Q1 is the scanning and review of the political social


Q1. __________ is the scanning and review of the political, social, economic and technical environment of the organization.

    a. Strategic analysis

    b. Business performance

    c. Operational planning

    d. Value analysis

Q2. __________ involve the purchase of materials, the processing of materials into products, and delivery of products to customers.

    a. Supply chains

    b. Logistics

    c. Primary activities

    d. Support activities

Q3. Which of the following is a characteristic of competitive advantage?

    a. It is a long lasting edge over competitors if based on IT.

    b. It is short-lived if competitors quickly duplicate it.

    c. It requires the use of social media and networks.

    d. It always provides a big strategic payoff.

Q4. Which of the following statements about mobile market opportunities is false?

    a. Mobiles are replacing computers as the primary way to connect with public and private networks and to get work done.

    b. Mobile gadgets are starting to look and feel like handheld computers, able to run all sorts of software.

    c. Desktop and laptop computers are taking on more and more nontraditional duties, like streaming media to TV sets, stereos, and other household appliances.

    d. Touch-navigate devices running on 3G and 4G networks create business opportunities and eliminate business threats.

Q5. How a company generates revenue from its assets is referred to as its __________.

    a. asset infrastructure

    b. business model

    c. corporate culture

    d. organizational structure

Q6. __________ is a series of processes in which an organization selects and arranges its businesses or services to keep the organization viable even when unexpected events disrupt its businesses, markets, products, or services.

    a. Strategic planning

    b. SWOT

    c. Value proposition

    d. Threat analysis

Q7. The value of an information system is determined by the relationships among ISs, people, and business processes which are influenced strongly by:

    a. fast, accurate communication and collaboration.

    b. huge amounts of information that is accessible via networks.

    c. organizational culture..

    d. automation of decision making

Q8. _________ is the science concerned with managing material and information flows to optimize supply chain operations.

    a. Database management

    b. Process control

    c. Logistics

    d. Sourcing

Q9. The general name for Internet-based infrastructures is __________.

    a. social networking

    b. cloud computing

    c. Web 1.0

    d. Web 2.0

Q10. Decision makers manipulate models in a DSS to perform __________ analysis, which refers to changing assumptions or data in the model to see the impacts of those changes on the outcome.

    a. goal seeking

    b. experimental

    c. structured

    d. what-if

Q11. RFID is a technology that uses __________ instead of __________ to identify products or pallets.

    a. electronic tags; bar codes

    b. electronic tags; chips

    c. bar codes; PINs

    d. PINs; EPC tags

Q12. Large companies and government agencies with multiple locations may set up __________ on servers that they own if data confidentiality is a key requirement.

    a. public clouds

    b. private clouds

    c. encrypted clouds

    d. social clouds

Q13. Which of the following represents the evolution to Internet-based infrastructure?

    a. public cloud computing; private cloud computing; virtualization

    b. wired; wireless; mobile computing

    c. virtualization; cloud computing; enterprise computing

    d. virtualization; private cloud computing; cloud computing

Q14. __________ consists of data that have been processed, organized, and put into context to be meaningful, and to convey understanding, experience, accumulated learning, and expertise.

    a. Information

    b. A transaction

    c. Knowledge

    d. Wisdom

Q15. Companies implement __________ systems to retain and archive their business records that are not needed for current operations or decisions, but that must be accessible for legal or auditing obligations.

    a. electronic records management

    b. database management

    c. archive management

    d. infrastructure management

Q16. An extremely economical and effective method of delivering data from a data warehouse to decision makers throughout the enterprise is via __________.

    a. data marts

    b. data cubes

    c. an intranet

    d. operational data stores

Q17. The high costs of data warehouses can make them too expensive for a company to implement. As an alternative, many firms create lower-cost, scaled-down __________.

    a. data marts

    b. data stores

    c. multidimensional databases

    d. SBUs

Q18. Which is not a benefit of having a unified view of customers?

    a. More accurate customer data to support marketing, sales, support, and service initiatives.

    b. Better responsiveness to ensure that customer service representatives have up-to-date, reliable information on the customers.

    c. Faster transaction processing by organizing the data in one location.

    d. Better revenue management and more responsive business decisions.

Q19. In the healthcare industry, data errors __________.

    a. increase healthcare costs by billions of dollars

    b. have minimized healthcare costs

    c. have no impact on patient care

    d. have been eliminated by the use of data warehousing

Q20. Creating backups of records is not a form of electronic records management (ERM) because:

    a. the content on backups is not organized so that it can be accurately and easily retrieved.

    b. business records and documents may need to be modified.

    c. records and documents cannot be stored together.

    d. the requirement to save records is new.

