BAM information management unit 3
1.
Sobig.F and MyDoom.A are:
a.
viruses that use Microsoft Outlook to spread to other systems.
b.
worms attached to email that spread from computer to computer.
c.
multipartite viruses that can infect files as well as the boot sector of the
hard drive.
d.
Trojan horses used to create bot nets.
2.
Redirecting a Web link to a different address is a form of :
a.
snooping.
b.
spoofing.
c.
sniffing.
d.
DDoS.
3.
A key logger is a type of:
a.
worm.
b.
Trojan horse.
c.
virus.
d.
spyware.
4.
In 2004, ICQ users were enticed by a sales message from a supposed anti
virus vendor. On the vendor’s site, a small program called Mitglieder was
downloaded to the user’s machine. The program enabled outsiders to infiltrate
the user’s machine. What type of malware is this an example of?
a.
Trojan horse
b.
Virus
c.
Worm
d.
Spyware
5.
How do hackers create a botnet?
a.
Infecting Web search bots with malware
b.
Using Web search bots to infect other computers
c.
Causing other people’s computers to become “zombie” PCs following a
master computer
d.
Infecting corporate servers with “zombie” Trojan horses that allow unde
tected access through a back door
6.
Using numerous computers to inundate and overwhelm the network from nu-
merous launch points is called a _______ attack.
a.
DDoS
b.
DoS
c.
pharming
d.
phishing
7.
Which of the following is not an example of a computer used as a target of
crime?
a.
Knowingly accessing a protected computer to commit fraud
b.
Accessing a computer system without authority
c.
Illegally accessing stored electronic communication
d.
Threatening to cause damage to a protected computer
8.
Which of the following is not an example of a computer used as an instru
ment of crime?
a.
Theft of trade secrets
b.
Intentionally attempting to intercept electronic communication
c.
Unauthorized copying of software
d.
Breaching the confidentiality of protected computerized data
9.
A network of organizations and business processes for procuring raw materi
als, transforming these materials into intermediate and finished products, and
distributing the finished products to customers is called a:
a.
distribution channel.
b.
supply chain.
c.
value chain.
d.
marketing chain.
10.
Components or parts of finished products are referred to as:
a.
upstream materials.
b.
raw materials.
c.
secondary products.
d.
intermediate products.
11.
A company’s suppliers, supplier’s suppliers, and the processes for managing
relationships with them is the:
a.
supplier’s internal supply chain.
b.
external supply chain.
c.
upstream portion of the supply chain.
d.
downstream portion of the supply chain.
12.
A company’s organizations and processes for distributing and delivering prod
ucts to the final customers is the:
a.
supplier’s internal supply chain.
b.
external supply chain.
c.
upstream portion .
BAM information management unit 31.Sobig.F and MyDoom.A ar.docx
1. BAM information management unit 3
1.
Sobig.F and MyDoom.A are:
a.
viruses that use Microsoft Outlook to spread to other systems.
b.
worms attached to email that spread from computer to computer.
c.
multipartite viruses that can infect files as well as the boot
sector of the
hard drive.
d.
Trojan horses used to create bot nets.
2.
Redirecting a Web link to a different address is a form of :
a.
snooping.
3. In 2004, ICQ users were enticed by a sales message from a
supposed anti
virus vendor. On the vendor’s site, a small program called
Mitglieder was
downloaded to the user’s machine. The program enabled
outsiders to infiltrate
the user’s machine. What type of malware is this an example of?
a.
Trojan horse
b.
Virus
c.
Worm
d.
Spyware
5.
How do hackers create a botnet?
a.
4. Infecting Web search bots with malware
b.
Using Web search bots to infect other computers
c.
Causing other people’s computers to become “zombie” PCs
following a
master computer
d.
Infecting corporate servers with “zombie” Trojan horses that
allow unde
tected access through a back door
6.
Using numerous computers to inundate and overwhelm the
network from nu-
merous launch points is called a _______ attack.
a.
DDoS
b.
DoS
5. c.
pharming
d.
phishing
7.
Which of the following is not an example of a computer used as
a target of
crime?
a.
Knowingly accessing a protected computer to commit fraud
b.
Accessing a computer system without authority
c.
Illegally accessing stored electronic communication
d.
Threatening to cause damage to a protected computer
8.
Which of the following is not an example of a computer used as
an instru
6. ment of crime?
a.
Theft of trade secrets
b.
Intentionally attempting to intercept electronic communication
c.
Unauthorized copying of software
d.
Breaching the confidentiality of protected computerized data
9.
A network of organizations and business processes for
procuring raw materi
als, transforming these materials into intermediate and finished
products, and
distributing the finished products to customers is called a:
a.
distribution channel.
7. b.
supply chain.
c.
value chain.
d.
marketing chain.
10.
Components or parts of finished products are referred to as:
a.
upstream materials.
b.
raw materials.
c.
secondary products.
d.
intermediate products.
11.
A company’s suppliers, supplier’s suppliers, and the processes
8. for managing
relationships with them is the:
a.
supplier’s internal supply chain.
b.
external supply chain.
c.
upstream portion of the supply chain.
d.
downstream portion of the supply chain.
12.
A company’s organizations and processes for distributing and
delivering prod
ucts to the final customers is the:
a.
supplier’s internal supply chain.
b.
external supply chain.
9. c.
upstream portion of the supply chain.
d.
downstream portion of the supply chain.
13.
Uncertainties arise in a supply chain because of:
a.
inaccurate or untimely information.
b.
poor integration between systems of suppliers, manufacturers,
and dis
tributors.
c.
inefficient or inaccurate MIS.
d.
unforeseeable events.
14.
10. Which of the following traditional solutions enables
manufacturers to deal
with uncertainties in the supply chain?
a.
Safety stock
b.
Continuous replenishment
c.
Just-in-time strategies
d.
Demand planning
15.
A scheduling system for minimizing inventory by having
components arrive
exactly at the moment they are needed and finished goods
shipped as soon as
they leave the assembly line best describes a ______ strategy:
a.
just-in-time
11. b.
stockless
c.
bullwhip
d.
safety stock
16.
A distortion of information about the demand for a product as it
passes from
one entity to the next across the supply chain is called a(n):
a.
replenishment effect.
b.
bullwhip effect.
c.
ripple effect.
d.
12. exponential effect.
17.
The act of engaging consumers in a dialog that dynamically
adjusts the ex
perience to the individual describes which dimension of e-
commerce technol
ogy?
a.
Ubiquity
b.
Personalization/Customization
c.
Richness
d.
Interactivity
18.
The integration of video, audio, and text marketing messages
into a single
marketing message and consumer experience describes which
15. Information density refers to the:
a.
richness -- complexity and content-- of a message.
b.
total amount and quantity of information delivered to consumers
by mer
chants.
c.
total amount and quality of information available to all market
partici
pants.
d.
amount of information available to reduce price transparency.
22.
Selling the same goods to different targeted groups at different
prices is
called:
a.
price customization.
16. b.
price opacity.
c.
price gouging.
d.
price discrimination.
23.
Information __________________ exists when one party in a
transaction has
more information that is important for the transaction than the
other party.
a.
transparency
b.
asymmetry
c.
complexity
d.
17. imbalance
24.
The cost to a merchant of changing the price of a product is
called a _____
cost.
a.
pricing
b.
dynamic pricing
c.
menu
d.
switching
25.
Varying a product’s price according to the supply situation of
the seller is
called _______ pricing.
a.
18. menu
b.
supply
c.
dynamic
d.
asymmetrical
Written Assignment for Unit Three
• Include your name, student number, course number, course
title and unit number on each page of your written assignment
(this is for your protection in case your materials become
separated). • Begin each written assignment by identifying the
question number you are answering followed by the actual
question itself (in bold type). • Use a standard essay format for
responses to all questions (i.e. an introduction, middle
paragraphs and conclusion). • Responses must be submitted as a
MS Word Document only, typed double-spaced, using a
standard font (i.e. Times New Roman) and 12 point type size.
Word count is NOT one of the criteria that is used in assigning
points to written assignments. However, students who are
successful in earning the maximum number of points tend to
submit written assignments that fall in the following ranges:
Undergraduate courses: 350 - 500 words or 1 - 2 pages.
Plagiarism All work must be free of any form of plagiarism. Put
19. written answers into your own words. Do not simply cut and
paste your answers from the Internet and do not copy your
answers from the textbook. Be sure to refer to the course
Syllabus for more details on plagiarism and proper citation
styles.
Please answer ONE of the following:
1.
How can a firm’s security policies contribute and relate to the
six main business objectives? Give examples.
2.
What are the benefits of enterprise systems?
What are the challenges of enterprise systems?
3.
What is the most profound way in which e-commerce and the
Internet has
changed the relationship between companies and their
customers? Support your answer.