ecommerce exam 2
What percentage of world wide e-mail was spam (according to our text)? A. 60% B. 75% C. 80% D. 95%
A. 60%
The list of capabilities you want your site to have= A. Business objectives B. System functionalities C. Information requriements D. Systems design
A. Business objectives
Which of the following is a primary tool to help companies customize customer experiences? A. Cookies B. Open source applications C. Web server applications D. Malware
A. Cookies
When contents are stored in a database and fetched when needed, this process is called: A. Dynamic page generation B. Static page generation C. Flash page generation D. Instant page generation
A. Dynamic page generation
Which security factor is concerned with whether or not information has been altered? A. Integrity B. Nonrepudiation C. Confidentiality D. Privacy
A. Integrity
An integrated environment which includes basic e-commerce functionality (e-commerce in a box)= A. Merchant server software B. Point and click e-commerce C. Open source software D. E-commerce software
A. Merchant server software
Which of the following is an example of an online stored value system? A. PayPal B. Google Wallet C. Amazon Payments D. Apple Pay
A. PayPal
Simple, small business websites typically cost _______ to develop. A. Up to $5000 B. Up to $10,000 C. Up to $25,000 D. $100,000 or more
A. Up to $5000
What are the two biggest reasons people buy online? A. Utility and trust B. Utility and convenience C. Price and convenience D. Selection and price
A. Utility and trust
How many keys are involved in basic public key cryptography? A. 1 B. 2 C. 3 D. 4
B. 2
What percentage of internet users shop online? A. 50% B. 90% C. 65% D. 74%
B. 90%
Google's Doubleclick is an example of: A. Social search B. Advertising network C. Native advertising D. Sponsorship
B. Advertising network
The highest profile cyber crime is the theft of: A. Social security numbers B. Credit card numbers C. Bank account numbers D. None of the above
B. Credit card numbers
From a general sense, which is the most important factor affecting the speed of an e-commerce site? A. Bandwidth B. Customer demand C. Tiers D. Dynamic page generation
B. Customer demand
If I link hundreds of cell phones together to bombard a website with requests in the hopes of taking the site down, it is called: A. Worm attack B. DOS attack C. Spoofing attack D. Pharming attack
B. DOS attack
Placing a symmetric session key and a public key into an encrypted "package" to increase security and reduce bandwidth use is called: A. Public key cryptography with digital signatures B. Digital envelopes C. SSL D. PKI
B. Digital envelopes
Tammy decides to pay a company for webspace for her e-commerce site. What method is she using? A. Outsourcing B. Hosting C. Co-location D. Insourcing
B. Hosting
Cultural, social, and psychological factors are known as _________variables. A. Dependent variables B. Independent demographic variables C. Intervening variables D. Variable variables
B. Independent demographic variables
Marketing to populations who seek unique, extremely hard-to-find items is called: A. Niche marketing B. Long tail marketing C. Lead generation marketing D. Freak marketing
B. Long tail marketing
Which of the following is NOT a key decision area for building your e-commerce presence? A. HR/organizational capabilities B. Market conditions C. Telecommunications D. Site design
B. Market conditions
Clear verbiage is what you want your e-commerce site to accomplish= A. Vision B. Mission Statement C. Vision Statement D. SWOT
B. Mission Statement
Which of the following security threats involves social engineering? A. Adware B. Phishing C. Spyware D. Denial of service
B. Phishing
Selling products to different people and groups based on their willingness to pay= A. Price differentiation B. Price discrimination C. Versioning D. Customization
B. Price discrimination
Customer on-site tracking, customer database, and inventory management systems are all examples of: A. Business objectives B. Systems functionalities C. Information requirements D. Systems design
B. Systems functionalities
Which architecture is the most appropriate for a simple website (static pages, no applications)? A. Single tier B. Two-tier C. Multi-tier D. Horizontal
B. Two-tier
Software that provides specific business functionality for a web site= A. Web server B. Web application server C. Multi-tier software D. Streaming server
B. Web application server
Bonus Question: What's another term you could use for a coordinated cell phone DOS attack?
