Management 3300 Final Exam - Mizzou

Ace your homework & exams now with Quizwiz!

Effective and efficient SCM systems. Decrease or Increase? 1. _____ the power of its buyers 2. _____ its own supplier power 3. _____ switching costs to reduce the threat of substitute products or services 4. Create entry barriers thereby _____ the threat of new entrants 5. _____ efficiencies while seeking a competitive advantage through cost leadership

1. Decrease 2. Increase 3. Increase 4. Decrease 5. Increase

The bullwhip effect can be reduced if: 1. Suppliers have real-time access to up-to-date retail sales data 2. Suppliers are provided with warehouse management software 3. Suppliers are provided with global trade management software 4. Suppliers occasionally receive faxed purchase orders from the retailer

1. Suppliers have real-time access to up-to-date retail sales data

Porter's Five Forces

1. Threat of New Entrants 2. Threat of Substitute Products 3. Supplier Power 4. Buyer Power 5. Rivalry among existing customers

What is the formula that an organization can use to find its most valuable customers? 1. RFM-reporting, features, monetary value. 2. RFM-reporting, frequency, market share. 3. RFM-recency, frequency, monetary value. 4. RFM-recency, features, market share.

3. RFM - Recency, Frequency, Monetary Value

War Room

A large area in which team members on the same project work closely together, surrounded by whiteboards, large digital displays, and other tools to facilitate impromptu meetings and smooth collaborations

IMAP (internet mail access protocol)

A protocol for handling incoming email

The three aspects of Information Security that we discussed in class are: A. Confidentiality, Integrity, Availability. B. Security, Integrity, Availability. C. Confidentiality, Integration, Access. D. Confidence, Integrity, Access.

A. Confidentiality, Integrity, Availability

An integrated application suite to support a whole establishment that includes modules to manage financials, human resources, supply chain, customer relationships, and other business processes is called ____. A. enterprise resource planning B. total quality management C. business process automation D. business process management

A. Enterprise Resource Planning

_____ involves the automatic tagging of unusual events in financial transactions and is used to spot mistakes and fraudulent activities. A. Exception reporting B. Compliance reporting C. Human capital management D. Electronic data interchange

A. Exception Reporting

Which of the following collaborative technologies has the greatest amount of media richness as well as interactivity? A. Face to face conversations B. Shared workspaces C. Social Networking D. Text Messaging

A. Face to face conversations

How is metadata related to information? A. It helps clarify the nature of the information. B. It helps gather unstructured information. C. It organizes unstructured information to form structured information. D. It removes redundant data from unstructured information.

A. It helps clarify the nature of the information

Which of the following is true of a byte? A. It holds eight zeros and ones and represents a single character B. It holds twelve bits and represents a nibble C. It is the equivalent of two key presses for text D. It is the equivalent of a short, text-only email message

A. It holds eight zeros and ones and represents a single character

The ____ feature introduced by instant messaging shows whether a person is logged in and available to answer a question, pick up the phone, or stop by for a brief meeting. A. presence awareness B. telepresence C. media richness D. telecommute

A. Presence Awareness

What are the three ways to authenticate someone? (select three answers from the list below) A. Something they know B. Something they are C. Someplace they have been D. Something they have E. Something they aren't

A. Something they know, B. something they are, D. something they have

Which of the following is an element of privacy? A. The right to be left alone B. The right to view, correct, and edit private, protected information C. The right to withhold taxes D. The right to demand information

A. The right to be left alone

_____ is a cost-cutting approach to servers in which multiple operating systems run concurrently on a single physical PC server. A. Virtualization B. Software licensing C. Distributed computing D. DGrid computing

A. Virtualization

BusinessUSA.com allows small-scale producers to post information about their products on the site and prospective buyers compare the prices and features of the competing products before purchasing them. Which of the following types of e-marketplaces does BusinessUSA.com represent? A. business to consumer (B2C) B. business to business (B2B) C. consumer to consumer (C2C) D. consumer to business (C2B)

A. business to consumer (B2C)

Structured information can be defined as data _____. A. that can be organized into hierarchies B. that cannot be linked together C. about data that clarifies the nature of the information D. that is difficult to break down

