E Commerce Chapter 4-6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

the ability to ensure that ecommerce participants do not deny their online actions

What is 'nonrepudiation'?

two mathematically related digital keys are used: a public key and a private key

What is 'public key encryption'?

malware that is designed to spread from computer to computer

What is a 'worm'?

program that installs itself on a computer, typically without the users informed consent

What is a PUP(Potentially Unwanted Program)?

Unit testing involves site's program modules. System testing involves the site as a whole

What is the difference between 'unit testing' and 'system testing'?

System planning, system design, building system, testing, implementation

What is the systems development life cycle(SDLC)?

b. digital catalog

Which of the following basic system functionalities is used to display goods on a Web site? a. product database b. digital catalog c. shopping cart system d. customer database system

d. HTML

Which of the following cannot be used to retrieve objects from a database? a. CGI b. ASP c. JSP d. HTML

the information systems must produce in order to achieve the business objectives

Define 'information requirements'

distributed denial of service

Define DDoS

denial of service

Define DoS

potentially unwanted program

Define PUP

types of system capabilities you will need to achieve business objectives

Define system 'functionalities'

False

T/F A mobile Web app is one designed to specifically operate using a mobile device's hardware and operating system.

False

T/F Apache HTTP Web server software is based on Microsoft's Windows operating system.

False

T/F In a two-tier architecture, a Web server is linked to one middle-tier layer that typically includes a series of application servers, as well as to another back-end layer.

false

T/F One of the most important challenges in developing an e-commerce presence is understanding that the technology must drive the business.

True

T/F Storing HTML pages in RAM rather than on a server's hard drive is an inexpensive way to fine-tune the processing architecture of a Web site.

strengths, weaknesses, opportunity, threats

What does SWOT stand for?

every occurrence of a given letter is replaced systematically by another letter

What is 'substitution cipher'?

Both the sender and receiver use the same key to encrypt and decrypt the message

What is 'symmetric key encryption'?

ordering of the letters in each word is changed in some systematic way

What is 'transposition cipher'?

currency to purchase virtual goods in a virtual world

What is 'virtual currency'?

hacker with criminal intent

What is a 'Cracker'?

an algorithm that produces a fixed-length number called a hash

What is a 'hash function'?

d. blog posts

Which of the following is an example of dynamic content? a. product photographs b. product descriptions c. home page graphic d. blog posts

d. ftp server

Which of the following is not a type of application server? a. proxy server b. mail server c. ad server d. FTP server

d. optimize system architecture

Which of the following is not one of the basic business objectives for an e-commerce site? a. display goods b. execute a transaction c. provide production and supplier links d. optimize system architecture

a. mobile plan

Which of the following is the final stage suggested for a six-phase plan to develop an e-commerce presence? a. mobile plan b. maintenance c. testing plan d. Twitter plan

c. Mobile Web sites operate twice as fast as traditional Web sites.

Which of the following statements is not true? a. The number of Web searches performed on mobile devices has more than quadrupled since 2010. b. By 2013, more people will use their mobile phones than PCs to go online. c. Mobile Web sites operate twice as fast as traditional Web sites. d. By 2015, there will be one mobile device for every person on earth.

d. cms

Which of the following technologies could you use to place the content of your Web site in a database so that you can then dynamically generate requests for pages? a. Apache web server b. proxy server c. shopping cart d. CMS

a. proxy server

Which of the following types of servers monitors and controls access to a main Web server and implements firewall protection? a. proxy server b. list server c. groupware server d. mail server

d. site management tools

Which of the following would you use to identify orphan files? a. HTTP b. FTP c. data capture tools d. site management tools

system functionalities

________ are the types of information systems capabilities needed to meet business objectives: -Information requirements -System functionalities -System design specifications -Physical design specifications

a. cgi

________ provides a set of standards for communicating between a browser and a program running on a server that allows for interaction between the user and server. a. CGI b. ColdFusion c. JavaScript d. VBScript

b. Acceptance testing

________ verifies that the business objectives of the system as originally conceived are in fact working: a. System testing b. Acceptance testing c. Unit testing d. Implementation testing

d. redundant navigation.

All of the following are Web site design features that annoy customers except: a. slow-loading pages. b. pop-under ads. c. splash pages. d. redundant navigation.

b. marketing software

All of the following are basic functionality provided by e-commerce merchant server software except: a. a product catalog. b. marketing software. c. a shopping cart. d. credit card processing.

adhering to accessibility guidelines.

All of the following are important factors in Web site optimization except: a. selecting keywords and page titles. b. identifying market niches for your services or products. c. buying search engine ads. d. adhering to accessibility guidelines.

d. adding Web servers.

All of the following are methods of improving the processing architecture of a Web site except: a. separating static content from dynamic content. b. optimizing ASP code. c. optimizing the database schema. d. adding Web servers.

d. an application server.

All of the following might be part of a Web site's backend layer except: a. a pre-existing corporate database. b. a human resources system. c. a production MRP system. d. an application server.

b. two-tier

An e-commerce Web site that processes orders requires, at minimum, a ________ system architecture. a. single-tier b. two-tier c. three-tier d. multi-tier

c. LinkedIn.

The opening case discusses Tommy Hilfiger's use of all of the following social media sites as marketing tools except: a. Facebook. b. Tumblr. c. LinkedIn. d. Twitter.

c. customers

The structure of a market is described in terms of all of the following except: a. substitute products b. direct competitors c. customers d. suppliers

translates logical design into physical components

What is 'Physical Design'?

the ability to control the use of information about oneself

What is 'Privacy'?

the ability to identify the identity of a person or entity

What is 'authenticity'?

the ability to ensure that an ecommerce site continues to function as intended

What is 'availability'?

the transaction log that consumers establish as they move about the web

What is 'clickstream behavior'?

the ability to ensure that messages and data are available to those who are authorized

What is 'confidentiality'?

alternative payment system in which tokens represent cash value

What is 'digital cash'?

the process of turning text or data into cipher that cant be read by anyone other than the sender and receiver

What is 'encryption'?

the ability to ensure that information displayed on the internet is not altered by an unauthorized party.

What is 'integrity'?

describes the flow of information, the processing functions, the databases that will be used, the security and emergency backup procedures, and the controls

What is 'logical design'?

software server that handles all internet communications

What is a 'proxy server'?

allows remote users to securely access internal networks via the internet, using the point-to-point tunneling protocol (ttp)

What is a 'virtual private network'?

a. a logical design and a physical design

A system design has two main components: a. a logical design and a physical design. b. a behavioral design and a technological design. c. business objectives and technology requirements. d. front-end systems and back-end systems.


Ensembles d'études connexes

DECA Business Basics (Types of Ownership)

View Set

ALS DL Test 2 PDF 2 Part a this shi long af

View Set

Prep U Chapter 34: Assessment and Management of Patients with Inflammatory Rheumatic Disorders

View Set