CH09
11 Pages

CH09

Course Number: BUSINESS BS16, Spring 2012

College/University: Central New Mexico...

Word Count: 2734

Rating:

Document Preview

Chapter 9: Electronic Commerce Software TRUE/FALSE 1. Because of software scalability, a high-traffic electronic commerce site, with thousands of catalog in quiries each minute, can use the same software as a small online shop selling a dozen items. ANS: F PTS: 1 REF: 399 2. The type of electronic commerce software an organization needs depends on several factors, with size and budget being the primary...

Unformatted Document Excerpt
Coursehero >> New Mexico >> Central New Mexico Community College >> BUSINESS BS16

Course Hero has millions of student submitted documents similar to the one
below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Course Hero has millions of student submitted documents similar to the one below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

9: Chapter Electronic Commerce Software TRUE/FALSE 1. Because of software scalability, a high-traffic electronic commerce site, with thousands of catalog in quiries each minute, can use the same software as a small online shop selling a dozen items. Register to View Answer PTS: 1 REF: 399 2. The type of electronic commerce software an organization needs depends on several factors, with size and budget being the primary drivers. Register to View Answer PTS: 1 REF: 399 3. Because of the cost of the technology involved, creating an online store can be much more expensive than building a chain of retail stores. Register to View Answer PTS: 1 REF: 399 4. All electronic commerce solutions must at least provide a catalog display, shopping cart capabilities, and transaction processing. Register to View Answer PTS: 1 REF: 399 5. Web stores often do not use the same department names as their physical counterparts. Register to View Answer PTS: 1 REF: 400 6. Good sites give buyers alternative ways to find products. Register to View Answer PTS: 1 REF: 402 7. Large sites with many products can provide a search engine that allows customers to enter descriptive search terms so that they can quickly find the Web page containing what they want to purchase. Register to View Answer PTS: 1 REF: 402 8. Shopping cart software at some Web sites allows the customer to fill a shopping cart with purchases, put the cart in virtual storage, and come back days later to confirm and pay for the purchases. Register to View Answer PTS: 1 REF: 404 9. The database MySQL is not open source software. Register to View Answer PTS: 1 REF: 408 10. Most of the cost of middleware is not the software itself, but the consulting fees needed to make the software work in a given company. Register to View Answer PTS: 1 REF: 409 11. Page-based systems are inappropriate choices for small and midsize Web sites. Register to View Answer PTS: 1 REF: 410 12. ValueWeb is an example of a commerce service provider. Register to View Answer PTS: 1 REF: 415 13. Yahoo! offers a wide range of Web-hosting and electronic commerce services for companies of all sizes. Register to View Answer PTS: 1 REF: 415 14. Today, the main mall-style CSP that remains in business is eBay Stores. Register to View Answer PTS: 1 REF: 416 15. Midrange software traditionally does not offer connectivity to database systems that store catalog in formation. Register to View Answer PTS: 1 REF: 419 16. In Intershop Enfinity, management and editing of a storefront are done through a Web browser. Register to View Answer PTS: 1 REF: 419 17. Buying and using midrange electronic commerce software is less expensive than using a CSP. Register to View Answer PTS: 1 REF: 419 18. IBM WebSphere Commerce Professional Edition can only be used for business-to-business applica tions. Register to View Answer PTS: 1 REF: 419 19. One of the advantages of IBM WebSphere is that no programming experience is required to use the software, since it is entirely GUI based. Register to View Answer PTS: 1 REF: 420 20. The term class is used in information systems to describe a system that serves multiple locations or divisions of one company and encompasses all areas of the business or enterprise. Register to View Answer PTS: 1 REF: 421 21. The goal of customer relationship management software is to understand each customers specific needs and then customize a product or service to meet those needs. Register to View Answer PTS: 1 REF: 423 22. Some companies create their own CRM software using outside consultants and their own IT staffs. Register to View Answer PTS: 1 REF: 423 23. SCM planning software helps companies develop coordinated demand forecasts using information from each participant in the