What are some of the vulnerabilities to corporate servers? - a) They can by knoc
ID: 3687959 • Letter: W
Question
What are some of the vulnerabilities to corporate servers?
- a) They can by knocked off-line during bad weather conditions
- b) They are not immune to hacking, viruses, worms, data theft and fraud, vandalism and denial-ofservice
attacks
- c) They are expensive to run and only a small number of people are able to program them.
- d) Since they are cloud-incompatible, technicians wearing black spandex are forced to dangle by
ropes from the ceilings of control rooms to operate these computer systems.
- e) The high-cost of their protective software makes them frequently under-protected and susceptible
to negligent usage by under-caffeinated programmers.
What is the Gramm-Leach-Bliley Act?
- a) A poly for the secure collection of medical data where any information concerning patients is
immediately removed.
- b) Founded in 1999 and requires security & confidentiality at financial institutions and for the
prevention of phishing and other methods to extract information about financial organizations.
- c) The policy of cleaning up and rebuilding damaged equipment in control rooms after Kylo Ren’s
temper-tantrums involving light sabers.
- d) Founded in 1996 and sets a policy for the requirement of the health care industry to retain patient
information for six years. The confidentiality is also to be maintained from these medical records.
- e) Founded in 2002 and requires that public organizations impose safe and secure use of the information that they collect from credit card usages.
In secure database usage, what are some data input controls?
- a) The requirement that the owner of the information be located in the same room as the information
system which processes the information.
- b) The requirement to record and monitor source documents, verify input data, test that data are of
proper variable type, missing data checks, test for existence of all data items in all fields of a record.
- c) The requirement that check-sum protections be applied to all pieces of data which enter the local
system from foreign information systems.
- d) The requirement that the executive leadership of the firm be present as the data is entered into
the information system to supervise and prevent data-mishandling.
- e) The requirement that an officer of the law be selected to enter all information into the information
system.
What are some of the controls to verify that the data has been correctly stored in databases?
- a) Apply a series of tests to be sure that all data looks accurate in data base tables.
- b) The uptake of procedures to establish that the results are accurate, complete, and properly distributed.
Other steps include the review of processing logs to ensure only authorized recipients get
results, using encryption of data transmissions, safeguarding the visibility of terminal screens, protection
of the theft of portable media devices and safeguarding any printouts (document shredding)
- c) Run a virus scanner over the data immediately after it is entered into the database.
- d) Present the data in person to those people who own it for a verbal check.
- e) Draw plots to show trends of the data. If the trends look inaccurate then the data must also be
corrupt.
What is what is the bullwhip effect?
- a) In the supply line, this is the effect of the suppliers meeting the customer’s expectations.
- b) The escalating problems concerning storing and managing resources that travel back to the individual
producers of a particular product in a supply line.
- c) In the supply line, this is the effect of the suppliers not meeting the customer’s expectations due
to bad marketing data.
- d) The effect of miss-allocating enough resources to complete customer orders in time.
- e) The effect of customers pulling the products through the manufacturing lines.
What is the just in time strategy?
- a) The strategy of making the product just in time for the customer’s decision of purchase.
- b) Having perfect information to determine when and how much to produce in a supply chain to
meet customers.
- c) The strategy of out-competing other firms who make the same products for the same group of
customers.
- d) Micheal Porters notion of concentrating the business on the products that they know how to make
and sell, while out-sourcing the other products to firms who are able to make and sell them under
license.
- e) The strategy of being able to forecast buying habits by data mining to determine new products
for business in emerging markets.
What is the Push-based model in supply chain management?
- a) The model where big chain-stores are able to sell customers more kinds of products which they
may push away if they are not interested.
- b) The model where a product is created and offered to customers after forecasts of demand for these
types of products.
- c) The model of the customers being able to push their product into new areas of usage to discover
new avenues of usage.
- d) The idea of doing less running and to apply more free-weights to work outs.
