A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor’s advertising costs up. This is an example of:
Question options:
phishing.
pharming.
spoofing.
click fraud.
Question 2
The total amount of digital information that can be transmitted through any telecommunications medium is measured in:
Question options:
bps.
Hertz.
baud.
gigaflops.
Question 3
Which of the following specifications replaces WEP with a stronger security standard that features changing encryption keys?
Question options:
TLS
AUP
VPN
WPA2
Question 4
T1 lines:
Question options:
operate over existing telephone lines to carry voice, data, and video.
operate over coaxial lines to deliver Internet access.
do not provide guaranteed service levels, but simply "best effort."
are high-speed, leased data lines providing guaranteed service levels.
Question 5
Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents?
Question options:
MAN
Domain-based
LAN
Peer-to-peer
network
WAN
Question 6
What are the four layers of the TCP/IP reference model?
Question options:
Physical, application, transport, and network interface
Physical, application, Internet, and network interface
Application, transport, Internet, and network interface
Application, hardware, Internet, and network interface
Question 7
Which of the following is a type of ambient data?
Question options:
Computer log containing recent system errors
A file deleted from a hard disk
A file that contains an application’s user settings
A set of raw data from an environmental sensor
Question 8
Which of the following is NOT a characteristic of packet switching?
Question options:
Packets travel independently of each other.
Packets are routed through many different paths.
Packet switching requires point-to-point circuits.
Packets are reassembled into the original message when they reach their destinations.
Question 9
The Internet is based on which three key technologies?
Question options:
TCP/IP, HTML, and HTTP
TCP/IP, HTTP, and packet switching
Client/server computing, packet switching, and the development of communications standards for linking networks and computers
Client/server computing, packet switching, and HTTP
Question 10
Which signal types are represented by a continuous waveform?
Question options:
Laser
Optical
Digital
Analog
Question 11
Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n):
Question options:
security policy.
AUP.
risk assessment.
business impact analysis.
Question 12
“Predictive search” in Google’s search engine:
Question options:
predicts what you are looking for as you enter words into the query box.
uses a tracking service and cookies on your browser to predict search results.
uses a knowledge graph of what similar people searched on to predict your search interests.
uses a semantic approach to predict what you are looking for.
Question 13
The telephone system is an example of a __________ network.
Question options:
peer-to-peer
wireless
packet-switched
circuit-switched
Question 14
A(n) __________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or
hub
.
Question options:
RFID receiver
WiMax receiver
access point
hub
Question 15
The concept of a future Web in which it is commonplace for everyday objects to be connected, controlled, or monitored over the Internet is called:
Question options:
the Internet of Things.
the Semantic Web.
Internet2.
a 3-D Web.
Question 16
Biometric authentication:
Question options:
is inexpensive.
is used widely in Europe for security applications.
can use a person’s voice as a unique, measurable trait.
only uses physical measurements for identification.
Question 17
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
Question options:
SSL/TLS
Symmetric key encryption
Public key encryption
Private key encryption
Question 18
A foreign country attempting to access government networks in order to disable a national power grid would be an example of:
Question options:
phishing.
cyberwarfare.
cyberterrorism.
Question 19
The child domain of the root is the:
Question options:
top-level domain.
second-level domain.
host name.
domain extension.
Question 20
Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?
Question options:
MAN
Wireless
LAN
Peer-to-peer
Online Exam 5
Question 21
Customer relationship management systems typically provide software and online tools for sales, customer service, and:
Question options:
marketing.
account management.
advertising.
public relations.
Question 22
Netflix’s public announcement of a reward for a technology solution to its movie recommendation system is an example of:
Question options:
prediction markets.
behavioral targeting.
crowdsourcing.
social shopping.
Question 23
Which of the following best describes the digital social graph?
Question options:
A person’s direct and indirect relationships
All of a person’s closest digital relationships
A mapping of all online social relationships
All of the online and offline relationships a person has
Question 24
Operational
CRM applications include tools for:
Question options:
identifying buying patterns.
calculating CLTV.
sales force automation.
pinpointing unprofitable customers.
Question 25
__________ CRM includes customer-facing applications such as tools for sales force automation, call center and customer service support, and marketing automation.
Question options:
Analytical
Employee
Operational
Partner
Question 26
What is the difference between personalization and customization, as applied to e-commerce technologies?
Question options:
Customization is any type of adjustment made to a product by the user; personalization refers to a business changing a product or service for the user.
Personalization is any type of adjustment made to a product by the user; customization refers to a business changing a product or service for the user.
Customization refers to adjusting marketing messages for a consumer; personalization refers to adjusting a product or service based on a user’s preferences.
Personalization refers to adjusting marketing messages for a consumer; customization refers to adjusting a product or service based on a user’s preferences.
Question 27
Which of the following best illustrates the sales revenue model?
Question options:
eBay receives a small fee from a seller if a seller is successful in selling an item.
Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase.
Flickr provides basic services for free, but charges a premium for advanced services.
Apple accepts
micropayment
s for single music track downloads.
Question 28
The business value of an effective supply chain management system includes all of the following EXCEPT:
Question options:
faster time to market.
cost reduction.
supply matched to demand.
improved delivery service.
Question 29
Compared to digital markets, traditional markets have:
Question options:
lower search costs.
stronger network effects.
higher delayed gratification effects.
higher transaction costs.
Question 30
Enterprise software is built around thousands of predefined business processes that reflect:
Question options:
the firm’s organization.
industry goals.
best practices.
cutting edge workflow analyses.
Question 31
Which of the following is NOT one of four types of presence to be considered when building an E-commerce presence?
Question options:
Offline media
Websites
Social media
Corporate
Question 32
In order to achieve maximum benefit from an enterprise software package, a business:
Question options:
customizes the software to match all of its business processes.
uses only the processes in the software that match its own processes.
changes the way it works to match the software’s business processes.
selects only the software that best matches its existing business processes.
Question 33
Supply chain software can be classified as either supply chain __________ systems or supply chain __________ systems.
Question options:
planning; execution
demand; continual
upstream; downstream
push; pull
Question 34
Content providers use __________ systems to process large amounts of very small monetary transactions cost-effectively.
Question options:
subscription
mobile payment
transaction fee
micropayment
Question 35
Walmart’s continuous replenishment system is an example of a __________ model.
Question options:
push-based
pull-based
enterprise-based
supply chain optimization
Question 36
A third-party Net marketplace that connects many buyers and suppliers for spot purchasing is called a(n):
Question options:
exchange.
vertical market.
private exchange.
e-hub.
Question 37
A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes:
Question options:
process management software.
ERP systems.
groupware.
application software.
Question 38
Net marketplaces:
Question options:
focus on continuous business process coordination between companies for supply chain management.
are industry owned or operate as independent intermediaries between buyers and sellers.
are geared towards short-term spot purchasing.
are more relationship oriented than private industrial networks.
Question 39
Which of the following is NOT an example of next-generation enterprise applications?
Question options:
Open-source solutions
Social CRM
Solutions incorporating SCM
Solutions incorporating SOA
Question 40
Information density refers to the:
Question options:
richness—complexity and content—of a message.
total amount and quantity of information delivered to consumers by merchants.
total amount and quantity of information available to all market participants.
amount of information available to reduce price transparency.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.