E-Fashion Exam 2 Ch 4-7

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

refers to the ability to identify the person or entity with whom you are dealing on the internet

Authenticity

refers to the ability to ensure that an e-commerce site continues to function as intended

Availability

Which of the following is not an example of an access control?

Digital signatures

Visitors spend significantly more time on Facebook than any other social network site.

True

Which system functionality must your Web site have in order to be able to personalize or customize a product for a client?

customer on site tracking and an ad server

Which of the following are the two main components of a systems design?

logical design and physical design

In order from beginning to end, the major steps in the SDLC are

systems analysis/planning; systems design; building the system; testing; and implementation.

Malware that comes with a downloaded file that a user requests is called a:

Drive By Download

Proxy servers are also known as:

Dual home systems

Which of the following statements is not true?

Google is the leading display ad site on mobile devices

When developing an e-commerce presence, it is important to understand that the business must drive technology decisions, not the reverse.

True

The number of people exposed to pins is a measure of which of the following?

fan acquisition

Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?

social media

Which of the following is currently a small part of the online marketing universe, but is expected to triple over the next five years?

location based mobile marketing

Automatically redirecting a Web link to a different address is an example of which of the following:

Pharming

All of the following are basic information requirements for a product database except:

customer ID numbers.

Which of the following forms of online advertising is expected to grow the fastest between 2015 and 2019?

rich media

Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?

universal standards

Which of the following is the first step in the social marketing process?

fan acquisition

The ratio of impressions to fans is a measure of:

fan acquisition.

Which of the following is the leading cause of data breaches?

hackers

In modeling online consumer behavior, the concept of "consumer skills" refers to the:

knowledge consumers have about how to conduct online transactions.

All of the following might be part of a Web site's middle-tier layer except:

legacy corporate applications

The overall rate of online credit card fraud is ________ of all online card transactions.

less than 1%

Which of the following typically includes a data flow diagram to describe the flow of information for an e-commerce site?

logical design

PayPal is an example of what type of payment system?

online stored value payment system

Which of the following details the actual hardware components to be used in a system?

physical design

Which of the following is an automated, auction-based method for matching demand and supply for online display ads?

programmatic advertising

To answer a question such as "At what time of day does our company sell the most products?" you would use ________ data mining.

query-driven

All of the following are "traditional" online marketing tools except:

social marketing.

All the following statements about symmetric key cryptography are true except:

symmetric key cryptography is computationally slower

Next generation firewalls provide all of the following except:

the ability to automatically update applications with security patches

PCI-DSS is a standard established by which of the following?

the credit card industry

If you want to determine the size of your Web site's audience, the metric you will use for the most accurate measurement will be:

unique visitors

A fingerprint scan is an example of which of the following

Biometrics

Rustock is an example of which of the following

Botnet

A ________ is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer

CRM system

refers to the ability to ensure that messages and data are only available to those authorized to view them

Confidentiality

By 2015, spending on social marketing will be more than double the amount spent on mobile marketing.

False

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.

False

Facebook's AD functionality includes everyone's public posts, Likes, photos, and interests, and makes them available to all users of Facebook, even those who are not friends.

False

In 2014, spending on mobile marketing was almost three times the amount spent on local online marketing.

False

The Web server software used has a significant impact on how a Web site's Web pages look on a user's computer.

False

Traditional desktop marketing has become the smallest part of all online marketing.

False

Using prebuilt templates is typically one of the most expensive choices when building an e-commerce site.

False

Vishing attacks exploit SMS messages

False

The richness made possible by e-commerce technologies does which of the following?

It allows video, audio, and text to be integrated into a single marketing message and consuming experience.

All of the following are basic functionality provided by e-commerce merchant server software except:

Marketing software

Which of the following is not true about social marketing?

More than 50% of Twitter's ad revenues are generated by desktop users.

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

NFC

Which of the following is not one of the four main methods advertisers use to behaviorally target ads?

Nielsen ratings

refers to the ability to ensure that e-commerce participants do not deny their online actions

Nonrepudiation

All of the following statements about PKI are true except:

PKI guarantees that the verifying computer of the merchant is secure

Which of the following is not true about mobile marketing?

People use most of their mobile minutes while they are on the go

What is the first step in developing an e-commerce security plan?

Perform a risk assessment

Zeus is an example of which of the following:

Trojan Horse

Apache Web server software works with Linux and Unix operating systems

True

Apple Pay uses near field communication (NFC) chips.

True

Brand pages on Facebook typically attract more visitors than a brand's Web site.

True

Exploit kits are often rented or sold as a commercial product.

True

PayPal is the most popular alternative payment method in the United States.

True

Prior to the development of e-commerce, Web sites primarily delivered static HTML pages.

True

SLS/TLS cannot provide irrefutability.

True

ShellShock is an example of a software vulnerability.

True

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

True

There is a finite number of Bitcoins that can be created.

True

Creating multiple variations of information goods and selling these to different market segments at different prices is called:

Versioning

Which of the following involves getting customers to pass along a company's marketing message to friends, family, and colleagues?

Viral Marketing

All of the following are basic functionality provided by Web servers except:

a shopping cart.

A Web beacon is:

a tiny graphics file embedded in an e-mail or Web page

Amazon's Associates program is an example of which of the following?

affiliate marketing

Encouraging users to click a Like button is an example of which step in the social marketing process?

amplification

Which of the following dimensions of e-commerce security is not provided for by encryption?

availability

The process of comparing a Web site with that of its competitors in terms of response speed, quality of layout, and design is known as:

benchmarking.

Advantages of dynamic page generation include all of the following except:

client-side execution of programming.

Which of the following is the most important tool in establishing a relationship with the customer?

company Web site

Google's AdSense is an example of which of the following?

context advertising

Which of the following is not one of the main stages of the online purchasing process?

conversation

What are the two most important management challenges in building a successful e-commerce presence?

developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

All of the following statements about Apple Pay are true except which of the following?

Apple Pay is available for both iPhone 5s and iPhone 6s

According to a recent National Federation of Retailers survey, what percentage of tablet users plan to purchase anything with their tablets?

Around 33%

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

Which of the following is not true about search engine advertising?

Search engine advertising is the fastest growing type of online advertising.

FREAK is an example of which of the following

Software Vulnerability

Which of the following was designed to cripple Iranian nuclear centrifuges

Stuxnet

The annual maintenance cost for a Web site is typically much lower than its development cost.

False

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

Firewall


Ensembles d'études connexes

Massachusetts Driver's Permit Test (Spring 2019)

View Set

Biology: body parts, their function, and what system they are in

View Set

Puerto Rico - Nayelis y Isalaura

View Set

Chapter 51: Care of Patients with Musculoskeletal Trauma

View Set

Network+ Chapter 7 | 02 IP Addressing IPv6

View Set

government chapter 17 study guide

View Set

Section 2: Basic sales tax setup

View Set