ISDS 4117 chapter review

¡Supera tus tareas y exámenes ahora con Quizwiz!

All of the following statements about Apple Pay are true except which of the following? Select one: A. Apple Pay is an example of a universal proximity mobile wallet. B. Apple Pay is the most popular alternative payment method in the United States. C. Apple Pay has more users than either Google Pay or Samsung Pay. D. Apple Pay can be used for mobile payments at the point of sale at a physical store

B. Apple Pay is the most popular alternative payment method in the United States.

Which of the following statements is not true? Select one: A. Biometric devices reduce the opportunity for spoofing. B. A retina scan is an example of a biometric device. C. Apple's Touch ID stores a digital replica of a user's actual fingerprint in Apple's iCloud. D. Biometric data stored on an iPhone is encrypted.

C. Apple's Touch ID stores a digital replica of a user's actual fingerprint in Apple's iCloud.

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other? Select one: A. IM B. text messaging C. NFC D. DES

C. NFC

Group M, the world's largest advertising buyer, requires which of the following in order for an ad to be considered viewable? Select one: A. 50% of the pixels must be in view for at least one second. B. 50% of the pixels must be in view for at least two seconds. C. 100% of the pixels must be in view for at least two seconds D. 100% of the pixels must be in view for at least one second

D. 100% of the pixels must be in view for at least one second

Approximately ________ of U.S. Internet users research online but do not buy. Select one: A. 19% B. 7.7% C. 15% D. 12.7%

D. 12.7%

VTR measures the ________ response rate to an ad. Select one: A. 7-day B. 30-minute C. 24-hour D. 30-day

D. 30-day

Which of the following did the Internet Advertising Bureau urge advertisers to abandon? Select one: A. HTML5 B. Adobe Acrobat C. HTML D. Adobe Flash

D. Adobe Flash

The richness made possible by e-commerce technologies does which of the following? Select one: A. It reduces the cost of delivering marketing messages and receiving feedback from users. B. It enables worldwide customer service and marketing communications. C. It allows consumers to become co-producers of the goods and services being sold. D. It allows video, audio, and text to be integrated into a single marketing message and consuming experience.

D. It allows video, audio, and text to be integrated into a single marketing message and consuming experience.

An intrusion detection system can perform all of the following functions except: Select one: A. examining network traffic. B. setting off an alarm when suspicious activity is detected. C. checking network traffic to see if it matches certain patterns or preconfigured rules. D. blocking suspicious activity.

D. blocking suspicious activity.

Beebone is an example of which of the following? Select one: A. phishing B. worm C. hacktivism D. botnet

D. botnet

The Internet's universal standards have changed industry structure by increasing barriers to entry and decreasing competition within an industry. Select one: True False

False

The concept of "customer satisfaction" is broader than the concept of "customer experience." Select one: True False

False

Which of the following typically includes a data flow diagram (DF~to describe the flow of information for an e-commerce site? Select one: a. logical design b. testing plan c. co-location plan d. physical design

a. logical design

Which of the following helps you engage your customers in a conversation? Select one: a. shopping cart b. on-site blog c. product database d. site tracking and reporting system

b. on-site blog

Phishing attacks rely on browser parasites. Select one: True False

false

In general, the annual system maintenance cost will roughly parallel the development cost. Select one: True False

true

The SDLC methodology helps developers to understand the business objectives of a system and design an appropriate solution. Select one: True False

true

All the following statements about symmetric key cryptography are true except: Select one: A. symmetric key cryptography is computationally slower. B. symmetric key cryptography is a key element in digital envelopes. C. in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message. D. the Data Encryption Standard is a symmetric key encryption system.

A. symmetric key cryptography is computationally slower.

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use. Select one: True False

True

The Data Encryption Standard uses a ________-bit key. Select one: A. 8 B. 56 C. 512 D. 256

b. 56

Which of the following is not an example of the bricks-and-clicks e-tailing business model? Select one: a. Target b. Bluefly c. Walmart d. Staples

b. Bluefly

Organizations that typically provide an array of services to startup companies along with a small amount of funding are referred to as: Select one: a. venture capital investors. b. incubators. c. crowdfunders. d. angel investors.

b. incubators.

