Question details

SUPPLY CHA 563-Users are typically required to acknowledge they
$ 22.00

Question

Question 1 (1 point)

Users are typically required to acknowledge they have read, understand and agree to the ________ before they are allowed to use the service.

Question 1 options:

1) Acceptable Use Policy

2) Intellectual Property Agreement

3) Terms of Service Agreement

4) User Agreement

Question 2 (1 point)

The most important thing that users can do to protect their privacy and identity on social sites is to ________.

Question 2 options:

1) Read and rely on the privacy policy of the SNS

2) Mark their profiles as confidential

3) Accept responsibility for protecting their own information

4) Use third-party programs

Question 3 (1 point)

Businesses and entrepreneurs have turned to the ________ model to raise capital for business start-ups or projects using sites such as Kickstarer.com.

Question 3 options:

1) Global graph

2) Crowdsourcing

3) Crowdfunding

4) Social brainstorming

Question 4 (1 point)

Which of the following is not a reason why marketers use blogs and microblogs?

Question 4 options:

1) To develop relationships with independent bloggers, encouraging them to write positive stories about the brand, product, and company

2) To tell the company's story, position a product, create brand identity or differentiate from the competition.

3) To monitor customer experiences and generate revenue.---------------

4) To engage customers and readers by soliciting comments and feedback about information provided in blog posts.

Question 5 (1 point)

________ represent a change in philosophy for content creators. Traditionally, a business that created content maintained almost complete control over it in a closed system.

Question 5 options:

1) Social apps

2) Mashups

3) RSS feeds

4)Social bookmarks

Question 6 (1 point)

_______ represent a change in philosophy for content creators. Traditionally, a business that created content maintained almost complete control over it in a closed system.

Question 6 options:

1) Social apps

2) Mashups

3) RSS feeds

4) Social bookmarks

Question 7 (1 point)

________ allows users to subscribe to multiple blogs or other digital sources and have the content displayed in a single application.

Question 7 options:

1) AJAX

2) Mashups

3) Social bookmarks

4) RSS technology

Question 8 (1 point)

Marketers monitor social activity in order to identify _______ -- that is, people who repeatedly discuss or promote a particular topic.

Question 8 options:

1) Technical experts

2) Communities

3) Crowds

4) Brand advocates

Question 9 (1 point)

________ allow teams to collaborate on the creation and editing of documents.

Question 9 options:

1) Google Docs

2) Diigo and Delicious

3) Wikis

4) Discussion groups

Question 10 (1 point)

Second Life is a service that makes it possible for users to conduct meetings ________.

Question 10 options:

1) Using mobile devices and collaboration tools

2) Face to face

3) In a 3D artificial reality environment

4) In a virtual world where users are represented by avatars.

Question 11 (1 point)

Technologies used by the retailer Macy's to engage mobile shoppers include all of the following except ________.

Question 11 options:

1) NFC

2) SMS short codes

3) IoT

4) QR codes

Question 12 (1 point)

Customers can pay for products at Macy's using Google Wallet, a mobile payment app. At the register, customers tap their mobile device on a(n) __________ device in order to transfer funds to Macy's.

Question 12 options:

1) ATM

2) EFT

3) NFC

4) PayPal

Question 13 (1 point)

Most retailers still view e-commerce and mobile commerce channels as _________.

Question 13 options:

1) much more profitable and risky than other channels.

2) limited to consumers under 30 years old.

3) their most expensive sales channels.

4) competing with traditional brick-and-mortar stores.

Question 14 (1 point)

An e-wallet is a software application that uses ________ to keep a user's data secure.

Question 14 options:

1) encryption

2) firewalls

3) anti-malware

4) cloud computing

Question 15 (1 point)

Streamlining the corporate e-procurement process within the organization's supply chain helps control costs in all of the following ways except _________.

Question 15 options:

1) reduces the number of employees needed to process purchasing

2) empowers suppliers to negotiate terms of service

3) reduces the procurement cycle time to order and receive items

4) empowers an organization's staff with product information needed to make intelligent decisions when procuring items

Question 16 (1 point)

________ are many-to-many e-marketplaces for indirect materials, such as office supplies, light bulbs, and cleaning materials used by any industry.

