MIS 342 (E-Commerce) Ch 4-6 Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Your e-commerce design company has received an RFP to help create an e-commerce presence for Tucci's, a renowned gourmet and specialty butcher that now wishes to sell goods over the Internet. Describe the elements you will include in your proposal to Tucci's.

1. Business goals 2. What is the target audience? 3. Marketspace? 4. SWOT Analysis 5. Content 6. Timeline 7. Budget

In 2016, what was the approximate Internet penetration rate for individuals with less than a high-school education?

66%

A template test is a form of which type of testing?

A/B testing

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

Which of the following statements is not true?

Apple's Touch ID stores a user's actual fingerprint

How are blogs being used for marketing?

Blogs allow for conversations to happen between customers. One of the best way for e-commerce to work is to keep the conversation going. This is optimal with facebook because people are able to comment and interact with each other and discuss the products. Having a blog can show real life users and promote the product more.

________ provides a set of standards for communicating between a browser and a program running on a server that allows for interaction between the user and server.

CGI

Which of the following is not one of the four main methods advertisers use to behaviorally target ads?

Nielsen ratings

________ help you engage your customers in a conversation.

On-site blogs

What dimensions do digital signatures and hash digests add to public key cryptography? Describe how this technology works.

Public key cryptography there is no guarantee the sender is really the sender. There are two ways to make sure that this doesn't happen. A hash digests is an algorithm that produces a fixed-length number which. The results of the hash function are sent to the user and then they are able to apply it to make sure the message has not been altered. A digital signature is a "signed" cipher text that can be sent over the Internet. This signature is unique and with these two things combined, the recipient can know the message has not been changed and it has integrity.

________ is an industry-standard database query and manipulation language.

SQL

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

Spyware

Research has found that most ad impressions served across display advertising platforms are not viewable.

True

SLS/TLS cannot provide irrefutability.

True

Which of the following is an example of a CMS?

WordPress

In 2016, Yahoo revealed that it had experienced which of the following?

a high-profile data breach

All of the following are important factors in search engine optimization except:

adhering to privacy policies.

According to Ponemon Institute's 2015 survey, which of the following was not among the causes of the costliest cybercrimes?

botnet

Which of the following measures the percentage of e-mails that could not be delivered?

bounce-back rate

Offline media is typically used for all of the following marketing activities except:

conversation

The majority of online shoppers find vendors by clicking on display ads.

false

Which dimension(s) of security is spoofing a threat to?

integrity and authenticity

Impressions are a measure of the:

number of times an ad is served

To answer a question such as "At what time of day does our company sell the most products?" you would use ________ data mining.

query-driven

All of the following are simple steps for optimizing web page content that can reduce response times except:

segmenting computer servers to perform dedicated functions

Which of the following would you use to verify that links on web pages are valid?

site management tools

All the following statements about symmetric key cryptography are true except:

symmetric key cryptography is computationally slower.

Consumers tend to look at native ads more frequently than display ads.

true

Linden Dollars, created for use in Second Life, are an example of:

virtual currency

Explain both the demand-side and the supply-side considerations when choosing the hardware platform for an e-commerce site. Include a discussion of I/O-intensive vs. CPU-intensive operations and scalability.

For the demand-side, one of the most important considerations is the maximum number of users that can be on the side at once. This is I/O extensive when you need to add things like searching and adding items to a cart. Another important consideration is what type of content is on the sight and this is CPU-intensive operations because they need a lot of power to add to the site. For the supply-side considerations, the most important is scalability. How will the site be able to grow as the demand for it grows as well? To do this you can update to multiple processors instead of a singular processor.


Set pelajaran terkait

Chinese 2A Unit 14 International Cities

View Set

Tumor Bio 336 Midterms and Quizzes

View Set

Chapter 21 - Statement of cash flow

View Set

Aircraft Electrical Systems - 1 - 1

View Set

Chapter 1 - Introduction to Financial Accounting

View Set

HESI / NCLEX Leadership and Management

View Set