Exam One Chapter 1-5

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is not a key factor for establishing e-commerce security? data integrity technology organizational policies laws and industry standards

data integrity

All of the following either currently, or have plans to, offer Internet access via satellite except: A. Facebook B. Dish C. Microsoft D. Boeing

C. Microsoft

Which of the following is not part of the LAMP open source web development model? A. Linux B. Apache C. Microsoft IIS D. PHP

C. Microsoft IIS

________ was the first truly large-scale digitally enabled transaction system in the B2C arena. A. Telex B. The Baxter Healthcare system C. The French Minitel D. Electronic Data Interchange (EDI)

C. The French Minitel

Which of the following is a characteristic of the Consolidation phase of e-commerce? A. predominance of pure online strategies B. emphasis on revenue growth versus profits C. brand extension and strengthening becomes more important than creating new brands D. shift to a technology-driven approach

C. brand extension and strengthening becomes more important than creating new brands

All of the following are key design principles of responsive web design except: A. flexible grid-based layouts. B. media queries. C. coding by convention. D. flexible images and media.

C. coding by convention.

Most of the time required to maintain an e-commerce site is spent on: A. debugging code. B. responding to emergency situations. C. general administration and making changes and enhancements to the system. D. changes in reports, data files, and links to backend databases.

C. general administration and making changes and enhancements to the system.

Which dimension(s) of security is spoofing a threat to? A. integrity B. availability C. integrity and authenticity D. availability and integrity

C. integrity and authenticity

Which of the following is not a variation of the e-tailer business model? A. bricks-and-clicks B. virtual merchant C. market creator D. manufacturer-direct

C. market creator

Which of the following helps you engage your customers in a conversation? A. shopping cart B. product database C. on-site blog D. site tracking and reporting system

C. on-site blog

Microsoft's pilot program to provide broadband Internet access to rural areas uses which of the following technologies? A. satellites B. drones C. unused, low-powered television channels D. high altitude balloons

C. unused, low-powered television channels

________ is the ability to ensure that messages and data are only available to those authorized to view them. Confidentiality Integrity Privacy Availability

Confidentiality

PayPal is an example of what type of payment system? online stored value payment system digital checking system accumulating balance system digital credit card system

online stored value payment system

SaaS and PaaS providers can typically provide services at lower costs through scale economies. T/F

True

Slow followers are sometimes more successful than first movers. T/F

True

T1 and T3 refer to international telephone standards for digital communication. T/F

True

The Internet is a worldwide system of computer networks. T/F

True

The major hubs in the United States where the Internet backbone intersects with regional and local networks are now commonly referred to as Internet Exchange Points (IXPs). T/F

True

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other? DES NFC IM text messaging

NFC

________ is the ability to ensure that e-commerce participants do not deny their online actions. Nonrepudiation Authenticity Availability Integrity

Nonrepudiation

The Jumpstart Our Business Startups (JOBS) Act, and issuance of enabling regulations by the Securities and Exchange Commission, allows a start-up company to use crowdfunding to solicit investors to invest in small and early-stage startups. T/F

True

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software. T/F

True

Which of the following statements about Bitcoin is not true? The computational power required to mine Bitcoins has increased over time. Bitcoins are completely secure. Bitcoins are illegal in some countries. In 2018, Bitcoin represented just under 40% of the full market for cryptocurrencies.

Bitcoins are completely secure.

Which of the following statements is not true? A. A VPN provides both confidentiality and integrity. B. A VPN uses both authentication and encryption. C. A VPN uses a dedicated secure line. D. The primary use of VPNs is to establish secure communications among business partners.

C. A VPN uses a dedicated secure line.

Which of the following is not considered a portal? A. Yahoo B. MSN C. Amazon D. AOL

C. Amazon

The Web runs in which layer of Internet architecture? A. Network Technology Substrate layer B. Middleware Services layer C. Transport Services and Representation Standards layer D. Applications layer

D. Applications layer

All of the following are methods of securing channels of communication except: A.SSL/TLS. B. digital certificates. C. VPN. D. FTP.

D. FTP.

Which of the following is an example of the affiliate revenue model? A. Scribd B. eBay C. L.L. Bean D. MyPoints

D. MyPoints

What is the first step in developing an e-commerce security plan? Create a security organization. Develop a security policy. Perform a risk assessment. Perform a security audit.

Perform a risk assessment.

A digital certificate contains all of the following except the: subject's private key. subject's public key. digital signature of the certification authority. digital certificate serial number.

subject's private key.

________ are a kind of middleware software that provides the glue connecting traditional corporate systems to the customer as well as all the functionality needed to conduct e-commerce. A. Application servers B. Web page servers C. Database servers D. Content management servers

A. Application servers

Which of the following protocols is used to send mail to a server? A. SMTP B. FTP C.HTTP D. SSL

A. SMTP

In the ________ business model, a web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products and establish prices. A. market creator B. community provider C. e-tailer D. portal

A. market creator

In general, the key to becoming a successful content provider is to: A. own the content being provided. B. own the technology by which content is created, presented, and distributed. C. provide online content for free. D. provide other services as well as online content.

