IST-140 Midterm Review Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

firewall

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

business plan

A ________ specifically details how you plan to find customers and to sell your product.

web beacon

A web beacon is: a cookie that carries a virus, an executable cookie, an automated applet for performing web searches, a tiny graphics file embedded in an e-mail or web page.

e-commerce merchant server software

All of the following are basic functionality provided by e-commerce merchant server software except: a product catalog, marketing analytics, a shopping cart.

cryptocurrencies

All of the following are examples of cryptocurrencies except: Ethereum, Ripple, Zelle, Monero.

social e-commerce

All of the following are platforms for social e-commerce except: Instagram, Facebook, Y Combinator, Pinterest.

authentication

All of the following are used for authentication except: digital signatures, certificates of authority, biometric devices, packet filters.

website design features

All of the following are website design features that annoy customers except: slow-loading pages, pop-under ads, splash pages, multi-browser functionality.

market creator business model

All of the following can be considered examples of the market creator business model except: eBay, Priceline, Uber, Twitter

pharming

Automatically redirecting a web link to a different address is an example of which of the following?

Conficker

Conficker is an example of a: worm, Trojan horse, virus, botnet.

Confidentiality

Confidentiality is sometimes confused with: Privacy, Authenticity, Integrity, Nonrepudiation.

Ubiquity

E-commerce is available just about everywhere and anytime.

Face ID

Face ID is an example of which of the following?

consumer skills

In modeling online consumer behavior, the concept of 'consumer skills' refers to the: education level of the consumer, communication skills of the consumer, knowledge consumers have about how to conduct online transactions, product evaluation skills of the consumer.

interactivity

Interactivity in the context of e-commerce provides which of the following functionalities? the ability to physically touch and manipulate a product, the complexity and content of a message, the ability of consumers to create and distribute content, the enabling of two-way communication between consumer and merchant.

Trojan horse

Malware that comes with a downloaded file requested by a user is called a: Trojan horse, backdoor, PUP, drive-by download.

PayPal

PayPal is an example of which of the following types of payment system?

augmented reality

Snapchat's Lenses feature is an example of which of the following?

spyware

Software that is used to obtain private user info such as a user's keystrokes or copies of e-mail is referred to as: spyware, a backdoor, a browser parasite, adware.

domain name system

The ________ allows a natural language expression, such as Google.com to represent a numeric IP address.

Uniform Resource Locator

The address used by a browser to identify the location of content on the Web is called: a domain name, a Uniform Resource Locator, an IP address, a file path.

cookies

The primary way a website is able to personalize the content presented to a visitor is through the use of: privacy policies, cookies, accessibility rules, site management tools.

VoIP

The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called: VoIP, IPTP, VTP, IP.

hacking and looting of corporate servers

What is the most frequent cause of stolen credit cards and card information today?

Amazon's primary value propositions

Which of the following are Amazon's primary value propositions?

digital catalog

Which of the following basic system functionalities is used to display goods on a website?

on-site blog

Which of the following helps you engage your customers in a conversation?

Facebook

Which of the following is a leading platform for social e-commerce?

marketplace

Which of the following is a physical place you visit in order to transact?

SWOT analysis

Which of the following is a simple but powerful method for describing a firm's strengths and weaknesses?

e-commerce first mover

Which of the following is an example of an e-commerce first mover that failed?

revenue model

Which of the following is another name for a revenue model?

portal

Which of the following is not considered a portal? Yahoo, MSN, AOL, Amazon

online purchasing process

Which of the following is not one of the main stages of the online purchasing process?

data breaches

Which of the following is the leading cause of data breaches?

stickiness

Which of the following measures the average length of stay at a website?

richness

Which of the following refers to the complexity and content of a message?

Bitcoin

Which of the following statements about Bitcoin is not true?

donor-based crowdfunding

Which of the following types of crowdfunding involves people making contributions with no expectation of any return?

richness

Which types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?

Authenticity

________ is the ability to identify the person or entity with whom you are dealing on the Internet.

Hacktivists

________ typically attack governments, organizations, and sometimes individuals for political purposes.

e-commerce

digitally enabled commercial transactions between organizations and individuals


संबंधित स्टडी सेट्स

Decision Analysis and Management Final Exam Chapter 13

View Set

Most Missed Chemistry Exam Questions

View Set

Chapter 41: Antitubercular Drugs

View Set