E-commerce in a global society (Chapters 4-6)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following statements about data breaches in 2016 is not true? According to Symantec, the total number of identities exposed by data breaches in 2016 increased to 1.1 billion. According to Symantec, the total number of data breaches in 2016 increased significantly from the number in 2015. According to the Identity Theft Resource Center, data breaches involving the business sector represented over 45% of all breaches. According to Symantec, the number of major breaches in 2016 increased from the number in 2015.

According to Symantec, the total number of data breaches in 2016 increased significantly from the number in 2015.

The leading web server software is: Apache. Google Enterprise Server. Microsoft Internet Information Server. Sun Solaris.

Apache.

Which of the following statements is not true? A retina scan is an example of a biometric device. Biometric data stored on an iPhone is encrypted. Biometric devices reduce the opportunity for spoofing. Apple's Touch ID stores a digital replica of a user's actual fingerprint in Apple's iCloud.

Apple's Touch ID stores a digital replica of a user's actual fingerprint in Apple's iCloud.

________ is the ability to ensure that an e-commerce site continues to function as intended. Integrity Availability Nonrepudiation Authenticity

Availability

When using multivariate testing, if you wish to test two different versions of an image, a button, and a piece of text, how many combinations will you need to test? 4 8 6 2

8

In 2017, almost ________ of the U.S. population regularly used the Internet. 45% 85% 55% 75%

85%

Which of the following is an example of a CMS? Dreamweaver CC Webtrends Analytics Drupal Apache

Drupal

Consumers choose the online channel primarily due to social media influence. (T/F)

False

Exploit kits can be purchased by users to protect their computers from malware. (T/F)

False

The concept of "customer satisfaction" is broader than the concept of "customer experience." (T/F)

False

The majority of online shoppers find vendors by clicking on display ads. (T/F)

False

Transaction logs are built into client software. (T/F)

False

When developing an e-commerce presence, it is important to understand that the technology must drive the business, not the reverse. (T/F)

False

Which of the following cannot be used to retrieve objects from a database? HTML JSP ASP CGI

HTML

________ typically attack governments, organizations, and sometimes individuals for political purposes. Grey hats White hats Hacktivists Crackers

Hacktivists

________ is an open source database that can store and analyze both structured and unstructured data. ASP Hadoop PHP JSP

Hadoop

Which of the following search engine algorithm updates enables Google's search engine to evaluate an entire sentence rather than just a key word? Hummingbird Graph Search Panda Penguin

Hummingbird

________ is a programming language invented by Netscape used to control the objects on an HTML page and handle interactions with the browser. JavaScript ActiveX VBScript ColdFusion

JavaScript

According to Symantec, almost half of the e-mail addresses involved in business e-mail compromise (BEC) phishing that it analyzed had an IP address originating in: Nigeria. North Korea. Russia. China.

Nigeria.

________ is the ability to ensure that e-commerce participants do not deny their online actions. Availability Authenticity Integrity Nonrepudiation

Nonrepudiation

Google introduced which of the following changes to its search algorithm to weed out low quality sites from search results? Hummingbird Knowledge Graph Penguin Panda

Panda

Which of the following is used to process certificates and private/public key information? HTTP data capture tools Secure Sockets Layer/Transport Layer Security File Transfer Protocol

Secure Sockets Layer/Transport Layer Security

Which of the following statements is not true? The Federal Trade Commission has asserted that it has authority over corporations' data security practices. The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates. A majority of states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred. The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers.

The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.

Which of the following statements about a free pricing strategy is false? Free products and services can knock out potential and actual competitors. The free pricing strategy was born in the early days of the Web. Free products and services can help build market awareness. It is difficult to convert free customers into paying customers.

The free pricing strategy was born in the early days of the Web.

In the early years of e-commerce, prior to 2000, single, white, young college-educated males with high income dominated the Internet in terms of percentage of Internet usage. (T/F)

True

Lead generation marketing firms specialize in inbound marketing. (T/F)

True

Objects can be retrieved from the database using Java Server Pages.

True

SSL/TLS cannot provide irrefutability. (T/F)

True

Upgrading a server from a single processor to multiple processors is an example of scaling a site vertically. (T/F)

True

WannaCry is an example of ransomware. (T/F)

True

All of the following are basic functionality provided by web servers except: a shopping cart. security services. site management tools. data capture tools.

a shopping cart.

An intrusion detection system can perform all of the following functions except: setting off an alarm when suspicious activity is detected. blocking suspicious activity. examining network traffic. checking network traffic to see if it matches certain patterns or preconfigured rules.

blocking suspicious activity.

According to Ponemon Institute's 2017 survey, which of the following was not among the causes of the most costly cybercrimes? botnets denial of service malicious code malicious insiders

botnets

Which of the following measures the ratio of items purchased to product views? browse-to-buy ratio cart conversion rate conversion rate view-to-cart ratio

browse-to-buy ratio

Which of the following is the most important tool in establishing a relationship with the customer? company CRM system search engine display ads company website Facebook

company website

Which of the following provides web marketers with a very quick means of identifying a customer and understanding his or her behavior at a site? cookies registration forms transaction logs data warehouses

cookies

The primary way a website is able to personalize the content presented to a visitor is through the use of: cookies. accessibility rules. site management tools. privacy policies.

cookies.

The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade. increased dramatically decreased dramatically increased moderately decreased slightly

decreased dramatically

Bitcoins are an example of: virtual currency. a stored value payment system. an EBPP system. digital cash.

digital cash.

Proxy servers are also known as: dual home systems. firewalls. packet filters. application gateways.

dual home systems.

Angler is an example of which of the following? phishing worm exploit kit hacktivism

exploit kit

Purchasing an online ad on a CPA basis means that the advertiser: exchanges something of equal value for the ad space. pays for impressions in 1,000 unit lots. pays only for those users who perform a specific action, such as registering, purchasing, etc. pays a pre-negotiated fee for each click an ad receives.

pays only for those users who perform a specific action, such as registering, purchasing, etc.

Which of the following details the actual hardware components to be used in a system? logical design system functionalities plan physical design architecture plan

physical design

All of the following are steps one can take to right-size a website's hardware platform and meet demands for service except: replacing static pages with dynamically generated pages. scaling hardware horizontally. scaling hardware vertically. improving processing architecture.

replacing static pages with dynamically generated pages.

All of the following are simple steps for optimizing web page content except: segmenting computer servers to perform dedicated functions. using more efficient graphics. reducing unnecessary HTML comments. avoiding unnecessary links to other pages on the site.

segmenting computer servers to perform dedicated functions.

Which of the following would you use to verify that links on web pages are valid? FTP HTTP site management tools data capture tools

site management tools

Next generation firewalls provide all of the following except: the ability to automatically update applications with security patches. the ability to identify applications regardless of the port, protocol, or security evasion tools used. an application-centric approach to firewall control. the ability to identify users regardless of the device or IP address.

the ability to automatically update applications with security patches.

PCI-DSS is a standard established by which of the following? the federal government the banking industry the retail industry the credit card industry

the credit card industry

The term stateless refers to the fact that: system performance degrades as more simultaneous users require service. web servers may maintain multiple instances of server software to handle requests. the server does not have to maintain an ongoing dedicated interaction with the client computer. no one government entity controls the Internet.

the server does not have to maintain an ongoing dedicated interaction with the client computer.

Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders? single-tier architecture two-tier architecture multi-tier architecture three-tier architecture

two-tier architecture

Which feature of e-commerce technology decreases the cost of delivering marketing messages and receiving feedback from users? universal standards interactivity personalization/customization ubiquity

universal standards

Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users? universal standards richness ubiquity information density

universal standards

Which of the following involves getting customers to pass along a company's marketing message to friends, family, and colleagues? viral marketing affiliate marketing lead generation marketing native advertising

viral marketing

All of the following are methods of improving the processing architecture of a website except: adding web servers. optimizing ASP code. optimizing the database schema. separating static content from dynamic content.

adding web servers.

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use: security tokens. an authorization policy. access controls. an authorization management system.

an authorization management system.

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network. virtual private network firewall PPTP proxy server

firewall

The overall rate of online credit card fraud is ________ of all online card transactions. around 10% around 5% less than 1% around 15%

less than 1%

Which of the following are the two main components of a systems design? logical design and physical design front-end systems and back-end systems business objectives and technology requirements behavioral design and technological design

logical design and physical design

The incremental cost of building the next unit of a good is called the: marginal cost. fixed cost. variable cost. Law of One Price.

marginal cost.

All of the following are among those most frequently affected by ad-blocking except: gaming sites. online retailers. social network sites. newsgroup/forums.

online retailers.


Ensembles d'études connexes

Self Check 5.5 - History from 1877

View Set

Chapter 7 - US History - WWI and Its Aftermath

View Set

COM4930 UF Sports Communication Exam 1

View Set

CPCE Professional Practice and Ethics.

View Set