MIS 276: Test Two

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

___ verifies that the business objectives of the system as originally conceived are in fact working. A. Acceptance testing B. Unit testing C. Implementation testing D. System testing

A. Acceptance testing

All of the following are methods of securing channels of communication except: A. FTP B. certificates C. VPN D. SSL/TLS

A. FTP FTP which is an acronym for file transfer protocol is software provided as part of a web server and not a method for securing channels of communication via the internet

Which of the following organizations involved with Internet governance has the United States recently transitioned control of to the private sector? A. IANA B. ICANN C. NTIA D. IGF

A. IANA

What is the first step in developing an e-commerce security plan? A. Perform a risk assessment B. Create a security organization C. Develop a security policy D. Perform a security audit

A. Perform a risk assessment

Which of the following statements about responsive Web design (RWD) is not true? A. RWD works best for sites that have complex functionality B. RWD tools include HTML5 and CSS3 C. RWD makes it possible to design a Web site that automatically adjusts its layout and display according to the screen resolution of the device on which it is being viewed D. RWD can be costly, often requiring a complete redesign of the web site's interface

A. RWD works best for sites that have complex functionality RWD inherits the size and complexity of a traditional desktop site, sometimes making it slow to load and perform on a mobile device

All of the following offer Web site building tools except: A. Weebly B. Apache C. Wix D. WordPress

B. Apache Apache is open source web server software and not a web site builder service

___ refers to the ability to ensure that e-commerce participants do not deny their online actions. A. Availability B. Nonrepudiation C. Integrity D. Authenticity

B. Nonrepudiation In most cases, because merchants typically do not obtain a physical copy of a signature, the credit card issuer will side with the customer because the merchant has no legally valid proof that the customer ordered the merchandise.

One of the main reasons that IPv4 addresses will eventually be completely replaced by IPv6 dresses is that: A. IPv6 addresses include an encryption key that prevents all spoofing attacks by cyber criminals B. The capacity of IPv4 to deliver a unique address to each device attached is limited to 4.3 billion unique IP addresses. Eventually, every device connected to the internet will have its own unique IP address C. Fiber optic technology has been slowly replacing cable and DSL. IPv4 simply doesn't work well with fiber optic cable D. IPv4 addressing is being replaced by a new TCP/IP architecture

B. The capacity of IPv4 to deliver a unique address to each device attached is limited to 4.3 billion unique IP addresses. Eventually, every device connected to the internet will have its own unique IP address The older IP address standard IPv4 appears as a 32-bit number that is a series of four separate numbers separated by periods. The addressing scheme supports up to about 4.3 billion addresses. The need for a system that can support an almost infinite number of nodes on the network is needed to support our efforts to attach more and more things to the internet (things like your dryer or your shoes). The IPv6 addressing system provides the solution.

All of the following might be part of a Web site's middle-tier layer except: A. a database server B. a materials requirements planning (MRP) server C. a mail server D. an ad server

B. a materials requirements planning (MRP) server An MRP server, which manages manufacturing resources for a firm, would be part of the back end layer associated with existing operational information systems

All of the following are methods of improving the processing architecture of a Web site except: A. examining your database search times in order to optimize the database schema B. don't separate shopping cart and credit processing onto a dedicated server C. separating static content from dynamic content D. reviewing ASP code for operating efficiency

B. don't separate shopping cart and credit processing onto a dedicated server The firm might consider placing CPU intensive activities such as the shopping cart and credit card processing on a dedicated server to improve the processing performance of the e-commerce site

An ___ is typically owned by several members of the supply chain and serves businesses that primarily buy direct goods on a contract purchasing basis. A. e-procurement company B. industry consortium C. exchange D. e-distributor

B. industry consortium

Which of the following is a method of inventory cost management that seeks to eliminate excess inventory? A. sustainable production B. just-in-time production C. lean production D. supply chain simplification

B. just-in-time production

__ is a model of computing in which firms and individuals obtain computing power and software applications over the Internet, rather than purchasing and installing it on their own computers. A. Client/server computing B. P2P computing C. Cloud computing D. Mobile computing

C. Cloud computing Cloud computing is offered by third party service providers who own and manage very large, scalable cloud computing centers that provide computing power, data storage, and high-speed internet connections to customers who are able to choose from a variety of options.

___ is one of the original Internet services and is used to transfer files from a server computer to a client computer and vice versa A. SMTP B. SSL C. FTP D. HTTP

C. FTP FTP (File Transfer Protocol) is part of the TCP/IP protocol suite. It allows files to be transferred between client and server

A system design has two main components: A. business objectives and technology requirements B. a behavioral design and technological design C. a local design and a physical design D. front-end systems and back-end systems

C. a local design and a physical design The logical design describes the flow of information at your e-commerce site while the physical design translates the logical design into physical components

Which of the following is not an example of an access control? A. firewalls B. login passwords C. digital signatures D. proxy servers

C. digital signatures

Proxy servers are also known as: A. application getaways B. firewalls C. dual home systems D. packet filters

C. dual home systems

An ___ primarily serves businesses that primarily buy indirect goods on a contract basis. A. e-distributor B. industry consortium C. e-procurement Net marketplace D. exchange

C. e-procurement Net marketplace

All of the following are basic functionality provided by e-commerce merchant server software except: A. a product catalog B. a shopping cart C. marketing software D. credit card processing

C. marketing software Merchant server software (platforms) offer an integrated environment that provides a product catalog, a shopping cart and credit card processing

Online bill payment now accounts for ___ of all bill payments, while paper checks account for ___. A. 100%, 0% B. less than 10%, less than 25% C. more than 50%, less than 25% D. about 25%, about 10%

