View the step-by-step solution to:

QUESTION 1 ____________ is when firms are able to maintain the lowest level of inventory while still being able to fulfill demand.

QUESTION 1

  1. ____________ is when firms are able to maintain the lowest level of inventory while still being able to fulfill demand.
  2. Supply Chain Management
  3. Inventory flow management
  4. Just-in-time inventory
  5. Inventory scheduling
  6. Inventory capacity management

1.00000 points  

QUESTION 2

  1. Each computer attached to a network or the Internet has a unique address called a(n) ________.
  2. IP address
  3. local address
  4. network address
  5. PC address
  6. Internet address

1.00000 points  

QUESTION 3

  1. The AARP, an organization that caters towards people over the age of 50, uses its members' information to place them into very small groups for the purpose of identifying marketing opportunities. This is an example of what?
  2. Customer profiling 
  3. Customer segmentation
  4. Customer grouping
  5. Client profiling
  6. Client segmentation

1.00000 points  

QUESTION 4

  1. Privacy of information is the ___________ of the ___________ collected by organizations about the individuals using their services.
  2. confidentiality, information
  3. collection, data
  4. protection, knowledge
  5. certification, wisdom
  6. privacy, information

1.00000 points  

QUESTION 5

  1. Which of the following is basically the acquisition of software via a subscription model?
  2. BPaaS
  3. SaaS
  4. PaaS
  5. IaaS
  6. Virtualization

1.00000 points  

QUESTION 6

  1. After reviewing table after table of data for your marketing research project, you can no longer make much sense of most of the information. What type of tool would be able to help you uncover trends in the data?
  2. Dedicated statistical software
  3. DBMS
  4. Document management software
  5. Data visualization software
  6. Reporting tools

1.00000 points  

QUESTION 7

  1. When using your cell phone, what type of transmission are you using?
  2. infrared
  3. Bluetooth
  4. microwave
  5. radio
  6. cable

1.00000 points  

QUESTION 8

  1. What is the process of identifying, assessing and prioritizing the security risks an organization may face?
  2. Risk management
  3. Virus Risk
  4. Wi-Fi Protected Access
  5. Security
  6. Preventative Controls

1.00000 points  

QUESTION 9

  1. What kind of threat renders a system inoperative or limits its capability to operate?
  2. Denial of service
  3. Unauthorized access
  4. Theft and fraud
  5. Forceful
  6. Passive

1.00000 points  

QUESTION 10

  1. If a virus is embedded in a legitimate file, they are often called a(n)__________.
  2. worm
  3. Trojan horse
  4. hack
  5. theft
  6. active content

1.00000 points  

QUESTION 11

  1. Your national office of your student organization has established a Portal for you to track news, memos, and download forms. What kind of system does this most closely describe?
  2. Decision support system
  3. DBMS
  4. Reporting tools
  5. Document management tools
  6. Paired comparison

1.00000 points  

QUESTION 12

  1. You have received an email from your university IT department stressing that the IT department will NEVER ask you for your username and password to your email account. What type of scheme is the university most likely trying to protect you from?
  2. Phishing
  3. Smurfing
  4. Spoofing
  5. Break-ins
  6. Security holes

1.00000 points  

QUESTION 13

  1. What is a more recent and more powerful encryption algorithm widely available in most routers?
  2. WEP
  3. WPA
  4. https
  5. Symmetric encryption
  6. Stealth

1.00000 points  

QUESTION 14

  1. What is one of the core characteristics of the Internet that has contributed to its rapid growth?
  2. interoperability
  3. addressing
  4. Internet Protocol
  5. IPv4
  6. fiber optics

1.00000 points  

QUESTION 15

  1. The systems development committee has chosen to implement the new system in a limited number of sites based on location. What type of integration plan is being implemented here?
  2. Direct Changeover
  3. Parallel Operation
  4. Phased implementation
  5. Pilot Operation
  6. Use Case

1.00000 points  

QUESTION 16

  1. What is the process of analyzing data to identify trends, patterns, and other useful information?
  2. Data mining
  3. Digging agent
  4. Database modeling
  5. Querying
  6. Clustering