A. own the content being provided.

Which of the following monitors and controls access to a main web server, and implements firewall protection? A. proxy server B. list server C. groupware server D. mail server

A. proxy server

Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations? A. routers B. Web servers C. IP servers D. packet servers

A. routers

Which of the following gives a business model the most credibility with outside investors? A. the firm's management team B. the firm's value proposition C. the firm's market opportunity D. the firm's market strategy

A. the firm's management team

Which of the following is not a primary activity in a firm value chain? A. outbound logistics B. finance/accounting C. operations D. after-sales service

B. finance/accounting

Which of the following may offer its customers value chain management software? A. e-distributors B. e-procurement companies C. exchanges D. community providers

B. e-procurement companies

Which of the following is an example of an integrity violation of e-commerce security? A website is not actually operated by the entity the customer believes it to be. A merchant uses customer information in a manner not intended by the customer. A customer denies that he is the person who placed the order. An unauthorized person intercepts an online communication and changes its contents.

An unauthorized person intercepts an online communication and changes its contents.

In 2018, the overall retail market in the United States was estimated to be about: A. $53 trillion. B. $5.3 trillion. C. $530 billion. D. $53 billion.

B. $5.3 trillion.

Which of the following is a server-side technique that detects the attributes of the device making the request, and using predefined templates, loads a version of a site optimized for the device? A. LAMP B. AWD C. mobile first design D. RoR

B. AWD

Which of the following uses a subscription revenue model for books? A. Spotify B. Amazon Kindle Unlimited C. Rhapsody D. Pandora

B. Amazon Kindle Unlimited

Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet? A. HTTP B. BGP C. FTP D. SMTP

B. BGP

Ruby on Rails is based on which of the following philosophies? A. SLDC B. CoC C. LAMP D. Ajax

B. CoC

Which of the following is not an advantage of client/server computing over centralized mainframe computing? A. It is easy to expand capacity by adding servers and clients. B. Each client added to the network increases the network's overall capacity and transmission speeds. C. Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer. D. There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down.

B. Each client added to the network increases the network's overall capacity and transmission speeds.

Which of the following organizations monitor Internet policies and practices? A. IETF B. ISOC C. W3C D. ICANN

B. ISOC

Applications for Android operating system-based smartphones are typically written in which of the following? A. Swift B. Java C. ActiveX D. ColdFusion

B. Java

Which of the following is an example of a company using the content provider model? A. Priceline B. Netflix C. Dell D. eBay

B. Netflix

Django is based on which of the following? A. PHP B. Python C. Perl D. Ruby on Rails

B. Python

The backbone of the Internet is formed by: A. Internet Exchange Points (IXPs). B. Tier 1 ISPs. C. Network Access Points (NAPs). D. Metropolitan Area Exchanges (MAEs).

B. Tier 1 ISPs.

Which of the following verifies that the business objectives of the system are in fact working? A. system testing B. acceptance testing C. unit testing D. implementation testing

B. acceptance testing

A wealthy individual who invests personal funds in a startup in exchange for an equity share in the business is referred to as a(n): A. incubator. B. angel investor. C. venture capital investor. D. crowdfunder.

B. angel investor.

Where does TLS operate within TCP/IP? A. between the Internet Layer and the Transport Layer B. between the Transport Layer and the Application Layer C. between the Network Interface Layer and the Transport Layer D. between the Internet Layer and the Application Layer

B. between the Transport Layer and the Application Layer

Which of the following basic system functionalities is used to display goods on a website? A. product database B. digital catalog C. shopping cart system D. customer database system

B. digital catalog

Which of the following typically includes a data flow diagram (DFD) to describe the flow of information for an e-commerce site? A. physical design B. logical design C. testing plan D. co-location plan

B. logical design

All of the following are simple steps for optimizing web page content except: A. reducing unnecessary HTML comments. B. segmenting computer servers to perform dedicated functions. C. using more efficient graphics. D. avoiding unnecessary links to other pages on the site.

B. segmenting computer servers to perform dedicated functions.

The term stateless refers to the fact that: A. no one government entity controls the Internet. B. the server does not have to maintain an ongoing dedicated interaction with the client computer. C. system performance degrades as more simultaneous users require service. D. web servers may maintain multiple instances of server software to handle requests.

B. the server does not have to maintain an ongoing dedicated interaction with the client computer.

First movers often fail because: A. their competitive advantage is unfair. B. they lack complementary resources needed to sustain their advantages. C. they are operating in a perfect market. D. they fail to leverage their competitive assets.

