ICS 392 Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

An IPv4 address is expressed as a: a. 32-bit number that appears as a series of four separate numbers separated by periods. b. 128-bit number that appears as a series of four separate numbers separated by periods. c. 64-bit number that appears as a series of four separate numbers separated by semicolons. d. 4-bit number that appears as a series of four separate numbers separated by semicolons.

32-bit number that appears as a series of four separate numbers separated by periods.

eBay uses all of the following business models except: a. content provider. b. e-commerce infrastructure provider. c. C2C market creator. d. B2C market creator.

Content Provider

Downloading music tracks owned by record companies without paying for them is an example of a violation of: a. trademark law. b. patent law. c. privacy law. d. copyright law.

Copyright law

Which of the following protects original forms of expression in a tangible medium? a. copyright law b. trademark law c. patent law d. trade secret law

Copyright law

Which of the following is an example of C2C e-commerce? a. Craigslist b. Groupon c. Go2Paper d. Amazon

Craigslist

Registering a domain name (URL) similar or identical to trademarks of others to extort profits from a. cyberpiracy. b. cybersquatting. c. metatagging. d. framing.

Cybersquatting

Which of the following situations would not qualify for the fair use exception to U.S. copyright law? a. A professor clips a newspaper article just before class and distributes copies of it to his class. b. A journalist quotes a paragraph from a book in a review of the book. c. A student copies a song of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site. d. Google posts thumbnail images of books in the Google Book Search Project.

A student copies a song of his favorite band from a Web site created by the bands record label and places it on the student's personal website.

Which of the following verifies that the business objectives of the system as originally conceived are in fact working? a. implementation testing b. acceptance testing c. system testing d. unit testing

Acceptance Testing

Stickiness is a more important attribute for which of the following revenue models? a. subscription revenue model b. advertising revenue model c. sales revenue model d. transaction fee revenue model

Advertising Revenue Model

All of the following primarily use an advertising revenue model except: a. Yahoo. b. Amazon. c. Twitter. d. Google.

Amazon

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. a. Authenticity b. Availability c. Nonrepudiation d. Confidentiality

Authenticity

A fingerprint scan is an example of which of the following? a. biometrics b. IDS c. encryption d. firewall

Biometrics

Which of the following is a characteristic of the Reinvention phase of e-commerce? a. The use of mobile platforms. b. The widespread adoption of broadband networks. c. The massive proliferation of dot-com start-ups d. The rapid growth of search engine advertising.

The use of mobile platforms.

Which of the following help convert URLs into IP addresses? a. root servers b. client servers c. Web servers d. DNS servers

DNS Servers

Which of the following basic system functionalities is used to display goods on a Web site? a. customer database system b. showcase database c. shopping cart system d. digital catalog

Digital Catalog

Which of the following refers to the displacement of market middleman and the creation of a new direct relationship between producers and consumers? a. Network Effect b. Disintermediation c. Friction-Free Commerce d. First-Mover Advantage

Disintermediation

The ________ allows a natural language expression, such as Google.com to represent a numeric IP address. a. Internet Layer of TCP/IP b. domain name system c. TCP/IP d. packet switching system

Domain name system

All of the following are examples of business-to-business (B2B) business models except: a. exchanges. b. e-distributors. c. e-tailers. d. e-procurement.

E-tailers

Which of the following is not true? a. No one academic perspective dominates research about e-commerce. b. Economists take a purely technical approach to e-commerce. c. There are 2 primary approaches to e-commerce: behavioral and technical. d. Management scientists are interested in e-commerce as an opportunity to study how behavioral factors can exploit the Internet to achieve more efficient business operations.

Economists take a purely technical approach to e-commerce.

Which of the following is not a main factor in determining the overall demand on an e-commerce site? a. nature of customer requests b. whether content is dynamic or static c. file sizes of Web pages being served d. number of simultaneous users in peak periods

File sizes of Web Pages being served

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network. a. proxy server b. virtual private network c. firewall d. PPTP

Firewall

Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service? a. transaction fee strategy b. delayed revenue model c. subscription revenue model d. freemium strategy

Freemium Strategy

________ typically attack governments, organizations, and sometimes individuals for political purposes. a. Crackers b. White hats c. Grey hats d. Hacktivists

Hacktivists

What is the first step in analyzing an ethical dilemma? a. Identify the potential consequences of your opinions. b. Identify the options you can reasonably take. c. Define the conflict or dilemma and identify the higher-order values involved. d. Identify and describe the facts.

Identify and describe the facts.

Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as: a. incubators. b. angel investors. c. venture capital investors. d. crowdfunders.

Incubators

Which of the following refers to any disparity in relevant market information among parties in a transaction? a. Competitive Inequity b. Imperfect Competition c. Data Discrepancy d. Information Asymmetry

Information Asymmetry

Which of the following are the two main components of a systems design? a. logical design and physical design b. front-end systems and back-end systems c. behavioral design and technological design d. business objectives and technology requirements

Logical design and physical design

Which type of e-commerce is distinguished by the type of technology used in the transaction rather by the nature of the market relationship? a. mobile e-commerce b. consumer-to-consumer (C2C) c. Social e-commerce d. Business-to-business (B2B)

Mobile e-commerce

________ refers to the ability to ensure that e-commerce participants do not deny their online actions. a. Nonrepudiation b. Authenticity c. Availability d. Privacy

Nonrepudation

The process of slicing digital messages into containers, sending them along different communication paths as they become available, and reassembling them at the destination point is called: a. The Internet Protocol. b. packet switching. c. The Hypertext Transfer Protocol. d. endpoint cutting.