1.00000 points  

QUESTION 17

  1. When verifying that the solution solves the problem at hand, you must be sure that the alternative meets all __________ and best meets the _________.
  2. requirements, goals
  3. requirements, needs
  4. goals, wants
  5. solutions, vision
  6. problem, definition

1.00000 points  

QUESTION 18

  1. You step out of your office and miss a telephone call. When you sit at your desk you notice that the voicemail light is blinking on your phone, you have a new email, and you have a transcribed instant message on your computer screen in the form of an Instant Message. Your organization has most likely adopted what type of technology?
  2. intranet
  3. VPN
  4. wireless
  5. unified communications
  6. Web 3.0

1.00000 points  

QUESTION 19

  1. A connection that uses encryption and other channels to provide a secured channel over an open wire connection is called a(n):
  2. smpt network
  3. Symmetric network

  4. Virtual private network
  5. Bridged network
  6. Switched network

1.00000 points  

QUESTION 20

  1. What are the two types of cryptography systems used in encryption today?
  2. Asymmetric, symmetric
  3. Accurate, accessible
  4. Threat, solution
  5. Analog, digital
  6. Private, public

1.00000 points  

QUESTION 21

  1. In contrast to ________, ERP applications make accessing information easier by providing a central information repository.
  2. legacy systems
  3. custom applications
  4.  off the shelf applications
  5.  data warehouses
  6. database management systems

1.00000 points  

QUESTION 22

  1. _______________ is a set of applications, technologies and processes for gathering, storing, analyzing, and accessing data to help users make better decisions.
  2. EIS
  3. Business intelligence
  4. Data mining
  5. A discussion database
  6. Groupware

1.00000 points  

QUESTION 23

  1. Which of the following is not a disadvantage of an ERP system?
  2. They require an enormous amount of work.
  3. They are expensive.
  4. It may not work better than the previous system.
  5. They may require redesigned business processes.
  6. Users may resist implementation.

1.00000 points  

QUESTION 24

  1. Cloud computing allows organizations to rent computing resources from providers instead of having their own locally managed __________ and __________.
  2. hardware, software
  3. hardware, human resources
  4. network, software
  5. Web 2.0, Web 3.0
  6. websites, servers

1.00000 points  

QUESTION 25

  1. Which phase of SDLC begins the process?
  2. Requirements
  3. Planning
  4. Development
  5. Implementation
  6. Maintenance

1.00000 points  

QUESTION 26

  1. When considering decision making techniques/tools, which tool requires you to evaluate each alternative against all other alternatives?
  2. Pros/cons analysis
  3. Paired comparison
  4. Deep research
  5. Decision Criteria
  6. Requirements

1.00000 points  

QUESTION 27

  1. Search engine results achieved by design and search engine optimization are known as ______.
  2. Sponsored links
  3. Pay-per-click
  4. Keyword bidding
  5. Search engine optimization
  6. Organic links

1.00000 points  

QUESTION 28

  1. Biometrics are primarily used for one of two things. What are they?
  2. Authentication, identification
  3. Non-repudiation, authentication
  4. Fingerprint recognition, iris recognition
  5. Account access, recognition
  6. User rights, printing services

1.00000 points  

QUESTION 29

  1. What is the main difference between the initial set of web applications and Web 2.0?
  2. interactivity
  3. speed
  4. bandwidth requirements
  5. software requirements
  6. technology

1.00000 points  

QUESTION 30

  1. ______________ software is software that allows users to access the underlying source code for an application.
  2. COTS
  3. Custom-built
  4. Developed
  5. Open source
  6. Hybrid

1.00000 points  

QUESTION 31

  1. Using a unique username and a complicated password is one possible method to verify that a user is who they say they are. What type of goal is this?
  2. Non-repudiation
  3. Authenticity
  4. CIA
  5. Availability
  6. Privileges

1.00000 points  

QUESTION 32

  1. ___________ involves making sure that data are consistent and complete.
  2. Integrity
  3. Availability
  4. Confidentiality
  5. Authenticity
  6. Non-repudiation

1.00000 points  

QUESTION 33

  1. Which of the provides a cloud-based platform for running websites and databases and executing programming languages?
  2. BPaaS
  3. SaaS
  4. PaaS
  5. IaaS
  6. Virtualization

