Quiz 3

Ace your homework & exams now with Quizwiz!

In the domain name "http://myspace.blogging.com", what are the root, top-level, second-level, and third-level domains, respectively?

".", com, blogging, myspace

According to a 2014 survey of 192 companies conducted by Panorama Consulting Solutions, the average cost of an ERP project was:

$2.8 million

Approximately what percentage of U.S. households has high-speed broadband connections?

75%

Enterprise application vendors have created _________ to make their own customer relationship management, supply chain management, and enterprise systems work closely together with each other.

E-Business Suites

Which of the following provides a suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes?

ERP Systems

One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as:

Hotspots

The business value of an effective supply-chain management system includes all of the following expect:

Increased Inventory Levels

Why isn't overstocking warehouses an effective solution for a problem of low availability?

It increases inventory costs

What signal types are represented by a continous waveform?

Laser

Which of the following is an important capability for sales processes that is found in most SFA modules in major CRM software products?

Lead Management

Most computer viruses deliver a:

Payload

Which type of network would be most appropriate for a business comprised of three employees and a manger located in the same office space whose primary need is to share documents?

Peer-to-Peer network

Which type of network serves a small group of computers, allowing them to share resources and peripherals without using a dedicated server?

Peer-toPeer

Which of the following statements about RFID is not true?

RFIDs require line-of-sight contact to be read

_________ identify the access points in a Wi-Fi network.

SSIDs

Currently, the protocols used for secure information transfer over the Internet are:

SSL, TLS, and S-HTTP

Which of the following is not an example of a next-generation enterprise application?

Salesforce.com

________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.

Security

Which of the following provides additional security by determining whether packets are part of an ongoing dialogue between a sender and a receiver?

Stateful inspecton

Which of the following enables multiple users to create and edit web documents?

Wiki

In a telecommunications network architecture, a protocol is:

a standard set of rules and procedures for control of communications in a network

The "Internet of Things" refers to:

a vision of a pervasive web in which common objects are connected to and controlled over the Internet

Which of the following defines acceptable uses of a firm's information resources and computing equipment?

an AUP

Marketing modules in CRM systems provide tools for all of the following except:

assigning and managing customer service requests

Enterprise software is built around thousands of predefined business processes that reflect:

best practice

Evil twins:

bogus wireless network access points that look legitimate to users

The Internet is based on which three key technologies?

client/server computing, packet switching, and the development of communications standards for linking networks and computers

Computer forensics tasks include all of the following except:

collecting physical evidence on the computer

IPv6 was developed in order to:

create more IP addresses

The Sarbanes-Oxley Act:

imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information

Digital subscriber lines:

operate over existing telephone lines to carry voice, data, and video

The HIPPA Act of 1996:

outlines medical security and privacy rules

Supply chain software can be classified as either supply chain ________ systems or supply chain _________ systems.

planning; execution

Specific security challenges that threaten clients in a client/server environment include:

tapping, sniffing, message alteration, radiation

Which of the following is a type of ambient data?

A file deleted from a hard disk

A LAN could be used to connect all of the following expect:

All of the computers in the city

The total amount of digital information that can be transmitted through any telecommunications medium is measured in:

BPs

Enterprise application vendors are now including _______ features such as tools for data visualization, flexible reporting, and ad hoc analysis as part of the application.

Business Intelligence

Data from which of the following is not used as an input by analytical CRM applications?

CLTV

In order to achieve maximum benefit from an enterprise software package, a business should:

Changes the way it works to match the software's business processes

Selling a customer with a checking account a home improvement loan is an example of:

Cross Selling

In controlling network traffic to minimize slow-downs, a technology called _______ is used to examine data files and sort low-priority data from priority data.

Deep-packet inspection

What supply chain planning function determines how much products is needed to satisfy all customer demands?

Demand Planning

Which process is used to protect transmitted data in a VPN?

Tunneling

Which of the following refers to a company's suppliers, supplier's suppliers, and the processes for managing relationships with them?

Upstream portion of the supply chain

Which of the following statements about Internet security is not true?

VoIP is more secure than the switched voice network

What are the four layers of the TCP/IP reference model?

Application layer, transport layer, internet layer, network interface layer

Which of the following statements about passwords is not true?

Authentication cannot be established through the use of a password

A _______ is a method of interaction with a customer, such as telephone or customer service desk.

Touch Point


Related study sets

Chapter 14: Long-Term Liabilities MC questions

View Set

Nursing Fundamental LEC chapter 5: Cultural Diversity

View Set

Week 5 Cardiovascular challenges questions

View Set

Principles of Management - Chapter 14

View Set

brain teasers, BrainTeasers, Brain Teasers, Brain Teasers - Interview Questions

View Set