Bus 174
about PKI are true
-The term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties. -PKI is not effective against insiders who have a legitimate access to corporate systems including customer information.. -The acronym PKI stands for public key infrastructure. NOT TRUE PKI guarantees that the verifying computer of the merchant is secure
characteristics of HTML5
-a video element that replaces plug-ins such as Flash, QuickTime and RealPlayer. -use of CSS3. -ability to access built-in functionality of mobile devices, such as GPS and swiping.
All of the following are key design principles of responsive Web design
-flexible grid-based layouts. -media queries. -flexible images and media.
simple steps for optimizing Web page content that can reduce response times
-reducing unnecessary HTML comments. -using more efficient graphics. -avoiding unnecessary links to other pages on the site.
important factors in Web site optimization
-selecting keywords and page titles. -identifying market niches for your services or products. -buying search engine ads.
An intrusion detection system can perform
-setting off an alarm when suspicious activity is detected. -checking network traffic to see if it matches certain patterns or preconfigured rules. -examining network traffic.
symmetric key cryptography
-symmetric key cryptography is a key element in digital envelopes. -in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message. -the Data Encryption Standard is a symmetric key encryption system. NOT TRUE symmetric key cryptography is computationally slower.
Next generation firewalls provide
-the ability to identify users regardless of the device or IP address -the ability to identify applications regardless of the port, protocol, or security evasion tools used -an application-centric approach to firewall control
major business trends in EC in 2012-13
-the growth of a new app-based online economy. -the expansion of the localization of e-commerce. -the emergence of a new social e-commerce platform.
All of the following are major social trends in e-commerce in 2014-2015
-the impact of social networks on privacy. -the continuing conflict over copyright management and control. -the growth of government surveillance of Internet communications.
All of the following use an advertising revenue model except:
Amazon What are ad revenue model Google Twitter Yahoo
Which one is not a portal
Amazon What are portals Yahoo MSN AOL
All of the following are using a subscription revenue model for e-books except:
Barnes and Noble The ones do use Subscription revenue model Oyster. Scribd. Amazon. Correct Barnes and Noble.
Rustock is an example of which of the following?
Botnet
Ruby on Rails is based on which of the following philosophies?
CoC
Offline media is typically used for all of the following marketing activities except:
Conversation Used for Education branding exposure
The primary way a Web site is able to personalize the content presented to a visitor is through the use of:
Cookies
Your company has just implemented a new, more efficient set of business processes that other firms cannot yet obtain. This will enable your firm to adopt a strategy of:
Cost competition
Over the past decade, the number of exchanges has:
Diminished sharply
W.W. Grainger is an example of which of the following business models?
E-distributor
Competition Environment
Elements of business model relates to the power of customers and suppliers with respect to a business
features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?
Global Reach
Which of the following is an example of local e-commerce?
Groupon
All of the following experienced high-profile data breaches in 2013
Home Depot. Evernote. Adobe.
what is true
In 2012, apps accounted for a small but growing amount of e-commerce revenues. E-books today account for about half of all book sales. Computing and networking component prices are continuing to fall dramatically.
Which of the following statements about client/server computing is true?
It connects multiple powerful personal computers together in one network with one or more servers dedicated to common functions that they all need.
Which of the following statements about fiber-optic cable is not true?
It consists of twelve or sixteen strands of glass. What is true It is thinner and lighter than coaxial or twisted pair cable. It enables better data security than coaxial cable. There are thousands of miles of installed fiber-optic cable in the United States that are not being used.
The overall rate of online credit card fraud is ________ % of all online card transactions.
Less than 1
Which of the following describes the basic Web policy of large firms during the Invention period?
Maintain a basic, static Web site depicting the firm's brand.
drive-by download.
Malware that comes with a downloaded file that a user requests
Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship?
Mobile e-commerce
The first Web browser to make it possible to view documents on the Web with colored background, images, and animations was:
Mosaic.
Which of the following was NOT able to successfully implement a freemium business model?