Q21. Virtual private networks (VPN) are private tunnels in the Internet that are created by __________.

    a. content indexing

    b. usernames and passwords

    c. biometrics

    d. encryption

Q22. TCP performs error checking, which can cause packet delivery delays. Because of the error-checking process, TCP is not well-suited for what type of transmissions?

    a. digital voice or video

    b. data

    c. documents

    d. e-mail

Q23. __________ are networks that are capable of transmitting data at very fast rates, but operate in a limited area, such as an office building, campus, or home.

    a. MANs

    b. Hot spots

    c. LANs

    d. WANs

Q24. __________ shows the power of the individual in the connected age a better research tool than major corporations had in the 1990s.

    a. Facebook

    b. Google

    c. Microsoft

    d. eBay

Q25. Connectivity and mobility are __________ issues.

    a. 4G

    b. network

    c. Wi-Fi

    d. social media

Q26. __________ transmits voice and data in packets and has become one of the most cost effective ways to communicate.

    a. TCP

    b. UDP

    c. VoIP

    d. UM

Q27. __________, such as AirSnort and WEPcrack, are readily available tools that can be used to gain unauthorized access to networks putting them at great risk.

    a. Wireless packet analyzers

    b. Password crackers

    c. Firewall sniffers

    d. Intrusion detectors

Q28. A(n) __________ is the probability of a threat exploiting a vulnerability.

    a. threat

    b. risk

    c. vulnerability

    d. exploit

Q29. What is the most cost-effective approach to managing fraud?

    a. prevention

    b. detection

    c. prosecution

    d. compliance

Q30. A(n) __________ is something or someone that may result in harm to an asset.

    a. threat

    b. risk

    c. vulnerability

    d. exploit

Q31. A fiduciary responsibility is both a legal and an ethical obligation.

    a. True

    b. False

Q32. Before the people who are responsible for security make any decisions about infosec defenses, they must understand __________.

    a. the requirements and operations of the business

    b. how firewalls, anti-virus software, and other technology function

    c. tactics of hackers, fraudsters, botnets, and identity thieves

    d. how much to invest in risk management

Q33. American Express developed tools that improved compliance with procurement rules on indirect purchases, or MRO supplies. One of the major performance improvements was the __________.

    a. increase in spot buying

    b. elimination of maverick buying

    c. reduction in billing errors

    d. increase in purchases from local vendors

Q34. Ethical standards and laws frequently __________ technological innovation.

    a. lag behind

    b. keep pace

    c. conflict with

    d. lead ahead of

Q35. Online channels and connectivity support __________, which minimizes the limitations of having to be physically present in a single location to collaborate or train.

    a. the e-business process

    b. telepresence

    c. community

    d. self-service

Q36. The goal of __________ is to find information and knowledge that describe the relationships among consumers, products, marketing methods, and marketers.

    a. social marketing

    b. surveys

    c. market research

    d. directory services

Q37. One of the problems with __________ advertising is that advertisers knew very little about the recipients.

    a. direct mail

    b. Web

    c. interactive

    d. social media

Q38. The purchase of indirect materials on an as-needed basis is referred to as __________ sourcing.

    a. horizontal

    b. vertical

    c. spot

    d. systematic

Q39. End users can access a WLAN with their laptops, desktops, or PDAs by adding a(n) __________.

    a. 4G network

    b. Internet protocol

    c. access point

    d. wireless network card

Q40. Engineers can find the location of any receiving station to within 50 feet by __________, using the distance from a GPS to three satellites to make the computation.

    a. latitude

    b. longitude

    c. triangulation

    d. attitude

Q41. The __________ is expected to emerge as the predominant market for mobile banking services done via cell phones or other mobile device.

    a. Asia-Pacific region

    b. European Union (EU)

    c. United States (US)

    d. United Kingdom (UK)

Q42. Which is not one of the three dominant PC operating systems (OSs)?

    a. Apple

    b. Java

    c. Linux

    d. Microsoft Windows

Q43. According to the Daiwa Institute of Research, __________ account(s) for most of the purchases that are done on mobile phones, if the users are on flat-fee-based service.

    a. entertainment

    b. impulse shopping

    c. travel

    d. sports

Q44. The __________ continues to be a leader in making digital music, movies and podcasts available to consumers for a fee.

    a. iTunes Store

    b. Amazon.com

    c. Fox Mobile

    d. Grooveshark.com

Q45. Which is not a social media survey metric?

    a. time spent on site

    b. satisfaction

    c. content relevance

    d. quality and speed of issue resolution

Q46. __________ are effective and inexpensive ways to collect information from customers as well as to send information to them. It also can be used to gather intelligence on competitors.

    a. Marketing research

    b. Interactive social media

    c. Dashboards

    d. Mashups

Q47. __________ refers to a search strategy that focuses on finding information in a particular content area, such as travel, finance, legal, and medical.

    a. Vertical search

    b. Horizontal search

    c. Tag search

    d. Web 3.0 search

Q48. YouTube has become a popular way for companies, such as BlendTec, to promote themselves using __________, and often less expensive than traditional advertising efforts.

    a. response hierarchies

    b. mashups

    c. microblogging

    d. viral videos

Q49. Which of the following is a characteristic of Web 2.0?

    a. static pages

    b. user controlled content

    c. the goal of marketing is to influence buyers

    d. single source of data

Q50. Facebook and other __________ are different from the broader category of online communities in that they usually allow individuals to control who can access information they post to the site.

    a. bookmarking sites

    b. mashups

    c. social networking sites

    d. wikis

Solution Preview :

Prepared by a verified Expert
Business Management: Q1 is the scanning and review of the political social
Reference No:- TGS02392894

Now Priced at $25 (50% Discount)

Recommended (92%)

Rated (4.4/5)