Ch 16 & 17 Flashcards

1
Q

Companies use a secure socket layer (SSL) protocol to secure payment information transmitted over the Internet from a consumer to a business.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Spyware is often installed when users download and install freeware on their computers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Total quality management (TQM) relies on a small cadre of quality experts to exert complete control over the organization’s quality assurance efforts.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A strong password is any combination of at least five characters consisting of both letters and numbers and isn’t a common word or name.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PayPal is the best-known cybermediary with approximately 100 million active accounts, just in the U.S. alone.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Inventory consists of the stocks of finished items, works-in-process, parts, materials, or other resources held by an organization.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Southwest Airlines has been very successful at applying lean thinking to its operations.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hardware consists of computer programs that provide instructions to a computer, so that it can perform a desired task.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Because the output of service firms is intangible, they are unable to apply the principles of lean production

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Phishing is a scam where official-looking emails are sent to individuals in an attempt to get them to divulge private information such as passwords, usernames, and account numbers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A data warehouse is a physical storage facility used by management to store and file all hard copies of important documents generated by the business.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Operations managers attempt to use effective and efficient methods to produce the right goods and services in the right quantities and distribute them to the right customers at the right time.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Black hat hackers are hackers who have no harmful intent. Instead they hack into computers simply for the intellectual challenge it involves.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Six Sigma shares some characteristics with TQM, such as an organization-wide focus on quality and a long-term commitment to continuous quality improvement.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Supply chains focus exclusively on coordinating the flow of materials and physical goods. The corresponding flows of information, financial resources, and other services are coordinated by enterprise planning systems that are separate from the supply chain.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An initiative in 2001 allowed members of the 12 consortium to sponsor other research and educational organizations that did not originally qualify for membership, so they would have access to 12 resources.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Many firms have used the Internet to implement very effective viral marketing campaigns that encourage customers and others not employed by the seller to help promote the seller’s products.

A

True

18
Q

The key advantage of RFID technology is that it allows the seller of a product to track and monitor the buyer’s use of the product.

A

False

19
Q

A major reason American businesses outsource operational activities overseas is to take advantage of the low cost of labor and other resources.

A

True

20
Q

To create value effectively, operations managers must find a way to give customers more for their money and still make a profit.

A

True

21
Q

_____ is software installed, often erroneously, on a computer that might log each keystroke in an effort to capture passwords and user names to accounts.

a) Screenware
b) Freeware
c) Spyware
d) Adware

A

c) Spyware

22
Q

_____ is/are reprogrammable machines that can manipulate materials, tools, and parts to perform a variety of tasks.

a) Robots
b) Automation
c) Drones
d) Diverters

A

a) Robots

23
Q

Engineers at every major automobile manufacturer now design new car models using _____ software to create blueprints and three-dimensional drawings.

a) computer-integrated manufacturing
b) computer-aided design
c) flexible manufacturing systems
d) computer-aided manufacturing

A

b) computer-aided design

24
Q

The design of the servicescape should reflect consideration of all of the following factors EXCEPT:

a) functionality
b) symbols and signs
c) ambience
d) management oversight

A

d) management oversight

25
Q

_____ markets have greater numbers of customers each with fewer dollars to spend, while _____ markets enjoy fewer customers with larger amounts of money to spend at one time.

a) B2C; B2B
b) B2B; B2C
c) Online; business
d) Retail; online

A

a) B2C; B2B

26
Q

A data warehouse is

a) a process that uses powerful statistical and mathematical techniques to analyze vast amounts of data.
b) a system that gives managers access to large amounts of data and the processing power to convert the data into high-quality information.
c) organization-wide database providing a centralized location for storing data gathered from sources both internal and external to the organization.
d) the process of going beyond a company’s firewall to store data and run applications.

A

c) organization-wide database providing a centralized location for storing data gathered from sources both internal and external to the organization.

27
Q

_____ are files of related records organized according to logical systems and stored on computer-accessible media.

a) Warehouses
b) Databases
c) Extranets
d) Intranets

A

b) Databases

28
Q

Background music, lighting and the use of scents are all factors of ____________ in servicescape designs.

a) functionality
b) artifacts
c) ambience
d) symbols

A

c) ambience

29
Q

The decision about where to locate a business facility, _______

a) almost always is based on the availability of skilled labor.
b) seldom considers quality of life or legal and political factors because these factors seldom have a noticeable impact on costs of production.
c) usually boils down to where the top manager wants to live.
d) usually requires the analysis of several different factors, but the importance of each factor tends to vary according to the specific type of industry.

A

d) usually requires the analysis of several different factors, but the importance of each factor tends to vary according to the specific type of industry.

30
Q

In operations management, quality is defined in terms of:

a) the ratio of cost to output.
b) how well a product satisfies the preferences of customers.
c) the number of defects per thousand units of output.
d) the Baldrige Quality Index.

A

b) how well a product satisfies the preferences of customers.

31
Q

Microsoft Word 2007, which is used to write memos, letters, and reports, is an example of

a) server software.
b) network software.
c) system software.
d) applications software.

A

d) applications software.

32
Q

The _____ requires senders of unsolicited commercial emails to label their messages as ads and to tell the recipients how to decline future messages.

a) Right to Privacy Act of 2005
b) CAN-SPAM Act of 2003
c) Deceptive Unsolicited Mail Policy (DUMP) Act of 2002
d) STOP-SPAM Act of 2004

A

b) CAN-SPAM Act of 2003

33
Q

_____ refers to the physical components used to collect, store, organize, and process data and to distribute information

a) Hardware
b) Software
c) Intranet
d) Extranet

A

a) Hardware

34
Q

_____ supplement operating system software in ways that increase the security or capabilities of the computer system. Firewalls, antivirus software, spam blockers, and antispyware are all examples of this software.

a) Secondary software systems
b) Applications software packages
c) Linux servers
d) Utility programs

A

d) Utility programs

35
Q

In operations management, _____ refers to completing a task or producing a product at the lowest cost.

a) effectiveness
b) efficiency
c) competence
d) processing

A

b) efficiency

36
Q

Services are:

a) consumed where they are provided.
b) shipped.
c) produced independently of the consumer.
d) stored in an inventory.

A

a) consumed where they are provided.

37
Q

From an operations management perspective, a manufacturing firm’s value chain includes:

a) the flow of materials and finished goods through all firms involved in production and distribution, plus the corresponding flows of services, financial resources, and information.
b) firms connected with the flow of output through the channel to the final customer, particularly those other companies involved with financial transactions.
c) only vendors that supply goods and services in the production of a firm’s product offerings.
d) all and any forms of software or manufacturing technology it uses in its operation.

A

a) the flow of materials and finished goods through all firms involved in production and distribution, plus the corresponding flows of services, financial resources, and information.

38
Q

In recent years, many supply chains have begun using _____ to reduce employee theft.

a) spyware
b) data mining
c) hidden cameras
d) RFID technology

A

d) RFID technology

39
Q

The vital function of _____ involves transforming data into useful information for decision makers.

a) business
b) managing partnerships
c) the information technology department
d) transferring networks

A

c) the information technology department

40
Q

_____ is the marketing strategy of building relationships with customers. It has experienced a tremendous boost due to the growth of the Internet.

a) Customer mining
b) Customer relationship development
c) A cybermediary
d) Customer maintenance

A

b) Customer relationship development