ICS 392 Study Cards
All of the following primarily use an advertising revenue model except: A) Amazon. B) Google. C) Twitter. D) Yahoo.
A) Amazon.
A __________________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network. A) firewall B) proxy server C) PPTP D) virtual private network
A) firewall
Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years? A) patent law B) copyright law C) trade secret law D) trademark law
A) patent law
Which of the following protects original form of expression in a tangible medium? A) copyright law B) patent law C) trademark law D) trade secret law
A) copyright law
All of the following are examples of business-to-business (B2B) business models except: A) e-tailers. B) e-procurement. C) exchanges. D) e-distributors.
A) e-tailers.
eBay uses all of the following business models except: A) B2C market creator. B) content provider. C) C2C market creator. D) e-commerce infrastructure provider.
B) content provider.
Which of the following is not an example of malicious code? A) Trojan horse B) snifer C) shareware D) bot
B) snifer
E-commerce can be defined as: A) the digital enablement of transactions and processes within an organization. B) the use of the Internet, the Web, and mobile apps to transact business. C) the use of any Internet technologies in a firm's daily activities. D) any digitally enabled transactions among individuals and organizations.
B) the use of the Internet, the Web, and mobile apps to transact business.
Which of the following is not an example of the bricks-and-clicks e-tailing business model? A) Walmart B) Zappos C) Sears D) Staples
B) Zappos
Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as: A) crowdfunders. B) incubators. C) venture capital investors. D) angel investors.
B) incubators.
Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers? A) network effect B) disintermediation C) friction-free commerce D) first mover advantage
B) Disintermediation
Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers? A) web site B) social media C) mobile apps D) offline media
B) social media
Which of the following basic system functionalities is used to display goods on a Web site? A) shopping cart system B) showcase database C) customer database system D) digital coding
D) digital coding
The _____________ allows a natural language expression, such as Google.com to represent a numeric IP address. A) TCP/IP B) Internet layer of TCP/IP C) packet switching system D) domain name system
D) domain name system
Which of the following refers to any disparity in relevant market information among parties in a transaction? A) competitive inequity B) imperfect competition C) data discrepancy D) information asymmetry
D) information asymmetry
A firm's ________ describes how a firm will produce a superior return on invested capital. A) revenue model B) value proposition C) market strategy D) competitive advantage
A) revenue model
Above all, e-commerce is a ________ phenomenon. A) technology driven B) finance-driven C) sociological D) government-driven
A) technology driven
Which of the following is an example of C2C e-commerce? A) Craigslist B) Go2Paper C) Groupon D) Amazon
A) Craigslist
____________ refers to the ability to ensure that e-commerce participants do not deny their online actions. A) Nonrepudiation B) Privacy C) Authenticity D) Availability
A) Nonrepudiation
Stickiness is a more important attribute for which of the following revenue models? A) advertising revenue model B) subscription revenue model C) transaction fee revenue model D) sales revenue model
A) advertising revenue model
In order from beginning to end, the major steps in the SDLC are: A) systems analysis/planning, systems design, building the system, testing, and implementation B) Systems design, testing, building the system, and implementation C) systems analysis/planning, systems design, building the system, implementation, and testing D) systems analysis/planning, implementation, building the system, and testing
A) systems analysis/planning, systems design, building the system, testing, and implementation
In developing an e-commerce presence, what questions must be added and answered about the firm's target audience? A) who is the target audience and where can they best be reached? B) do they require a shopping cart and what are the limits? C) which hardware platform will be the most cost effective and fastest? D) When do they prefer to shop and why?
A) who is the target audience and where can they best be reached?
____________________ refers to the ability to identify the person or entity with whom you are dealing on the internet. A) Nonrepudiation B) Authenticity C) Availability D) Confidentiality
B) Authenticity
Which of the following statements is not true? A) No one academic perspective dominates research about e-commerce. B) Economists take a purely technical approach to e-commerce. C) There are two primary approaches to e-commerce: behavioral and technical. D) Management scientists are interested in e-commerce as an opportunity to study how behavioral factors can exploit the Internet to achieve more efficient business operations.
B) Economists take a purely technical approach to e-commerce.
