Bus 174

¡Supera tus tareas y exámenes ahora con Quizwiz!

about PKI are true

-The term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties. -PKI is not effective against insiders who have a legitimate access to corporate systems including customer information.. -The acronym PKI stands for public key infrastructure. NOT TRUE PKI guarantees that the verifying computer of the merchant is secure

characteristics of HTML5

-a video element that replaces plug-ins such as Flash, QuickTime and RealPlayer. -use of CSS3. -ability to access built-in functionality of mobile devices, such as GPS and swiping.

All of the following are key design principles of responsive Web design

-flexible grid-based layouts. -media queries. -flexible images and media.

simple steps for optimizing Web page content that can reduce response times

-reducing unnecessary HTML comments. -using more efficient graphics. -avoiding unnecessary links to other pages on the site.

important factors in Web site optimization

-selecting keywords and page titles. -identifying market niches for your services or products. -buying search engine ads.

An intrusion detection system can perform

-setting off an alarm when suspicious activity is detected. -checking network traffic to see if it matches certain patterns or preconfigured rules. -examining network traffic.

symmetric key cryptography

-symmetric key cryptography is a key element in digital envelopes. -in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message. -the Data Encryption Standard is a symmetric key encryption system. NOT TRUE symmetric key cryptography is computationally slower.

Next generation firewalls provide

-the ability to identify users regardless of the device or IP address -the ability to identify applications regardless of the port, protocol, or security evasion tools used -an application-centric approach to firewall control

major business trends in EC in 2012-13

-the growth of a new app-based online economy. -the expansion of the localization of e-commerce. -the emergence of a new social e-commerce platform.

All of the following are major social trends in e-commerce in 2014-2015

-the impact of social networks on privacy. -the continuing conflict over copyright management and control. -the growth of government surveillance of Internet communications.

All of the following use an advertising revenue model except:

Amazon What are ad revenue model Google Twitter Yahoo

Which one is not a portal

Amazon What are portals Yahoo MSN AOL

All of the following are using a subscription revenue model for e-books except:

Barnes and Noble The ones do use Subscription revenue model Oyster. Scribd. Amazon. Correct Barnes and Noble.

Rustock is an example of which of the following?

Botnet

Ruby on Rails is based on which of the following philosophies?

CoC

Offline media is typically used for all of the following marketing activities except:

Conversation Used for Education branding exposure

The primary way a Web site is able to personalize the content presented to a visitor is through the use of:

Cookies

Your company has just implemented a new, more efficient set of business processes that other firms cannot yet obtain. This will enable your firm to adopt a strategy of:

Cost competition

Over the past decade, the number of exchanges has:

Diminished sharply

W.W. Grainger is an example of which of the following business models?

E-distributor

Competition Environment

Elements of business model relates to the power of customers and suppliers with respect to a business

features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?

Global Reach

Which of the following is an example of local e-commerce?

Groupon

All of the following experienced high-profile data breaches in 2013

Home Depot. Evernote. Adobe.

what is true

In 2012, apps accounted for a small but growing amount of e-commerce revenues. E-books today account for about half of all book sales. Computing and networking component prices are continuing to fall dramatically.

Which of the following statements about client/server computing is true?

It connects multiple powerful personal computers together in one network with one or more servers dedicated to common functions that they all need.

Which of the following statements about fiber-optic cable is not true?

It consists of twelve or sixteen strands of glass. What is true It is thinner and lighter than coaxial or twisted pair cable. It enables better data security than coaxial cable. There are thousands of miles of installed fiber-optic cable in the United States that are not being used.

The overall rate of online credit card fraud is ________ % of all online card transactions.

Less than 1

Which of the following describes the basic Web policy of large firms during the Invention period?

Maintain a basic, static Web site depicting the firm's brand.

drive-by download.

Malware that comes with a downloaded file that a user requests

Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship?

Mobile e-commerce

The first Web browser to make it possible to view documents on the Web with colored background, images, and animations was:

Mosaic.

Which of the following was NOT able to successfully implement a freemium business model?

Ning What are able to successfully implement a freemium business model -dropbox -linkedin -pandora

xsxssss Which of the following statements is true?

