Created by Phylicia Addison Meek
almost 9 years ago
|
||
Question | Answer |
What is E Commerce a) being able to shop from home or from work b)rules that govern transmission of information between two points c)an infrasturture that collects, stores and analyses data d) using the web and internet to do transactions | Answer: d |
What does business to customer mean? a) selling of goods to other businesses b)the effort needed to find suitable products c)using patterns to predict future behaviour of customers d)retailers selling goods directly to customers | Answer:d |
What is a social shopping site? a)swapping shopping ideas with people b)getting advice from people on decisions about products c)using the intelligent agent software to look for shopping information | Answer: a |
What are prediction markets a)uses of patterns to try and predict the future b)peer to peer betting markets on specific outcomes c)the subset of trying to make the internet intelligent and more human like | answer: b |
What is consumer to consumer mean? a) a network of organizations transforming materials into products b)focusing on customers who bring in the most sales c)individuals using the internet for private sales d) none of the above | answer:c |
What are digital goods? a) transaction that can happen over mobile device b)telephone&computer networks combing into a single digital network c)selling the same good to different groups at different prices d) goods that can be sold through a digital network like music download | answer: d |
What is dynamic pricing ? a) the price of a product will change depending on the demand b)basically cutting out the middle man and increasing profits c) generating revenue the more visitors there are d) all of the above | answer: a |
What is the meaning of richness in business commerce a) having a message that integrates face to face integration and visuals b) generating lots of revenue by selling goods c)a digital environment where sellers and buyers meet d) none of the above | answer: a |
What is Cost Transparency? a) the cost of participating in a market b) the various prices for products consumers want in a market c)finding how much it cost for sellers to get this product themselves d) the effort needed to find suitable products | answer: c |
Functions of switches and routers by a central program a)Transmission Control Protocol b)Software Defined Networking c)supply chain management d)Geographic information systems | answer:b |
what is client/server computing? a) basically focusing on one specific area within the data b)links suppliers , manufacturing and retailers c)retailing of products directly to customers d) clients linked through network controlled by server computer | answer: d |
What is Packet Switching? a) slicing messages into packets and sending them through communication paths b)unstructured or structured data that needs to be analyzed c)using data warehouses to collect data on customers d)voice data communication | answer: a |
Networks that span over entire regions or continents a)Local Area networks ( LANs) b) Wide are Network (WANs) c) information density d)Group decision support system | answer:b |
What is a search engine optimization (SE0)? a)helps to see patterns and relationships that would be difficult to see in text b) built around thousands of predefined business processes c)adjusting the web site and traffic to improve rankings | answer:d |
Delivering voice transmission through digital voice communication.ex,Skype a) Voice over IP b)Social CRM tools c)Podcasting d)none of the above | answer: a |
Hertz a)when there is a miscommunication about the demand for a product causing distortion b) blogging when you have a max of 140 words c)the number of cycles per second that can be sent through a medium, unit of measure d)seeing different pattern in software data and see how it helps decisions | answer:c |
What is a semantic web? a)the subset of trying to make the web more intelligent and human like b)one or more access points providing wireless internet c)computer algorithms to help decision making d) all of the above | answer: a |
What is responsible for tracking the movement of goods throughout the supply chain? a)Business to Business b)Radio frequency identification( RFID) C)Sales force automation (SFA) d) Software defined network(SDN) | ANSWER:b |
You receive information from layers above and below you this is a form of? a) interpersonal roles b) decisional roles c) information roles d) all of the above | answer: c |
High velocity Automated Decision Making a)is basically when high quality decisions come from high quality of knowledge b)computer algoritms precisely help to make highly structured decisions c)when production is based off of forecast or guesses for demand for products d) none of the above | answer: b |
Data that might be unstructured/structured from many different sources that need to be organized and stored. a) Business intelligence b)Enterprise Software c)Data from the business environment d) Broad Band | answer: c |
What is business intelligence? a)the foundation of business structures captures all relative data and stores it in a transactional data base b)built around thousands of predefined business processes c)basically the internet giving more detailed info but reducing many things | answer: a |
This would basically be focusing on one specific area or topic within the data you are analyzing a)Drill down b)Network Operating systems (NOS) C)Parametrized reports d) Push based demand driven supply chains | answer: c |
What are DrillDowns? a)rules that govern transmission of information between points b)how organizations can solve problems depending on geo area c) getting a summary and being able to dig deeper and find more info d) none of the above | answer: c |
What is geographic information systems(GIS) a)ties location-related data to maps b)helping in finding information on the internet c)individuals using the web for private sales or exchange d) focusing on profitable customers where you will find the most sales | answer: a |
An intelligent technique for capturing tacit knowledge in a very specific and limited domain of human expertise. a) Mangement information systems (MIS) B) Expert Systems c)Client/server computing d)Market Space | answer: b |
What are Group decision support systems (GDSS) a) sending packets along different communication paths as they become available b)a more uniform organization if you aline the processes with your systems it becomes more streamline c)basically a group of people collaborating to solve decision making issues | answer: c |
this basically ask many different questions depending on the decision that needs to be made and helps to produce a large range of outcomes a)Sensitivity Analysis b)Pivot table c)Corporate network infrastructure d) none of the above | answer: a |
Basically it helps to analyze the main information within the business by looking at four different categories: finical, business processes, customers and learning and growth a)Software denied networking (SDN) B) Balanced scorecard method c)supply chain management Systems d) information density | answer:b |