1.00000 points  

QUESTION 34

  1. You are asked to provide your location and email address when downloading iTunes from the Apple site. You are also prompted to check a box if you would like any Apple News updates. This checkbox allows you to do what?
  2. Opt-in
  3. Create account
  4. Opt-out
  5. Enable cookie manager
  6. Identify data collection threat

1.00000 points  

QUESTION 35

  1. As a manager at your University Bookstore, you often run weekly inventory reports that give you lists of inventory on hand as well as inventory sold over the past week. The reports are run from data stored within the database management system (DBMS) of the Bookstore. What type of information retrieval tool are you using when running the report?
  2. Reporting tools
  3. Document management tools
  4. Decision Support System
  5. Decision Matrix
  6. Pro/cons analysis

1.00000 points  

QUESTION 36

  1. Auto makers spend a significant amount of time and money developing new automobiles. Often these auto makers create a working mock up for display and testing. What methodology are these automakers using?
  2. Prototyping
  3. Modeling
  4. Maintenance
  5. Spiral Model
  6. Off the shelf

1.00000 points  

QUESTION 37

  1. You have been included on an IT task force for your university. The committee's first priority is wireless access on your campus. The task force chair keeps discussing increasing enrollment numbers. What principle of architecture is the chair most likely alluding to?
  2. ease of implementation
  3. flexibility
  4. control
  5. scalability
  6. security

1.00000 points  

QUESTION 38

  1. Statistical analysis emphasizes ______________ models, while data mining tries to ____________ the models.
  2. concludes, organize
  3. preexisting, discover
  4. definition, explain
  5. described, structure
  6. explicit, recreate

1.00000 points  

QUESTION 39

  1. The Internet has been the contributor to a global platform where organizations across the world can compete for customers and gain access to new __________.
  2. competitors
  3. markets
  4. revenues
  5. employees
  6. Media

1.00000 points  

QUESTION 40

  1. What is a primary focus of supply chain management (SCM)?
  2. Inventory cost reduction
  3. Increased level of customer support
  4. Sales tracking
  5. Outsourcing manufacturing
  6. Unified communication

1.00000 points  

QUESTION 41

  1. Valerie has decided to purchase her first home. Before she begins looking at houses, she has chosen to review her budget, and has decided on a very specific number that she is comfortable with for her monthly mortgage payment. What kind of analysis has Valerie done?
  2. What-if analysis
  3. Goal seeking analysis
  4. Paired comparison
  5. Pros/cons
  6. Decision Matrix

1.00000 points  

QUESTION 42

  1. Encryption is not only used to protect data transmissions, but it can also be used to:
  2. lock out users
  3. protect data on servers
  4. identify viruses
  5. update email
  6. take photographs

1.00000 points  

QUESTION 43

  1. What is the biggest challenge with ERP systems?
  2. Customizing it to the needs of the organization
  3. Efficiency of the system
  4. Cost of the implementation
  5. Customer support
  6. Production time lost

1.00000 points  

QUESTION 44

  1. What type of decision is routine and repetitive and often has well-defined procedures for dealing with them?

  2. Unstructured

  3. Structured
  4. Semi-structured
  5. Unusual
  6. Control

1.00000 points  

QUESTION 45

  1. EDI refers to the _______________ sharing of information between two businesses in a standard format.
  2. electronic
  3. paper
  4. classified
  5. organized
  6. direct

1.00000 points  

QUESTION 46

  1. A system that has been accessed illegally is a victim of ___________.
  2. theft and fraud
  3. unauthorized access
  4. careless behavior
  5. denial of service
  6. automation tools

1.00000 points  

QUESTION 47

  1. When registering online for your classes you log onto to a website provided by your university. The computer and web browser that you are using acts as a _________, while the university computer acts as a ___________.
  2. client, server
  3. server, client
  4. computer, server
  5. browser, client
  6. client, application

1.00000 points  

QUESTION 48

  1. What type of architecture can be used in different systems with different technology platforms?
  2. Service Oriented Architecture
  3. peer-to-peer

  4. Software as a Service (SaaS)
  5. Intranet
  6. VPN

1.00000 points  

QUESTION 49

  1. Which of the following refers to security solutions that protect access to systems, applications, or data by ensuring users or systems are authenticated and allowed to have such access?
  2. Physical access controls
  3. System access controls
  4. User profiles
  5. Logical access controls
  6. Account management