supply chain. Register to View Answer PTS: 1 REF: 425 24. SCM software performs two general types of functions: planning and analysis. Register to View Answer PTS: 1 REF: 425 25. The leading providers of content management software include IBM and Oracle, which provide the software as components in other enterprise software packages. Register to View Answer PTS: 1 REF: 426 MULTIPLE CHOICE 1. ____ often offer Web server management and rent application software to businesses. a. Static catalog providers c. Knowledge management providers b. Client service providers d. Commerce service providers Register to View Answer PTS: 1 REF: 397 2. Commerce service providers are also called ____ service providers. a. hosting c. knowledge management b. managed d. business Register to View Answer PTS: 1 3. A ____ is a listing of goods and services. a. tier b. database Register to View Answer PTS: 1 REF: 397 c. catalog d. record REF: 400 4. In the early days of electronic commerce, shoppers selected items they wanted to purchase by ____. a. filling out online forms c. selecting items one at a time b. placing items into a shopping cart d. emailing credit card information Register to View Answer PTS: 1 REF: 402 5. In a shopping cart, clicking the Checkout button usually displays a screen that asks for ____ and ship ping information. a. stock availability c. billing b. item descriptions d. tracking numbers Register to View Answer PTS: 1 REF: 404 6. The Web is a ____ system, unable to remember anything from one transmission or session to another. a. stateless c. cacheless b. stateful d. checkless Register to View Answer PTS: 1 REF: 405 7. One way to uniquely identify users and store information about their choices is to create and store ____. a. Web logs b. cookies Register to View Answer c. IP addresses d. database files PTS: 1 REF: 405 8. ____ occurs when the shopper proceeds to the virtual checkout counter by clicking a checkout button. a. Cookie enabling c. Shipping b. Item selection d. Transaction processing Register to View Answer PTS: 1 REF: 407 9. Large information systems that store the same data in many different physical locations are called ____ information systems. a. centralized c. dispersed b. distributed d. component Register to View Answer PTS: 1 REF: 408 10. Application servers are usually grouped into two types: page-based and ____ systems. a. server-based c. script-based b. component-based d. group-based Register to View Answer PTS: 1 REF: 410 11. ____ is accomplished by programs that transfer information from one application to another. a. Application integration c. Co-location b. Data mining d. Interoperability Register to View Answer PTS: 1 REF: 410 12. Larger businesses often prefer to use a ____ application system that separates the presentation logic from the business logic. a. monolithic c. component-based b. database-driven d. client-based Register to View Answer PTS: 1 REF: 410 13. ____ software packages are business systems that integrate all facets of a business, including account ing, logistics, manufacturing, marketing, planning, project management, and treasury functions. a. ERP c. ERT b. EML d. HTL Register to View Answer PTS: 1 14. ERP is the acronym for ____. a. electronic record processing b. enterprise resource planning Register to View Answer PTS: 1 REF: 410 c. enterprise record provider d. electronic resource provider REF: 410 15. The W3C defines ____ as software systems that support interoperable machine-to-machine interaction over a network. a. business logic c. dedicated hosting b. Web services d. application integration Register to View Answer PTS: 1 REF: 411 16. ____ is a message passing protocol that defines how to send marked-up data from one software applic ation to another across a network. a. WSDL c. W3C b. ERP d. SOAP Register to View Answer PTS: 1 REF: 413 17. ____ is used to describe the characteristics of the logic units that make up specific Web services. a. WSDL c. W3C b. ERP d. SOAP Register to View Answer PTS: 1 REF: 413 18. ____ CSPs provide small business with an Internet connection, Web site creation tools, and little or no banner advertising clutter. a. Mall-style c. List-style b. Store-style d. Simple provider Register to View Answer PTS: 1 REF: 416 19. ____ can help businesses find customers with common interests and discover previously unknown re lationships among the data. a. Data mining c. Data warehousing b. Databases d. Customer acquisition programs Register to View Answer PTS: 1 REF: 417 20. ____ packages allow the merchant to have explicit control over merchandising choices, site layout, in ternal architecture, and remote and local management options. a. Web hosting c. Midrange b. Basic electronic commerce d. CSP Register to View Answer PTS: 1 REF: 418 21. WebSphere Commerce Suite is produced by ____. a. Microsoft c. Oracle b. Intel d. IBM Register to View Answer PTS: 1 22. Commerce Server is produced by ____. a. Microsoft b. Intel Register to View Answer PTS: 1 REF: 419 c. Oracle d. IBM REF: 419 23. ____ software typically provides tools for linking to and supporting supply and purchasing activities. a. Enterprise-class c. Web hosting b. Midrange d. Server-based Register to View Answer PTS: 1 REF: 421 24. ____ software often includes powerful search tools that use proprietary semantic and statistical al gorithms to help users find the content, experts, human and other resources that can aid them in their research and decision-making tasks. a. Content management c. Knowledge management b. Data management Register to View Answer25. d. Data mining PTS: 1 REF: 427 ____ software is designed to help businesses manage the information in documents, rather than the documents themselves. a. Programming management c. Indexing management b. Knowledge management d. Information management Register to View Answer PTS: 1 REF: 426-427 COMPLETION 1. ______________________________ are in the business of providing Internet access to companies and individuals. ANS: Internet Service Providers ISPs PTS: 1 REF: 397 2. When companies need to incorporate electronic commerce components, they may opt to run servers in-house; this approach is called ____________________ . ANS: self hosting self-hosting PTS: 1 REF: 397 3. ____________________ hosting means that the clients Web site is on a server that hosts other Web sites simultaneously and is operated by the service provider at its location. ANS: Shared PTS: 1 REF: 397 4. With ____________________ hosting, the service provider makes a Web server available to the client, but the client does not share the server with other clients of the service provider. ANS: dedicated PTS: 1 REF: 397 5. In a(n) ____________________ service, the service provider rents a physical space to the client to in stall its own server hardware and software. ANS: co-location collocation colocation PTS: 1 REF: 397 6. The best hosting services provide Web server hardware and software combinations that are ____________________, which means that they can be adapted to meet changing requirements when their clients grow. ANS: scalable PTS: 1 REF: 399 7. A(n) ____________________ is a simple list written in HTML that appears on a Web page or a series of Web pages. ANS: static catalog PTS: 1 REF: 400 8. A(n) ____________________ stores information about items in a database, usually on a separate com puter that is accessible to the server that is running the Web site itself. ANS: dynamic catalog PTS: 1 REF: 400 9. A(n) _________________________ is a collection of information that is stored on a computer in a highly structured way. ANS: database PTS: 1 REF: 408 10. An example of a(n) ____________________ is: When a customer logs in, check the password entered against the password file in the database. ANS: business rule PTS: 1 REF: 409 11. Making a companys information systems work together is called ____________________ and is an important goal of companies when they install middleware. ANS: interoperability PTS: 1 REF: 409 12. The actions that an application server software performs are determined by the rules used in the busi ness. These rules are called ____________________ . ANS: business logic PTS: 1 REF: 409 13. ____________________ application systems return pages generated by scripts that include the rules for presenting data on the Web page with the business logic. ANS: Page-based Page based PTS: 1 REF: 410 14. In some applications, ____________________ provide data feeds between two different companies. ANS: Web services PTS: 1 REF: 411 15. A general name for the ways programs interconnect with each other is ___________________________________. ANS: application program interface (API) application program interface API PTS: 1 REF: 411 16. ____________________ allow programs written in different languages, on different platforms, to communicate with each other and accomplish transaction processing and other business tasks. ANS: Web services PTS: 1 REF: 413 17. A key element of the ____________________ approach is that programmers can write software that accesses certain units of business application logic without knowing the details of how each unit is im plemented. ANS: Web services PTS: 1 REF: 413 18. A principle called ________________________________________ describes the way the Web uses networking architecture to identify and locate Web pages and the