E-Business Quiz

Only available on StudyMode
  • Download(s) : 273
  • Published : May 1, 2011
Open Document
Text Preview
View Results

Final Practice Exam
User ID: nb12Attempt: 3 / 3Out of: 0
Started: April 26, 2011 1:42amFinished: April 26, 2011 2:21amTime spent: 39 min. 8 sec. Student finished 1 hr, 0 min., 52 sec. ahead of the 100 min. time limit.

Question 1 (0 points)
Which of the following describes ETL?
Student response:Percent
ValueCorrect
ResponseStudent
ResponseAnswer Choices
0.0%a. A process that extracts information from internal and external databases 0.0% b. A process that transforms information using a common set of enterprise definitions 0.0%c. A process that loads information into a data warehouse 100.0% d. All of the alternatives

Score:0%

Question 2 (0 points)
What are the factors included in the global customer's category of global IT business drivers? Student response:Percent
ValueCorrect
ResponseStudent
ResponseAnswer Choices
0.0% a. Common equipment, facilities, assembly processes, and people are shared by a global company and IT can track shared resources 0.0%b. The knowledge and expertise of colleagues in a global company can only be accessed, shared, and organized by global IT systems 100.0% c. Customers who travel anywhere or companies with global operations and global IT systems help provide fast, convenient, homogeneous service 0.0%d. Products are the same worldwide and global IT can help manage worldwide marketing, sales, and quality control

Score:0%

Question 3 (0 points)
What is immediate, up-to-date information?
Student response:Percent
ValueCorrect
ResponseStudent
ResponseAnswer Choices
100.0% a. Real-time information
0.0% b. Real-time systems
0.0%c. Information granularity
0.0%d. All of the alternatives

Score:0%

Question 4 (0 points)
What is the most secure type of authentication?
Student response:Percent
ValueCorrect
ResponseStudent
ResponseAnswer Choices
0.0%a. Something the user knows such as a user ID and password 0.0%b. Something the user has such as a smart card or token 0.0%c. Something that is part of the user such as a fingerprint or voice signature 100.0% d. Combination of All of the alternatives

Score:100%

Question 5 (0 points)
Which of the following operational CRM technologies does the marketing department typically use? Student response:Percent
ValueCorrect
ResponseStudent
ResponseAnswer Choices
0.0%a. Contact center, web-based self-service, call scripting 0.0%b. Contact center, cross-selling and up-selling, web-based self-service 0.0% c. List generator, opportunity management, cross-selling and up-selling 100.0% d. List generator, campaign management, cross-selling and up-selling

Score:0%

Question 6 (0 points)
Which of the following does a firewall perform?
Student response:Percent
ValueCorrect
ResponseStudent
ResponseAnswer Choices
0.0%a. Examines each message that wants entrance to the network 0.0%b. Blocks messages without the correct markings from entering the network 0.0% c. Detects computers communicating with the Internet without approval 100.0% d. All of the alternatives

Score:0%

Question 7 (0 points)
Which of the following is not considered an epolicy?
Student response:Percent
ValueCorrect
ResponseStudent
ResponseAnswer Choices
0.0%a. Acceptable use policy
0.0% b. Internet use policy
0.0%c. Ethical computer use policy
100.0% d. Anti-hacker use policy

Score:0%

Question 8 (0 points)
Which best practice of innovation suggests that executives open their doors to tattooed web designers or the next generation of employees who learned how to innovate as members of guilds in World of Warcraft? Student response:Percent

ValueCorrect
ResponseStudent
ResponseAnswer Choices
0.0% a. Find your relevant edge
0.0%b. Assemble innovation hothouses
0.0%c. Reward risk...
tracking img