Question 16 options:

1) Private exchanges

2) Horizontal exchanges

3) Spot sourcing

4) Vertical exchanges

Question 17 (1 point)

Sending special offers to customers who have opted in to receive discounts via SMS text message or advertising a brand on a popular mobile game app like Angry Birds is an example of mobile __________.

Question 17 options:

1) Sourcing

2) Fulfillment

3) Retailing

4) Marketing

Question 18 (1 point)

The Foursquare app makes use of the mobile device's GPS system to determine the user's location. Foursquare can use this information to target consumers with timely and relevant promotional messages. This is an example of __________ marketing.

Question 18 options:

1) Personal

2) Augmented reality

3) Location-based

4) Relationship

Question 19 (1 point)

As mobile commerce grows, there is a greater demand for _________ that make transactions from smartphones and other mobile devices convenient, safe, and secure.

Question 19 options:

1) Broadband protocols

2) Credit cards

3) Debit cards

4) Payment systems

Question 20 (1 point)

Mobile payment systems employ a range of technologies. Which of the following is not used for mobile payments?

Question 20 options:

1) NFC

2) SMs

3) QR codes

4) Augmented reality

Question 21 (1 point)

Organizations continue to run older business systems, called ________ because they form the core of mission-critical computing systems.

Question 21 options:

1) Reduced-function IT

2) Legacy systems

3) Last gen software

4) Bloat-ware

Question 22 (1 point)

When companies need to update mission critical computing systems, they often turn to ________ which integrate core business process and functions.

Question 22 options:

1) Legacy systems

2) Network solutions

3) Custom built software apps

4) Enterprise systems

Question 23 (1 point)

________ is "Facebook for business."

Question 23 options:

1) Microsoft Cloud

2) Office Graph

3) SharePoint

4) Yammer

Question 24 (1 point)

The latest ERP solutions are designed with a focus on __________.

Question 24 options:

1) client-server architectures and custom-designed apps

2) Web-based architecture and VPNs

3) social collaboration and accessibility from mobile devices

4) manufacturing, distribution, retail, and service

Question 25 (1 point)

Typically, how are ERP systems acquired?

Question 25 options:

1) By purchasing or leasing in a SaaS arrangement

2) By building in-house

3) By building with proprietary software

4) From consulting companies

Question 26 (1 point)

Which of the following descriptions about ERP failures is not true?

Question 26 options:

1) Several of the best companies have suffered devastating consequences from ERP failures that had led to multi-million dollar losses, bankruptcy, or lawsuits.

2) Most often, ERP failures are eventually fixed and remain in use, which gives the false impression that the ERP was successful from the start.

3) The success-as well as failure-of ERP depends on organizational and technological factors that occur prior to, during, and after the implementation.

4) Vendor blogs, white papers, and YouTube posts are good sources of objective data for selecting an ERP solution.

Question 27 (1 point)

________ starts with the acquisition of raw materials or products and proceeds through the disposal or ________of products.

Question 27 options:

1) Procurement; recycling

2) Production; sale

3) Supply chain; recycling

4) Supply cycle; dumping

Question 28 (1 point)

Supply chains involve three main flows. Which of the following is not one of those main flows?

Question 28 options:

1) Payments or financial

2) Resource

3)  Data

4) Material

 

 

Available solutions
  • SUPPLY CHA 563-Users are typically required to acknowledge they
    $22.00

    Question Question 1 (1 point) Users are typically required to acknowledge they have read, understand and agree to the ________ before they are allowed to use the service. Question 1 options: 1) Acceptable Use Policy 2) Intellectual Property Agreement 3) Terms of Service Agreement 4) User Agreement Question 2 (1 point) The most important thing that users can do to protect their privacy and identity on social

    Submitted on: 28 Nov, 2017 02:36:55 This tutorial has not been purchased yet .