elements (graphics, audio clips, and so on) that make up those Web pages. ANS: Representational State Transfer (REST) Representational State Transfer REST PTS: 1 REF: 414 19. Much of the data in SOAP applications is stored and transmitted in ____________________ format. ANS: XML PTS: 1 REF: 414 20. Data mining ____________________ can indicate problematic pages in a stores design where, for ex ample, a large number of customers get stuck and then leave the Web site. ANS: reports PTS: 1 REF: 417 21. For businesses that want to sell more than a few items, Amazon offers its ____________________ program. ANS: Pro Merchant PTS: 1 REF: 417 22. ____________________ electronic commerce software provides tools for both B2B and B2C com merce. ANS: Enterprise-class Enterprise class PTS: 1 REF: 421 23. ________________________________________ uses information about customers to sell them more (or more profitable) goods or services. ANS: CRM Customer relationship management Customer relationship management (CRM) PTS: 1 REF: 423 24. SCM ____________________ software helps with tasks such as warehouse and transportation man agement. ANS: execution PTS: 1 REF: 425 25. ____________________ software helps companies control the large amounts of text, graphics, and media files that have become a key part of doing business. ANS: Content management PTS: 1 REF: 426 ESSAY 1. What is the difference between shared hosting and dedicated hosting? ANS: Shared hosting means that the clients Web site is on a server that hosts other Web sites simultan eously and is operated by the service provider at its location. With dedicated hosting, the service pro vider makes a Web server available to the client, but the client does not share the server with other cli ents of the service provider. PTS: 1 REF: 397 2. List at least five software components that large and complex electronic commerce sites can include in addition to a catalog display, shopping cart capabilities, and transaction processing. ANS: Larger and more complex electronic commerce sites use software that adds other features and capabil ities to the basic set of commerce tools. These additional software components can include: Middleware that integrates the electronic commerce system with existing company information sys tems that handle inventory control, order processing, and accounting Enterprise application integration Web services Integration with enterprise resource planning (ERP) software Supply chain management (SCM) software Customer relationship management (CRM) software Content management software Knowledge management software PTS: 1 REF: 400 3. What is the difference between a static catalog and a dynamic catalog? Register to View Answerstatic catalog is a simple list written in HTML that appears on a Web page or a series of Web pages. To add an item, delete an item, or change an items listing, the company must edit the HTML of one or more pages. A dynamic catalog stores the information about items in a database, usually on a separate computer that is accessible to the server that is running the Web site itself. A dynamic catalog can fea ture multiple photos of each item, detailed descriptions, and a search tool that allows customers to search for an item and determine its availability. PTS: 1 REF: 400 4. What are the benefits of using a mall-style commerce service provider? What costs are associated with them? ANS: Mall-style CSPs provide small businesses with an Internet connection, Web site creation tools, and little or no banner advertising clutter. These service providers charge a low monthly fee and may also charge one-time setup fees. Some of these providers also charge a percentage of or fixed amount for each customer transaction. These Web hosts also provide online store design tools, storefront tem plates, an easy-to-use interface, and Web page-generation capabilities and page maintenance. Mallstyle CSPs provide shopping cart software or the ability to use another vendors shopping cart soft ware. They also provide payment processing services so the online store can accept credit cards. PTS: 1 REF: 416 5. What is the purpose of supply chain management software? ANS: Supply chain management (SCM) software helps companies to coordinate planning and operations with their partners in the industry supply chains of which they are members. SCM software performs two general types of functions: planning and execution. PTS: 1 REF: 425

Find millions of documents on Course Hero - Study Guides, Lecture Notes, Reference Materials, Practice Exams and more. Course Hero has millions of course specific materials providing students with the best way to expand their education.

