Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Management
Q:
The elements of a company's business model are
A. its customer value proposition as well as the company's profit formula.
B. its business strategy, its collection of competitively valuable resources, and a strong management team.
C. its deliberate strategy, its emergent strategy, and its realized strategy.
D. its actions to capture emerging market opportunities and defend against threats to the company's business prospects, its actions to strengthen competitiveness via strategic alliances, and its actions to enter new geographic or product markets.
E. management's answers to the questions: Where are we now? Where do we want to go? and How are we going to get there?
Q:
A company's business model
A. concerns the actions and business approaches that will be used to grow the business, conduct operations, please customers, and compete successfully.
B. relates to the principle business components that will allow the business to generate revenues ample enough to cover costs and produce a profit.
C. concerns what moves in the marketplace it plans to make to outcompete rivals.
D. deals with how it can simultaneously maximize profits and operate in a socially responsible manner.
E. concerns how management plans to pursue strategic objectives, given the larger imperative of meeting or beating its financial performance targets.
Q:
A(n) _____ is a software that attaches itself to another program and can cause damage when the host program is activated.a. applet b. browser plug-inc. virus d. message digest
Q:
ActiveX controls run only on computers with _____ operating systems.a. Windows b. Linuxc. UNIX d. Mac
Q:
A company's realized strategy is made up of
A. deliberate and/or planned initiatives that have proven themselves in the marketplace and newly launched initiatives aimed at further boosting performance.
B. emergent and/or reactive adjustments to unanticipated strategic moves by rivals, unexpected changes in customer preferences, and new market opportunities.
C. tactical plans to imitate the key elements of the strategies employed by rivals.
D. both deliberate and/or planned initiatives that have proven themselves in the marketplace and newly launched initiatives aimed at further boosting performance and emergent and/or reactive adjustments to unanticipated strategic moves by rivals, unexpected changes in customer preferences, and new market opportunities.
E. All of these choices are correct.
Q:
Which of the following statements about a company's realized strategy is true?
A. A company's realized strategy is mostly hidden to outside view and is deliberately kept under wraps by top-level managers.
B. A company's realized strategy is typically planned well in advance and usually deviates little from the planned set of actions.
C. A company's realized strategy generally changes very little over time unless a newly appointed CEO decides to take the company in a new direction with a new strategy.
D. A company's realized strategy is typically a blend of deliberate and/or planned initiatives and emergent and/or unplanned reactive strategy elements.
E. A company's realized strategy is developed mostly on the fly because of the constant efforts of managers to keep rival companies at a disadvantage.
Q:
A(n) _____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.a. persistent cookie b. dead linkc. ActiveX control d. session cookie
Q:
A company may develop an emergent strategy due to
A. strategic moves by rival firms.
B. unexpected shifts in customer preferences.
C. fast-changing technological developments.
D. new market opportunities.
E. All of these choices are correct.
Q:
In the context of categorizing cookies in terms of their time duration, _____ are cookies which exist until the Web client ends the connection.a. first-party cookies b. persistent cookiesc. third-party cookies d. session cookies
Q:
Crafting a strategy involves
A. blending deliberate, planned initiatives with emergent, unplanned reactive responses to changing circumstances, while abandoning planned strategy elements that have failed in the marketplace.
B. developing a five-year strategic plan and then fine-tuning it during the remainder of the plan period.
C. trying to imitate as much of the market leader's strategy as possible so as not to end up at a competitive disadvantage.
D. doing everything possible (in the way of price, quality, service, warranties, advertising, and so on) to make sure the company's product and/or service is very clearly differentiated from the product and or service offerings of rivals.
E. All of these accurately characterize the managerial process of crafting a company's strategy.
Q:
A _____ is a program hidden inside another program or Web page that masks its true purpose.a. remote wipe b. Trojan horsec. digital certificate d. wardriver
Q:
It is normal for a company's strategy to end up being
A. left unchanged from management's original planned set of actions and business approaches since making on-the-spot changes is too risky.
B. a combination of defensive moves to protect the company's market share and offensive initiatives to set the company's product offering apart from rivals.