A. that can be organized into hierarchies

SQL links tables together by ____. A. using primary keys and foreign keys B. using data stored in cloud computers C. assigning incremental numbers to records D. assigning XML tags to the tables

A. using primary keys and foreign keys

Cracked German Enigma Codes. Proposed separating a computer's hardware from it's software

Allen Turning

Distributed denial of service (DDoS)

An attack in which computers in a botnet are directed to flood a single website server with rapid-fire page requests, causing it to slow down or crash

Phishing

An attempt to steal passwords or other sensitive information by persuading the victim, often in an email, to enter the information into a fraudulent website that masquerades as the authentic version

_____ is a technology placed on tags that consist of small chips equipped with a microprocessor, a tiny antenna to receive and transmit data, and sometimes a battery that stores information on the tagged object's history. A. GPS B. RFID C. GPRS D. CDMA

B. RFID

_____ are the costs that customers incur when they change suppliers. A. Network costs B. Switching costs C. Overhead costs D. Opportunity costs

B. Switching Costs

According to Tom Jerzak, "Care over distance" describes? A. Telepresence B. Telemedicine C. Presence Awareness D. Health Information Systems

B. Telemedicine

Which of the following transmission media is most commonly used in ordinary telephones? A. Legacy Software B. Twisted Pair Wires C. Optical Fiber D. Ribbon Cables

B. Twisted Pair Wires

According to Tom Jerzak, Telework is becoming ____ for business. A. a have to have B. ubiquitous C. unnecessary D. social

B. Ubiquitous

The unique global address for a web page or other resource on the Internet is called the ____. A. extensible resource identifier B. uniform resource locator C. solution deployment descriptor D. internationalized resource identifier

B. Uniform Resource Locator (URL)

A foreign key is ____. A. an attribute that is present in only one table B. a primary key which appears as an attribute in a different table C. a unique value or attribute that determines a primary key D. a field, or a group of fields, that makes each record unique in a table

B. a primary key which appears as an attribute in a different table

____ results from rational behavior by companies within the existing structure of supply chains

Bullwhip Effect

What is an example of a consumer to consumer e-marketplace? A. An airline gives a traveler best travel and ticket offers in response to the traveler's post on the airline's website that she wants to fly from New York to San Francisco. B. An author who writes book reviews, posts links to books on Amazon.com on her website, and receives revenues from successful sales to her blog subscribers. C. A person posts information about furniture he wishes to sell on eBay and sells it to another individual who views that eBay page. D. A business owner calculates the tax he has to pay to the IRS through an interactive tool on its website and makes the payment via wire transfer from the same site.

C. A person posts information about furniture he wishes to sell on eBay and sells it to another individual who views that eBay page

How can a company avoid the trap of competing only on price? A. by keeping the price at a level higher than the competitors B. by following a pricing strategy inconsistent with the market equilibrium C. by differentiating the products or services that it offers D. by selling at a price much lower than the competition

C. By differentiating the products and services that is has to offer

The term ____ refers to configured computers with specific vulnerabilities so they can attract different varieties of malware in the wild, study their properties, and find out who started them. A. expert systems B. web crawlers C. honeypots D. server farms

C. Honeypots

Which of the following is a transmission protocol which specifies that the resource is a web page containing code the web browser can interpret and display? A. File Transfer Protocol B. File Exchange Protocol C. Hypertext Transfer Protocol D. Simple Text Transfer Protocol

C. Hypertext Transfer Protocol

What is a function of unified communications? A. enabling a company to communicate with all its customers at the same time B. collecting and storing data from multiple users and building a database C. integrating multiple applications and communications channels into a single interface D. maintaining a record of individual changes made on shared documents through version

C. Integrating multiple applications and communications channels into a single interface

Which of the following best describes support activities? A. Refers to activities directly related to the process by which products and services are created, marketed, sold, and delivered B. It refers to activities that help the transformation of raw materials to finished products C. It refers to processes including administration and management, human resources, procurement, and technology assistance D. Refers to activities that comprise multiple tasks and are performed by one person or department

C. It refers to processes including administration and management, human resources, procurement, and technology assistance

Which of the following is true of information privacy? A. It is most easily achieved online and is impossible to maintain on paper. B. It is governed by laws that are universal in all countries. C. It refers to the protection of data about individuals. D. It emphasizes the importance of sharing data over protecting personally identifiable information

