4720 Exam 1
A template test is a form of which type of testing?
A/B testing
During which period of time did the Institutionalization phase of Internet development take place?
1975-1995
An IPv4 address is expressed as a:
32-bit number that appears as a series of four separate numbers separated by periods.
Beebone is an example of which of the following?
Botnet
Which of the following verifies that the business objectives of the system are in fact working?
acceptance testing
The Internet Layer of TCP/IP is responsible for which of the following?
addressing, packaging, and routine messages
Confidentiality is sometimes confused with:
privacy
All of the following can be considered a direct competitor of Priceline except:
ESPN
Which of the following is not an example of a potentially unwanted program (PUP)?
drive-by download
Which of the following gives a business model the most credibility with outside investors?
the firm's management team
Analysts estimate that by 2024, consumers will be spending around ________ in digital transactions.
$1.8 trillion
Which of the following did the Internet Advertising Bureau urge advertisers to abandon?
Adobe Flash
Which of the following uses a subscription revenue model for books?
Amazon Kindle Unlimited
Which of the following is an example of e-business?
Amazon's inventory control system
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
Which of the following uses a subscription-based sales revenue model?
Dollar Shave Club
Which of the following companies uses a transaction fee revenue model?
E*Trade
Which of the following is not an advantage of client/server computing over centralized mainframe computing?
Each client added to the network increases the network's overall capacity and transmission speeds.
Which of the following is not one of the basic technological foundations of the Internet?
FTP
A multi-tier architecture includes a web and database server.
False
Exploit kits can be purchased by users to protect their computers from malware.
False
Phishing attacks rely on browser parasites.
False
The Internet has shown similar growth patterns as other electronic technologies of the past.
False
The term e-commerce refers to the digital enabling of business processes both inside and outside the firm.
False
Which of the following is not a basic type of cloud computing service?
FiOS
________ typically attack governments, organizations, and sometimes individuals for political purposes.
Hacktivists
________ is defined by a company using its competitive advantage to gain in surrounding markets.
Leverage
Why is it difficult to accurately estimate the actual amount of cybercrime?
Many companies don't want to report crime due to fear of losing their customer's trust.
Which of the following is an example of the affiliate revenue model?
MyPoints
Which of the following has not been the subject of concern about its increasing market dominance in 2020-2021?
Netflix
________ is the ability to ensure that e-commerce participants do not deny their online actions.
Nonrepudiation
________ is a utility program that allows you to check the connection between your client and a TCP/IP network.
Ping
All of the following can be considered a direct or indirect competitor of Amazon except:
Priceline
Which of the following is not a major business trend in e-commerce in 2020-2021?
Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.
Which of the following protocols is used to send mail to a server?
SMTP
Which of the following is a simple but powerful method for describing a firm's strengths and weaknesses?
SWOT analysis
The concept of a "sprint" is related to which of the following development methodologies?
Scrum
Which of the following is not an example of malicious code?
Sniffer
All of the following statements about e-commerce in the United States in 2020 are true except:
Social e-commerce generated more revenue than mobile e-commerce.
Which of the following types of attacks enabled hackers to take control of the Twitter accounts of dozens of America's most prominent political, entertainment and technology leaders?
Social engineering
Which of the following was designed to cripple Iranian nuclear centrifuges?
Stuxnet
________ are the types of information systems capabilities needed to meet business objectives.
System functionalities
Which of the following is the core communications protocol for the Internet?
TCP/IP
Which of the following is rarely used today, due to security concerns.
Telnet
Which of the following statements about Foursquare is not true?
The growth in Foursquare's revenue has been driven primarily by significant increases in the numbers of users of its Swarm app.
Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.
True
Using prebuilt templates is typically one of the most inexpensive options when building an e-commerce site.
True
WannaCry is an example of ransomware.
True
All of the following can be considered examples of the market creator business model except:
Which of the following does not use a subscription revenue model?
The process of comparing a website with that of its competitors in terms of response speed, quality of layout, and design is known as:
benchmarking.
According to Ponemon Institute's 2019 survey, which of the following was not among the causes of the costliest cybercrimes?
botnets
Which of the following is an unfair competitive advantage?
brand name
Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture?
client/server computing
Accessing data without authorization on Dropbox is an example of a:
cloud security issue.
Which element of the business model refers to the presence of substitute products in the market?
competitive environment
All of the following are basic information requirements for a product database except:
customer ID numbers.
Which system functionality must your website have to be able to personalize or customize a product for a client?
customer on-site tracking
________ is the ability to identify the person or entity with whom you are dealing on the Internet.
Authenticity
________ is the ability to ensure that an e-commerce site continues to function as intended.
Availability
Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet?
BGP
The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade.
decreased dramatically
What are the two most important management challenges in building a successful e-commerce presence?
developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives
Which of the following basic system functionalities is used to display goods on a website?
digital catalog
Which of the following can be considered synonymous with the term e-commerce?
digital commerce
Which of the following best defines e-commerce?
digitally enabled commercial transactions between and among organizations and individuals
The ________ allows a natural language expression, such as Google.com to represent a numeric IP address.
domain name system
All of the following may lead to a competitive advantage except:
fewer products.
Which of the following is another name for a revenue model?
financial model
Which of the following involves a company giving away a certain level of product or service without charge, but then charging a fee for premium levels of the product or service?
freemium strategy
Most of the time required to maintain an e-commerce site is spent on:
general administration and making changes and enhancements to the system.
Which of the following is the leading cause of data breaches?
hackers
Organizations that typically provide an array of services to startup companies along with a small amount of funding are referred to as:
incubators
Which of the following is not a unique feature of e-commerce technology?
information asymmetry
Which dimensions of security is spoofing a threat to?
integrity and authenticity
Which of the following is not a key element of an elevator pitch?
legal structure
Which of the following typically includes a data flow diagram to describe the flow of information for an e-commerce site?
logical design
Which of the following are the two main components of a systems design?
logical design and physical design
A ________ specifically details how you plan to find customers and to sell your product.
market strategy
The cost incurred by merchants to change product prices (i.e., the costs of reentering prices into computer systems) is referred to as:
menu costs.
Which form of testing compares a control page with one that is very different?
new concept test
Which of the following helps you engage your customers in a conversation?
on-site blog
Which of the following is not one of the basic business objectives for an e-commerce site?
optimize system architecture
The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:
packet switching.
Automatically redirecting a web link to a different address is an example of which of the following?
pharming
Which of the following details the actual hardware components to be used in a system?
physical design
Which of the following is a set of rules for transferring data?
protocol
The Transport Layer of TCP/IP is responsible for which of the following?
providing communication with the application by acknowledging and sequencing the packets to and from the application
A firm's ________ describes how a firm will produce a superior return on invested capital.
revenue model
Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text?
richness
Which of the following are central directories that list all domain names currently in use for specific domains?
root servers
Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations?
routers
All of the following are simple steps for optimizing web page content except:
segmenting computer servers to perform dedicated functions.
Which of the following are Amazon's primary value propositions?
selection and convenience
Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?
social media
Which of the following features of e-commerce technology allows users to participate in the creation of online content?
social technology
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
spyware
In order from beginning to end, the major steps in the SDLC are:
systems analysis/planning; systems design; building the system; testing; and implementation.
Which of the following was the original "killer app" that made the Internet commercially interesting and extraordinarily popular?
the Web
Which of the following is the best definition of transaction cost?
the cost of participating in a market
Interactivity in the context of e-commerce provides which of the following functionalities?
the enabling of two-way communication between consumer and merchant
What is the most frequent cause of stolen credit cards and card information today?
the hacking and looting of corporate servers storing credit card information
The existence of many competitors in any one market segment may indicate:
the market is saturated.
First movers often fail because:
they lack complementary resources needed to sustain their advantages.
Which of the following was the original purpose of the Internet?
to link large mainframe computers on different college campuses
Malware that comes with a downloaded file requested by a user is called a:
trojan horse
Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders?
two-tier architecture
Which of the following involves testing a site's program modules one at a time?
unit testing
Which element of the business model addresses what a firm provides that other firms do not and cannot?
value proposition
Which type of investor typically becomes interested in a startup company after it has begun generating revenue?
venture capital investors
Which of the following is the preferred method of implementing a service-oriented architecture?
web services
Which of the following involves creating a skeleton version that focuses on functionality rather than design?
wireframing
Which of the following is an example of an online privacy violation?
your online purchasing history being sold to other merchants without your consent
Which of the following technologies is aimed at reducing e-mail address spoofing and phishing?
DMARC
Which of the following is not a key factor for establishing e-commerce security?
Data integrity
In general, the annual system maintenance cost will roughly parallel the development cost.
True
A drive-by download is malware that comes with a downloaded file that a user intentionally or unintentionally requests.
True
It is likely that e-commerce will eventually impact nearly all commerce.
True
Microservices are a very granular implementation of SOA.
True
Scrum is a type of agile development
True
In 2019, there were more than ________ Internet hosts worldwide.
1 billion
The world's online population was estimated to be around ________ in 2020.
4 billion
When using multivariate testing, if you wish to test three elements, such as an image, a button, and a piece of text, each with two different versions, how many combinations will you need to test?
8
Which of the following statements about cloud computing is not true?
A public cloud is typically used by companies with stringent privacy and security requirements.
Which of the following statements about data breaches in 2019 is not true?
According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.
Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.
True
E-commerce and e-business systems blur together at the business firm boundary, where internal business systems link up with suppliers or customers.
True
FREAK is an example of a software vulnerability.
True
________ is the ability to ensure that messages and data are only available to those authorized to view them.
Confidentiality
Which of the following is a brute force attack which hackers launch via botnets and automated tools using known user name and password combinations?
Credential stuffing
The attack against Dyn servers is an example of a(n):
DDoS attack.
Which of the following is a utility program that allows you to track the path of a message sent from a client computer to a remote computer on the Internet?
Tracert
A Trojan horse appears to be benign, but then does something other than expected.
True
________ and ________ are typically the most easily identifiable aspects of a company's business model.
Value proposition; revenue model
Conficker is an example of a
Worm
The address used by a browser to identify the location of content on the Web is called:
a Uniform Resource Locator.
Stickiness is an important attribute for which of the following revenue models?
advertising revenue model
A wealthy individual who invests personal funds in a startup in exchange for an equity share in the business is referred to as a(n):
angel investor.