Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

2.All of the following statements about a virtual private network are correct ex

ID: 3575664 • Letter: 2

Question

2.All of the following statements about a virtual private network are correct except:

A. Uses the Internet as its main backbone network

B. Connects the intranets of a company's different locations, or establishes extranet links between a company and its customers, suppliers, and business partners

C. Relies on modem, twisted-pair wire, and router technology

D. Relies on network firewalls, encryption, and other security features to provide a secure network

3. A(n) _______________ architecture illustrates the inter-relationships of the major cross-functional enterprise applications that many companies have, or are installing, today.

A. enterprise application

B. enterprise operation

C. cross-functional

D. none of the choices are correct.

4. Which of the following applications focuses on the efficiency of a firm's internal production, distribution, and financial processes?

A. Customer relationship management

B. Enterprise resource planning

C. Knowledge management

D. Supply chain management

5. Which of the following applications focuses on acquiring and retaining profitable customers via marketing, sales, and service processes?   

A. Customer relationship management

B. Enterprise resource planning

C. Knowledge management

D. Supply chain management

6. Which of the following applications focuses on developing the most efficient and effective sourcing and procurement processes?   

A. Customer relationship management

B. Enterprise resource planning

C. Knowledge management

D. Supply chain management

7. Which of the following applications focuses on tools that support group collaboration and decision support?   

A. Customer relationship management

B. Enterprise resource planning

C. Knowledge management

D. Supply chain management

8. ERP systems can provide vital cross-functional information on business performance to managers in a very timely manner. This describes the key business benefit of:

A. Enterprise agility

B. Decision support

C. Decreased costs

D. Quality and efficiency

9. Authenticating users, authorizing access, and enforcing security features is a component of the e-commerce process called:   

A. Event notification

B. Profiling and personalization

C. Search management

D. Access control and security

10. When a company addresses issues such as authenticating users of their website, authorizing access, and enforcing the security features that protect both consumers and their data, the company is addressing the _______________ component of the e-commerce process.

A. event notification                             B. profiling and personalizing

C. search management                          D. access control and security

11. Which of the following is part of the technology dimension of change management? C

A. Ownership

B. Recruitment

C. Enterprise architecture

D. Change control

Explanation / Answer

2) Answer: C) Relies on modem,twisted_pair wire and router technology

Explanation: it permits the employees to corporate interanet find out of the office or a comopany.applications working on virtual private network is advantageous in functionality,security.

3) Answer: A ) Enterprise application

Explanation it is a huge software system outlined to manipulate in corporate reign like business.it is tough and contains the onlineshopping and resource planning.

4)Answer: B) Knowledge management

Explanation:it is the method of producing and utilizing the knowledge and infomation for a company.it targets on organisational onjectives like innovation and merging of a company .

5)Answer: A) customer resource management

Explanation: the process of handling a company influence through present and future customer that afforts to asess regarding the customer details through the company.

6) Answer: B)enterprise resource planning

Explanation: it is a business management software to permit the organisation to utilize the integrated applications in order to handle the business .it fuses the total manipultions to single data base ,user interface and application.

7)Answer: C)enterprise resource planning

8)Answer: B) Decision support

Explanation: it supports the company decision making activities which is used to scrutinize the business applications hence the user is able to take the decesions in very eay manner.

9) Answer: D)Acess control and security

Explanation:In the areas of physical security and information security this acess control is choosable limitation of acess to a resource. Approval to acess a resource is known as authorisation. there are two tecniques or methods i.e locks and login

10)Answer:D) Acess control and security

11)Answer: C) Enterprise architecture