Site hosted by Angelfire.com: Build your free website today!

OWNING MIDTERMS

My Favorite things about Angelfire.

My Favorite Web Sites

fallensword lol
facebook if we get bored
google
hotmail also monica


CHAPTER 1 Derek Putman Mid-Term Questions What is E-Commerce? -“Exchange of economic value facilitated by electronic media” -Carrying out business transactions in electronic form using computer and telecommunication networks -Buying and selling over digital media List 5 reasons that have made e-commerce such a big thing: -Expand universe of potential buyers -Increase sales -Meet customer expectations -Increase brand/product recognition -Ease of doing business -Competitive pressure -Cost effectiveness -Provide more information to customers -Improve customer service -New sales channel
Zoran Kusljic Mid-Term Questions 1)Provide at least three benefits of E-Commerce. Acceptable answers: cheaper, faster, more convenient, better selection, more customization/personalization, richer package (i.e. additional information to customer via FedEx), wide reach, more controllable 2)What are the four pillars of E-Commerce? Answer: information, relationships, transactions, security/control
"Oksana Balamut Mid-Term Questions 1) Which control principle states that information designated as confidential is protected in conformity with the entity’s confidentiality policies. a)  Security; b)  Confidentiality; c)  Privacy; d)  Availability; e)  Integrity; 2) Which of the following is VPN security method that used for keeping connections and data secure? a)  Firewalls; b)  Encryption; c)  AAA Server; d)  All of the above;
Eric Mid-Term Questions 1) When encrypting data, it is a good approach for security to know the encryption algorithm? T/F      answer: false they should access to the key 2) Name 3 Security and Reliability risks in ecommerce Answer .Unknown entity .Ease of establishing and removing ecommerce sites .Transactions not processed correctly .security of information .privacy of information .non-availability of website .denial of service .unauthorized access .loss of data integrity .maintenance problems .loss of reputation
--Lando Mid-Term Questions Q: 1 The EDI Process is linked with the VLAN, What are the end points of this process? A: Vendor, Buyer Q2: Business to business E-commerce is B2B Other "X" 2 "Y" concepts are Select all that apply   G2B   G2C   B2E   C2C   B2C A:G2C   B2E   C2C   B2C
CHAPTER 2 -Patricia Morawski-- Mid-Term Questions Q: What are the 3 barriers to success? A: •   Attracting the Customer (online/offline marketing) •   Making the Initial Sale (value and trust) •   Repeating the sale (maintaining trust, customization and achieving customer satisfaction) Q: What are the 5 forces of industry analysis? A: •   Potential Entrants •   Suppliers •   Industry Rivalry •   Buyers •   Substitutes
Jordan Fleck Mid-Term Questions 1) Which of the following is not a Core Business Process? a: Marketing  b: ASPs c: Credit Card Purchasing d: hanging out at the water cooler 2) PEST stands for p_________, e_____________, s__________ t_________. 3) PEST stands for Producing Efficient Stock Trades. True or false. 4) A business model may be defined as the manner in which a business organizes itself so as to achieve its objectives, which normally involves the generation of profits. True or False.
CHAPTER 3 Matt Hrycyk Mid-Term Questions 1) ARPANET project was started in 1969 by who? ANSWER: US department of defense 2) Name the 5 factors of internet growth ANSWER - Microprocessor   - Graphical user interface (GUi)   - Development of world wide web (WWW)   - Development of web browser   - Convergence of communications and media
    1. How long did it take for Internet to reach 50 million housholds? a) 2 years b) 4 years c) 5 years d) 10 years   ANSWER: C     2. Which is true about DNS? a) DNS is a services that translates names into IP adresses b) DNS was introduced to easily identify hosts with mnemonic names rather than numbers c) DNS must be robust: Internet depends on it d) All of the above   ANSWER: D
Son Lam CHAPTER 4 - Questions and Answers Question 1: List Three-Tier Client-Server System Answer 1: Client Computer Application Server Network Server Question 2: What’s different between External Integration and Internal Integration? Answer 2: External Integration: with trading partners and suppliers. Internal Integration: with existing, heterogeneous systems and applications within the organization.