Packet Switching

Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years? a. trademark law b. trade secret law c. patent law d. copyright law

Patent Law

All of the following are parts of business models employed in the online music industry except: a. download-and-own. b. cloud streaming. c. peer-to-peer streaming. d. subscription.

Peer to peer streaming

Which of the following details the actual hardware components to be used in a system? a. logical design b. physical design c. system functionalities plan d. system module detail plan

Physical design

Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture? a. responsibility b. liability c. accountability d. privacy

Privacy

All of the following are basic functionality provided by e-commerce merchant server software except: a. productivity software. b. a product catalog. c. a shopping cart. d. credit card processing.

Productivity Software

Which of the following is a set of rules for transferring data? a. an IP address b. a packet c. a router d. a protocol

Protocol

The Internet Layer of TCP/IP is responsible for which of the following? a. providing a variety of applications with the ability to access the services of the lower layers b. placing packets on and receiving them from the network medium c. providing communication with the application by acknowledging and sequencing the packets to and from the application d. addressing, packaging, and routing messages

Providing communication with the application by acknowledging and sequencing the packets to and from the application.

What is the total number of users or customers an e-commerce business can obtain is a measure of which of the following? a. Reach B. Information Density C. Interactivity D. Ubiquity

Reach

A firm's ________ describes how a firm will produce a superior return on invested capital. a. competitive advantage b. value proposition c. revenue model d. market strategy

Revenue Model

Which of the following are specialized computers that interconnect the thousands of computers that make up the Internet in order to transmit message parcels along available communication paths and on to their destinations? a. Web hosts b. routers c. IP clients d. Internet Layer of TCP/IP

Routers

Which of the following are Amazon's primary value propositions? a. increasing price discovery cost b. selection and convenience c. management of product labeling d. personalization and customization

Selection and Convenience

Which of the following is not an example of malicious code? a. sniffer b. bot c. scareware d. Trojan horse

Sniffer

Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers? a. social media b. web site c. mobile apps d. offline media

Social Media

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: a. adware. b. botnet c. spyware. d. a backdoor.

Spyware

Which of the following can be used to record all keyboard activity of a user? a. shopping carts b. trusted computing environments c. spyware d. DRM

Spyware

A digital certificate contains all of the following except the: a. digital signature of the certification authority. b. subject's public key. c. digital certificate serial number. d. subject's private key.

Subject's private key

Which of the following is the primary communications protocol for the Internet? a. Telnet b. TCP/IP c. FTP d. TLS

TCP/IP

Above all, e-commerce is a ____________ phenomenon. a. Technology-Driven b. Finance-Driven c. Sociological d. Government-driven

Technology-Driven

Which of the following statements about net neutrality is true? a. Net neutrality requires that all data be treated in the same manner. b. Net neutrality requires that no data be treated in the same manner. c. The FCC now regulates ISP pricing and advertising. d. The FCC now regulates ISP pricing but only offers guidelines on advertising.

The FCC now regulates ISP pricing and advertising.

E-commerce can be defined as: a. The use of any internet technologies in a firm's daily activities. b. Any digitally enabled transactions among individuals and organizations. c. The digital enablement of transactions and processes within an organizations. d. The use of the Internet, the Web, and mobile apps to transact business.

The use of the Internet, the Web, and mobile apps to transact business.

All of the following are true about iPhone apps except: a. they are made for Android KitKat devices. b. over 100 billion have been downloaded. c. Apple's goal of offering apps is to increase sales of iPhones, iPads, and iPods. d. They are distributed through Apple's App Store.

They are made for android kitkat devices.

E-commerce is available just about everywhere an anytime. The is known as _______. A. Richness B. Information Density C. Ubiquity D. Reach

Ubiquity

Which of the following involves testing a site program's modules one at a time? a. system testing b. unit testing c. acceptance testing d. implementation testing

Unit Testing

In developing an e-commerce presence, what questions must be asked and answered about the firm's target audience? a. which hardware platform will be the most cost effective and fastest? b. do they require a shopping cart and what are the limits? c. who is the target audience and where can they best be reached? d. when do prefer to shop and why?

Who is the target audience and where can they be reached?

The major technologies used with wireless local area networks are: a. WiMax and 3G. b. Wi-Fi and Bluetooth. c. Wi-Fi and WiMax. d. Bluetooth and 3G.

Wifi and bluetooth

Slammer is an example of which of the following? a. botnet b. Trojan horse c. virus d. worm

Worm

Which of the following is not an example of the bricks-and-clicks e-tailing business model? a. Walmart b. Zappos c. Sears d.Staples

Zappos

All of the following are factors that will be considered in determining whether use of copyrighted material is fair use except the: a. nature of the work used. b. amount of the work used. c. market effect of the use. d. free availability of the work on Netflix or Hulu.

free availability of the work on Netflix or Hulu.

In order from beginning to end, the major steps in the SDLC are: a. systems analysis/planning; systems design; building the system; testing; and implementation. b. systems design; testing; building the system; and implementation. c. systems analysis/planning; systems design; building the system; implementation; and testing. d. systems analysis/planning; implementation; building the system; and testing.

systems analysis/planning, systems design, building the system, testing, and implementation.

What is the most frequent cause of stolen credit cards and card information today? a. the hacking and looting of corporate servers storing credit card information b. sniffing programs c. botnets attacks d. lost cards

the hacking and looting of corporate servers storing credit card information.


Ensembles d'études connexes

Care of Patients with Musculoskeletal Problems

View Set

Missed - Exam Questions FL Life and Health

View Set

Student Created Midterm Study Guide (in class)

View Set

NUR 316: Nursing Concepts for Psychiatric/Mental Health Exam 1

View Set