Quiz 3
In the domain name "http://myspace.blogging.com", what are the root, top-level, second-level, and third-level domains, respectively?
".", com, blogging, myspace
According to a 2014 survey of 192 companies conducted by Panorama Consulting Solutions, the average cost of an ERP project was:
$2.8 million
Approximately what percentage of U.S. households has high-speed broadband connections?
75%
Enterprise application vendors have created _________ to make their own customer relationship management, supply chain management, and enterprise systems work closely together with each other.
E-Business Suites
Which of the following provides a suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes?
ERP Systems
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as:
Hotspots
The business value of an effective supply-chain management system includes all of the following expect:
Increased Inventory Levels
Why isn't overstocking warehouses an effective solution for a problem of low availability?
It increases inventory costs
What signal types are represented by a continous waveform?
Laser
Which of the following is an important capability for sales processes that is found in most SFA modules in major CRM software products?
Lead Management
Most computer viruses deliver a:
Payload
Which type of network would be most appropriate for a business comprised of three employees and a manger located in the same office space whose primary need is to share documents?
Peer-to-Peer network
Which type of network serves a small group of computers, allowing them to share resources and peripherals without using a dedicated server?
Peer-toPeer
Which of the following statements about RFID is not true?
RFIDs require line-of-sight contact to be read
_________ identify the access points in a Wi-Fi network.
SSIDs
Currently, the protocols used for secure information transfer over the Internet are:
SSL, TLS, and S-HTTP
Which of the following is not an example of a next-generation enterprise application?
Salesforce.com
________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
Security
Which of the following provides additional security by determining whether packets are part of an ongoing dialogue between a sender and a receiver?
Stateful inspecton
Which of the following enables multiple users to create and edit web documents?
Wiki
In a telecommunications network architecture, a protocol is:
a standard set of rules and procedures for control of communications in a network
The "Internet of Things" refers to:
a vision of a pervasive web in which common objects are connected to and controlled over the Internet
Which of the following defines acceptable uses of a firm's information resources and computing equipment?
an AUP
Marketing modules in CRM systems provide tools for all of the following except:
assigning and managing customer service requests
Enterprise software is built around thousands of predefined business processes that reflect:
best practice
Evil twins:
bogus wireless network access points that look legitimate to users
The Internet is based on which three key technologies?
client/server computing, packet switching, and the development of communications standards for linking networks and computers
Computer forensics tasks include all of the following except:
collecting physical evidence on the computer
IPv6 was developed in order to:
create more IP addresses
The Sarbanes-Oxley Act:
imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information
Digital subscriber lines:
operate over existing telephone lines to carry voice, data, and video
The HIPPA Act of 1996:
outlines medical security and privacy rules
Supply chain software can be classified as either supply chain ________ systems or supply chain _________ systems.
planning; execution
Specific security challenges that threaten clients in a client/server environment include:
tapping, sniffing, message alteration, radiation
Which of the following is a type of ambient data?
A file deleted from a hard disk
A LAN could be used to connect all of the following expect:
All of the computers in the city
The total amount of digital information that can be transmitted through any telecommunications medium is measured in:
BPs
Enterprise application vendors are now including _______ features such as tools for data visualization, flexible reporting, and ad hoc analysis as part of the application.
Business Intelligence
Data from which of the following is not used as an input by analytical CRM applications?
CLTV
In order to achieve maximum benefit from an enterprise software package, a business should:
Changes the way it works to match the software's business processes
Selling a customer with a checking account a home improvement loan is an example of:
Cross Selling
In controlling network traffic to minimize slow-downs, a technology called _______ is used to examine data files and sort low-priority data from priority data.
Deep-packet inspection
What supply chain planning function determines how much products is needed to satisfy all customer demands?
Demand Planning
Which process is used to protect transmitted data in a VPN?
Tunneling
Which of the following refers to a company's suppliers, supplier's suppliers, and the processes for managing relationships with them?
Upstream portion of the supply chain
Which of the following statements about Internet security is not true?
VoIP is more secure than the switched voice network
What are the four layers of the TCP/IP reference model?
Application layer, transport layer, internet layer, network interface layer
Which of the following statements about passwords is not true?
Authentication cannot be established through the use of a password
A _______ is a method of interaction with a customer, such as telephone or customer service desk.
Touch Point