Optimize the flow of materials

Assignment Help Finance Basics
Reference no: EM13755124

Question 1: Wal-Mart and Levi Strauss collaborate on demand forecasting in order to optimize the flow of materials along the supply chain. This is an example of:

A. reducing design cycle time.

B. APS.

C. reducing product development time.

D. CPFR.

Question 2: __________ is a business strategy that enables manufacturers to control and share product-related data as part of product design and development efforts.

A. Advanced planning and scheduling

B. Collaborative planning

C. Product lifecycle management

D. Internal commerce

Question 3: When large suppliers or buyers are involved, a workflow system:

A. is needed for both the collaborative efforts and for supply chain and production improvements.

B. is needed for collaborative efforts only.

C. may be helpful for supply chain improvements.

D. will fail because of system incompatibilities.

Question 4: Groupware is appropriate in all of the following situations EXCEPT:

A. for groups to share ideas and opinions.

B. for people working on different tasks or projects.

C. for networked environments.

D. for people in the same room.

Question 5: Cyber cons have a negative effect on EC because:

A. defending against these cons and compensating for damages significantly increase the costs of EC.

B. a majority of potential customers do not shop online because they are too afraid of fraud to trust online merchants.

C. companies cannot expand their e-business to other countries with underdeveloped legal systems.

D. con artists have gone low-tech.

Question 6: The key reasons why EC criminals cannot be stopped include each of the following EXCEPT:

A. strong EC security makes online shopping inconvenient and demanding on customers.

B. sophisticated hackers use browsers to crack into Web sites.

C. lack of cooperation from credit card issuers and foreign ISPs.

D. online shoppers do not take necessary precautions to avoid becoming a victim.

Question 7: The protection of information systems against unauthorized access to or modification of information that is stored, processed, or being sent over a network is referred to as:

A. information assurance.

B. information defense.

C. information security triad.

D. information integrity.

Question 9: Social engineering attacks:

A. are an example of technical attacks requiring software or systems knowledge.

B. are a combination of technical and nontechnical attacks.

C. take advantage of Web 2.0 applications like social networking sites, blogs, wikis and RSS feeds.

D. are no longer considered to be serious Internet threats due to the increased security of MySpace, LinkedIn, and YouTube.

Question 10: A botnet is:

A. a piece of code in a worm that spreads rapidly and exploits some known vulnerability.

B. a piece of software code that inserts itself into a host or operating system to launch DOS attacks.

C. DOS attacks.

D. a collection of a few hundreds of thousands of hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet.

Question 11: Access to a network ought to be based on:

A. the policy of least privilege where access to network resources are blocked and permitted only when needed to conduct business.

B. the policy of acceptable use where access is restricted by the firewall.

C. role-specific security protocols where access is limited by a user's level of trust.

D. the policy of need-to-know where access by all non-employees is blocked.

Question 12: The advantages of virtual private networks (VPN) for data communications include all of the following EXCEPT:

A. they are less expensive than private leased lines because they use the public Internet to carry information.

B. they ensure the confidentiality and integrity of the data transmitted over the Internet without requiring encyption.

C. they can reduce communication costs dramatically because VPN equipment is cheaper than other remote solutions.

D. remote users can use broadband connections rather than make long distance calls to access an organization's private network.

Question 13: The basic security concepts relating to customers and other users are:

A. confidentiality, integrity, and availability.

B. information assurance, confidentiality, and authentication.

C. authentication, authorization, and nonrepudiation.

D. authorization, nonrepudiation, and information assurance.

Question 14: A vulnerability:

A. is a software bug.

B. is the probability that a weakness will be known and used.

C. is the estimated cost, loss, or damage that can result if a threat exploits a vulnerability.

D. is a weakness in software or other mechanisms that a hacker can use directly to gain access to a system or network.

Question 15: __________ is a crime ware technique used to steal the identity of target companies to get the identities of their customers.

A. Spamming

B. Pretexting

C. Social engineering

D. Phishing

Question 16: Brand building is important in B2B exchanges because:

A. exchange members typically buy only the best brands of product.

B. information flow is poor in most exchanges, making trust of suppliers very important.

C. it is easy for exchange members to change to another exchange.

D. exchange members typically buy products at the lowest cost unless branded.

Question 17: A company's internal operations and its relationships with suppliers and other business partners are frequently:

A. as complex as customer-facing applications such as taking an order online.

B. much more complex than customer-facing applications such as taking an order online.

C. much less complex than customer-facing applications such as taking an order online.

D. replaced by customer-facing applications.

Question 18: For a manufacturer, the supply chain ends when the:

A. supplier delivers raw materials and component parts to the manufacturer.

B. customer buys the product.

C. product is used up and disposed of.

D. customer decides he/she is satisfied with a product.

Reference no: EM13755124

Questions Cloud

Hr manager for a company with a high performance : Imagine that you are HR manager for a company with a high performance work system that includes the right combination of people, technology, and organizational structure. Provide two (2) suggestions for how the combination of these factors can contri..
Define management and its complexity and pervasiveness : Define management and its complexity and pervasiveness and why it is important for students to study it
Explain the importance of roman technology and engineering : explain the importance of Roman technology and engineering, especially as it related to making its giant cities livable.
Benefits of the planning stage for managers : Discuss one to two (1-2) benefits of the planning stage for managers. Next, describe your planning process at work or school. Your response should include how you know when you need to develop a plan, how long you take to plan for a project or work r..
Optimize the flow of materials : Wal-Mart and Levi Strauss collaborate on demand forecasting in order to optimize the flow of materials along the supply chain. This is an example of:
Difference between navigation mode and editing mode : In Datasheet view, what is the difference between navigation mode and editing mode? What command can you use in Datasheet view to remove the display of one or more fields from the datasheet
Discuss the product life cycle concept : The following 5 questions are your midterm exam. Please follow 6th edition APA format including ample research. It is recommend that you aim for 2-3 paragraphs per question and use each question as a heading so that the paper is organized.Question 1:..
Explain differences between viruses and worms : the differences between viruses and worms in their behavior, characteristics, and attack vectors. Their exploitation has been devastating in the past. Provide some examples of those malware outbreaks we have seen in the past.
Explain and support the first disadvantage : Explain, and support the first disadvantage (economic, social, political, environmental, social, equitable, ethical/moral, etc.) to your solution and provide a logical answer - Persuasive Paper - Possible Disadvantages - Answers with Visuals

Reviews

Write a Review

Finance Basics Questions & Answers

  Financial reporting and analysis

Finance is about Gunns Ltd, a company in dealing with forestry products in Australia. The company has also been listed in Australian Stock Exchange. As many companies producing forestry products, even Gunns Ltd is facing various problems. Due to the ..

  A report on financial accounting

This report is specific for a core understanding for Financial Accounting and its relevant factors.

  Describe the types of financial ratios

Describe the types of financial ratios and other financial performance measures that are used during venture's successful life cycle.

  Differences between sole proprietorship and corporation

Briefly describe the major differences between a sole proprietorship and a corporation

  Prepare a cash budget statement

Calculate the expected value of the apartment in 20 years' time. What is the mortgage loan repayment at the beginning of each month

  What are the implied interest rates

What are the implied interest rates in Europe and the U.S.?

  State pricing theory and no-arbitrage pricing theory

State pricing theory and no-arbitrage pricing theory

  Small business administration

Identify the likely stage for each venture and describe the type of financing each venture is likely to be seeking and identify potential sources for that financing.

  Effect of financial leverage

The Effect of Financial Leverage and working capital management

  Evaluate the basis for the payment to the lender

Evaluate the basis for the payment to the lender and basis for the payment to the company-counterparty.

  Importance of opps, ipps, mpfs and dmepos

Research and discuss the differences and importance of : OPPS, IPPS, MPFS and DMEPOS.

  Time value of money

Time Value of Money project

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd