MISY 5350 E- Commerce Chapter 1-5

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

In the United States, about ________ of Internet traffic now occurs over Internet Protocol version 6 (IPv6).

45%

The Data Encryption Standard uses a(n) ________-bit key. A) 8 B) 56 C) 256 D) 512

56

7) ________ refers to the ability to ensure that messages and data are only available to those authorized to view them. A) Confidentiality B) Integrity C) Privacy D) Availability

A

A digital certificate contains all of the following except the: A) subject's private key. B) subject's public key. C) digital signature of the certification authority. D) digital certificate serial number.

A

A(n) ________ is a Web application that allows users to easily add and edit content on a Web page. A) wiki B) podcast C) blog D) RSS feed

A

All of the following can be considered a precursor to e-commerce except: A) the development of the smartphone. B) Baxter Healthcare's PC-based remote order entry system. C) the French Minitel. D) the development of Electronic Data Interchange standards.

A

All of the following statements about e-commerce in the US in 2020 are true except: A) Social e-commerce generates more revenue than mobile e-commerce. B) About 200 million U.S. consumers use mobile apps. C) On-demand service firms are fueling the growth of local e-commerce. D) Growth rates for retail e-commerce are higher in Europe than in the United States.

A

Business-to-consumer (B2C) e-commerce in the United States: A) has grown at double-digit rates between 2010 and 2020. B) has less revenue than C2C e-commerce. C) now constitutes over 50% of the overall U.S. retail market. D) is growing more slowly as it confronts its own fundamental limitations.

A

Confidentiality is sometimes confused with: A) privacy. B) authenticity. C) integrity. D) nonrepudiation.

A

E-commerce can be defined as: A) the use of the Internet, the Web, and mobile apps to transact business. B) the use of any Internet technologies in a firm's daily activities. C) the digital enablement of transactions and processes within an organization. D) any digitally enabled transactions among individuals and organizations.

A

In order from beginning to end, the major steps in the SDLC are: A) systems analysis/planning; systems design; building the system; testing; and implementation. B) systems design; testing; building the system; and implementation. C) systems analysis/planning; systems design; building the system; implementation; and testing. D) systems analysis/planning; implementation; building the system; and testing.

A

PayPal is an example of which of the following types of payment system? A) online stored value payment system B) digital checking system C) accumulating balance system D) digital credit card system

A

The ________ helps define the overall structure of the Internet. A) IAB B) IESG C) W3C D) ITU

A

The early years of e-commerce were driven by all of the following factors except: A) an emphasis on exploiting traditional distribution channels. B) a huge infusion of venture capital funds. C) an emphasis on quickly achieving very high market visibility. D) visions of profiting from new technology.

A

The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called: A) VoIP. B) IPTP. C) VTP. D) IP.

A

Which of the following are specialized computers that interconnect the thousands of computers that make up the Internet in order to transmit message parcels along available communication paths and on to their destinations? A) routers B) Web servers C) IP servers D) packet servers

A

Which of the following are the two main components of a systems design? A) logical design and physical design B) behavioral design and technological design C) business objectives and technology requirements D) front-end systems and back-end systems

A

Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text? A) richness B) ubiquity C) information density D) personalization

A

Which of the following is a set of rules for transferring data? A) protocol B) packet C) router D) IP address

A

Which of the following is an example of e-business? A) Amazon's inventory control system B) the Amazon.com Web site C) an Amazon mobile app D) Amazon's Pinterest page

A

Which of the following is not a concern about IoT? A) the high (falling) cost of sensors B) interoperability C) security D) privacy

A

Which of the following is not a key factor for establishing e-commerce security? A) data integrity B) technology C) organizational policies D) laws and industry standards

A

Which of the following is rarely used today, due to security concerns. A) Telnet B) TCP C) SFTP D) SSL

A

Which of the following protocols is used to send mail to a server? A) SMTP B) FTP C) HTTP D) SSL

A

Which of the following refers to any disparity in relevant market information among parties in a transaction? A) information asymmetry B) unfair competitive advantage C) imperfect competition D) dynamic pricing

A

Which of the following statements about cloud computing is not true? A) A public cloud is typically used by companies with stringent privacy and security requirements. B) Dropbox is an example of a public cloud. C) Hybrid clouds offer both public and private cloud options. D) A private cloud hosted internally or externally.

