Management 3300 Final Exam - Mizzou
Effective and efficient SCM systems. Decrease or Increase? 1. _____ the power of its buyers 2. _____ its own supplier power 3. _____ switching costs to reduce the threat of substitute products or services 4. Create entry barriers thereby _____ the threat of new entrants 5. _____ efficiencies while seeking a competitive advantage through cost leadership
1. Decrease 2. Increase 3. Increase 4. Decrease 5. Increase
The bullwhip effect can be reduced if: 1. Suppliers have real-time access to up-to-date retail sales data 2. Suppliers are provided with warehouse management software 3. Suppliers are provided with global trade management software 4. Suppliers occasionally receive faxed purchase orders from the retailer
1. Suppliers have real-time access to up-to-date retail sales data
Porter's Five Forces
1. Threat of New Entrants 2. Threat of Substitute Products 3. Supplier Power 4. Buyer Power 5. Rivalry among existing customers
What is the formula that an organization can use to find its most valuable customers? 1. RFM-reporting, features, monetary value. 2. RFM-reporting, frequency, market share. 3. RFM-recency, frequency, monetary value. 4. RFM-recency, features, market share.
3. RFM - Recency, Frequency, Monetary Value
War Room
A large area in which team members on the same project work closely together, surrounded by whiteboards, large digital displays, and other tools to facilitate impromptu meetings and smooth collaborations
IMAP (internet mail access protocol)
A protocol for handling incoming email
The three aspects of Information Security that we discussed in class are: A. Confidentiality, Integrity, Availability. B. Security, Integrity, Availability. C. Confidentiality, Integration, Access. D. Confidence, Integrity, Access.
A. Confidentiality, Integrity, Availability
An integrated application suite to support a whole establishment that includes modules to manage financials, human resources, supply chain, customer relationships, and other business processes is called ____. A. enterprise resource planning B. total quality management C. business process automation D. business process management
A. Enterprise Resource Planning
_____ involves the automatic tagging of unusual events in financial transactions and is used to spot mistakes and fraudulent activities. A. Exception reporting B. Compliance reporting C. Human capital management D. Electronic data interchange
A. Exception Reporting
Which of the following collaborative technologies has the greatest amount of media richness as well as interactivity? A. Face to face conversations B. Shared workspaces C. Social Networking D. Text Messaging
A. Face to face conversations
How is metadata related to information? A. It helps clarify the nature of the information. B. It helps gather unstructured information. C. It organizes unstructured information to form structured information. D. It removes redundant data from unstructured information.
A. It helps clarify the nature of the information
Which of the following is true of a byte? A. It holds eight zeros and ones and represents a single character B. It holds twelve bits and represents a nibble C. It is the equivalent of two key presses for text D. It is the equivalent of a short, text-only email message
A. It holds eight zeros and ones and represents a single character
The ____ feature introduced by instant messaging shows whether a person is logged in and available to answer a question, pick up the phone, or stop by for a brief meeting. A. presence awareness B. telepresence C. media richness D. telecommute
A. Presence Awareness
What are the three ways to authenticate someone? (select three answers from the list below) A. Something they know B. Something they are C. Someplace they have been D. Something they have E. Something they aren't
A. Something they know, B. something they are, D. something they have
Which of the following is an element of privacy? A. The right to be left alone B. The right to view, correct, and edit private, protected information C. The right to withhold taxes D. The right to demand information
A. The right to be left alone
_____ is a cost-cutting approach to servers in which multiple operating systems run concurrently on a single physical PC server. A. Virtualization B. Software licensing C. Distributed computing D. DGrid computing
A. Virtualization
BusinessUSA.com allows small-scale producers to post information about their products on the site and prospective buyers compare the prices and features of the competing products before purchasing them. Which of the following types of e-marketplaces does BusinessUSA.com represent? A. business to consumer (B2C) B. business to business (B2B) C. consumer to consumer (C2C) D. consumer to business (C2B)
A. business to consumer (B2C)
Structured information can be defined as data _____. A. that can be organized into hierarchies B. that cannot be linked together C. about data that clarifies the nature of the information D. that is difficult to break down
A. that can be organized into hierarchies
SQL links tables together by ____. A. using primary keys and foreign keys B. using data stored in cloud computers C. assigning incremental numbers to records D. assigning XML tags to the tables
A. using primary keys and foreign keys
Cracked German Enigma Codes. Proposed separating a computer's hardware from it's software
