CIS 125 Test 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

When did e-commerce begin?

1995

In 2015, what percentage of mobile phone users accessed the Internet by using their phones?

About 75 percent

Conficker (also known as Downadup or Downup) is an example of which of the following?

Correct SQL injection attack

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a/n ________ attack.

DDos

Which of the following is the best description of ubiquity as it relates to e-commerce technology?

E-commerce technology is available everywhere and anytime.

Which of the following dimensions of e-commerce technology has the potential to raise the quality of information?

Information density

Which of the following dimensions of e-commerce technology involves engaging consumers in a dialog that dynamically adjusts the experience to the individual?

Interactivity

Which of the following statements about botnets is not true?

It is not possible to make a smartphone part of a botnet.

Disintermediation has which of the following effects?

It lowers cost to consumers.

CryptoLocker is an example of which of the following?

Ransomware

________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.

Securities

Redirecting a web link to a different address is a form of:

Spoofing

Which feature of Internet technology has had the most effect in the Internet's rapid spread across the globe?

Universal standards

An independent computer program that copies itself from one computer to another over a network is called a:

Worms

Information ________ exists when one party in a transaction has more information that is important for the transaction than the other party.

asymmetry

Evil twins are:

bogus wireless network access points that look legitimate to users.

A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of:

click fraud

refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.

controls

Reducing the business process layers in a distribution channel is called:

disintermediation.

Varying a product's price according to the supply situation of the seller is called ________ pricing.

dynamic

A marketplace extended beyond traditional boundaries and removed from a temporal and geographic location is called a/n:

marketspace

Most computer viruses deliver a:

payload

Selling the same goods to different targeted groups at different prices is called:

price discrimination.

An example of phishing is:

setting up a fake medical website that asks users for confidential information

Phishing can use a form of:

spoofing


Set pelajaran terkait

Chapter 35- Musculoskeletal Function

View Set

Exam 3: Anatomy and Physiology Practice test

View Set

Perfusion EAQ, Cardiovascular EAQ

View Set

Series 66 - Unit 4 (Session 14, 15, 16, 17, 18, 19, 20) Next 200

View Set

Northwestern Mutual - Life and Health Insurance

View Set