Welcome to the Most Reliable, Essay Writing Service on the internet

saint-gba327-module-5-exam-2-latest-2016-june

Mar 23

1. Question
:

Defenders-of-belief communities facilitate activities like:

customer service functions.

manufacturing and operations.

inbound logistics.

sales and marketing.

Question 2. Question
:

If the content posted on a social networking site represents
reasonable criticism of the organization’s products or services, the best
response would most likely be to:

leave it.

edit it.

delete it.

report it.

Question 3. Question
:

According to Gossieaux and Moran, which of the following
activities are seekers of the truth most likely to facilitate?

Human resources

Operations

Marketing

Sales

Question 4. Question
:

Which of the following is one of the principal means that
companies implementing Web 2.0 are most likely to use to attract viewers?

Controlled releases

Fixed product value

Free content

Fixed interface

Question 5. Question
:

According to Gossieaux and Moran, which of the following
observations is true about a hyper-social organization?

It uses social media in an
organization-centric manner.

It creates relationships in which only one of
the parties perceives and gains value.

It is characterized by a transformation of
thinking from market segments to tribes.

It is an organization that transitions from a
dynamic process to a structured one.

Question 6. Question
:

Which of the following is a risk associated with human
resources when using social media to form conclusions about employees?

Loss of
privacy of the employees

Loss of control over the employees

Decrease in efficiency of the evaluation
process

Possibility of error on the site

Question 7. Question
:

Which of the following is a significant risk of using social
media for inbound and outbound logistics?

Loss of control

Loss of credibility

Loss of privacy

Loss of effectiveness

Question 8. Question
:

According to Gossieaux and Moran, a(n) ________ is an
organization that uses social media to transform its interactions with
customers, employees, and partners into mutually satisfying relationships with
them and their communities.

SM application provider

hyper-social organization

Enterprise 2.0

nonprofit organization

Question 9. Question
:

When a student attends a business function for the purpose
of meeting people and reinforcing relationships, he or she is investing in his
or her:

human capital.

process capital.

social capital.

structural capital.

Question 10. Question
:

Which of the following components of McAfee’s Enterprise 2.0
Model involves the creation of enterprise content via blogs, wikis, discussion
groups, presentations, etc.?

Search

Authoring

Extensions

Signals

Question 11. Question
:

The primary risk of peer-to-peer support in the context of
social media and customer service is:

loss of control.

loss of credibility.

lack of privacy.

increase in expenses.

Question 12. Question
:

________ is the use of information technology to support the
sharing of content among networks of users.

Social media

Content publishing

Multimedia

Programming

Question 13. Question
:

Being linked to a network of highly regarded contacts is a form
of:

social credential.

viral marketing.

crowdsourcing.

human capital.

Question 14. Question
:

Which of the following is an SM application provider?

Oracle

SAP

McAfee

LinkedIn

Question 15. Question
:

Social capital, unlike traditional capital:

appreciates with time and never depreciates.

depreciates with time and never appreciates.

sometimes depreciates and at other times
appreciates with time.

remains constant with time.

Question 16. Question
:

Tasks in the ________ phase of the SDLC include building and
testing system components and converting users to the new system.

system definition

component design

system maintenance

system implementation

Question 17. Question
:

Which of the following can be represented using the Business
Process Modeling Notation?

Gantt charts

As-is models

Scatter plots

PERT charts showing the critical path

Question 18. Question
:

The situation where addition of resources creates
inefficiencies is known as:

diseconomies of scale.

marginal utility.

marginal returns.

break-even.

Question 19. Question
:

In a Business Process Modeling Notation (BPMN) diagram, a
________ symbol represents an activity.

dotted arrow

rectangle

diamond

solid arrow

Question 20. Question
:

A ________ is a sequence of activities that determine the
earliest date by which a project can be completed.

Venn diagram

Pareto chart

critical path

scatter plot

Question 21. Question
:

In a business process, a role refers to:

a physical repository.

the movement of data.

a collection of data.

a collection of activities.

Question 22. Question
:

In a business process, resources are:

people or computer applications that are
assigned to roles.

collections of procedures and activities.

the total number of points of work that can be
accomplished in each scrum period.

collections of related tasks that receive
inputs and produce outputs.

