test 2 ch 4 5 6
Around ________% of households in the United States have broadband access to the Internet.
75
Angler is an example of:
an exploit kit
Which of the following measures the percentage of customers who purchase once, but never return within a year?
attrition rate
All of the following are key design principles of responsive web design except:
coding by convention
Which of the following are the two main components of a systems design?
logical design and physical design
To answer a question such as "At what time of day does our company sell the most products?" you would use ________ data mining.
query driven
Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?
social media
In order from beginning to end, the major steps in the SDLC are:
systems analysis/planning; systems design; building the system; testing; and implementation.
Which of the following statements is not true?
Apple's Touch ID stores a user's actual fingerprint.
Which of the following is not one of the four main methods advertisers use to behaviorally target ads?
Nielsen ratings
Which of the following is a standard that makes it possible to access data from any application regardless of the database and operating system software being used?
ODBC
A Trojan horse appears to be benign, but then does something other than expected. T/F
T
A list server can be used to manage e-mail marketing campaigns. T/F
T
A native app is one designed to specifically operate using a mobile device's hardware and operating system. T/F
T
Apache web server software works with Linux and Unix operating systems. T/F
T
Bundling is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices T/F
T
Evidence suggests real-time customer chat increases the dollar value of transactions. T/F
T
According to Ponemon Institute's 2015 survey, which of the following was not among the causes of the costliest cybercrimes?
botnets
Which of the following measures the percentage of e-mails that could not be delivered?
bounce back rate
Which of the following is the most important tool in establishing a relationship with the customer?
company website
Which of the following is not an example of a PUP?
drive-by download
All of the following are basic functionality provided by e-commerce merchant server software except:
marketing analytics.
Beginning the e-commerce development process with a mobile presence rather than a desktop website is referred to as which of the following?
mobile first design
MySQL is which of the following?
open source database software
What is the first step in developing an e-commerce security plan?
perform a risk assessment
Which of the following types of application server monitors and controls access to a main web server and implements firewall protection?
proxy server
A digital certificate contains all of the following except the:
subject's private key.
All of the following statements about cookies are true except:
the data typically stored in cookies includes a unique ID and e-mail address.
The term stateless refers to the fact that:
the server does not have to maintain an ongoing dedicated interaction with the client computer.
Phishing attacks rely on browser parasites. T/F
F
Upgrading a server from a single processor to multiple processors is an example of scaling a site horizontally. T/F
F
Vishing attacks exploit SMS messages. T/F
F
Online traffic is driven by offline brands and shopping. T/F
T
PHP is an open source, general purpose scripting language that is most frequently used in server-side web applications to generate dynamic web page content. T/F
T
Regular in-app cookies cannot be shared between apps. T/F
T
Transaction logs are built into web server software T/F
T
Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use. T/F
T
Which of the following is the most meaningful metric for video ads?
completion rate
Which of the following is not one of the main stages of the online purchasing process?
conversation
All of the following are limitations of the existing online credit card payment system except:
cost to consumers
Malware that comes with a downloaded file requested by a user is called a:
drive-by download.
Proxy servers are also known as:
dual home systems
A ________ is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network.
firewall
The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time.
flash marketing
Most of the time required to maintain an e-commerce site is spent on:
general administration and making changes and enhancements to the system
Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?
universal standards
Which of the following has the Internet Advertising Bureau urged advertisers to abandon?
Adobe Flash
Which of the following technologies is used to separate the design and presentation of content from the content creation process?
CMS
________ refers to the ability to ensure that messages and data are only available to those authorized to view them.
Confidentiality
CryptoLocker is an example of ransomware. T/F
T
________ is not an open source software tool.
WebSphere
eCPM measures the ROI of an ad by dividing the total earnings of the ad by which of the following?
the total number of impressions in thousands
Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders?
two-tier architecture
View-through rate measures the ________ response rate to an ad
30-day
For a website that has 1 million visitors a month, and where, on average, a visitor makes five page requests per visit, there will be ________ entries in the transaction log each month.
5 million
The Data Encryption Standard uses a(n) ________-bit key.
56
In 2016, what was the approximate Internet penetration rate for individuals with less than a high-school education?
66%
All of the following are methods of securing channels of communication except:
FTP
________ typically attack governments, organizations, and sometimes individuals for political purposes.
Hacktivists
All of the following offer website building tools except:
Apache