Eccomerce
there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.
A perfect market is one in which:
cloud security issue
Accessing data without authorization on Dropbox is an example of which of the following?
legacy corporate applications.
All of the following might be part of a Web site's middle-tier layer except
Apple Pay is available for both iPhone 5s and iPhone 6s.
All of the following statements about Apple Pay are true except which of the following?
fast follower advantage
All of the following were visions of e-commerce expressed during the early years of e-commerce except:
symmetric key cryptography is computationally slower.
All the following statements about symmetric key cryptography are true except:
blocking suspicious activity.
An intrusion detection system can perform all of the following functions except:
digital cash.
Bitcoins are an example of:
Python
Django is based on which of the following?
the use of the Internet, the Web, and mobile apps to transact business.
E-commerce can be defined as:
ubiquity
E-commerce is available just about everywhere and anytime. This is known as ________.
3.1 billion
In 2015, the world's online population was estimated to be around:
own the content being provided.
In general, the key to becoming a successful content provider is to:
.com
In the address http://www.company.com/clients.html, which of the following is the top-level domain?
1995
In which year can e-commerce be said to have begun?
incubators
Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as:
online stored value payment system
PayPal is an example of what type of payment system?
spyware.
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
56
The Data Encryption Standard uses a(n) ________-bit key.
addressing, packaging, and routing messages
The Internet Layer of TCP/IP is responsible for which of the following?
providing communication with the application by acknowledging and sequencing the packets to and from the application
The Transport Layer of TCP/IP is responsible for which of the following?
domain name system
The ________ allows a natural language expression, such as Google.com to represent a numeric IP address.
e-distributors
The business model of e-tailers is quite similar to that of:
the market is saturated.
The existence of a large number of competitors in any one market segment may indicate:
Mosaic
The first Web browser to make it possible to view documents on the Web with colored background, images, and animations was:
cookies.
The primary way a Web site is able to personalize the content presented to a visitor is through the use of:
benchmarking.
The process of comparing a Web site with that of its competitors in terms of response speed, quality of layout, and design is known as:
packet switching
The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:
Foursquare's business model faces significant intellectual property concerns.
Which of the following statements about Foursquare is not true?
RWD works best for sites that have complex functionality.
Which of the following statements about responsive Web design (RWD) is not true?
logical design
Which of the following typically includes a data flow diagram to describe the flow of information for an e-commerce site?
acceptance testing
Which of the following verifies that the business objectives of the system as originally conceived are in fact working?
System functionalities
________ are the types of information systems capabilities needed to meet business objectives.
Ping
________ is a utility program that allows you to check the connection between your client and a TCP/IP network.
Nonrepudiation
________ refers to the ability to ensure that e-commerce participants do not deny their online actions.
Hacktivists
________ typically attack governments, organizations, and sometimes individuals for political purposes.
selection and convenience
Which of the following are Amazon's primary value propositions?
Which of the following is an example of social e-commerce?
TCP/IP
Which of the following is the core communications protocol for the Internet?
vertical
A ________ marketplace supplies products and services of interest to particular industries.
Angel Investor
A wealthy individual who invests personal funds in a start-up in exchange for an equity stock in the business is referred to as a(n) ________.
redundant navigation.
All of the following are Web site design features that annoy customers except:
customer ID numbers
All of the following are basic information requirements for a product database except:
support for digital rights management.
All of the following are characteristics of HTML5 except:
FTP.
All of the following are methods of securing channels of communication except
the development of the smartphone.
All of the following can be considered a precursor to e-commerce except:
pharming
Automatically redirecting a Web link to a different address is an example of which of the following?
e-distributor
W.W. Grainger is an example of which of the following business models?
Perform a risk assessment.
What is the first step in developing an e-commerce security plan?
Drones
What type of Internet access technology are Google and Facebook hoping to use to provide Internet access to remote parts of the world?
multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.
When talking about the physical elements of the Internet, the term redundancy refers to:
competitive environment
Which element of the business model refers to the presence of substitute products in the market?
E*Trade
Which of the following companies uses a transaction fee revenue model?
freemium strategy
Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service?
unit testing
Which of the following involves testing a site program's modules one at a time?
WebSphere
Which of the following is not an open source software tool?
Microsoft IIS
Which of the following is not part of the LAMP open source Web development model?
intellectual property
Which of the following is one of the three primary societal issues related to e-commerce?
WPA2
Which of the following is the current standard used to protect Wi-Fi networks?
two-tier architecture
Which of the following is the minimum system architecture requirement for an e-commerce Web site that processes orders?
ICANN
Which of the following organizations coordinates the Internet's systems of unique identifiers, such as IP addresses and top-level domain systems?
information asymmetry
Which of the following refers to any disparity in relevant market information among parties in a transaction?
Marketplace
Which of the following is a physical place you visit in order to transact?
AWD
Which of the following is a server-side technique that detects the attributes of the device making the request, and using predefined templates, loads a version of a site that is optimized for the device?
An unauthorized person intercepts an online communication and changes its contents.
Which of the following is an example of an integrity violation of e-commerce security?
Airbnb
Which of the following is an example of an on-demand service company?
FiOS
Which of the following is not a basic type of cloud computing service?
Priceline
Which of the following is not a community provider?
the high cost of sensors
Which of the following is not a concern about IoT?
Small businesses and entrepreneurs are hampered by the rising cost of market entry caused by increased presence of industry giants.
Which of the following is not a major business trend in e-commerce in 2015-2016?
information asymmetry
Which of the following is not a unique feature of e-commerce technology?
Bluefly
Which of the following is not an example of the bricks-and-clicks e-tailing business model?
latency
Which of the following refers to delays in messages caused by the uneven flow of information packets through the network?
richness
Which of the following refers to the complexity and content of a message?
disintermediation
Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers?