ICS 392 Final
Which of the following basic system functionalities is used to display goods on a Web site? a. customer database system b. digital catalog c. shopping cart system d. showcase database
digital catalog
All of the following are examples of business-to-business (B2B) business models except: A) e-distributors. B) exchanges. C) e-procurement. D) e-tailers.
e-tailers.
Which of the following help convert URLs into IP addresses? A) client servers B) DNS servers C) Web servers D) root servers
DNS Servers
The major technologies used with wireless local area networks are: A) Wi-Fi and WiMax. B) Bluetooth and 3G. C) WiMax and 3G. D) Wi-Fi and Bluetooth.
Wi-Fi and Bluetooth.
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network. A) proxy server B) PPTP C) virtual private network D) firewall
firewall
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. A) Availability B) Nonrepudiation C) Authenticity D) Confidentiality
Authenticity
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: A) a backdoor. B) adware. C) spyware. D) botnet
spyware.
________ refers to the ability to ensure that e-commerce participants do not deny their online actions. A) Nonrepudiation B) Privacy C) Authenticity D) Availability
Nonrepudiation
Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years? A. Copyright law B. Trademark law C. Patent law D. Trade secret law
Patent law
The ________ allows a natural language expression, such as Google.com to represent a numeric IP address. A) domain name system B) TCP/IP C) packet switching system D) Internet Layer of TCP/IP
domain name system
In developing an e-commerce presence, what questions must be asked and answered about the firm's target audience? A. who is the target audience and where can they best be reached? B. which hardware platform will be the most cost effective and fastest? C. when do prefer to shop and why?
who is the target audience and where can they best be reached?
________ typically attack governments, organizations, and sometimes individuals for political purposes. A) Grey hats B) White hats C) Crackers D) Hacktivists
Hacktivists
Which of the following is the primary communications protocol for the Internet? A) FTP B) TCP/IP C) Telnet D) TLS
TCP/IP
Downloading music tracks owned by record companies without paying for them is an example of a violation of: A. Copyright law B. Trademark law C. Patent law D. privacylaw
Copyright law
Which of the following is an example of C2C e-commerce? A) Groupon B) Amazon C) Go2Paper D) Craigslist
Craigslist
An IPv4 address is expressed as a: A) 128-bit number that appears as a series of four separate numbers separated by periods. B) 32-bit number that appears as a series of four separate numbers separated by periods. C) 4-bit number that appears as a series of four separate numbers separated by semicolons. D) 64-bit number that appears as a series of four separate numbers separated by semicolons.
32-bit number that appears as a series of four separate numbers separated by periods.
Which of the following protects original forms of expression in a tangible medium? A. PATENT LAW B. Trade secret law C. Copyright law D. Trademark law
Copyright law
Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers? network effect disintermediation friction-free commerce first mover advantage
Disintermediation
What is the first step in analyzing an ethical dilemma? A. Identify the potential consequences of your opinions. B. Define the conflict or dilemma and identify the higher-order values involved C. Identify and describe the facts. D. Identify the options you can reasonably take.
Identify and describe the facts.
Which of the following statements about net neutrality is true? A) The FCC now regulates ISP pricing but only offers guidelines on advertising. B) Net neutrality requires that all data be treated in the same manner. C) Net neutrality requires that no data be treated in the same manner. D) The FCC now regulates ISP pricing and advertising.
Net neutrality requires that all data be treated in the same manner.
Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture? A. Accountability B. Privacy C. Liability D. Responsibility
Privacy
The total number of users or customers an e-commerce business can obtain is a measure of which of the following? A) reach B) ubiquity C) interactivty D) information density
Reach
Which of the following are Amazon's primary value propositions? A) management of product labeling B) selection and convenience C) increasing price discovery cost D) personalization and customization
Selection and convenience
Which of the following is not an example of malicious code? A) bot B) scareware C) sniffer D)Trojan horse
Sniffer
Which of the following can be used to record all keyboard activity of a user? A> Shopping carts B> trusted computing environment C> Spyware D> DRM
Spyware
eBay uses all of the following business models except: A) C2C market creator. B) e-commerce infrastructure provider. C) B2C market creator. D) content provider.
content provider.
All of the following are basic functionality provided by e-commerce merchant server software except: A. credit card processing. B. a product catalog. C. a shopping cart. D. productivity software.
productivity software
Which of the following is a set of rules for transferring data? A) an IP address B) a router C) a packet D) a protocol
protocol
A firm's ________ describes how a firm will produce a superior return on invested capital. A) competitive advantage B) value proposition C)market strategy D) revenue model
revenue model
Slammer is an example of which of the following? A) Trojan horse B) worm C) botnet D) virus
worm
Which of the following involves testing a site program's modules one at a time? A. implementation testing B. acceptance testing C. system testing D. unit testing
unit testing
All of the following primarily use an advertising revenue model except: A) Google. B) Amazon. C) Yahoo. D) Twitter.
Amazon
Which of the following statements is not true? No one academic perspective dominates research about e-commerce. Economists take a purely technical approach to e-commerce. There are two primary approaches to e-commerce: behavioral and technical. Management scientists are interested in e-commerce as an opportunity to study how behavioral factors can exploit the Internet to achieve more efficient business operations.