C. like the strategies of other industry members since all companies are confronting much the same market conditions and competitive pressures.
D. a blend of deliberate planned actions to improve the company's competitiveness and financial performance and as-needed unplanned reactions to unanticipated developments and fresh market conditions.
E. a mirror image of its business model, so as to avoid impairing company profitability.
Q:
A(n) _____ is a small application program that typically runs within a Web browser.a. applet b. bufferc. white hat hacker d. black hat hacker
Q:
JavaScript and VBScript are _____, which provide commands that are executed on the client.a. plug-ins b. scripting languagesc. Web bugs d. session cookies
Q:
Changing circumstances and ongoing managerial efforts to improve the strategy
A. account for why a company's strategy evolves over time.
B. explain why a company's strategic vision undergoes almost constant change.
C. make it very difficult for a company to have concrete strategic objectives.
D. make it very hard to know what a company's strategy really is.
E. All of these choices are correct.
Q:
A company's strategy is a "work in progress" and evolves over time because of the
A. ongoing need of company managers to react and respond to changing industry and competitive conditions.
B. ongoing need to imitate the new strategic moves of the industry leaders.
C. need to make regular adjustments in the company's strategic vision.
D. importance of developing a fresh strategic plan every year.
E. frequent need to modify key elements of the company's business model.
Q:
The purpose of a _____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor's computer.a. personal firewall b. digital certificatec. Web bug d. gateway server
Q:
Which of the following is not one of the basic reasons that a company's strategy evolves over time?
A. an ongoing need to abandon those strategy features that are no longer working well
B. the proactive efforts of company managers to improve the company's financial performance and secure a competitive advantage
C. the need on the part of company managers to make no adjustments to the company's business model
D. the need to respond to the actions and competitive moves of rival firms
E. the need to keep strategy in step with changing industry and competitive conditions
Q:
A _____is a written statement describing which assetsto protect and why they are being protected, who is responsible for that protection, andwhich behaviors are acceptable and which are not.a. plain text b. cypher textc. security policy d. digital signature
Q:
Which of the following is not a frequently used strategic approach to setting a company apart from rivals and achieving a sustainable competitive advantage?
A. aiming for a cost-based competitive advantage
B. outcompeting rivals on the basis of such differentiating features as higher quality, wider product selection, added performance, better service, or more attractive styling
C. simply trying to mimic the successful strategies of rivals
D. focusing on a narrow market niche and winning a competitive edge by doing a better job than rivals of satisfying the needs and tastes of buyers comprising the niche
E. developing expertise and resources that give the company competitive capabilities that rivals can't easily imitate or trump with capabilities of their own
Q:
_____ refers to preventing unauthorized data modification.a. Integrity b. Secrecyc. Necessity d. Completeness
Q:
Which of the following is a frequently used strategic approach to setting a company apart from rivals and achieving a sustainable competitive advantage?
A. striving to be the industry's low-cost provider, thereby aiming for a cost-based competitive advantage
B. outcompeting rivals on the basis of such differentiating features as higher quality, wider product selection, added performance, better service, more attractive styling, or technological superiority
C. developing competitively valuable resources and capabilities that rivals can't easily match, copy, or trump with capabilities of their own
D. focusing on a narrow market niche and winning a competitive edge by doing a better job than rivals of serving the special needs and tastes of buyers comprising the niche
E. All of these choices are correct.
Q:
_____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.a. Necessity b. Secrecyc. Integrity d. Encryption
Q:
Proven approaches to winning a sustainable competitive advantage include which of the following?
A. developing a low-cost-based advantage
B. creating a broad differentiation-based advantage
C. focusing on a narrow market niche within an industry
D. developing a best-cost provider strategy
E. All of these choices are correct.
Q:
_____ are computer sleuths who are hired to probe PCs and locate information that can be used in legal proceedings.a. Wardrivers b. Computer forensics expertsc. Crackers d. Hackers
Q:
A(n) _____ is a person or device that is able to listen in on and copy Internet transmissions.a. eavesdropper b. white hat hackerc. black hat hacker d. cracker
Q:
A creative, distinctive strategy that sets a company apart from rivals and that gives it a sustainable competitive advantage
A. is a reliable indicator that the company has a profitable business model.
B. is a company's most reliable ticket to above-average profitability.
C. signals that the company has a bold, ambitious strategic intent that places the achievement of strategic objectives ahead of the achievement of financial objectives.