Liam Grealy Mid-Term Questions 1. In a Basic Three-Tier Client-Server System discussed in Chapter 4, communication between the Client Computer and Network Server is done thru the _________ .     a) Microsoft Messaging Queue System     b) Market Demand     c) Application Server (***)     d) None of the above 2. Data integration allows applications to work with data from different computing platforms, databases and operating systems.     T (*****) / F
Sandra Skanes – eCommerce Mid-Term Questions 1)Name Four Quality Indicators: Answers: (Choose from14 possible answers) Slide 4-11 2) Name two parts of each Internal and External Integration ANSWERS: 4-34 Internal (Accounting, Marketing, Customer Support etc…) 4-33 External (End Consumers, Value Chain Suppliers, MRO Suppliers etc..) ALTERNATIVE: 3) Define DCOM of Data Interchange Mechanisms ANSWERS: 4-37 (A distributed application object allowing calling of remote methods.)
Paul Rajotte Mid-Term Questions SMTP, HTTP, FAX, EDI are all Example of _________. (4-37 Data Interchange Mechanisms) What are the components of a Three-Tier Client-Server System?(4-6)(Clients, Application Server, Network Server) 59.1936857829.1248361700.1256213980.1256216178.3; __utmz=59316159.1248361700.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utmc=59316159; __utmb=59316159; SID0=1256216225
Marian Cojocaru Mid-Term Questions Q: Give 2 examples of Data Interchange Mechanisms and a brief explanation. A: SMTP - Documents are exchanged via e-mail. Can be encrypted (S-Mime) HTTP - Documents are posted on the partner’s web server through an HTTP Post operation. HTTPS allows for channel encryption. Q: What is data integration ? A: Allows applications to work with data from different computing platforms, databases, and operating systems.
From: "Jordan Gaede" Mid-Term Questions 1. For the Enterprise Resource Planning portion of Software Components which of the following is NOT important.  a)Forecasting  b)Purchasing and Material Management  c)Warehousing and Inventory Management  d)Decision Support - Answer 2.) Explain one of the 3 Key components of E-business Architectures?  - Answer Define either ERP system, Middleware or XML.  - Provide enough information to cover at least 1 defination of for one of the 3 components.
CHAPTER 5 Thomas Ford Mid-Term Questions List 3 of the 5 benefits of a disaster recovery plan: Readiness to deal with sudden loss of data or interruption Having a clear guideline to react to unexpected situations Maintaining business continuity Safeguarding vital data of a company Saving time and money spent on work List 2 Human and 2 Environmental causes of disaster: HUMAN Inadvertent deletion of components Hacking the system System crash due to abuse Sabotage by conspirators Wrong directionality ENVIRONMENTAL Natural disasters like tornado, tsunami, flood Power failure Political riots or attacks
CHAPTER ? Mid-Term Questions From: "Pai-Tsang Kuo" Mid-Term Questions what are the benefits of EBusiness? A)increasing sales and reducing costs B)improving customer service and responding to competitive pressure C)expanding market reach D)all of above Definition of E-Commerce A)“Exchange of economic value facilitated by electronic media” B)Carrying out business transactions in electronic form using computer and telecommunication networks C)Buying and selling over digital media D)all of above
Juan Arredondo Mid-Term Questions Question #1 Name at least 3 steps in a Bussiness Agenda. Answer #1 -Business Models -The Impact of the Internet on Business -E-Business Configurations for Creating Value, Internet Effects -The 3 Barriers to Success in E-Business -Small Business and E-Commerce -Strategy Question #2 Name at least 3 types of Revenues Streams Answer #2 -Types of Revenue Streams -Free -Subscription -Commission -Transaction Fee -Product/service sale (menu pricing) -Bargained price
Nick Pauloff: Mid-Term Questions Name two physical security control. (Acceptable answers: locked rooms, security guards, surveillance, alarms, Uninterruptible power supplies) Define Encryption: (Answer: Used to prevent data alteration, unauthorized viewing, verify authenticity)
Kevin Branson Mid-Term Questions Question 1) How many Years did it take the Internet to reach 50 million households. a) 3 b)5   ***** c)7 d)10 Question 2) Class C networks: 24 bit for network address. Can have up to ____ hosts. a) 255 **** b) 1024 c) 65536 d) 16million
Michael lecomte Mid-Term Questions Q:  Which of these technologies took only 5 years to reach 50 million households? a) Radio b) TV c) cable d) Internet A: d) Internet Q:  ____________ is the oldest and simplest internet mail protocol. A: SMTP
True/False Michael’s Mid-Term Questions Indicate whether the statement is true or false. ____ 1. A trading exchange is an online marketplace that enables suppliers and customers to carry out their business electronically.
____ 2. The rise in the use of the Internet is the single most important enabler of e-business of any type.
____ 3. In the B2B arena, activity has centred on the streamlining of the customer relationship management applications by establishing shared systems between suppliers and customers, using the Internet or related technology.
____ 4. The advertising model can remain viable, even when there is a moderate volume of traffic on the site.
____ 5. Traditional business models have usually revolved around a central product or service.
____ 6. The difference between Transmission Control Protocol (TCP) and Internet Protocol (IP) is that TCP uses a set of rules to send and receive messages and IP uses a set of rules to exchange messages.
____ 7. Metatags are identifiers within the XML code that identify the content of the website:
____ 8. VPN stands for Virtual Protocol Network
____ 9. ERP systems do not have the characteristics of an enterprise-wide system.
____ 10. Firewalls are only one component of an overall security program.
TRUE/FALSE
1. ANS: T
2. ANS: T
3. ANS: F
4. ANS: F
5. ANS: T
6. ANS: F
7. ANS: F
8. ANS: F
9. ANS: F
10. ANS: T
Multiple Choice Michael’s Mid-Term Questions Identify the choice that best completes the statement or answers the question.
____ 11. Which of the following tools could businesses use when trying to achieve full system integration: a. enterprise resource planning b. e-procurement c. customer relationship management d. supply chain management e. all of the above
____ 12. Supply chain management is related to customer relationship management in the following way: a. the supply chain allows companies to market to customers efficiently b. SCM and CRM both are parts of EDI c. SCM and CRM are competing business theories d. CRM and SCM can share information and are critical to each other due to data integration e. SCM gets parts from suppliers to sell to customers online
____ 13. The business to business arena of electronic commerce can be described as: a. using the Internet to invest in other companies b. pooling together resources so that small businesses can compete c. e-commerce transactions between customers and companies d. electronic transactions between businesses in the same area e. electronic transactions between businesses, primarily through the Internet
____ 14. The following committee and a board are a representation of development activities of internet international wise a. Coordinating Committee for International Research Networks (CCRIN) and Internet Architecture Board (IAB) b. Internet Engineering Task Force (IETF) and Internet Research Task Force (IRTF) c. Defense Advanced Research Projects Agency (DARPA) and National Test Network (NTN) d. Federal Networking Council (FNC) and World Wide International (WWI) e. A and B
____ 15. Sympatico or Interlink are examples of: a. Servers b. Internet Service Providers (ISP) c. Internet Research Task Force (IRTF) d. Internet Engineering Task Force (IETF) e. None of the above
____ 16. Extensible markup language and middleware could be used to: a. integrate ERP with other applications b. develop custom software applications c. eliminate the reliance on ERP systems d. adjust source code very easily e. report troubleshooting results within the firm
____ 17. The implementation of best of breed systems in one enterprise: a. will result in the best overall system b. may lead to additional costs of implementation and maintenance c. can cause reduced need for integration d. will be recommended by most consulting companies e. none of the above
____ 18. When logging on to a network server, authentication would mean that: a. the user is permitted to look at specific directories on the server b. the password has expired c. the server is using VPN technology d. the client computer is recognized by the server e. all of the above
____ 19. The following are all examples of security controls except: a. policies on putting test applications into production b. monitoring employee emails for personal messages c. requiring passwords to access important applications d. requiring users to change passwords every thirty days e. documenting backup policies and procedures
____ 20. An employee created a new database system to track promotional materials and linked it into the ERP system. Soon after, the ERP system’s inventory module suffered a crash. This crash is likely the result of: a. physical controls b. non-repudiation c. developmental controls d. digital signatures e. firewall errors
