You are advising an accounting firm that wants to establish its first Web site. Approximately how much of the Web site budget should you assign to purchasing...
Which of the following is the least costly way to build a Web site?
Which of the following is the least costly way to build a Web site?A) Outsource the Web site development to overseas vendors.B) Use a hosted solution...
You are planning the requirements for a site tracking and reporting system for your company Web site. Which of the following information requirements would not be essential for this function?
You are planning the requirements for a site tracking and reporting system for your company Web site. Which of the following information requirements...
You are building an e-commerce Web site that will sell e-books and are looking for a hosted solution. Which of the following functionalities is least important for your business goals?
You are building an e-commerce Web site that will sell e-books and are looking for a hosted solution. Which of the following functionalities is least...
Which of the following statements about m-commerce is not true?
Which of the following statements about m-commerce is not true?A) In 2012, m-commerce represented less than 10 percent of all e-commerce.B) M-commerce...
Goods that are involved in the actual production process are referred to as
Goods that are involved in the actual production process are referred to asA) raw materials.B) direct goods.C) purchasing goods.D) indirect goods.Ans...
A third-party Net marketplace that connects many buyers and suppliers for spot purchasing is called a(n)
A third-party Net marketplace that connects many buyers and suppliers for spot purchasing is called a(n)A) exchange.B) vertical market.C) private exchange.D)...
A mapping of a person's significant online, personal relationships is called a social
A mapping of a person's significant online, personal relationships is called a socialA) Web.B) graph.C) community.D) map.Answer:&nbs...
E-hubs are more ________ than private industrial networks.
E-hubs are more ________ than private industrial networks.A) transaction-orientedB) collaborativeC) independentD) supply-chain orientedAnswer:&nbs...
An extranet that links a large firm to its suppliers and other key business partners is called a(n)
An extranet that links a large firm to its suppliers and other key business partners is called a(n)A) e-hub.B) marketspace.C) exchange.D) private industrial...
The process of sourcing goods and materials, negotiating with suppliers, paying for goods, and making delivery arrangements is called
The process of sourcing goods and materials, negotiating with suppliers, paying for goods, and making delivery arrangements is calledA) e-procurement.B)...
EDI is
EDI isA) the use of Internet technologies for electronic data transactions.B) the exchange between two organizations of standard transactions through...
Which of the following statements about B2B commerce is not true?
Which of the following statements about B2B commerce is not true?A) Eighty percent of online B2B e-commerce is still based on EDI.B) B2B e-commerce represents...
Which of the following was the leading online advertising format in 2012?
Which of the following was the leading online advertising format in 2012?A) display adsB) e-mailC) classifiedsD) search engineAnswer:&nbs...
Exposing an individual to ads that are chosen and based on the recorded and analyzed online behavior of the individual is referred to as
Exposing an individual to ads that are chosen and based on the recorded and analyzed online behavior of the individual is referred to asA) clickstream...
Netflix's public announcement of a reward for a technology solution to its movie recommendation system is an example of
Netflix's public announcement of a reward for a technology solution to its movie recommendation system is an example ofA) prediction markets.B) behavioral...
______ describes the concept that a large group of people is better at making correct decisions than a single person.
______ describes the concept that a large group of people is better at making correct decisions than a single person.A) The wisdom of crowdsB) OutsourcingC)...
Which of the following best illustrates the transaction fee revenue model?
Which of the following best illustrates the transaction fee revenue model?A) eBay receives a small fee from a seller if a seller is successful in selling...
Which of the following best illustrates the affiliate revenue model?
Which of the following best illustrates the affiliate revenue model?A) eBay receives a small fee from a seller if a seller is successful in selling an...
In which of the following revenue models does a Web site charge a fee for access to some or all of its offerings on a continual, regular basis?
In which of the following revenue models does a Web site charge a fee for access to some or all of its offerings on a continual, regular basis?A) subscriptionB)...
Which of the following best illustrates the sales revenue model?
Which of the following best illustrates the sales revenue model?A) eBay receives a small fee from a seller if a seller is successful in selling an item.B)...
Which of the following best describes why small world theory is important to e-commerce?