D. is the best indicator that the company's strategy and business model are well matched and properly synchronized.
E. All of these choices are correct.
Q:
A company achieves sustainable competitive advantage when
A. it has a profitable business model.
B. a sufficiently large number of buyers have a lasting preference for its products or services as compared to the offerings of competitors.
C. it is able to maximize shareholder wealth.
D. it is consistently able to achieve both its strategic and financial objectives.
E. its strategy and its business model are well matched and in sync.
Q:
In the context of computer security, the protection of assets using nonphysical means is called _____.a. eavesdropping b. logical securityc. tangible security d. phishing
Q:
A creative, distinctive strategy that delivers a sustainable, competitive advantage is important because
A. without a proven strategy, a company is likely to fall into bankruptcy.
B. without a competitive advantage, a company cannot have a profitable business model.
C. a strategy that yields a competitive advantage over rivals is a company's most reliable means of achieving above-average profitability and financial performance.
D. a competitive advantage is what enables a company to achieve its strategic objectives.
E. how a company goes about trying to please customers and outcompete rivals is what enables senior managers to choose an appropriate strategic vision for the company.
Q:
Any act or object that poses a danger to computer assets is known as a _____.a. countermeasure b. bugc. threat d. code
Q:
The most important aspect(s) of a company's business strategy
A. are the actions and moves in the marketplace that managers take to gain a sustainable competitive advantage.
B. is figuring out how to maximize profits and shareholder value.
C. concerns how to improve the efficiency of its business model.
D. deals with how management plans to maximize profits while, at the same time, operating in a socially responsible manner.
E. is figuring out how to become the industry's low-cost provider.
Q:
_____ is the protection of computer assets from unauthorized access, use, alteration, or destruction.a. Computer security b. Computer riskc. Spamming d. Phishing
Q:
Which of the following is an issue likely to be addressed by a company's business strategy?
A. actions to respond to changing economic and market conditions
B. actions to supplement the company's resources and capabilities through alliances and joint ventures
C. reactions to offensive moves by rival sellers
D. actions and approaches used in managing the functional areas of the business
E. all of these are pertinent in identifying a company's strategy.
Q:
A Web browser that has entered into a Secure Socket Layer session indicates that it is in an encrypted session.
a. True
b. False
Q:
In the context of encryption, shorter keys usually provide significantly betterprotection than longer keys.
a. True
b. False
Q:
Which of the following is not an element of a company's business strategy?
A. actions to respond to changing market conditions or other external factors
B. actions to strengthen competitiveness via strategic alliances and collaborative partnerships
C. actions to strengthen internal capabilities and competitively valuable resources
D. actions to manage the functional areas of the business
E. actions to revise the company's financial and strategic performance targets
Q:
One disadvantage of private-key systems is that encryption and decryption are significantly slower than public-key systems.
a. True
b. False
Q:
Which of the following is not something a company's strategy is concerned with?
A. management's choices about how to attract and please customers
B. management's choices about how quickly and closely to copy the strategies being used by successful rival companies
C. management's choices about how to grow the business
D. management's choices about how to outcompete rivals
E. management's action plan for conducting operations and improving the company's strategic and financial performance
Q:
The Computer Emergency Response Team (CERT) is the most prominent organization that promotes computer security.
a. True
b. False
Q:
A company's strategy is most accurately defined asA. management's approaches to building revenues, controlling costs, and generating an attractive profit.B. management's game plan for growing the business, attracting and pleasing customers, conducting operations, and achieving financial and market performance objectives.C. management's concept of "where we are headed."D. the business model that a company's board of directors has approved for outcompeting rivals and making the company profitable.E. the choices management has made regarding what financial plan to pursue.