C. It refers to the protection of data about individuals

A network which connects computers, printers, scanners, and other devices in a single building or home is called a ____. A. wide area network B. personal area network C. local area network D. global area network

C. Local Area Network (LAN)

Which of the following is a function of normalization? A. Assigning primary keys B. Assigning incremental numbers to records C. Minimizing duplication of information D. Decreasing the function dependency of data

C. Minimizing duplication of information

Software that is freely distributed, along with the code underlying the program, so that people can access the code to improve it is known as ____. A. legacy software B. proprietary software C. open source software D. firmware

C. Open Source Software

Which of the following is an accurate description of "Moore's Law"? A. The cost of microprocessor chips is halved about every eighteen months B. The amount of data that can be transmitted over an optical fiber cable doubles about every nine months C. The number of transistors fitting on a chip doubles about every four years D. The cost of a semiconductor fabrication plant doubles about every four years

C. The number of transistors fitting on a chip doubles about every four years

Which of the following has raised questions regarding the ethical implications of companies collecting and analyzing enormous amounts of customer data? A. use of commercial off-the-shelf software B. use of cloud computing C. use of target advertising D. use of open source software

C. Use of target advertising

____ is a job title given to the most senior executive in an enterprise responsible for the information technology and computer systems that support enterprise goals. Is also concerned with effectiveness IS metrics

Chief Information Officer (CIO)

____ is an executive level position in a company or other entity whose occupation is focused on scientific and technological issues within an organization. Is concerned with efficiency IS metrics

Chief Technology Officer (CTO)

___ is a metric used to assess the impact of an online ad

Click-through rate

___ is a small text file left on a website visitor's hard drive that is used to personalize the site for the visitor, or track web activities

Cookie

Registering, trafficking in, or using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else

Cybersquatting

The Sales ____ is a term often used to describe how long it takes a customer to move from lead to proposal to sale

Cycle

What is Cloud Computing replacing? A. Corporate data centers B. Expensive personal computer hardware C. Expensive software upgrades D. All of the above

D. All of the above

An electronic bridge between partner companies in a supply chain that is used to transmit real-time information about orders, inventories, invoices, and other data is called ___. A. electronic market B. financial network C. expense and cost recovery system D. electronic data interchange

D. Electronic Data Interchange

What is the main drawback of using unstructured information? A. It hinders creativity. B. It is expensive to maintain. C. It cannot be used to store numerical information. D. It makes retrieving information very difficult.

D. It makes retrieving information very difficult

The first step in the successful management of a next-generation supply chain is ____. A. sourcing B. delivering C. making D. planning

D. Planning

This is the part that may SCM insiders refer to as logistics, where companies coordinate the receipt of orders from customers, develop a network of warehouses, pick carriers to get products to customers and set up an invoicing system to receive payments

Deliver

_____ involves the automatic tagging of unusual events in financial transactions and is used to spot mistakes and fraudulent activities

Exception Reports

___ has the greatest amount of media richness as well as interactivitity

Face-to-face Conversations

Websites for colleges and universities might take this approach

Facilitate offline relationships

The monetary gains produced by an organization's expenditures on salaries, benefits, bonuses, and other costs for employee talent is called ____

Human Capital Return on Investment

Online magazines, newspapers, and video sites usually adopt this goal

Inform or entertain audience

Also known as "chat," consists of real-time text based interactions over a network

Instant Messaging

STMP server

Mail server using the simple mail transfer protocol; handles outgoing email

Supply Chain managers schedule the activities necessary for production, testing, packaging and preparation for delivery. This is the most metric-intensive portion of the supply chain-one where companies are able to measure quality levels, production output, and worker productivity

Make

Malware

Malicious software designed to attack computer systems

Leading authority on competitive strategy and the competitiveness and economic development of nations, states, and regions

Michael Porter

Like social media, dislike email, like to text, don't have landlines, have security concerns, take selfies

Millennials

How much a customer spends on each purchase

Monetary Value

Set of standards that supports communication between mobile devices when they are near to eachother

NFC

Four components of an Information System

People, Technology, Data, Processes

Said: "Efficiency is doing things right; effectiveness is doing the right things".

