Advertisement Upgrade to remove ads

Chapter 7, 8 & 12

High-availability computing is also referred to as fault tolerance. T/F

False

An authentication token is a(n):

gadget that displays passcodes

Specific security challenges that threaten clients in a client/server environment include:

unauthorized access; errors; spyware.

The development and use of methods to make computer systems resume their activities more quickly after mishaps is called:

recovery oriented computing

Specific security challenges that threaten the communications lines in a client/server environment include:

tapping; sniffing; message alteration; radiation

Most antivirus software is effective against:

only those viruses already known when the software is written.

Public key encryption uses two keys. T/F

True.

Biometric authentication:

can use a person's voice as a unique, measurable trait.

Large amounts of data stored in electronic form are ________ than the same data in manual form.

vulnerable to many more kinds of threats

Phishing is a form of:

spoofing.

Which of the following statements about the Internet security is not true?

VoIP is more secure than the switched voice network

The range of Wi-Fi networks can be extended up to two miles by using external antennae. T/F

False

DoS attacks are used to destroy information and access restricted areas of a company's information system. T/F

False

Statements ranking information risks and identifying security goals are included in a(n):

security policy.

The Gramm-Leach-Bliley Act:

requires financial institutions to ensure the security of customer data

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports. T/F

True.

In which technique are network communications are analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver?

Stateful inspection

You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?

Employees

Packet filtering catches most types of network attacks. T/F

False

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs

True.

Uncertainties arise in any supply chain because of:

unforeseeable events.

Safety stock acts as an inexpensive buffer for the lack of flexibility in the supply chain. T/F

False

A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the

upstream portion of the supply chain.

CRM software can help organizations identify high-value customers for preferential treatments. T/F

True

Enterprise systems require fundamental changes in the way the business operates.T/F

True.

________ management is an important capability for service processes that is found in most major CRM software products.

Returns

From your reading of the Severstal case study, the firm implemented new information systems in order to achieve which of the main six business objectives?

operational excellence

Concurrent supply chains are made possible by which technology?

The Internet.

The upstream portion of the supply chain consists of the organizations and processes for distributing and delivering products to the final customers.

False.

Intranets can be used to integrate information from isolated business processes within the firm to help them manage their internal supply chains. T/F

True.

Supply chain complexity and scale increases when firms

produce products and services that coordinate with hundreds or more firms and suppliers.

Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain?

. Safety stock

Which of the following is not an example of next-generation enterprise applications?

Solutions incorporating SCM

Customer relationship management systems typically provide software and online tools for sales, customer service, and:

marketing

All CRM packages contain modules for PRM and ERM. T/F

False

A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes:

ERP systems.

In a pull-based model of SCM systems, production master schedules are based on forecasts of demand for products. T/F

False

Supply chain planning systems:

identify the transportation mode to use for product delivery.

Why is overstocking warehouses not an effective solution for a problem of low availability?

It increases inventory costs.

The business value of an effective supply chain management system includes all of the following except:

increased inventory levels.

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:

Quality of Life

A cookie is a small file containing information about you and your Web activities that is deposited on your hard disk by a Web site. T/F

True.

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:

property rights and obligations.

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called:

profiling

According to the ________, you should take the action that produces the least harm.

Risk Aversion Principle

Protection for trade secrets is enforced at the federal level. T/F

False

The U.S. CAN-SPAM Act of 2003:

requires spammers to identify themselves.

Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect. T/F

True

The ethical "no free lunch" rule states that:

everything is owned by someone else, and that the creator wants compensation for this work.

Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?

Information rights and obligations

P3P stands for:

Platform for Privacy Preferences.

The four key technical trends responsible for current ethical stresses related to information technology are (1) doubling of computer power every 18 months, (2) data analysis advances, (3) declining data storage costs, and (4) ________.

networking advances and the Internet

P3P encrypts or scrambles e-mail or data so that it cannot be read illicitly. T/F

False.

Spam is unsolicited e-mail. T/F

False

A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.

opt-out

Copyright is the legal protection afforded intellectual property, such as a song, book, or video game. T/F

True

The "do anything anywhere" computing environment can:

blur the traditional boundaries between work and family time.

The Online Privacy Alliance:

encourages self-regulation to develop a set of privacy guidelines for its members.

The introduction of new information technology has a:

ripple effect raising new ethical, social, and political issues.

It is not feasible for companies to produce error-free software because:

it is too expensive create perfect software.

Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan. T/F

True.

Computer worms spread much more rapidly than computer viruses. T/F

True

.Smaller firms may outsource some or many security functions to:

MSSPs

The WEP specification calls for an access point and its users to share the same 40-bit encrypted password. T/F

True.

SSL is a protocol used to establish a secure connection between two computers. T/F

True.

Biometric authentication is the use of physical characteristics such as retinal images to provide identification. T/F

True.

Rigorous password systems:

may hinder employee productivity

digital certificate system:

uses third-party CAs(certification authority) to validate a user's identity.

________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.

securtiy

Pharming involves:

redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser.

An acceptable use policy defines the acceptable level of access to information assets for different users. T/F

False

Enterprise systems are typically built around one or two major business workflows. T/F

False

3.Which of the following is not true about enterprise systems?

Enterprise software is expressly built to allow companies to mimic their unique business practices.

Systems that enable a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product best describes supply chain ________ systems

planning

Supply chain software can be classified as either supply chain ________ systems or supply chain ________ systems.

planning; execution

. A supply chain driven by actual customer orders or purchases follows a ________ model.

pull based model

A company's organizations and processes for distributing and delivering products to the final customers is the:

downstream portion of the supply chain.

11. Which of the following statements about enterprise applications is not true?

C. Enterprise applications are best implemented when few changes in business processes are required. 100%

12. Enterprise systems are strictly internally oriented; other types of enterprise applications must be used for communicating with customers and suppliers.

False

Which supply chain planning function determines how much product is needed to satisfy all customer demands?

Demand Planning

. Capabilities of supply chain execution systems would not include:

A. identifying the optimal transportation mode 100%

The bullwhip effect is the distortion of information about the demand for a product as it passes from one entity to the next across the supply chain.

True.

16. A build-to-order supply-chain model is also called a ________ model.

Demand Driven

From your reading of the Procter & Gamble case study, the company implemented a multi-echelon inventory optimization system to achieve which of the main six business objectives?

Operational Excellence

Companies can use configuration tables provided by the enterprise software to tailor a particular aspect of the system to the way it does business. T/F

True

________ integrate(s) multiple applications from multiple business functions, business units, or business partners to deliver a seamless experience for the customer, employee, manager, or business partner and provide a greater degree of cross-functional integration than the traditional enterprise applications.

Service Platforms

Analytical CRM applications:

are based on data warehouses consolidated from operational CRM applications

What legal mechanism protects the owners of intellectual property from having their work copied by others?

Copyright Law

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

HIPAA (Health Insurance Portability and Accoutability Act)

Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime. T/F

False

The key concepts in patent law are originality, novelty, and value. T/F

False

The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.

safe-harbor

The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called:

Due Process

Most American and European privacy law is based on a set of five principles called COPPA. T/F

False

According to the courts, in the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law. T/F

False

14. The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when:

The software is widely distributed

Advances in data storage have made routine violation of individual privacy more difficult. T/F

False

________ can be induced by tens of thousands of repetitions under low-impact loads.

RSI

A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?

Kant's Categorical Immperative

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set