1.00000 points  

QUESTION 50

  1. What do the operational components of a CRM accomplish?
  2. Improve day to day interactions with customers
  3. Lower overall cost of production
  4. Identify customer preferences
  5. Automate customer responses
  6. Determine product location

1.00000 points  

QUESTION 51

  1. What is the second phase of Simon's Information Systems and Decision model which requires developing alternative approaches to bringing about the required change?
  2. Intelligence
  3. Design
  4. Choice
  5. Implementation
  6. Knowledge

1.00000 points  

QUESTION 52

  1. Methods to improve a site's ranking in search engine results are referred to as:
  2. Search engine optimization
  3. Search marketing
  4. Conversion rate
  5. Pay per click
  6. Click through ads

1.00000 points  

QUESTION 53

  1. What describes a series of actions that result in an outcome for an actor?
  2. Outsourcing
  3. Use case
  4. Requirements
  5. Planning
  6. Development

1.00000 points  

QUESTION 54

  1. Search engine results where companies pay for placement are known as ______.
  2. Sponsored links
  3. Pay-per-click
  4. Keyword bidding
  5. Search engine optimization
  6. Organic links

1.00000 points  

QUESTION 55

  1. Information security is not just about technology, but also about management and _________ .
  2. hardware
  3. software
  4. people 
  5. networks
  6. policies

1.00000 points  

QUESTION 56

  1. ___________ are used to determine how well each alternative meets a particular goal or requirement.
  2. Analysis
  3. Comparison
  4. Criteria
  5. Technique
  6. Tool

1.00000 points  

QUESTION 57

  1. An important B2C enabler that allows for users that use a wide variety of platforms to access businesses that also use different platforms is:
  2. Interoperability
  3. OS specific
  4. Platform based
  5. Bandwidth
  6. E-business

1.00000 points  

QUESTION 58

  1. When you shop online, what is an indication that the transaction is secure?
  2. http://
  3. https://
  4. ftp://
  5. smtp
  6. POP3

1.00000 points  

QUESTION 59

  1. __________ refers to mass collaboration of information to solve a problem.
  2. social networking
  3. collaborative content
  4. unified communications
  5. Really Simple Syndication
  6. Crowdsourcing

1.00000 points  

QUESTION 60

  1. Transaction Processing Systems (TPS) can make decisions using predetermined rules and processes. This is an example of a(n) _________ decision of a(n) ____________ control.
  2. unstructured, operational
  3. structured, operational
  4. semi-structured, managerial
  5. unstructured, managerial
  6. structured, strategic

1.00000 points  

QUESTION 61

  1. As the amount of structure in a decision __________, the need for flexibility __________ .
  2. decreases, increases
  3. increases, decreases
  4. decreases, decreases
  5. increases, increases
  6. none of the above

1.00000 points  

QUESTION 62

  1. What is the most critical phase in the detailed decision making process?
  2. Identify and clearly define the problem
  3. Determine requirements and goals
  4. Identify alternatives
  5. Define the criteria
  6. Select a decision making technique

1.00000 points  

QUESTION 63

  1. Innovators are working on Web 3.0. What type of new technology is expected from Web 3.0?
  2. virtualization
  3. instant gratification
  4. signatures
  5. procedures
  6. semantics

1.00000 points  

QUESTION 64

  1. What are cookies?
  2. Small text files that store information
  3. Review IP address to track online browsing
  4. Hidden application to record keystrokes
  5. Malware designed to slow down your PC
  6. Program offered by an organization which post rules

1.00000 points  

QUESTION 65

  1. What term is used to refer to someone (or something) pretending to be someone else (or another computer)?
  2. Phishing
  3. Spoofing
  4. Smurfing
  5. Porting
  6. Break-in

1.00000 points  

QUESTION 66

  1. When you click on a ___________ on your university's homepage, your browser sends a request to the Web server that houses the requested page.
  2. HTTP
  3. hyperlink
  4. desktop
  5. server
  6. protocol

1.00000 points  

QUESTION 67

  1. Which of the following allows companies to pass the operation of their computer systems to another company?
  2. BPaaS
  3. SaaS
  4. PaaS
  5. IaaS
  6. Virtualization

1.00000 points  

QUESTION 68

  1. Many cities across the Unites States are considering fiber networks that would connect commercial and residential areas to a single network. This would be what kind of network?
  2. LAN
  3. PAN
  4. WLAN
  5. WAN
  6. CAN

1.00000 points  

QUESTION 69

  1. What is the term for a computer or a router that controls access in and out of the organization's networks, applications, and computers?
  2. Switch
  3. Bridge
  4. Gateway
  5. Firewall
  6. Hub

1.00000 points  

QUESTION 70

  1. When considering security threats it is very important to consider __________ and __________ of the threat on the organization.
  2. impact, theft
  3. prevalence, impact
  4. repudiation, availability
  5. authenticity, availability
  6. theft, prevalence

1.00000 points  

QUESTION 71

  1. On a recent trip to my local grocery store, I noticed that ping pong balls are available for sale in the same aisle where beer and other spirits are sold. What component of a CRM likely made the management at this store consider placing these items next to each other?
  2. Operational
  3. Collaborative
  4. Analytical
  5. Direct
  6. Unified

1.00000 points  

QUESTION 72

  1. In February of 2011 the Internet Assigned Number Authority (IANA) assigned the last block of IPv4 addresses. What is the new address standard?
  2. IPv5
  3. IPv6
  4. MAC address
  5. DARPA
  6. virtual address

1.00000 points  

QUESTION 73

  1. Strategic planning often involves _____________ decisions because it is very difficult to anticipate the information needs of managers involved in strategic planning.
  2. structured
  3. flexible
  4. controlled
  5. strategic
  6. unstructured

1.00000 points  

QUESTION 74

  1. The Institutional Research department at your university gathers data on nearly everything on campus. At first the department used spreadsheets to maintain the data, but more sophisticated statistical methods are required for the data. What type of tool does the Institutional Research department likely need?
  2. Reporting tools
  3. What-if analysis
  4. Dedicated statistical software
  5. Data visualization software
  6. DBMS

1.00000 points  

QUESTION 75

  1. ____________ refers to having some level of control over potential secondary uses of one's personal information.
  2. Information privacy
  3. Information security
  4. Information assurance
  5. Data collection threat
  6. Accessibility

1.00000 points  

QUESTION 76

  1. What allows one physical device such as a server or computer to operate as if it was several machines?
  2. Software as a Service
  3. Service Oriented Architecture
  4. virtualization
  5. Web 2.0
  6. unified communications

1.00000 points  

QUESTION 77

  1. A Web merchant wants to ensure that people cannot deny that they entered into a transaction, so they starting using digital signatures and encryption as part of their transaction processing.  This is an example of what?
  2. Integrity
  3. Availability
  4. Confidentiality
  5. Authenticity
  6. Non-repudiation

1.00000 points  

QUESTION 78

  1. In order for you to enter the server room at your office you must have a key to the room, and then you must have a proper user name and password to access the server. All of the student files on the server are encrypted. What is this called?
  2. Layered security
  3. Overkill
  4. Defense in depth
  5. Organizational policy
  6. Information security

1.00000 points  

QUESTION 79

  1. ___________ involves making sure that information or data can only be accessed by individuals with authorized access.
  2. Integrity
  3. Availability
  4. Confidentiality
  5. Authenticity
  6. Non-repudiation

1.00000 points  

QUESTION 80

  1. The fastest transmission speeds on cables for a wired network are ______________, while ___________ are the slowest.
  2. coaxial, fiber
  3. fiber, copper
  4. copper, coaxial
  5. copper, fiber
  6. fiber, coaxial

Recently Asked Questions

Why Join Course Hero?

Course Hero has all the homework and study help you need to succeed! We’ve got course-specific notes, study guides, and practice tests along with expert tutors.

-

Educational Resources
  • -

    Study Documents

    Find the best study resources around, tagged to your specific courses. Share your own to gain free Course Hero access.

    Browse Documents
  • -

    Question & Answers

    Get one-on-one homework help from our expert tutors—available online 24/7. Ask your own questions or browse existing Q&A threads. Satisfaction guaranteed!

    Ask a Question