11. ANS: E
12. ANS: D
13. ANS: E
14. ANS: E
15. ANS: B
16. ANS: A
17. ANS: B
18. ANS: D
19. ANS: B
20. ANS: C
Short Answer Michael’s Mid-Term Questions
21. What are the major two challenges of E-Business discussed in this chapter?
22. List two benefits of E-Business:
23. What does Business Intelligence mean?
24. Why are brokers often referred to as market makes?
25. Name any 3 key elements of an internet business model and describe them.
26. List three differences between XML and HTML?
27. Give examples of collaborative systems on four aspects: with customers, suppliers, personnel, and competitors.
28. Mention four ways that management of the systems (Inter-Enterprise systems) is being approached.
29. Why do specific processes have to be changed when a collaborative system is adopted?
30. List six categories included in general controls
SHORT ANSWER
21. ANS: Privacy and security
22. ANS: Increasing Sales Reducing costs Improving customer service Minimizing competitive pressure Expanding market reach Addressing user concerns
23. ANS: A powerful application or set of applications that allows businesses to capture, analyze, interpret, and report on data across an enterprise, thus creating valuable information for the enterprises.
24. ANS: Because they bring buyers and sellers together and facilitate transactions between then.
25. ANS: a. External forces – political, economic, social, and technological factors, pressures, and forces from outside the entity that create opportunities for the entity or threaten its business objectives. b. Market formats – the domains in which the entity may choose to operate, and the design and location of the facilities. c. Customers – the individuals and organizations that purchase the entity’s output. d. Core business processes – the processes that develop, produce, market, and distribute an entity’s products and services. e. Core products and services – the commodities that the entity brings to the market. f. Alliances – the relationships established by an eentity to attain business objectives, expand business opportunities and reduce or transfer business risk. g. Strategic management process – the process by which the entity’s mission is developed, it’s business objectives are defined, business risks that threaten attainment of the business objectives are identified, business risk management processes are established, and progress toward meeting business objectives is monitored. h. Resource management processes – the processes by which resources are acquired, developed, and allocated to the core business activities.
26. ANS: a. XML does not rely on single preset tags to identify information like HTML b. XML uses tags only to identify the data not the specific meanings of the tags like in HTML c. XML is often used for integration of systems from the internet back into the basic information systems of the company, the CRM and ERP systems, the accounting systems, and any other components of the supply chain.
27. ANS: a. Collaboration with customers: Strauss & Co website which offered customers the best option to create their own jeans by inputting their own measurements and then ordering them over the web. b. Collaboration with suppliers: Ford adopted a system called “digital mockup” which operates on a website and enables all of the suppliers to work on the design of a product at the same time. c. Collaboration with personnel: Loftus enables personnel on a project to file their papers in a central location and have them fully accessible by other team members, regardless of their location d. Collaboration with competitors: Trading exchanges such as Covisint exchange of the automobile industry described in Chapter 1.
28. ANS: By outsourcing, by placing the systems management in the hands of a separate entity, by establishing a management agreement with one or more of the participants in the collaboration, and by having each of the participants manage the part of the system that simply falls within their own system.
29. ANS: Since some processes will be reallocated between the partners, or by the new entity.
30. ANS: Security management, general access controls, system acquisition or development controls, system maintenance and change controls, operations controls, and business continuity controls