Online Exam 4
Question 1
A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor’s advertising costs up. This is an example of:
Question options:
phishing.
pharming.
spoofing.
click fraud.
Question 2
The total amount of digital information that can be transmitted through any telecommunications medium is measured in:
Question options:
bps.
Hertz.
baud.
gigaflops.
Question 3
Which of the following specifications replaces WEP with a stronger security standard that features changing encryption keys?
Question options:
TLS
AUP
VPN
WPA2
Question 4
T1 lines:
Question options:
operate over existing telephone lines to carry voice, data, and video.
operate over coaxial lines to deliver Internet access.
do not provide guaranteed service levels, but simply "best effort."
are high-speed, leased data lines providing guaranteed service levels.
Question 5
Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents?
Question options:
MAN
Domain-based LAN
Peer-to-peer network
WAN
Question 6
What are the four layers of the TCP/IP reference model?
Question options:
Physical, application, transport, and network interface
Physical, application, Internet, and network interface
Application, transport, Internet, and network interface
Application, hardware, Internet, and network interface
Question 7
Which of the following is a type of ambient data?
Question options:
Computer log containing recent system errors
A file deleted from a hard disk
A file that contains an application’s user settings
A set of raw data from an environmental sensor
Question 8
Which of the following is NOT a characteristic of packet switching?
Question options:
Packets travel independently of each other.
Packets are routed through many different paths.
Packet switching requires point-to-point circuits.
Packets are reassembled into the original message when they reach their destinations.
Question 9
The Internet is based on which three key technologies?
Question options:
TCP/IP, HTML, and HTTP
TCP/IP, HTTP, and packet switching
Client/server computing, packet switching, and the development of communications standards for linking networks and computers
Client/server computing, packet switching, and HTTP
Question 10
Which signal types are represented by a continuous waveform?
Question options:
Laser
Optical
Digital
Analog
Question 11
Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n):
Question options:
security policy.
AUP.
risk assessment.
business impact analysis.
Question 12
“Predictive search” in Google’s search engine:
Question options:
predicts what you are looking for as you enter words into the query box.
uses a tracking service and cookies on your browser to predict search results.
uses a knowledge graph of what similar people searched on to predict your search interests.
uses a semantic approach to predict what you are looking for.
Question 13
The telephone system is an example of a __________ network.
Question options:
peer-to-peer
wireless
packet-switched
circuit-switched
Question 14
A(n) __________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.
Question options:
RFID receiver
WiMax receiver
access point
hub
Question 15
The concept of a future Web in which it is commonplace for everyday objects to be connected, controlled, or monitored over the Internet is called:
Question options:
the Internet of Things.
the Semantic Web.
Internet2.
a 3-D Web.
Question 16
Biometric authentication:
Question options:
is inexpensive.
is used widely in Europe for security applications.
can use a person’s voice as a unique, measurable trait.
only uses physical measurements for identification.
Question 17
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
Question options:
SSL/TLS
Symmetric key encryption
Public key encryption
Private key encryption
Question 18
A foreign country attempting to access government networks in order to disable a national power grid would be an example of:
Question options:
phishing.
denial-of-service attacks.
cyberwarfare.
cyberterrorism.
Question 19
The child domain of the root is the:
Question options:
top-level domain.
second-level domain.
host name.
domain extension.
Question 20
Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?
Question options:
MAN
Wireless
LAN
Peer-to-peer
Online Exam 5
Question 21
Customer relationship management systems typically provide software and online tools for sales, customer service, and:
Question options:
marketing.
account management.
advertising.
public relations.
Question 22
Netflix’s public announcement of a reward for a technology solution to its movie recommendation system is an example of:
Question options:
prediction markets.
behavioral targeting.
crowdsourcing.
social shopping.
Question 23
Which of the following best describes the digital social graph?
Question options:
A person’s direct and indirect relationships
All of a person’s closest digital relationships
A mapping of all online social relationships
All of the online and offline relationships a person has
Question 24
Operational CRM applications include tools for:
Question options:
identifying buying patterns.
calculating CLTV.
sales force automation.
pinpointing unprofitable customers.
Question 25
__________ CRM includes customer-facing applications such as tools for sales force automation, call center and customer service support, and marketing automation.
Question options:
Analytical
Employee
Operational
Partner
Question 26
What is the difference between personalization and customization, as applied to e-commerce technologies?
Question options:
Customization is any type of adjustment made to a product <em>by </em> the user; personalization refers to a business changing a product or service <em>for </em> the user.
Personalization is any type of adjustment made to a product <em>by </em> the user; customization refers to a business changing a product or service <em>for </em> the user.
Customization refers to adjusting marketing messages for a consumer; personalization refers to adjusting a product or service based on a user’s preferences.
Personalization refers to adjusting marketing messages for a consumer; customization refers to adjusting a product or service based on a user’s preferences.
Question 27
Which of the following best illustrates the sales revenue model?
Question options:
eBay receives a small fee from a seller if a seller is successful in selling an item.
Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase.
Flickr provides basic services for free, but charges a premium for advanced services.
Apple accepts micropayments for single music track downloads.
Question 28
The business value of an effective supply chain management system includes all of the following EXCEPT:
Question options:
faster time to market.
cost reduction.
supply matched to demand.
improved delivery service.
Question 29
Compared to digital markets, traditional markets have:
Question options:
lower search costs.
stronger network effects.
higher delayed gratification effects.
higher transaction costs.
Question 30
Enterprise software is built around thousands of predefined business processes that reflect:
Question options:
the firm’s organization.
industry goals.
best practices.
cutting edge workflow analyses.
Question 31
Which of the following is NOT one of four types of presence to be considered when building an E-commerce presence?
Question options:
Offline media
Websites
Social media
Corporate
Question 32
In order to achieve maximum benefit from an enterprise software package, a business:
Question options:
customizes the software to match all of its business processes.
uses only the processes in the software that match its own processes.
changes the way it works to match the software’s business processes.
selects only the software that best matches its existing business processes.
Question 33
Supply chain software can be classified as either supply chain __________ systems or supply chain __________ systems.
Question options:
planning; execution
demand; continual
upstream; downstream
push; pull
Question 34
Content providers use __________ systems to process large amounts of very small monetary transactions cost-effectively.
Question options:
subscription
mobile payment
transaction fee
micropayment
Question 35
Walmart’s continuous replenishment system is an example of a __________ model.
Question options:
push-based
pull-based
enterprise-based
supply chain optimization
Question 36
A third-party Net marketplace that connects many buyers and suppliers for spot purchasing is called a(n):
Question options:
exchange.
vertical market.
private exchange.
e-hub.
Question 37
A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes:
Question options:
process management software.
ERP systems.
groupware.
application software.
Question 38
Net marketplaces:
Question options:
focus on continuous business process coordination between companies for supply chain management.
are industry owned or operate as independent intermediaries between buyers and sellers.
are geared towards short-term spot purchasing.
are more relationship oriented than private industrial networks.
Question 39
Which of the following is NOT an example of next-generation enterprise applications?
Question options:
Open-source solutions
Social CRM
Solutions incorporating SCM
Solutions incorporating SOA
Question 40
Information density refers to the:
Question options:
richness—complexity and content—of a message.
total amount and quantity of information delivered to consumers by merchants.
total amount and quantity of information available to all market participants.
amount of information available to reduce price transparency.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more