MCQ Project-2

1. Electronic data are more susceptible to destruction, fraud, error, and misuse because

information systems concentrate data in computer files that:

a. have the potential to be accessed by large numbers of people and by groups outside

of the organization.

b. are frequently available on the Internet.

c. are usually bound up in legacy systems that are difficult to access and difficult to

correct in case of error.

d. are not secure because the technology to secure them did not exist at the time the

files were created.

2. Inputting data into a poorly programmed Web form in order to disrupt a company's systems

and networks is called:

a. an SQL injection attack.

b. a Trojan horse.

c. a DDoS attack.

d. key logging.

3. Hackers create a botnet by:

a. by infecting corporate servers with "zombie" Trojan horses that allow undetected access

through a back door.

b. infecting Web search bots with malware.

c. by causing other people's computers to become "zombie" PCs following a master

computer.

d. by using Web search bots to infect other computers.

4. Which of the following is not an example of a computer used as a target of crime?

a. Illegally accessing stored electronic communication

b. Threatening to cause damage to a protected computer

c. Accessing a computer system without authority

d. Knowingly accessing a protected computer to commit fraud

5. Evil twins are:

a. Trojan horses that appears to the user to be a legitimate commercial software

application.

b. fraudulent Web sites that mimic a legitimate business's Web site.

c. e-mail messages that mimic the e-mail messages of a legitimate business.

d. bogus wireless network access points that look legitimate to users.

6. How do software vendors correct flaws in their software after it has been distributed?

a. Re-release software

b. Issue bug fixes

c. Issue patches

d. Issue updated versions

7. The Gramm-Leach-Bliley Act:

a. outlines medical security and privacy rules.

b. imposes responsibility on companies and management to safeguard the accuracy of

financial information.

c. requires financial institutions to ensure the security of customer data.

d. specifies best practices in information systems security and control.

8. Currently, the protocols used for secure information transfer over the Internet are:

a. SSL, TLS, and S-HTTP.

b. TCP/IP and SSL.

c. HTTP and TCP/IP.

d. S-HTTP and CA.

9. Most antivirus software is effective against:

a. any virus.

b. only those viruses already known when the software is written.

c. any virus except those in wireless communications applications.

d. only those viruses active on the Internet and through e-mail.

10. A digital certificate system:

a. uses tokens to validate a user's identity.

b. is used primarily by individuals for personal correspondence.

c. uses third-party CAs to validate a user's identity.

d. uses digital signatures to validate a user's identity.

11. Smaller firms may outsource some or many security functions to:

A) MSSPs.

B) MISs.

C) CAs.

D) ISPs.

12. A suite of integrated software modules for finance and accounting, human resources,

manufacturing and production, and sales and marketing that allows data to be used by

multiple functions and business processes best describes:

a. ERM software.

b. SCM software.

c. CRM modules.

d. ERP systems.

13. Why is overstocking warehouses not an effective solution for a problem of low availability?

a. It increases sales costs.

b. It increases inventory costs.

c. It does not speed product time to market.

d. It is an inefficient use of raw materials.

14. A network of organizations and business processes for procuring raw materials, transforming

these materials into intermediate and finished products, and distributing the finished products

to customers is called a:

a. distribution channel.

b. supply chain.

c. marketing channel.

d. value chain.

15. A company's organizations and processes for distributing and delivering products to the final

customers is the:

a. external supply chain.

b. downstream portion of the supply chain.

c. supplier's internal supply chain.

d. upstream portion of the supply chain.

16. Uncertainties arise in any supply chain because of:

a. inaccurate or untimely information.

b. unforeseeable events.

c. inefficient or inaccurate MIS.

d. poor integration between systems of suppliers, manufacturers, and distributors.

17. SFA modules in CRM systems would provide tools for:

a. capturing prospect and customer data.

b. managing sales prospect and contact information.

c. identifying profitable and unprofitable customers.

d. assigning and managing customer service requests.

18. ________ management is an important capability for service processes that is found in most

major CRM software products.

a. Lead

b. Returns

c. Account

d. Events

19. Customer relationship management applications dealing with the analysis of customer data to

provide information for improving business performance best describes ________ applications.

a. operational SCM

b. analytical CRM

c. analytical SFA

d. operational CRM

20. Based on your reading of the chapter, e-commerce is:

a. not yet fully accepted by consumers, although much of its driving technology is firmly

in place.

b. still in a revolutionary phase.

c. widely accepted by consumers, although technology is still quickly changing.

d. well entrenched as a form of modern commerce.

21. Varying a product's price according to the supply situation of the seller is called ________

pricing.

a. menu

b. asymmetric

c. dynamic

d. flexible

22. Compared to traditional goods, digital goods have:

a. lower marketing costs.

b. higher production costs.

c. greater pricing flexibility.

d. higher inventory costs.

23. Which of the following best illustrates the sales revenue model?

a. EBay receives a small fee from a seller if a seller is successful in selling an item.

b. Apple accepts micropayments for single music track downloads.

c. Flickr provides basic services for free, but charges a premium for advanced services.

d. Epinions receives a fee after steering a customer to a participating Web site where he

or she makes a purchase.

24. Exposing an individual to ads that are chosen and based on the recorded and analyzed online

behavior of the individual is referred to as:

a. long-tail marketing.

b. behavioral targeting.

c. online profiling.

d. clickstream advertising.

25. Which of the following describes long-tail marketing?

a. The dwindling sales of a once-popular book.

b. The yearly sales of one or two copies each of thousands of obscure films.

c. The unexpected growth of sales of a product long after its initial release.

d. The continued successful sales of a product over years.