Which of the following best describes why small world theory is important to e-commerce?A) The products bought online by one individual will influence...
Market creators
Market creatorsA) save users money and time by processing online sales transactions.B) provide a digital environment where buyers and sellers can establish...
Transaction brokers
Transaction brokersA) generate revenue from advertising or from directing buyers to sellers.B) save users money and time by processing online sales transactions.C)...
Which of the following Internet business models does Amazon.com use?
Which of the following Internet business models does Amazon.com use?A) content providerB) portalC) market creatorD) e-tailerAnswer:&nbs...
Which of the following businesses utilizes the content provider Internet business model?
Which of the following businesses utilizes the content provider Internet business model?A) Amazon.comB) eBay.comC) CNN.comD) Motocross.comAnswer:&nbs...
Consumers selling goods and services electronically to other consumers best describes
Consumers selling goods and services electronically to other consumers best describesA) disintermediation.B) C2C e-commerce.C) M-commerce.D) B2C e-co...
Selling products and services directly to individual consumers via the Internet best describes
Selling products and services directly to individual consumers via the Internet best describesA) B2B e-commerce.B) C2C e-commerce.C) M-commerce.D) B2C...
eBay is an example of
eBay is an example ofA) C2C e-commerce.B) B2B e-commerce.C) B2C e-commerce.D) M-commerce.Answer:&nbs...
Compared to traditional markets, digital markets have
Compared to traditional markets, digital markets haveA) lower distributed delivery costs.B) higher marginal costs per unit.C) equivalent copying costs.D)...
Compared to traditional goods, digital goods have
Compared to traditional goods, digital goods haveA) greater pricing flexibility.B) lower marketing costs.C) higher production costs.D) higher inventory...
Compared to digital markets, traditional markets have
Compared to digital markets, traditional markets haveA) lower search costs.B) stronger network effects.C) higher delayed gratification effects.D) higher...
Digital goods are goods that are
Digital goods are goods that areA) produced digitally.B) sold over digital networks.C) delivered digitally.D) used with digital equipmentAnswer:&nbs...
Reducing the business process layers in a distribution channel is called
Reducing the business process layers in a distribution channel is calledA) disintermediation.B) BPR.C) market segmentation.D) network effects.Answer:...
Varying a product's price according to the supply situation of the seller is called ________ pricing.
Varying a product's price according to the supply situation of the seller is called ________ pricing.A) menuB) flexibleC) dynamicD) asymmetricAnswer:...
Information ________ exists when one party in a transaction has more information that is important for the transaction than the other party.
Information ________ exists when one party in a transaction has more information that is important for the transaction than the other party.A) transparencyB)...
Selling the same goods to different targeted groups at different prices is called
Selling the same goods to different targeted groups at different prices is calledA) cost customization.B) cost optimization.C) price gouging.D) price...
Information density refers to the
Information density refers to theA) richness—complexity and content—of a message.B) total amount and quantity of information delivered to consumers by...
The effort required to locate a suitable product is called
The effort required to locate a suitable product is calledA) price discrimination.B) search costs.C) menu costs.D) shopping costs.Answer:&nbs...
The lowered costs of information storage, processing, and communication, along with the improvement of data quality, has resulted in which unique quality of e-commerce?
The lowered costs of information storage, processing, and communication, along with the improvement of data quality, has resulted in which unique quality...
The integration of video, audio, and text marketing messages into a single marketing message and consumer experience describes which dimension of e-commerce technology?
The integration of video, audio, and text marketing messages into a single marketing message and consumer experience describes which dimension of e-commerce...
The act of engaging consumers in a dialog that dynamically adjusts the experience to the individual describes which dimension of e-commerce technology?
The act of engaging consumers in a dialog that dynamically adjusts the experience to the individual describes which dimension of e-commerce technology?A)...
Which feature of Internet technology has had the most effect in the Internet's rapid spread across the globe?
Which feature of Internet technology has had the most effect in the Internet's rapid spread across the globe?A) ubiquityB) global reachC) universal standardsD)...
Which of the following is not one of the unique features of e-commerce technology?
