test 2 ch 4 5 6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Around ________% of households in the United States have broadband access to the Internet.

75

Angler is an example of:

an exploit kit

Which of the following measures the percentage of customers who purchase once, but never return within a year?

attrition rate

All of the following are key design principles of responsive web design except:

coding by convention

Which of the following are the two main components of a systems design?

logical design and physical design

To answer a question such as "At what time of day does our company sell the most products?" you would use ________ data mining.

query driven

Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?

social media

In order from beginning to end, the major steps in the SDLC are:

systems analysis/planning; systems design; building the system; testing; and implementation.

Which of the following statements is not true?

Apple's Touch ID stores a user's actual fingerprint.

Which of the following is not one of the four main methods advertisers use to behaviorally target ads?

Nielsen ratings

Which of the following is a standard that makes it possible to access data from any application regardless of the database and operating system software being used?

ODBC

A Trojan horse appears to be benign, but then does something other than expected. T/F

T

A list server can be used to manage e-mail marketing campaigns. T/F

T

A native app is one designed to specifically operate using a mobile device's hardware and operating system. T/F

T

Apache web server software works with Linux and Unix operating systems. T/F

T

Bundling is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices T/F

T

Evidence suggests real-time customer chat increases the dollar value of transactions. T/F

T

According to Ponemon Institute's 2015 survey, which of the following was not among the causes of the costliest cybercrimes?

botnets

Which of the following measures the percentage of e-mails that could not be delivered?

bounce back rate

Which of the following is the most important tool in establishing a relationship with the customer?

company website

Which of the following is not an example of a PUP?

drive-by download

All of the following are basic functionality provided by e-commerce merchant server software except:

marketing analytics.

Beginning the e-commerce development process with a mobile presence rather than a desktop website is referred to as which of the following?

mobile first design

MySQL is which of the following?

open source database software

What is the first step in developing an e-commerce security plan?

perform a risk assessment

Which of the following types of application server monitors and controls access to a main web server and implements firewall protection?

proxy server

A digital certificate contains all of the following except the:

subject's private key.

All of the following statements about cookies are true except:

the data typically stored in cookies includes a unique ID and e-mail address.

The term stateless refers to the fact that:

the server does not have to maintain an ongoing dedicated interaction with the client computer.

Phishing attacks rely on browser parasites. T/F

F

Upgrading a server from a single processor to multiple processors is an example of scaling a site horizontally. T/F

F

Vishing attacks exploit SMS messages. T/F

F

Online traffic is driven by offline brands and shopping. T/F

T

PHP is an open source, general purpose scripting language that is most frequently used in server-side web applications to generate dynamic web page content. T/F

T

Regular in-app cookies cannot be shared between apps. T/F

T

Transaction logs are built into web server software T/F

T

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use. T/F

T

Which of the following is the most meaningful metric for video ads?

completion rate

Which of the following is not one of the main stages of the online purchasing process?

conversation

All of the following are limitations of the existing online credit card payment system except:

cost to consumers

Malware that comes with a downloaded file requested by a user is called a:

drive-by download.

Proxy servers are also known as:

dual home systems

A ________ is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network.

firewall

The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time.

flash marketing

Most of the time required to maintain an e-commerce site is spent on:

general administration and making changes and enhancements to the system

Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?

universal standards

Which of the following has the Internet Advertising Bureau urged advertisers to abandon?

Adobe Flash

Which of the following technologies is used to separate the design and presentation of content from the content creation process?

CMS

________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

Confidentiality

CryptoLocker is an example of ransomware. T/F

T

________ is not an open source software tool.

WebSphere

eCPM measures the ROI of an ad by dividing the total earnings of the ad by which of the following?

the total number of impressions in thousands

Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders?

two-tier architecture

View-through rate measures the ________ response rate to an ad

30-day

For a website that has 1 million visitors a month, and where, on average, a visitor makes five page requests per visit, there will be ________ entries in the transaction log each month.

5 million

The Data Encryption Standard uses a(n) ________-bit key.

56

In 2016, what was the approximate Internet penetration rate for individuals with less than a high-school education?

66%

All of the following are methods of securing channels of communication except:

FTP

________ typically attack governments, organizations, and sometimes individuals for political purposes.

Hacktivists

All of the following offer website building tools except:

Apache


Ensembles d'études connexes

APUSH Midterm Practice Questions and Answers

View Set

Questions Implied by the Universal Structures of Thought

View Set

Developmental dysplasia of the hip

View Set

Intermediate Accounting, Exam 3 Adaptive Practice

View Set

Fundamental HESI, Hesi Fundamentals, Hesi Fundamentals Practice Test, UNIT 1: Foundations of Nursing Practice

View Set

Chapter 6 Inventory & Cost of Goods Sold

View Set