Which of the following statements about net neutrality is true? A) The FCC now regulates ISP pricing but only offers guidelines on advertising B) Net neutrality requires that all data be treated in the same manner C) Net neutrality requires that no data be treated in the same manner D) the FCC now regulates ISP pricing and advertising
B) Net neutrality requires that all data be treated in the same manner
Which of the following is the primary communications protocol for the internet? A) FTP B) TCP/IP C) Telnet D) TLS
B) TCP/IP
The major technologies used with wireless local area networks are: A) Wi-Fi and WiMax B) WiFi and Bluetooth C) Bluetooth and 3G D) WiMax and 3G
B) WiFi and Bluetooth
Which of the following is a set of rules for transferring data? A) an IP address B) a protocol C) a router D) a packet
B) a protocol
Which of the following verifies that the business objectives of the system as originally conceived are in fact working? A) system testing B) acceptance testing C) implementation testing D) unit testing
B) acceptance testing
The internet layer of TCP/IP is responsible for which of the following? A) providing communication with the application by acknowledging and sequencing the packets to and from the application B) addressing, packaging, and routing messages C) providing a variety of applications with the ability to access the services of the lower layers D) placing packets on and receiving them from the network medium
B) addressing, packaging, and routing messages
Which of the following is not a main factor in determining the overall demand on an e-commerce site? A) number of simultaneous users in peak periods B) file sizes of Web pages being served C) nature of customer requests D) whether content is dynamic or static
B) file sizes of Web pages being served
All of the following are factors that will be considered in determining whether use of copyrighted material is fair use except the: A) amount of the work used B) free availability of the work on Netflix or Hulu C) nature of the work used D) market effect of the use
B) free availability of the work on Netflix or Hulu
The process of slicing digital messages into containers, sending them along different communication paths as they become available, and reassembling them at the destination point is called: A) endpoint cutting B) packet switching C) the hypertext transfer protocol D) the Internet Protocol
B) packet switching
Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture? A) liability B) privacy C) responsibility D) accountability
B) privacy
The total number of users or customers an e-commerce business can obtain is a measure of which of the following? A) information density B) reach C) interactivty D) ubiquity
B) reach
Which of the following are specialized computers that interconnect the thousands of computers that make up the internet in order to transmit message parcels along available communication paths and on their destinations? A) IP clients B) routers C) Internet Layer of TCP/IP D) Web hosts
B) routers
Which of the following are Amazon's primary value propositions? A) increasing price discovery cost B) selection and convenience C) management of product labeling D) personalization and customization
B) selection and convenience
Slammer is an example of which of the following? A) Trojan horse B) worm C) virus D) botnet
B) worm
E-commerce is available just about everywhere and anytime. This is known as ___________________________. A) reach B) ubiquity C) information density D) richness
B) ubiquity
An IPv4 address is expressed as a: A) 64-bit number that appears as a series of four separate numbers separated by semicolons B) 128-bit number that appears as a series of four separate numbers separated by periods C) 32-bit number that appears as a series of four separate numbers separated by periods D) 64-bit number that appears as a series of four separate numbers separated by periods
C) 32-bit number that appear as a series of four separate numbers separated by periods
Downloading music tracks owned by record companies without paying for them is an example of a violation of: A) patent law B) privacy law C) copyright law D) trademark law
C) copyright law
Registering a domain name (URL) similar or identical to trademarks of others to extort profits from legitimate holders is an example of: A) metatagging B) framing C) cybersquatting D) cyberpiracy
C) cybersquatting
Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service? A) subscription revenue model B) delayed revenue model C) freemium strategy D) transaction fee strategy
C) freemium strategy
Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship? A) social e-commerce B) consumer-to-consumer (C2C) C) mobile e-commerce D) business-to-business (B2B)
C) mobile e-commerce
Which of the following details the actual hardware components to be used in a system? A) system functionalities plan B) logical design C) physical design D) system module detail plan
C) physical design
All of the following are basic functionality provided by e-commerce merchant server software except: A) credit card processing B) a product catalog C) productivity software D) a shopping cart
C) productivity software
Software that is used to obtain private user information such as user's keystrokes or copies of e-mail is referred to as: A) botnet B) adware C) spyware D) a backdoor
C) spyware
Which of the following can be used to record all keyboard activity of a user? A) shopping carts B) trusted computing environments C) spyware D) DRM
C) spyware
A digital certificate contains all of the following except the: A) digital certificate serial number B) subject's public C) subject's private key D) digital signature of the certification authority
C) subject's private key
What is the most frequent cause of stolen credit cards and card information today? A) sniffing programs B) lost cards C) the hacking and looting of corporate servers storing credit card information D) botnets attacks
C) the hacking and looting of corporate servers storing credit card information
Which of the following is a characteristic of the Reinvention phase of e-commerce? A) The rapid growth of search engine advertising B) The massive proliferation of dot-com start-ups C) the use of mobile platforms D) the widespread adoption of broadband networks
C) the use of mobile platforms
All of the following are true about iPhone apps except: A) over 100 billion have been downloaded B) they are distributed through the Apple's App Store C) they are made of Android KitKat devices
C) they are made of Android KitKat devices
Which of the following situations would not qualify for the fair use exception to U.S. copyright law? A) A professor clips a newspaper article just before class and distributes copies of it to his class B) A journalist quotes a paragraph from a book in a review of the book C) Google posts thumbnail images of books in the Google Book Search Project D) A student copies a song of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site
D) A student copies a song of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site
Which of the following help convert URLs into IP addresses? A) client servers B) root servers C)web servers D) DNS servers
D) DNS servers
_____________ typically attack governments, organizations, and sometimes individuals for political purposes? A) Grey hates B) crackers C) White hats D) Hacktivists
D) Hacktivists
What is the first step in analyzing an ethical dilemma? A) Identify the potential consequences of your opinions B) Identify the options you can reasonably take C) Define the conflict or dilemma and identify the higher-order value involved D) Identify and describe the facts
D) Identify and describe the facts
Which of the following are the two main components of a systems design? A) front-end systems and back-end systems B) business objectives and technology requirements C) behavioral design and technological design D) logical design and physical design
D) logical design and physical design
All of the following are parts of business models employed in the online music industry except: A) subscription. B) download-and-own. C) cloud streaming. D) peer-to-peer streaming.
D) peer-to-peer streaming.
Which of the following involves testing a site program's modules one at a time? A) implementation testing B) system testing C) acceptance testing D) unit testing
D) unit testing