BCIS 4720 Exam #1 Quiz Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

During which period of time did the Institutionalization phase of Internet development take place? 1975-1995 1950-1960 1995 to the present 1961-1974

1975-1995

The world's online population was estimated to be around ________ in 2020. 400 billion 400 million 4 billion 40 billion

4 billion

Which of the following statements about cloud computing is not true? A public cloud is typically used by companies with stringent privacy and security requirements. Dropbox is an example of a public cloud. A private cloud may be hosted internally or externally. Hybrid clouds offer both public and private cloud options.

A public cloud is typically used by companies with stringent privacy and security requirements.

A template test is a form of which type of testing? system testing A/B testing unit testing acceptance testing

A/B testing

Which of the following uses a subscription revenue model for books? Pandora Spotify eHarmony Amazon Kindle Unlimited

Amazon Kindle Unlimited

________ is the ability to identify the person or entity with whom you are dealing on the Internet. Nonrepudiation Authenticity Integrity Availability

Authenticity

________ is the ability to ensure that an e-commerce site continues to function as intended. Integrity Authenticity Availability Nonrepudiation

Availability

Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet? FTP HTTP SMTP BGP

BGP

Which of the following uses a subscription-based sales revenue model? MyPoints Dollar Shave Club eBay Yahoo

Dollar Shave Club

All of the following can be considered a direct competitor of Priceline except: Travelocity. ESPN. Expedia. Orbitz.

ESPN.

A multi-tier architecture includes a web and database server. True False

False

The Internet has shown similar growth patterns as other electronic technologies of the past. True False

False

Which of the following is not a basic type of cloud computing service? FiOS SaaS PaaS IaaS

FiOS

________ is the ability to ensure that e-commerce participants do not deny their online actions. Integrity Authenticity Availability Nonrepudiation

Nonrepudiation

Which of the following is not a major business trend in e-commerce in 2020-2021? Retail e-commerce revenues exceed B2B e-commerce revenues for the first time. The mobile app ecosystem continues to grow. Social e-commerce continues to grow. On-demand service companies garner multibillion-dollar valuations.

Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.

Which of the following protocols is used to send mail to a server? HTTP SMTP FTP SSL

SMTP

All of the following statements about e-commerce in the United States in 2020 are true except: Social e-commerce generated more revenue than mobile e-commerce. Retail e-commerce and m-commerce grew as a result of the Covid-19 pandemic. On-demand service firms fueled the growth of local e-commerce. Mobile advertising accounted for almost 70% of all digital advertising spending.

Social e-commerce generated more revenue than mobile e-commerce.

Which of the following is the core communications protocol for the Internet? Telnet FTP TLS TCP/IP

TCP/IP

Which of the following is rarely used today, due to security concerns. SFTP Telnet TCP TLS

Telnet

Which of the following statements about Foursquare is not true? A. Foursquare characterizes itself as a leader on privacy issues. B. Foursquare initially struggled to find profitability. The growth in C. Foursquare's revenue has been driven primarily by significant increases in the numbers of users of its Swarm app. Foursquare is one of the Internet's largest location data tracking firms.

The growth in Foursquare's revenue has been driven primarily by significant increases in the numbers of users of its Swarm app.

Which of the following is a utility program that allows you to track the path of a message sent from a client computer to a remote computer on the Internet? Ping Telnet IMAP Tracert

Tracert

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use. True False

True

WannaCry is an example of ransomware. True False

True

All of the following can be considered examples of the market creator business model except: Uber. Twitter. eBay. Priceline.

Twitter.

Which of the following verifies that the business objectives of the system are in fact working? system testing implementation testing acceptance testing unit testing

acceptance testing

The Internet Layer of TCP/IP is responsible for which of the following? placing packets on and receiving them from the network medium addressing, packaging, and routing messages providing communication with the application by acknowledging and sequencing the packets to and from the application providing a variety of applications with the ability to access the services of the lower layers

addressing, packaging, and routing messages

The process of comparing a website with that of its competitors in terms of response speed, quality of layout, and design is known as: split testing. funnel testing. benchmarking. system testing.

benchmarking.

