What are materials that are necessary for running a modern corporation, but do not relate to
the company's primary business activities?
a. Direct materials
b. Indirect materials
c. EDI
d. None of the above

1 Answer

Answer :

b. Indirect materials

Related questions

Description : What is another name for? a. Direct materials b. Indirect materials c. EDI d. None of the above

Last Answer : b. Indirect materials

Description : What are ballpoint pens purchased by a clothing company? a. Direct materials b. Indirect materials c. EDI d. None of the above

Last Answer : b. Indirect materials

Description : What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail environment? a. Direct materials b. Indirect materials c. EDI d. None of the above

Last Answer : a. Direct materials

Description : Materials used in the normal operation of a business but not related to primary business operations are called what? a. Supplies b. Direct materials c. Indirect materials d. Daily stuff

Last Answer : c. Indirect materials

Description : The solution for all business needs is a. EDI b. ERP c. SCM d. None of the above

Last Answer : b. ERP

Description : What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail environment? a. Direct materials b. Indirect materials c.EDI d. None of the above

Last Answer : a. Direct materials

Description : What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities? a. Direct marketplace b. B2B c. B2C d. Electronic marketplace

Last Answer : d. Electronic marketplace

Description : Which is not a feature of ecommerce a. SCM b. EDI c. WWW d. BPR

Last Answer : d. BPR

Description : Who protects system from external threats? a. firewall b. EDI c. ERP d. Script kiddies

Last Answer : a. firewall

Description : Which of the following refers to creating products tailored to individual customers? a. customization b. aggregation c. Direct materials d. Reverse auction

Last Answer : a. customization

Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange

Last Answer : d. electronic data interchange

Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above

Last Answer : d. All of the above

Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above

Last Answer : d. All of the above

Description : If the VF Corporation will be spending £2 million on marketing activities next year and expects to sell 30 million pairs of jeans, the 30 million pairs represents the company's: A)sales potential B)market potential C)sales forecast D)market sales

Last Answer : D)market sales

Description : Which form of e‐marketplace brings together buyers and sellers from multiple industries, often for MRO materials? a. horizontal b. Vertical c. Integrated d. Inclined

Last Answer : a. horizontal

Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above

Last Answer : c. Affiliate programs

Description : Which of the following is the primary characteristic of an intranet? a. People outside the organization can access it b. People inside the organization can't access it c. People outside the organization can't access it d. None of the above

Last Answer : c. People outside the organization can't access it

Description : What defines all of the steps or business rules, from beginning to end, required for a process to run correctly? a. Workflow b. EIP c. Workflow system d. SLA

Last Answer : a. Workflow

Description : What automates business processes? a. Workflow b. ASP c. Workflow system d. EIP

Last Answer : c. Workflow system

Description : What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : b. Hot site

Description : A business competing in a commodity like environment must focus on which of the following? a. Price b. Ease / speed of delivery c. Ease of ordering d. all of the above

Last Answer : d. all of the above

Description : A business cannot be all things to all people. Instead, a business must: a. Identify target customers b. Identify the value of products/services as perceived by customers c. all of the above d. None of the above

Last Answer : c. all of the above

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above

Last Answer : d. all the above

Description : What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left? a. B2B marketplace b. Intranet c. Reverse auction d. Internet

Last Answer : c. Reverse auction

Description : Which of the following describes e‐commerce? a. Doing business electronically b. Doing business c. Sale of goods d. All of the above

Last Answer : a. Doing business electronically

Description : Which of the following best describes the operational audit? a. It requires the constant review by internal auditors of the administrative controls as they relate to operations ofthe company. b. It ... attempts and is designed to verify the fair presentation of a company's results of operations.

Last Answer : It concentrates on seeking out aspects of operations in which waste would be reduced by the introduction of controls

Description : Which of the following an accurate statement about internet phone calls? a. They are possible but not yet free b. They are not possible c. They are currently standard practice d. None of the above is an accurate statement about internet phone calls

Last Answer : a. They are possible but not yet free

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : c. Cold site

Description : Point out the incorrect answer. Evidence may be  (a) Direct and indirect (b) Primary and secondary (c) Oral and documentary (d) Procedural and substantive

Last Answer : (d) Procedural and substantive

Description : Which one of the following activities will NOT help improve the ethical behaviour of a marketing firm? A)Help employees become aware of and sensitive toward ethical issues B)Redesign the company's culture ... tactics D)Establish and enforce a code of ethics E)Eliminate "bad apples" in the firm

Last Answer : C)Reward employees who use questionable business tactics

Description : An audit made in accordance with Philippine Standards on Auditing generally should a. Be expected to provide assurance that noncompliance with laws and regulations will be detected if the internal ... relied upon to provide assurance that all noncompliance with laws and regulations will be detected

Last Answer : Not be relied upon to provide assurance that all noncompliance with laws and regulations will be detected

Description : What price should I charge someone to design an e-commerce website?

Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.

Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above

Last Answer : d. All the above

Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : c. Script virus

Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : a. Macro

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above

Last Answer : d. All the above

Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None

Last Answer : d. None

Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C

Last Answer : d. C2C

Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine

Last Answer : c. Copyright

Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None

Last Answer : c. Asymmetric

Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None

Last Answer : b. Symmetric

Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None

Last Answer : d. None

Description : OTP stands for a. On Time Password b. On Time processing c. One time processor d. None

Last Answer : a. On Time Password

Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none

Last Answer : d. none

Description : Which one is an online payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque

Last Answer : d. e‐cheque

Description : Which one is not an online payment mode? a. Cash on delivery b. Debit card c. Credit card d. e‐cheque

Last Answer : a. Cash on delivery