Allen Turning
Distributed denial of service (DDoS)
An attack in which computers in a botnet are directed to flood a single website server with rapid-fire page requests, causing it to slow down or crash
Phishing
An attempt to steal passwords or other sensitive information by persuading the victim, often in an email, to enter the information into a fraudulent website that masquerades as the authentic version
_____ is a technology placed on tags that consist of small chips equipped with a microprocessor, a tiny antenna to receive and transmit data, and sometimes a battery that stores information on the tagged object's history. A. GPS B. RFID C. GPRS D. CDMA
B. RFID
_____ are the costs that customers incur when they change suppliers. A. Network costs B. Switching costs C. Overhead costs D. Opportunity costs
B. Switching Costs
According to Tom Jerzak, "Care over distance" describes? A. Telepresence B. Telemedicine C. Presence Awareness D. Health Information Systems
B. Telemedicine
Which of the following transmission media is most commonly used in ordinary telephones? A. Legacy Software B. Twisted Pair Wires C. Optical Fiber D. Ribbon Cables
B. Twisted Pair Wires
According to Tom Jerzak, Telework is becoming ____ for business. A. a have to have B. ubiquitous C. unnecessary D. social
B. Ubiquitous
The unique global address for a web page or other resource on the Internet is called the ____. A. extensible resource identifier B. uniform resource locator C. solution deployment descriptor D. internationalized resource identifier
B. Uniform Resource Locator (URL)
A foreign key is ____. A. an attribute that is present in only one table B. a primary key which appears as an attribute in a different table C. a unique value or attribute that determines a primary key D. a field, or a group of fields, that makes each record unique in a table
B. a primary key which appears as an attribute in a different table
____ results from rational behavior by companies within the existing structure of supply chains
Bullwhip Effect
What is an example of a consumer to consumer e-marketplace? A. An airline gives a traveler best travel and ticket offers in response to the traveler's post on the airline's website that she wants to fly from New York to San Francisco. B. An author who writes book reviews, posts links to books on Amazon.com on her website, and receives revenues from successful sales to her blog subscribers. C. A person posts information about furniture he wishes to sell on eBay and sells it to another individual who views that eBay page. D. A business owner calculates the tax he has to pay to the IRS through an interactive tool on its website and makes the payment via wire transfer from the same site.
C. A person posts information about furniture he wishes to sell on eBay and sells it to another individual who views that eBay page
How can a company avoid the trap of competing only on price? A. by keeping the price at a level higher than the competitors B. by following a pricing strategy inconsistent with the market equilibrium C. by differentiating the products or services that it offers D. by selling at a price much lower than the competition
C. By differentiating the products and services that is has to offer
The term ____ refers to configured computers with specific vulnerabilities so they can attract different varieties of malware in the wild, study their properties, and find out who started them. A. expert systems B. web crawlers C. honeypots D. server farms
C. Honeypots
Which of the following is a transmission protocol which specifies that the resource is a web page containing code the web browser can interpret and display? A. File Transfer Protocol B. File Exchange Protocol C. Hypertext Transfer Protocol D. Simple Text Transfer Protocol
C. Hypertext Transfer Protocol
What is a function of unified communications? A. enabling a company to communicate with all its customers at the same time B. collecting and storing data from multiple users and building a database C. integrating multiple applications and communications channels into a single interface D. maintaining a record of individual changes made on shared documents through version
C. Integrating multiple applications and communications channels into a single interface
Which of the following best describes support activities? A. Refers to activities directly related to the process by which products and services are created, marketed, sold, and delivered B. It refers to activities that help the transformation of raw materials to finished products C. It refers to processes including administration and management, human resources, procurement, and technology assistance D. Refers to activities that comprise multiple tasks and are performed by one person or department
C. It refers to processes including administration and management, human resources, procurement, and technology assistance
Which of the following is true of information privacy? A. It is most easily achieved online and is impossible to maintain on paper. B. It is governed by laws that are universal in all countries. C. It refers to the protection of data about individuals. D. It emphasizes the importance of sharing data over protecting personally identifiable information
C. It refers to the protection of data about individuals
