Online Exam 4 |
Question 1 |
A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:
Question options:
| phishing. |
| pharming. |
| spoofing. |
| click fraud. |
Question 2 |
The total amount of digital information that can be transmitted through any telecommunications medium is measured in:
Question options:
| bps. |
| Hertz. |
| baud. |
| gigaflops. |
Question 3 |
Which of the following specifications replaces WEP with a stronger security standard that features changing encryption keys?
Question options:
| TLS |
| AUP |
| VPN |
| WPA2 |
Question 4 |
T1 lines:
Question options:
| operate over existing telephone lines to carry voice, data, and video. |
| operate over coaxial lines to deliver Internet access. |
| do not provide guaranteed service levels, but simply "best effort." |
| are high-speed, leased data lines providing guaranteed service levels. |
Question 5 |
Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents?
Question options:
| MAN |
| Domain-based LAN |
| Peer-to-peer network |
| WAN |
Question 6 |
What are the four layers of the TCP/IP reference model?
Question options:
| Physical, application, transport, and network interface |
| Physical, application, Internet, and network interface |
| Application, transport, Internet, and network interface |
| Application, hardware, Internet, and network interface |
Question 7 |
Which of the following is a type of ambient data?
Question options:
| Computer log containing recent system errors |
| A file deleted from a hard disk |
| A file that contains an application's user settings |
| A set of raw data from an environmental sensor |
Question 8 |
Which of the following is NOT a characteristic of packet switching?
Question options:
| Packets travel independently of each other. |
| Packets are routed through many different paths. |
| Packet switching requires point-to-point circuits. |
| Packets are reassembled into the original message when they reach their destinations. |
Question 9 |
The Internet is based on which three key technologies?
Question options:
| TCP/IP, HTML, and HTTP |
| TCP/IP, HTTP, and packet switching |
| Client/server computing, packet switching, and the development of communications standards for linking networks and computers |
| Client/server computing, packet switching, and HTTP |
Question 10 |
Which signal types are represented by a continuous waveform?
Question options:
| Laser |
| Optical |
| Digital |
| Analog |
Question 11 |
Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n):
Question options:
| security policy. |
| AUP. |
| risk assessment. |
| business impact analysis. |
Question 12 |
"Predictive search" in Google's search engine:
Question options:
| predicts what you are looking for as you enter words into the query box. |
| uses a tracking service and cookies on your browser to predict search results. |
| uses a knowledge graph of what similar people searched on to predict your search interests. |
| uses a semantic approach to predict what you are looking for. |
Question 13 |
The telephone system is an example of a __________ network.
Question options:
| peer-to-peer |
| wireless |
| packet-switched |
| circuit-switched |
Question 14 |
A(n) __________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.
Question options:
| RFID receiver |
| WiMax receiver |
| access point |
| hub |
Question 15 |
The concept of a future Web in which it is commonplace for everyday objects to be connected, controlled, or monitored over the Internet is called:
Question options:
| the Internet of Things. |
| the Semantic Web. |
| Internet2. |
| a 3-D Web. |
Question 16 |
Biometric authentication:
Question options:
| is inexpensive. |
| is used widely in Europe for security applications. |
| can use a person's voice as a unique, measurable trait. |
| only uses physical measurements for identification. |
Question 17 |
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
Question options:
| SSL/TLS |
| Symmetric key encryption |
| Public key encryption |
| Private key encryption |
Question 18 |
A foreign country attempting to access government networks in order to disable a national power grid would be an example of:
Question options:
| phishing. |
| denial-of-service attacks. |
| cyberwarfare. |
| cyberterrorism. |
Question 19 |
The child domain of the root is the:
Question options:
| top-level domain. |
| second-level domain. |
| host name. |
| domain extension. |
Question 20 |
Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?
Question options:
| MAN |
| Wireless |
| LAN |
| Peer-to-peer |
Online Exam 5 |
Question 21 |
Customer relationship management systems typically provide software and online tools for sales, customer service, and:
Question options:
| marketing. |
| account management. |
| advertising. |
| public relations. |
Question 22 |
Netflix's public announcement of a reward for a technology solution to its movie recommendation system is an example of:
Question options:
| prediction markets. |
| behavioral targeting. |
| crowdsourcing. |
| social shopping. |
Question 23 |
Which of the following best describes the digital social graph?
