E Commerce Chapter 4-6
the ability to ensure that ecommerce participants do not deny their online actions
What is 'nonrepudiation'?
two mathematically related digital keys are used: a public key and a private key
What is 'public key encryption'?
malware that is designed to spread from computer to computer
What is a 'worm'?
program that installs itself on a computer, typically without the users informed consent
What is a PUP(Potentially Unwanted Program)?
Unit testing involves site's program modules. System testing involves the site as a whole
What is the difference between 'unit testing' and 'system testing'?
System planning, system design, building system, testing, implementation
What is the systems development life cycle(SDLC)?
b. digital catalog
Which of the following basic system functionalities is used to display goods on a Web site? a. product database b. digital catalog c. shopping cart system d. customer database system
d. HTML
Which of the following cannot be used to retrieve objects from a database? a. CGI b. ASP c. JSP d. HTML
the information systems must produce in order to achieve the business objectives
Define 'information requirements'
distributed denial of service
Define DDoS
denial of service
Define DoS
potentially unwanted program
Define PUP
types of system capabilities you will need to achieve business objectives
Define system 'functionalities'
False
T/F A mobile Web app is one designed to specifically operate using a mobile device's hardware and operating system.
False
T/F Apache HTTP Web server software is based on Microsoft's Windows operating system.
False
T/F In a two-tier architecture, a Web server is linked to one middle-tier layer that typically includes a series of application servers, as well as to another back-end layer.
false
T/F One of the most important challenges in developing an e-commerce presence is understanding that the technology must drive the business.
True
T/F Storing HTML pages in RAM rather than on a server's hard drive is an inexpensive way to fine-tune the processing architecture of a Web site.
strengths, weaknesses, opportunity, threats
What does SWOT stand for?
every occurrence of a given letter is replaced systematically by another letter
What is 'substitution cipher'?
Both the sender and receiver use the same key to encrypt and decrypt the message
What is 'symmetric key encryption'?
ordering of the letters in each word is changed in some systematic way
What is 'transposition cipher'?
currency to purchase virtual goods in a virtual world
What is 'virtual currency'?
hacker with criminal intent
What is a 'Cracker'?
an algorithm that produces a fixed-length number called a hash
What is a 'hash function'?
d. blog posts
Which of the following is an example of dynamic content? a. product photographs b. product descriptions c. home page graphic d. blog posts
d. ftp server
Which of the following is not a type of application server? a. proxy server b. mail server c. ad server d. FTP server
d. optimize system architecture
Which of the following is not one of the basic business objectives for an e-commerce site? a. display goods b. execute a transaction c. provide production and supplier links d. optimize system architecture
a. mobile plan
Which of the following is the final stage suggested for a six-phase plan to develop an e-commerce presence? a. mobile plan b. maintenance c. testing plan d. Twitter plan
c. Mobile Web sites operate twice as fast as traditional Web sites.
Which of the following statements is not true? a. The number of Web searches performed on mobile devices has more than quadrupled since 2010. b. By 2013, more people will use their mobile phones than PCs to go online. c. Mobile Web sites operate twice as fast as traditional Web sites. d. By 2015, there will be one mobile device for every person on earth.
d. cms
Which of the following technologies could you use to place the content of your Web site in a database so that you can then dynamically generate requests for pages? a. Apache web server b. proxy server c. shopping cart d. CMS
a. proxy server
Which of the following types of servers monitors and controls access to a main Web server and implements firewall protection? a. proxy server b. list server c. groupware server d. mail server
d. site management tools
Which of the following would you use to identify orphan files? a. HTTP b. FTP c. data capture tools d. site management tools
system functionalities
________ are the types of information systems capabilities needed to meet business objectives: -Information requirements -System functionalities -System design specifications -Physical design specifications
a. cgi
________ provides a set of standards for communicating between a browser and a program running on a server that allows for interaction between the user and server. a. CGI b. ColdFusion c. JavaScript d. VBScript
b. Acceptance testing
________ verifies that the business objectives of the system as originally conceived are in fact working: a. System testing b. Acceptance testing c. Unit testing d. Implementation testing
d. redundant navigation.
All of the following are Web site design features that annoy customers except: a. slow-loading pages. b. pop-under ads. c. splash pages. d. redundant navigation.
b. marketing software
All of the following are basic functionality provided by e-commerce merchant server software except: a. a product catalog. b. marketing software. c. a shopping cart. d. credit card processing.
adhering to accessibility guidelines.
All of the following are important factors in Web site optimization except: a. selecting keywords and page titles. b. identifying market niches for your services or products. c. buying search engine ads. d. adhering to accessibility guidelines.
d. adding Web servers.
All of the following are methods of improving the processing architecture of a Web site except: a. separating static content from dynamic content. b. optimizing ASP code. c. optimizing the database schema. d. adding Web servers.
d. an application server.
All of the following might be part of a Web site's backend layer except: a. a pre-existing corporate database. b. a human resources system. c. a production MRP system. d. an application server.
b. two-tier
An e-commerce Web site that processes orders requires, at minimum, a ________ system architecture. a. single-tier b. two-tier c. three-tier d. multi-tier
c. LinkedIn.
The opening case discusses Tommy Hilfiger's use of all of the following social media sites as marketing tools except: a. Facebook. b. Tumblr. c. LinkedIn. d. Twitter.
c. customers
The structure of a market is described in terms of all of the following except: a. substitute products b. direct competitors c. customers d. suppliers
translates logical design into physical components
What is 'Physical Design'?
the ability to control the use of information about oneself
What is 'Privacy'?
the ability to identify the identity of a person or entity
What is 'authenticity'?
the ability to ensure that an ecommerce site continues to function as intended
What is 'availability'?
the transaction log that consumers establish as they move about the web
What is 'clickstream behavior'?
the ability to ensure that messages and data are available to those who are authorized
What is 'confidentiality'?
alternative payment system in which tokens represent cash value
What is 'digital cash'?
the process of turning text or data into cipher that cant be read by anyone other than the sender and receiver
What is 'encryption'?
the ability to ensure that information displayed on the internet is not altered by an unauthorized party.
What is 'integrity'?
describes the flow of information, the processing functions, the databases that will be used, the security and emergency backup procedures, and the controls
What is 'logical design'?
software server that handles all internet communications
What is a 'proxy server'?
allows remote users to securely access internal networks via the internet, using the point-to-point tunneling protocol (ttp)
What is a 'virtual private network'?
a. a logical design and a physical design
A system design has two main components: a. a logical design and a physical design. b. a behavioral design and a technological design. c. business objectives and technology requirements. d. front-end systems and back-end systems.