Below is a small sample set of documents:

Central New Mexico Community College - BUSINESS - BS16
Chapter 10: Electronic Commerce SecurityTRUE/FALSE1. Threats that are deemed low risk and unlikely to occur can be ignored when the cost to protect againstthe threat exceeds the value of the protected asset.ANS: TPTS: 1REF: 4402. The element of nec
Central New Mexico Community College - BUSINESS - BS16
Chapter 12: Planning for Electronic CommerceTRUE/FALSE1. The keys to successful implementation of any information technology project are planning and execu tion.ANS: TPTS: 1REF: 5322. A successful business plan for an electronic commerce initiative
Grantham - SCIENCE - GS104
Task Project: Access BasicsMichael J. JohnsonDatabase Applications4 October 2012Activity 1-1In order to make the Navigation Pane something that fits how you work you need to firstcustomize it. You can do this by choosing Navigation Options; this wil
Grantham - SCIENCE - GS104
Task Project: Creating a DatabaseMichael J. JohnsonDatabase Applications4 October 2012Activity 2-2If you have multiple people using the same database and all entering information you can ensurethat the information stays consistent. This means basica
Grantham - SCIENCE - GS104
Task Project: Creating and Modifying FormsMichael J. JohnsonDatabase Applications14 October 2012Activity 4-1A subform is a form that is inserted in another form. The primary form is called the main form,and the form that is enclosed in form is calle
Grantham - SCIENCE - GS104
Task Project: Creating QueriesMichael J. JohnsonDatabase Applications9 October 2012Activity 3-2Referential integrity is a feature provided by relational database management systems(RDBMSs) that prevents users or applications from entering inconsiste
Grantham - SCIENCE - GS104
Submitted by on 10/17/2012 8:20:06 PMPoints Awarded70.00Points Missed30.00Percentage70.0%1.The _ operator selects records that match at least one of two or more conditions in a query.A) OrB) AndC) PlusPoints Earned: 5.0/5.02.The _ data type
Grantham - SCIENCE - GS104
Using the telephone numbers listed in your local directory as your population, randomly obtain 20 samples of size 3. From eachtelephone number identified as a source, take the fourth, fifth, and sixth digits.a. Calculate the mean of the 20 samplesSampl
Grantham - SCIENCE - GS104
Question 1: Based on a survey of 1,000 adults by Greenfield Online and resported in a May 2009 USA Today Snapshot, adults 24 years of age and under spend a weekly average of $35 on fastfood. If 200 of the adults surveyed were in the age catetory of 24 an
Grantham - SCIENCE - GS104
Assignment 2Michael J. Johnson2 August 2012Business Statistics BA215Grantham UniversityQuestion 11. Baseball stadiums vary in age, style, size, and in many other ways. Fans might think of the size of thestadium in terms of the number of seats; whil
Grantham - SCIENCE - GS104
Assignment 3Michael J. Johnson2 August 2012Business Statistics BA215Grantham University1. If you could stop time and live forever in good health, what age would you pick? Answers to this questionwere reported in a USA Today Snapshot. The average ide
Grantham - SCIENCE - GS104
Assignment 5Michael J. Johnson4 August 2012Business Statistics BA215Grantham UniversityQuestion 11. Using the telephone numbers listed in your local directory as your population, randomly obtain 20 samples ofsize 3. From each telephone number ident
Grantham - SCIENCE - GS104
Assignment 7Michael J. Johnson14 August 2012Business Statistics BA215Grantham University1. To compare commuting times in various locations, independent random samples were obtained from the sixcities presented in the Longest Commute to Work graphic
Grantham - SCIENCE - GS104
Classical Hypothesis TestMichael J. Johnson4 August 2012Business Statistics BA215Grantham UniversityClassical Hypothesis TestDiscuss the Classical Hypothesis Test: A Five-Step Procedure on page 173 of your textbook.1.Write the 5 step procedurea.