A

________ is a utility program that allows you to check the connection between your client and a TCP/IP network. A) Ping B) Telnet C) Tracert D) Finger

A

________ refers to the ability to ensure that e-commerce participants do not deny their online actions. A) Nonrepudiation B) Authenticity C) Availability D) Integrity

A

Which of the following is not an advantage of client/server computing over centralized mainframe computing?

A) Each client added to the network increases the network's overall capacity and transmission speeds.

In the ________ business model, a web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products, and establish prices.

A) market creator

Which of the following is a server-side technique that detects the attributes of the device making the request, and using predefined templates, loads a version of a site optimized for the device?

AWD

Which of the following is not considered a portal? A) Yahoo B) MSN C) Amazon D) AOL

Amazon

Which of the following uses a subscription revenue model for books?

Amazon Kindle Unlimited

A perfect market is one in which: A) there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production. B) one firm develops an advantage based on a factor of production that other firms cannot purchase. C) one participant in the market has more resources than the others. D) competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage.

Answer: A

If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would: A) enable individual customization of the product by consumers. B) implement a strategy of commoditization. C) adopt a strategy of cost competition. D) develop a scope strategy to compete within a narrower market segment.

Answer: A

In general, the key to becoming a successful content provider is to: A) own the content being provided. B) own the technology by which content is created, presented, and distributed. C) provide online content for free. D) provide other services as well as online content.

Answer: A

Stickiness is an important attribute for which revenue model? A) advertising revenue model B) subscription revenue model C) transaction fee revenue model D) sales revenue model

Answer: A

Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time? A) global reach B) richness C) interactivity D) personalization

Answer: A

Which of the following gives a business model the most credibility with outside investors? A) the firm's management team B) the firm's value proposition C) the firm's market opportunity D) the firm's market strategy

Answer: A

Which of the following is an unfair competitive advantage? A) brand name B) access to global markets C) lower product prices D) superior technology

Answer: A

A firm's ________ describes how a firm will produce a superior return on invested capital. A) value proposition B) revenue model C) market strategy D) competitive advantage

Answer: B

All of the following are business models employed by the music industry except: A) subscription. B) peer-to-peer streaming. C) download-and-own. D) cloud streaming.

Answer: B

Which element of the business model examines who else occupies the firm's intended marketspace? A) value proposition B) competitive environment C) competitive advantage D) market strategy

Answer: B

Which of the following are Amazon's primary value propositions? A) personalization and customization B) selection and convenience C) reduction of price discovery cost D) management of product delivery

Answer: B

Which of the following companies utilizes a transaction fee revenue model? A) WSJ.com B) E*Trade C) Twitter D) Sears.com

Answer: B

Which of the following is not a primary activity in a firm value chain? A) inbound logistics B) finance/accounting C) operations D) sales and marketing

Answer: B

________ and ________ are typically the most easily identifiable aspects of a company's business model. A) Market strategy, market opportunity B) Value proposition, revenue model C) Value proposition, competitive environment D) Revenue model, market strategy

Answer: B

A ________ coordinates a firm's suppliers, distributors, and delivery firms with its own production needs using an Internet-based supply chain management system. A) value chain B) value system C) value web D) business strategy

Answer: C

All of the following are key elements of a business model except: A) competitive environment. B) organizational development. C) information technology strategy. D) market strategy.

Answer: C

All of the following may lead to a competitive advantage except: A) less expensive suppliers. B) better employees. C) fewer products. D) superior products.

Answer: C

Grainger.com is an example of which of the following business models? A) B2B service provider B) exchange C) e-distributor D) industry consortia

Answer: C

Organizations that provide not only funding but also an array of services to start-up companies are referred to as: A) angel investors. B) crowdfunders. C) incubators. D) venture capital investors.

