ICS 392 Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

E-commerce is available just about everywhere and anytime. This is known as ________. A) richness B) ubiquity C) reach D) information density

Ubiquity

Which of the following basic system functionalities is used to display goods on a Web site? a. customer database system b. digital catalog c. shopping cart system d. showcase database

digital catalog

All of the following are examples of business-to-business (B2B) business models except: A) e-distributors. B) exchanges. C) e-procurement. D) e-tailers.

e-tailers.

Which of the following help convert URLs into IP addresses? A) client servers B) DNS servers C) Web servers D) root servers

DNS Servers

The major technologies used with wireless local area networks are: A) Wi-Fi and WiMax. B) Bluetooth and 3G. C) WiMax and 3G. D) Wi-Fi and Bluetooth.

Wi-Fi and Bluetooth.

Which of the following verifies that the business objectives of the system as originally conceived are in fact working? A. system testing B. acceptance testing C. implementation testing D. unit testing

acceptance testing

The Internet Layer of TCP/IP is responsible for which of the following? A) providing communication with the application by acknowledging and sequencing the packets to and from the application B) providing a variety of applications with the ability to access the services of the lower layers C) addressing, packaging, and routing messages D) placing packets on and receiving them from the network medium

addressing, packaging, and routing messages

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network. A) proxy server B) PPTP C) virtual private network D) firewall

firewall

All of the following are parts of business models employed in the online music industry except: A) cloud streaming. B) peer-to-peer streaming. C) download-and-own. D) subscription.

peer-to-peer streaming.

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. A) Availability B) Nonrepudiation C) Authenticity D) Confidentiality

Authenticity

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: A) a backdoor. B) adware. C) spyware. D) botnet

spyware.

What is the most frequent cause of stolen credit cards and card information today? A) lost cards B) botnets attacks C) sniffing programs D) the hacking and looting of corporate servers storing credit card information

the hacking and looting of corporate servers storing credit card information

Which of the following is a characteristic of the Reinvention phase of e-commerce? A) the use of mobile platforms B) the widespread adoption of broadband networks C) the massive proliferation of dot-com start-ups D) the rapid growth of search engine advertising

the use of mobile platforms

________ refers to the ability to ensure that e-commerce participants do not deny their online actions. A) Nonrepudiation B) Privacy C) Authenticity D) Availability

Nonrepudiation

Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years? A. Copyright law B. Trademark law C. Patent law D. Trade secret law

Patent law

An IPv4 address is expressed as a: A) 128-bit number that appears as a series of four separate numbers separated by periods. B) 32-bit number that appears as a series of four separate numbers separated by periods. C) 4-bit number that appears as a series of four separate numbers separated by semicolons. D) 64-bit number that appears as a series of four separate numbers separated by semicolons.

32-bit number that appears as a series of four separate numbers separated by periods.

Which of the following is not an example of the bricks-and-clicks e-tailing business model? A) Sears B) Walmart C) Staples D) Zappos

Zappos

The ________ allows a natural language expression, such as Google.com to represent a numeric IP address. A) domain name system B) TCP/IP C) packet switching system D) Internet Layer of TCP/IP

domain name system

Which of the following involves testing a site program's modules one at a time? A. implementation testing B. acceptance testing C. system testing D. unit testing

unit testing

In developing an e-commerce presence, what questions must be asked and answered about the firm's target audience? A. who is the target audience and where can they best be reached? B. which hardware platform will be the most cost effective and fastest? C. when do prefer to shop and why?

who is the target audience and where can they best be reached?

________ typically attack governments, organizations, and sometimes individuals for political purposes. A) Grey hats B) White hats C) Crackers D) Hacktivists

Hacktivists

Which of the following is the primary communications protocol for the Internet? A) FTP B) TCP/IP C) Telnet D) TLS

TCP/IP

All of the following primarily use an advertising revenue model except: A) Google. B) Amazon. C) Yahoo. D) Twitter.

Amazon

Downloading music tracks owned by record companies without paying for them is an example of a violation of: A. Copyright law B. Trademark law C. Patent law D. privacylaw

Copyright law

Which of the following protects original forms of expression in a tangible medium? A. PATENT LAW B. Trade secret law C. Copyright law D. Trademark law

Copyright law

Which of the following is an example of C2C e-commerce? A) Groupon B) Amazon C) Go2Paper D) Craigslist

Craigslist

Registering a domain name (URL) similar or identical to trademarks of others to extort profits from legitimate holders is an example of: A> Metatagging B> Cybersquatting C> Cyberpiracy D> Framing

Cyberpiracy

Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers? network effect disintermediation friction-free commerce first mover advantage

Disintermediation

Which of the following statements is not true? No one academic perspective dominates research about e-commerce. Economists take a purely technical approach to e-commerce. There are two primary approaches to e-commerce: behavioral and technical. Management scientists are interested in e-commerce as an opportunity to study how behavioral factors can exploit the Internet to achieve more efficient business operations.

Economists take a purely technical approach to e-commerce.

What is the first step in analyzing an ethical dilemma? A. Identify the potential consequences of your opinions. B. Define the conflict or dilemma and identify the higher-order values involved C. Identify and describe the facts. D. Identify the options you can reasonably take.

Identify and describe the facts.

