Wednesday, 1 April 2015

CIS 5001 question for Assignment -Aug,2011 S2

56. Customer service modules in CRM systems provide tools CIS 5001 question for Assignment 2 Aug,2011 S2

69. Which model can be used to analyze the direct and indirect costs to help firms determine
the actual cost of specific technology implementations?
A. total cost of ownership
B. return on investment
C. breakeven point
D. cost benefit analysis

38. The ethical "no free lunch" rule states that
A. if an action cannot be taken repeatedly, then it is not right to be taken at any time.
B. one should take the action that produces the least harm or incurs the least cost.
C. one can put values in rank order and understand the consequences of various
courses of action.
D. everything is owned by someone else, and that the creator wants compensation for
this work.

61. Which generation of network are wireless cellular phone systems entering?
A. 2.5G
B. 3G
C. 3.5G
D. 4G
4 The most common source of business system failure is
Choose one answer. 
pastedGraphic.png

55. The strength of patent protection is that it
A. puts the strength of law behind copyright.
B. allows protection from Internet theft of ideas put forth publicly.
C. is easy to define.
D. grants a monopoly on underlying concepts and ideas.
52. The need in some cases for employees to have access to sexually explicit material on the
Internet, such as medical researchers, suggests that companies
A. cannot restrict Internet use.
B. need specialized software to determine which types of material are acceptable.
C. may need to maintain a database of acceptable Web sites.
D. need to base their Internet use policies on the needs of the organization and
culture.
23. Which of the following best illustrates the relationship between entities and attributes?
A. the entity CUSTOMER with the attribute PRODUCT
B. the entity CUSTOMER with the attribute PURCHASE
C. the entity PRODUCT with the attribute PURCHASE
D. the entity PRODUCT with the attribute CUSTOMER
21. Which of the following is NOT one of the main problems with a traditional file
environment?
A. data inconsistency
B. program-data independence
C. lack of flexibility in creating ad-hoc reports
D. poor security
34. Software that manages the resources of the computer is called
A. operating system software.
B. application software.
C. data management software.
D. network software.
58. Software applications that are based on combining different online software applications
are called
A. integrated software.
B. Ajax.
C. mashups.
D. virtual software. for
A. assigning and managing customer service requests.
B. sales quote generation.
C. identifying profitable and unprofitable customers.
D. managing sales prospect and contact information.

47. A build-to-order supply-chain model is also called a ________ model.
A. supply-driven
B. demand-driven
C. replenishment-driven
D. push-based
70. Enterprise application vendors have created ________ to make their own customer
relationship management, supply chain management, and enterprise systems work closely
together with each other.
A. e-business suites
B. ERP systems
C. middleware
D. legacy systems
55. An analysis of the firm's most critical systems and the impact a system's outage would
have on the business is included in a(n)
A. security policy.
B. AUP.
C. risk assessment.
D. business impact analysis.
An analysis of the firm's most critical systems and the impact a system's outage would have on the business is included in a(n )
Choose one answer. 
pastedGraphic.png

69. The development and use of methods to make computer systems recover more quickly
after mishaps is called
A. high availability computing.
B. recovery oriented computing.
C. fault tolerant computing.
D. disaster recovery planning




66. Downtime refers to periods of time in which a
A. computer system is malfunctioning.
B. computer system is not operational.
C. corporation or organization is not operational.
D. computer is not online.
64. In which method of encryption is a single encryption key sent to the receiver so both
sender and receiver share the same key?
A. SSL
B. symmetric key encryption
C. public key encryption
D. private key encryption
59. Selling a customer with a checking account a home improvement loan is an example of
A. operational CRM.
B. direct marketing.
C. cross-selling.
D. cross-channel promotions.
SakuraStoreMY
70. Smaller firms can outsource security functions to
A. MISs
B. CSOs
C. MSSPs
D. CAs

57. Marketing modules in CRM systems would provide tools for
A. managing an advice telephone line.
B. sales quote generation.
C. identifying profitable and unprofitable customers.
D. managing sales prospect and contact information.

SakuraStoreMY


No comments:

Post a Comment