Вы находитесь на странице: 1из 5

FIRST_LAST NAME Print out a copy, write your selections to the left of the question number. 1.

A(n) __D__ is a set of processes that combine to yield a profit. a. value system c. shipping profile b. industry value chain d. business model

CIS 335 Final Exam

2. A(n) __C__ is a specific collection of business processes used to identify customers, market to those customers, and generate sales to those customers. a. industry value chain c. revenue model b. strategic alliance d. value-added network 3. The combination of store design, layout, and product display knowledge is called __C__. a. business process c. merchandising b. business transaction d. Service 4. Businesses often calculate __A__ numbers before committing to any new technology. a. return-on-investment c. Productivity b. return-to-profit d. return-to-value 5. __C__ determine how the sending device indicates that it has finished sending a message, and how the receiving device indicates that it has received the message. a. Routers c. Protocols b. Bridges d. Adapters 6. In networking applications, an 8-bit number is often called a(n) __A__. a. octet c. Piconet b. netbit d. Bit 7. Network engineers have devised a number of stopgap techniques to stretch the supply of IP addresses. One of the most popular techniques is __A__. a. subnetting c. sub-blocking b. subletting d. piconetting 8. A computer called a ____ converts private IP addresses into normal IP address when it forwards packets from those computers to the Internet. a. routing algorithm device c. subnet translation device b. network address translation device d. private network device 9. Stock brokerage firms use a(n) __B__ revenue model, which allow them to charge their customers a commission for each trade executed. a. fee-for-service c. information sales b. fee-for-transaction d. catalog 10. The U.S. government deregulated the securities trading business in the early __B__. a. 1960s c. 1980s b. 1970s d. 1990s 11. The greatest concerns that most people have when they consider moving their financial transactions to the Web are __B__ and reliability. a. service c. stickiness b. security d. control

1|Page

FIRST_LAST NAME Print out a copy, write your selections to the left of the question number. 12. __B__ revenue models range from games and entertainment to financial advice and the professional services of accountants, lawyers, and physicians. a. Catalog c. Fee-for-transaction b. Fee-for-service d. Mail order 13. A(n) __B__ occurs when a visitor requests a page from the Web site. a. page load c. page access b. visit d. index 14. The first time that a particular visitor loads a Web site page is called a __A__. a. trial visit c. repeat visit b. fresh visit d. page visit 15. Some Web pages have banner ads that continue to load and reload as long as the page is open in the visitors Web browser. Each time the banner ad loads is a(n) __ C__. a. view c. impression b. count d. click 16. The marketing strategy that includes the practice of sending e-mail messages to people who have requested information on a particular topic or product is part of __C__ marketing. a. active c. permission b. conversion d. passive 17. The classic objective of __B__ is to provide the right goods in the right quantities in the right place at the right time. a. procurement c. transaction processing b. logistics d. production

CIS 335 Final Exam

18. One common support activity that underlies multiple primary activities is __C__. a. record-keeping c. training b. auditing d. regulation 19. __B__ is the intentional collection, classification, and dissemination of information about a company, its products, and its processes. a. Database management c. Data warehousing b. Knowledge management d. Data mining 20. One trend that is becoming clear in purchasing, logistics, and support activities is the shift away from hierarchical structures toward __C__ structures. a. vertical c. network b. horizontal d. matrix 21. In or a. b. an auction, a third-party ____ service can be used to hold the buyer's payment until he she receives and is satisfied with the purchased item. insurance c. escrow risk management d. guarantee

22. Existing auction sites, such as eBay, are inherently more valuable to customers than new auction sites. This is called a(n) __B__. a. opt-in effect c. lock-out effect b. lock-in effect d. opt-out effect

2|Page

FIRST_LAST NAME Print out a copy, write your selections to the left of the question number. 23. Many people think of Priceline.com as a __D__ auction site. a. double c. sealed-bid b. shill bid d. seller-bid 24. Large companies sometimes have __A__ who find buyers for unusable inventory items. a. liquidation specialists c. accountants b. inventory specialists d. auditors 25. Smaller businesses often sell their unusable and excess inventory to __B__, which are firms that find buyers for these items. a. inventory specialists c. inventory removal services b. liquidation brokers d. secondary marketers 26. Disputes that arise when one person has registered a domain name that is an existing trademark or company name are settled by __A__. a. WIPO c. statutory law b. common law d. ACPA

