Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

What are some of the vulnerabilities to corporate servers? - a) They can by knoc

ID: 3687959 • Letter: W

Question

What are some of the vulnerabilities to corporate servers?

- a) They can by knocked off-line during bad weather conditions

- b) They are not immune to hacking, viruses, worms, data theft and fraud, vandalism and denial-ofservice

attacks

- c) They are expensive to run and only a small number of people are able to program them.

- d) Since they are cloud-incompatible, technicians wearing black spandex are forced to dangle by

ropes from the ceilings of control rooms to operate these computer systems.

- e) The high-cost of their protective software makes them frequently under-protected and susceptible

to negligent usage by under-caffeinated programmers.

What is the Gramm-Leach-Bliley Act?

- a) A poly for the secure collection of medical data where any information concerning patients is

immediately removed.

- b) Founded in 1999 and requires security & confidentiality at financial institutions and for the

prevention of phishing and other methods to extract information about financial organizations.

- c) The policy of cleaning up and rebuilding damaged equipment in control rooms after Kylo Ren’s

temper-tantrums involving light sabers.

- d) Founded in 1996 and sets a policy for the requirement of the health care industry to retain patient

information for six years. The confidentiality is also to be maintained from these medical records.

- e) Founded in 2002 and requires that public organizations impose safe and secure use of the information that they collect from credit card usages.

In secure database usage, what are some data input controls?

- a) The requirement that the owner of the information be located in the same room as the information

system which processes the information.

- b) The requirement to record and monitor source documents, verify input data, test that data are of

proper variable type, missing data checks, test for existence of all data items in all fields of a record.

- c) The requirement that check-sum protections be applied to all pieces of data which enter the local

system from foreign information systems.

- d) The requirement that the executive leadership of the firm be present as the data is entered into

the information system to supervise and prevent data-mishandling.

- e) The requirement that an officer of the law be selected to enter all information into the information

system.

What are some of the controls to verify that the data has been correctly stored in databases?

- a) Apply a series of tests to be sure that all data looks accurate in data base tables.

- b) The uptake of procedures to establish that the results are accurate, complete, and properly distributed.

Other steps include the review of processing logs to ensure only authorized recipients get

results, using encryption of data transmissions, safeguarding the visibility of terminal screens, protection

of the theft of portable media devices and safeguarding any printouts (document shredding)

- c) Run a virus scanner over the data immediately after it is entered into the database.

- d) Present the data in person to those people who own it for a verbal check.

- e) Draw plots to show trends of the data. If the trends look inaccurate then the data must also be

corrupt.

What is what is the bullwhip effect?

- a) In the supply line, this is the effect of the suppliers meeting the customer’s expectations.

- b) The escalating problems concerning storing and managing resources that travel back to the individual

producers of a particular product in a supply line.

- c) In the supply line, this is the effect of the suppliers not meeting the customer’s expectations due

to bad marketing data.

- d) The effect of miss-allocating enough resources to complete customer orders in time.

- e) The effect of customers pulling the products through the manufacturing lines.

What is the just in time strategy?

- a) The strategy of making the product just in time for the customer’s decision of purchase.

- b) Having perfect information to determine when and how much to produce in a supply chain to

meet customers.

- c) The strategy of out-competing other firms who make the same products for the same group of

customers.

- d) Micheal Porters notion of concentrating the business on the products that they know how to make

and sell, while out-sourcing the other products to firms who are able to make and sell them under

license.

- e) The strategy of being able to forecast buying habits by data mining to determine new products

for business in emerging markets.

What is the Push-based model in supply chain management?

- a) The model where big chain-stores are able to sell customers more kinds of products which they

may push away if they are not interested.

- b) The model where a product is created and offered to customers after forecasts of demand for these

types of products.

- c) The model of the customers being able to push their product into new areas of usage to discover

new avenues of usage.

- d) The idea of doing less running and to apply more free-weights to work outs.

- e) A model to efficiently push-out software updates and patches.

What is the Pull-based model supply chain management?

- a) A model for the exploitation of customer data to improve the firm’s basic interaction with customer

feedback.

- b) The idea that products are created and sent to customers who are already willing to buy them in

a built-to-order scenario.

- c) A model and system for the regulation of customer

- d) The model where big chain-stores are able to sell customers more kinds of products which they

may push-away if they are not interested.

- e) The model of out-sourcing the product manufacturing task to smaller firms who are able to

complete this process with less waste of resources.

What is the supply chain model movement diagram from the notes of the Push-based scenario?

- a) Supplier (supply to forecast) manufacturer (production based on forecast) distributor (inventory based on forecasts) retailer (stock based on forecasts) customer (purchase what is on

shelves).

- b) Supplier manufacturer distributor retailer customer.

- c) Supplier manufacturer distributor retailer customer.

- d) Supplier manufacturer distributor retailer customer.

- e) Supplier manufacturer distributor retailer customer.

- f) Supplier manufacturer distributor retailer customer.

What is the supply chain model movement diagram of the Pull-based scenario?

- a) supplier (supply to order ) manufacturer (produce to order ) distributor (automatically replenish warehouse) retailer (automatically replenish stock ) customer (customer orders)

- b) supplier manufacturer distributor retailer customer

- c) supplier manufacturer distributor retailer customer

- d) supplier manufacturer distributor retailer customer

- e) supplier manufacturer distributor retailer customer

What is Customer Relationship Management (CRM)?

- a) A system to reduce cost of recruiting, servicing and retaining customers

- b) The management system for customer accounts to retain the details of their service experiences

for the improvement of the firm.

- c) A large database containing the details of previous customer care procedures.

- d) A collection of methodologies, software, and often Internet capabilities that help an organization

manage customer relations in an organized way, formerly called Sales Automation.

- e) All of the above

In the customer relationship management system, what is the significance of the following items: direct

mail, telephones, web-contact, e-mails, cell phone text messages.

- a) These are prizes that the customers may win during company drawing competitions.

- b) These are the common channels used to contact customers to capture their general information

and feedback.

- c) These items are bugged and tracked without the customer’s knowledge to find out how the customer uses their recently purchased products.

- d) These are modes of communication that customers are asked to use when they contact their friends after doing business with a particular firm.

- e) These resources are used primarily by customers to complain about services to other customers.

What are some of the challenges to the adoption of large enterprise softwares?

- a) Keeping up with all the changing methodologies of business practice.

- b) Keeping the cost low to license the software, organizing the realignment of business processes,

defining common and important types or organization-wide data, introducing data-sharing to the

organization culture, handling vendor lock-in costs issues, integrating the system with cloud technologies

- c) Handing the number of simultaneous users working at any particular moment.

- d) Providing easy to understand, graphical, outputs to all members of the firm to help them in

high-end decision-making tasks.

- e) Programming all the new laws of business practice into the software to guide the firms as they

use the suite.

Explanation / Answer

1.
e) The high-cost of their protective software makes them frequently under-protected and susceptible
to negligent usage by under-caffeinated programmers.

2.


3.
b) The requirement to record and monitor source documents, verify input data, test that data are of
proper variable type, missing data checks, test for existence of all data items in all fields of a record.

4.
a) Apply a series of tests to be sure that all data looks accurate in data base tables.

5.


6.
a) The strategy of making the product just in time for the customer’s decision of purchase.

7.

8.

9.

d) Supplier manufacturer distributor retailer customer.

10.
b) supplier manufacturer distributor retailer customer

11.
e) All of the above

12.
b) These are the common channels used to contact customers to capture their general information
and feedback.

13.
b) Keeping the cost low to license the software, organizing the realignment of business processes,
defining common and important types or organization-wide data, introducing data-sharing to the
organization culture, handling vendor lock-in costs issues, integrating the system with cloud technologies

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote