Exam
Name___________________________________
TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false.
1)
Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
1)
_______
2)
Viruses can be spread through e-mail.
2)
_______
3)
Public key encryption uses two keys.
3)
_______
4)
Packet filtering catches most types of network attacks.
4)
_______
5)
Biometric authentication is the use of physical characteristics such as retinal images to provide identification.
5)
_______
6)
Enterprise systems use a client/server architecture and have not yet been redesigned to take advantage of the Web.
6)
_______
7)
Low inventory acts a buffer for the lack of flexibility in the supply chain.
7)
_______
8)
Total supply chain costs represent the majority of operating expenses for many businesses and in some industries approach 75 percent of the total operating budget.
8)
_______
9)
All CRM packages contain modules for PRM and ERM.
9)
_______
10)
Enterprise systems require fundamental changes in the way the business operates.
10)
______
11)
The Internet shrinks information asymmetry.
11)
______
12)
In general, for digital goods, the marginal cost of producing another unit is about zero.
12)
______
13)
Web sites cannot currently provide customers with call center interaction.
13)
______
14)
Accumulated balance digital payment systems allow consumers to make instant online payments to merchants and other individuals based on conventional credit card payments.
14)
______
15)
Direct goods are not directly involved in the