DOC PREVIEW
MSU HB 337 - Practice Exam

This preview shows page 1-2 out of 6 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

1. _____ replaces credit card data with a surrogate value, which is then passed along during a transaction. A) Point to point encryption B) Tokenization C) EMV chip D) Host card emulation B 2. Modifier keys include _ A) Price modifier and non-price modifier B) Item modifier and settlement modifier C) Price modifier and function modifier D) Item modifier and function modifier A 3. Crawler is the software that keeps track of customer preferences. A) True B) False B 4. Slip printers print guest receipts A) True B) False A 5. CTR = ___ A) Number of clicks/Number of sales generated B) Total cost paid to the search engine.Number of sales generated C) Number of clicks/Number of impressions D) Total cost paid to the search engine/ Number of impressions C 6. Meta Tag is a summary of a website;s description and keywords read by spiders. It will not be displayed on the webpage. A) True B) False A 7. Menu management systems can keep track of all call-in and walk-in reservations and project the waiting time based upon information such as the current table status A)True B) False8. Based on the Pavesic model, the best menu items are the ones with the lowest food cost and the highest contribution margin A) True B) False B 9. Based on the reference group model, which of the following is NOT a subcategory of out group? A) Aspiration group B) Dissociative group C) General out group D) Membership group 10. The main characteristics of Big Data are:____ A) Observational, lacking controls, seemingly complete, adapted, merged B) Observational, lacking controls, complete, adapted, merged C) Organized, lacking controls, seemingly complete, adapted, merged D) Organized, lacking controls, complete, adapted, merged A 11. The first 6 digits of a credit card number are known as ___ A) FIN B) PIN C) IIN D) DIN C 12. ___ allows for data exchange between two devices through physical contact or in a very close proximity. A) VR B) NFC C) EMV D) LBS B 13. For most POS systems, it takes 10 to 20 keystrokes to process a typical guest check. The speed at which these keystrokes are executed primarily depends on the responsiveness of the _____ and _____. A) Terminal & database B) Server & Network C) Terminal & Server D) Database & NetworkC 14. When the concept of POS originally began, restaurants used standalone devices called A) ECR B) Master-slave C) Processor D) HHT A 15. Flat programmable keyboards require typed menu boards to overlay the keyboard surface for identifying the function of each key. Restaurants with frequent menu changes would find this type of keyboard easier to manage than touch screens A) True B) False B 16. Structured data comes in a defined form and offers clear answers. A) True B) False A 17. As discussed in class, which of the following is not a main benefit of POS? A) Eliminating arithmetic errors B) Improving guest check control C) Allowing faster reaction to trends D) Improving website design D 18. Which of the following is a common type of keyboard in our industry? A) Grid B) 101 Qwerty C) Projection keyboards D) Reed Style B 19. We use PLU keys to find food items by entering the code that is associated with the item (e.g. a four digit code) A) True B) False A 20. Which of the following is NOT considered as Black Hat CEO? A) Keyword stuffingB) Cloaking C) Indexable content D)Link farmsC 21. Mobile apps used to be preloaded through ___ deals or downloaded from the mobile carrier portals. A) OEM (original equipment manufacturer) B) OCM (original component manufacturer) C) OHM (Original hardware manufacturer) D) None of the above A 22. The difference between a precheck terminal and a cashier terminal is whether there is a keyboard or not A) True B) False 23. Which of the following is NOT a main function of table management systems? A) Food delivery management B) Reservation processing C) Wait list management D) Restaurant-wide communication A Reservation processing, wait list management, restaurant-wide communication all are main functions 24. ___ is the second step in processing a credit card. At the end of the day, the merchant reviews all the sales to ensure they were authorized and signed by the cardholders. It then transmits all the sales to the acquirer. A)Authorization B) Batching C) Clearing D) Funding B 25. ___ refers to intelligent systems with the ability to think and learn. A) VR B) DBMS C) Big Data D) AID 26. Bandwagon effect is the tendency to search for, interpret, favor and recall information in a way that confirms one;'s preexisting beliefs or hypotheses. A) True B) False B 27. Which of the following is NOT a dimension of the BSC approach for website evaluation? A) Technical B) marketing C) Internal D)Financial D 28. An issuing bank is a financial institution that issues credit cards to cardholders, bill cardholders for repayment, and assumes the risks of fraud and nonpayment. A) True B) False B 29. A ___ is a list of pages of a website accessible to users to increase ___, typically organized hierarchical fashion. A) Sitemap, navigability B) Sitemap, connectivity C) SEO, connectivity D) SEO, navigativity 30. Compared to desktop computers, which of the following is NOT a main characteristic of mobile devices? A) Ubiquitous availability B) Personal usage C) Interactivity D) Productivity D 31. You're the manager of a club, and you want to develop learning algorithms to address each of two problems: Problem 1: You want to predict how much time is left before the next failure of your HVAC system.Problem 2: You 'd like software to examine individual customer accounts, and for each account decide if it has been hacked/compromised or not. Should you treat these as classification or regression problems? A) Treat both as classification problems B) treat problem 1 as a classification problem, problem 2 as a regression problem. C) Treat problem 1 as a regression problem, problem 2 as a classification problem. D) Treat both as regression problems. PART II. Short answer Three hotels are bidding for the top three positions. Their maximum bids and QS scores as shown below. PLease calculate each hotel's actual


View Full Document

MSU HB 337 - Practice Exam

Download Practice Exam
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Practice Exam and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Practice Exam 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?