Optimize the flow of materials

Assignment Help Finance Basics
Reference no: EM13755124

Question 1: Wal-Mart and Levi Strauss collaborate on demand forecasting in order to optimize the flow of materials along the supply chain. This is an example of:

A. reducing design cycle time.

B. APS.

C. reducing product development time.

D. CPFR.

Question 2: __________ is a business strategy that enables manufacturers to control and share product-related data as part of product design and development efforts.

A. Advanced planning and scheduling

B. Collaborative planning

C. Product lifecycle management

D. Internal commerce

Question 3: When large suppliers or buyers are involved, a workflow system:

A. is needed for both the collaborative efforts and for supply chain and production improvements.

B. is needed for collaborative efforts only.

C. may be helpful for supply chain improvements.

D. will fail because of system incompatibilities.

Question 4: Groupware is appropriate in all of the following situations EXCEPT:

A. for groups to share ideas and opinions.

B. for people working on different tasks or projects.

C. for networked environments.

D. for people in the same room.

Question 5: Cyber cons have a negative effect on EC because:

A. defending against these cons and compensating for damages significantly increase the costs of EC.

B. a majority of potential customers do not shop online because they are too afraid of fraud to trust online merchants.

C. companies cannot expand their e-business to other countries with underdeveloped legal systems.

D. con artists have gone low-tech.

Question 6: The key reasons why EC criminals cannot be stopped include each of the following EXCEPT:

A. strong EC security makes online shopping inconvenient and demanding on customers.

B. sophisticated hackers use browsers to crack into Web sites.

C. lack of cooperation from credit card issuers and foreign ISPs.

D. online shoppers do not take necessary precautions to avoid becoming a victim.

Question 7: The protection of information systems against unauthorized access to or modification of information that is stored, processed, or being sent over a network is referred to as:

A. information assurance.

B. information defense.

C. information security triad.

D. information integrity.

Question 9: Social engineering attacks:

A. are an example of technical attacks requiring software or systems knowledge.

B. are a combination of technical and nontechnical attacks.

C. take advantage of Web 2.0 applications like social networking sites, blogs, wikis and RSS feeds.

D. are no longer considered to be serious Internet threats due to the increased security of MySpace, LinkedIn, and YouTube.

Question 10: A botnet is:

A. a piece of code in a worm that spreads rapidly and exploits some known vulnerability.

B. a piece of software code that inserts itself into a host or operating system to launch DOS attacks.

C. DOS attacks.

D. a collection of a few hundreds of thousands of hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet.

Question 11: Access to a network ought to be based on:

A. the policy of least privilege where access to network resources are blocked and permitted only when needed to conduct business.

B. the policy of acceptable use where access is restricted by the firewall.

C. role-specific security protocols where access is limited by a user's level of trust.

D. the policy of need-to-know where access by all non-employees is blocked.

Question 12: The advantages of virtual private networks (VPN) for data communications include all of the following EXCEPT:

A. they are less expensive than private leased lines because they use the public Internet to carry information.

B. they ensure the confidentiality and integrity of the data transmitted over the Internet without requiring encyption.

C. they can reduce communication costs dramatically because VPN equipment is cheaper than other remote solutions.

D. remote users can use broadband connections rather than make long distance calls to access an organization's private network.

Question 13: The basic security concepts relating to customers and other users are:

A. confidentiality, integrity, and availability.

B. information assurance, confidentiality, and authentication.

C. authentication, authorization, and nonrepudiation.

D. authorization, nonrepudiation, and information assurance.

Question 14: A vulnerability:

A. is a software bug.

B. is the probability that a weakness will be known and used.

C. is the estimated cost, loss, or damage that can result if a threat exploits a vulnerability.

D. is a weakness in software or other mechanisms that a hacker can use directly to gain access to a system or network.

Question 15: __________ is a crime ware technique used to steal the identity of target companies to get the identities of their customers.