Grantham - SCIENCE - GS104
Ethical GuidelinesMichael J. Johnson13 August 2012Business Statistics BA215Grantham UniversityETHICS IN PROFESSIONAL STATISTICSEthical behavior is extraordinarily important in the field of professional statistics. This is so for onecentral reason:
Grantham - SCIENCE - GS104
Statistics and MeMichael J. Johnson17 August 2012Business Statistics BA215Grantham UniversityI have learned that statistics is a range of procedures for gathering, organizing, analyzing and presentingquantitative data. Essentially therefore, statist
Grantham - SCIENCE - GS104
Business Statics BA 215Michael J. Johnson G00042767Assignment Week 131 July 2012Question 11. Determine which of the following statements is descriptive in nature and which is inferential. Refer to thedata below in How Old is My Fish?How Old is My F
Grantham - SCIENCE - GS104
8/29/20125:57:08PMPointsAwarded40.00PointsMissed60.00Percentage40.0%1.Expertshaveestimatedthat25%ofallhomelesspeopleintheU.S.areveterans.TheproportionofAmericans ingeneralwhoarehomelessis0.11.Forrandomsamplesof100people,whichismorenormal?A)distr
Grantham - SCIENCE - GS104
Deceptive StatisticsMichael J. JohnsonBusiness Statistics BA215Grantham University10 August 2012There are examples of deceptive statistics everywhere - visual data presentations (charts/graphs)from magazines to newspaper articles. Locate a particula
Grantham - SCIENCE - GS104
Example 3There are examples of deceptive statistics everywhere - visual data presentations (charts/graphs)from magazines to newspaper articles. Locate a particularly outrageous chart/graph andinterview people in your company about the message they inte
Grantham - SCIENCE - GS104
The individual I interviewed was my Battalion Surgeon who I work with on a daily basis. In theArmy we seem to all be micro statisticians because we are all constantly crunching numbers,finding patterns, working out solutions and then presenting these fi
Grantham - SCIENCE - GS104
For this interview I spoke with a Soldier that works in the Supply Section of my Unit.1. Making conclusions about a large population from a small sample:This seems to be done a lot especially around election times when all these polls show thedifferent
Grantham - SCIENCE - GS104
.c cennIale ormp rfp PeA1QKey HighlightsNet sales of $ 36.19 billionNet income for the quarter was $11.62billionEPS was $12.45Gross margin improved to 47%Retained earnings up by $27 billionKey HighlightsApple sold 35.1 million iphones in
Grantham - SCIENCE - GS104
Chapters 1 and 2 QuestionsMichael J. JohnsonBusiness Communication CO21026 September 2012Chapter 1 Questions1. What are the three purposes for which people communicate? What percentage of amanagers time is spent communicating? Give examples of the t
Grantham - SCIENCE - GS104
Chapters 10 and 11 QuestionsMichael J. JohnsonBusiness Communication CO21011 October 2012All answers should be in complete sentences, keep in mind, this is a businesscommunications and the assignment will be graded as such.1. What techniques can hel
Grantham - SCIENCE - GS104
Business EmailMichael J. JohnsonBusiness Communication CO21028 September 2012To: Jane Doe<Jane.Doe@us.army.mil>From: Michael J. Johnson< Michael.j.johnson@us.army.mil>Subject: Token of Our Appreciation!September 28, 2012Dear Jane DoeThank you for
Grantham - SCIENCE - GS104
Date 17 October 2012Mr. John SmithSmithfield Elementary SchoolMain StreetSmithfield, TN 37042Dear Mr. Smith,I am interested in applying for a teaching position, on the elementary level, in your schooldistrict. As a 1994 graduate of University of Ar
Grantham - SCIENCE - GS104
MICHAEL JAMES JOHNSON358 Woodtrace Drive, Clarksville, TN 37042(931) 257-1211One hundred years from now it will not matter what mybank account was, the sort of house I lived in, or the kind of car I drove,but the world may be different, because I was
Grantham - SCIENCE - GS104
Capstone Case: SoftWear, LimitedMichael J. JohnsonInformation Systems Analysis IS336Grantham University10 August 20121. Although the presentation was successful, Rick and Carla ask you to create a checklist of presentation dos anddonts that would be
Grantham - SCIENCE - GS104
Case Study: Albatross AirfreightMichael J. JohnsonInformation Systems Analysis IS336Grantham University14 August 2012Sand and Surf RetailersSituation: Sand and Surf Retailers recently acquired several smaller companies to expand its chain of clothin
