Online Exam 4
A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor’s advertising costs up. This is an example of:
The total amount of digital information that can be transmitted through any telecommunications medium is measured in:
Which of the following specifications replaces WEP with a stronger security standard that features changing encryption keys?
operate over existing telephone lines to carry voice, data, and video.
operate over coaxial lines to deliver Internet access.
do not provide guaranteed service levels, but simply "best effort."
are high-speed, leased data lines providing guaranteed service levels.
Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents?
What are the four layers of the TCP/IP reference model?
Physical, application, transport, and network interface
Physical, application, Internet, and network interface
Application, transport, Internet, and network interface
Application, hardware, Internet, and network interface
Which of the following is a type of ambient data?
Computer log containing recent system errors
A file deleted from a hard disk
A file that contains an application’s user settings
A set of raw data from an environmental sensor
Which of the following is NOT a characteristic of packet switching?
Packets travel independently of each other.
Packets are routed through many different paths.
Packet switching requires point-to-point circuits.
Packets are reassembled into the original message when they reach their destinations.
The Internet is based on which three key technologies?
TCP/IP, HTML, and HTTP
TCP/IP, HTTP, and packet switching
Client/server computing, packet switching, and the development of communications standards for linking networks and computers
Client/server computing, packet switching, and HTTP
Which signal types are represented by a continuous waveform?
Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n):
business impact analysis.
“Predictive search” in Google’s search engine:
predicts what you are looking for as you enter words into the query box.
uses a tracking service and cookies on your browser to predict search results.
uses a knowledge graph of what similar people searched on to predict your search interests.
uses a semantic approach to predict what you are looking for.
The telephone system is an example of a __________ network.
A(n) __________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.
The concept of a future Web in which it is commonplace for everyday objects to be connected, controlled, or monitored over the Internet is called:
the Internet of Things.
the Semantic Web.
a 3-D Web.
is used widely in Europe for security applications.
can use a person’s voice as a unique, measurable trait.
only uses physical measurements for identification.
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
Symmetric key encryption
Public key encryption
Private key encryption
A foreign country attempting to access government networks in order to disable a national power grid would be an example of:
The child domain of the root is the:
Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?
Online Exam 5
Customer relationship management systems typically provide software and online tools for sales, customer service, and:
Netflix’s public announcement of a reward for a technology solution to its movie recommendation system is an example of:
Which of the following best describes the digital social graph?
A person’s direct and indirect relationships
All of a person’s closest digital relationships
A mapping of all online social relationships
All of the online and offline relationships a person has
Operational CRM applications include tools for:
identifying buying patterns.
sales force automation.
pinpointing unprofitable customers.
__________ CRM includes customer-facing applications such as tools for sales force automation, call center and customer service support, and marketing automation.
What is the difference between personalization and customization, as applied to e-commerce technologies?
Customization is any type of adjustment made to a product <em>by </em> the user; personalization refers to a business changing a product or service <em>for </em> the user.
Personalization is any type of adjustment made to a product <em>by </em> the user; customization refers to a business changing a product or service <em>for </em> the user.
Customization refers to adjusting marketing messages for a consumer; personalization refers to adjusting a product or service based on a user’s preferences.
Personalization refers to adjusting marketing messages for a consumer; customization refers to adjusting a product or service based on a user’s preferences.
Which of the following best illustrates the sales revenue model?
eBay receives a small fee from a seller if a seller is successful in selling an item.
Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase.
Flickr provides basic services for free, but charges a premium for advanced services.
Apple accepts micropayments for single music track downloads.
The business value of an effective supply chain management system includes all of the following EXCEPT:
faster time to market.
supply matched to demand.
improved delivery service.
Compared to digital markets, traditional markets have:
lower search costs.
stronger network effects.
higher delayed gratification effects.
higher transaction costs.
Enterprise software is built around thousands of predefined business processes that reflect:
the firm’s organization.
cutting edge workflow analyses.
Which of the following is NOT one of four types of presence to be considered when building an E-commerce presence?
In order to achieve maximum benefit from an enterprise software package, a business:
customizes the software to match all of its business processes.
uses only the processes in the software that match its own processes.
changes the way it works to match the software’s business processes.
selects only the software that best matches its existing business processes.
Supply chain software can be classified as either supply chain __________ systems or supply chain __________ systems.
Content providers use __________ systems to process large amounts of very small monetary transactions cost-effectively.
Walmart’s continuous replenishment system is an example of a __________ model.
supply chain optimization
A third-party Net marketplace that connects many buyers and suppliers for spot purchasing is called a(n):
A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes:
process management software.
focus on continuous business process coordination between companies for supply chain management.
are industry owned or operate as independent intermediaries between buyers and sellers.
are geared towards short-term spot purchasing.
are more relationship oriented than private industrial networks.
Which of the following is NOT an example of next-generation enterprise applications?
Solutions incorporating SCM
Solutions incorporating SOA
Information density refers to the:
richness—complexity and content—of a message.
total amount and quantity of information delivered to consumers by merchants.
total amount and quantity of information available to all market participants.
amount of information available to reduce price transparency.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more