IST-140 Midterm Review Questions
firewall
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
business plan
A ________ specifically details how you plan to find customers and to sell your product.
web beacon
A web beacon is: a cookie that carries a virus, an executable cookie, an automated applet for performing web searches, a tiny graphics file embedded in an e-mail or web page.
e-commerce merchant server software
All of the following are basic functionality provided by e-commerce merchant server software except: a product catalog, marketing analytics, a shopping cart.
cryptocurrencies
All of the following are examples of cryptocurrencies except: Ethereum, Ripple, Zelle, Monero.
social e-commerce
All of the following are platforms for social e-commerce except: Instagram, Facebook, Y Combinator, Pinterest.
authentication
All of the following are used for authentication except: digital signatures, certificates of authority, biometric devices, packet filters.
website design features
All of the following are website design features that annoy customers except: slow-loading pages, pop-under ads, splash pages, multi-browser functionality.
market creator business model
All of the following can be considered examples of the market creator business model except: eBay, Priceline, Uber, Twitter
pharming
Automatically redirecting a web link to a different address is an example of which of the following?
Conficker
Conficker is an example of a: worm, Trojan horse, virus, botnet.
Confidentiality
Confidentiality is sometimes confused with: Privacy, Authenticity, Integrity, Nonrepudiation.
Ubiquity
E-commerce is available just about everywhere and anytime.
Face ID
Face ID is an example of which of the following?
consumer skills
In modeling online consumer behavior, the concept of 'consumer skills' refers to the: education level of the consumer, communication skills of the consumer, knowledge consumers have about how to conduct online transactions, product evaluation skills of the consumer.
interactivity
Interactivity in the context of e-commerce provides which of the following functionalities? the ability to physically touch and manipulate a product, the complexity and content of a message, the ability of consumers to create and distribute content, the enabling of two-way communication between consumer and merchant.
Trojan horse
Malware that comes with a downloaded file requested by a user is called a: Trojan horse, backdoor, PUP, drive-by download.
PayPal
PayPal is an example of which of the following types of payment system?
augmented reality
Snapchat's Lenses feature is an example of which of the following?
spyware
Software that is used to obtain private user info such as a user's keystrokes or copies of e-mail is referred to as: spyware, a backdoor, a browser parasite, adware.
domain name system
The ________ allows a natural language expression, such as Google.com to represent a numeric IP address.
Uniform Resource Locator
The address used by a browser to identify the location of content on the Web is called: a domain name, a Uniform Resource Locator, an IP address, a file path.
cookies
The primary way a website is able to personalize the content presented to a visitor is through the use of: privacy policies, cookies, accessibility rules, site management tools.
VoIP
The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called: VoIP, IPTP, VTP, IP.
hacking and looting of corporate servers
What is the most frequent cause of stolen credit cards and card information today?
Amazon's primary value propositions
Which of the following are Amazon's primary value propositions?
digital catalog
Which of the following basic system functionalities is used to display goods on a website?
on-site blog
Which of the following helps you engage your customers in a conversation?
Which of the following is a leading platform for social e-commerce?
marketplace
Which of the following is a physical place you visit in order to transact?
SWOT analysis
Which of the following is a simple but powerful method for describing a firm's strengths and weaknesses?
e-commerce first mover
Which of the following is an example of an e-commerce first mover that failed?
revenue model
Which of the following is another name for a revenue model?
portal
Which of the following is not considered a portal? Yahoo, MSN, AOL, Amazon
online purchasing process
Which of the following is not one of the main stages of the online purchasing process?
data breaches
Which of the following is the leading cause of data breaches?
stickiness
Which of the following measures the average length of stay at a website?
richness
Which of the following refers to the complexity and content of a message?
Bitcoin
Which of the following statements about Bitcoin is not true?
donor-based crowdfunding
Which of the following types of crowdfunding involves people making contributions with no expectation of any return?
richness
Which types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?
Authenticity
________ is the ability to identify the person or entity with whom you are dealing on the Internet.
Hacktivists
________ typically attack governments, organizations, and sometimes individuals for political purposes.
e-commerce
digitally enabled commercial transactions between organizations and individuals