During which phase of the development of the Internet was the Domain Name System (DNS) introduced? Select one: a. innovation phase b. institutional phase c. commercialization phase d. consolidation phase

b. institutional phase

All of the following are website design features that annoy customers except: Select one: a. slow-loading pages. b. multi-browser functionality. c. splash pages. d. pop-under ads.

b. multi-browser functionality.

All of the following are business models employed in the online music industry except: Select one: a. download-and-own. b. peer-to-peer streaming. c. cloud streaming. d. subscription.

b. peer-to-peer streaming.

Innovative entrepreneurs and their business firms that destroy existing business models are referred to as: Select one: a. angel investors. b. venture capitalists. c. crowdfunders. d. disruptors.

d. disruptors.

Which of the following is not a key element of an elevator pitch? Select one: a. market opportunity b. growth metrics c. exit strategy d. legal structure

d. legal structure

Exploit kits can be purchased by users to protect their computers from malware. Select one: True False

false

Which of the following is not one of the four main methods advertisers use to behaviorally target ads? Select one: A. clickstream data B. Nielsen ratings C. integration of online data with offline data D. data collected from social networks

B. Nielsen ratings

All of the following statements about public key cryptography are true except: Select one: A. public key cryptography uses two mathematically related digital keys. B. public key cryptography ensures authentication of the sender. C. public key cryptography is based on the idea of irreversible mathematical functions. D. public key cryptography does not ensure message integrity.

B. public key cryptography ensures authentication of the sender.

All of the following are online communications used to support the evaluation of alternatives stages of the consumer decision process except: Select one: A. social networks. B. targeted banner ads. C. online catalogs. D. search engines.

B. targeted banner ads.

Which dimension(s) of security is spoofing a threat to? Select one: A. availability and integrity B. availability C. integrity and authenticity D. integrity

C. integrity and authenticity

________ is an open source database that can store and analyze both structured and unstructured data. Select one: A. JSP B. ASP C. PHP D. Hadoop

D. Hadoop

Amazon's Associates program is an example of which of the following? Select one: A. lead generation marketing B. viral marketing C. local marketing D. affiliate marketing

D. affiliate marketing

A private cloud is operated for the benefit of multiple firms. Select one: True False

False

Real markets are imperfect. Select one: True False

True

The leading web server software is: Select one: a. Apache. b. Google Enterprise Server. c. Sun Solaris. d. Microsoft Internet Information Server.

a. Apache.

Beginning the e-commerce development process with a mobile presence rather than a desktop website is referred to as which of the following? Select one: a. RWD b. mobile first design c. AWD d. RESS

b. mobile first design

________ are a kind of middleware software that provides the glue connecting traditional corporate systems to the customer as well as all the functionality needed to conduct e-commerce. Select one: a. Web page servers b. Content management servers c. Database servers d. Application servers

d. Application servers

________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared pool of virtualized resources over the Internet. Select one: a. Client/server computing b. P2P computing c. Mobile computing d. Cloud computing

d. Cloud computing

Research shows the two key factors shaping the decision to purchase online are utility and trust. Select one: True False

True

SaaS and PaaS providers can typically provide services at lower costs through scale economies. Select one: True False

True

Which of the following is not part of the LAMP open source web development model? Select one: a. Microsoft IIS b. Apache c. PHP d. Linux

a. Microsoft IIS

What is the primary revenue model for an e-distributor? Select one: a. sales b. subscription c. advertising d. transaction fee

a. sales

All of the following are simple steps for optimizing web page content except: Select one: a. reducing unnecessary HTML comments. b. using more efficient graphics. c. segmenting computer servers to perform dedicated functions. d. avoiding unnecessary links to other pages on the site.

c. segmenting computer servers to perform dedicated functions.

Which of the following is not a concern about IoT? Select one: a. security b. privacy c. the falling cost of sensors d. interoperability

c. the falling cost of sensors

The existence of many competitors in any one market segment may indicate: Select one: a. no one firm has differentiated itself within that market. b. an untapped market niche. c. the market is saturated. d. a market that has already been tried without success

c. the market is saturated.

All of the following either currently, or have plans to, offer Internet access via satellite except: Select one: a. Facebook b. Boeing c. Dish d. Microsoft

d. Microsoft

The layer of Internet architecture that ties the applications to the communications network and includes security and authentication services is called the: Select one: a. Transport Services and Representation Standards layer. b. Applications layer. c. Network Technology Substrate layer. d. Middleware Services layer.

d. Middleware Services layer.

