Eccomerce

Ace your homework & exams now with Quizwiz!

there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.

A perfect market is one in which:

cloud security issue

Accessing data without authorization on Dropbox is an example of which of the following?

legacy corporate applications.

All of the following might be part of a Web site's middle-tier layer except

Apple Pay is available for both iPhone 5s and iPhone 6s.

All of the following statements about Apple Pay are true except which of the following?

fast follower advantage

All of the following were visions of e-commerce expressed during the early years of e-commerce except:

symmetric key cryptography is computationally slower.

All the following statements about symmetric key cryptography are true except:

blocking suspicious activity.

An intrusion detection system can perform all of the following functions except:

digital cash.

Bitcoins are an example of:

Python

Django is based on which of the following?

the use of the Internet, the Web, and mobile apps to transact business.

E-commerce can be defined as:

ubiquity

E-commerce is available just about everywhere and anytime. This is known as ________.

3.1 billion

In 2015, the world's online population was estimated to be around:

own the content being provided.

In general, the key to becoming a successful content provider is to:

.com

In the address http://www.company.com/clients.html, which of the following is the top-level domain?

1995

In which year can e-commerce be said to have begun?

incubators

Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as:

online stored value payment system

PayPal is an example of what type of payment system?

spyware.

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

56

The Data Encryption Standard uses a(n) ________-bit key.

addressing, packaging, and routing messages

The Internet Layer of TCP/IP is responsible for which of the following?

providing communication with the application by acknowledging and sequencing the packets to and from the application

The Transport Layer of TCP/IP is responsible for which of the following?

domain name system

The ________ allows a natural language expression, such as Google.com to represent a numeric IP address.

e-distributors

The business model of e-tailers is quite similar to that of:

the market is saturated.

The existence of a large number of competitors in any one market segment may indicate:

Mosaic

The first Web browser to make it possible to view documents on the Web with colored background, images, and animations was:

cookies.

The primary way a Web site is able to personalize the content presented to a visitor is through the use of:

benchmarking.

The process of comparing a Web site with that of its competitors in terms of response speed, quality of layout, and design is known as:

packet switching

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

Foursquare's business model faces significant intellectual property concerns.

Which of the following statements about Foursquare is not true?

RWD works best for sites that have complex functionality.

Which of the following statements about responsive Web design (RWD) is not true?

logical design

Which of the following typically includes a data flow diagram to describe the flow of information for an e-commerce site?

acceptance testing

Which of the following verifies that the business objectives of the system as originally conceived are in fact working?

System functionalities

________ are the types of information systems capabilities needed to meet business objectives.

Ping

________ is a utility program that allows you to check the connection between your client and a TCP/IP network.

Nonrepudiation

________ refers to the ability to ensure that e-commerce participants do not deny their online actions.

Hacktivists

________ typically attack governments, organizations, and sometimes individuals for political purposes.

selection and convenience

Which of the following are Amazon's primary value propositions?

Facebook

Which of the following is an example of social e-commerce?

TCP/IP

Which of the following is the core communications protocol for the Internet?

vertical

A ________ marketplace supplies products and services of interest to particular industries.

Angel Investor

A wealthy individual who invests personal funds in a start-up in exchange for an equity stock in the business is referred to as a(n) ________.

redundant navigation.

All of the following are Web site design features that annoy customers except:

customer ID numbers

All of the following are basic information requirements for a product database except:

support for digital rights management.

All of the following are characteristics of HTML5 except:

FTP.

All of the following are methods of securing channels of communication except

the development of the smartphone.

All of the following can be considered a precursor to e-commerce except:

pharming

Automatically redirecting a Web link to a different address is an example of which of the following?

e-distributor

W.W. Grainger is an example of which of the following business models?

Perform a risk assessment.

What is the first step in developing an e-commerce security plan?

Drones

What type of Internet access technology are Google and Facebook hoping to use to provide Internet access to remote parts of the world?

multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

When talking about the physical elements of the Internet, the term redundancy refers to:

competitive environment

Which element of the business model refers to the presence of substitute products in the market?

E*Trade

Which of the following companies uses a transaction fee revenue model?

freemium strategy

Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service?

unit testing

Which of the following involves testing a site program's modules one at a time?

WebSphere

Which of the following is not an open source software tool?

Microsoft IIS

Which of the following is not part of the LAMP open source Web development model?

intellectual property

Which of the following is one of the three primary societal issues related to e-commerce?

WPA2

Which of the following is the current standard used to protect Wi-Fi networks?

two-tier architecture

Which of the following is the minimum system architecture requirement for an e-commerce Web site that processes orders?

ICANN

Which of the following organizations coordinates the Internet's systems of unique identifiers, such as IP addresses and top-level domain systems?

information asymmetry

Which of the following refers to any disparity in relevant market information among parties in a transaction?

Marketplace

Which of the following is a physical place you visit in order to transact?

AWD

Which of the following is a server-side technique that detects the attributes of the device making the request, and using predefined templates, loads a version of a site that is optimized for the device?

An unauthorized person intercepts an online communication and changes its contents.

Which of the following is an example of an integrity violation of e-commerce security?

Airbnb

Which of the following is an example of an on-demand service company?

FiOS

Which of the following is not a basic type of cloud computing service?

Priceline

Which of the following is not a community provider?

the high cost of sensors

Which of the following is not a concern about IoT?

Small businesses and entrepreneurs are hampered by the rising cost of market entry caused by increased presence of industry giants.

Which of the following is not a major business trend in e-commerce in 2015-2016?

information asymmetry

Which of the following is not a unique feature of e-commerce technology?

Bluefly

Which of the following is not an example of the bricks-and-clicks e-tailing business model?

latency

Which of the following refers to delays in messages caused by the uneven flow of information packets through the network?

richness

Which of the following refers to the complexity and content of a message?

disintermediation

Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers?


Related study sets

The Great Gatsby Study Guide (Comprehension)

View Set

Praxis: Missed Practice Test Questions

View Set

Unit 7 Progress Check: MCQ practice

View Set

Exam 3: Clinical Pathology: Endocrinology

View Set