What sends work assignments through an e‐mail system?
a. Database‐based enterprise information portal
b. Messaging‐based enterprise information portal
c. Database‐based workflow system
d. Messaging‐based workflow system

1 Answer

Answer :

d. Messaging‐based workflow system

Related questions

Description : What defines all of the steps or business rules, from beginning to end, required for a process to run correctly? a. Workflow b. EIP c. Workflow system d. SLA

Last Answer : a. Workflow

Description : What automates business processes? a. Workflow b. ASP c. Workflow system d. EIP

Last Answer : c. Workflow system

Description : Secure Sockets Layers does which of the following? a. creates a secure, private connection to a web server b. encrypts information c. sends information over the internet d. all of the above

Last Answer : d. all of the above

Description : ERP stands for a. Enterprise resolution planning b. Enterprise reverse planning c. Enterprise resource planning d. None of the above

Last Answer : c. Enterprise resource planning

Description : A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called? a. Phishing b. Carding c. Brand spoofing d. All of the above

Last Answer : d. All of the above

Description : Which of the following is not a common approach to phishing? a. Send an official-looking e-mail asking for confidential information b. Ask people to fill out and return a fake letter using postal mail ... open a submission form on a web page d. All of the above are uncommon approaches to phishing

Last Answer : b. Ask people to fill out and return a fake letter using postal mail

Description : The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? a. hacking b. cracking c. dumpster diving d. spoofing

Last Answer : d. spoofing

Description : Which one is not a server level threat? a. Malicious code b. CGI threats c. Database threats d. Buffer overflows

Last Answer : a. Malicious code

Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : d. None of the above

Description : Which is not a component of ERP? a. Legacy systems b. Bolt on applications c. Operational database d. Cybersoft

Last Answer : d. Cybersoft

Description : Digital signature is a a. Digital id,send as an attachment to a web page/e‐mail/message b. Is used for verifying the attachments send using web c. Both a and b d. None of these

Last Answer : c. Both a and b

Description : Unsolicited e‐mail is called what? a. Junk mail b. Spam c. Extra mail d. None of the above

Last Answer : b. Spam

Description : E‐mail messages may be stored on which of the following computers? a. Sender's computer b. Sender's server c. Recipient's server d. All of the above

Last Answer : d. All of the above

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : Which of the following examines information passing through switches, hubs, or routers? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures

Last Answer : b. Packet sniffer

Description : Which of the following is an Internet‐based company that makes it easy for one person to pay another over the Internet? a. electronic check b. electronic bill presentment and payment c. conversion rates d. financial cybermediary

Last Answer : d. financial cybermediary

Description : During the installation of SAP XSS you have to select the Usage Types that should be installedWhich Usage Types are necessary for the installation of SAP XSS? Note: there are 2 correct answered ... . Utilities Customer E-Services B. Enterprise Portal C. Adobe Document Services D. Self Services

Last Answer : D. Self Services

Description : What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : a. Disaster recovery plan

Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange

Last Answer : d. electronic data interchange

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : Companies can gather information about employees and potential employees from which of the following places? a. Job applications b. Credit reports c. Companies that track Web surfers d. All of the above

Last Answer : d. All of the above

Description : Which of the following is not a dimension of privacy? a. Need for personal space b. Need to feel in control of our possessions c. Need to feel in control of our personal information d. All of the above are dimensions of privacy

Last Answer : d. All of the above are dimensions of privacy

Description : Which is the most important component of IT? a. Information b. People c. Information technology d. Computers

Last Answer : b. People

Description : What is the process of making a copy of the information stored on a computer? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : a. Backup

Description : What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know ... about? a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above

Last Answer : d. None of the above

Description : Who breaks into other people's computer systems and steals and destroys information? a. Hackers b. softwares c. Hacktivists d. Script kiddies

Last Answer : a. Hackers

Description : Which service encompasses all technologies used to transmit and process information on an across a network? a. Interoperability b. Scalability c. Benchmarking d. Web services

Last Answer : d. Web services

Description : Which factor ensures your IT systems are functioning correctly and providing accurate information? a. Availability b. Accessibility c. Reliability d. Scalability

Last Answer : c. Reliability

Description : Which factor determines who has the right to access different types of IT systems and information? a. Availability b. Accessibility c. Reliability d. Scalability

Last Answer : b. Accessibility

Description : What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : d. Disaster recovery cost curve

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption

Last Answer : a. digital wallet

Description : If you want to connect to your own computer through the internet from another location you can use: a) Telnet b) Instant Messaging c) FTP d) E- Mail e) None of These

Last Answer : a) Telnet

Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above

Last Answer : d. All the above

Description : What is the percentage of customers who visit a Web site and actually buy something called? a. Affiliate programs b. Click‐through c. Spam d. Conversion rate

Last Answer : d. Conversion rate

Description : Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser? a. Affiliate programs b. Click‐through c. Spam d. All of the above

Last Answer : b. Click‐through

Description : Which e‐government arena is being used when governmental agencies send out and accept bids for work? a) G2G b) G2B c) G2C d) G2G

Last Answer : b) G2B

Description : Web Based BPM Workflow tool for small businesses for a low monthly fee?

Last Answer : Good question. :-)

Description : Which of the following is a workflow control and policy based automation service by CA? a) CA Cloud Optimize b) CA Cloud Orchestrate c) CA Cloud Insight d) CA Cloud Compose

Last Answer : CA Cloud Orchestrate

Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above

Last Answer : d. All of the above

Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above

Last Answer : d. All of the above

Description : Which intermediaries are more likely to get involved during the transfer function of an e-mail system? a. Storage and forwarding of e-mail for certain addresses b. Act as gateways to other e-mail or messaging systems c. Both a & b d. None of the above

Last Answer : c. Both a & b

Description : Which one is the component of cybercash payment system a. CC user software b. CC merachant software c. CC Server Software d. All of the above

Last Answer : d. All of the above

Description : Which of the following is not a reason why digital cash has turned out to be extremely difficult? a. If your system crashes you lose your money b. There is only one standard c. Digital ... makes money laundering easy d. Digital cash travels across the vast Internet and is susceptible to begin stolen

Last Answer : b. There is only one standard

Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : b. Public key encryption

Description : Who protects system from external threats? a. firewall b. EDI c. ERP d. Script kiddies

Last Answer : a. firewall

Description : What is a set of conditions used to measure how well a product or system functions? a. Flexibility b. Performance c. Capacity planning d. Benchmark

Last Answer : d. Benchmark

Description : Which factor represents how well your system can adapt to increased demands? a. Availability b. Accessibility c. Reliability d. Scalability

Last Answer : d. Scalability

Description : Which factor determines when your IT system will be available for knowledge workers to access? a. Availability b. Accessibility c. Reliability d. None of the above

Last Answer : a. Availability

Description : What is a model of a proposed product, service, or system? a. Prototyping b. Prototype c. Proof‐of‐concept prototype d. Selling prototype

Last Answer : b. Prototype

Description : What price should I charge someone to design an e-commerce website?

Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.