Vous êtes sur la page 1sur 6

OPIM 3103C Section 1, Fall 2009

Final Exam, December 14, 2009

Name___________________________________ PeopleSoft ID ____________________________

INSTRUCTIONS > This is a closed-book, closed notes exam. The only materials allowed on your desks are pen/pencil and this exam form > There are 40 multiple-choice questions, each for 2.5 points. Maximum score for this exam is 100 points. > Choose ONE correct answer for each question. Clearly write that answer (A, B, C or D) next to the question in the space provided. Only the answer in the designated space will be considered in grading. > Exams are due at the end of allowed period. No extra time will be given. Exams not turned in by the end of testing period will receive a score of zero. ------------------------------------------------------------------------MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Information ________ exists when one party in a transaction has more information that is important for the transaction than the other party. A) asymmetry B) transparency C) complexity D) imbalance 2) Which of the following businesses utilizes the content provider Internet business model? A) CNN.com B) eBay.com C) Amazon.com D) Yahoo.com 3) Tools that compare user behavior and interests to make purchasing recommendations to users are called ________ tools. A) predictive analysis B) collaborative filtering C) customer tracking D) clickstream tracking 4) The cost to a merchant of changing the price of a product is called a ________ cost. A) pricing B) menu C) switching D) dynamic pricing 5) eBay is an example of: A) business-to-consumer electronic commerce. B) a click-and-mortar business. C) consumer-to-consumer electronic commerce. D) an online exchange. 1)

2)

3)

4)

5)

6) Reducing the business process layers in a distribution channel is called: A) network effects. B) market segmentation. C) BPR. D) disintermediation. 7) Transaction brokers: A) provide a digital environment where buyers and sellers can establish prices for products. B) sell physical products directly to consumers or individual businesses. C) generate revenue from advertising or from directing buyers to sellers. D) save users money and time by processing online sales dealings. 8) Which type of applications take special advantage of the unique capabilities of mobile technology? A) Personalized services B) Location-based applications C) Text-based messaging D) Interactive, video-rich applications 9) A companys organizations and processes for distributing and delivering products to the final customers is the: A) downstream portion of the supply chain. B) external supply chain. C) upstream portion of the supply chain. D) suppliers internal supply chain. 10) Supply chain software can be classified as either: A) supply chain make systems or supply chain delivery systems. B) supply chain return systems or supply chain make systems. C) supply chain source systems or supply chain recovery systems. D) supply chain planning systems or supply chain execution systems. 11) A supply chain driven by actual customer orders or purchases follows a: A) push-based model. B) pull-based model. C) replenishment-driven model. D) build-to-stock model. 12) A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called: A) ripple effect. B) exponential effect. C) replenishment effect. D) bullwhip effect. 13) The measurement of the number of customers who stop using or purchasing products or services from a company is called: A) switch rate B) switching costs C) churn rate D) decline rate 14) Systems to manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner best describes: A) supply chain demand systems. B) supply chain delivery systems. C) supply chain execution systems. D) supply chain planning systems. 15) This metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company. A) Cost per lead B) Churn rate C) Cost per sale D) CLTV

6)

7)

8)

9)

10)

11)

12)

13)

14)

15)

16) A method of firm interaction with a customer, such as telephone, e-mail, customer service desk, conventional mail, or point of purchase best describes: A) point of presence. B) channel point. C) market entry. D) touch point. 17) A(n) ________ is a distorted image displaying a combination of letters and/or numbers a user has to input in a form. A) passcode B) CAPTCHA C) Turing test D) GOTCHA 18) A technique whereby data are encoded with a special secret key (to make unauthorized viewing more difficult) is called: A) encryption. B) asynchronous transfer mode. C) authentication. D) camouflage. 19) Some spam e-mail includes ________, which are attempts to trick financial account and credit card holders into giving away their authorization information. A) tricking B) freaking C) phishing D) luring 20) ________ is a type of security that grants or denies access to a resource (e.g., facility, computer systems) through the analysis of fingerprints, retinal patterns in the eye, or other bodily characteristics. A) Bioinformatics B) Bio-identification C) Bio-authentication D) Biometrics 21) ________ is a computer system security policy in which no countermeasures are adopted, and any damages that occur are simply absorbed. A) Risk transference B) Risk acceptance C) Risk embracement D) Risk reduction 22) Encryption software allows users to ensure: A) privacy/confidentiality. C) authentication.

