Description : What automates business processes? a. Workflow b. ASP c. Workflow system d. EIP
Last Answer : c. Workflow system
Description : What sends work assignments through an e‐mail system? a. Database‐based enterprise information portal b. Messaging‐based enterprise information portal c. Database‐based workflow system d. Messaging‐based workflow system
Last Answer : d. Messaging‐based workflow system
Description : Which factor ensures your IT systems are functioning correctly and providing accurate information? a. Availability b. Accessibility c. Reliability d. Scalability
Last Answer : c. Reliability
Description : This step includes selecting a cloud provider on basis of Service Level Agreement (SLA), which defines the level of service the provider will meet. A. Maintenance and Technical Service B. Selecting Cloud Computing Provider C. Both A and B D. None of the above
Last Answer : B. Selecting Cloud Computing Provider
Description : What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left? a. B2B marketplace b. Intranet c. Reverse auction d. Internet
Last Answer : c. Reverse auction
Description : What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve
Last Answer : a. Disaster recovery plan
Description : What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve
Last Answer : b. Hot site
Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange
Last Answer : d. electronic data interchange
Description : What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities? a. Direct marketplace b. B2B c. B2C d. Electronic marketplace
Last Answer : d. Electronic marketplace
Description : Materials used in the normal operation of a business but not related to primary business operations are called what? a. Supplies b. Direct materials c. Indirect materials d. Daily stuff
Last Answer : c. Indirect materials
Description : A business competing in a commodity like environment must focus on which of the following? a. Price b. Ease / speed of delivery c. Ease of ordering d. all of the above
Last Answer : d. all of the above
Description : A business cannot be all things to all people. Instead, a business must: a. Identify target customers b. Identify the value of products/services as perceived by customers c. all of the above d. None of the above
Last Answer : c. all of the above
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above
Last Answer : d. all the above
Description : What are materials that are necessary for running a modern corporation, but do not relate to the company's primary business activities? a. Direct materials b. Indirect materials c. EDI d. None of the above
Last Answer : b. Indirect materials
Description : The solution for all business needs is a. EDI b. ERP c. SCM d. None of the above
Last Answer : b. ERP
Description : Which of the following describes e‐commerce? a. Doing business electronically b. Doing business c. Sale of goods d. All of the above
Last Answer : a. Doing business electronically
Description : Which of the following is the best explanation of business process reengineering? A. Redesigning the organizational structure of a business B. Redesigning workflow C. Redesigning products D. Transformation of business processes for more effective achievement of business goals
Last Answer : D. Transformation of business processes for more effective achievement of business goals
Description : What is the process of making a copy of the information stored on a computer? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : a. Backup
Description : What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets? a. Risk management b. Risk assessment c. Security d. None of the above
Last Answer : b. Risk assessment
Description : What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved? a. Performance b. Capacity planning c. Benchmarking d. Data cleansing
Last Answer : c. Benchmarking
Description : Which process is used to reinstall data from a copy when the original data has been lost? a. backup b. recovery c. benchmarking d. data cleansing
Last Answer : b. recovery
Description : Which process can prevent data from lose due to computer problems or human errors? a. backup b. recovery c. benchmarking d. data cleansing
Last Answer : a. backup
Description : Which service encompasses all technologies used to transmit and process information on an across a network? a. Interoperability b. Scalability c. Benchmarking d. Web services
Last Answer : d. Web services
Description : The recruiting and selection process should include enough steps to yield the information needed to make accurate selection decisions. However, the stages of the process should be sequenced so that the more ... anything else. C)near the end. D)paid by the prospects rather than the company.
Last Answer : C)near the end.
Description : Which one is the component of cybercash payment system a. CC user software b. CC merachant software c. CC Server Software d. All of the above
Last Answer : d. All of the above
Description : Which of the following is not a reason why digital cash has turned out to be extremely difficult? a. If your system crashes you lose your money b. There is only one standard c. Digital ... makes money laundering easy d. Digital cash travels across the vast Internet and is susceptible to begin stolen
Last Answer : b. There is only one standard
Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software
Last Answer : b. Public key encryption
Description : Who protects system from external threats? a. firewall b. EDI c. ERP d. Script kiddies
Last Answer : a. firewall
Description : What is a set of conditions used to measure how well a product or system functions? a. Flexibility b. Performance c. Capacity planning d. Benchmark
Last Answer : d. Benchmark
Description : Which factor represents how well your system can adapt to increased demands? a. Availability b. Accessibility c. Reliability d. Scalability
Last Answer : d. Scalability
Description : Which factor determines when your IT system will be available for knowledge workers to access? a. Availability b. Accessibility c. Reliability d. None of the above
Last Answer : a. Availability
Description : What is a model of a proposed product, service, or system? a. Prototyping b. Prototype c. Proof‐of‐concept prototype d. Selling prototype
Last Answer : b. Prototype
Description : Does workflow design really effect the success of a business?
Last Answer : Yes, workflow design normally does have a positive effect on any business. It is a rule of thumb that to have a written business plan in place, complete with workflow design, short-term and long-term goals, will mean that your business can be a success.
Description : What workflow software would be best for a logistics business?
Last Answer : Seems you can get it through outsource India. See them at http://www.outsource2india.com/software/WorkflowAutomation.asp
Description : What price should I charge someone to design an e-commerce website?
Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.
Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above
Last Answer : d. All the above
Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : c. Script virus
Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : a. Macro
Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above
Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above
Last Answer : b. Cryptography
Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above
Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None
Last Answer : d. None
Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C
Last Answer : d. C2C
Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above
Last Answer : c. Affiliate programs
Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above
Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine
Last Answer : c. Copyright
Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None
Last Answer : c. Asymmetric
Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None
Last Answer : b. Symmetric
Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None
Description : OTP stands for a. On Time Password b. On Time processing c. One time processor d. None
Last Answer : a. On Time Password