Economists take a purely technical approach to e-commerce.
E-commerce is available just about everywhere and anytime. This is known as ________. A) richness B) ubiquity C) reach D) information density
Ubiquity
Which of the following is not an example of the bricks-and-clicks e-tailing business model? A) Sears B) Walmart C) Staples D) Zappos
Zappos
Which of the following verifies that the business objectives of the system as originally conceived are in fact working? A. system testing B. acceptance testing C. implementation testing D. unit testing
acceptance testing
The Internet Layer of TCP/IP is responsible for which of the following? A) providing communication with the application by acknowledging and sequencing the packets to and from the application B) providing a variety of applications with the ability to access the services of the lower layers C) addressing, packaging, and routing messages D) placing packets on and receiving them from the network medium
addressing, packaging, and routing messages
Stickiness is a more important attribute for which of the following revenue models? A) sales revenue model B) advertising revenue model C) transaction fee revenue model D) subscription revenue model
advertising revenue model
A fingerprint scan is an example of which of the following? A) firewall B) biometrics C) IDS D) encryption
biometrics
Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service? A) subscription revenue model B) freemium strategy C) delayed revenue model D) transaction fee strategy
freemium strategy
Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as: A) incubators. B) venture capital investors. C) angel investors. D) crowdfunders.
incubators.
Which of the following refers to any disparity in relevant market information among parties in a transaction? A) competitive inequity B) imperfect competition C) data discrepancy D) information asymmetry
information asymmetry
Which of the following are the two main components of a systems design? A. front-end systems and back-end systems B. behavioral design and technological design C. logical design and physical design D. business objectives and technology requirements
logical design and physical design
Registering a domain name (URL) similar or identical to trademarks of others to extort profits from legitimate holders is an example of: A> Metatagging B> Cybersquatting C> Cyberpiracy D> Framing
Cyberpiracy
Which of the following is not a main factor in determining the overall demand on an e-commerce site? nature of customer requests A. nature of customer requests B. whether content is dynamic or static C. number of simultaneous users in peak periods D. file sizes of Web pages being served
file sizes of Web pages being served
All of the following are factors that will be considered in determining whether use of copyrighted material is fair use except the: A. amount of the work used. B. nature of the work used. C. market effect of the use. D. free availability of the work on Netflix or Hulu
free availability of the work on Netflix or Hulu
Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship? A) mobile e-commerce B) business-to-business (B2B) C) social e-commerce D) consumer-to-consumer (C2C)
mobile e-commerce
The process of slicing digital messages into containers, sending them along different communication paths as they become available, and reassembling them at the destination point is called: A) endpoint cutting. B) the Hypertext Transfer Protocol. C) packet switching. D) the Internet Protocol.
packet switching.
All of the following are parts of business models employed in the online music industry except: A) cloud streaming. B) peer-to-peer streaming. C) download-and-own. D) subscription.
peer-to-peer streaming.
Which of the following details the actual hardware components to be used in a system? A. system module detail plan B. physical design C. logical design D. system functionalities plan
physical design
Which of the following are specialized computers that interconnect the thousands of computers that make up the Internet in order to transmit message parcels along available communication paths and on to their destinations? A) IP clients B) Web hosts C) routers D) Internet Layer of TCP/IP
routers
Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers? A. mobile apps B. web site C. offline media D. social media
social media
A digital certificate contains all of the following except the: A) subject's private key. B) digital signature of the certification authority. C) digital certificate serial number. D) subject's public key.
subject's private key.
In order from beginning to end, the major steps in the SDLC are: a. systems analysis/planning; systems design; building the system; testing; and implementation. b. systems analysis/planning; systems design; building the system; implementation; and testing c. stems design; testing; building the system; and implementation d. systems analysis/planning; implementation; building the system; and testing
systems analysis/planning, systems design, building the system, testing, and implementation.
Above all, e-commerce is a ________ phenomenon. technology driven finance-driven sociological government-driven
technology driven
What is the most frequent cause of stolen credit cards and card information today? A) lost cards B) botnets attacks C) sniffing programs D) the hacking and looting of corporate servers storing credit card information
the hacking and looting of corporate servers storing credit card information
Which of the following is a characteristic of the Reinvention phase of e-commerce? A) the use of mobile platforms B) the widespread adoption of broadband networks C) the massive proliferation of dot-com start-ups D) the rapid growth of search engine advertising
the use of mobile platforms
E-commerce can be defined as: A) the use of any Internet technologies in a firm's daily activities. B) the use of the Internet, the Web, and mobile apps to transact business. C) the digital enablement of transactions and processes within an organization. D) any digitally enabled transactions among individuals and organizations.
the use of the Internet, the Web, and mobile apps to transact business.
All of the following are true about iPhone apps except: A) Apple's goal of offering apps is to increase sales of iPhones, iPads, and iPods. B) over 100 billion have been downloaded. C) they are made for Android KitKat devices. D) they are distributed through Apple's App Store.
they are made for Android KitKat devices.