Assdt

In: Computers and Technology

Submitted By mksingh698
Words 1895
Pages 8
Exam
Name___________________________________

TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false.

1)

Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.

1)

_______

2)

Viruses can be spread through e-mail.

2)

_______

3)

Public key encryption uses two keys.

3)

_______

4)

Packet filtering catches most types of network attacks.

4)

_______

5)

Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

5)

_______

6)

Enterprise systems use a client/server architecture and have not yet been redesigned to take advantage of the Web.

6)

_______

7)

Low inventory acts a buffer for the lack of flexibility in the supply chain.

7)

_______

8)

Total supply chain costs represent the majority of operating expenses for many businesses and in some industries approach 75 percent of the total operating budget.

8)

_______

9)

All CRM packages contain modules for PRM and ERM.

9)

_______

10)

Enterprise systems require fundamental changes in the way the business operates.

10)

______

11)

The Internet shrinks information asymmetry.

11)

______

12)

In general, for digital goods, the marginal cost of producing another unit is about zero.

12)

______

13)

Web sites cannot currently provide customers with call center interaction.

13)

______

14)

Accumulated balance digital payment systems allow consumers to make instant online payments to merchants and other individuals based on conventional credit card payments.

14)

______

15)

Direct goods are not directly involved in the…...

Similar Documents

Henrique, da dupla com Juliano, serĂ¡ pai de uma menina! | Trisouls | Data Analysis: Baseball ERA/Team Paper/RES 341 with instructor notes