Electronic Commerce MidTerm Review CH 1-5
In the address http://www.company.com/clients.html, which of the following is the top-level domain?
.com
Which of the following companies uses a transaction fee revenue model?
E*Trade
Which of the following is not an example of the bricks-and-clicks e-tailing business model?
Bluefly
Which of the following is not a concern about IoT?
the high cost of sensors
Which of the following typically includes a data flow diagram to describe the flow of information for an e-commerce site?
logical design
The Data Encryption Standard uses a(n) ________-bit key.
56
Which of the following is an example of an on-demand service company?
Airbnb
All of the following statements about Apple Pay are true except which of the following?
Apple Pay is available for both iPhone 5s and iPhone 6s.
All of the following are methods of securing channels of communication except:
FTP
Which of the following is an example of social e-commerce?
Which of the following is not a basic type of cloud computing service?
FiOS
Which of the following statements about Foursquare is not true?
Foursquare's business model faces significant intellectual property concerns.
________ typically attack governments, organizations, and sometimes individuals for political purposes.
Hacktivists
Which of the following organizations coordinates the Internet's systems of unique identifiers, such as IP addresses and top-level domain systems?
ICANN
Which of the following is not part of the LAMP open source Web development model?
Microsoft IIS
The first Web browser to make it possible to view documents on the Web with colored background, images, and animations was:
Mosaic
________ refers to the ability to ensure that e-commerce participants do not deny their online actions.
Nonrepudiation
What is the first step in developing an e-commerce security plan?
Perform a risk assessment.
________ is a utility program that allows you to check the connection between your client and a TCP/IP network.
Ping
Which of the following is not a community provider?
Priceline
Django is based on which of the following?
Python
Which of the following statements about responsive Web design (RWD) is not true?
RWD works best for sites that have complex functionality.
Which of the following is not a major business trend in e-commerce in 2015-2016?
Small businesses and entrepreneurs are hampered by the rising cost of market entry caused by increased presence of industry giants.
________ are the types of information systems capabilities needed to meet business objectives.
System functionalities
Which of the following is the core communications protocol for the Internet?
TCP/IP
Which of the following is the current standard used to protect Wi-Fi networks?
WPA2
Which of the following is not an open source software tool?
WebSphere
Which of the following verifies that the business objectives of the system as originally conceived are in fact working?
acceptance testing
The Internet Layer of TCP/IP is responsible for which of the following?
addressing, packaging, and routing messages
Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers?
disintermediation
The ________ allows a natural language expression, such as Google.com to represent a numeric IP address.
domain name system
What type of Internet access technology are Google and Facebook hoping to use to provide Internet access to remote parts of the world?
drones
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
spyware
All of the following are characteristics of HTML5 except:
support for digital rights management
All the following statements about symmetric key cryptography are true except:
symmetric key cryptography is computationally slower.
All of the following can be considered a precursor to e-commerce except:
the development of the smartphone.
An intrusion detection system can perform all of the following functions except:
blocking suspicious activity
A wealthy individual who invests personal funds in a start-up in exchange for an equity stock in the business is referred to as a(n) ________.
angel investor
In 2015, the world's online population was estimated to be around:
3.1 billion
Bitcoins are an example of:
digital cash
Which of the following refers to delays in messages caused by the uneven flow of information packets through the network?
latency
When talking about the physical elements of the Internet, the term redundancy refers to:
multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.
Automatically redirecting a Web link to a different address is an example of which of the following?
pharming
All of the following are Web site design features that annoy customers except:
redundant navigation.
Which of the following refers to the complexity and content of a message?
richness
The primary way a Web site is able to personalize the content presented to a visitor is through the use of:
cookies.
All of the following are basic information requirements for a product database except:
customer ID numbers.
W.W. Grainger is an example of which of the following business models?
e-distributor
The business model of e-tailers is quite similar to that of:
e-distributors
All of the following were visions of e-commerce expressed during the early years of e-commerce except:
fast follower advantage.
Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service?
freemium strategy
Which of the following is not a unique feature of e-commerce technology?
information asymmetry
Which of the following refers to any disparity in relevant market information among parties in a transaction?
information asymmetry
Which of the following is one of the three primary societal issues related to e-commerce?
intellectual property
All of the following might be part of a Web site's middle-tier layer except:
legacy corporate applications.
Which of the following is a physical place you visit in order to transact?
marketplace
PayPal is an example of what type of payment system?
online stored value payment system
In general, the key to becoming a successful content provider is to:
own the content being provided.
The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:
packet switching.
The Transport Layer of TCP/IP is responsible for which of the following?
providing communication with the application by acknowledging and sequencing the packets to and from the application
Which of the following are Amazon's primary value propositions?
selection and convenience
Which of the following is a server-side technique that detects the attributes of the device making the request, and using predefined templates, loads a version of a site that is optimized for the device?
AWD
The process of comparing a Web site with that of its competitors in terms of response speed, quality of layout, and design is known as:
benchmarking.
Accessing data without authorization on Dropbox is an example of which of the following?
cloud security issue
Which element of the business model refers to the presence of substitute products in the market?
competitive environment
Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as:
incubators.
The existence of a large number of competitors in any one market segment may indicate:
the market is saturated.
E-commerce can be defined as:
the use of the Internet, the Web, and mobile apps to transact business.
A perfect market is one in which:
there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.
Which of the following is the minimum system architecture requirement for an e-commerce Web site that processes orders?
two-tier architecture
E-commerce is available just about everywhere and anytime. This is known as ________.
ubiquity
Which of the following involves testing a site program's modules one at a time?
unit testing
A ________ marketplace supplies products and services of interest to particular industries.
vertical
In which year can e-commerce be said to have begun?
1995
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.