1、1.A(n) token is a physical device similar to an identification card that is designed to prove the identity of a single user. Difficulty: EasyReference: p. 363 2.Biometric authentication is based on the measurement of a physical or behavioral trait that makes each individual unique. Difficulty: EasyReference: p. 363 3.Packet filtering examines selected fields in the headers of data packets flowing back and forth between the trusted network and the Internet, examining individual packets in isolati
2、on. Difficulty: EasyReference: p. 364 4.A(n) intrusion detection system monitors the most vulnerable points in the network to detect and deter unauthorized users. Difficulty: MediumReference: p. 364 5.Antivirus software is designed to detect, and often eliminate, rogue software programs from an information system. Difficulty: EasyReference: p. 364 6.A(n) encrypted message is coded and scrambled to prevent it being read or accessed without authorization. Difficulty: EasyReference: p. 365 7.A(n) d
3、igital certificate is an attachment to an electronic message to verify the identity of the sender and to provide the receiver with the means to encode a reply. Difficulty: EasyReference: p. 366 8.A(n) walkthrough is the review of software specification or design documents by a small group of people carefully selected based on the skills needed for the particular objectives being tested. Difficulty: MediumReference: p. 367 9.Debugging is the process of discovering and eliminating the errors and d
4、efects in program code. Difficulty: EasyReference: p. 367 10.Enterprise resource planning (ERO) systems are based on a suite of integrated software modules and a common central database. Difficulty: MediumReference: p. 380 11.Enterprise software consists of a set of interdependent software modules that support basic internal business processes for finance and accounting, human resources, manufacturing and production, and sales and marketing. Difficulty: MediumReference: p. 380 12.Best practices
5、are the most successful solutions or problem-solving methods for consistently and effectively achieving a business objective. Difficulty: EasyReference: p. 381 13.SAP, Oracle, PeopleSoft and Baan are all vendors of enterprise software packages. Difficulty: MediumReference: p. 383 14.An enterprise-enabled organization does business the same way worldwide. Difficulty: MediumReference: p. 383 15.Supply chain management is the close linkage and coordination of activities involved in buying, making,
6、and moving a product. Difficulty: MediumReference: p. 385 16.The supply chain is a network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers. Difficulty: MediumReference: p. 385 17.The upstream portion of the supply chain includes the organizations suppliers and their suppliers and the process of managing relationships with them. Difficulty: HardReference:
7、p. 386 18.The downstream portion of the supply chain consists of the organizations and processes for distributing and delivering products to the final customers. Difficulty: MediumReference: p. 386 19.In the supply chain process, planning consists of processes that balance aggregate demand and supply to develop a course of action to meet sourcing, production, and delivery requirements. Difficulty: EasyReference: p. 386 20.In the supply chain process, sourcing consists of processes that procure g
8、oods and services needed to create a specific product or service. Difficulty: EasyReference: p. 386 21.In the supply chain process, making consists of processes that transform a product into a finished state to meet planned or actual demand. Difficulty: EasyReference: p. 386 22.SCOR identifies five major supply chain processes: plan, source, make, deliver, and return. Difficulty: MediumReference: p. 386 23.In the supply chain process, delivering consists of processes that provide finished goods
9、and services to meet actual or planned demand, including order management, transportation management, and distribution management. Difficulty: EasyReference: p. 387 24.Inefficiencies in the supply chain are caused by inaccurate or untimely information. Difficulty: MediumReference: p. 387 25.In the supply chain process, returning consists of processes associated with returning products or receiving returned products, including postdelivery customer support. Difficulty: EasyReference: p. 387 26.Logistics deals with the planning and control of all factors that will have an impact on transporting the correct product or service to where it is needed on time and at the least cost. Difficulty: MediumReference: p. 387 27.If a manufacturer had perfect information about exactly how many units of product customers wanted, when they wanted them, and when they could be produced, it would be possible to implement a highly efficient just-in-time strategy. Difficulty: Har
《管理信息系统填空2》由会员ji****n分享,可在线阅读,更多相关《管理信息系统填空2》请在金锄头文库上搜索。