ company. Select one: a. brick-and-mortar b. flip-only c. click-only d. click-and-flip e. click-and-mortar

click-and-mortar

Data centers managed by a third party that rents out space to multiple organizational customers are known as ________. Select one: a. datahub stations b. multi-bay stations c. collocation facilities d. data ease facilities e. serial port facilities

collocation facilities

The ".com" suffix in a Uniform Resource Locator is reserved for ________. Select one: a. non-profit organizations b. educational organizations c. government entities d. network organizations e. commercial organizations

commercial organizations

A ________ is a small text file passed to a Web browser on a user's computer by a Web server. Select one: a. cookie b. virus c. honeypot d. botnet e. worm

cookie

In the order-to-cash process, checking credit is followed by ________. Select one: a. creating an order b. collecting payment c. allocating stock d. preparing and sending the invoice e. picking, packing, and shipping

creating an order

With respect to the types of information systems used in organizations, sales force automation is an example of a(n) ________ system. Select one: a. customer relationship management b. supply chain management c. electronic commerce d. data mining and visualization e. geographic information

customer relationship management

Fyroff consultants, a leading software consulting firm in the United States, decides to launch an Enterprise Resource Planning (ERP) solution. The company chooses the brand name Fyroff Enterprise for the new solution. However, when the company attempts to register the domain name, it finds that a small unknown firm is already registered under the same domain name. The small firm is now attempting to sell the domain name to Fyroff. Which of the following terms refers to this practice of buying a domain name only to sell it for big bucks? Select one: a. cyberstalking b. cyberbullying c. logic bombing d. cybersquatting e. bot herding

cybersquatting

Which of the following is an example of an IPv4 address? Select one: a. 01-23-45-67-89-ab b. 1.415.338.6083 c. 351756051523999 d. 130.212.149.27

d. 130.212.149.27

Outsourcing has seen a huge increase because of the ________. Select one: a. decrease in the cost of raw materials b. decrease in telecommunication costs c. increase in the use of cloud computing d. increase in decentralization e. increase in advertising costs

decrease in telecommunication costs

An internally focused system helps an organization coordinate with its ________. Select one: a. departments b. customers c. business partners d. producers e. suppliers

departments

Which of the following is a geoeconomic challenge of operating in the digital world? Select one: a. differences in network infrastructures b. differences in the concept of time and life focus c. differences in languages d. differences in export and import regulations e. differences in measurement units

differences in network infrastructures

The technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution is known as ________ management. Select one: a. digital analytics b. digital rights c. digital marketing d. digital signature e. digital radiography

digital rights

The extent to which goals are accomplished faster, at lower cost, or with relatively little time and effort is called ________. Select one: a. goal setting b. efficiency c. accomplishment d. effectiveness e. effort

efficiency

The purpose of a(n) ________ is to support and integrate all facets of the business, including planning, manufacturing, sales, marketing, and so on. Select one: a. intelligent system b. enterprise resource planning system c. electronic commerce system d. functional area information system e. management information system

enterprise resource planning system

A(n) ________ is an integrated suite of business applications for virtually every department, process, and industry, allowing companies to integrate information across operations on a company-wide basis using one large database. Select one: a. enterprise system b. legacy system c. decision support system d. management information system e. distributed software system

enterprise system

Which of the following object-oriented programming concepts is reflected by a word processor that reacts to a user's typing and clicking? Select one: a. inheritance b. class c. event-driven program execution d. encapsulation e. delegation

event-driven program execution

A(n) ________ system coordinates business processes with customers, suppliers, and business partners of an organization. Select one: a. intermediary b. externally focused c. internally focused d. stand-alone e. legacy

externally focused

Which of the following key elements of supply chain execution includes information related to payment schedules, consignment, and ownership of products and materials? Select one: a. material flow b. financial flow c. information flow d. product flow e. personnel flow

financial flow

Production scheduling ________. Select one: a. focuses on the coordination of all activities needed to create the product or service b. leads to the development of a sourcing plan c. focuses on delivering products or services to consumers as well as warehousing d. leads to the development of inventory estimates e. provides immediate communication and feedback to and from customers

focuses on the coordination of all activities needed to create the product or service

