4720 Exam 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A template test is a form of which type of testing?

A/B testing

During which period of time did the Institutionalization phase of Internet development take place?

1975-1995

An IPv4 address is expressed as a:

32-bit number that appears as a series of four separate numbers separated by periods.

Beebone is an example of which of the following?

Botnet

Which of the following verifies that the business objectives of the system are in fact working?

acceptance testing

The Internet Layer of TCP/IP is responsible for which of the following?

addressing, packaging, and routine messages

Confidentiality is sometimes confused with:

privacy

All of the following can be considered a direct competitor of Priceline except:

ESPN

Which of the following is not an example of a potentially unwanted program (PUP)?

drive-by download

Which of the following gives a business model the most credibility with outside investors?

the firm's management team

Analysts estimate that by 2024, consumers will be spending around ________ in digital transactions.

$1.8 trillion

Which of the following did the Internet Advertising Bureau urge advertisers to abandon?

Adobe Flash

Which of the following uses a subscription revenue model for books?

Amazon Kindle Unlimited

Which of the following is an example of e-business?

Amazon's inventory control system

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

Which of the following uses a subscription-based sales revenue model?

Dollar Shave Club

Which of the following companies uses a transaction fee revenue model?

E*Trade

Which of the following is not an advantage of client/server computing over centralized mainframe computing?

Each client added to the network increases the network's overall capacity and transmission speeds.

Which of the following is not one of the basic technological foundations of the Internet?

FTP

A multi-tier architecture includes a web and database server.

False

Exploit kits can be purchased by users to protect their computers from malware.

False

Phishing attacks rely on browser parasites.

False

The Internet has shown similar growth patterns as other electronic technologies of the past.

False

The term e-commerce refers to the digital enabling of business processes both inside and outside the firm.

False

Which of the following is not a basic type of cloud computing service?

FiOS

________ typically attack governments, organizations, and sometimes individuals for political purposes.

Hacktivists

________ is defined by a company using its competitive advantage to gain in surrounding markets.

Leverage

Why is it difficult to accurately estimate the actual amount of cybercrime?

Many companies don't want to report crime due to fear of losing their customer's trust.

Which of the following is an example of the affiliate revenue model?

MyPoints

Which of the following has not been the subject of concern about its increasing market dominance in 2020-2021?

Netflix

________ is the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation

________ is a utility program that allows you to check the connection between your client and a TCP/IP network.

Ping

All of the following can be considered a direct or indirect competitor of Amazon except:

Priceline

Which of the following is not a major business trend in e-commerce in 2020-2021?

Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.

Which of the following protocols is used to send mail to a server?

SMTP

Which of the following is a simple but powerful method for describing a firm's strengths and weaknesses?

SWOT analysis

The concept of a "sprint" is related to which of the following development methodologies?

Scrum

Which of the following is not an example of malicious code?

Sniffer

All of the following statements about e-commerce in the United States in 2020 are true except:

Social e-commerce generated more revenue than mobile e-commerce.

Which of the following types of attacks enabled hackers to take control of the Twitter accounts of dozens of America's most prominent political, entertainment and technology leaders?

Social engineering

Which of the following was designed to cripple Iranian nuclear centrifuges?

Stuxnet

________ are the types of information systems capabilities needed to meet business objectives.

System functionalities

Which of the following is the core communications protocol for the Internet?

TCP/IP

Which of the following is rarely used today, due to security concerns.

Telnet

Which of the following statements about Foursquare is not true?

The growth in Foursquare's revenue has been driven primarily by significant increases in the numbers of users of its Swarm app.

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

True

Using prebuilt templates is typically one of the most inexpensive options when building an e-commerce site.

True

WannaCry is an example of ransomware.

True

All of the following can be considered examples of the market creator business model except:

Twitter

Which of the following does not use a subscription revenue model?

Twitter

The process of comparing a website with that of its competitors in terms of response speed, quality of layout, and design is known as:

benchmarking.

According to Ponemon Institute's 2019 survey, which of the following was not among the causes of the costliest cybercrimes?

botnets

Which of the following is an unfair competitive advantage?

brand name

Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture?

client/server computing

Accessing data without authorization on Dropbox is an example of a:

cloud security issue.

Which element of the business model refers to the presence of substitute products in the market?

competitive environment

All of the following are basic information requirements for a product database except:

customer ID numbers.

Which system functionality must your website have to be able to personalize or customize a product for a client?

customer on-site tracking

________ is the ability to identify the person or entity with whom you are dealing on the Internet.

Authenticity

________ is the ability to ensure that an e-commerce site continues to function as intended.

Availability

Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet?

BGP

The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade.

decreased dramatically

What are the two most important management challenges in building a successful e-commerce presence?

developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

Which of the following basic system functionalities is used to display goods on a website?

digital catalog

Which of the following can be considered synonymous with the term e-commerce?

digital commerce

Which of the following best defines e-commerce?

digitally enabled commercial transactions between and among organizations and individuals

The ________ allows a natural language expression, such as Google.com to represent a numeric IP address.

domain name system

All of the following may lead to a competitive advantage except:

fewer products.

Which of the following is another name for a revenue model?

financial model

Which of the following involves a company giving away a certain level of product or service without charge, but then charging a fee for premium levels of the product or service?

freemium strategy

Most of the time required to maintain an e-commerce site is spent on:

general administration and making changes and enhancements to the system.