Answer: C

Which of the following factors is not a significant influence on a company's competitive environment? A) how many competitors are active B) what the market share of each competitor is C) the availability of supportive organizational structures D) how competitors price their products

Answer: C

Which of the following is not a variation of the e-tailer business model? A) bricks-and-clicks B) virtual merchant C) market creator D) manufacturer-direct

Answer: C

Which of the following is not an example of the bricks-and-clicks e-tailing business model? A) Walmart.com B) Target C) Blue Fly D) Staples.com

Answer: C

________ create and sell access to digital electronic markets Ariba Supplier Network is an example of this. A) E-distributors B) Portals C) E-procurement firms D) Market creators

Answer: C

eBay uses all of the following business models except: A) B2C market creator. B) C2C market creator. C) content provider. D) e-commerce infrastructure provider.

Answer: C

portals primarily generate revenue in all of the following ways except: A) charging advertisers for ad placement. B) collecting transaction fees. C) sales of goods. D) charging subscription fees.

Answer: C

58) Your startup firm has developed Web-based note-taking software that allows participants to create and share virtual notes attached to existing Web pages. You anticipate marketing your online application to Web development and design companies. Which of the following revenue models is the most appropriate for your new company? A) advertising B) transaction fee C) affiliate D) subscription

Answer: D

65) A strategy designed to compete within a narrow market or product segment is called a ________ strategy. A) scope B) differentiation C) cost D) focus

Answer: D

A business document that specifically details how you plan on selling your product and find new customers is called a: A) sales analysis. B) business plan. C) competitive strategy. D) market strategy.

Answer: D

Which element of the business model addresses the question of why a customer should buy from the firm? A) revenue model B) competitive advantage C) market strategy D) value proposition

Answer: D

Which of the following is an example of the affiliate revenue model? A) Yahoo B) eBay C) Gap.com D) MyPoints

Answer: D

Which type of investor typically becomes interested in a start-up company after it has begun generating revenue? A) incubators B) angel investors C) crowdfunders D) venture capital investors

Answer: D

The leading web server software is: A) Apache. B) Microsoft Internet Information Server. C) Sun Solaris. D) Google Enterprise Server.

Apache

________ are a kind of middleware software that provides the glue connecting traditional corporate systems to the customer as well as all the functionality needed to conduct e-commerce.

Application servers

6) Which of the following is an example of an online privacy violation? A) your e-mail being read by a hacker B) your online purchasing history being sold to other merchants without your consent C) your computer being used as part of a botnet D) your e-mail being altered by a hacker

B

All of the following statements about public key cryptography are true except: A) public key cryptography uses two mathematically related digital keys. B) public key cryptography ensures authentication of the sender. C) public key cryptography does not ensure message integrity. D) public key cryptography is based on the idea of irreversible mathematical functions.

B

The Internet Layer of TCP/IP is responsible for which of the following? A) placing packets on and receiving them from the network medium B) addressing, packaging, and routing messages C) providing communication with the application by acknowledging and sequencing the packets to and from the application D) providing a variety of applications with the ability to access the services of the lower layers

B

The backbone of the Internet is formed by: A) Internet Exchange Points (IXPs). B) Tier 1 ISPs. C) Network Access Points (NAPs). D) Metropolitan Area Exchanges (MAEs).

B

The first Web browser to make it possible to view documents on the Web with colored background, images, and animations was: A) Netscape Navigator. B) Mosaic. C) Mozilla. D) Internet Explorer.

B

The layer of Internet architecture that ties the applications to the communications network and includes such services as security and authentication is called the: A) Network Technology Substrate layer. B) Middleware Services layer. C) Transport Services and Representation Standards layer. D) Applications layer.

B

The term stateless refers to the fact that: A) no one government entity controls the Internet. B) the server does not have to maintain an ongoing dedicated interaction with the client computer. C) system performance degrades as more simultaneous users require service. D) Web servers may maintain multiple instances of server software to handle requests.