A network which connects computers, printers, scanners, and other devices in a single building or home is called a ____. A. wide area network B. personal area network C. local area network D. global area network
C. Local Area Network (LAN)
Which of the following is a function of normalization? A. Assigning primary keys B. Assigning incremental numbers to records C. Minimizing duplication of information D. Decreasing the function dependency of data
C. Minimizing duplication of information
Software that is freely distributed, along with the code underlying the program, so that people can access the code to improve it is known as ____. A. legacy software B. proprietary software C. open source software D. firmware
C. Open Source Software
Which of the following is an accurate description of "Moore's Law"? A. The cost of microprocessor chips is halved about every eighteen months B. The amount of data that can be transmitted over an optical fiber cable doubles about every nine months C. The number of transistors fitting on a chip doubles about every four years D. The cost of a semiconductor fabrication plant doubles about every four years
C. The number of transistors fitting on a chip doubles about every four years
Which of the following has raised questions regarding the ethical implications of companies collecting and analyzing enormous amounts of customer data? A. use of commercial off-the-shelf software B. use of cloud computing C. use of target advertising D. use of open source software
C. Use of target advertising
____ is a job title given to the most senior executive in an enterprise responsible for the information technology and computer systems that support enterprise goals. Is also concerned with effectiveness IS metrics
Chief Information Officer (CIO)
____ is an executive level position in a company or other entity whose occupation is focused on scientific and technological issues within an organization. Is concerned with efficiency IS metrics
Chief Technology Officer (CTO)
___ is a metric used to assess the impact of an online ad
Click-through rate
___ is a small text file left on a website visitor's hard drive that is used to personalize the site for the visitor, or track web activities
Cookie
Registering, trafficking in, or using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else
Cybersquatting
The Sales ____ is a term often used to describe how long it takes a customer to move from lead to proposal to sale
Cycle
What is Cloud Computing replacing? A. Corporate data centers B. Expensive personal computer hardware C. Expensive software upgrades D. All of the above
D. All of the above
An electronic bridge between partner companies in a supply chain that is used to transmit real-time information about orders, inventories, invoices, and other data is called ___. A. electronic market B. financial network C. expense and cost recovery system D. electronic data interchange
D. Electronic Data Interchange
What is the main drawback of using unstructured information? A. It hinders creativity. B. It is expensive to maintain. C. It cannot be used to store numerical information. D. It makes retrieving information very difficult.
D. It makes retrieving information very difficult
The first step in the successful management of a next-generation supply chain is ____. A. sourcing B. delivering C. making D. planning
D. Planning
This is the part that may SCM insiders refer to as logistics, where companies coordinate the receipt of orders from customers, develop a network of warehouses, pick carriers to get products to customers and set up an invoicing system to receive payments
Deliver
_____ involves the automatic tagging of unusual events in financial transactions and is used to spot mistakes and fraudulent activities
Exception Reports
___ has the greatest amount of media richness as well as interactivitity
Face-to-face Conversations
Websites for colleges and universities might take this approach
Facilitate offline relationships
The monetary gains produced by an organization's expenditures on salaries, benefits, bonuses, and other costs for employee talent is called ____
Human Capital Return on Investment
Online magazines, newspapers, and video sites usually adopt this goal
Inform or entertain audience
Also known as "chat," consists of real-time text based interactions over a network
Instant Messaging
STMP server
Mail server using the simple mail transfer protocol; handles outgoing email
Supply Chain managers schedule the activities necessary for production, testing, packaging and preparation for delivery. This is the most metric-intensive portion of the supply chain-one where companies are able to measure quality levels, production output, and worker productivity
Make
Malware
Malicious software designed to attack computer systems
Leading authority on competitive strategy and the competitiveness and economic development of nations, states, and regions
Michael Porter
Like social media, dislike email, like to text, don't have landlines, have security concerns, take selfies
Millennials
How much a customer spends on each purchase
Monetary Value
Set of standards that supports communication between mobile devices when they are near to eachother
NFC
Four components of an Information System
People, Technology, Data, Processes
Said: "Efficiency is doing things right; effectiveness is doing the right things".