B. they lack complementary resources needed to sustain their advantages.

Which of the following was the original purpose of the Internet? A. to provide a network that would allow businesses to connect with consumers B. to link large mainframe computers on different college campuses C. to develop a military communications system that could withstand nuclear war D. to enable government agencies to track civilian communications

B. to link large mainframe computers on different college campuses

Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders? A. single-tier architecture B. two-tier architecture C. three-tier architecture D. multi-tier architecture

B. two-tier architecture

Which of the following statements about data breaches in 2017 is not true? A. According to the Identity Theft Resource Center, the number of breaches in 2017 increased by almost 45% from 2016. B. According to the Identity Theft Resource Center, over 50% of data breaches involved social security numbers. C. According to the Identity Theft Resource Center, employee error was the leading cause of data breaches. D. According to the Identity Theft Resource Center, data breaches involving the business sector represented over 55% of all breaches.

C. According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.

Which of the following was the most popular web browser as of August 2018? A. Internet Explorer B. Safari C. Chrome D. Firefox

C. Chrome

Django follows the ________ programming principle. A. CoC B. WYSIWYG C. DRY D. LAMP

C. DRY

An IPv4 address is expressed as a: A. 32-bit number that appears as a series of four separate numbers separated by semicolons. B. 64-bit number that appears as a series of four separate numbers separated by semicolons. C. 64-bit number that appears as a series of four separate numbers separated by periods. D. 32-bit number that appears as a series of four separate numbers separated by periods.

D. 32-bit number that appears as a series of four separate numbers separated by periods.

Which of the following is a programming language introduced by Apple specifically for developing iOS applications? A. Objective-C B. C C. C++ D. Swift

D. Swift

All of the following use an advertising revenue model except: A. Facebook. B. Yahoo. C. Google. D. Walmart.

D. Walmart.

You could expect to find all of the following services in a web server software package except: A. security services. B. FTP. C. search engine. D. an RSS aggregator.

D. an RSS aggregator.

All of the following were visions of e-commerce expressed during the early years of e-commerce except: A. a nearly perfect information marketspace. B. friction-free commerce. C. disintermediation. D. fast follower advantage.

D. fast follower advantage.

A ________ specifically details how you plan to find customers and to sell your product. A. sales analysis B. business plan C. competitive strategy D. market strategy

D. market strategy

All of the following are website design features that annoy customers except: A. slow-loading pages. B. pop-under ads. C. splash pages. D. multi-browser functionality.

D. multi-browser functionality.

Which of the following details the actual hardware components to be used in a system? A. architecture plan B. system functionalities plan C. logical design D. physical design

D. physical design

Which of the following is not an example of malicious code? a. scareware b. Trojan horse c. bot d. sniffer

D. sniffer

Which type of investor typically becomes interested in a startup company after it has begun generating revenue? A. incubators B. angel investors C. crowdfunders D. venture capital investors

D. venture capital investors

A multi-tier architecture typically includes only a web server and a database server. T/F

False

A private cloud is operated for the benefit of multiple firms. T/F

False

A security hole known as Shellshock enabled hackers to target JavaScript running on Apache web servers. T/F

False

Amazon Web Services is an example of a private cloud. T/F

False

DHMTL is used to generate dynamic web pages. T/F

False

IMAP is the Internet protocol used by a browser to transfer web pages. T/F

False

On-demand service companies are characterized by the free sharing of resources between the company and consumers. T/F

False

Phishing attacks rely on browser parasites. T/F

False

Social technologies change industry structure by weakening powerful sales channels and shifts bargaining power to consumers. T/F

False

The web server software used has a significant impact on how a website's web pages look on a user's computer. T/F

False

WLAN-based Internet access derives from the same technological foundations as telephone-based wireless Internet access. T/F

False

All of the following statements about PKI are true except: the term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties. PKI is not effective against insiders who have a legitimate access to corporate systems including customer information. PKI guarantees that the verifying computer of the merchant is secure. the acronym PKI stands for public key infrastructure.

PKI guarantees that the verifying computer of the merchant is secure.

Which of the following statements is not true? A majority of states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred. The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers. The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates. The Federal Trade Commission has asserted that it has authority over corporations' data security practices.

The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.

A Trojan horse appears to be benign, but then does something other than expected. T/F

True

Dynamic page generation enables price discrimination. T/F

True

E-commerce has increased price competition in many markets. T/F

True

FREAK is an example of a software vulnerability. T/F

True

Information asymmetries enable some firms to have an edge over others. T/F

True

Which of the following is not an example of a potentially unwanted program (PUP)? adware browser parasite drive-by download spyware

drive-by download

Malware that comes with a downloaded file that a user requests is called a: Trojan horse. backdoor. drive-by download. PUP.

drive-by download.

The overall rate of online credit card fraud is ________ of all online card transactions. less than 1% around 5% around 10% around 15%

less than 1%


Conjuntos de estudio relacionados

NASM Corrective Exercise Specialist

View Set

Chapter 6 Lesson 3 "The American Revolution"

View Set

Pharmacology chapters 10, 11, 12 & 13

View Set

MGMT 371 Test2 (CH.7-11) Energizers

View Set