Botnet Attack
The first stage in the consumer decision making process is: A. Search for information B. Evaluation of alternatives C. Awareness of need D. Purchase decision
C. Awareness of need
Which of the following is NOT true about dynamic page generation? A. Lower menu costs B. Easy online market segmentation C. Bandwidth intensive D. Cost-free price discrimination
C. Bandwidth intensive
Marketing based on data from search engine queries, clickstream history, and other personal information= A. Retargeting B. Customization C. Behavioral marketing D. Viral marketing
C. Behavioral marketing
The bulk of data generated by all of the tracking methodologies is referred to as: A. Data warehouse B. Data mines C. Big data D. Mega data
C. Big data
SSL and many encryption services are verified by CAs. What is a CA? A. Computer agency B. Certifying agency C. Certificate authority D. Complete autonomy
C. Certificate authority
Customer ID , product , date, payment, and shipment date are all examples of e-commerce: A. Business objectives B. Systems functionalities C. Information requirements D. Systems design
C. Information requirements
The list of information system capabilities need to achieve business objectives= A. Business objectives B. System functionalities C. Information requirements D. Systems design
C. Information requirements
Which of the following is NOT a kind of search engine marketing/advertising? A. Sponsored links B. Keyword advertising C. Interstitial advertising D. Network keyword advertising
C. Interstitial advertising
A primary disadvantage of open-source software solutions for e-commerce= A. Cost B. Availability C. Lack of staff expertise D. Lack of customization
C. Lack of staff expertise
Ralph is determining a path for his e-commerce site based on how data will move through his system. He is creating: A. Physical design B. Website design C. Logical design D. Spatial design
C. Logical design
In a multi-tier e-commerce architecture, application, ad, and mail servers typically live in the__________layer. A. Web server layer B. Initial layer C. Middle-tier layer D. Backend layer
C. Middle-tier layer
Which is the most efficient way to accommodate mobile users? A. Mobile app B. Native app C. Mobile website D. Hybrid app
C. Mobile website
The 5 major steps in the systems development life cycle are system analysis/planning, systems design, building the system, implementation, and A. Funding B. Scope determination C. Testing D. Decommissioning
C. Testing
Selling the same car as both a Chevrolet and Buick to different demographics at different prices is ___________. A. Price differentiation B. Price discrimination C. Versioning D. Customization
C. Versioning
Bonus Question: What is defcon
Convention of hackers that come to las vegas Take over the hotel for the entire time they are there and they hack everything
What is the most important factor in effecting the speed of a site
Customer demand
The least expensive way to protect your computer from malicious code is: A. Firewall B. VPN C. SSL D. Antivirus software
D. Antivirus software
The three key points of vulnerability in an e-commerce environment are client, server, and: A. Web interface B. Web page C. Processor D. Communications pipeline
D. Communications pipeline
The biggest advantage of insourcing website development is: A. Cost B. Look C. Maintenance D. Control
D. Control
Adding multiple computers to split processing work is known as __________ scaling. A. Vertical B. Open source C. Flat D. Horizontal
D. Horizontal
When Jimmy uses his Gmail app on his iPhone, hyperlinks still make use of his built-in web-browser. This scenario is an example of a: A. Mobile app B. Native app C. Mobile website D. Hybrid app
D. Hybrid app
The biggest disadvantage to insourcing website development is: A. Security B. Hours to build C. Inconvenience D. Lack of in-house skills
D. Lack of in-house skills
Why is e-mail marketing still popular? A. Established methodology B. Effective returns C. High click through rate D. Low cost
D. Low cost
Print, TV & radio are considered to be _________media. A. Old school B. Traditional C. Dead D. Offline
D. Offline
Being able to control the way that someone uses your personal information= A. Nonrepudiation B. Authenticity C. Confidentiality D. Privacy
D. Privacy
Kent was buying Batman action figures from Amazon on a wifi connection. A second party used malicious software to analyze packets between Kent's laptop and a wifi access point. The hacker was likely using A. E-mail wiretapping B. Spoofing C. Phishing D. Sniffer software
D. Sniffer software
Which of the following is NOT a challenge to building an e-commerce presence? A. Developing clear understanding of business objectives B. Knowing how to choose the right tech to meet those objectives C. There is no "full-proof" way of building a presence D. There is a lack of effective, low-cost technology
D. There is a lack of effective, low-cost technology
Using the public internet as an extension of your own network is called: A. SSL B. TSL C. WPA2 D. VPN
D. VPN
True or false: Basic public key cryptography does a great job in authenticating senders.
False
True/False: A database designed to compare two or more attributes to determine patterns in consumer behavior is called an integrated database.
False
True/False: Government regulations have helped to control spam e-mail.
False
True/False: Hacking "good guys" are known as grey hats.
False
True/False: In symmetric key cryptography, the sender and recipient use different keys.
False
True/False: Internet service providers are against repealing consumer privacy laws.
False
True/False: Microsoft IIS is the most popular web server software on the market.
False
True/False: The growth rate for home broadband propagation in the U.S. shows no signs of slowing down.
False
True/false: PKI is effective against company insiders.
False
True/false: Static web pages are bandwidth intensive.
False
True/false: The term "firewall" refers only to hardware-based network protection.
False
True/false: Using multiple tiers centralizes system resources and decreases the ability to scale.
False
Bonus Question: Explain why it is a good or bad thing for consumers in general with google getting rid of third party cookies
Good because our information is not going to other companies only google Bad because google could be showing a lot of bias
Bonus question: Name the bug that exploited a weakness in the transport layer of SSL.
Heartbleed
What is Equifax
Is a credit reporting agency Problem started to occur in march or april, found out in july, waited till about september to tell the public Apache was behind this They sold their stocks before they told the public
Who sold the first ever tweet
Jack Dorsey
Bonus question: What is Dr. Tonkin's twins name
Kirt
Small country known as blockchain island
Malta
Bonus question: Name a Smart TV company who has been fined for listening in on consumers
Samsung or Vizio
Bonus Question: What is Dr. Tonkin's pet peeve
The back button on my.francis
What is unique about Malta's approach to crypto currencies?
They are regulating it
True/False: A major disadvantage of Certification Authorities is that they are largely self-policing
True
True/False: Google Analytics is considered to be a third-party tool.
True
True/False: Print/TV ads are still regarded as being more trustworthy than online ads.
True
True/False: Social marketing/advertising is the fastest growing type of online marketing.
True
True/false: A video streaming server is a type of web application server.
True
True/false: Instant scalability is an advantage of outsourcing website development.
True
True/false: Malware, exploits, viruses, and other online hazards are collectively known as malicious code.
True
Typosquat
When you mistype a website like barnes and noble to barnes and nibble
Who are the hacking good guys
White hats
What does software as a service mean?
You are buying it from someone else
What are non-fungible tokens
a unit of data stored on a digital ledger, called a blockchain, that certifies a digital asset to be unique and therefore not interchangeable. NFTs can be used to represent items such as photos, videos, audio and other types of digital files
What is google analytics
a web analytics service offered by Google that tracks and reports website traffic, currently as a platform inside the Google Marketing Platform brand
Spam got its name from
monty python
What will google give you when you check your spam box?
recipes