B

Where does TLS operate within TCP/IP? A) between the Internet Layer and the Transport Layer B) between the Transport Layer and the Application Layer C) between the Network Interface Layer and the Transport Layer D) between the Internet Layer and the Application Layer

B

Which of the following are central directories that list all domain names currently in use for specific domains? A) Web servers B) root servers C) client servers D) DNS servers

B

Which of the following has not been the subject of concern about its increasing market dominance in 2020-2021? A) Amazon B) Netflix C) Google D) Facebook

B

Which of the following is a Web application that enables Internet users to communicate with each other, although not in real time? A) mobile messaging B) online forum C) SMS messaging D) VoIP

B

Which of the following is a physical place you visit in order to transact? A) marketspace B) marketplace C) social network D) the Internet

B

Which of the following is an example of an e-commerce first mover that failed? A) Etsy B) eToys C) eBay D) E*Trade

B

Which of the following is not an element of friction-free commerce? A) Information is equally distributed. B) Transaction costs are high. C) Prices can be dynamically adjusted to reflect actual demand. D) Unfair competitive advantages are eliminated.

B

Which of the following is not one of the basic technological foundations of the Internet? A) client/server computing B) FTP C) TCP/IP D) packet switching

B

Which of the following is not true about the use of apps? A) The average U.S. consumer spends over two hours a day using apps. B) Users still spend less time using apps than they do using desktops or mobile Web sites. C) Apps are easier to control and monetize than Web sites. D) Around 280 million people worldwide launch a smartphone app more than 60 times a day.

B

Which of the following is not true about the use of apps? A) Users spend nearly 90% of their smartphone app minutes using their top five apps. B) Users still spend more time using mobile browsers than they do using mobile apps. C) Apps are easier to control and monetize than websites. D) Users typically use about 20 different apps per month.

B

Which of the following is the best definition of transaction cost? A) the expense of changing national or regional prices B) the cost of participating in a market C) the cost of finding suitable products in the market D) the cost merchants pay to bring their goods to market

B

Which of the following is the minimum system architecture requirement for an e-commerce Web site that processes orders? A) single-tier architecture B) two-tier architecture C) three-tier architecture D) multi-tier architecture

B

Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers? A) network effect B) disintermediation C) friction-free commerce D) first mover advantage

B

Which of the following statements about blockchain is not true? A) A blockchain system is composed of a distributed network of computers. B) A blockchain system is inherently centralized. C) A blockchain system is a transaction processing system. D) Cryptocurrencies are based on blockchain technology.

B

Which of the following terms can be considered synonymous with the term e-commerce? A) e-business B) digital commerce C) the Internet D) the Web

B

Which of the following typically includes a data flow diagram to describe the flow of information for an e-commerce site? A) physical design B) logical design C) testing plan D) co-location plan

B

Which of the following was the original "killer app" that made the Internet commercially interesting and extraordinarily popular? A) e- commerce B) the Web C) social network D) mobile apps

B

Which of the following was the original purpose of the Internet? A) to provide a network that would allow businesses to connect with consumers B) to link large mainframe computers on different college campuses C) to develop a military communications systems that could withstand nuclear war D) to enable government agencies to track civilian communications

B

________ are the types of information systems capabilities needed to meet business objectives. A) Information requirements B) System functionalities C) System design specifications D) Physical design specifications

B

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. A) Nonrepudiation B) Authenticity C) Availability D) Integrity

B

The address used by a browser to identify the location of content on the Web is called: A) a domain name. B) a uniform resource locator. C) an IP address. D) a file path.

B (URL)

Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet?

BGP

Which of the following is not a community provider? A) LinkedIn B) Facebook C) Blue Nile D) Pinterest

Blue Nile

38) TCP/IP operates in which layer of Internet architecture? A) Network Technology Substrate layer B) Middleware Services layer C) Transport Services and Representation Standards layer D) Applications layer

C

All of the following are examples of an open source content management system (CMS) except: A) Joomla. B) Drupal. C) Dreamweaver CC. D) WordPress.

C

All of the following are examples of social networks except: A) Instagram. B) Twitter. C) Y Combinator. D) Pinterest.

C

All of the following are steps one can take to right-size a Web site's hardware platform and meet demands for service except: A) scaling hardware vertically. B) scaling hardware horizontally. C) replacing static pages with dynamically generated pages. D) improving processing architecture.