According to Ponemon Institute's 2019 survey, which of the following was not among the causes of the costliest cybercrimes? denial of service malicious insiders botnets web-based attacks

botnets

Which of the following is an unfair competitive advantage? access to global markets superior technology lower product prices brand name

brand name

Which element of the business model refers to the presence of substitute products in the market? competitive advantage value proposition competitive environment market opportunity

competitive environment

The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade. decreased slightly increased dramatically increased moderately decreased dramatically

decreased dramatically

What are the two most important management challenges in building a successful e-commerce presence? building a team with the right skill sets and closely managing the development process identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives having an accurate understanding of your business environment and an achievable business plan

developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

Which of the following can be considered synonymous with the term e-commerce? the Internet e-business the Web digital commerce

digital commerce

Which of the following best defines e-commerce? the use of digital technologies in a firm's daily activities the digital enablement of transactions and processes within an organization any electronically based organizational activity that supports a firm's market exchanges digitally enabled commercial transactions between and among organizations and individuals

digitally enabled commercial transactions between and among organizations and individuals

Malware that comes with a downloaded file requested by a user is called a: drive-by download. backdoor. PUP. Trojan horse.

drive-by download.

Which of the following is another name for a revenue model? business strategy financial statements financial model business model

financial model

Most of the time required to maintain an e-commerce site is spent on: responding to emergency situations. changes in reports, data files, and links to backend databases. debugging code. general administration and making changes and enhancements to the system.

general administration and making changes and enhancements to the system.

Which of the following is not a unique feature of e-commerce technology? interactivity social technology richness information asymmetry

information asymmetry

Which of the following is not a key element of an elevator pitch? market opportunity exit strategy legal structure growth metrics

legal structure

Which of the following are the two main components of a systems design? logical design and physical design behavioral design and technological design front-end systems and back-end systems business objectives and technology requirements

logical design and physical design

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called: packet switching. routing. hyperlinking. transporting.

packet switching.

Which of the following details the actual hardware components to be used in a system? physical design system functionalities plan architecture plan logical design

physical design

Confidentiality is sometimes confused with: privacy. authenticity. nonrepudiation. integrity.

privacy.

Which of the following is a set of rules for transferring data? IP address packet router protocol

protocol

The Transport Layer of TCP/IP is responsible for which of the following? providing a variety of applications with the ability to access the services of the lower layers providing communication with the application by acknowledging and sequencing the packets to and from the application placing packets on and receiving them from the network medium addressing, packaging, and routing messages

providing communication with the application by acknowledging and sequencing the packets to and from the application

Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text? information density personalization richness ubiquity

richness

Which of the following are central directories that list all domain names currently in use for specific domains? root servers Web servers DNS servers client servers

root servers

Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations? packet servers routers Web servers IP servers

routers

Which of the following is the best definition of transaction cost? the expense of changing national or regional prices the cost of participating in a market the cost merchants pay to bring their goods to market the cost of finding suitable products in the market

the cost of participating in a market

First movers often fail because: they lack complementary resources needed to sustain their advantages. they are operating in a perfect market. they fail to leverage their competitive assets. their competitive advantage is unfair.

they lack complementary resources needed to sustain their advantages.

Which of the following was the original purpose of the Internet? to enable government agencies to track civilian communications to develop a military communications system that could withstand nuclear war to link large mainframe computers on different college campuses to provide a network that would allow businesses to connect with consumers

to link large mainframe computers on different college campuses

Which of the following involves testing a site's program modules one at a time? acceptance testing unit testing system testing implementation testing

unit testing

Which element of the business model addresses what a firm provides that other firms do not and cannot? competitive advantage value proposition competitive environment market strategy

value proposition

Which of the following is an example of an online privacy violation? your e-mail being altered by a hacker your online purchasing history being sold to other merchants without your consent your e-mail being read by a hacker your computer being used as part of a botnet

your online purchasing history being sold to other merchants without your consent


Set pelajaran terkait

Tillverkningsteknik och digitala tillverkningsmetoder

View Set

Texas Real Estate Appraisal-SAE Course

View Set

Microbiology a human perspective Chapter 10 Identification and classification of prokaryotes

View Set

Unit 10 - Transaction Process and Closing (Questions)

View Set

BIOLOGY - UNIT 8: HUMAN ANATOMY AND PHYSIOLOGY SENSORY SYSTEMS: THE EYE

View Set

Ch. 28 Assessment of Hematologic Function and Treatment Modalities

View Set