Question 23. Question
:

Which of the following is true of paired programming?

Two team members write the same program by
coordinating from different locations.

Two programs are run simultaneously on one
device.

Two processors are required to run one
program.

Two team members share the same computer to
write a computer program together.

Question 24. Question
:

Which of the following are the steps in the business process
management (BPM) cycle?

Model processes; implement processes; assess
results; create components

Create components; model processes; implement
processes; assess results

Implement processes; create components; model
processes; assess results

Model processes; create components; implement
processes; assess results

Question 25. Question
:

The term ________ refers to a set of management policies,
practices, and tools that developers use to maintain control over the SDLC
project’s resources.

swim-lane layout

trade-off

transmission control protocol

configuration control

Question 26. Question
:

The first step in the system definition phase of the systems
development life cycle (SDLC) is to:

plan the project.

conduct a feasibility study.

determine the goals and scope.

form the project team.

Question 27. Question
:

The traditional process for developing information systems
is:

the spiral approach.

the systems development life cycle.

rapid application development cycle.

the V-model.

Question 28. Question
:

The first phase of the systems development life cycle (SDLC)
is:

defining the system.

implementing the system.

determining the requirements.

maintaining the system.

Question 29. Question
:

A ________ is a person who is well versed in an organization’s
strategy and focuses on ensuring that business processes and information
systems meet the organization’s competitive strategies.

business analyst

business application programmer

business administrator

business supervisor

Question 30. Question
:

According to Brooks’ Law, adding more people to a late
project will:

guarantee efficiencies.

speed
up the project.

create diseconomies of scale.

reduce the need for coordination.

Question 31. Question
:

Which of the following is considered a computer crime?

Deletion of records by an employee who is
unaware of operating procedures

Poorly written programs resulting in data
losses

Loss of data as a result of flooding

Hacking of information systems

Question 32. Question
:

Mark is transferring funds online through the Web site of a
reputed bank. Which of the following will be displayed in the address bar of
his browser that will let him know that the bank is using the SSL protocol?

ftp

www

https

.com

Question 33. Question
:

Which of the following systems procedures is specifically
the responsibility of operations personnel?

Writing software program codes

Using
systems to perform job tasks

Creating back up of system databases

Knowing whom to contact when a security breach
occurs

Question 34. Question
:

A ________ examines each part of a message and determines
whether to let that part pass.

packet-filtering firewall

private key

mail server

drive-by sniffer

Question 35. Question
:

In asymmetric encryption, each site has a ________ for
encoding messages.

Student Answer: botnet

private
key

public key

cookie

Question 36. Question
:

Firewalls produce ________ which include lists of all
dropped packets, infiltration attempts, and unauthorized access attempts from
within the firewall.

honeypots

blogs

activity logs

RSS
feeds

Question 37. Question
:

Which of the following is likely to be accepted by a poorly
designed application, leading to improper disclosure of data?

Public key

Asymmetric encryption

Key escrow

SQL injection

Question 38. Question
:

________ is the type of security loss that involves computer
criminals invading a computer system and replacing legitimate programs with
their own unauthorized ones that shut down legitimate applications and
substitute their own processing to spy, steal, and manipulate data.

Encryption

Spoofing

Phishing

Usurpation

Question 39. Question
:

Which of the following is considered a threat caused by
human error?

An
employee inadvertently installs an old database on top of the current one

An employee intentionally destroys data and
system components

A virus and worm writer infects computer
systems

A hacker breaks into a system to steal for
financial gain

Question 40. Question
:

________ involve the people and procedure components of
information systems.

Firewalls

Technical safeguards

Human
safeguards

Payloads

Question 41. Question
:

________ involves accomplishing job tasks during failure.

Authentication

Hardening

Usurpation

Recovery

Question 42. Question
:

A ________ is a number used to encrypt data.

key

honeypot

cookie

cache

Question 43. Question
:

With ________, the sender and receiver transmit a message
using different keys.

asymmetric encryption

block cipher

symmetric encryption

stream cipher

Question 44. Question
:

Removing and disabling ________, which may contain sensitive
security data, presents an excellent example of the trade-off between improved
security and cost.

bookmarks

pop-ups

cookies

toolbars

Question 45. Question
:

When an employee is terminated, IS administrators should
receive advance notice so that they can:

destroy the employee’s records.

plan for new recruitment.

disseminate information.

remove the user account and password.