C

All of the following statements about PKI are true except: A) the term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties. B) PKI is not effective against insiders who have a legitimate access to corporate systems including customer information. C) PKI guarantees that the verifying computer of the merchant is secure. D) the acronym PKI stands for public key infrastructure.

C

All the following statements about symmetric key cryptography are true except: A) in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message. B) the Data Encryption Standard is a symmetric key encryption system. C) symmetric key cryptography is computationally slower. D) symmetric key cryptography is a key element in digital envelopes.

C

E-commerce is available just about everywhere and anytime. This is known as ________. A) richness B) information density C) ubiquity D) reach

C

In which year can e-commerce be said to have begun? A) 1983 B) 1985 C) 1995 D) 2001

C

Most of the time required to maintain an e-commerce site is spent on: A) debugging code. B) responding to emergency situations. C) general administration and making changes and enhancements to the system. D) changes in reports, data files, and links to backend databases.

C

The Transport Layer of TCP/IP is responsible for which of the following? A) placing packets on and receiving them from the network medium B) addressing, packaging, and routing messages C) providing communication with the application by acknowledging and sequencing the packets to and from the application D) providing a variety of applications with the ability to access the services of the lower layers

C

The ________ allows a natural language expression, such as Google.com to represent a numeric IP address. A) uniform resource locator system B) Internet protocol addressing schema C) domain name system D) assigned numbers and names (ANN) system

C

The costs incurred by merchants in having to change product prices (such as the costs of reentering prices into computer systems) are referred to as which of the following? A) subscription costs B) fixed costs C) menu costs D) variable costs

C

The total number of users or customers an e-commerce business can obtain is a measure of which of the following? A) ubiquity B) interactivity C) reach D) information density

C

Which of the following features of e-commerce technology is related to the concept of network externalities? A) richness B) interactivity C) universal standards D) information density

C

Which of the following helps you engage your customers in a conversation? A) shopping cart B) product database C) on-site blog D) site tracking and reporting system

C

Which of the following is a characteristic of e-commerce during the Invention period? A) mobile technology B) earnings and profit emphasis C) disintermediation D) extensive government surveillance

C

Which of the following is a characteristic of the Consolidation phase of e-commerce? A) predominance of pure online strategies B) emphasis on revenue growth versus profits C) brand extension and strengthening becomes more important than creating new brands D) shift to a technology-driven approach

C

Which of the following is not a unique feature of e-commerce technology? A) interactivity B) social technology C) information asymmetry D) richness

C

Which of the following is the core communications protocol for the Internet? A) Telnet B) FTP C) TCP/IP D) TLS

C

Which of the following statements about the mobile platform is not true? A) Retail m-commerce purchases were expected to reach about $315 billion in 2020. B) A) In 2020, about 93% of Internet users in the United States used a mobile device to access the internet at least some of the time. C) Over 235 million individuals in the United States used tablet computer apps in 2020. D) Adult mobile U.S. Internet users spend an average of three-and-a-half hours per day within apps in 2020.

C

Which of the following statements is not true? A) Information asymmetries are continually being introduced by merchants and marketers. B) Intermediaries have not disappeared. C) Overall transaction costs have dropped dramatically. D) Brands remain very important in e-commerce.

C

Which of the following statements is not true? A) A majority of states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred. B) The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers. C) The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates. The Federal Trade Commission has asserted that it has authority over corporations' data security practices

C

Which of the following statements is true about the traditional tradeoff between the richness and reach of a marketing message prior to the development of the Web? A) Marketing messages had little richness. B) The smaller the audience reached, the less rich the message. C) The larger the audience reached, the less rich the message. D) Richness was unrelated to reach.

C

Which of the following types of sites typically needs a high percentage of secure pages? A) Web services B) customer self-service C) trading D) publishing/subscription

C

Which of the following was the first truly large-scale digitally enabled transaction system in the B2C arena? A) Telex B) the Baxter Healthcare system C) the French Minitel D) EDI

C

Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship? A) consumer-to-consumer (C2C) B) social e-commerce C) mobile e-commerce D) business-to-business (B2B)

C

________ refers to the ability to ensure that an e-commerce site continues to function as intended. A) Nonrepudiation B) Authenticity C) Availability D) Integrity

C

Which of the following technologies is used to separate the design and presentation of content from the content creation process? Example is MySQL

CMS

Which of the following is currently the most popular Web browser? A) Internet Explorer B) Safari C) Chrome D) Firefox

Chrome

A template test is a form of which type of testing? A) unit testing B) system testing C) acceptance testing D) A/B testing

D

All of the following are methods of securing channels of communication except: A) TLS. B) digital certificates. C) VPN. D) FTP.