Grantham - SCIENCE - GS104
Case Study: Apply Your KnowledgeMichael J. JohnsonInformation Systems Analysis IS336Grantham University3 August 20121. Low-Voltage ComponentsSituation: You are the IT manager at Low-Voltage Components, a medium- sized firm that makes specialized cir
Grantham - SCIENCE - GS104
Case Study: Claremont SchoolMichael J. JohnsonInformation Systems Analysis IS336Grantham University6 August 2012SITUATION: The Claremont School1) Create a decision table that describes the Claremont School course catalog regarding eligibility for CI
Grantham - SCIENCE - GS104
Case Study: New Century Health ClinicMichael J. JohnsonInformation Systems Analysis IS336Grantham University3 August 20121. Dr. Jones arranged an introductory meeting between the associates of New Century Health Clinic and you todetermine if mutual
Grantham - SCIENCE - GS104
Case Study: Nothing But NetMichael J. JohnsonInformation Systems Analysis IS336Grantham University10 August 2012Nothing But Net is an IT consulting firm that specializes in e-commerce solutions. As a newly hired systems analyst,you have been asked t
Grantham - SCIENCE - GS104
Case Study: Personal Trainers, INC.Michael J. JohnsonInformation Systems Analysis IS336Grantham University25 August 2012PERSONAL TRAINER, INC.Personal Trainer, Inc., owns and operates fitness centers in a dozen Midwestern cities. The centers have do
Grantham - SCIENCE - GS104
Case Study: Willowbrook SchoolMichael J. JohnsonInformation Systems Analysis IS336Grantham University29 August 20121.Software Maintenance andSupport Request FormEmployee information:End User Name:Job Title:Email ID:Employee ID:Department:Dat
Grantham - SCIENCE - GS104
Michael J. Johnson23 October 2011Intro Info Systems SecurityAssignment for Chapters 3 and 41.I have had numerous error messages with this program and it will not allow me to createpassword accounts. I have read FAQs on the site but still not able to
Grantham - SCIENCE - GS104
Organizational CultureMichael J. JohnsonBA 420 Organizational Behavior06 February 2012Organizational CultureIn the search for a company with a visible organizational culture, there is no company that comesclose to the U.S. Army. The Army has one of
Grantham - SCIENCE - GS104
Final PaperMichael J. JohnsonBA 420 Organizational Behavior11 February 2012AbstractIn the book Good to Great: Why Some Companies Make the LeapAnd Others Dont(HarperBusiness, 2001), Jim Collins describes level 5 leadership. In recent years the concep
Grantham - SCIENCE - GS104
Organizational CultureMichael J. JohnsonBA 420 Organizational Behavior06 February 2012In the search for a company with a visible organizational culture, there is no company that comesclose to the U.S. Army. The Army has one of the oldest, consistent,
Grantham - SCIENCE - GS104
Power and PoliticsMichael J. JohnsonBA 420 Organizational Behavior5 February 20121. What forms of interpersonal power are evident in the case? Provide evidence to supportyour answer.There are multiple forms of interpersonal power evident in this cas
Grantham - SCIENCE - GS104
Michael JohnsonExercises Chapter 2Question 2 below are the mission/vision statements for Aflac, Barnes & Nobles, Chevron,Dole Food Company, and Dollar General. None of the statements really outlined anythingparticular to the security of information fo
Grantham - SCIENCE - GS104
Michael JohnsonChapter 7Exercise 4. Using this document, identify five measures you would be interested in finding theresults from based on your home computing systems and/or network.I read through portions of this 80 page document and wasnt exactly s
Grantham - SCIENCE - GS104
Michael J. JohnsonChapter 8Exercise1.Place the items from greatest vulnerability to least:Paragraph 3Paragraph 1Paragraph 24. Using the data classification scheme presented in this chapter, identify and classify theinformation contained in your p
Grantham - SCIENCE - GS104
Michael J JohnsonChapter 101. What is the difference between authentication and authorization? Can a system permit authorizationwithout authentication? Why or why not?Authentication:Authentication is a process of identifying a user based on their cre
Grantham - SCIENCE - GS104
