3330 Ecommerce Final Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Venture Capital Investors

Invest funds they manage for other investors such as investment banks, pension funds, insurance companies, or other businesses and usually want to obtain a larger stake in the business and exercise more control over the operation of the business. Also typically want a well-defined exit strategy such as a plan for an initial public offering or acquisition of the company by a more establish business within a relatively short period of time.

Spoofing

Involves attempting to hide in a true identity by using someone else's email or IP address. IE. a spoofed email will have a forged sender email address designed to mislead the receiver about who sent the email.

Java Server Pages (JSP)

Like CGI and ASP, a web page coding standard that allows developers to dynamically generate web pages in response to user requests

Client/Server Computing

Model of computing in which client computers are connected in a network together with one or more servers which are computers that are dedicated to performing functions that the client computers on the network need, such as file storage, software applications, printing and internet access.

the web

One of the most popular services that runs on the Internet infrastructure. The original killer app that made the internet commercially interesting and extraordinarily popular. Developed in the early 90s and hence much more recent vintage than the internet. Provides access to billions of web pages.

Mobile platform

Provides the ability to access the internet from a variety of highly mobile devices such as smart phones, tablets and other ultra-lightweight laptop computers.

Firewall

Refers to either hardware or software that filters communication packets and prevents some packets from entering the network based on a security policy.

4 Layers of the Internet

Network technology substrate layer, transport services and representation standards layer, applications layer,

What is the most frequent cause of stolen credit cards and card information today?

Phishing attack

Spyware

Program used to obtain information such as a user's keystrokes, email, instant messaging, and son on. Can even take screen shots and capture passwords or other confidential information

System Architecture

Refers to the arrangement of software, machinery and tasks in an information system needed to achieve a specific functionality much like a homes architecture refers to the arrangement of building materials to achieve a particular functionality.

6. Local e

commerce- Focused on engaging the consumer based on his or her current geographic location. Groupon offers subscribers daily deals from local businesses in the form of Groupons, discount coupons that take effect once enough subscribers have agreed to purchase

applications layer

contains client apps such as WWWeb , email, and audio or video playback.

Which of the following is not a primary activity in a firm value chain,

finance/accounting

transport services and representation standards layer

houses the tcp/ip protocol

All of the following are key elements of a business model except

information technology strategy.

Internet layer

responsible for addressing, packaging and routing messages on the internet.

Active X

A programming language created by Microsoft to compete with JAVA

Web2.0

A set of apps and technologies that enable use-generated content, such as online social networks, blogs, video and photo sharing sites, and wikis, widespread adoption of consumer mobile devices such as smartphones and tablet computers the expansion of e-commerce to include local goods and services.

Business model

A set of planned activities (sometimes referred to as business processes) designed to result in a profit in a marketplace. Not always the same as a business strategy, although in some cases they are very close insofar as the business model explicitly takes into account the competitive environment. It is at the center of the business plan.A business document that specifically details how you plan on selling your product and find new customers is called a: market strategy.

Common Gateway Interface (CGI)

A set of standards for communication between a browser and a program running on a server that allows for interaction between the user and the server

Hadoop

A software framework for working with various big data sets. Open source software, managed by Apache software foundation. Enables distributed parallel processing of huge amounts of data across inexpensive computers.

Intranet

A tcp/ip network located within a single organization for purposes of communications and information processing.

Cookie

A tool used by Web sites to store information about a user. When a visitor enters a web site, the site sends a small text file, the cookie to the user's computer so that information from the site can be loaded more quickly on future visits. The cookie can contain any information desired by the site designers.

Internet2

Advanced networking consortium of more than 350 member institutions working in partnership to facilitate the development, deployment, and use of revolutionary internet technologies.

Cold Fusion

An integrated server-side environment for developing interactive web applications.

Phishing attack

Any deceptive, online attempt by a third party to obtain confidential information for financial gain. Typically, do not involve malicious code but instead rely on straightforward misrepresentation and fraud. So called social engineering techniques email scam.

An Internetenabled media player would run in which layer of Internet architecture

Application layer

4 layers of tcp/ip

Application, host to host transport layer, internet layer, network interface layer

Scale Economies

Are efficiencies that result from increasing the size of a business, for instance when large, fixed-cost production systems (such as factories or software systems) can be operated at full capacity with no idle time. Scale economies are efficiencies that result from flattening the hierarchy of an organization-FALSE

The 6 types of ecommerce

B2B, B2C, C2C, Mobile, Social, Local

Botnet

Collection of captured bot computers used for malicious activates such as sending spam, participating in a DDoS attack, stealing information from computers, and storing network traffic for later analysis.

3. Consumer to Consumer

Consumers selling to other consumers Example: Auction sites such as eBay, and listing sites such as Craigslist, enable consumers to auction or sell goods directly to other consumers. Airbnb and Uber provide similar platforms for services such as room rental and transportation.

Symmetric Key Encryption

Both the sender and the receiver use the same key to encrypt and decrypt the message.

E

Business-The digital enabling of transactions and processes within a firm, involving information systems under the control of the firm.

Which of the following left the WikiLeaks Web site effectively inoperable in August 2012

DDoS attacks

Content Management System (CMS)

Database software program specifically designed to manage structured and unstructured data and objects in a web site environment. A cms provides web managers and designers with a centralized control structure to manage we site content.

Privacy

Deals with the use of information shared during an online transaction consumers want to limit the extent to which their personal information can be divulged to other organizations, while, merchants want to protect such information from falling into the wrong hand.

Value Proposition

Defines how a company's product or service fulfills the needs of customers. To develop and or analyze a firm's value proposition, you need to understand why customers will choose to do business with the firm instead of another company and what the firm provides that other firms do not and cannot. Value proposition and revenue are typically the most easily identifiable aspects of a company's business model.

Revenue Model

Describes how the firm will earn revenue, generate profits and produce a superior return on invested capital. We use the terms revenue model and financial model interchangeably. Generate profits and to produce returns on invested capital that exceed alternative investments. Profits alone are not sufficient to make a company "successful". in order to be successful a firm must produce returns greater than alternative investments.

Availability

Determines whether a Web site is accessible and operational at any given moment. Availability refers to the ability to ensure that an e-commerce site continues to function as intended.

Confidentiality

Determines whether information shared online, such as through email communication or an order process, can be viewed by anyone other than the intended recipient.

middleware services layer

glue that ties the applications to the communications

Which dimension(s) of security is spoofing a threat to?

integrity and authenticity

ecommerce security (6 Dimensions)

integrity, nonrepudiation, authenticity, confidentiality, privacy, availability

All of the following are used for authentication except

packet filters. all of these are used for authentication; biometric devices, digital signatures, certificates of authority.

TCP

protocol that establishes the connections among sending and receiving web computers and handles the assembling of packets at the point of transmission and their reassembly at the receiving end

IP

protocol that provides the internets addressing scheme and is responsible for the actual deliver of the packets

Application layer

provides a wide variety of applications with the ability to access the services of the lower layers. Some of the best known applications are HTTP, FTP and SMTP

The Transport Layer of TCP/IP is responsible for which of the following?

providing communication with the application by acknowledging and sequencing the packets to and from the application

4. Mobile Comerce

refers to the use of mobile devices to enable online transactions. Involves the use of cellular and wireless networks to connect laptops, smartphones such as iPhone or Android and tablets to the internet. Example: Mobile devices can be used to conduct commercial transactions

Network interface layer

responsible for placing packets on and receiving them from the network medium which could be a LAN (Ethernet) or a Token Ring network, or other network technology. TCP/IP is independent from any local network technology and can adapt to changes at the local level.

Host to host transport layer

responsible for providing communication with the application by acknowledging and sequencing the packets to and from the application.

Which of the following can be used to record all keyboard activity of a user

spyware

Affiliate revenue model

steer business to an affiliate receive a referral fee or percentage of the revenue from any resulting sales. For example, my points make money by connecting companies with potential customers by offering special deals to its members.

Online advertising (4 main methods)

web site, social marketing, mobile marketing, offline marketing

Packet switching

Sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive at their destination. Packet switching requires a dedicated circuit.

Widget

Small, prebuilt chunk of code that executes automatically in your HTML web page; capable of performing a wide variety of tasks

Value Chain

The set of activities performed in an industry or in a firm that transforms raw inputs into final products and services. Each of these activities add economic value into the final product hence the term value chain as an interconnected set of value adding activities.

Ecommerce,

The use of internet the web and mobile apps and browsers running on mobile devices to transact business, more formally, digitally enabled commercial transactions between and among organizations and individuals.

A worm does not need to be activated by a user in order for it to replicate itself

True

Cookies when combined with Web beacons, can be used to create cross site profiles

True

Every device connecting to the Internet must have a unique address

True

FTP is a protocol used to transfer files to and from a server

True

Internet access providers typically provide faster download speeds than upload speeds to consumers.

True

Proxy servers are also known as: dual home systems.

True

Public Key Encryption

Two mathematically related digital keys are used: a public key and a private key. The private key is kept secret by the owner and the public key is widely disseminated. Both keys can be used to encrypt and decrypt a message. However, once the keys are used to encrypt a message, that same key cannot be used to unencrypt the message.

Authenticity

Verifies an individual's or business's identity.

Transaction fee revenue model

a company receives a fee for enabling or executing a transaction. For example, eBay provides an auction marketplace and provides a small transition fee from a seller if the seller is successful.

Subscription revenue model

a company that offers content or services charges a subscription fee for access to some or all of its offerings. For instance, the digital version of consumer reports provides online and mobile access to premium content, such as detailed ratings, reviews and recommendations, only to subscribers, who have a choice of paying a 6.95 monthly subscription fee or a 30 annual fee.

Advertising revenue model

a company that offers content, services, and or products also provides a forum for advertisements and receives fees from advertisers.

Business plan

a document that describes a firm's business model. A business plan always takes into account the competitive environment.

Active Server Pages (ASP)

a proprietary software development tool that enables programmers using Microsoft IIS package to build dynamic pages

Revenue model Types

advertising revenue model, subscription revenue model, transaction revenue model, sales revenue model, affiliate revenue model

domain name server (DNS)

allows expressions such as Cnet.com to stand for a numeric IP address.

DNS Server

are database that keep track of IP addresses and domain names on the internet.

Combines an intuitive tag based scripting language and a tag

based server scripting language that lowers the cost of creating interactive features.

1. Business to Consumer

business selling to other consumers Example: Amazon general merchandiser that sells consumer products to retail consumers

Which of the following dimensions of e

commerce security is not provided for by encryption-availability

Which of the following is not a key point of vulnerability when dealing with e

commerce- the credit card companies

5. Social e

commerce-enabled by social networks and online social relationships Facebook is both the leading social network and social e-commerce site. Social e-commerce is the largest type of e-commerce. False

Sales revenue model

companies derive revenue by selling goods, content, or services to customers. Companies such as amazon which sells books, music and other products.

the network technology Substrate layer

composed of telecom networks and protocols

Internet Backbone

High bandwidth fiber optic cable that transports data across the internet. In milliseconds.

HTML 5

The new markup language that will enable more dynamic web content and allow for browser-accessible web apps that are as appealing as device-specific apps. Bringing the best of the app experience to the web and with apps developing new web-like capabilities.

Proxy Server

Software server that handles all communications originating from or being sent to the internet, acting as a spokes person or bodyguard for the organization.

Marketspace

A marketplace extended beyond traditional boundaries and removed from a temporal and geographic location. From a consumer point of view, ubiquity reduces transaction costs or the costs of participating in a market. No longer necessary that you spend time and money traveling to a market.

Worm

A malware that is designed to spread from computer to computer.

Nonrepudiation

Ensure that ecommerce participants do not deny (repudiate) their online actions.

Integrity

Ensures that information displayed on a Web site or sent or received via the Internet has not been altered in any way by an unauthorized party.

XML

Extensive markup language a markup language specification developed by the World wide web consortium that is designed to describe data and information.

All of the following are methods of securing channels of communication except

FTP

Phishing attacks rely on browser parasites.

False

Open Source Software

Software that is developed by a community of programmers and designers and is free to use and modify. The advantage of using open source web building tools is that you get exactly what you want, a truly customizable unique web site. The disadvantage is that it will take several months for a single programmer to develop the site and get all of the tools to work together seamlessly.

Uniform Resource Locator (URL)

The addresses used by browsers to identify the location of content on the Web are called-URL Which is the address used by a web browser to identify the location of content on the web, also uses a domain name as part of the URL. Contains protocol to be used when accessing the address followed by the location.

TCP/IP

The core communications protocol of the internet

Packet

The discrete units into which digital message are sliced for transmission over the internet.

HTTP

The internet protocol used to transfer web pages. Developed by the world wide web consortium and the internet engineering task force.

Digital divide

lack of diversity on the Internet. Inequality in access and usage. the gap between demographics and regions that have access to modern information and communications technology, and those that don't or have restricted access.

2. Business to Business

online businesses selling to other businesses. Example: Go2Paper is an independent third party marketplace that serves the paper industry


Set pelajaran terkait

L&D, L&D At Risk, and Common Concerns Passpoints for OB Exam 3

View Set

C++ OOP Interview/TopOfMind Questions

View Set

Life Insurance - Chapter 8: Life Insurance and Annuities - Policy Replacement and Cancellation

View Set

105.1-105.20 // Sculpture Cut // Lesson Challenge

View Set

Which of the following is not a coping strategy

View Set