34. There are several basic strategies for business uses of information technology. What is an appropriate use of information technology (IT) if a company wants to develop a competitive innovation strategy?
A. Using IT to diversify and integrate into other products
B. Using IT to develop a unique new market
C. Using IT to reduce the cost of business processes
D. Using IT to focus products at a selected market niche
35. A large retail business whose primary customers are the end-users of their products wants to reach international customers with their products and services. How could this business use Internet technologies to create the greatest strategic advantage?
A. Develop an Internet tracking system to determine how many international customers are interested in their products.
B. Open sales offices in foreign countries that are connected to the corporate intranet to do in-person marketing.
C. Implement an e-commerce solution and use Web sites for promoting the sales of products and services with interactive service and support.
D. Do market research in foreign countries and send e-mail to potential customers in target markets.
36. A company completes employee performance reviews once per year and relies on management to give each employee a fair and accurate appraisal. The company has implemented a new enterprise system that has a human resource (HR) module. By re-engineering the employee performance processes, how should the company most effectively use the new HR module?
A. To capture performance reviews online and store for future management review
B. To track performance goals, measure employee performance, and provide quarterly results against goals
C. To collect employee satisfaction metrics and provide aggregate reports to management
D. To enable employees to review prior performance appraisals online and print them as needed
37. How can creating a virtual company provide a company with competitive advantage?
A. By studying in detail the information needs of users within the company and developing products to address those needs.
B. By ensuring the accuracy, integrity and safety of business activities and resources.
C. By establishing rigid structures that create stable, long term relationships between customers and suppliers.
D. By creating flexible and adaptable alliances and exploiting fast-changing business opportunities.
38. How does establishing a Knowledge Management System provide a competitive advantage for a company?
A. It helps re-engineer a company’s business processes.
B. It reduces the amount of change in the marketplace.
C. It streamlines administrative reporting.
D. It helps with innovation resulting in high quality products.
39.
How does establishing a Knowledge Management System provide a competitive advantage for a company?
A. It helps re-engineer a company’s business processes.
B. It reduces the amount of change in the marketplace.
C. It streamlines administrative reporting.
D. It helps with innovation resulting in high quality products.
40. A hacker creates hidden ways to access a network in case the original entry point is discovered. Which type of security risk is this?
A. Logic Bomb
B. Back Door
C. Sniffing
D. Dumpster Diving
41. What would be used to defend against Denial of Service attacks?
A. Use encryption software to protect data that resides on company servers as well as information transmitted over the Internet.
B. Deploy biometric security so access to crucial data servers is limited to only those who need access.
C. Purchase and install adware scanning software on all company computers and update software periodically.
D. Have backup web servers with multiple routers that limit connections to each server.
42. Which security measure would defeat a potential Internet-based attack to a company’s computer system?
A. Creating backup files using child, parent, and grandfather file types
B. Ensuring that all application systems have a Graphical User Interface (GUI)
C. Developing a Disaster Recovery Plan
D. Instituting a policy to limit access to databases by Database Administrators
43. Which type of system would provide the most effective disaster recovery method for a hospital’s patient information system?
A. Backup Code System
B. Biometric Security System
C. Computer Controls System
D. Fault Tolerant System
AMAZING!Here: http://yisi.info/172851/highest-quality-products