Which of the following is a programming language introduced by Apple specifically for developing iOS applications? Select one: a. C b. C++ c. Objective-C d. Swift

d. Swift

The web server software used has a significant impact on how a website's web pages look on a user's computer. Select one: True False

false

Which of the following is based on the idea of complete price transparency in a perfect information marketplace? Select one: A. price discrimination B. the Law of One Price C. versioning D. dynamic pricing

B. the Law of One Price

Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users? Select one: A. information density B. universal standards C. ubiquity D. richness

B. universal standards

The Nike iD program is an example of which of the following marketing techniques? Select one: A. price discrimination B. permission marketing C. customer co-production D. transactive content

C. customer co-production

The overall rate of online credit card fraud is ________ of all online card transactions. Select one: A. around 10% B. around 5% C. less than 1% D. around 15%

C. less than 1%

All of the following are "traditional" online marketing tools except: Select one: A. affiliate marketing. B. e-mail and permission marketing. C. social marketing. D. sponsorship marketing.

C. social marketing.

What kinds of ads have the lowest CTR? Select one: A. e-mails to an in-house list B. video ads C. social network display ads D. banner display ads

D. banner display ads

The major technologies used with wireless local area networks are: Select one: a. WiMax and 3G. b. Bluetooth and 3G. c. Wi-Fi and WiMax. d. Wi-Fi and Bluetooth.

d. Wi-Fi and Bluetooth.

Slow followers are sometimes more successful than first movers. Select one: True False

True

The Internet of Things (IoT) is based on sensors that can collect data and connect to the Internet. Select one: True False

True

The term latency refers to a delay that can be experienced in packet-switched networks. Select one: True False

True

________ and ________ are typically the most easily identifiable aspects of a company's business model.

Value proposition; revenue model

Which of the following statements about cloud computing is not true? Select one: a. A public cloud is typically used by companies with stringent privacy and security requirements. b. A private cloud may be hosted internally or externally. c. Dropbox is an example of a public cloud. d. Hybrid clouds offer both public and private cloud options.

a. A public cloud is typically used by companies with stringent privacy and security requirements.

The Web runs in which layer of Internet architecture? Select one: a. Applications layer b. Network Technology Substrate layer c. Transport Services and Representation Standards layer d. Middleware Services layer

a. Applications layer

A ________ refers to a competitive strategy in which firms attempt to achieve lower business process costs.

c. strategy of cost competition

According to Ponemon Institute's 2017 survey, which of the following was not among the causes of the most costly cybercrimes? Select one: A. malicious code B. malicious insiders C. denial of service D. botnets

D. botnets

Today, online bill payment accounts for ________ of all bill payments, while paper checks account for ________. Select one: A. about 25%; about 10% B. about 95%; about 5% C. less than 10%; less than 25% D. more than 55%; less than 20%

D. more than 55%; less than 20%

View-to-cart ratio is a measure of the: Select one: A. percentage of shoppers who do not return within a year after their initial purchase. B. percentage of existing customers who continue to buy on a regular basis. C. percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages. D. percentage of views that lead to an add-to-cart action

D. percentage of views that lead to an add-to-cart action

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: Select one: A. browser parasite. B. a backdoor. C. adware. D. spyware.

D. spyware.

PCI-DSS is a standard established by which of the following? Select one: A. the banking industry B. the retail industry C. the federal government D. the credit card industry

D. the credit card industry

The highest amount of online advertising spending is for online video ads. Select one: True False

False

Transaction logs are built into client software. Select one: True False

False

Online traffic is driven by offline brands and shopping. Select one: True False

True

Consumers tend to look at native ads more frequently than they look at display ads. Select one: True False

True

E-commerce has increased price competition in many markets. Select one: True False

True

HTTP/2 is supported by almost all the leading web browsers. Select one: True False

True

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

firewall

Native web apps need to be developed for different mobile platforms. Select one: True False

true

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software. Select one: True False

true

Which of the following is not true about the mobile platform? Select one: a. Most smartphones use Intel chips. b. Smartphones use flash memory chips. c. Most smartphones use either Google's Android or Apple's iOS operating systems. d. Smartphones and tablet computers are the primary means to access the Internet, both in the United States and worldwide.

a. Most smartphones use Intel chips.