Which of the following is not one of the unique features of e-commerce technology?A) information densityB) transparencyC) richnessD) social technolog...
Which of the following is not a recent development in e-commerce?
Which of the following is not a recent development in e-commerce?A) Mobile e-commerce takes off.B) Social networking sites become a new platform for e-commerce.C)...
The quality of ubiquity, as it relates to e-commerce, is illustrated by
The quality of ubiquity, as it relates to e-commerce, is illustrated byA) the same set of standards being used across the globe.B) the spread of plentiful,...
How are the Internet and e-commerce causing severe disruption to the existing advertising business model?
How are the Internet and e-commerce causing severe disruption to the existing advertising business model?A) Ties between customer and businesses are being...
Which of the following is an example of a geosocial mobile service?
Which of the following is an example of a geosocial mobile service?A) Kickstarter.comB) FoursquareC) ShopkickD) FacebookAnswer:&nbs...
Which of the following is not one of the current main areas of growth in mobile e-commerce?
Which of the following is not one of the current main areas of growth in mobile e-commerce?A) sales of financial servicesB) retail sales at the top mobile...
Through what channel did e-commerce first evolve?
Through what channel did e-commerce first evolve?A) online advertising salesB) Internet portalsC) online book salesD) Internet service providersAnswe...
Because of outsourcing and increased automation, the costs of system maintenance and content creation have fallen and typically make up less than a quarter of Web site budgets.
Because of outsourcing and increased automation, the costs of system maintenance and content creation have fallen and typically make up less than a quarter...
In general, the cost of hardware, software, and telecommunications for building and operating a Web site has fallen by over 50 percent since 2000.
In general, the cost of hardware, software, and telecommunications for building and operating a Web site has fallen by over 50 percent since 2000.Ans...
Automobile manufacturing is an example of a vertical market.
Automobile manufacturing is an example of a vertical market.Answer: t...
Exchanges have become one of the most popular types of Net marketplace because they encourage competitive bidding that drives prices down.
Exchanges have become one of the most popular types of Net marketplace because they encourage competitive bidding that drives prices down.Answer:&nbs...
Net marketplaces may either support contractual purchasing based on long-term relationships with designated suppliers or short-term spot purchasing.
Net marketplaces may either support contractual purchasing based on long-term relationships with designated suppliers or short-term spot purchasing.A...
EDI standards that take advantage of network communications have yet to be fully implemented at the industry level.
EDI standards that take advantage of network communications have yet to be fully implemented at the industry level.Answer: fa...
Behavioral targeting occurs at two levels: individual Web sites and through ISPs.
Behavioral targeting occurs at two levels: individual Web sites and through ISPs.Answer: fa...
Ninety-six percent of all U.S. households with Internet access use a broadband connection.
Ninety-six percent of all U.S. households with Internet access use a broadband connection.Answer: t...
Intellectual property refers to all forms of human expression, both tangible and intangible.
Intellectual property refers to all forms of human expression, both tangible and intangible.Answer: fa...
Podcasting allows subscribers to listen to live, streaming radio and other audio content.
Podcasting allows subscribers to listen to live, streaming radio and other audio content.Answer: fa...
Amazon's recommender system is an example of the network notification feature of social e-commerce.
Amazon's recommender system is an example of the network notification feature of social e-commerce.Answer: Fa...
An example of the content provider business model is Barnesandnoble.com, a retailer of printed books.
An example of the content provider business model is Barnesandnoble.com, a retailer of printed books.Answer: fa...
Telecommunications hardware and software is typically the least costly portion of a Web site budget.
Telecommunications hardware and software is typically the least costly portion of a Web site budget.Answer: t...
In general, for digital goods, the marginal cost of producing another unit is about zero.
In general, for digital goods, the marginal cost of producing another unit is about zero.Answer: T...
Disintermediation provides major benefits to the distributor.
Disintermediation provides major benefits to the distributor.Answer: Fa...
All previous mass media in modern history, including the printing press, use a broadcast model where content is created in a central location by experts.
All previous mass media in modern history, including the printing press, use a broadcast model where content is created in a central location by expe...
Eighty-five percent of online retailers now have m-commerce Web sites.