The individuals who are knowledgeable enough to gain access to computer systems without authorization are referred to as ________. Select one: a. hackers b. worms c. bots d. power users e. online predators

hackers

Computer criminals who attempt to break into systems or deface Web sites to promote political or ideological goals are called ________. Select one: a. hacktivists b. online predators c. internet activists d. crackers e. social promoters

hacktivists

A break-even analysis ________. Select one: a. analyzes the relevant cash flow streams associated with the system at the organization's discount rate b. identifies the point where tangible benefits equal tangible costs c. is the rate of return used by an organization to compute the present value of future cash flows d. refers to the discounted sum, or present value, of a stream of costs associated with a project or proposal e. attempts to summarize the overall value of money for a project or proposal

identifies the point where tangible benefits equal tangible costs

Which of the following methods uses high-frequency light waves to transmit signals on an unobstructed path between nodes? Select one: a. microwave systems b. Bluetooth c. high-frequency radios d. wireless LAN e. infrared line of sight

infrared line of sight

Which of the following facilitate(s) real-time written conversations? Select one: a. tagging b. status updates c. blogging d. discussion forums e. instant messaging

instant messaging

A system that communicates across organizational boundaries is also referred to as a(n) ________ system. Select one: a. internally focused b. interorganizational c. stand-alone d. intraorganizational e. legacy

int"e"rorganizational

In the procure-to-pay process, the negotiation of price and terms is followed by ________. Select one: a. settling the payment b. creating the customer record c. receiving the goods d. issuing the purchase order e. receiving the invoice

issuing the purchase order

A metric deemed most critical to accessing progress toward a certain goal is referred to as a(an) ________. Select one: a. critical performance indicator b. key performance indicator c. critical performance initiative d. critical factor e. performance metric

key performance indicator

Inventory and safety stock planning ________. Select one: a. leads to the development of the overall demand forecast b. leads to the development of a sourcing plan c. focuses on delivering products or services to consumers as well as warehousing d. leads to the development of a transportation schedule e. focuses on the coordination of all activities needed to create a product or service

leads to the development of a sourcing plan

Which of the following actions is a part of operational planning? Select one: a. focusing on balancing performance across the organization b. effectively utilizing and deploying organizational resources to achieve strategic objectives c. making day-to-day decisions that are highly structured and recurring d. dealing with complex problems with broad and long-term ramifications for the organization e. focusing on long-term strategic questions facing the organization

making day-to-day decisions that are highly structured and recurring

In ________ pricing, companies set the prices that consumers pay for products. Select one: a. top-up b. menu-driven c. rafter bid d. viral e. reverse

menu-driven

With respect to the types of information systems used in organizations, a word processor is an example of a(n) ________ system. Select one: a. electronic commerce b. office automation c. geographic information d. supply chain management e. data mining and virtualization

office automation

Components to simplify, standardize, and automate business processes related to inbound and outbound logistics, product development, manufacturing, and sales and service are called ________ management. Select one: a. personal b. financial c. operations d. human resource e. organizing

operations

Assembly processes are ________ activities. Select one: a. outbound logistics b. administrative and marketing c. customer sales d. marketing and sale e. operations and manufacturing

operations and manufacturing

Which of the following best explains the process of moving business processes or tasks to another company? Select one: a. liquidating b. offshoring c. cloud computing d. outsourcing e. downsizing

outsourcing

Under the ________ pricing model, the firm running the advertisement pays only when a Web surfer actually clicks on the advertisement. Select one: a. click-per-visit b. pay-per-refresh c. pay-per-click d. pay-per-sale e. pay-per-conversion

pay-per-click

Business analytics augments business intelligence by using ________ modeling to help identify trends or predict business outcomes. Select one: a. threat b. decision c. predictive d. refinement e. multivariate

predictive

Identify the factors that help in building models of customer demand in an analytical customer relationship management (CRM) system. Select one: a. account and contact management b. price, quality, and satisfaction analysis of competitors c. sales forecasting and performance analyses d. order processing and tracking e. customer history and preferences management

price, quality, and satisfaction analysis of competitors

The cloud computing model has several unique and essential characteristics that distinguish cloud computing from an in-house infrastructure. One of these characteristics is ________. Select one: a. external network capability b. packaged networking c. narrow network access d. rapid elasticity e. cloud engineered data

rapid elasticity

A(n) ________ is a compilation of data from a database that is organized and produced in printed format. Select one: a. form b. report c. entity d. attribute e. field

report

A ________ is a document that an organization uses to tell vendors what its requirements are and to invite them to provide information about how they might be able to meet those requirements. Select one: a. request for proposal b. vendor request c. requirements specification d. request letter e. demand letter

request for proposal

Which of the following types of information systems facilitates collaboration and knowledge sharing? Select one: a. electronic commerce system b. visualization system c. word processor d. social software e. intelligent system

social software

Identify a characteristic of the Web that influences a Web site's security and performance. Select one: a. functional convenience b. representational delight c. disintermediation capacity d. structural firmness e. cost compliance

structural firmness

With respect to the online consumer's hierarchy of needs, identify the most critical characteristic of a Web site. Select one: a. functional convenience b. representational delight c. structural firmness d. descriptive link text e. cross-platform compatibility

structural firmness

Lee's department store uses the every day low prices strategy. This strategy hinges upon the store's ability to obtain consumer goods at the cheapest possible price and passes these savings on to consumers. Lee's store also developed its own distribution network for supplying its retail outlets with consumer goods. This distribution network allowed them to cut out external suppliers and middlemen thereby driving down business costs further. This implies that the competitive strategy used by this store would most likely focus on ________. Select one: a. supply chain sustainability b. supply chain effectiveness c. supply chain efficiency d. supply chain logistics e. supply chain visibility

supply chain efficiency

The key use of the manufacturing execution module of supply chain management is to ________. Select one: a. forecast and plan anticipated demand for products b. assign optimal safety stock and target stock levels in all inventories in the supply network c. support production processes, taking into account capacity and material constraints d. support receiving, storing, and picking of goods in a warehouse e. ensure that the materials required for production are available where needed and when needed

support production processes, taking into account capacity and material constraints

Which of the following is the most accurate definition of a computer crime? Select one: a. the act of using a computer to commit an illegal act b. the act of using someone's computer to check e-mail c. the act of stealing a computer and related hardware d. the act of using someone's computer to browse the Internet e. the act of providing personal information to Web sites when shopping

the act of using a computer to commit an illegal act

La Belle Inc. introduced a new line of accessories for teenage girls last season. Following its immense popularity with the targeted group, the company anticipated high sales in the current season and ordered raw materials accordingly. However, the success of the new line turned out to be a fad as the teens soon turned to other products offered by competing brands and La Belle's sales declined. This forecasting error caused a huge discrepancy in the amount of raw materials they needed and the amount of inventory they had already piled up in anticipation of good sales. This is an example of ________. Select one: a. the multiplier effect b. hindsight bias c. safety stock planning d. product recall e. the bullwhip effect

the bullwhip effect

Identify the purpose of an office automation system. Select one: a. to provide access to databases in order to support quantitative decision making b. to create, store, analyze, and manage spatial data c. to enable customers to buy goods and services from a firm's Web site d. to support a wide range of predefined day-to-day activities of individuals and small groups e. to support interaction between the firm and its customers

to support a wide range of predefined day-to-day activities of individuals and small groups

With respect to computer networking, ________ refers to the physical pathway (cable(s) and wireless) used to carry network information. Select one: a. traceroute b. transmission control protocol c. transmission media d. random-access memory e. multiplatform

transmission media

The features and modules that an enterprise system comes with out of the box are referred to as the ________ version. Select one: a. vanilla b. best-practices c. customized d. modified e. reengineered

vanilla

In the context of business-to-business marketplaces, the term ________ refer to the markets that comprise of firms operating within a certain industry sector. Select one: a. market paradigms b. market segmentations c. vertical markets d. share markets e. horizontal markets

vertical markets

Which of the following general classes of computers designed for medical, engineering, or animation and graphics design uses is optimized for visualization and rendering of three-dimensional models, and typically have fast processors, large memory, and advanced video cards? Select one: a. personal computers b. workstations c. supercomputers d. servers e. mainframes

workstations


Set pelajaran terkait

Botany- Root, specialized stems, flower, fruit, and inflorescences

View Set

Questions sur la solitude et la depression

View Set