Peter Drucker

A set of metrics to monitor the supply chain so that it is efficient, costs less, and delivers high quality and value to customers

Plan

Feature introduced by instant messaging shows whether a person is logged in and available to answer a question, pick up the phone, or stop by for a brief meeting

Presence Awareness

Developed the Relational Database model

Edgar F. Codd

How recently a customer purchased items

Recency

Said to be inventor of the world wide web

Tim Berners Lee

Works at CERN, developed HTTP and HTML protocols/languages

Tim Berners Lee

The last string in a domain name; examples include .com, .edu

Top-Level Domain

File format used to exchange contact management data electronically

vCard

The ____ code defines how keyboard characters are encoded into digital strings of ones and zeros. A. T.61 B. ASCII C. ANSEL D. MARC-8

B. ASCII

What is the difference between asynchronous and synchronous communication? A. Asynchronous is real-time communication. Synchronous is one-way technology. B. Asynchronous is communication that does not occur at the same time. Synchronous communication occurs at the same time. C. Asynchronous communication includes instant messaging. Synchronous communication includes email. D. Asynchronous communication is fast and instant. Synchronous communication is collected at a single point in time.

B. Asynchronous is communication that does not occur at the same time. Synchronous communication occurs at the same time

Alice wants to send a secret message to Bob without Eve being able to know what the message is. So Alice encrypts the message with ____. Bob can then decrypt the message with ____. A. Bob's Private Key, Alice's Public Key B. Bob's Public Key, Bob's Private Key C. Alice's Private Key, Bob's Public Key D. Alice's Public Key, Bob's Private Key

B. Bob's Public Key, Bob's Private Key

The "big bang" approach for implementing ERP involves ____. A. implementing software-as-a-service (SaaS) or on-demand software products B. going live with all the core modules in the engineered suite at the same time C. matching ERP modules to company needs D. using best-of-breed suites for enhancing ERPs through mergers

B. Going live with all the core modules in the engineered suite at the same time

Which of the following technologies is better equipped than relational databases to handle big data? A. MySQL B. Hadoop C. ETL D. SQL Server

B. Hadoop

A responsive and flexible network for receiving defective and excess products back from their customers and supporting customers who have problems with delivered products

Return

Primary goal of organizations whose websites facilitate e-commerce transactions. Example: Amazon

Sell products or services

Intended sales income that was not and cannot be realized is ____

Shrinkage

What are examples of Operational or Transactional Human Capital Management?

Sick Leave Vacation Performance Evaluations Pay Benefits Training Certifications

In general, folks in this generation prefer to meet face-to-face or communicate by formal written communications

Silent Generation

SCM's Develop a set of pricing, delivery and payment process with suppliers and create metrics for monitoring and improving the relationships

Source

Possibly the most fractured group of software applications on the planet

Supply Chain Management software

The impression created when remote participants in an interactive video meeting are almost life-sized and images are vividly clear is known as ___

Telepresence

The percentage of workers who left an organization and were replaced during a time period is called employee _____

Turnover

What are examples of Analytical in Human Capital Management?

Turnover Turnover Costs Costs per Hire ROI

Mircroblogging website with the largest number of users in the world

Twitter

Registering a replica site with a misspelling in the trademark name that users might easily mistake for the real thing and displaying negative information about the actual company on the replica site is called ____

Typosquatting

Unique global address for a web page or other resource on the Internet

URL

Integrates multiple applications and communications channels into a single interface

Unified Communications

The ease with which a person can accomplish a goal using a website

Usability

Refers to how easily people with disabilities can access and use web resources

Web Accessibility

Said to be inventor(s) of public-private key encryption

Whitefield Diffie and Martin Hellman

Publicly accessible website that allows users to add and edit interlinked web pages and make contributions from their own personal experience to update existing articles with current information

Wikipedia

A blogging tool

Wordpress


Related study sets

Management of Human Services- Exam 2

View Set

indicativo vs subjuntivo en español

View Set

Chapter 5 Essentials of Cell Biology

View Set

Evidence Act - 3.6 Tendency Coincidence

View Set

Chapter 6 Group Life Insurance Exam

View Set

Normal Tissue Radiation Responses

View Set