Eighty-five percent of online retailers now have m-commerce Web sites.Answer: FA...
The Internet shrinks information asymmetry.
The Internet shrinks information asymmetry.Answer: T...
Consumer e-commerce is still growing at approximately 25% annually.
Consumer e-commerce is still growing at approximately 25% annually.Answer: Fa...
E-commerce refers to the use of any networking technologies to transact business.
E-commerce refers to the use of any networking technologies to transact business.Answer: Fa...
Smaller firms may outsource some or many security functions to
Smaller firms may outsource some or many security functions toA) ISPs.B) MISs.C) MSSPs.D) CAs.Answer:&nbs...
The development and use of methods to make computer systems resume their activities more quickly after mishaps is called
The development and use of methods to make computer systems resume their activities more quickly after mishaps is calledA) high availability computing.B)...
In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.
In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority...
For 100% availability, online transaction processing requires
For 100% availability, online transaction processing requiresA) high-capacity storage.B) a multi-tier server network.C) fault-tolerant computer systems.D)...
Downtime refers to periods of time in which a
Downtime refers to periods of time in which aA) computer system is malfunctioning.B) computer system is not operational.C) company or organization is...
A digital certificate system
A digital certificate systemA) uses third-party CAs to validate a user's identity.B) uses digital signatures to validate a user's identity.C) uses tokens...
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?A) SSLB) symmetric key encryptionC)...
Most antivirus software is effective against
Most antivirus software is effective againstA) only those viruses active on the Internet and through e-mail.B) any virus.C) any virus except those in...
Currently, the protocols used for secure information transfer over the Internet are
Currently, the protocols used for secure information transfer over the Internet areA) TCP/IP and SSL.B) S-HTTP and CA.C) HTTP and TCP/IP.D) SSL, TLS,...
Which of the following is the greatest threat that employees pose to an organization's information systems?
Which of the following is the greatest threat that employees pose to an organization's information systems?A) forgetting passwordsB) lack of knowledgeC)...
In which technique are network communications analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver?
In which technique are network communications analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver?A) stateful...
A firewall allows the organization to
A firewall allows the organization toA) prevent unauthorized communication both into and out of the network.B) monitor network hot spots for signs of...
Which of the following is not a trait used for identification in biometric systems?
Which of the following is not a trait used for identification in biometric systems?A) retinal imageB) voiceC) hair colorD) faceAnswer:&nbs...
An authentication token is a(n)
An authentication token is a(n)A) device the size of a credit card that contains access permission data.B) type of smart card.C) gadget that displays...
Rigorous password systems
Rigorous password systemsA) are one of the most effective security tools.B) may hinder employee productivity.C) are costly to implement.D) are often disregarded...
Which of the following is not one of the main firewall screening techniques?
Which of the following is not one of the main firewall screening techniques?A) application proxy filteringB) static packet filteringC) NATD) secure socket...
A(n) ________ system is used to identify and authorize different categories of system users and specify which portions of the organization's systems each user can access.
A(n) ________ system is used to identify and authorize different categories of system users and specify which portions of the organization's systems each...
Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n)
Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n)A) security policy.B) AUP.C)...
______ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.
______ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they...
Application controls
Application controlsA) can be classified as input controls, processing controls, and output controls.B) govern the design, security, and use of computer...
Electronic evidence on computer storage media that is not visible to the average user is called ________ data.
Electronic evidence on computer storage media that is not visible to the average user is called ________ data.A) defragmentedB) ambientC) forensicD) ...
The most common type of electronic evidence is
The most common type of electronic evidence isA) voice-mail.B) spreadsheets.C) instant messages.D) e-mail.Answer:&nbs...
The Sarbanes-Oxley Act
The Sarbanes-Oxley ActA) requires financial institutions to ensure the security of customer data.B) specifies best practices in information systems security...
The Gramm-Leach-Bliley Act
The Gramm-Leach-Bliley ActA) requires financial institutions to ensure the security of customer data.B) specifies best practices in information systems...
The HIPAA Act
The HIPAA ActA) requires financial institutions to ensure the security of customer data.B) specifies best practices in information systems security and...
