How JustAnswer Works:
  • Ask an Expert
    Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional Answer
    Via email, text message, or notification as you wait on our site. Ask follow up questions if you need to.
  • 100% Satisfaction Guarantee
    Rate the answer you receive.
Ask Bizhelp Your Own Question
Bizhelp, CPA
Category: Homework
Satisfied Customers: 5884
Experience:  Bachelors Degree and CPA with Accounting work experience
Type Your Homework Question Here...
Bizhelp is online now
A new question is answered every 9 seconds

"For Bizhelp" Tomorrow 5:30 PM EST

This answer was rated:

1. Electronic data are more susceptible to destruction, fraud, error, and misuse because

information systems concentrate data in computer files that:

a. have the potential to be accessed by large numbers of people and by groups outside

of the organization.

b. are frequently available on the Internet.

c. are usually bound up in legacy systems that are difficult to access and difficult to

correct in case of error.

d. are not secure because the technology to secure them did not exist at the time the

files were created.

2. Inputting data into a poorly programmed Web form in order to disrupt a company’s systems

and networks is called:

a. an SQL injection attack.

b. a Trojan horse.

c. a DDoS attack.

d. key logging.

3. Hackers create a botnet by:

a. by infecting corporate servers with “zombie” Trojan horses that allow undetected access

through a back door.

b. infecting Web search bots with malware.

c. by causing other people’s computers to become “zombie” PCs following a master


d. by using Web search bots to infect other computers.

4. Which of the following is not an example of a computer used as a target of crime?

a. Illegally accessing stored electronic communication

b. Threatening to cause damage to a protected computer

c. Accessing a computer system without authority

d. Knowingly accessing a protected computer to commit fraud

5. Evil twins are:

a. Trojan horses that appears to the user to be a legitimate commercial software


b. fraudulent Web sites that mimic a legitimate business’s Web site.

c. e-mail messages that mimic the e-mail messages of a legitimate business.

d. bogus wireless network access points that look legitimate to users.

6. How do software vendors correct flaws in their software after it has been distributed?

a. Re-release software

b. Issue bug fixes

c. Issue patches

d. Issue updated versions

7. The Gramm-Leach-Bliley Act:

a. outlines medical security and privacy rules.

b. imposes responsibility on companies and management to safeguard the accuracy of

financial information.

c. requires financial institutions to ensure the security of customer data.

d. specifies best practices in information systems security and control.

8. Currently, the protocols used for secure information transfer over the Internet are:

a. SSL, TLS, and S-HTTP.

b. TCP/IP and SSL.

c. HTTP and TCP/IP.

d. S-HTTP and CA.

9. Most antivirus software is effective against:

a. any virus.

b. only those viruses already known when the software is written.

c. any virus except those in wireless communications applications.

d. only those viruses active on the Internet and through e-mail.

10. A digital certificate system:

a. uses tokens to validate a user’s identity.

b. is used primarily by individuals for personal correspondence.

c. uses third-party CAs to validate a user’s identity.

d. uses digital signatures to validate a user’s identity.

11. Smaller firms may outsource some or many security functions to:


B) MISs.

C) CAs.

D) ISPs.

12. A suite of integrated software modules for finance and accounting, human resources,

manufacturing and production, and sales and marketing that allows data to be used by

multiple functions and business processes best describes:

a. ERM software.

b. SCM software.

c. CRM modules.

d. ERP systems.

13. Why is overstocking warehouses not an effective solution for a problem of low availability?

a. It increases sales costs.

b. It increases inventory costs.

c. It does not speed product time to market.

d. It is an inefficient use of raw materials.

14. A network of organizations and business processes for procuring raw materials, transforming

these materials into intermediate and finished products, and distributing the finished products

to customers is called a:

a. distribution channel.

b. supply chain.

c. marketing channel.

d. value chain.

15. A company’s organizations and processes for distributing and delivering products to the final

customers is the:

a. external supply chain.

b. downstream portion of the supply chain.

c. supplier’s internal supply chain.

d. upstream portion of the supply chain.

16. Uncertainties arise in any supply chain because of:

a. inaccurate or untimely information.

b. unforeseeable events.

c. inefficient or inaccurate MIS.

d. poor integration between systems of suppliers, manufacturers, and distributors.

17. SFA modules in CRM systems would provide tools for:

a. capturing prospect and customer data.

b. managing sales prospect and contact information.

c. identifying profitable and unprofitable customers.

d. assigning and managing customer service requests.

18. ________ management is an important capability for service processes that is found in most

major CRM software products.

a. Lead

b. Returns

c. Account

d. Events

19. Customer relationship management applications dealing with the analysis of customer data to

provide information for improving business performance best describes ________ applications.

a. operational SCM

b. analytical CRM

c. analytical SFA

d. operational CRM

20. Based on your reading of the chapter, e-commerce is:

a. not yet fully accepted by consumers, although much of its driving technology is firmly

in place.

b. still in a revolutionary phase.

c. widely accepted by consumers, although technology is still quickly changing.

d. well entrenched as a form of modern commerce.

21. Varying a product’s price according to the supply situation of the seller is called ________


a. menu

b. asymmetric

c. dynamic

d. flexible

22. Compared to traditional goods, digital goods have:

a. lower marketing costs.

b. higher production costs.

c. greater pricing flexibility.

d. higher inventory costs.

23. Which of the following best illustrates the sales revenue model?

a. EBay receives a small fee from a seller if a seller is successful in selling an item.

b. Apple accepts micropayments for single music track downloads.

c. Flickr provides basic services for free, but charges a premium for advanced services.

d. Epinions receives a fee after steering a customer to a participating Web site where he

or she makes a purchase.

24. Exposing an individual to ads that are chosen and based on the recorded and analyzed online

behavior of the individual is referred to as:

a. long-tail marketing.

b. behavioral targeting.

c. online profiling.

d. clickstream advertising.

25. Which of the following describes long-tail marketing?

a. The dwindling sales of a once-popular book.

b. The yearly sales of one or two copies each of thousands of obscure films.

c. The unexpected growth of sales of a product long after its initial release.

d. The continued successful sales of a product over years.

Hi, I'm Josie and I am a moderator for this topic. I sent your requested professional a message to follow up with you here, when he is back online.

If I can help further, please let me know. Thank you for your continued patience.

Thanks for requesting me.

I am working on these and will answer before your deadline.

You need to spend $3 to view this post. Add Funds to your account and buy credits.
Bizhelp, CPA
Category: Homework
Satisfied Customers: 5884
Experience: Bachelors Degree and CPA with Accounting work experience
Bizhelp and 3 other Homework Specialists are ready to help you