Engineering Homework Help
The key use of the manufacturing execution module of supply chain management is to ________.assign optimal
The key use of the manufacturing execution module of supply chain management is to ________.
assign optimal
safety stock and target stock levels in all inventories in the supply network
forecast and plan anticipated demand for products
support receiving, storing, and picking of goods in a warehouse
support production processes, taking into account capacity and material constraints
ensure that the materials required for production are available where needed and when needed
QUESTION 62
________ refers to any software that covertly gathers information about a user through an Internet connection without the user’s knowledge.
Spyware
Spam
Cookie
Bot herder
Web filter
QUESTION 63
With regards to the World Wide Web, Web pages are stored on ________.
Web servers
Web consoles
Web hosts
Web rings
Web consortiums
QUESTION 64
Which of the following statements is true about an explicit knowledge asset?
It reflects a person’s ability to effectively solve a problem without external help.
It reflects the strategies that can be applied to an enterprise resource planning system.
It reflects knowledge that can be documented, archived, and codified, often with the help of information systems.
It reflects the processes and procedures that are located in a person’s mind on how to effectively perform a particular task.
It reflects an individual’s special knowledge about a new-to-the-world product.
QUESTION 65
Which of the following laws makes it mandatory for organizations to demonstrate that there are controls in place to prevent misuse and detect any potential problems?
Sarbanes–Oxley Act
Trade Expansion Act of 1962
U.S.A. Patriot Act
Central Intelligence Agency Act
Electronic Communications Privacy Act of 1986
QUESTION 66
At the ________ level of an organization, information systems provide key performance indicators (KPIs) that are focused on balancing performance across the organization.
illusive
tactical
operational
executive
managerial
QUESTION 67
In the order-to-cash process, checking credit is followed by ________.
creating an order
picking, packing, and shipping
allocating stock
collecting payment
preparing and sending the invoice
QUESTION 68
________ activities encompass all business activities associated with employee management, such as hiring, interview scheduling, payroll, and benefits management.
Technology development
Architectural
Account
Human resource
Procurement
QUESTION 69
________ testing is testing of the overall system to see whether it meets design requirements.
Alpha
Beta
Developmental
Evolutionary
Comparative
QUESTION 70
Responding to threats and opportunities and continuous planning are based on analyzing internal data primarily from the ________ level of an organization.
operational
business
tactical
strategic
executive
QUESTION 71
The network effect refers to the notion that the value of a network is dependent on ________.
the speed of the network
the technical expertise of the moderators
the knowledge of the users
the commitment of the users
the number of other users
QUESTION 72
________ attempts to increase the relevance of search results by including content from blogs and microblogging services.
Netsearch
Metasearch
Enterprise search
Social search
OpenSearch
QUESTION 73
With respect to the components of a business model, ________ is the utility that the product/service must offer to customers.
value migration
value proposition
value grid
revenue stream
cost structure
QUESTION 74
The term ________ was coined by Harvard business professor Jeffrey Rayport to describe how good business techniques can be driven by word-of-mouth or person-to-person communication.
blog marketing
affiliate business
stealth market
e-business
viral marketing
QUESTION 75
________ are false messages circulated online about new viruses, earthquakes, kids in trouble, cancer causes, or any other topic of public interest.
Logic bombs
Internet hoaxes
Cookies
Malware
Honeypots
QUESTION 76
Computer criminals who attempt to break into systems or deface Web sites to promote political or ideological goals are called ________.
crackers
social promoters
hacktivists
internet activists
online predators
QUESTION 77
Controls that are used to assess whether anything went wrong, such as unauthorized access attempts, are called ________ controls.
corrective
preventive
protective
adaptive
detective
QUESTION 78
________ systems are designed to handle multiple concurrent transactions from customers.
Network transaction maximization
Online transaction processing
Product allocation
Yield optimization management
Real utility management
QUESTION 79
Which of the following statements is true about the e-business innovation cycle?
The vertical dimension of the cycle shows the efficiency of a particular information technology and the horizontal dimension shows life expectancy of that information technology.
The vertical dimension of the cycle shows the extent to which an organization derives value from a particular information technology and the horizontal dimension shows time.
The vertical dimension of the cycle shows the life expectancy of a particular information technology and the horizontal dimension shows time.
The vertical dimension of the cycle shows the expected investments required for a particular information technology and the horizontal dimension shows time.
The vertical dimension of the cycle shows the user-friendliness of a particular technology and the horizontal dimension shows the investment in that technology.
QUESTION 80
The organization waits for an order, allowing the organization to initiate a ________ sequence to move the order through the production process.
working
pulling
propelling
rotating
pushing
QUESTION 81
Analytical tools are used to optimally utilize materials, equipment, and labor during the ________ process of supply chain planning.
inventory planning
production scheduling
distribution planning
demand forecasting
safety stock scheduling
QUESTION 82
A ________ is defined as an economic system in which assets or services are shared between private individuals, either free or for a fee.
flexible economy
social economy
services economy
communication economy
sharing economy
QUESTION 83
How can the effectiveness of e-mail advertising campaigns be measured directly?
by including special links in the e-mail that allow tracking which e-mails the customers have opened or reacted to
by reflecting the percentage of visitors who actually perform the marketer’s desired action
by creating use cases and business models to determine the ratio of the opened mails to the sent mails
by reflecting the number of surfers who click on an ad divided by the number of times it was displayed
by conducting online polls, starting online forums, and collecting user feedbacks
QUESTION 84
________ planning focuses on delivering products or services to consumers as well as warehousing, delivering, invoicing, and payment collection.
Safety stock
Distribution
Inventory
Product demand
Production
QUESTION 85
Which of the following can be cited as an example of a digital divide?
Sam has better multitasking skills than Neal that make him a better manager.
Kevin has better chances of promotion when compared to Vincent because of his people skills.
Lora has access to more information than Frank because she knows how to operate a computer.
Unlike Joey, Ryan has access to more books and good advice because he studies in a better school.
Unlike Ben, Claudia possesses superior analytical skills that make her better at mathematics.
QUESTION 86
A company implements a new information system and observes a 5 percent increase in its monthly sales. This is a(n) ________ of the system.
intangible benefit
tangible benefit
tangible cost
non-recurring cost
recurring cost
QUESTION 87
In e-business terminology, ________ companies are sometimes called “pure play companies.”
click-only
click-and-flip
bricks-and-clicks
click-and-mortar
brick-and-mortar
QUESTION 88
Managers at the ________ level include the president and chief executive officer, vice presidents, and possibly the board of directors.
functional
executive
tactical
operational
illusive
QUESTION 89
Identify a true statement about reintermediation regarding e-tailing.
It