CIS 335 Final Exam

27. __C__ occurs when owner information maintained by a public domain registrar is changed in the registrars database to reflect a new owners name and business address. a. Trademark infringement c. Domain name ownership change b. Product disparagement d. Signatory change 28. A __B__ is a digital code or stream embedded undetectably in a digital image or audio file. a. validation code c. patent b. watermark d. cookie 29. A __A__ statement is a statement that is false and that injures the reputation of another person or company. a. defamatory c. deceptive b. fraudulent d. critical 30. If a statement injures the reputation of a product or service instead of a person, it is called __C__. a. defamatory c. product disparagement b. product defamation d. company defamation 31. A(n) __C__ is a program that attaches itself to another program and can cause damage when the host program is activated. a. e-mail filter c. computer virus b. challenge-response d. dead link 32. More than __90__ percent of all e-mail messages (including messages transmitted to both business and personal users) will continue to be spam until effective technical solutions can be implemented. a. 60 c. 80 b. 70 d. 90 33. __A__ is also known as unsolicited commercial e-mail. a. Spam c. VPN b. CGI d. Java

3|Page

FIRST_LAST NAME Print out a copy, write your selections to the left of the question number. 34. A __D__ spam filter examines From addresses and compares them to a list of known good sender addresses. a. black list c. Tracert b. full-privilege d. white list 35. A program called _C___ tests the connectivity between two computers connected to the Internet. a. Telnet c. Ping b. Tracert d. Finger 36. Application servers are usually grouped into two types: page-based and __B__ systems. a. server-based c. script-based b. component-based d. group-based 37. __A__ is accomplished by programs that transfer information from one application to another. a. Application integration c. Co-location b. Data mining d. Interoperability 38. Larger businesses often prefer to use a __C__ application system that separates the presentation logic from the business logic. a. monolithic c. component-based b. database-driven d. client-based 39. __A__ software packages are business systems that integrate all facets of a business, including accounting, logistics, manufacturing, marketing, planning, project management, and treasury functions. a. ERP c. ERT b. EML d. HTL 40. ERP is the acronym for __B__. a. electronic record processing b. enterprise resource planning c. enterprise record provider d. electronic resource provider

CIS 335 Final Exam

41. __D__ is the electronic defacing of an existing Web sites page. a. Masquerading c. Cybersquatting b. Steganography d. Cybervandalism 42. __B__ is pretending to be someone you are not or representing a Web site as an original when it is really a fake. a. Hash coding c. Cybersquatting b. Spoofing d. Warchalking 43. __B__ encryption encodes a message with an algorithm that uses a single numeric key, such as 456839420783, to encode and decode data. a. Hash coding c. Asymmetric b. Symmetric d. Transformative 44. A Web server can compromise __C__ if it allows automatic directory listings. a. necessity c. secrecy b. integrity d. authenticity

4|Page

FIRST_LAST NAME Print out a copy, write your selections to the left of the question number. 45. __A__ is an area of memory set aside to hold data read from a file or database. a. RAM c. A buffer b. A cookie d. Main memory 46. A disadvantage of __B__ wallets is that they are not portable. a. server-side c. Paypal b. client-side d. virtual 47. A __D__ is a stored-value card that is a plastic card with an embedded microchip that can store information. a. credit card c. charge card b. debit card d. smart card 48. The largest dollar volume of payments today are made using __A__. a. paper checks c. credit cards b. debit cards d. PayPal 49. __C__ is a technique for committing fraud against the customers of online businesses. a. Due diligence c. Phishing b. Money laundering d. Chargeback 50. __B__ is a criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit. a. Pharming c. Due diligence b. Identity theft d. Money laundering

CIS 335 Final Exam

5|Page

Вам также может понравиться