Peter Drucker
A set of metrics to monitor the supply chain so that it is efficient, costs less, and delivers high quality and value to customers
Plan
Feature introduced by instant messaging shows whether a person is logged in and available to answer a question, pick up the phone, or stop by for a brief meeting
Presence Awareness
Developed the Relational Database model
Edgar F. Codd
How recently a customer purchased items
Recency
Said to be inventor of the world wide web
Tim Berners Lee
Works at CERN, developed HTTP and HTML protocols/languages
Tim Berners Lee
The last string in a domain name; examples include .com, .edu
Top-Level Domain
File format used to exchange contact management data electronically
vCard
The ____ code defines how keyboard characters are encoded into digital strings of ones and zeros. A. T.61 B. ASCII C. ANSEL D. MARC-8
B. ASCII
What is the difference between asynchronous and synchronous communication? A. Asynchronous is real-time communication. Synchronous is one-way technology. B. Asynchronous is communication that does not occur at the same time. Synchronous communication occurs at the same time. C. Asynchronous communication includes instant messaging. Synchronous communication includes email. D. Asynchronous communication is fast and instant. Synchronous communication is collected at a single point in time.
B. Asynchronous is communication that does not occur at the same time. Synchronous communication occurs at the same time
Alice wants to send a secret message to Bob without Eve being able to know what the message is. So Alice encrypts the message with ____. Bob can then decrypt the message with ____. A. Bob's Private Key, Alice's Public Key B. Bob's Public Key, Bob's Private Key C. Alice's Private Key, Bob's Public Key D. Alice's Public Key, Bob's Private Key
B. Bob's Public Key, Bob's Private Key
The "big bang" approach for implementing ERP involves ____. A. implementing software-as-a-service (SaaS) or on-demand software products B. going live with all the core modules in the engineered suite at the same time C. matching ERP modules to company needs D. using best-of-breed suites for enhancing ERPs through mergers
B. Going live with all the core modules in the engineered suite at the same time
Which of the following technologies is better equipped than relational databases to handle big data? A. MySQL B. Hadoop C. ETL D. SQL Server
B. Hadoop
A responsive and flexible network for receiving defective and excess products back from their customers and supporting customers who have problems with delivered products
Return
Primary goal of organizations whose websites facilitate e-commerce transactions. Example: Amazon
Sell products or services
Intended sales income that was not and cannot be realized is ____
Shrinkage
What are examples of Operational or Transactional Human Capital Management?
Sick Leave Vacation Performance Evaluations Pay Benefits Training Certifications
In general, folks in this generation prefer to meet face-to-face or communicate by formal written communications
Silent Generation
SCM's Develop a set of pricing, delivery and payment process with suppliers and create metrics for monitoring and improving the relationships
Source
Possibly the most fractured group of software applications on the planet
Supply Chain Management software
The impression created when remote participants in an interactive video meeting are almost life-sized and images are vividly clear is known as ___
Telepresence
The percentage of workers who left an organization and were replaced during a time period is called employee _____
Turnover
What are examples of Analytical in Human Capital Management?
Turnover Turnover Costs Costs per Hire ROI
Mircroblogging website with the largest number of users in the world
Registering a replica site with a misspelling in the trademark name that users might easily mistake for the real thing and displaying negative information about the actual company on the replica site is called ____
Typosquatting
Unique global address for a web page or other resource on the Internet
URL
Integrates multiple applications and communications channels into a single interface
Unified Communications
The ease with which a person can accomplish a goal using a website
Usability
Refers to how easily people with disabilities can access and use web resources
Web Accessibility
Said to be inventor(s) of public-private key encryption
Whitefield Diffie and Martin Hellman
Publicly accessible website that allows users to add and edit interlinked web pages and make contributions from their own personal experience to update existing articles with current information
Wikipedia
A blogging tool
Wordpress