How do software vendors correct flaws in their software after it has been distributed?
How do software vendors correct flaws in their software after it has been distributed?A) issue bug fixesB) issue patchesC) re-release softwareD) issue...
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is calledA) sniffing.B) social engineering.C) phishing.D)...
You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?
You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?A)...
Pharming involves
Pharming involvesA) redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser.B) pretending to...
Evil twins are
Evil twins areA) Trojan horses that appears to the user to be a legitimate commercial software application.B) e-mail messages that mimic the e-mail messages...
An example of phishing is
An example of phishing isA) setting up bogus Wi-Fi hot spots.B) setting up a fake medical Web site that asks users for confidential information.C) pretending...
Approximately how many new threats from malware were detected by Internet security firms in 2012?
Approximately how many new threats from malware were detected by Internet security firms in 2012?A) 400 thousandB) 4 millionC) 40 millionD) 400 milli...
Which of the following is not an example of a computer used as an instrument of crime?
Which of the following is not an example of a computer used as an instrument of crime?A) theft of trade secretsB) intentionally attempting to intercept...
Which of the following is not an example of a computer used as a target of crime?
Which of the following is not an example of a computer used as a target of crime?A) knowingly accessing a protected computer to commit fraudB) accessing...
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.A) DDoSB) DoSC) SQL injectionD)...
Hackers create a botnet by
Hackers create a botnet byA) infecting Web search bots with malware.B) using Web search bots to infect other computers.C) causing other people's computers...
A keylogger is a type of
A keylogger is a type ofA) worm.B) Trojan horse.C) virus.D) spyware.Answer:&nbs...
Redirecting a Web link to a different address is a form of
Redirecting a Web link to a different address is a form ofA) snooping.B) spoofing.C) sniffing.D) war driving.Answer:&nbs...
In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of?
In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded...
A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of
A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example ofA) phishing.B)...
An independent computer program that copies itself from one computer to another over a network is called a
An independent computer program that copies itself from one computer to another over a network is called aA) worm.B) Trojan horse.C) bug.D) pest.Answ...
Which of the following statements about the Internet security is not true?
Which of the following statements about the Internet security is not true?A) The use of P2P networks can expose a corporate computer to outsiders.B) A...
The Internet poses specific security problems because
The Internet poses specific security problems becauseA) it was designed to be easily accessible.B) Internet data is not run over secure lines.C) Internet...
Inputting data into a poorly programmed Web form in order to disrupt a company's systems and networks is called
Inputting data into a poorly programmed Web form in order to disrupt a company's systems and networks is calledA) a Trojan horse.B) an SQL injection attack.C)...
Sniffing is a security challenge that is most likely to occur in which of the following points of a corporate network?
Sniffing is a security challenge that is most likely to occur in which of the following points of a corporate network?A) client computerB) communications...
All of the following are methods of ensuring software quality except for
All of the following are methods of ensuring software quality except forA) systems analysis.B) walkthroughs.C) software testing.D) internal corporate...
Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that
Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files thatA) are...
Which of the following is not one of the challenges in securing wireless networks?
Which of the following is not one of the challenges in securing wireless networks?A) broadcasted SSIDsB) scannability of radio frequency bandsC) SQL injection...
______ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.
______ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability...
_____ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.
_____ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information...
Unauthorized access is a security challenge that is most likely to occur in a network at the point of client computers.
Unauthorized access is a security challenge that is most likely to occur in a network at the point of client computers.Answer: T...
High-availability computing is also referred to as fault tolerance.
High-availability computing is also referred to as fault tolerance.Answer: FA...
Public key encryption uses two keys.
Public key encryption uses two keys.Answer: T...
SSL is a protocol used to establish a secure connection between two computers.
SSL is a protocol used to establish a secure connection between two computers.Answer: T...
NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.
NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.Answer: T...
Packet filtering catches most types of network attacks.
Packet filtering catches most types of network attacks.Answer: FA...
Biometric authentication is the use of physical characteristics such as retinal images to provide identification.
Biometric authentication is the use of physical characteristics such as retinal images to provide identification.Answer: T...
An acceptable use policy defines the acceptable level of access to information assets for different users.
An acceptable use policy defines the acceptable level of access to information assets for different users.Answer: FA...
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would...
In a walkthrough, hackers are able to bypass security controls of a system with little opposition.
In a walkthrough, hackers are able to bypass security controls of a system with little opposition.Answer: FA...
DoS attacks are used to destroy information and access restricted areas of a company's information system.
DoS attacks are used to destroy information and access restricted areas of a company's information system.Answer: FA...
Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.
Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential repor...
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.A...
Computer worms spread much more rapidly than computer viruses.
Computer worms spread much more rapidly than computer viruses.Answer: T...
Viruses can be spread through e-mail.
Viruses can be spread through e-mail.Answer: T...
A Trojan horse is a software program that appears to be benign but then does something other than expected.
A Trojan horse is a software program that appears to be benign but then does something other than expected.Answer: T...
Mobile devices are not targeted as extensively by malware as traditional computers.
Mobile devices are not targeted as extensively by malware as traditional computers.Answer: T...
Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.Answer: T...
Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.
Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.Answer: T...
A drive-by download is a technique used by hackers to enable accessing files on a wireless network.
A drive-by download is a technique used by hackers to enable accessing files on a wireless network.Answer: FA...
A digital divide exists between ________.
A digital divide exists between ________.A) U.S. software companies and European software companiesB) hardware companies and software companiesC) those...
An organization implements an information system to optimize its supply chain. The system helps the organization reduce wages and inventory charges. Hence, the system provides a competitive advantage to the organization. Here, the information system helped the organization achieve competitive advantage by ________.
An organization implements an information system to optimize its supply chain. The system helps the organization reduce wages and inventory charges. Hence,...
A group of manufacturing organizations purchases raw materials collectively to obtain better deals. This is an example of obtaining competitive advantage by ________.
A group of manufacturing organizations purchases raw materials collectively to obtain better deals. This is an example of obtaining competitive advantage...
Organizations can lock in suppliers by making it difficult to switch to another organization orby ________.
Organizations can lock in suppliers by making it difficult to switch to another organization orby ________.A) making it easy for the customers to switch...
A large software manufacturer attempts to lock in customers by making it difficult for customers to change to another product. Identify the strategy used here.
A large software manufacturer attempts to lock in customers by making it difficult for customers to change to another product. Identify the strategy used...
July Networks provides digital television services across the country. They have a cutting-edge technology that provides high-resolution visuals. Customers are required to pay an up-front fee to cover the first two years of the subscription, when registering with July Networks. By doing this, which competitive strategy is July Networks implementing?
July Networks provides digital television services across the country. They have a cutting-edge technology that provides high-resolution visuals. Customers...
Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________.
Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________.A) entry barriersB)...
Synapz, a manufacturer of office automation products, recently received a patent for an advanced therapeutic ergonomics technology. By doing this, Synapz has ________.
Synapz, a manufacturer of office automation products, recently received a patent for an advanced therapeutic ergonomics technology. By doing this, Synapz...
An organization wants to achieve competitive advantage through process implementations. Which of the following actions would help them do that?
An organization wants to achieve competitive advantage through process implementations. Which of the following actions would help them do that?A) establishing...
PowerCruise, a holiday cruise firm, recently offered its existing customers an extension of six months to their membership without any additional charges. By doing this, which competitive strategy did PowerCruise implement?
PowerCruise, a holiday cruise firm, recently offered its existing customers an extension of six months to their membership without any additional charges....
Huen Software, an application provider to the gaming industry, decided to increase its portfolio by developing 3-D graphics-supported games for the mobile gaming industry. By doingthis, which competitive strategy is Huen Software implementing?
Huen Software, an application provider to the gaming industry, decided to increase its portfolio by developing 3-D graphics-supported games for the mobile...
Which of the following principles of competitive advantage is related to process implementations?
Which of the following principles of competitive advantage is related to process implementations?A) creating new productsB) enhancing productsC) locking...
Which of the following principles of competitive advantage is associated with product implementations?
Which of the following principles of competitive advantage is associated with product implementations?A) locking in customersB) differentiating service...