The concept of a "sprint" is related to which of the following development methodologies? Select one: a. Scrum b. component-based development c. DevOps Apache d. prototyping

a. Scrum

Which of the following does not use a subscription revenue model? Select one: a. Twitter b. Apple Music c. Ancestry d. eHarmony

a. Twitter

What are the two most important management challenges in building a successful e-commerce presence? Select one: a. developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives b. having an accurate understanding of your business environment and an achievable business plan c. identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site d. building a team with the right skill sets and closely managing the development process

a. developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

Which of the following basic system functionalities is used to display goods on a website? Select one: a. digital catalog b. customer database system c. product database d. shopping cart system

a. digital catalog

All of the following may lead to a competitive advantage except: Select one: a. fewer products. b. better employees. c. superior products. d. less expensive suppliers.

a. fewer products.

Which of the following is not a variation of the e-tailer business model? Select one: a. market creator b. bricks-and-clicks c. virtual merchant d. manufacturer-direct

a. market creator

Which of the following factors is not a significant influence on a company's competitive environment? Select one: a. the availability of supportive organizational structures b. how many competitors are active c. what the market share of each competitor is d. how competitors price their products

a. the availability of supportive organizational structures

Which of the following is the most popular web browser? Select one: a. Internet Explorer b. Chrome c. Safari d. Firefox

b. Chrome

Which of the following is a simple but powerful method for strategizing about a business? Select one: a. benchmarking b. SWOT analysis c. DevOps d. SLDC

b. SWOT analysis

Which of the following would you use to verify that links on web pages are valid? Select one: a. data capture tools b. HTTP c. site management tools d. FTP

c. site management tools

Which element of the business model refers to the presence of substitute products in the market? Select one: a. value proposition b. competitive environment c. competitive advantage d. market opportunity

b. competitive environment

The primary way a website is able to personalize the content presented to a visitor is through the use of: Select one: a. accessibility rules. b. cookies. c. site management tools. d. privacy policies.

b. cookies.

The ________ allows a natural language expression, such as Google.com to represent a numeric IP address. Select one: a. uniform resource locator system b. domain name system c. assigned numbers and names (ANN) system d. Internet protocol addressing schema

b. domain name system

The Transport Layer of TCP/IP is responsible for which of the following? Select one: a. providing a variety of applications with the ability to access the services of the lower layers b. providing communication with the application by acknowledging and sequencing the packets to and from the application c. addressing, packaging, and routing messages d. placing packets on and receiving them from the network medium

b. providing communication with the application by acknowledging and sequencing the packets to and from the application

Which of the following are central directories that list all domain names currently in use for specific domains? Select one: a. client servers b. root servers c. Web servers d. DNS servers

b. root servers

A template test is a form of which type of testing? Select one: a. acceptance testing b. unit testing c. A/B testing d. system testing

c. A/B testing

Which of the following is not considered a portal? Select one: a. MSN b. Yahoo c. Amazon d. AOL

c. Amazon

Django is based on which of the following? Select one: a. Ruby on Rails b. Perl c. Python d. PHP

c. Python

The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called: Select one: a. IP. b. VTP. c. VoIP. d. IPTP.

c. VoIP.

Which of the following verifies that the business objectives of the system are in fact working? Select one: a. unit testing b. implementation testing c. acceptance testing d. system testing

c. acceptance testing

Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture? Select one: a. IPv6 b. fiber optics c. client/server computing d. Wi-Fi

c. client/server computing

Ariba is an example of a________. Select one: a. portal b. e-distributor c. e-procurement firm d. Industry consortium

c. e-procurement firm

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called: Select one: a. routing. b. the Transmission Control Protocol. c. packet switching. d. the File Transfer Protocol.

c. packet switching.

Which of the following monitors and controls access to a main web server, and implements firewall protection? Select one: a. groupware server b. mail server c. proxy server d. list server

c. proxy server


Conjuntos de estudio relacionados

Healthy Living Cal Poly KINE 250 Quiz 3

View Set

Chapter 10 Section 1 - Weathering

View Set

Chapter 4 ~ Atoms and Elements ~ Chapter Review

View Set

Physics Honors Midterm Study Guide

View Set