Info
Warning
Danger

Accounting Expert Answers, Study Resources & Learning Aids

The vast field of accounting contributes to one of the largest subjects in our study resources. Accounting flashcards, homework answers for textbooks & other learning aids can increase your competency in this domain instantly. Become a top student with our support. Search Now…

Ask an Expert

Our Experts can answer your tough homework and study questions.

Answers in as fast as 15 minutes
Post a Question
61) Which of the following is the first generation of cellular systems suitable for watching videos? A) 2G B) 2.5G C) 3G D) 4G 62) 4G networks are also known as ________ networks. A) GSM B) CDMA C) LTD D) T-Mobile 63) The most appropriate wireless networking standard for creating PANs is A) I-mode. B) IEEE 802.11b. C) Wi-Fi. D) Bluetooth. 64) Bluetooth can be.
9 Views
View Answer
89) Define a fault-tolerant computer system and a high-availability computer system. How do they differ? When would each be used? 90) How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more .
13 Views
View Answer
11) Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire. 12) Fiber-optic cable is more expensive and harder to install than wire media. 13) The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes. 14) The Domain.
13 Views
View Answer
86) Identify and describe the two types of customer relationship management applications. 87) Identify five benefits of customer relationship management systems. 88) You have been hired by Santori, Inc., a small company that imports and distributes an Italian sparkling water. The company is interested in what benefits an enterprise system would bring..
6 Views
View Answer
21) The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n) A) hub. B) switch. C) router. D) NIC. 22) The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP B) TCP/IP, HTTP, and packet switching C) client/server computing, packet switching,.
6 Views
View Answer
61) Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance best describes ________ applications. A) operational CRM B) analytical CRM C) operational SCM D) analytical SFA 62) Operational CRM applications include tools for A) identifying buying patterns. B) calculating CLTV. C) salesforce automation. D) pinpointing unprofitable customers. 63) Analytical CRM applications A).
7 Views
View Answer
1) E-commerce refers to the use of any networking technologies to transact business. 2) Consumer e-commerce is still growing at approximately 25% annually. 3) The Internet shrinks information asymmetry. 4) Eighty-five percent of online retailers now have m-commerce Web sites. 5) All previous mass media in modern history, including the printing press, use a.
21 Views
View Answer
71) ________ systems are based on a suite of software models used to support business activities across the firm. 72) As they move through the ________, raw materials are transformed into finished products and shipped to retailers and customers. 73) The total time it takes to complete a business process, from start.
5 Views
View Answer
51) Application controls A) can be classified as input controls, processing controls, and output controls. B) govern the design, security, and use of computer programs and the security of data files in general throughout the organization. C) apply to all computerized applications and consist of a combination of hardware, software, and manual procedures.
9 Views
View Answer
71) A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as ________. 72) Malicious software programs referred to as ________ include a variety of threats such as computer viruses, worms, and Trojan horses. 73) ________ is a crime in which.
8 Views
View Answer
21) Through what channel did e-commerce first evolve? A) online advertising sales B) Internet portals C) online book sales D) Internet service providers 22) Which of the following is not one of the current main areas of growth in mobile e-commerce? A) sales of financial services B) retail sales at the top mobile companies C) sales of digital.
7 Views
View Answer
61) In terms of data relationships, associations refers to A) events linked over time. B) patterns that describe a group to which an item belongs. C) occurrences linked to a single event. D) undiscovered groupings. 62) ________ tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover.
12 Views
View Answer
41) Evil twins are A) Trojan horses that appears to the user to be a legitimate commercial software application. B) e-mail messages that mimic the e-mail messages of a legitimate business. C) fraudulent Web sites that mimic a legitimate business's Web site. D) bogus wireless network access points that look legitimate to users. 42) Pharming.
9 Views
View Answer
71) Databases record information about general categories of information referred to as ________. 72) To analyze unstructured data, such as memos and legal cases, you would use ________ tools. 73) A(n) ________ view shows data as it is actually organized and structured on the data storage media. 74) DBMS have a(n) ________ capability.
10 Views
View Answer
61) Which of the following is the greatest threat that employees pose to an organization's information systems? A) forgetting passwords B) lack of knowledge C) entering faulty data D) introducing software errors 62) Currently, the protocols used for secure information transfer over the Internet are A) TCP/IP and SSL. B) S-HTTP and CA. C) HTTP and TCP/IP. D) SSL,.
7 Views
View Answer
11) In a walkthrough, hackers are able to bypass security controls of a system with little opposition. 12) Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years. 13) An acceptable use policy defines the.
20 Views
View Answer
31) Which type of network is used to connect digital devices within a half-mile or 500-meter radius? A) Wi-Fi B) LAN C) WAN D) MAN 32) Which type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate server? A) peer-to-peer B) wireless C) LAN D) Windows domain network 33) Which type.
10 Views
View Answer
83) Identify two classifications for supply chain software. For each classification, identify five capabilities. 84) What additional complexities are faced in global supply chains? How does the Internet help in managing global supply chains? 85) Identify two supply chain models. Which is better? .
9 Views
View Answer
87) Describe the ways in which database technologies could be used by an office stationery supply company to achieve low-cost leadership. 88) Describe the ways in which database technologies could be used by a toy manufacturer to achieve product differentiation. 89) What makes data mining an important business tool? What types of.
14 Views
View Answer
31) A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the A) supplier's internal supply chain. B) external supply chain. C) upstream portion of the supply chain. D) downstream portion of the supply chain. 32) A company's organizations and processes for distributing and delivering products to the final customers is.
7 Views
View Answer
21) Which of the following best illustrates the relationship between entities and attributes? A) the entity CUSTOMER with the attribute PRODUCT B) the entity CUSTOMER with the attribute PURCHASE C) the entity PRODUCT with the attribute PURCHASE D) the entity PRODUCT with the attribute CUSTOMER 22) Which of the following is not one of the.
10 Views
View Answer
41) The total amount of digital information that can be transmitted through any telecommunications medium is measured in A) bps. B) Hertz. C) baud. D) gigaflops. 42) Digital subscriber lines A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are very-high-speed data lines typically leased.
9 Views
View Answer
31) The lowered costs of information storage, processing, and communication, along with the improvement of data quality, has resulted in which unique quality of e-commerce? A) information density B) richness C) customization D) interactivity 32) The effort required to locate a suitable product is called A) price discrimination. B) search costs. C) menu costs. D) shopping costs. 33) Information density.
8 Views
View Answer
85) Why is software quality important to security? What specific steps can an organization take to ensure software quality? 86) Hackers and their companion viruses are an increasing problem, especially on the Internet. What are the most important measurers for a firm to take to protect itself from this? Is full.
9 Views
View Answer
11) Podcasting allows subscribers to listen to live, streaming radio and other audio content. 12) Intellectual property refers to all forms of human expression, both tangible and intangible. 13) Ninety-six percent of all U.S. households with Internet access use a broadband connection. 14) Behavioral targeting occurs at two levels: individual Web sites and.
8 Views
View Answer
41) Which supply chain planning function determines how much product is needed to satisfy all customer demands? A) distribution management B) replenishment planning C) demand planning D) order planning 42) Supply chain ________ systems manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in.
8 Views
View Answer
1) Telephone networks are fundamentally different from computer networks. 2) Wikis allow visitors to change or add to the original posted material. 3) An NOS must reside on a dedicated server computer in order to manage a network. 4) A hub is a networking device that connects network components and is used to.
21 Views
View Answer
21) From your reading of the chapter's opening case, NVIDIA implemented new information systems in order to achieve which of the following business objectives? A) customer and supplier intimacy B) operational excellence C) survival D) improved decision making 22) Which of the following is not an example of the benefits enterprise systems provide to firms? A).
13 Views
View Answer
51) ________ modules use many of the same data, tools, and systems as CRM to enhance collaboration between a company and its selling partners. A) SCM B) SFA C) ERM D) PRM 52) ________ modules deal with issues such as setting objectives, employee performance management, and performance-based compensation. A) SCM B) SFA C) ERM D) PRM 53) Customer relationship management.
6 Views
View Answer
51) Instant messaging is a type of ________ service. A) chat B) cellular C) e-mail D) wireless 52) Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact.
7 Views
View Answer
31) The type of logical database model that treats data as if they were stored in two-dimensional tables is the A) non-relational DBMS. B) mobile DBMS. C) relational DBMS. D) hierarchical DBMS. 32) Oracle Database Lite is a(n) A) DBMS for small handheld computing devices. B) Internet DBMS. C) mainframe relational DBMS. D) DBMS for midrange computers. 33) Microsoft SQL.
6 Views
View Answer
1) Firms can use social networking sites to improve their efficiency in customer service. 2) PRM provides a firm and its distributors trade information and distributes leads about customers. 3) Enterprise systems are strictly internally oriented; other types of enterprise applications must be used for communicating with customers and suppliers. 4) The upstream.
25 Views
View Answer
89) Plant Away is an Oregon-based retailer and distributor of trees and shrubs. They have hundreds of smaller nurseries based around the country that grow the plant stock. The majority of their business is conducted online. Consumers purchase typically small quantities of products online and Plant Away coordinates the shipping.
10 Views
View Answer
21) ________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems. A) "Security" B) "Controls" C) "Benchmarking" D) "Algorithms" 22) ________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of.
9 Views
View Answer
41) The project operation A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table. C) organizes elements into segments. D) identifies the table from which the columns will be selected. 42) Big data does not refer to A) datasets with fewer.
7 Views
View Answer

Can't find what you're looking for ?

Ask our exprts a study questions, on us.
Get free Homework Help*