Which of the following statements about net neutrality is true? A) The FCC now regulates ISP pricing but only offers guidelines on advertising. B) Net neutrality requires that all data be treated in the same manner. C) Net neutrality requires that no data be treated in the same manner. D) The FCC now regulates ISP pricing and advertising.

Net neutrality requires that all data be treated in the same manner.

Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture? A. Accountability B. Privacy C. Liability D. Responsibility

Privacy

The total number of users or customers an e-commerce business can obtain is a measure of which of the following? A) reach B) ubiquity C) interactivty D) information density

Reach

Which of the following are Amazon's primary value propositions? A) management of product labeling B) selection and convenience C) increasing price discovery cost D) personalization and customization

Selection and convenience

Which of the following is not an example of malicious code? A) bot B) scareware C) sniffer D)Trojan horse

Sniffer

Which of the following can be used to record all keyboard activity of a user? A> Shopping carts B> trusted computing environment C> Spyware D> DRM

Spyware

Stickiness is a more important attribute for which of the following revenue models? A) sales revenue model B) advertising revenue model C) transaction fee revenue model D) subscription revenue model

advertising revenue model

A fingerprint scan is an example of which of the following? A) firewall B) biometrics C) IDS D) encryption

biometrics

eBay uses all of the following business models except: A) C2C market creator. B) e-commerce infrastructure provider. C) B2C market creator. D) content provider.

content provider.

Which of the following is not a main factor in determining the overall demand on an e-commerce site? nature of customer requests A. nature of customer requests B. whether content is dynamic or static C. number of simultaneous users in peak periods D. file sizes of Web pages being served

file sizes of Web pages being served

All of the following are factors that will be considered in determining whether use of copyrighted material is fair use except the: A. amount of the work used. B. nature of the work used. C. market effect of the use. D. free availability of the work on Netflix or Hulu

free availability of the work on Netflix or Hulu

Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service? A) subscription revenue model B) freemium strategy C) delayed revenue model D) transaction fee strategy

freemium strategy

Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as: A) incubators. B) venture capital investors. C) angel investors. D) crowdfunders.

incubators.

Which of the following refers to any disparity in relevant market information among parties in a transaction? A) competitive inequity B) imperfect competition C) data discrepancy D) information asymmetry

information asymmetry

Which of the following are the two main components of a systems design? A. front-end systems and back-end systems B. behavioral design and technological design C. logical design and physical design D. business objectives and technology requirements

logical design and physical design

Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship? A) mobile e-commerce B) business-to-business (B2B) C) social e-commerce D) consumer-to-consumer (C2C)

mobile e-commerce

The process of slicing digital messages into containers, sending them along different communication paths as they become available, and reassembling them at the destination point is called: A) endpoint cutting. B) the Hypertext Transfer Protocol. C) packet switching. D) the Internet Protocol.

packet switching.

Which of the following details the actual hardware components to be used in a system? A. system module detail plan B. physical design C. logical design D. system functionalities plan

physical design

All of the following are basic functionality provided by e-commerce merchant server software except: A. credit card processing. B. a product catalog. C. a shopping cart. D. productivity software.

productivity software

Which of the following is a set of rules for transferring data? A) an IP address B) a router C) a packet D) a protocol

protocol

A firm's ________ describes how a firm will produce a superior return on invested capital. A) competitive advantage B) value proposition C)market strategy D) revenue model

revenue model

Which of the following are specialized computers that interconnect the thousands of computers that make up the Internet in order to transmit message parcels along available communication paths and on to their destinations? A) IP clients B) Web hosts C) routers D) Internet Layer of TCP/IP

routers

Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers? A. mobile apps B. web site C. offline media D. social media

social media

A digital certificate contains all of the following except the: A) subject's private key. B) digital signature of the certification authority. C) digital certificate serial number. D) subject's public key.

subject's private key.

In order from beginning to end, the major steps in the SDLC are: a. systems analysis/planning; systems design; building the system; testing; and implementation. b. systems analysis/planning; systems design; building the system; implementation; and testing c. stems design; testing; building the system; and implementation d. systems analysis/planning; implementation; building the system; and testing

systems analysis/planning, systems design, building the system, testing, and implementation.

Above all, e-commerce is a ________ phenomenon. technology driven finance-driven sociological government-driven

technology driven

E-commerce can be defined as: A) the use of any Internet technologies in a firm's daily activities. B) the use of the Internet, the Web, and mobile apps to transact business. C) the digital enablement of transactions and processes within an organization. D) any digitally enabled transactions among individuals and organizations.

the use of the Internet, the Web, and mobile apps to transact business.

All of the following are true about iPhone apps except: A) Apple's goal of offering apps is to increase sales of iPhones, iPads, and iPods. B) over 100 billion have been downloaded. C) they are made for Android KitKat devices. D) they are distributed through Apple's App Store.

they are made for Android KitKat devices.

Slammer is an example of which of the following? A) Trojan horse B) worm C) botnet D) virus

worm


Ensembles d'études connexes

Marketing Simulation Chp. 1: Create Customer Value Powerfully Fit V2 (Score: 100%, choices are based on my opinions and thinking!)

View Set

B2B0251XQ-DM WF 2 MCDP 1-3 Tactics

View Set

Worksheet 23.2: The Administrative Process

View Set

National Flood Insurance Program

View Set