A. Spamming

B. Pretexting

C. Social engineering

D. Phishing

Question 16: Brand building is important in B2B exchanges because:

A. exchange members typically buy only the best brands of product.

B. information flow is poor in most exchanges, making trust of suppliers very important.

C. it is easy for exchange members to change to another exchange.

D. exchange members typically buy products at the lowest cost unless branded.

Question 17: A company's internal operations and its relationships with suppliers and other business partners are frequently:

A. as complex as customer-facing applications such as taking an order online.

B. much more complex than customer-facing applications such as taking an order online.

C. much less complex than customer-facing applications such as taking an order online.

D. replaced by customer-facing applications.

Question 18: For a manufacturer, the supply chain ends when the:

A. supplier delivers raw materials and component parts to the manufacturer.

B. customer buys the product.

C. product is used up and disposed of.

D. customer decides he/she is satisfied with a product.

Reference no: EM13755124

Questions Cloud

Hr manager for a company with a high performance : Imagine that you are HR manager for a company with a high performance work system that includes the right combination of people, technology, and organizational structure. Provide two (2) suggestions for how the combination of these factors can contri..
Define management and its complexity and pervasiveness : Define management and its complexity and pervasiveness and why it is important for students to study it
Explain the importance of roman technology and engineering : explain the importance of Roman technology and engineering, especially as it related to making its giant cities livable.
Benefits of the planning stage for managers : Discuss one to two (1-2) benefits of the planning stage for managers. Next, describe your planning process at work or school. Your response should include how you know when you need to develop a plan, how long you take to plan for a project or work r..
Optimize the flow of materials : Wal-Mart and Levi Strauss collaborate on demand forecasting in order to optimize the flow of materials along the supply chain. This is an example of:
Difference between navigation mode and editing mode : In Datasheet view, what is the difference between navigation mode and editing mode? What command can you use in Datasheet view to remove the display of one or more fields from the datasheet
Discuss the product life cycle concept : The following 5 questions are your midterm exam. Please follow 6th edition APA format including ample research. It is recommend that you aim for 2-3 paragraphs per question and use each question as a heading so that the paper is organized.Question 1:..
Explain differences between viruses and worms : the differences between viruses and worms in their behavior, characteristics, and attack vectors. Their exploitation has been devastating in the past. Provide some examples of those malware outbreaks we have seen in the past.
Explain and support the first disadvantage : Explain, and support the first disadvantage (economic, social, political, environmental, social, equitable, ethical/moral, etc.) to your solution and provide a logical answer - Persuasive Paper - Possible Disadvantages - Answers with Visuals

Reviews

Write a Review

Finance Basics Questions & Answers

  Consider the importance of the yield-to-maturity

Describe or define and discuss a type of bond that interests you and how it is differentiated from other bonds. Then explain how valuing bonds is done and how interest rates affect their value. Consider the importance of the yield-to-maturity (YTM..

  What is the discounted payback period

The initial outlay or cost for a four-year project is $1,000,000. The respective cash inflows for years 1, 2, 3 and 4 are: $500,000, $200,000, $300,000, $300,000. What is the discounted payback period if the discount rate is 10%?

  What is the reward-to-volatility ratio

Assume that you manage a risky portfolio with an expected rate of return of 17% and a standard deviation of 28%. The T-bill rate is 7%. Your client chooses to invest 60% of a portfolio in your fund and 40% in a T-bill money market fund.

  Free expression or copyright piracy

Read Case Study Vidding -- Free Expression or Copyright Piracy? In one to two pages, supported by evidence from your text and from other research, respond to the following questions:

  Assume d1 is 700 determine what will be the new value of p0

ecology labs inc. will pay a dividend of 6.40 per share in the next 12 months d1. the required rate of return ke is 14

  Estimation of weighted average cost of capital

The Felix Filter Corporation maintains a debt-equity ratio of .6. The cost of equity is 16 percent, the cost of debt is 11% and the marginal tax rate is 30 percent.

  What is the operating cash flow

Your firm has net income of $322 on total sales of $1,300. Costs are $720 and depreciation is $120. The tax rate is 30 percent. The firm does not have interest expenses. What is the operating cash flow?

  Should the cemetery business be started

The company is somewhat unsure about the assumption of a 6 % growth rate in its cash flows. At what constant growth rate would the company just break even if it still required a 13 % return on investment?

  What is th expected return of the portfolio

You are the investment manager you have three assests. Treasury Bills, Carclays corporate bond fund, and Large Capt Stock. Bond Fund: Expected return is 6% and standard deviation is 9%

  Organization exchange lists the stock

What exchange lists the stock? Why did the company decide to list on that exchange.

  Creating balance sheet using mark-to-market method

Applying the Mark-to-market method, what will Novi Company show on its balance sheet at the end of 2006 to reflect its investment in Troy Company?

  What level of sales would generate

Thetax rate, which is 40 percent, will remain the same. What level of sales would generate $2,500,000 in net income?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd