A salesperson clicks repeatedly on the online ads of a competitor in

Online Exam 4

Question 1

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor’s advertising costs up. This is an example of:

Question options:

phishing.

pharming.

spoofing.

click fraud.

Question 2

The total amount of digital information that can be transmitted through any telecommunications medium is measured in:

Question options:

bps.

Hertz.

baud.

gigaflops.

Question 3

Which of the following specifications replaces WEP with a stronger security standard that features changing encryption keys?

Question options:

TLS

AUP

VPN

WPA2

Question 4

T1 lines:

Question options:

operate over existing telephone lines to carry voice, data, and video.

operate over coaxial lines to deliver Internet access.

do not provide guaranteed service levels, but simply "best effort."

are high-speed, leased data lines providing guaranteed service levels.

Question 5

Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents?

Question options:

MAN

Domain-based LAN

Peer-to-peer network

WAN

Question 6

What are the four layers of the TCP/IP reference model?

Question options:

Physical, application, transport, and network interface

Physical, application, Internet, and network interface

Application, transport, Internet, and network interface

Application, hardware, Internet, and network interface

Question 7

Which of the following is a type of ambient data?

Question options:

Computer log containing recent system errors

A file deleted from a hard disk

A file that contains an application’s user settings

A set of raw data from an environmental sensor

Question 8

Which of the following is NOT a characteristic of packet switching?

Question options:

Packets travel independently of each other.

Packets are routed through many different paths.

Packet switching requires point-to-point circuits.

Packets are reassembled into the original message when they reach their destinations.

Question 9

The Internet is based on which three key technologies?

Question options:

TCP/IP, HTML, and HTTP

TCP/IP, HTTP, and packet switching

Client/server computing, packet switching, and the development of communications standards for linking networks and computers

Client/server computing, packet switching, and HTTP

Question 10

Which signal types are represented by a continuous waveform?

Question options:

Laser

Optical

Digital

Analog

Question 11

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n):

Question options:

security policy.

AUP.

risk assessment.

business impact analysis.

Question 12

“Predictive search” in Google’s search engine:

Question options:

predicts what you are looking for as you enter words into the query box.

uses a tracking service and cookies on your browser to predict search results.

uses a knowledge graph of what similar people searched on to predict your search interests.

uses a semantic approach to predict what you are looking for.

Question 13

The telephone system is an example of a __________ network.

Question options:

peer-to-peer

wireless

packet-switched

circuit-switched

Question 14

A(n) __________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.

Question options:

RFID receiver

WiMax receiver

access point

hub

Question 15

The concept of a future Web in which it is commonplace for everyday objects to be connected, controlled, or monitored over the Internet is called:

Question options:

the Internet of Things.

the Semantic Web.

Internet2.

a 3-D Web.

Question 16

Biometric authentication:

Question options:

is inexpensive.

is used widely in Europe for security applications.

can use a person’s voice as a unique, measurable trait.

only uses physical measurements for identification.

Question 17

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

Question options:

SSL/TLS

Symmetric key encryption

Public key encryption

Private key encryption

Question 18

A foreign country attempting to access government networks in order to disable a national power grid would be an example of:

Question options:

phishing.

denial-of-service attacks.

cyberwarfare.

cyberterrorism.

Question 19

The child domain of the root is the:

Question options:

top-level domain.

second-level domain.

host name.

domain extension.

Question 20

Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?

Question options:

MAN

Wireless

LAN

Peer-to-peer

Online Exam 5

Question 21

Customer relationship management systems typically provide software and online tools for sales, customer service, and:

Question options:

marketing.

account management.

advertising.

public relations.

Question 22

Netflix’s public announcement of a reward for a technology solution to its movie recommendation system is an example of:

Question options:

prediction markets.

behavioral targeting.

crowdsourcing.

social shopping.

Question 23

Which of the following best describes the digital social graph?

Question options:

A person’s direct and indirect relationships

All of a person’s closest digital relationships

A mapping of all online social relationships

All of the online and offline relationships a person has

Question 24

Operational CRM applications include tools for:

Question options:

identifying buying patterns.

calculating CLTV.

sales force automation.

pinpointing unprofitable customers.

Question 25

__________ CRM includes customer-facing applications such as tools for sales force automation, call center and customer service support, and marketing automation.

Question options:

Analytical

Employee

Operational

Partner

Question 26

What is the difference between personalization and customization, as applied to e-commerce technologies?

Question options:

Customization is any type of adjustment made to a product <em>by </em> the user; personalization refers to a business changing a product or service <em>for </em> the user.

Personalization is any type of adjustment made to a product <em>by </em> the user; customization refers to a business changing a product or service <em>for </em> the user.

Customization refers to adjusting marketing messages for a consumer; personalization refers to adjusting a product or service based on a user’s preferences.

Personalization refers to adjusting marketing messages for a consumer; customization refers to adjusting a product or service based on a user’s preferences.

Question 27

Which of the following best illustrates the sales revenue model?

Question options:

eBay receives a small fee from a seller if a seller is successful in selling an item.

Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase.

Flickr provides basic services for free, but charges a premium for advanced services.

Apple accepts micropayments for single music track downloads.

Question 28

The business value of an effective supply chain management system includes all of the following EXCEPT:

Question options:

faster time to market.

cost reduction.

supply matched to demand.

improved delivery service.

Question 29

Compared to digital markets, traditional markets have:

Question options:

lower search costs.

stronger network effects.

higher delayed gratification effects.

higher transaction costs.

Question 30

Enterprise software is built around thousands of predefined business processes that reflect:

Question options:

the firm’s organization.

industry goals.

best practices.

cutting edge workflow analyses.

Question 31

Which of the following is NOT one of four types of presence to be considered when building an E-commerce presence?

Question options:

Offline media

Websites

Social media

Corporate

Question 32

In order to achieve maximum benefit from an enterprise software package, a business:

Question options:

customizes the software to match all of its business processes.

uses only the processes in the software that match its own processes.

changes the way it works to match the software’s business processes.

selects only the software that best matches its existing business processes.

Question 33

Supply chain software can be classified as either supply chain __________ systems or supply chain __________ systems.

Question options:

planning; execution

demand; continual

upstream; downstream

push; pull

Question 34

Content providers use __________ systems to process large amounts of very small monetary transactions cost-effectively.

Question options:

subscription

mobile payment

transaction fee

micropayment

Question 35

Walmart’s continuous replenishment system is an example of a __________ model.

Question options:

push-based

pull-based

enterprise-based

supply chain optimization

Question 36

A third-party Net marketplace that connects many buyers and suppliers for spot purchasing is called a(n):

Question options:

exchange.

vertical market.

private exchange.

e-hub.

Question 37

A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes:

Question options:

process management software.

ERP systems.

groupware.

application software.

Question 38

Net marketplaces:

Question options:

focus on continuous business process coordination between companies for supply chain management.

are industry owned or operate as independent intermediaries between buyers and sellers.

are geared towards short-term spot purchasing.

are more relationship oriented than private industrial networks.

Question 39

Which of the following is NOT an example of next-generation enterprise applications?

Question options:

Open-source solutions

Social CRM

Solutions incorporating SCM

Solutions incorporating SOA

Question 40

Information density refers to the:

Question options:

richness—complexity and content—of a message.

total amount and quantity of information delivered to consumers by merchants.

total amount and quantity of information available to all market participants.

amount of information available to reduce price transparency.

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more