The key use of the manufacturing execution module of supply chain management is to ________ assign optimal

Question

The key use of the manufacturing execution module of supply chain management is to ________.

assign optimal

safety stock and target stock levels in all inventories in the supply network

forecast and plan anticipated demand for products

support receiving, storing, and picking of goods in a warehouse

support production processes, taking into account capacity and material constraints

ensure that the materials required for production are available where needed and when needed

QUESTION 62

________ refers to any software that covertly gathers information about a user through an Internet connection without the user’s knowledge.

Spyware

Spam

Cookie

Bot herder

Web filter

QUESTION 63

With regards to the World Wide Web, Web pages are stored on ________.

Web servers

Web consoles

Web hosts

Web rings

Web consortiums

QUESTION 64

Which of the following statements is true about an explicit knowledge asset?

It reflects a person’s ability to effectively solve a problem without external help.

It reflects the strategies that can be applied to an enterprise resource planning system.

It reflects knowledge that can be documented, archived, and codified, often with the help of information systems.

It reflects the processes and procedures that are located in a person’s mind on how to effectively perform a particular task.

It reflects an individual’s special knowledge about a new-to-the-world product.

QUESTION 65

Which of the following laws makes it mandatory for organizations to demonstrate that there are controls in place to prevent misuse and detect any potential problems?

SarbanesOxley Act

Trade Expansion Act of 1962

U.S.A. Patriot Act

Central Intelligence Agency Act

Electronic Communications Privacy Act of 1986

QUESTION 66

At the ________ level of an organization, information systems provide key performance indicators (KPIs) that are focused on balancing performance across the organization.

illusive

tactical

operational

executive

managerial

QUESTION 67

In the order-to-cash process, checking credit is followed by ________.

creating an order

picking, packing, and shipping

allocating stock

collecting payment

preparing and sending the invoice

QUESTION 68

________ activities encompass all business activities associated with employee management, such as hiring, interview scheduling, payroll, and benefits management.

Technology development

Architectural

Account

Human resource

Procurement

QUESTION 69

________ testing is testing of the overall system to see whether it meets design requirements.

Alpha

Beta

Developmental

Evolutionary

Comparative

QUESTION 70

Responding to threats and opportunities and continuous planning are based on analyzing internal data primarily from the ________ level of an organization.

operational

business

tactical

strategic

executive

QUESTION 71

The network effect refers to the notion that the value of a network is dependent on ________.

the speed of the network

the technical expertise of the moderators

the knowledge of the users

the commitment of the users

the number of other users

QUESTION 72

________ attempts to increase the relevance of search results by including content from blogs and microblogging services.

Netsearch

Metasearch

Enterprise search

Social search

OpenSearch

QUESTION 73

With respect to the components of a business model, ________ is the utility that the product/service must offer to customers.

value migration

value proposition

value grid

revenue stream

cost structure

QUESTION 74

The term ________ was coined by Harvard business professor Jeffrey Rayport to describe how good business techniques can be driven by word-of-mouth or person-to-person communication.

blog marketing

affiliate business

stealth market

e-business

viral marketing

QUESTION 75

________ are false messages circulated online about new viruses, earthquakes, kids in trouble, cancer causes, or any other topic of public interest.

Logic bombs

Internet hoaxes

Cookies

Malware

Honeypots

QUESTION 76

Computer criminals who attempt to break into systems or deface Web sites to promote political or ideological goals are called ________.

crackers

social promoters

hacktivists

internet activists

online predators

QUESTION 77

Controls that are used to assess whether anything went wrong, such as unauthorized access attempts, are called ________ controls.

corrective

preventive

protective

adaptive

detective

QUESTION 78

________ systems are designed to handle multiple concurrent transactions from customers.

Network transaction maximization

Online transaction processing

Product allocation

Yield optimization management

Real utility management

QUESTION 79

Which of the following statements is true about the e-business innovation cycle?

The vertical dimension of the cycle shows the efficiency of a particular information technology and the horizontal dimension shows life expectancy of that information technology.

The vertical dimension of the cycle shows the extent to which an organization derives value from a particular information technology and the horizontal dimension shows time.

The vertical dimension of the cycle shows the life expectancy of a particular information technology and the horizontal dimension shows time.

The vertical dimension of the cycle shows the expected investments required for a particular information technology and the horizontal dimension shows time.

The vertical dimension of the cycle shows the user-friendliness of a particular technology and the horizontal dimension shows the investment in that technology.

QUESTION 80

The organization waits for an order, allowing the organization to initiate a ________ sequence to move the order through the production process.

working

pulling

propelling

rotating

pushing

QUESTION 81

Analytical tools are used to optimally utilize materials, equipment, and labor during the ________ process of supply chain planning.

inventory planning

production scheduling

distribution planning

demand forecasting

safety stock scheduling

QUESTION 82

A ________ is defined as an economic system in which assets or services are shared between private individuals, either free or for a fee.

flexible economy

social economy

services economy

communication economy

sharing economy

QUESTION 83

How can the effectiveness of e-mail advertising campaigns be measured directly?

by including special links in the e-mail that allow tracking which e-mails the customers have opened or reacted to

by reflecting the percentage of visitors who actually perform the marketer’s desired action

by creating use cases and business models to determine the ratio of the opened mails to the sent mails

by reflecting the number of surfers who click on an ad divided by the number of times it was displayed

by conducting online polls, starting online forums, and collecting user feedbacks

QUESTION 84

________ planning focuses on delivering products or services to consumers as well as warehousing, delivering, invoicing, and payment collection.

Safety stock

Distribution

Inventory

Product demand

Production

QUESTION 85

Which of the following can be cited as an example of a digital divide?

Sam has better multitasking skills than Neal that make him a better manager.

Kevin has better chances of promotion when compared to Vincent because of his people skills.

Lora has access to more information than Frank because she knows how to operate a computer.

Unlike Joey, Ryan has access to more books and good advice because he studies in a better school.

Unlike Ben, Claudia possesses superior analytical skills that make her better at mathematics.

QUESTION 86

A company implements a new information system and observes a 5 percent increase in its monthly sales. This is a(n) ________ of the system.

intangible benefit

tangible benefit

tangible cost

non-recurring cost

recurring cost

QUESTION 87

In e-business terminology, ________ companies are sometimes called pure play companies.

click-only

click-and-flip

bricks-and-clicks

click-and-mortar

brick-and-mortar

QUESTION 88

Managers at the ________ level include the president and chief executive officer, vice presidents, and possibly the board of directors.

functional

executive

tactical

operational

illusive

QUESTION 89

Identify a true statement about reintermediation regarding e-tailing.

It
Engineering Technology