Key escrow refers to the practice of ________.
A) keeping a copy of the encryption key with a trusted party
B) creating a public key and a private key
C) allowing all employees to share a private key
D) including multiple characters and symbols in an encryption key
Q. 2The temp agency that you own is having serious difficulties placing temps because few of them are familiar with Internet research.
Investing in training software to enhance your workers' skills is an example of using technology to achieve which business objective?A) customer and supplier intimacy
B) survival
C) operational excellence
D) improved decision making
E) new products and services
Q. 3In which of the following approaches for integrating ERP modules does the vendor provide middleware to connect systems that may be running on different platforms?
A) best-of-breed suite
B) engineered suite
C) suite with synchronized modules
D) global positioning system
Q. 4Which of the following features is most likely an example of the usability requirements included in an RDD?
A) complex navigation
B) high task efficiency
C) bright, flashy graphics
D) high accessibility for people with disabilities
Q. 5A representation of an entity in a meaningful way, which includes the attributes of the entity, is called a ________.
A) field
B) primary key
C) data definition
D) record
Q. 6Which of the following is true of neural networks?
A) They imitate service robots using neural networks.
B) They aim to achieve higher productivity by imitating robots in domestic operations.
C) They borrow a human's approach by using neural signals instead of digital ones.
D) They work the same way as the human brain by reinforcing memory.
Q. 7The ecosystem in which a company is embedded is a(n) ________.
A) natural community that is restricted to the members of its value chain
B) economic community that includes related industries
C) community focused entirely on the immediate competitors of a company
D) community constituted by markets that are not related to the company