Which of the following is not an example of a next-generation enterprise application?
A) Openbravo
B) Social CRM
C) SAP Business Suite
D) Salesforce.com
E) i2 Technologies
Q. 2Specific security challenges that threaten clients in a client/server environment include:
A) tapping, sniffing, message alteration, and radiation.
B) hacking, vandalism, and denial of service attacks.
C) theft, copying, alteration of data, and hardware or software failure.
D) unauthorized access, errors, and spyware.
E) vandalism, message alteration, and errors.
Q. 3The representation of data in a graphical format is called data mining.
Indicate whether the statement is true or false
Q. 4Look and feel copyright infringement lawsuits are concerned with:
A) the distinction between tangible and intangible ideas.
B) the distinction between an idea and its expression.
C) using the graphical elements of another product.
D) using the creative elements of another product.
E) violation of a monopoly on the ideas behind a product.
Q. 5Genetic algorithms:
A) represent knowledge as groups of characteristics.
B) are software programs that work in the background to carry out specific, repetitive tasks.
C) develop solutions to particular problems using techniques such as mutation, crossover, and selection.
D) learn patterns from large quantities of data by sifting through data.
E) have a large number of sensing and processing nodes that continuously interact with each other.
Q. 6Specific security challenges that threaten the communications lines in a client/server environment include:
A) tapping, sniffing, message alteration, and radiation.
B) hacking, vandalism, and denial of service attacks.
C) theft, copying, alteration of data, and hardware or software failure.
D) unauthorized access, errors, and spyware.
E) errors, vandalism, and malware.