No one academic perspective dominates research about e-commerce. There are two primary approaches to e-commerce: behavioral and technical. Management scientists are interested in e-commerce as an opportunity to study how business firms can exploit the Internet to achieve more efficient business operations.

In general, the key to becoming a successful content provider is to:

Own the content being provided

Which of the following is the most commonly used server-side scripting language

PHP

All of the following are business models employed by the music industry except:

Peer to peer streaming Business models employed by music industry -subscription. -cloud streaming. -download-and-own.

Characteristic of a perfect competitive market

Price, cost, and quality information are equally distributed. A nearly infinite set of suppliers compete against one another. Customers have access to all relevant information worldwide

Which of the following is not a community provider?

Priceline What are community provider -Pinterest -LinkedIn -Facebook

Django is based on

Python

The integration of video, audio, and text marketing messages into a single marketing message and consuming experience is an example of:

Richness

which protocols is used to send mail to a server

SMTP

Portals primarily generate revenue in all of the following ways except:

Sales of goods Do do have -charging advertisers for ad placement. -collecting transaction fees. -charging subscription fees.

Amazon's primary value propositions

Selection and Convenience

what is true

Social e-commerce is currently the largest type of e-commerce. The emergence of entrepreneurial social and local firms is one of the hallmarks of the Consolidation period of e-commerce. The fact that e-commerce is conducted on the basis of universal standards increases market entry costs for merchants.

Which of the following statements is true?

Tablet computers rely on the Internet cloud for processing and storage

Advertising Revenue Model's important attribute

The ability to retain user attention and engagement

best definition of a transaction cost

The cost of participating in a market

Middleware Services layer.

The layer of Internet architecture that ties the applications to the communications network and includes such services as security and authentication

what are the examples of a social network

Twitter Pinterest tumbler Uber is NOT

The major technologies used with wireless local area networks are:

Wifi and Bluetooth

part of a Web site's middle-tier layer

a database server. an ad server. a mail server.

In 2013, the Target retail chain experienced

a large-scale data breach

basic functionality provided by e-commerce merchant server software

a shopping cart. credit card processing. a product catalog.

nonrepudiation

ability to ensure that e-commerce participants do not deny their online actions.

The Internet Layer of TCP/IP is responsible for which of the following?

addressing, packaging, and routing messages

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:

an authorization management system.

Proxy Server

application server monitors and controls access to a main Web server and implements firewall protection

Which of the following dimensions of e-commerce security is not provided for by encryption?

availability What are provided for by encryption -message integrity -nonrepudiation -confidentiality

methods of securing channels of communication

certificates. SSL/TLS. VPN.

Privacy is sometimes confused with:

confidentiality

Which system functionality must your Web site have in order to be able to personalize or customize a product for a client?

customer on-site tracking

All of the following are basic functionality provided by Web servers

data capture tools. site management tools. security services. Shopping Cart is NOT

The cost of hardware, software, and telecommunications services needed to build a Web site have ________ over the last decade.

decreased dramatically

Example of the subscription revenue model

eHarmony

Most of the time required to maintain an e-commerce site is spent on:

general administration and making changes and enhancements to the system.

Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as:

incubators.

Which of the following is one of the three primary societal issues related to e-commerce?

individual privacy

Which of the following is a unique feature of e-commerce technology?

interactivity social technology richness

JavaScript

is a programming language invented by Netscape used to control the objects on an HTML page and handle interactions with the browser.

Advantages of dynamic page generation include

lowered menu costs. nearly cost-free price discrimination. market segmentation.

In the United States, the primary form of online payment is:

paypal

Authenticity

refers to the ability to identify the person or entity with whom you are dealing on the Internet.

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail

spyware

Above all, e-commerce is a ________ phenomenon.

technology-driven

Site management Tools

use to verify that links on Web pages are valid

Acceptance testing

verifies that the business objectives of the system as originally conceived are in fact working.

Which of the following is a Web 2.0 service or application?

wikis


Conjuntos de estudio relacionados

Module 1 (Unit C): Cultural Considerations and Therapeutic Communication

View Set

A & P Chapter 16: Nervous System: Senses

View Set

final antepartum review ob 2020 fall

View Set

The Five Characteristics of Life

View Set