Which of the following is the leading cause of data breaches?

hackers

Organizations that typically provide an array of services to startup companies along with a small amount of funding are referred to as:

incubators

Which of the following is not a unique feature of e-commerce technology?

information asymmetry

Which dimensions of security is spoofing a threat to?

integrity and authenticity

Which of the following is not a key element of an elevator pitch?

legal structure

Which of the following typically includes a data flow diagram to describe the flow of information for an e-commerce site?

logical design

Which of the following are the two main components of a systems design?

logical design and physical design

A ________ specifically details how you plan to find customers and to sell your product.

market strategy

The cost incurred by merchants to change product prices (i.e., the costs of reentering prices into computer systems) is referred to as:

menu costs.

Which form of testing compares a control page with one that is very different?

new concept test

Which of the following helps you engage your customers in a conversation?

on-site blog

Which of the following is not one of the basic business objectives for an e-commerce site?

optimize system architecture

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

packet switching.

Automatically redirecting a web link to a different address is an example of which of the following?

pharming

Which of the following details the actual hardware components to be used in a system?

physical design

Which of the following is a set of rules for transferring data?

protocol

The Transport Layer of TCP/IP is responsible for which of the following?

providing communication with the application by acknowledging and sequencing the packets to and from the application

A firm's ________ describes how a firm will produce a superior return on invested capital.

revenue model

Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text?

richness

Which of the following are central directories that list all domain names currently in use for specific domains?

root servers

Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations?

routers

All of the following are simple steps for optimizing web page content except:

segmenting computer servers to perform dedicated functions.

Which of the following are Amazon's primary value propositions?

selection and convenience

Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?

social media

Which of the following features of e-commerce technology allows users to participate in the creation of online content?

social technology

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

spyware

In order from beginning to end, the major steps in the SDLC are:

systems analysis/planning; systems design; building the system; testing; and implementation.

Which of the following was the original "killer app" that made the Internet commercially interesting and extraordinarily popular?

the Web

Which of the following is the best definition of transaction cost?

the cost of participating in a market

Interactivity in the context of e-commerce provides which of the following functionalities?

the enabling of two-way communication between consumer and merchant

What is the most frequent cause of stolen credit cards and card information today?

the hacking and looting of corporate servers storing credit card information

The existence of many competitors in any one market segment may indicate:

the market is saturated.

First movers often fail because:

they lack complementary resources needed to sustain their advantages.

Which of the following was the original purpose of the Internet?

to link large mainframe computers on different college campuses

Malware that comes with a downloaded file requested by a user is called a:

trojan horse

Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders?

two-tier architecture

Which of the following involves testing a site's program modules one at a time?

unit testing

Which element of the business model addresses what a firm provides that other firms do not and cannot?

value proposition

Which type of investor typically becomes interested in a startup company after it has begun generating revenue?

venture capital investors

Which of the following is the preferred method of implementing a service-oriented architecture?

web services

Which of the following involves creating a skeleton version that focuses on functionality rather than design?

wireframing

Which of the following is an example of an online privacy violation?

your online purchasing history being sold to other merchants without your consent

Which of the following technologies is aimed at reducing e-mail address spoofing and phishing?

DMARC

Which of the following is not a key factor for establishing e-commerce security?

Data integrity

In general, the annual system maintenance cost will roughly parallel the development cost.

True

A drive-by download is malware that comes with a downloaded file that a user intentionally or unintentionally requests.

True

It is likely that e-commerce will eventually impact nearly all commerce.

True

Microservices are a very granular implementation of SOA.

True

Scrum is a type of agile development

True

In 2019, there were more than ________ Internet hosts worldwide.

1 billion

The world's online population was estimated to be around ________ in 2020.

4 billion

When using multivariate testing, if you wish to test three elements, such as an image, a button, and a piece of text, each with two different versions, how many combinations will you need to test?

8

Which of the following statements about cloud computing is not true?

A public cloud is typically used by companies with stringent privacy and security requirements.

Which of the following statements about data breaches in 2019 is not true?

According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.

Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.

True

E-commerce and e-business systems blur together at the business firm boundary, where internal business systems link up with suppliers or customers.

True

FREAK is an example of a software vulnerability.

True

________ is the ability to ensure that messages and data are only available to those authorized to view them.

Confidentiality

Which of the following is a brute force attack which hackers launch via botnets and automated tools using known user name and password combinations?

Credential stuffing

The attack against Dyn servers is an example of a(n):

DDoS attack.

Which of the following is a utility program that allows you to track the path of a message sent from a client computer to a remote computer on the Internet?

Tracert

A Trojan horse appears to be benign, but then does something other than expected.

True

________ and ________ are typically the most easily identifiable aspects of a company's business model.

Value proposition; revenue model

Conficker is an example of a

Worm

The address used by a browser to identify the location of content on the Web is called:

a Uniform Resource Locator.

Stickiness is an important attribute for which of the following revenue models?

advertising revenue model

A wealthy individual who invests personal funds in a startup in exchange for an equity share in the business is referred to as a(n):

angel investor.


Set pelajaran terkait

Palabras que empiezan por la letra A

View Set

Pharm chapter 13 drugs for sleep

View Set

MRU4.3: Does the Equilibrium Model Work

View Set

Federal Fair Credit Reporting Act ( FCRA )

View Set

Chapter 4-Internal Analysis: Resources, Capabilities, and Core Competencies

View Set