Project #34077 - ccjs and ifsm 2.7

Question 1 (1 point)

 Question 1 Unsaved
 

__________ are the building blocks of each functional area, for example billing and inventory management.

 
Question 1 options:
A) 

IT procedures

B) 

Business processes

C) 

Business strategies

D) 

Competitive forces

Save

 

Question 2 (1 point)

 Question 2 Unsaved
 

When you break it down, you see that a business process is actually __________

 
Question 2 options:
A) 

A project of known scope with an assigned budget

 

B) 

A loosely defined approach to solving an unstructured problem

C) 

A series of individual tasks executed in a specific order

D) 

Clearly defined and automated by software

Save

 

Question 3 (1 point)

 Question 3 Unsaved
 

During the implementation stage, __________ tests are critical because they determine whether the process is designed well from users’ perspective.

 
Question 3 options:
A) 

functional acceptance

B) 

system acceptance

C) 

integration

D) 

user acceptance

Save

 

Question 4 (1 point)

 Question 4 Unsaved
 

During the implementation stage, __________ tests are critical because that is when analysts test whether the process performs its functions.

 
Question 4 options:
A) 

user acceptance

B) 

functional acceptance

C) 

system acceptance

D) 

technical acceptance

Save

 

Question 5 (1 point)

 Question 5 Unsaved
 

While most of us use Google services like Gmail, Google Maps, YouTube and the search engine for free, the fact that it generates most of its revenue from other businesses means it is part of a __________________ market.

 
Question 5 options:
A) 

Business  to Government (B2G)

 

B) 

Business to Business (B2B)

C) 

Consumer to Business (C2B)

D) 

Consumer to Consumer (C2C)

Save

 

Question 6 (1 point)

 Question 6 Unsaved
 

Your textbook describes a number of e-business models.  Which of the terms below best fits the following description:  “Users are charged a periodic (e.g. monthly or annual) fee to use a service provided by the business.”

 
Question 6 options:
A) 

Utility model

B) 

Freemium model

C) 

Subscription model

D) 

Affiliate marketing model

Save

 

Question 7 (1 point)

 Question 7 Unsaved
 

According to your textbook, the use of _________________ has already saved the government billions of dollars while at the same time, increasing government productivity and efficiency.

 
Question 7 options:
A) 

Fee-based services

 

B) 

Cloud computing tools

C) 

Agency Websites

D) 

Forward auctions

Save

 

Question 8 (1 point)

 Question 8 Unsaved
 

Your textbook listed a number of security requirements for conducting e-commerce.  Which of the following was not one of the requirements listed?

 
Question 8 options:
A) 

Authentication

B) 

Safety (fraud protection)

C) 

Privacy

D) 

Price guarantees

Save

 

Question 9 (1 point)

 Question 9 Unsaved
 

Your textbook listed a number of security requirements for conducting e-commerce.  ________________ means that merchants are protected against customers unjustly claiming they did not place an order and customers protected from merchants unjustly claiming they did not receive payment.

 
Question 9 options:
A) 

Authentication

B) 

Nonrepudiation

C) 

Order fulfillment

D) 

Claim denial

Save

 

Question 10 (1 point)

 Question 10 Unsaved
 

Your textbook listed a number of security requirements for conducting e-commerce.   _______________ helps insure that the buyer, the seller, and the paying institutions all know the identity of the parties with whom they are dealing.

 
Question 10 options:
A) 

Authentication

B) 

Nonrepudiation

C) 

Integrity

D) 

Privacy

Save

 

Question 11 (1 point)

 Question 11 Unsaved
 

Your textbook listed a number of security requirements for conducting e-commerce.   _____________ is necessary to ensure that data and information transmitted in e-commerce, such as orders, replies to queries, and payment authorizations, not be accidentally or maliciously altered or destroyed during transmission.

 
Question 11 options:
A) 

Authentication

B) 

Nonrepudiation

C) 

Integrity

D) 

Privacy

Save

 

Question 12 (1 point)

 Question 12 Unsaved
 

Privacy is an increasing concern to Internet users.  One privacy concern is related to a practice called _________________ , where a user’s Web history (e.g. sites visited) is stored in files called “Cookies” and used to monitor individuals’ movements on the Internet.

 
Question 12 options:
A) 

Online spying

B) 

Digital detection

C) 

Digital stalking

D) 

Web tracking

Subject General
Due By (Pacific Time) 06/27/2014 12:00 am
Report DMCA
TutorRating
pallavi

Chat Now!

out of 1971 reviews
More..
amosmm

Chat Now!

out of 766 reviews
More..
PhyzKyd

Chat Now!

out of 1164 reviews
More..
rajdeep77

Chat Now!

out of 721 reviews
More..
sctys

Chat Now!

out of 1600 reviews
More..
sharadgreen

Chat Now!

out of 770 reviews
More..
topnotcher

Chat Now!

out of 766 reviews
More..
XXXIAO

Chat Now!

out of 680 reviews
More..
All Rights Reserved. Copyright by AceMyHW.com - Copyright Policy