Michael J. JohnsonChapter 12Exercise 1 What does CISSP stand for? Using the internet, find out what continuing educationis required for the holder of a CISSP to remain current and in good standing.(Certified Information Systems Security Professional)
Grantham - SCIENCE - GS104
Michael JohnsonChapter 41. What is information security policy? Why is it critical to the success of the information securityprogram?Information security policy explains the will of the organizations management in controlling the behavior of itsemplo
Grantham - SCIENCE - GS104
ChangeMichael J. JohnsonSO251Technology and Society5 September 2011Change will always scare humans and it will take some time for them to get use to new ideas.The old saying goes rocking the boat which means people dont want someone coming in achan
Grantham - SCIENCE - GS104
Clone WarsMichael J. JohnsonTechnology and SocietySO2512 October 2011Cloning is something that we see in the movies almost all the time and in those times we see itits never healthy for the people in the movies. In these movies they outline this typ
Grantham - SCIENCE - GS104
Family TiesMichael J. JohnsonTechnology and SocietySO25120 November 2011Before we can discuss how illegitimate births would affect a kin group we need to know whatan illegitimate birth is. By definition, legitimacy is the status of a child who is bo
Grantham - SCIENCE - GS104
Government InternetMichael J. JohnsonTechnology and SocietySO25112 September 2011Our internet infrastructure has grown leaps and bounds over the last several years. Companiesoffered dial-up, then went to digital subscriber lines, then to cable and n
Grantham - SCIENCE - GS104
Michael J. JohnsonWritten Assignment Chapter 5 and 623 October 2011Chapter 53. What is the ISO 27000 series standards? What individual standards make up the series?ISO 27000 is the generic name assigned for standards related to information security i
Grantham - SCIENCE - GS104
Michael J. JohnsonWritten Assignment Chapter 5 and 623 October 2011Chapter 53. What is the ISO 27000 series standards? What individual standards make up the series?ISO 27000 is the generic name assigned for standards related to information security i
Grantham - SCIENCE - GS104
Michael J. JohnsonWritten Assignment Chapter 7 and 830 October 2011Chapter 73. How does a network-based IDPS differ from a host-based IDPS?Network Intrusion Detection Systems IDPS usually consists of a network appliance (or sensor)with a Network Int
Grantham - SCIENCE - GS104
Michael J. JohnsonWritten Assignment Chapter 9 and 1020 November 2011Chapter 91. What is physical security What are the primary threats to physical security? How are theymanifested in attacks against the organization?Physical security addresses the
Grantham - SCIENCE - GS104
Short Essay Assessment: Chapters 5-9BA340 Human Resource Management1.Describe the role HRM plays in orientation.HRM instructs new employees when and where to report; provides informationabout benefit choices. It also assists future employee needs wit
Grantham - SCIENCE - GS104
Points Awarded 97.50Points Missed 2.50Percentage 97.5%1.A passive response is one in which a definitive action is initiated when certain types of alerts aretriggeredA) TrueB) FalsePoints Earned: 2.5/2.5Correct Answer(s): False2.Intrusion detect
Grantham - SCIENCE - GS104
Human Resource Management BA 3401. What is an adverse impact? How does it differ from adverse treatment?Occurs when a decision, practice, or policy has a disproportionately negative effect on aprotected group. Adverse impact may be unintentional. Adver
Grantham - SCIENCE - GS104
Michael J. JohnsonWritten Assignment Chapter 11 and 1227 November 2011Chapter 111. Who in an organization should decide where in the organizational structure theinformation security function should be located? Why?There is not a specific department
Grantham - SCIENCE - GS104
3 March 2012Review QuestionsChapter 1:1. Why do you think there is an increase in Information Technology Risk Management?Because over the years there have been many penetrations and compromises to systemsthat were supposed to be safe. To help deal wi
Grantham - SCIENCE - GS104
5 March 2012Review QuestionsChapter 2:1.According to NIST SP 800-39, what are the six steps involved in risk management?1. the techniques and methodologies the organization plans to employ to assess informationsystem related security risks and other