CIS 125 Test 3
When did e-commerce begin?
1995
In 2015, what percentage of mobile phone users accessed the Internet by using their phones?
About 75 percent
Conficker (also known as Downadup or Downup) is an example of which of the following?
Correct SQL injection attack
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a/n ________ attack.
DDos
Which of the following is the best description of ubiquity as it relates to e-commerce technology?
E-commerce technology is available everywhere and anytime.
Which of the following dimensions of e-commerce technology has the potential to raise the quality of information?
Information density
Which of the following dimensions of e-commerce technology involves engaging consumers in a dialog that dynamically adjusts the experience to the individual?
Interactivity
Which of the following statements about botnets is not true?
It is not possible to make a smartphone part of a botnet.
Disintermediation has which of the following effects?
It lowers cost to consumers.
CryptoLocker is an example of which of the following?
Ransomware
________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
Securities
Redirecting a web link to a different address is a form of:
Spoofing
Which feature of Internet technology has had the most effect in the Internet's rapid spread across the globe?
Universal standards
An independent computer program that copies itself from one computer to another over a network is called a:
Worms
Information ________ exists when one party in a transaction has more information that is important for the transaction than the other party.
asymmetry
Evil twins are:
bogus wireless network access points that look legitimate to users.
A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of:
click fraud
refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.
controls
Reducing the business process layers in a distribution channel is called:
disintermediation.
Varying a product's price according to the supply situation of the seller is called ________ pricing.
dynamic
A marketplace extended beyond traditional boundaries and removed from a temporal and geographic location is called a/n:
marketspace
Most computer viruses deliver a:
payload
Selling the same goods to different targeted groups at different prices is called:
price discrimination.
An example of phishing is:
setting up a fake medical website that asks users for confidential information
Phishing can use a form of:
spoofing