16)

17)

18)

19)

20)

21)

22) B) nonrepudiation. D) All of the above. 23) D) robot 24)

23) To execute denial of service attacks, intruders often use ________ computers. A) zombie B) android C) monster

24) ________ is any software that covertly gathers information about a user though an Internet connection without the user's knowledge. A) Worms B) Viruses C) Adware D) Spyware 25) The Internet relies on ________ technology, which enables millions of users to send large and small chunks of data across the Internet concurrently, based on the concept of turn -taking. A) packet-switching B) e-commerce C) mainframe D) wireless 26) The unique address assigned to every computer and router connected to the Internet is called: A) IP address. B) destination address. C) IP datagram. D) TCP address.

25)

26)

27) The only job of ________ is to connect networks and forward data packets from one network to another. A) routers B) distributors C) senders D) backbones 28) A ________ manages the bulk of network traffic and typically uses a higher-speed connection than the individual LAN segments. A) backbone network B) distributor network C) interconnection network D) router 29) What root database is used to associate Internet host names with their IP addresses? A) DNS B) TCP C) InterNIC D) IANA 30) Why are we transitioning to Ipv6? A) to avoid confusion when InterNIC morphed into ICANN. B) to comply with new government regulations. C) the number of unassigned Internet addresses is running out. D) to take the Internet worldwide. 31) A technology capable of providing high-speed stationary wireless access without needing line-of sight technology is called: A) WiMax. B) Internet over satellite. C) WiFi. D) broadband wireless. 32) An ISP connects to the Internet at an exchange point for Internet traffic, much like a railway station. These exchange points are called: A) Network Access Points (NAPs). B) interchange points. C) intersections. D) onramps. 33) Organizations obtain new information systems by: A) having outside consultants custom-build the system. B) purchasing prepackaged systems. C) having members of the organization build the system. D) All of the above. 34) The five phases of the SDLC in order from first to last are: A) analysis, identification, design, implementation and maintenance. B) identification, analysis, design, implementation and maintenance. C) analysis, design, identification, implementation and maintenance. D) identification, design, analysis, implementation and maintenance. 35) The first phase of the SDLC includes: A) systems analysis. C) identification and analysis.

27)

28)

29)

30)

31)

32)

33)

34)

35) B) identification, selection and planning. D) design of system. 36)

36) Some of the activities which take place during this phase include: system conversion, software programming and testing, documentation, training and support. A) Programming B) System design C) System implementation D) System logic

37) ________ is testing of the capabilities of the system in the user environment with actual data. A) Beta testing B) Developmental testing C) Alpha testing D) Systems testing 38) The process of decommissioning the current system and installing the new system in the organization is called: A) systems contracting. B) systems converting. C) systems analysis. D) systems conversion. 39) After an information system is installed it is in the: A) development phase. C) analysis phase.

37)

38)

39) B) testing phase. D) maintenance phase. 40)

40) The four types of system maintenance referenced in the book are: A) developmental, corrective, adaptive and preventative. B) developmental, adaptive, perfective and preventative. C) corrective, adaptive, perfective and preventative. D) developmental, corrective, perfective and preventative.

Answer Key Testname: FINAL_F09

1) A 2) A 3) B 4) B 5) C 6) D 7) D 8) B 9) A 10) D 11) B 12) D 13) C 14) C 15) D 16) D 17) B 18) A 19) C 20) D 21) B 22) D 23) A 24) D 25) A 26) A 27) A 28) A 29) A 30) C 31) A 32) A 33) D 34) B 35) B 36) C 37) A 38) D 39) D 40) C