BAM 225 information management Unit 3 and So on

information management unit 3 - 25 with 1 written question:
 
BAM information management unit 3
 
1.    Sobig.F and MyDoom.A are:
 
       a.   viruses that use Microsoft Outlook to spread to other systems.       b.   worms attached to email that spread from computer to computer.       c.   multipartite viruses that can infect files as well as the boot sector of the             hard drive.       d.   Trojan horses used to create bot nets.
 
2.    Redirecting a Web link to a different address is a form of :
 
       a.    snooping.       b.   spoofing.       c.   sniffing.       d.   DDoS.
 
3.    A key logger is a type of:
 
       a.   worm.       b.   Trojan horse.       c.    virus.       d.   spyware.
 
4.    In 2004, ICQ users were enticed by a sales message from a supposed anti       virus vendor. On the vendor- site, a small program called Mitglieder was       downloaded to the user- machine. The program enabled outsiders to infiltrate        the user- machine. What type of malware is this an example of?
 
       a.    Trojan horse       b.   Virus       c.   Worm       d.   Spyware
 
5.    How do hackers create a botnet?
 
       a.    Infecting Web search bots with malware       b.   Using Web search bots to infect other computers       c.    Causing other people- computers to become “zombie” PCs following a             master computer       d.   Infecting corporate servers with “zombie” Trojan horses that allow unde             tected access through a back door
 
6.    Using numerous computers to inundate and overwhelm the network from nu-       merous launch points is called a _______ attack.
 
       a.   DDoS       b.   DoS       c.   pharming       d.   phishing
 
7.    Which of the following is not an example of a computer used as a target of        crime?
 
       a.    Knowingly accessing a protected computer to commit fraud       b.   Accessing a computer system without authority       c.   Illegally accessing stored electronic communication       d.   Threatening to cause damage to a protected computer
 
8.    Which of the following is not an example of a computer used as an instru       ment of crime?
 
       a.   Theft of trade secrets       b.   Intentionally attempting to intercept electronic communication       c.   Unauthorized copying of software       d.   Breaching the confidentiality of protected computerized data
 
9.    A network of organizations and business processes for procuring raw materi       als, transforming these materials into intermediate and finished products, and       distributing the finished products to customers is called a:
 
       a.   distribution channel.       b.   supply chain.       c.   value chain.       d.   marketing chain.
 
10.   Components or parts of finished products are referred to as:
 
       a.    upstream materials.       b.   raw materials.       c.   secondary products.       d.  intermediate products.
 
11.   A company- suppliers, supplier- suppliers, and the processes for managing       relationships with them is the:
 
        a.   supplier- internal supply chain.        b.   external supply chain.        c.   upstream portion of the supply chain.        d.   downstream portion of the supply chain.
 
12.   A company- organizations and processes for distributing and delivering products to the final customers is the:
 
        a.   supplier- internal supply chain.        b.   external supply chain.        c.   upstream portion of the supply chain.        d.   downstream portion of the supply chain.
 
13.   Uncertainties arise in a supply chain because of:
 
        a.   inaccurate or untimely information.        b.   poor integration between systems of suppliers, manufacturers, and dis              tributors.        c.   inefficient or inaccurate MIS.       d.   unforeseeable events.
 
14.   Which of the following traditional solutions enables manufacturers to deal         with uncertainties in the supply chain?
 
        a.    Safety stock        b.   Continuous replenishment        c.    Just-in-time strategies       d.   Demand planning
 
15.  A scheduling system for minimizing inventory by having components arrive       exactly at the moment they are needed and finished goods shipped as soon as       they leave the assembly line best describes a ______ strategy:
 
       a.   just-in-time        b.   stockless        c.   bullwhip       d.   safety stock
 
16.  A distortion of information about the demand for a product as it passes from       one entity to the next across the supply chain is called a(n):
 
       a.   replenishment effect.       b.   bullwhip effect.       c.   ripple effect.       d.   exponential effect.
 
17.  The act of engaging consumers in a dialog that dynamically adjusts the experience to the individual describes which dimension of e-commerce technology?
 
       a.   Ubiquity       b.   Personalization/Customization       c.    Richness       d.   Interactivity
 
18.  The integration of video, audio, and text marketing messages into a single       marketing message and consumer experience describes which dimension of       e-commerce technology?
 
       a.   Ubiquity       b.   Personalization/Customization       c.    Richness       d.   Interactivity
 
19.  The lowered costs of information storage, processing, and communication,        along with the improvement of data quality, have resulted in which unique       quality of e-commerce?
 
       a.   Information density       b.   Richness       c.   Customization       d.   Interactivity
 
20.  The effort required to locate a suitable product is called:
 
       a.    price discrimination.       b.   search costs.       c.    menu costs.       d.   transparency costs.
 
21.  Information density refers to the:
 
       a.   richness -- complexity and content-- of a message.       b.   total amount and quantity of information delivered to consumers by mer             chants.       c.   total amount and quality of information available to all market partici             pants.       d.   amount of information available to reduce price transparency.
 
22.   Selling the same goods to different targeted groups at different prices is        called:
 
       a.    price customization.       b.   price opacity.       c.    price gouging.       d.   price discrimination.
 
23.  Information __________________ exists when one party in a transaction has       more information that is important for the transaction than the other party.
 
       a.   transparency       b.   asymmetry       c.    complexity       d.   imbalance
 
24.  The cost to a merchant of changing the price of a product is called a _____       cost.
 
       a.   pricing       b.   dynamic pricing       c.   menu       d.   switching
 
25.  Varying a product- price according to the supply situation of the seller is       called _______ pricing.
 
       a.   menu       b.   supply       c.    dynamic       d.   asymmetrical
 
 
 

Answer Detail

Get This Answer

Invite Tutor