Create an account
Specific security challenges that threaten clients in a client/server environment include:
unauthorized access; errors; spyware.
The development and use of methods to make computer systems resume their activities more quickly after mishaps is called:
recovery oriented computing
Specific security challenges that threaten the communications lines in a client/server environment include:
tapping; sniffing; message alteration; radiation
Most antivirus software is effective against:
only those viruses already known when the software is written.
Large amounts of data stored in electronic form are ________ than the same data in manual form.
vulnerable to many more kinds of threats
Which of the following statements about the Internet security is not true?
VoIP is more secure than the switched voice network
DoS attacks are used to destroy information and access restricted areas of a company's information system. T/F
Statements ranking information risks and identifying security goals are included in a(n):
Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports. T/F
In which technique are network communications are analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver?
You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?
NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs
Safety stock acts as an inexpensive buffer for the lack of flexibility in the supply chain. T/F
A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the
upstream portion of the supply chain.
CRM software can help organizations identify high-value customers for preferential treatments. T/F
________ management is an important capability for service processes that is found in most major CRM software products.
From your reading of the Severstal case study, the firm implemented new information systems in order to achieve which of the main six business objectives?
The upstream portion of the supply chain consists of the organizations and processes for distributing and delivering products to the final customers.
Intranets can be used to integrate information from isolated business processes within the firm to help them manage their internal supply chains. T/F
Supply chain complexity and scale increases when firms
produce products and services that coordinate with hundreds or more firms and suppliers.
Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain?
. Safety stock
Which of the following is not an example of next-generation enterprise applications?
Solutions incorporating SCM
Customer relationship management systems typically provide software and online tools for sales, customer service, and:
A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes:
In a pull-based model of SCM systems, production master schedules are based on forecasts of demand for products. T/F
Why is overstocking warehouses not an effective solution for a problem of low availability?
It increases inventory costs.
The business value of an effective supply chain management system includes all of the following except:
increased inventory levels.
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:
Quality of Life
A cookie is a small file containing information about you and your Web activities that is deposited on your hard disk by a Web site. T/F
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:
property rights and obligations.
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called:
According to the ________, you should take the action that produces the least harm.
Risk Aversion Principle
Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect. T/F
The ethical "no free lunch" rule states that:
everything is owned by someone else, and that the creator wants compensation for this work.
Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?
Information rights and obligations
The four key technical trends responsible for current ethical stresses related to information technology are (1) doubling of computer power every 18 months, (2) data analysis advances, (3) declining data storage costs, and (4) ________.
networking advances and the Internet
A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.
Copyright is the legal protection afforded intellectual property, such as a song, book, or video game. T/F
The "do anything anywhere" computing environment can:
blur the traditional boundaries between work and family time.
The Online Privacy Alliance:
encourages self-regulation to develop a set of privacy guidelines for its members.
The introduction of new information technology has a:
ripple effect raising new ethical, social, and political issues.
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together