According to the case study on Unilever, over a ten-year period, Unilever reduced the number of ERP systems it had from ________ to ________.
A) 1000; 100
B) 500; 50
C) 250; 25
D) 250; 4
E) 100; 10
Q. 2All of the following are technical solutions to protecting user privacy except:
A) email encryption.
B) anonymous surfing.
C) anonymous email.
D) preventing client computers from accepting cookies.
E) data use policies.
Q. 3The smallest unit of data a computer can handle is called a:
A) file.
B) record.
C) field.
D) byte.
E) bit.
Q. 4Which of the following types of systems could be used to enable different firms to work collaboratively on a product?
A) Intranet
B) Extranet
C) KMS
D) CRM
E) DSS
Q. 5Multidimensional OLAP (MOLAP) tools use variations of SQL and view the database as a relational database, in either a star schema or other normalized or denormalized set of tables.
Indicate whether the statement is true or false
Q. 6Relational database systems use ________ to ensure that relationships between coupled tables remain consistent.
A) intersection relations
B) one-to-one ordering
C) entity-relationship diagrams
D) foreign keys
E) referential integrity rules
Q. 7Which of the following statements about wireless security is not true?
A) SSIDs are broadcast multiple times and can be picked up fairly easily by sniffer programs.
B) Radio frequency bands are easy to scan.
C) An intruder who has associated with an access point by using the correct SSID is capable of accessing other resources on the network.
D) Intruders can force a user's NIC to associate with a rogue access point.
E) Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.
Q. 8Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?
A) Copyright
B) Patent
C) All forms of intellectual property protection
D) Trademark
E) Trade secret