Search
Info
Warning
Danger

Study Resources (Accounting)

61) In terms of data relationships, associations refers to A) events linked over time. B) patterns that describe a group to which an item belongs. C) occurrences linked to a single event. D) undiscovered groupings. 62) ________ tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover.
0 Views
View Answer
61) Which of the following is the greatest threat that employees pose to an organization's information systems? A) forgetting passwords B) lack of knowledge C) entering faulty data D) introducing software errors 62) Currently, the protocols used for secure information transfer over the Internet are A) TCP/IP and SSL. B) S-HTTP and CA. C) HTTP and TCP/IP. D) SSL,.
0 Views
View Answer
87) Describe the ways in which database technologies could be used by an office stationery supply company to achieve low-cost leadership. 88) Describe the ways in which database technologies could be used by a toy manufacturer to achieve product differentiation. 89) What makes data mining an important business tool? What types of.
1 Views
View Answer
41) Compared to traditional markets, digital markets have A) lower distributed delivery costs. B) higher marginal costs per unit. C) equivalent copying costs. D) similar inventory costs. 42) eBay is an example of A) C2C e-commerce. B) B2B e-commerce. C) B2C e-commerce. D) M-commerce. 43) Selling products and services directly to individual consumers via the Internet best describes A) B2B e-commerce. B).
0 Views
View Answer
51) Application controls A) can be classified as input controls, processing controls, and output controls. B) govern the design, security, and use of computer programs and the security of data files in general throughout the organization. C) apply to all computerized applications and consist of a combination of hardware, software, and manual procedures.
0 Views
View Answer
71) Databases record information about general categories of information referred to as ________. 72) To analyze unstructured data, such as memos and legal cases, you would use ________ tools. 73) A(n) ________ view shows data as it is actually organized and structured on the data storage media. 74) DBMS have a(n) ________ capability.
0 Views
View Answer
83) Identify two classifications for supply chain software. For each classification, identify five capabilities. 84) What additional complexities are faced in global supply chains? How does the Internet help in managing global supply chains? 85) Identify two supply chain models. Which is better? .
0 Views
View Answer
85) Why is software quality important to security? What specific steps can an organization take to ensure software quality? 86) Hackers and their companion viruses are an increasing problem, especially on the Internet. What are the most important measurers for a firm to take to protect itself from this? Is full.
0 Views
View Answer
21) From your reading of the chapter's opening case, NVIDIA implemented new information systems in order to achieve which of the following business objectives? A) customer and supplier intimacy B) operational excellence C) survival D) improved decision making 22) Which of the following is not an example of the benefits enterprise systems provide to firms? A).
0 Views
View Answer
61) An extranet that links a large firm to its suppliers and other key business partners is called a(n) A) e-hub. B) marketspace. C) exchange. D) private industrial network. 62) E-hubs are more ________ than private industrial networks. A) transaction-oriented B) collaborative C) independent D) supply-chain oriented 63) A mapping of a person's significant online, personal relationships is called a.
0 Views
View Answer
21) The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n) A) hub. B) switch. C) router. D) NIC. 22) The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP B) TCP/IP, HTTP, and packet switching C) client/server computing, packet switching,.
1 Views
View Answer
89) Define a fault-tolerant computer system and a high-availability computer system. How do they differ? When would each be used? 90) How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more .
1 Views
View Answer
51) ________ modules use many of the same data, tools, and systems as CRM to enhance collaboration between a company and its selling partners. A) SCM B) SFA C) ERM D) PRM 52) ________ modules deal with issues such as setting objectives, employee performance management, and performance-based compensation. A) SCM B) SFA C) ERM D) PRM 53) Customer relationship management.
0 Views
View Answer
89) Plant Away is an Oregon-based retailer and distributor of trees and shrubs. They have hundreds of smaller nurseries based around the country that grow the plant stock. The majority of their business is conducted online. Consumers purchase typically small quantities of products online and Plant Away coordinates the shipping.
0 Views
View Answer
11) In a walkthrough, hackers are able to bypass security controls of a system with little opposition. 12) Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years. 13) An acceptable use policy defines the.
2 Views
View Answer
1) Telephone networks are fundamentally different from computer networks. 2) Wikis allow visitors to change or add to the original posted material. 3) An NOS must reside on a dedicated server computer in order to manage a network. 4) A hub is a networking device that connects network components and is used to.
4 Views
View Answer
41) The total amount of digital information that can be transmitted through any telecommunications medium is measured in A) bps. B) Hertz. C) baud. D) gigaflops. 42) Digital subscriber lines A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are very-high-speed data lines typically leased.
0 Views
View Answer
51) Instant messaging is a type of ________ service. A) chat B) cellular C) e-mail D) wireless 52) Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact.
0 Views
View Answer
61) Which of the following is the first generation of cellular systems suitable for watching videos? A) 2G B) 2.5G C) 3G D) 4G 62) 4G networks are also known as ________ networks. A) GSM B) CDMA C) LTD D) T-Mobile 63) The most appropriate wireless networking standard for creating PANs is A) I-mode. B) IEEE 802.11b. C) Wi-Fi. D) Bluetooth. 64) Bluetooth can be.
1 Views
View Answer
11) Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire. 12) Fiber-optic cable is more expensive and harder to install than wire media. 13) The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes. 14) The Domain.
1 Views
View Answer
1) E-commerce refers to the use of any networking technologies to transact business. 2) Consumer e-commerce is still growing at approximately 25% annually. 3) The Internet shrinks information asymmetry. 4) Eighty-five percent of online retailers now have m-commerce Web sites. 5) All previous mass media in modern history, including the printing press, use a.
5 Views
View Answer
86) Identify and describe the two types of customer relationship management applications. 87) Identify five benefits of customer relationship management systems. 88) You have been hired by Santori, Inc., a small company that imports and distributes an Italian sparkling water. The company is interested in what benefits an enterprise system would bring..
0 Views
View Answer
21) ________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems. A) "Security" B) "Controls" C) "Benchmarking" D) "Algorithms" 22) ________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of.
0 Views
View Answer
71) A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as ________. 72) Malicious software programs referred to as ________ include a variety of threats such as computer viruses, worms, and Trojan horses. 73) ________ is a crime in which.
0 Views
View Answer
71) ________ systems are based on a suite of software models used to support business activities across the firm. 72) As they move through the ________, raw materials are transformed into finished products and shipped to retailers and customers. 73) The total time it takes to complete a business process, from start.
0 Views
View Answer
1) Firms can use social networking sites to improve their efficiency in customer service. 2) PRM provides a firm and its distributors trade information and distributes leads about customers. 3) Enterprise systems are strictly internally oriented; other types of enterprise applications must be used for communicating with customers and suppliers. 4) The upstream.
5 Views
View Answer
31) Which type of network is used to connect digital devices within a half-mile or 500-meter radius? A) Wi-Fi B) LAN C) WAN D) MAN 32) Which type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate server? A) peer-to-peer B) wireless C) LAN D) Windows domain network 33) Which type.
0 Views
View Answer
41) Evil twins are A) Trojan horses that appears to the user to be a legitimate commercial software application. B) e-mail messages that mimic the e-mail messages of a legitimate business. C) fraudulent Web sites that mimic a legitimate business's Web site. D) bogus wireless network access points that look legitimate to users. 42) Pharming.
0 Views
View Answer
61) Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance best describes ________ applications. A) operational CRM B) analytical CRM C) operational SCM D) analytical SFA 62) Operational CRM applications include tools for A) identifying buying patterns. B) calculating CLTV. C) salesforce automation. D) pinpointing unprofitable customers. 63) Analytical CRM applications A).
0 Views
View Answer
51) In which of the following revenue models does a Web site charge a fee for access to some or all of its offerings on a continual, regular basis? A) subscription B) free/freemium C) transaction fee D) sales Answer:  A Diff: 2     Page Ref: 389 AACSB:  Reflective thinking skills CASE:  Comprehension Objective:  10.2 52) Which of the following best illustrates.
0 Views
View Answer
11) Podcasting allows subscribers to listen to live, streaming radio and other audio content. 12) Intellectual property refers to all forms of human expression, both tangible and intangible. 13) Ninety-six percent of all U.S. households with Internet access use a broadband connection. 14) Behavioral targeting occurs at two levels: individual Web sites and.
0 Views
View Answer
31) The lowered costs of information storage, processing, and communication, along with the improvement of data quality, has resulted in which unique quality of e-commerce? A) information density B) richness C) customization D) interactivity 32) The effort required to locate a suitable product is called A) price discrimination. B) search costs. C) menu costs. D) shopping costs. 33) Information density.
0 Views
View Answer
31) A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the A) supplier's internal supply chain. B) external supply chain. C) upstream portion of the supply chain. D) downstream portion of the supply chain. 32) A company's organizations and processes for distributing and delivering products to the final customers is.
0 Views
View Answer
41) Which supply chain planning function determines how much product is needed to satisfy all customer demands? A) distribution management B) replenishment planning C) demand planning D) order planning 42) Supply chain ________ systems manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in.
0 Views
View Answer
21) Through what channel did e-commerce first evolve? A) online advertising sales B) Internet portals C) online book sales D) Internet service providers 22) Which of the following is not one of the current main areas of growth in mobile e-commerce? A) sales of financial services B) retail sales at the top mobile companies C) sales of digital.
0 Views
View Answer