C. more than 50%, less than 25%

When talking about the physical elements of the Internet, the term redundancy refers to: A. the use of tiered high-speed switching computers to connect the backbone to regional and local networks B. delays in messages caused by the uneven flow of information through the network C. multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs D. transmitting multiple copies of a single packet to safeguard against data loss

C. multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs The internet backbone has built-in redundancy so that if one part breaks down, data can be rerouted to another part of the backbone

All of the following are characteristics of HTML5 except: A. ability to access built-in functionality of mobile devices, such as GPS and swiping B. a video element that replaces plug-ins such as Flash, Quicktime, and Real Player C. support for digital rights management D. use of CSS3

C. support for digital rights management In the past, media companies developed their own copy protection standards. These were enforced through their own media players. Because HTML5 does not require plug-ins to play videos, there currently isn't a standard way of protecting intellectual video content through HTML5

Which of the following is an example of an integrity violation of e-commerce security? A. A Web site is not actually operated by the entity the customer believes it to be B. A customer denies that he or she is the person who placed the order C. A merchant uses customer information in a manner not intended by the customer D. An unauthorized person intercepts an online communication and changes its contents

D. An unauthorized person intercepts an online communication and changes its contents Integrity is the ability to ensure that information being displayed on a web site or transmitted or received over the internet has not been altered in any way by an unauthorized party.

The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called: A. IPTP B. IP C. VTP D. VoIP

D. VoIP

Which of the following is the second leading cause of data breaches? A. hackers B. theft of a computer C. DDoS attacks D. accidental disclosures

D. accidental disclosures

The ___ allows a natural language expression, such as Google.com to represent a numeric IP address A. assigned numbers and names (ANN) system B. uniform resource locator system C. Internet protocol addressing schema D. domain name system

D. domain name system Your domain name is extremely important and part of your brand as an e-commerce firm

Which of the following is not an example of a PUP? A. spyware B. browser parasite C. adware D. drive-by download

D. drive-by download A drive by download is malware that comes with a downloaded file that a user requests. Whereas, a PUP installs itself on a computer without the user's informed consent.

Which of the following primary serve horizontal markets? A. exchanges and industry consortia B. e-procurement Net marketplaces and industry consortia C. e-distributors and exchanges D. e-distributors and e-procurement Net marketplaces

D. e-distributors and e-procurement Net marketplaces

An ___ primarily serves businesses that primarily buy direct goods as needed with an eye obtaining the lowest price possible. A. e-procurement company B. e-distributor C. industry consortium D. exchange

D. exchange

Private industrial networks are direct descendants of: A. independent exchanges B. industry consortia C. e-procurement Net marketplaces D. legacy EDI networks

D. legacy EDI networks

Which of the following would you use to verify that links on Web pages are valid? A. data capture tools B. FTP C. HTTP D. site management tools

D. site management tools By surveying the links on a web site, a site management tool can quickly report on "dead" hyperlinks found on your website

Which of the following is not a key point of vulnerability when dealing with e-commerce? A. the client computer B. the data base server C. the communications pipeline D. the customer credit card bank E. None of the above

E. None of the above Vulnerabilities both technical and human exist throughout the system and the process

To create the public_html folder on Hilltop that could host your web page we had to use on of the original TCP/IP protocol suite tools to create and alter the properties of the folder. The tool which allows you to logon to the remote computers operating system to gain access to the command prompt is known as ____ A. Telnet B. HTTP C. FTP D. SMTP

A. Telnet Telnet is a network protocol that allows a user on one computer to log onto another computer that is part of the same network

It's a small application with limited functionality that can be installed and executed within a web page by an end user. ___ often take the form of on-screen devices such as clocks, event countdowns, auction-tickers, stock market tickets, flight arrival information, daily weather, phone books, pictures, etc. A. Widgets B. Podcasts C. Cookies D. Wikis

A. Widgets Widgets allow users to turn personal content into dynamic web apps that can be shared on websites where the code can be installed

The primary way a Web site is able to personalize the content presented to a visitor is through the use of: A. cookies B. accessibility rules C. site management tools D. privacy policies

A. cookies A cookie is a small text file placed on the user's computer that can contain information about the customer like the history of product views at your website

Advantages of dynamic page generation include all of the following except: A. disables the use of content management systems which slow down system performance B. easier to change the contents of a database than to change the coding of an HTML page C. nearly cost-free price discrimination D. easy online market segmetation

A. disable the use of content management systems which slow down system performance Dynamic page generation enables the use of a content management system (CMS)

An ___ primarily serves businesses that buy indirect goods on a spot purchasing basis. A. e-distributor B. e-procurement company C. industry consortium D. exchange

A. e-distributor

All of the following are potential benefits of B2B e-commerce except: A. increased product cycle time B. increased opportunities to collaborate with suppliers and distributors C. increased production flexibility D. increased visibility and real-time information sharing among all participants in the supply chain network

A. increased product cycle time Product cycle time which indicates the time from when an order is placed until it is received by the buyer is reduced in B2B environments. B2B introduces efficient supply chain processes that reduce waste (unnecessary time).

All of the following are potential benefits of B2B e-commerce except: A. lower price transparency B. lower search costs C. lower administrative costs D. lower transaction costs

A. lower price transparency Higher price transparency is good for buyers and forces sellers to be price competitive. And, if the seller isn't at the lowest price, they need to be able to demonstrate how they add value versus the competition in order to demand a higher price.

The liquidity of a market is measured by all of the following except: A. price transparency B. size of transactions C. volume of transactions D. number of buyers and sellers in market

A. price transparency


संबंधित स्टडी सेट्स

EASA Part 66 : Mathematics Question2

View Set

Article 110- Requirements for Electrical Installations

View Set

International Economics Chapters 7,8,9

View Set

Wordly Wise 3000, book 7, lesson 9

View Set