Ning What are able to successfully implement a freemium business model -dropbox -linkedin -pandora
xsxssss Which of the following statements is true?
No one academic perspective dominates research about e-commerce. There are two primary approaches to e-commerce: behavioral and technical. Management scientists are interested in e-commerce as an opportunity to study how business firms can exploit the Internet to achieve more efficient business operations.
In general, the key to becoming a successful content provider is to:
Own the content being provided
Which of the following is the most commonly used server-side scripting language
PHP
All of the following are business models employed by the music industry except:
Peer to peer streaming Business models employed by music industry -subscription. -cloud streaming. -download-and-own.
Characteristic of a perfect competitive market
Price, cost, and quality information are equally distributed. A nearly infinite set of suppliers compete against one another. Customers have access to all relevant information worldwide
Which of the following is not a community provider?
Priceline What are community provider -Pinterest -LinkedIn -Facebook
Django is based on
Python
The integration of video, audio, and text marketing messages into a single marketing message and consuming experience is an example of:
Richness
which protocols is used to send mail to a server
SMTP
Portals primarily generate revenue in all of the following ways except:
Sales of goods Do do have -charging advertisers for ad placement. -collecting transaction fees. -charging subscription fees.
Amazon's primary value propositions
Selection and Convenience
what is true
Social e-commerce is currently the largest type of e-commerce. The emergence of entrepreneurial social and local firms is one of the hallmarks of the Consolidation period of e-commerce. The fact that e-commerce is conducted on the basis of universal standards increases market entry costs for merchants.
Which of the following statements is true?
Tablet computers rely on the Internet cloud for processing and storage
Advertising Revenue Model's important attribute
The ability to retain user attention and engagement
best definition of a transaction cost
The cost of participating in a market
Middleware Services layer.
The layer of Internet architecture that ties the applications to the communications network and includes such services as security and authentication
what are the examples of a social network
Twitter Pinterest tumbler Uber is NOT
The major technologies used with wireless local area networks are:
Wifi and Bluetooth
part of a Web site's middle-tier layer
a database server. an ad server. a mail server.
In 2013, the Target retail chain experienced
a large-scale data breach
basic functionality provided by e-commerce merchant server software
a shopping cart. credit card processing. a product catalog.
nonrepudiation
ability to ensure that e-commerce participants do not deny their online actions.
The Internet Layer of TCP/IP is responsible for which of the following?
addressing, packaging, and routing messages
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:
an authorization management system.
Proxy Server
application server monitors and controls access to a main Web server and implements firewall protection
Which of the following dimensions of e-commerce security is not provided for by encryption?
availability What are provided for by encryption -message integrity -nonrepudiation -confidentiality
methods of securing channels of communication
certificates. SSL/TLS. VPN.
Privacy is sometimes confused with:
confidentiality
Which system functionality must your Web site have in order to be able to personalize or customize a product for a client?
customer on-site tracking
All of the following are basic functionality provided by Web servers
data capture tools. site management tools. security services. Shopping Cart is NOT
The cost of hardware, software, and telecommunications services needed to build a Web site have ________ over the last decade.
decreased dramatically
Example of the subscription revenue model
eHarmony
Most of the time required to maintain an e-commerce site is spent on:
general administration and making changes and enhancements to the system.
Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as:
incubators.
Which of the following is one of the three primary societal issues related to e-commerce?
individual privacy
Which of the following is a unique feature of e-commerce technology?
interactivity social technology richness
JavaScript
is a programming language invented by Netscape used to control the objects on an HTML page and handle interactions with the browser.
Advantages of dynamic page generation include
lowered menu costs. nearly cost-free price discrimination. market segmentation.
In the United States, the primary form of online payment is:
paypal
Authenticity
refers to the ability to identify the person or entity with whom you are dealing on the Internet.
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail
spyware
Above all, e-commerce is a ________ phenomenon.
technology-driven
Site management Tools
use to verify that links on Web pages are valid
Acceptance testing
verifies that the business objectives of the system as originally conceived are in fact working.
Which of the following is a Web 2.0 service or application?
wikis