RedDart is a premium freight provider in the United States. The company offers premium shipment services to its customers. The company ships faster than its competitors and uses tamperproof containers to ship its products. RedDart company distinguishes itself from competitors by ________.
RedDart is a premium freight provider in the United States. The company offers premium shipment services to its customers. The company ships faster than...
RAC Associates is a car rental company. The company rents cars to customers in the United States. The company uses controls and procedures to prevent car theft. Such procedures are examples of ________.
RAC Associates is a car rental company. The company rents cars to customers in the United States. The company uses controls and procedures to prevent...
Which of the following statements is true of business process designs?
Which of the following statements is true of business process designs?A) Most process designs require people to work in new ways.B) Business process designs...
Which of the following is a part of the materials ordering process?
Which of the following is a part of the materials ordering process?A) outbound logisticsB) marketingC) operationsD) inbound logisticsAnswer:&nbs...
In a manufacturing business, the ________ process transforms finished goods into cash.
In a manufacturing business, the ________ process transforms finished goods into cash.A) inbound operationsB) operationsC) salesD) inbound logisticsA...
A database is an example of a(n) ________.
A database is an example of a(n) ________.A) repositoryB) softwareC) linkageD) value chainAnswer:&nbs...
A(n) ________ is a collection of something, such as data and raw materials.
A(n) ________ is a collection of something, such as data and raw materials.A) value chainB) cacheC) linkageD) repositoryAnswer:&nbs...
The cost of the business process is the sum of the cost of the inputs and the ________.
The cost of the business process is the sum of the cost of the inputs and the ________.A) cost of the activitiesB) cost of the outputsC) value of the...
A(n) ________ is a network of activities that generate value by transforming inputs into outputs.
A(n) ________ is a network of activities that generate value by transforming inputs into outputs.A) business processB) competitive strategyC) linkageD)...
_____ argues that firms should create new, more efficient business processes that integrate the activities of all departments involved in a value chain.
_____ argues that firms should create new, more efficient business processes that integrate the activities of all departments involved in a value chain.A)...
Which of the following statements is consistent with the central idea of business process design?
Which of the following statements is consistent with the central idea of business process design?A) Technology should be used to supplement the existing...
According to Porter's model of business activities, interactions across value activities are called ________.
According to Porter's model of business activities, interactions across value activities are called ________.A) support activitiesB) modelsC) linkagesD)...
Which of the following is considered a support activity in the value chain of a business?
Which of the following is considered a support activity in the value chain of a business?A) operationsB) customer serviceC) contract negotiationD) ma...
Which of the following is a support activity in the value chain?
Which of the following is a support activity in the value chain?A) receiving inputs to operationalize the productionB) distributing the products to retailers...
The net result of the difference between the total value added and the total costs incurred is the ________ of the value chain.
The net result of the difference between the total value added and the total costs incurred is the ________ of the value chain.A) actual valueB) total...
Lynn, the manager of a transportation company, is going through this week's delivery schedule. She calls her team and assigns territories for each executive. She contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing?
Lynn, the manager of a transportation company, is going through this week's delivery schedule. She calls her team and assigns territories for each executive....
Mae manages delivery at a custom-kitchen outlet. Working with her customer's specifications, she contacts Gem Cabinets and places an order for a full-motion wall mount. Which of the following primary activities is Mae performing here?
Mae manages delivery at a custom-kitchen outlet. Working with her customer's specifications, she contacts Gem Cabinets and places an order for a full-motion...
Which of the following is a primary activity in the value chain?
Which of the following is a primary activity in the value chain?A) receiving and disseminating inputs to the productB) negotiating prices with vendorsC)...
Which of the following value chain activities involves assisting users to handle the product after sale, thus maintaining and enhancing the product's value?
Which of the following value chain activities involves assisting users to handle the product after sale, thus maintaining and enhancing the product's...
Which of the following value chain activities involves inducing buyers to get a product and providing a means for them to do so?
Which of the following value chain activities involves inducing buyers to get a product and providing a means for them to do so?A) inbound logisticsB)...
Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers?
Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers?A) inbound logisticsB) operationsC)...
Which of the following value chain activities involves transforming raw materials into a finished product or service?
Which of the following value chain activities involves transforming raw materials into a finished product or service?A) operationsB) inbound logisticsC)...
A retail marketing company sells such products as agricultural produce and consumer products. The company procures materials from farmers and local producers. This process of obtaining the inputs needed for a business is called ________.
A retail marketing company sells such products as agricultural produce and consumer products. The company procures materials from farmers and local producers....
Identify the activity in the value chain that involves receiving, storing, and disseminating inputs to the product.
Identify the activity in the value chain that involves receiving, storing, and disseminating inputs to the product.A) inbound logisticsB) procurementC)...
Porter defined value as the ________.
Porter defined value as the ________.A) amount of money that a customer is willing to pay for an offeringB) extent of after-sale service provided to customersC)...
The difference between the value that an activity generates and the cost of the activity is called the ________.
The difference between the value that an activity generates and the cost of the activity is called the ________.A) marginB) turnoverC) revenueD) valu...
Focused cost leadership is observed when a product has the lowest cost ________.
Focused cost leadership is observed when a product has the lowest cost ________.A) within an industry segmentB) within the product range offered by a...
Focused differentiation occurs when ________.
Focused differentiation occurs when ________.A) a better product is provided within an industry segmentB) there is limited competition in an industryC)...
An automobile company decides to improve the quality of all its products and bring more variety into its product line. The company has decided to adopt ________.
An automobile company decides to improve the quality of all its products and bring more variety into its product line. The company has decided to adopt...
N-joi Ice Cream was facing competition to their flagship brand of "black currant ice cream". The competitor began offering three varieties of "black currant ice cream." N-joi decided to counter the threat by introducing five new varieties of ice creams. Which competitive strategy is N-joi implementing?
N-joi Ice Cream was facing competition to their flagship brand of "black currant ice cream". The competitor began offering three varieties of "black currant...
ABC Motors is the largest manufacturer of cars. The company purchases raw materials from many small-sized sellers across the globe. In this case, ABC Motors ________.
ABC Motors is the largest manufacturer of cars. The company purchases raw materials from many small-sized sellers across the globe. In this case, ABC...
The automobile industry is characterized by many manufacturers and intense competition among them. This statement refers to ________.
The automobile industry is characterized by many manufacturers and intense competition among them. This statement refers to ________.A) low threat of...
Bargaining power of customers is likely to be the highest for markets involving ________.
Bargaining power of customers is likely to be the highest for markets involving ________.A) public transportationB) industrial productsC) patented drugsD)...
A group of grain farmers in a surplus year will have reduced ________.
A group of grain farmers in a surplus year will have reduced ________.A) bargaining powerB) threat of substitutesC) risk of rivalryD) threat of new e...
A new drug that has shown promise in curing lung cancer has been discovered by a famous chemical laboratory. This is the only drug effective for treatment of this disease. The laboratory obtains a patent for the product and decides to sell it. This situation is characterized by ________.
A new drug that has shown promise in curing lung cancer has been discovered by a famous chemical laboratory. This is the only drug effective for treatment...
In which of the following would rivalry be considered as a weak force affecting the market?
In which of the following would rivalry be considered as a weak force affecting the market?A) military servicesB) used car dealersC) book sellersD) packaged...
In which of the following situations would the bargaining power of suppliers be highest?
In which of the following situations would the bargaining power of suppliers be highest?A) a single vendor providing raw materials to many department...
According to Porter's five forces model, which of the following would be most affected by the threat of substitutes?
According to Porter's five forces model, which of the following would be most affected by the threat of substitutes?A) Microsoft Windows OSB) Boeing jetsC)...
According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes?
According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes?A) a used car dealership in...
Porter's five forces model is used to assess ________.
Porter's five forces model is used to assess ________.A) industry structureB) market shareC) internal competitionD) lifecycles of productsAnswer:&nbs...
Which of the following factors determines the structure, features, and functions of the information system used in a company?
Which of the following factors determines the structure, features, and functions of the information system used in a company?A) the competitive strategyB)...
Subscribe to:
Posts (Atom)