Question 46. Question
:

The bullwhip effect:

is not related to erratic consumer demand.

forces distributors, manufacturers, and
suppliers to carry smaller inventories that do not have the capacity to meet
requirements.

increases the overall profitability of the
supply chain.

can be eliminated by restricting access to
consumer-demand information to only a few participants in the supply chain.

Question 47. Question
:

Which of the following statements is true of a supply chain?

All members of the supply chain of a firm must
have close geographical proximity.

Every supply chain should include suppliers,
manufacturers, distributors, retailers, and customers.

Each organization in a chain is connected to
just one company up and down the chain.

A supply chain includes transportation
companies, warehouses, and inventories.

Question 48. Question
:

An order processing functional system located in the United
States operates in English and reflects the practices and culture of the United
States. Its manufacturing systems business partner located in Taiwan, operates
in Chinese and reflects the business practices and culture of Taiwan. They do
not accommodate language, business, or their cultural differences into a single
system. From the above scenario, which of the following statements is true
about the functional systems?

The order processing functional system will
eventually be forced to operate in Chinese to reflect the business practices
and culture of Taiwan.

The use of enterprise systems, such as ERP,
would complicate the existing situation and thus increase data isolation.

Lack of integration will be extremely
disadvantageous to the manufacturing systems unit but not to the order
processing unit.

The systems can operate independently as long
as there is an adequate data interface between them.

Question 49. Question
:

The principal planning task for an international IS
organization is to:

localize software packages to focus on
quantity more than quality.

setup IS departments for every process in all
of its branches.

integrate the organization’s information
systems with the outsourced vendors’ information systems.

align IT and IS resources with the
organization’s competitive strategy.

Question 50. Question
:

Which of the following components of an IS is the easiest to
adapt to internationalization?

Hardware

User interfaces

Procedures

Data

  

CLIENT TESTIMONIALS

The Service Is Okay. I won’t Complain

The writers on the website are courteous and the customer service responds quickly. My paper was handled well; They promised...

Writers here are very professional and are native British

Thanks a lot for helping me out with my PhD Thesis, Writers here are very professional and are native British!!

Jack, The United Kingdom

Very Very Helpful, and On time.

Very Very Helpful, and On time.

Adelio M, Spain

I scored complete A’s in 3 out of four courses

I scored complete A’s in 3 out of four courses

Anonymous, Illinoi Chicago

CLICK HERE  To order your paper

About Essaysmiths Assignment writing service

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for upto 20% off in their first Order. Our payment method is safe and secure.

 CLICK HERE to Order Your Assignment

 

Get access to cheap essays online, and forget about all your worries

Quality assurance

When we accept your assignment order, we treat it with the utmost seriousness. This means that only the best experts will conduct research on your topic and that they will deliver your paper only after making sure that it is insightful.

Total confidentiality

We use the SSL protocol to ensure that all the details of our customers are 100% safe and secure. So, forget about all worries when sharing personal information on our site. We never disclose the details of our clients.

All round service

24/7 customer support. We don’t want you to fail to submit your paper. So, we work 24 hours a day and 7 days a week to provide you with instant feedback.

Original Essays

One of the key principles of our work is to be creative and original. We hire only talented and experienced essay writers that are able to create authentic papers. Each regular essay or term paper is written from scratch in accordance with all your guidelines.

Cheap Service

Compared to our competitors, we offer a relatively cheap service. We allow you the comfort of a cheap paper writing service to improve your grades. If you are facing an academic problem, we’ll solve it by asking for a fair price.

Rocket fast Essay writing service

Don’t worry! We work in a timely manner to deliver orders before the due date. You’ll have enough time to check whether the finished paper corresponds to all your requirements. If not, provide us with feedback and ask for a revision.

Order Your Essay Today From  reliable Essay writing Service.

Order your Assignment today and save 15% with the discount code ESSAYHELP

X