D

All of the following were visions of e-commerce expressed during the early years of e-commerce except: A) a nearly perfect information marketspace. B) friction-free commerce. C) disintermediation. D) fast follower advantage.

D

Interactivity in the context of e-commerce provides which of the following functionalities? A) the ability to physically touch and manipulate a product B) complexity and content of a message C) the ability of consumers to create and distribute content D) the enabling of two-way communication between consumer and merchant

D

The Web runs in which layer of Internet architecture? A) Network Technology Substrate layer B) Middleware Services layer C) Transport Services and Representation Standards layer D) Applications layer

D

Which business application is associated with the technological development of local area networks and client/server computing? A) transaction automation (e.g., payroll) B) desktop automation (e.g., word processing) C) industrial system automation (e.g., supply chain management) D) workgroup automation (e.g., document sharing)

D

Which of the following describes the basic Web policy of large firms during the Invention period? A) Integrate social networks and the mobile platform with Web site marketing. B) Emphasize the necessity for the Web to generate profits. C) Use the Web to sell complex goods and services online. D) Maintain a basic, static Web site depicting the firm's brand.

D

Which of the following details the actual hardware components to be used in a system? A) architecture plan B) system functionalities plan C) logical design D) physical design

D

Which of the following features of e-commerce technology allows users to participate in the creation of online content? A) ubiquity B) global reach C) information density D) social technology

D

Which of the following is a characteristic of the Reinvention phase of e-commerce? A) massive proliferation of dot-com start-ups B) widespread adoption of broadband networks C) rapid growth of search engine advertising D) expansion of e-commerce to include services as well as goods

D

Which of the following is a utility program that allows you to track the path of a message you send from your client to a remote computer on the Internet? A) Telnet B) Ping C) IMAP D) Tracert

D

Which of the following is an example of B2B e-commerce? A) Airbnb B) Facebook C) Groupon D) Go2Paper

D

Which of the following is an example of an integrity violation of e-commerce security? A) A website is not actually operated by the entity the customer believes it to be. B) A merchant uses customer information in a manner not intended by the customer. C) A customer denies that he or she is the person who placed the order. D) An unauthorized person intercepts an online communication and changes its contents

D

Which of the following is an example of social e-commerce? A) Amazon B) eBay C) Wikipedia D) Facebook

D

Which of the following is not a basic type of cloud computing service? A) IaaS B) PaaS C) SaaS D) FiOS

D

Which of the following is not a characteristic of a perfect competitive market? A) Price, cost, and quality information are equally distributed. B) A nearly infinite set of suppliers compete against one another. C) Customers have access to all relevant information worldwide. D) It is highly regulated.

D

Which of the following is not a major technology trend in e-commerce in 2020-2021? A) Cloud computing enables content stored on Internet-based servers to be accessed by consumer devices such as smartphones. B) Firms are turning to business analytics to make sense out of Big Data. C) Smart speakers provide an additional platform for e-commerce. D) Growth of the Internet of Things slows down.

D

Which of the following is not one of the basic business objectives for an e-commerce site? A) display goods B) execute a transaction C) provide production and supplier links D) optimize system architecture

D

Which of the following is not true regarding e-commerce today? A) Economists' visions of a friction-free market have not been realized. B) Consumers are less price-sensitive than expected. C) There remains considerable persistent price dispersion. D) The market middlemen disappeared.

D

Which of the following is one of the three primary societal issues related to e-commerce? A) liability B) anonymity C) equity D) intellectual property

D

Which of the following occurred during the Commercialization phase of Internet development? A) The fundamental building blocks of the Internet were realized in actual hardware and software. B) Mosaic was invented. C) The Domain Name System was introduced. D) NSF privatized the operation of the Internet's backbone.

