High-availability computing is also referred to as fault tolerance. T/F
An authentication token is a(n):
gadget that displays passcodes
Specific security challenges that threaten clients in a client/server environment include:
unauthorized access; errors; spyware.
The development and use of methods to make computer systems resume their activities more quickly after mishaps is called:
recovery oriented computing
Specific security challenges that threaten the communications lines in a client/server environment include:
tapping; sniffing; message alteration; radiation
Most antivirus software is effective against:
only those viruses already known when the software is written.
Public key encryption uses two keys. T/F
can use a person's voice as a unique, measurable trait.
Large amounts of data stored in electronic form are ________ than the same data in manual form.
vulnerable to many more kinds of threats
Phishing is a form of:
Which of the following statements about the Internet security is not true?
VoIP is more secure than the switched voice network
The range of Wi-Fi networks can be extended up to two miles by using external antennae. T/F
DoS attacks are used to destroy information and access restricted areas of a company's information system. T/F
Statements ranking information risks and identifying security goals are included in a(n):
The Gramm-Leach-Bliley Act:
requires financial institutions to ensure the security of customer data
Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports. T/F
In which technique are network communications are analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver?
You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?
Packet filtering catches most types of network attacks. T/F
NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs
Uncertainties arise in any supply chain because of:
Safety stock acts as an inexpensive buffer for the lack of flexibility in the supply chain. T/F
A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the
upstream portion of the supply chain.
CRM software can help organizations identify high-value customers for preferential treatments. T/F
Enterprise systems require fundamental changes in the way the business operates.T/F
________ management is an important capability for service processes that is found in most major CRM software products.
From your reading of the Severstal case study, the firm implemented new information systems in order to achieve which of the main six business objectives?
Concurrent supply chains are made possible by which technology?
The upstream portion of the supply chain consists of the organizations and processes for distributing and delivering products to the final customers.
Intranets can be used to integrate information from isolated business processes within the firm to help them manage their internal supply chains. T/F
Supply chain complexity and scale increases when firms
produce products and services that coordinate with hundreds or more firms and suppliers.
Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain?
. Safety stock
Which of the following is not an example of next-generation enterprise applications?
Solutions incorporating SCM
Customer relationship management systems typically provide software and online tools for sales, customer service, and:
All CRM packages contain modules for PRM and ERM. T/F
A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes:
In a pull-based model of SCM systems, production master schedules are based on forecasts of demand for products. T/F
Supply chain planning systems:
identify the transportation mode to use for product delivery.
Why is overstocking warehouses not an effective solution for a problem of low availability?
It increases inventory costs.
The business value of an effective supply chain management system includes all of the following except:
increased inventory levels.
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:
Quality of Life
A cookie is a small file containing information about you and your Web activities that is deposited on your hard disk by a Web site. T/F
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:
property rights and obligations.
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called:
According to the ________, you should take the action that produces the least harm.
Risk Aversion Principle
Protection for trade secrets is enforced at the federal level. T/F
The U.S. CAN-SPAM Act of 2003:
requires spammers to identify themselves.
Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect. T/F
The ethical "no free lunch" rule states that:
everything is owned by someone else, and that the creator wants compensation for this work.
Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?
Information rights and obligations
P3P stands for:
Platform for Privacy Preferences.
The four key technical trends responsible for current ethical stresses related to information technology are (1) doubling of computer power every 18 months, (2) data analysis advances, (3) declining data storage costs, and (4) ________.
networking advances and the Internet
P3P encrypts or scrambles e-mail or data so that it cannot be read illicitly. T/F
Spam is unsolicited e-mail. T/F
A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.
Copyright is the legal protection afforded intellectual property, such as a song, book, or video game. T/F
The "do anything anywhere" computing environment can:
blur the traditional boundaries between work and family time.
The Online Privacy Alliance:
encourages self-regulation to develop a set of privacy guidelines for its members.
The introduction of new information technology has a:
ripple effect raising new ethical, social, and political issues.
It is not feasible for companies to produce error-free software because:
it is too expensive create perfect software.
Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan. T/F
Computer worms spread much more rapidly than computer viruses. T/F
.Smaller firms may outsource some or many security functions to:
The WEP specification calls for an access point and its users to share the same 40-bit encrypted password. T/F
SSL is a protocol used to establish a secure connection between two computers. T/F
Biometric authentication is the use of physical characteristics such as retinal images to provide identification. T/F
Rigorous password systems:
may hinder employee productivity
digital certificate system:
uses third-party CAs(certification authority) to validate a user's identity.
________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.
redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser.
An acceptable use policy defines the acceptable level of access to information assets for different users. T/F
Enterprise systems are typically built around one or two major business workflows. T/F
3.Which of the following is not true about enterprise systems?
Enterprise software is expressly built to allow companies to mimic their unique business practices.
Systems that enable a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product best describes supply chain ________ systems
Supply chain software can be classified as either supply chain ________ systems or supply chain ________ systems.
. A supply chain driven by actual customer orders or purchases follows a ________ model.
pull based model
A company's organizations and processes for distributing and delivering products to the final customers is the:
downstream portion of the supply chain.
11. Which of the following statements about enterprise applications is not true?
C. Enterprise applications are best implemented when few changes in business processes are required. 100%
12. Enterprise systems are strictly internally oriented; other types of enterprise applications must be used for communicating with customers and suppliers.
Which supply chain planning function determines how much product is needed to satisfy all customer demands?
. Capabilities of supply chain execution systems would not include:
A. identifying the optimal transportation mode 100%
The bullwhip effect is the distortion of information about the demand for a product as it passes from one entity to the next across the supply chain.
16. A build-to-order supply-chain model is also called a ________ model.
From your reading of the Procter & Gamble case study, the company implemented a multi-echelon inventory optimization system to achieve which of the main six business objectives?
Companies can use configuration tables provided by the enterprise software to tailor a particular aspect of the system to the way it does business. T/F
________ integrate(s) multiple applications from multiple business functions, business units, or business partners to deliver a seamless experience for the customer, employee, manager, or business partner and provide a greater degree of cross-functional integration than the traditional enterprise applications.
Analytical CRM applications:
are based on data warehouses consolidated from operational CRM applications
What legal mechanism protects the owners of intellectual property from having their work copied by others?
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
HIPAA (Health Insurance Portability and Accoutability Act)
Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime. T/F
The key concepts in patent law are originality, novelty, and value. T/F
The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.
The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called:
Most American and European privacy law is based on a set of five principles called COPPA. T/F
According to the courts, in the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law. T/F
14. The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when:
The software is widely distributed
Advances in data storage have made routine violation of individual privacy more difficult. T/F
________ can be induced by tens of thousands of repetitions under low-impact loads.
A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
Kant's Categorical Immperative