What is Business performance management : BMP A)tools and techniques to analyzing data and reports responding to managers concerns b)trying to monitor different sectors of the company similar to the balanced score card c)sales and services directed to other businesses d)all of the above | answer: b |
What is an Enterprise systems? a)a combination of many different business processes b)policies and procedures used to prevent unauthorized access to information c)infrastuture for collecting and sorting data produced by the businesses | answer:a |
Taking raw materials and making then into products that can be sold a)Business to Customer (B2C) B)Packet Switching c)General Controls d)Supply chain Management | answer: d |
What is Supply chain planning Systems? a)methods and policies that ensure safety of the firms assets and accounting records b)analyzing present supply chain management and making predictions c)functions of switching and routers managed by central program | answer: b |
Production master schedules are based on forecasts or best guesses of demand for products. a)Pull Based b)Push Based c)client/server computing d)information density | answer:b |
What is Pull Based? a) this is basically when consumers purchase and demand are the main triggers for supply chain b)the increase in connection speed between devices and small mobile networks c)focusing on a specific topic when analyzing data | answer: a |
Capture and integrate customer data from across the organization directly from customers to see what to sell. a)Social CRM tools b)affilate revenue model c)Customer Relationship Mangement (CRM)systems d) none of the above | answer:c |
sales prospect and contact information to see thermos profitable customers a) Sales for automation(SFA) b)Local area Networks ( LANs) c)Business analytics D) Business performance management (BPM) | ANSWER:a |
What is Operational CRM? a) basically this is the indicator to see the growth or loss of a company b) basically customers facing difficulty which applications can use a customer service c)when consumers offer information to businesses on decisions and products d) not the of the above | answer: b |
What is analytical CRM? a)clients linked through network controlled by server computer b) all significant outline relationships c) gathering information on the customers to see how it can better the business processes | answer:c |
Number of customers who stop using or purchasing a product or service . a) Churn rate b) hertz c)Cost transparency d)predictive analytics | answer: a |
What is social CRM tools? a) Customer to customer b) businesses connecting to customers through conversations from social media c) services that are mainly available in ones area d) all of the above | answer: b |
What is just in time strategy ? | basically having just enough goods that are demanded and getting them just in time along with shipping them out as soon as they leave the assembly line |
Bullwhip Effect | when there is a miscommunication with regards to demand for a product. This information gets distorted and can mess up how much is outputted |
Customer Lifetime Value (CLTV) | Basically all the revenue you have gotten from this customer and the accumulated expenses to make the products available form them and how long they have been your customer. |
What is security? | Policies and procedures are used to prevent unauthorized access or altercation to information systems |
What are controls? | Methods and policies that ensure safety of the firms assets |
What is the main danger of using DSL( Digital Subscriber line) | - the main issue is that computers using this are connected to a fixed address and thus makes it easier for outside penetration |
What is war driving? | basically people who drive by areas and try and intercept wifi and tries to detect SSID |
SSID( Service Set Identifiers ) | looks for accesses to the information |
Malware | this is basically milicous software such as worms, trojan horses and computer viruses |
What are worms? | -independent computer softwares that jump from computer to computer - they also destroy data |
Drive by downloads | basically malware systems that appears after you download something usually unrequested |
What is trojan horse | basically softwares that seem harmless but they are actually very dangerous |
Spyware | -keeps logging records , can steal passwords |
Hackers | - basically people trying to access unauthorized information |
Crackers | basically hackers with criminal intent |
Spoofing | pretending to be someone your not and redirecting people to different web pages |
Sniffing | ease droppings on infomation between networks |
DOS( Denial of service)& Distributed DOS | -hackers who flood networks with false communication until is crashes - distributed DOS is when multiple computer help to crash system |
Phishing | fake emails that look for legitimate but are asking for information |
Evil Twins | fake wireless networks that pretend to have a safe wifi |
pharming | redirects people to fake websites |
botnet | basically when a hacker infects a computer and asses a back door to give instructions |
Social engineering | tricking employees into giving personal and business information |
Computer Forencsics | is the scientific collection , examination and analyis of data held on or retrieved from computer storage that can be used for a court of law |
General Controls | apply to all computerized applications of hardware , software and mannual procedures |
Discover recovery Planning | devises plans for the restoration of computing and communications services after they have been disrupted |
Business Continuity Planning | -focuses on how a business can restore business operations after a disaster strikes - identifies critical business processes and determines actions plans for handing mission critical functions if systems go down |
Auditing | - measure the firms overall security environment -reviews the technology and equipment and makes sure everything working |
smart card | used in economic payment a card use to access permission |
firewalls | hardware and software controlling flow of incoming and outgoing network traffic - protect unauthorized users |
Infusion Detection Systems | full time monitoring tools placed at the most vulnerable points of the carpet |
Authentication | the ability to a person is actually who they say they are |
antivirus | checks computer systems for viruses |
Unified Threat Management (UTM) | - basically an alliance safety software for your organizations networks and includes things such as firewalls |
Encryption | basically transforming one form of text to another cipher form or text that can only read b the sender & receiver |
Secure Sockets Layer (SSL) | ALLOWING SERVER COMPUTERS TO MANAGE AND ENCRYPT /DECRYPT inforamation they send to others through a web session that is safe |
Digital Certificates | -used to establish someones identity - and protects electronics assists from online trasactions |
Want to create your own Flashcards for free with GoConqr? Learn more.