D

Which of the following organizations involved with Internet governance has the United States recently announced it would give up control over? A) ICANN B) IGF C) NTIA D) IANA

D

Which of the following refers to the practice of researching a product online before purchasing it at a physical store? A) zooming B) grazing C) showrooming D) webrooming

D

You could expect to find all of the following services in a Web server software package except: A) security services. B) FTP. C) search engine. D) an RSS aggregator.

D

________ is a model of computing in computer processing, storage, software, and other services are provided as a shared pool of virtualized resources over the Internet. A) Client/server computing B) P2P computing C) Mobile computing D) Cloud computing

D

ll of the following are examples of Web 2.0 sites and applications except: A) photo-sharing sites. B) blogs. C) wikis. D) auction sites.

D

n IPv4 address is expressed as a: A) 32-bit number that appears as a series of four separate numbers separated by semicolons. B) 64-bit number that appears as a series of four separate numbers separated by semicolons. C) 64-bit number that appears as a series of four separate numbers separated by periods. D) 32-bit number that appears as a series of four separate numbers separated by periods.

D

Which of the following is not an example of an on-demand service company? A) YouTube B) Airbnb C) Tumblr D) Facebook

D. Facebook

The attack against Dyn servers is an example of a(n): A) SQL injection attack. B) Browser parasite. C) DDoS attack. D) MitM attack.

DDos attack

Which of the following technologies is aimed at reducing e-mail address spoofing and phishing? A) TLS B) WPA C) DMARC D) MFA

DMARC

An example of subscription based sales revenue model

Dollar Shave club

Which of the following statements is not true?

Economists take a purely technical approach to e-commerce.

The concept behind document formatting had its roots in which of the following?

GML

Which of the following cannot be used to retrieve objects from a database?

HTML

All of the following statements about HTML5 are true except:

HTML5 stores page content into mobile device hardware rather loading into the browser from a web server.

Which of the following IEEE standards has been labeled by the Wi-Fi Alliance as Wi-Fi 6

IEEE 802.11ax

Which of the following organizations focuses on the evolution of the Internet?

IRFT

________ is defined by a company using its competitive advantage to gain in surrounding markets

Leverage

Which of the following is not part of the LAMP open source web development model?

Microsoft IIS

Which of the following statements about fiber-optic cable is not true?

Most U.S. homes have fiber connections.

An example of a company using the content provider model is: A) Priceline. B) Netflix C) Dell. D) eBay.

Netflix

Which of the following is an example of company using the content provider model?

Netflix

Which of the following statements about responsive web design (RWD) is not true?

RWD works best for sites that have complex functionality.

Which of the following is a simple but powerful method for describing a firm's strengths and weaknesses?

Swot analysis

Which of the following is the most common protocol for securing a digital channel of communication? A) DES B) TLS C) VPN D) HTTP

TLS

All of the following can be considered examples of the market creator business model except:

Twitter

Which of the following is does not use a subscription revenue model? A) Ancestry.com B) Apple Music C) eHarmony D) Twitter

Twitter

The address used by a browser to identify the location of content on the Web is called:

Uniform Resource Locator.

All of the following are involved in the effort to create standards for IoT except

W3C

All of the following primarily use an advertising revenue model except:

Walmart

The major technologies used with wireless local area networks are:

Wi-Fi and bluetooth

Which of the following verifies that the business objectives of the system are in fact working?

acceptance testing

All of the following are important factors in search engine optimization except:

adhering to privacy policies.

According to Ponemon Institute's 2019 survey, which of the following was not among the causes of the costliest cybercrimes? A) malicious insiders B) web-based attacks C) denial of service D) botnets

botnet

Advantages of dynamic page generation include all of the following except

client-side execution of programming.

Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture?

client/server computing

Accessing data without authorization on Dropbox is an example of a: A) social network security issue. B) cloud security issue. C) mobile platform security issue. D) sniffing issue.

cloud security issue

All of the following are key design principles of responsive web design except:

coding by convention

Which of the following is a brute force attack which hackers launch via botnets and automated tools using known user name and password combinations? A) credential stuffing B) phishing C) pharming D) MitM attack

credential stuffing

6) What are the two most important management challenges in building a successful e-commerce presence?

developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

Which of the following is not an example of an access control? A) firewalls B) proxy servers C) digital signatures D) login passwords

digital signatures

Innovative entrepreneurs and their business firms that destroy existing business models are referred to as:

disruptors

Which of the following types of crowdfunding involves people making contributions to others with no expectation of any return?

donor-based crowdfunding

Malware that comes with a downloaded file requested by a user is called a: A) Trojan horse. B) backdoor. C) drive-by download. D) PUP.

drive by download

Which of the following is not an example of a potentially unwanted program (PUP)? A) adware B) browser parasite C) drive-by download D) spyware

drive by download

Another name for revenue model

financial model

Which of the following involves a company giving away a certain level of product or service without charge, but then charging a fee for premium levels of the product or service?

freemium strategy

Which of the following is the leading cause of data breaches? A) theft of a computer B) accidental disclosures C) hackers D) DDoS attacks

hackers

B2B e-commerce websites tend to serve

horizontal markets

Which dimensions of security is spoofing a threat to? A) integrity and confidentiality B) availability and authenticity C) integrity and authenticity D) availability and integrity

integrity and authenticity

Which of the following is not a key element of an elevator pitch?

legal structure

All of the following are basic functionality provided by e-commerce merchant server software except:

marketing analytics

All of the following are website design features that annoy customers except:

multi-browser functionality

All of the following are used for authentication except: A) digital signatures. B) certificates of authority. C) biometric devices. D) packet filters.

packet filters

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

packet switching

Automatically redirecting a web link to a different address is an example of which of the following? A) sniffing B) social engineering C) pharming D) DDoS attack

pharming

All of the following are examples of business-to-business (B2B) business models except:

portals

Asymmetric key cryptography is also known as: A) public key cryptography. B) secret key cryptography. C) PGP. D) PKI.

public key cryptography

The concept of a "sprint" is related to which of the following development methodologies?

scrum

All of the following are basic functionality provided by web servers except:

shopping cart

Which of the following would you use to verify that links on web pages are valid?

site management tools

Which of the following is not an example of malicious code? A) scareware B) Trojan horse C) bot D) sniffer

sniffer

Which of the following types of attacks enabled hackers to take control of the Twitter accounts of dozens of America's most prominent political, entertainment and technology leaders? A) DDoS attack B) ransomware C) social engineering D) sniffing

social engineering

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: A) spyware. B) a backdoor. C) a browser parasite. D) adware.

spyware

A ________ refers to a competitive strategy in which firms attempt to achieve lower business process costs.

strategy of cost competition

Next generation firewalls provide all of the following except: A) an application-centric approach to firewall control. B) the ability to identify applications regardless of the port, protocol, or security evasion tools used. C) the ability to automatically update applications on a client computer with security patches. D) the ability to identify users regardless of the device or IP address.

the ability to automatically update applications on a client computer with security patches.

Which of the following involves testing a site's program modules one at a time?

unit testing

Microsoft's pilot program to provide broadband Internet access to rural areas uses which of the following technologies?

unused, low-powered television channels

Which element of the business model addresses what a firm provides that other firms do not and cannot?

value proposition

Which of the following involves creating a skeleton version that focuses on functionality rather than design

wireframing

Conficker is an example of a: A) virus. B) worm. C) Trojan horse. D) botnet.

worm


Kaugnay na mga set ng pag-aaral

Capstone Chap.2 The Business Vision and Mission

View Set

Unit 5 - Ch. 18 | Eating + Feeding Disorders

View Set

Acid-Base Imbalances NCLEX (Ch55)

View Set

Module 7: Political Parties, Media, Interest Groups Chapter 5-9

View Set

Chapter 11 Unemployment and Labor Force Participation

View Set

Ultimate AWS Cloud Computing - Exam Questions Part I

View Set

GRE MATH - Prepared by Berkeley Students

View Set

Fundamentals of Nursing Chapter 19 Nutrition

View Set