How can we help?

You can also find more resources in our Help Center.

60 terms

Exam 3 Review

Chapter 7, 8 & 12
High-availability computing is also referred to as fault tolerance. T/F
An authentication token is a(n):
gadget that displays passcodes
Specific security challenges that threaten clients in a client/server environment include:
unauthorized access; errors; spyware.
The development and use of methods to make computer systems resume their activities more quickly after mishaps is called:
recovery oriented computing
Specific security challenges that threaten the communications lines in a client/server environment include:
tapping; sniffing; message alteration; radiation
Most antivirus software is effective against:
only those viruses already known when the software is written.
Public key encryption uses two keys. T/F
Biometric authentication:
can use a person's voice as a unique, measurable trait.
Large amounts of data stored in electronic form are ________ than the same data in manual form.
vulnerable to many more kinds of threats
Phishing is a form of:
Which of the following statements about the Internet security is not true?
VoIP is more secure than the switched voice network
The range of Wi-Fi networks can be extended up to two miles by using external antennae. T/F
DoS attacks are used to destroy information and access restricted areas of a company's information system. T/F
Statements ranking information risks and identifying security goals are included in a(n):
security policy.
The Gramm-Leach-Bliley Act:
requires financial institutions to ensure the security of customer data
Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports. T/F
In which technique are network communications are analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver?
Stateful inspection
You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?
Packet filtering catches most types of network attacks. T/F
NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs
Uncertainties arise in any supply chain because of:
unforeseeable events.
Safety stock acts as an inexpensive buffer for the lack of flexibility in the supply chain. T/F
A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the
upstream portion of the supply chain.
CRM software can help organizations identify high-value customers for preferential treatments. T/F
Enterprise systems require fundamental changes in the way the business operates.T/F
________ management is an important capability for service processes that is found in most major CRM software products.
From your reading of the Severstal case study, the firm implemented new information systems in order to achieve which of the main six business objectives?
operational excellence
Concurrent supply chains are made possible by which technology?
The Internet.
The upstream portion of the supply chain consists of the organizations and processes for distributing and delivering products to the final customers.
Intranets can be used to integrate information from isolated business processes within the firm to help them manage their internal supply chains. T/F
Supply chain complexity and scale increases when firms
produce products and services that coordinate with hundreds or more firms and suppliers.
Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain?
. Safety stock
Which of the following is not an example of next-generation enterprise applications?
Solutions incorporating SCM
Customer relationship management systems typically provide software and online tools for sales, customer service, and:
All CRM packages contain modules for PRM and ERM. T/F
A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes:
ERP systems.
In a pull-based model of SCM systems, production master schedules are based on forecasts of demand for products. T/F
Supply chain planning systems:
identify the transportation mode to use for product delivery.
Why is overstocking warehouses not an effective solution for a problem of low availability?
It increases inventory costs.
The business value of an effective supply chain management system includes all of the following except:
increased inventory levels.
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:
Quality of Life
A cookie is a small file containing information about you and your Web activities that is deposited on your hard disk by a Web site. T/F
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:
property rights and obligations.
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called:
According to the ________, you should take the action that produces the least harm.
Risk Aversion Principle
Protection for trade secrets is enforced at the federal level. T/F
The U.S. CAN-SPAM Act of 2003:
requires spammers to identify themselves.
Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect. T/F
The ethical "no free lunch" rule states that:
everything is owned by someone else, and that the creator wants compensation for this work.
Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?
Information rights and obligations
P3P stands for:
Platform for Privacy Preferences.
The four key technical trends responsible for current ethical stresses related to information technology are (1) doubling of computer power every 18 months, (2) data analysis advances, (3) declining data storage costs, and (4) ________.
networking advances and the Internet
P3P encrypts or scrambles e-mail or data so that it cannot be read illicitly. T/F
Spam is unsolicited e-mail. T/F
A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.
Copyright is the legal protection afforded intellectual property, such as a song, book, or video game. T/F
The "do anything anywhere" computing environment can:
blur the traditional boundaries between work and family time.
The Online Privacy Alliance:
encourages self-regulation to develop a set of privacy guidelines for its members.
The introduction of new information technology has a:
ripple effect raising new ethical, social, and political issues.
It is not feasible for companies to produce error-free software because:
it is too expensive create perfect software.