2.All of the following statements about a virtual private network are correct ex
ID: 3575664 • Letter: 2
Question
2.All of the following statements about a virtual private network are correct except:
A. Uses the Internet as its main backbone network
B. Connects the intranets of a company's different locations, or establishes extranet links between a company and its customers, suppliers, and business partners
C. Relies on modem, twisted-pair wire, and router technology
D. Relies on network firewalls, encryption, and other security features to provide a secure network
3. A(n) _______________ architecture illustrates the inter-relationships of the major cross-functional enterprise applications that many companies have, or are installing, today.
A. enterprise application
B. enterprise operation
C. cross-functional
D. none of the choices are correct.
4. Which of the following applications focuses on the efficiency of a firm's internal production, distribution, and financial processes?
A. Customer relationship management
B. Enterprise resource planning
C. Knowledge management
D. Supply chain management
5. Which of the following applications focuses on acquiring and retaining profitable customers via marketing, sales, and service processes?
A. Customer relationship management
B. Enterprise resource planning
C. Knowledge management
D. Supply chain management
6. Which of the following applications focuses on developing the most efficient and effective sourcing and procurement processes?
A. Customer relationship management
B. Enterprise resource planning
C. Knowledge management
D. Supply chain management
7. Which of the following applications focuses on tools that support group collaboration and decision support?
A. Customer relationship management
B. Enterprise resource planning
C. Knowledge management
D. Supply chain management
8. ERP systems can provide vital cross-functional information on business performance to managers in a very timely manner. This describes the key business benefit of:
A. Enterprise agility
B. Decision support
C. Decreased costs
D. Quality and efficiency
9. Authenticating users, authorizing access, and enforcing security features is a component of the e-commerce process called:
A. Event notification
B. Profiling and personalization
C. Search management
D. Access control and security
10. When a company addresses issues such as authenticating users of their website, authorizing access, and enforcing the security features that protect both consumers and their data, the company is addressing the _______________ component of the e-commerce process.
A. event notification B. profiling and personalizing
C. search management D. access control and security
11. Which of the following is part of the technology dimension of change management? C
A. Ownership
B. Recruitment
C. Enterprise architecture
D. Change control
Explanation / Answer
2) Answer: C) Relies on modem,twisted_pair wire and router technology
Explanation: it permits the employees to corporate interanet find out of the office or a comopany.applications working on virtual private network is advantageous in functionality,security.
3) Answer: A ) Enterprise application
Explanation it is a huge software system outlined to manipulate in corporate reign like business.it is tough and contains the onlineshopping and resource planning.
4)Answer: B) Knowledge management
Explanation:it is the method of producing and utilizing the knowledge and infomation for a company.it targets on organisational onjectives like innovation and merging of a company .
5)Answer: A) customer resource management
Explanation: the process of handling a company influence through present and future customer that afforts to asess regarding the customer details through the company.
6) Answer: B)enterprise resource planning
Explanation: it is a business management software to permit the organisation to utilize the integrated applications in order to handle the business .it fuses the total manipultions to single data base ,user interface and application.
7)Answer: C)enterprise resource planning
8)Answer: B) Decision support
Explanation: it supports the company decision making activities which is used to scrutinize the business applications hence the user is able to take the decesions in very eay manner.
9) Answer: D)Acess control and security
Explanation:In the areas of physical security and information security this acess control is choosable limitation of acess to a resource. Approval to acess a resource is known as authorisation. there are two tecniques or methods i.e locks and login
10)Answer:D) Acess control and security
11)Answer: C) Enterprise architecture
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.