ICS 392 Final
An IPv4 address is expressed as a: a. 32-bit number that appears as a series of four separate numbers separated by periods. b. 128-bit number that appears as a series of four separate numbers separated by periods. c. 64-bit number that appears as a series of four separate numbers separated by semicolons. d. 4-bit number that appears as a series of four separate numbers separated by semicolons.
32-bit number that appears as a series of four separate numbers separated by periods.
eBay uses all of the following business models except: a. content provider. b. e-commerce infrastructure provider. c. C2C market creator. d. B2C market creator.
Content Provider
Downloading music tracks owned by record companies without paying for them is an example of a violation of: a. trademark law. b. patent law. c. privacy law. d. copyright law.
Copyright law
Which of the following protects original forms of expression in a tangible medium? a. copyright law b. trademark law c. patent law d. trade secret law
Copyright law
Which of the following is an example of C2C e-commerce? a. Craigslist b. Groupon c. Go2Paper d. Amazon
Craigslist
Registering a domain name (URL) similar or identical to trademarks of others to extort profits from a. cyberpiracy. b. cybersquatting. c. metatagging. d. framing.
Cybersquatting
Which of the following situations would not qualify for the fair use exception to U.S. copyright law? a. A professor clips a newspaper article just before class and distributes copies of it to his class. b. A journalist quotes a paragraph from a book in a review of the book. c. A student copies a song of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site. d. Google posts thumbnail images of books in the Google Book Search Project.
A student copies a song of his favorite band from a Web site created by the bands record label and places it on the student's personal website.
Which of the following verifies that the business objectives of the system as originally conceived are in fact working? a. implementation testing b. acceptance testing c. system testing d. unit testing
Acceptance Testing
Stickiness is a more important attribute for which of the following revenue models? a. subscription revenue model b. advertising revenue model c. sales revenue model d. transaction fee revenue model
Advertising Revenue Model
All of the following primarily use an advertising revenue model except: a. Yahoo. b. Amazon. c. Twitter. d. Google.
Amazon
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. a. Authenticity b. Availability c. Nonrepudiation d. Confidentiality
Authenticity
A fingerprint scan is an example of which of the following? a. biometrics b. IDS c. encryption d. firewall
Biometrics
Which of the following is a characteristic of the Reinvention phase of e-commerce? a. The use of mobile platforms. b. The widespread adoption of broadband networks. c. The massive proliferation of dot-com start-ups d. The rapid growth of search engine advertising.
The use of mobile platforms.
Which of the following help convert URLs into IP addresses? a. root servers b. client servers c. Web servers d. DNS servers
DNS Servers
Which of the following basic system functionalities is used to display goods on a Web site? a. customer database system b. showcase database c. shopping cart system d. digital catalog
Digital Catalog
Which of the following refers to the displacement of market middleman and the creation of a new direct relationship between producers and consumers? a. Network Effect b. Disintermediation c. Friction-Free Commerce d. First-Mover Advantage
Disintermediation
The ________ allows a natural language expression, such as Google.com to represent a numeric IP address. a. Internet Layer of TCP/IP b. domain name system c. TCP/IP d. packet switching system
Domain name system
All of the following are examples of business-to-business (B2B) business models except: a. exchanges. b. e-distributors. c. e-tailers. d. e-procurement.
E-tailers
Which of the following is not true? a. No one academic perspective dominates research about e-commerce. b. Economists take a purely technical approach to e-commerce. c. There are 2 primary approaches to e-commerce: behavioral and technical. d. Management scientists are interested in e-commerce as an opportunity to study how behavioral factors can exploit the Internet to achieve more efficient business operations.
Economists take a purely technical approach to e-commerce.
Which of the following is not a main factor in determining the overall demand on an e-commerce site? a. nature of customer requests b. whether content is dynamic or static c. file sizes of Web pages being served d. number of simultaneous users in peak periods
File sizes of Web Pages being served
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network. a. proxy server b. virtual private network c. firewall d. PPTP
Firewall
Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service? a. transaction fee strategy b. delayed revenue model c. subscription revenue model d. freemium strategy
Freemium Strategy
________ typically attack governments, organizations, and sometimes individuals for political purposes. a. Crackers b. White hats c. Grey hats d. Hacktivists
Hacktivists
What is the first step in analyzing an ethical dilemma? a. Identify the potential consequences of your opinions. b. Identify the options you can reasonably take. c. Define the conflict or dilemma and identify the higher-order values involved. d. Identify and describe the facts.
Identify and describe the facts.
Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as: a. incubators. b. angel investors. c. venture capital investors. d. crowdfunders.
Incubators
Which of the following refers to any disparity in relevant market information among parties in a transaction? a. Competitive Inequity b. Imperfect Competition c. Data Discrepancy d. Information Asymmetry
Information Asymmetry
Which of the following are the two main components of a systems design? a. logical design and physical design b. front-end systems and back-end systems c. behavioral design and technological design d. business objectives and technology requirements
Logical design and physical design
Which type of e-commerce is distinguished by the type of technology used in the transaction rather by the nature of the market relationship? a. mobile e-commerce b. consumer-to-consumer (C2C) c. Social e-commerce d. Business-to-business (B2B)
Mobile e-commerce
________ refers to the ability to ensure that e-commerce participants do not deny their online actions. a. Nonrepudiation b. Authenticity c. Availability d. Privacy
Nonrepudation
The process of slicing digital messages into containers, sending them along different communication paths as they become available, and reassembling them at the destination point is called: a. The Internet Protocol. b. packet switching. c. The Hypertext Transfer Protocol. d. endpoint cutting.
Packet Switching
Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years? a. trademark law b. trade secret law c. patent law d. copyright law
Patent Law
All of the following are parts of business models employed in the online music industry except: a. download-and-own. b. cloud streaming. c. peer-to-peer streaming. d. subscription.
Peer to peer streaming
Which of the following details the actual hardware components to be used in a system? a. logical design b. physical design c. system functionalities plan d. system module detail plan
Physical design
Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture? a. responsibility b. liability c. accountability d. privacy
Privacy
All of the following are basic functionality provided by e-commerce merchant server software except: a. productivity software. b. a product catalog. c. a shopping cart. d. credit card processing.
Productivity Software
Which of the following is a set of rules for transferring data? a. an IP address b. a packet c. a router d. a protocol
Protocol
The Internet Layer of TCP/IP is responsible for which of the following? a. providing a variety of applications with the ability to access the services of the lower layers b. placing packets on and receiving them from the network medium c. providing communication with the application by acknowledging and sequencing the packets to and from the application d. addressing, packaging, and routing messages
Providing communication with the application by acknowledging and sequencing the packets to and from the application.
What is the total number of users or customers an e-commerce business can obtain is a measure of which of the following? a. Reach B. Information Density C. Interactivity D. Ubiquity
Reach
A firm's ________ describes how a firm will produce a superior return on invested capital. a. competitive advantage b. value proposition c. revenue model d. market strategy
Revenue Model
Which of the following are specialized computers that interconnect the thousands of computers that make up the Internet in order to transmit message parcels along available communication paths and on to their destinations? a. Web hosts b. routers c. IP clients d. Internet Layer of TCP/IP
Routers
Which of the following are Amazon's primary value propositions? a. increasing price discovery cost b. selection and convenience c. management of product labeling d. personalization and customization
Selection and Convenience
Which of the following is not an example of malicious code? a. sniffer b. bot c. scareware d. Trojan horse
Sniffer
Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers? a. social media b. web site c. mobile apps d. offline media
Social Media
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: a. adware. b. botnet c. spyware. d. a backdoor.
Spyware
Which of the following can be used to record all keyboard activity of a user? a. shopping carts b. trusted computing environments c. spyware d. DRM
Spyware
A digital certificate contains all of the following except the: a. digital signature of the certification authority. b. subject's public key. c. digital certificate serial number. d. subject's private key.
Subject's private key
Which of the following is the primary communications protocol for the Internet? a. Telnet b. TCP/IP c. FTP d. TLS
TCP/IP
Above all, e-commerce is a ____________ phenomenon. a. Technology-Driven b. Finance-Driven c. Sociological d. Government-driven
Technology-Driven
Which of the following statements about net neutrality is true? a. Net neutrality requires that all data be treated in the same manner. b. Net neutrality requires that no data be treated in the same manner. c. The FCC now regulates ISP pricing and advertising. d. The FCC now regulates ISP pricing but only offers guidelines on advertising.
The FCC now regulates ISP pricing and advertising.
E-commerce can be defined as: a. The use of any internet technologies in a firm's daily activities. b. Any digitally enabled transactions among individuals and organizations. c. The digital enablement of transactions and processes within an organizations. d. The use of the Internet, the Web, and mobile apps to transact business.
The use of the Internet, the Web, and mobile apps to transact business.
All of the following are true about iPhone apps except: a. they are made for Android KitKat devices. b. over 100 billion have been downloaded. c. Apple's goal of offering apps is to increase sales of iPhones, iPads, and iPods. d. They are distributed through Apple's App Store.
They are made for android kitkat devices.
E-commerce is available just about everywhere an anytime. The is known as _______. A. Richness B. Information Density C. Ubiquity D. Reach
Ubiquity
Which of the following involves testing a site program's modules one at a time? a. system testing b. unit testing c. acceptance testing d. implementation testing
Unit Testing
In developing an e-commerce presence, what questions must be asked and answered about the firm's target audience? a. which hardware platform will be the most cost effective and fastest? b. do they require a shopping cart and what are the limits? c. who is the target audience and where can they best be reached? d. when do prefer to shop and why?
Who is the target audience and where can they be reached?
The major technologies used with wireless local area networks are: a. WiMax and 3G. b. Wi-Fi and Bluetooth. c. Wi-Fi and WiMax. d. Bluetooth and 3G.
Wifi and bluetooth
Slammer is an example of which of the following? a. botnet b. Trojan horse c. virus d. worm
Worm
Which of the following is not an example of the bricks-and-clicks e-tailing business model? a. Walmart b. Zappos c. Sears d.Staples
Zappos
All of the following are factors that will be considered in determining whether use of copyrighted material is fair use except the: a. nature of the work used. b. amount of the work used. c. market effect of the use. d. free availability of the work on Netflix or Hulu.
free availability of the work on Netflix or Hulu.
In order from beginning to end, the major steps in the SDLC are: a. systems analysis/planning; systems design; building the system; testing; and implementation. b. systems design; testing; building the system; and implementation. c. systems analysis/planning; systems design; building the system; implementation; and testing. d. systems analysis/planning; implementation; building the system; and testing.
systems analysis/planning, systems design, building the system, testing, and implementation.
What is the most frequent cause of stolen credit cards and card information today? a. the hacking and looting of corporate servers storing credit card information b. sniffing programs c. botnets attacks d. lost cards
the hacking and looting of corporate servers storing credit card information.