- e) A model to efficiently push-out software updates and patches.
What is the Pull-based model supply chain management?
- a) A model for the exploitation of customer data to improve the firm’s basic interaction with customer
feedback.
- b) The idea that products are created and sent to customers who are already willing to buy them in
a built-to-order scenario.
- c) A model and system for the regulation of customer
- d) The model where big chain-stores are able to sell customers more kinds of products which they
may push-away if they are not interested.
- e) The model of out-sourcing the product manufacturing task to smaller firms who are able to
complete this process with less waste of resources.
What is the supply chain model movement diagram from the notes of the Push-based scenario?
- a) Supplier (supply to forecast) manufacturer (production based on forecast) distributor (inventory based on forecasts) retailer (stock based on forecasts) customer (purchase what is on
shelves).
- b) Supplier manufacturer distributor retailer customer.
- c) Supplier manufacturer distributor retailer customer.
- d) Supplier manufacturer distributor retailer customer.
- e) Supplier manufacturer distributor retailer customer.
- f) Supplier manufacturer distributor retailer customer.
What is the supply chain model movement diagram of the Pull-based scenario?
- a) supplier (supply to order ) manufacturer (produce to order ) distributor (automatically replenish warehouse) retailer (automatically replenish stock ) customer (customer orders)
- b) supplier manufacturer distributor retailer customer
- c) supplier manufacturer distributor retailer customer
- d) supplier manufacturer distributor retailer customer
- e) supplier manufacturer distributor retailer customer
What is Customer Relationship Management (CRM)?
- a) A system to reduce cost of recruiting, servicing and retaining customers
- b) The management system for customer accounts to retain the details of their service experiences
for the improvement of the firm.
- c) A large database containing the details of previous customer care procedures.
- d) A collection of methodologies, software, and often Internet capabilities that help an organization
manage customer relations in an organized way, formerly called Sales Automation.
- e) All of the above
In the customer relationship management system, what is the significance of the following items: direct
mail, telephones, web-contact, e-mails, cell phone text messages.
- a) These are prizes that the customers may win during company drawing competitions.
- b) These are the common channels used to contact customers to capture their general information
and feedback.
- c) These items are bugged and tracked without the customer’s knowledge to find out how the customer uses their recently purchased products.
- d) These are modes of communication that customers are asked to use when they contact their friends after doing business with a particular firm.
- e) These resources are used primarily by customers to complain about services to other customers.
What are some of the challenges to the adoption of large enterprise softwares?
- a) Keeping up with all the changing methodologies of business practice.
- b) Keeping the cost low to license the software, organizing the realignment of business processes,
defining common and important types or organization-wide data, introducing data-sharing to the
organization culture, handling vendor lock-in costs issues, integrating the system with cloud technologies
- c) Handing the number of simultaneous users working at any particular moment.
- d) Providing easy to understand, graphical, outputs to all members of the firm to help them in
high-end decision-making tasks.
- e) Programming all the new laws of business practice into the software to guide the firms as they
use the suite.
Explanation / Answer
1.
e) The high-cost of their protective software makes them frequently under-protected and susceptible
to negligent usage by under-caffeinated programmers.
2.
3.
b) The requirement to record and monitor source documents, verify input data, test that data are of
proper variable type, missing data checks, test for existence of all data items in all fields of a record.
4.
a) Apply a series of tests to be sure that all data looks accurate in data base tables.
5.
6.
a) The strategy of making the product just in time for the customer’s decision of purchase.
7.
8.
9.
d) Supplier manufacturer distributor retailer customer.
10.
b) supplier manufacturer distributor retailer customer
11.
e) All of the above
12.
b) These are the common channels used to contact customers to capture their general information
and feedback.
13.
b) Keeping the cost low to license the software, organizing the realignment of business processes,
defining common and important types or organization-wide data, introducing data-sharing to the
organization culture, handling vendor lock-in costs issues, integrating the system with cloud technologies
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.