Q:
Backdoor is a program that protects information from unauthorized access.
a. True
b. False
Q:
The competitive moves and business approaches a company's management is using to grow the business, compete successfully, attract and please customers, conduct operations, respond to changing economic and market conditions, and achieve organizational objectives is referred to as its
A. strategy.
B. mission statement.
C. strategic intent.
D. business model.
E. strategic vision.
Q:
A company's strategy consists of
A. actions to develop a more appealing business model than rivals.
B. plans involving alignment of organizational activities and strategic objectives.
C. offensive and defensive moves to generate revenues and increase profit margins.
D. competitive moves and approaches that managers have developed to grow the business, attract and please customers, conduct operations, and achieve targeted objectives.
E. its strategic vision, its strategic objectives, and its strategic intent.
Q:
The path taken by a message packet from a source node to a destination node can be controlled by Internet users.
a. True
b. False
Q:
Managers in all types of businesses must develop a clear answer for which of the following questions?
A. Where are we now?
B. Where do we want to go from here?
C. What moves and approaches do we need to gain advantage in the marketplace?
D. When will we know we are there?
E. All of these choices are correct.
Q:
One significant threat to electronic commerce is theft of sensitive or personal information.
a. True
b. False
Q:
Any message traveling on the Internet is subject to secrecy, integrity, and necessity threats.
a. True
b. False
Q:
Message packets on the Internet travel a planned path from a source node to a destination node.
a. True
b. False
Q:
A digital certificate contains a means to send an encrypted message to the entity that sent the original Web page or e-mail message.
a. True
b. False
Q:
Signed code or messagesserve the same function as a photo on a driver's license or passport.
a. True
b. False
Q:
Worms can spread quickly through the Internet.
a. True
b. False
Q:
Persistent cookies refer to the category of cookies which exist until the Web client ends the connection.
a. True
b. False
Q:
A Trojan horse erasing or altering information in a client computer is said to be a secrecy violation.
a. True
b. False
Q:
Active content can bedelivered as an e-mail attachment.
a. True
b. False
Q:
Java applets operating in a sandbox can perform file input, output, or delete operations.
a. True
b. False
Q:
Applets typically run within the Web browser and are most often written in the Javaprogramming language.
a. True
b. False
Q:
Active content is launched in a Web browser automatically prior to the browser loading the Web page containing active content.
a. True
b. False
Q:
People who write programsor manipulate technologies to obtain unauthorized access to computers and networks arecalled crackers.
a. True
b. False
Q:
Active content can pose a threat to the security of client devices.
a. True
b. False
Q:
Active content elements are programs that run on the server.
a. True
b. False
Q:
The most complete way for Web site visitors to protect themselves from revealing private information or being tracked by cookies is to disable cookies entirely.
a. True
b. False
Q:
Networks outside a firewall are referred to as trusted networks.
a. True
b. False
Q:
In the context of the elements of computer security, necessity refers to preventing data delays or denials.
a. True
b. False
Q:
Threats that are unlikely to occur can be ignored when the cost to protect against the threat exceeds the value of the protected asset.
a. True
b. False
Q:
How is a buffer vulnerable to security threats?
Q:
What are the six main elements included on a digital certificate?
Q:
What is the difference between a virus and a worm?
Q:
Describe the security dangers inherent in ActiveX controls.
Q:
Briefly describe the requirements for secure electronic commerce.
Q:
The process of proposing and accepting various transmission conditions is called _____.
Q:
_____ encryption encodes messages by using two mathematically related numeric keys.
Q:
The program that transforms normal text into cipher text is called a(n) _____.
Q:
The science that studies encryption is called _____.
Q:
_____ is the coding of information by using a mathematically based program and a secret key to produce a string of characters that is unintelligible.
Q:
In some cities that have large concentrations of wireless networks, attackers, called _____, drive around in cars using their wireless-equipped laptop computers to search for accessible networks.
Q:
_____ are the computers on the Internet that maintain directories that link domain names to IP addresses.
Q:
An integrity threat, also known as _____, exists when an unauthorized party can alter a message stream of information.
Q:
Apps that contain malware or that collect information from a mobile device and forward it to perpetrators are called _____.
Q:
A(n) _____ security device is one that uses an element of a person's biological makeup to perform identification.