Question options:
| A person's direct and indirect relationships |
| All of a person's closest digital relationships |
| A mapping of all online social relationships |
| All of the online and offline relationships a person has |
Question 24 |
Operational CRM applications include tools for:
Question options:
| identifying buying patterns. |
| calculating CLTV. |
| sales force automation. |
| pinpointing unprofitable customers. |
Question 25 |
__________ CRM includes customer-facing applications such as tools for sales force automation, call center and customer service support, and marketing automation.
Question options:
| Analytical |
| Employee |
| Operational |
| Partner |
Question 26 |
What is the difference between personalization and customization, as applied to e-commerce technologies?
Question options:
| Customization is any type of adjustment made to a product <em>by </em> the user; personalization refers to a business changing a product or service <em>for </em> the user. |
| Personalization is any type of adjustment made to a product <em>by </em> the user; customization refers to a business changing a product or service <em>for </em> the user. |
| Customization refers to adjusting marketing messages for a consumer; personalization refers to adjusting a product or service based on a user's preferences. |
| Personalization refers to adjusting marketing messages for a consumer; customization refers to adjusting a product or service based on a user's preferences. |
Question 27 |
Which of the following best illustrates the sales revenue model?
Question options:
| eBay receives a small fee from a seller if a seller is successful in selling an item. |
| Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase. |
| Flickr provides basic services for free, but charges a premium for advanced services. |
| Apple accepts micropayments for single music track downloads. |
Question 28 |
The business value of an effective supply chain management system includes all of the following EXCEPT:
Question options:
| faster time to market. |
| cost reduction. |
| supply matched to demand. |
| improved delivery service. |
Question 29 |
Compared to digital markets, traditional markets have:
Question options:
| lower search costs. |
| stronger network effects. |
| higher delayed gratification effects. |
| higher transaction costs. |
Question 30 |
Enterprise software is built around thousands of predefined business processes that reflect:
Question options:
| the firm's organization. |
| industry goals. |
| best practices. |
| cutting edge workflow analyses. |
Question 31 |
Which of the following is NOT one of four types of presence to be considered when building an E-commerce presence?
Question options:
| Offline media |
| Websites |
| Social media |
| Corporate |
Question 32 |
In order to achieve maximum benefit from an enterprise software package, a business:
Question options:
| customizes the software to match all of its business processes. |
| uses only the processes in the software that match its own processes. |
| changes the way it works to match the software's business processes. |
| selects only the software that best matches its existing business processes. |
Question 33 |
Supply chain software can be classified as either supply chain __________ systems or supply chain __________ systems.
Question options:
| planning; execution |
| demand; continual |
| upstream; downstream |
| push; pull |
Question 34 |
Content providers use __________ systems to process large amounts of very small monetary transactions cost-effectively.
Question options:
| subscription |
| mobile payment |
| transaction fee |
| micropayment |
Question 35 |
Walmart's continuous replenishment system is an example of a __________ model.
Question options:
| push-based |
| pull-based |
| enterprise-based |
| supply chain optimization |
Question 36 |
A third-party Net marketplace that connects many buyers and suppliers for spot purchasing is called a(n):
Question options:
| exchange. |
| vertical market. |
| private exchange. |
| e-hub. |
Question 37 |
A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes:
Question options:
| process management software. |
| ERP systems. |
| groupware. |
| application software. |
Question 38 |
Net marketplaces:
Question options:
| focus on continuous business process coordination between companies for supply chain management. |
| are industry owned or operate as independent intermediaries between buyers and sellers. |
| are geared towards short-term spot purchasing. |
| are more relationship oriented than private industrial networks. |
Question 39 |
Which of the following is NOT an example of next-generation enterprise applications?
Question options:
| Open-source solutions |
| Social CRM |
| Solutions incorporating SCM |
| Solutions incorporating SOA |
Question 40 |
Information density refers to the:
Question options:
| richness—complexity and content—of a message. |
| total amount and quantity of information delivered to consumers by merchants. |
| total amount and quantity of information available to all market participants. |
| amount of information available to reduce price transparency. |
No comments:
Post a Comment