ecommerce exam 2

Ace your homework & exams now with Quizwiz!

What percentage of world wide e-mail was spam (according to our text)? A. 60% B. 75% C. 80% D. 95%

A. 60%

The list of capabilities you want your site to have= A. Business objectives B. System functionalities C. Information requriements D. Systems design

A. Business objectives

Which of the following is a primary tool to help companies customize customer experiences? A. Cookies B. Open source applications C. Web server applications D. Malware

A. Cookies

When contents are stored in a database and fetched when needed, this process is called: A. Dynamic page generation B. Static page generation C. Flash page generation D. Instant page generation

A. Dynamic page generation

Which security factor is concerned with whether or not information has been altered? A. Integrity B. Nonrepudiation C. Confidentiality D. Privacy

A. Integrity

An integrated environment which includes basic e-commerce functionality (e-commerce in a box)= A. Merchant server software B. Point and click e-commerce C. Open source software D. E-commerce software

A. Merchant server software

Which of the following is an example of an online stored value system? A. PayPal B. Google Wallet C. Amazon Payments D. Apple Pay

A. PayPal

Simple, small business websites typically cost _______ to develop. A. Up to $5000 B. Up to $10,000 C. Up to $25,000 D. $100,000 or more

A. Up to $5000

What are the two biggest reasons people buy online? A. Utility and trust B. Utility and convenience C. Price and convenience D. Selection and price

A. Utility and trust

How many keys are involved in basic public key cryptography? A. 1 B. 2 C. 3 D. 4

B. 2

What percentage of internet users shop online? A. 50% B. 90% C. 65% D. 74%

B. 90%

Google's Doubleclick is an example of: A. Social search B. Advertising network C. Native advertising D. Sponsorship

B. Advertising network

The highest profile cyber crime is the theft of: A. Social security numbers B. Credit card numbers C. Bank account numbers D. None of the above

B. Credit card numbers

From a general sense, which is the most important factor affecting the speed of an e-commerce site? A. Bandwidth B. Customer demand C. Tiers D. Dynamic page generation

B. Customer demand

If I link hundreds of cell phones together to bombard a website with requests in the hopes of taking the site down, it is called: A. Worm attack B. DOS attack C. Spoofing attack D. Pharming attack

B. DOS attack

Placing a symmetric session key and a public key into an encrypted "package" to increase security and reduce bandwidth use is called: A. Public key cryptography with digital signatures B. Digital envelopes C. SSL D. PKI

B. Digital envelopes

Tammy decides to pay a company for webspace for her e-commerce site. What method is she using? A. Outsourcing B. Hosting C. Co-location D. Insourcing

B. Hosting

Cultural, social, and psychological factors are known as _________variables. A. Dependent variables B. Independent demographic variables C. Intervening variables D. Variable variables

B. Independent demographic variables

Marketing to populations who seek unique, extremely hard-to-find items is called: A. Niche marketing B. Long tail marketing C. Lead generation marketing D. Freak marketing

B. Long tail marketing

Which of the following is NOT a key decision area for building your e-commerce presence? A. HR/organizational capabilities B. Market conditions C. Telecommunications D. Site design

B. Market conditions

Clear verbiage is what you want your e-commerce site to accomplish= A. Vision B. Mission Statement C. Vision Statement D. SWOT

B. Mission Statement

Which of the following security threats involves social engineering? A. Adware B. Phishing C. Spyware D. Denial of service

B. Phishing

Selling products to different people and groups based on their willingness to pay= A. Price differentiation B. Price discrimination C. Versioning D. Customization

B. Price discrimination

Customer on-site tracking, customer database, and inventory management systems are all examples of: A. Business objectives B. Systems functionalities C. Information requirements D. Systems design

B. Systems functionalities

Which architecture is the most appropriate for a simple website (static pages, no applications)? A. Single tier B. Two-tier C. Multi-tier D. Horizontal

B. Two-tier

Software that provides specific business functionality for a web site= A. Web server B. Web application server C. Multi-tier software D. Streaming server

B. Web application server

Bonus Question: What's another term you could use for a coordinated cell phone DOS attack?

Botnet Attack

The first stage in the consumer decision making process is: A. Search for information B. Evaluation of alternatives C. Awareness of need D. Purchase decision

C. Awareness of need

Which of the following is NOT true about dynamic page generation? A. Lower menu costs B. Easy online market segmentation C. Bandwidth intensive D. Cost-free price discrimination

C. Bandwidth intensive

Marketing based on data from search engine queries, clickstream history, and other personal information= A. Retargeting B. Customization C. Behavioral marketing D. Viral marketing

C. Behavioral marketing

The bulk of data generated by all of the tracking methodologies is referred to as: A. Data warehouse B. Data mines C. Big data D. Mega data

C. Big data

SSL and many encryption services are verified by CAs. What is a CA? A. Computer agency B. Certifying agency C. Certificate authority D. Complete autonomy

C. Certificate authority

Customer ID , product , date, payment, and shipment date are all examples of e-commerce: A. Business objectives B. Systems functionalities C. Information requirements D. Systems design

C. Information requirements

The list of information system capabilities need to achieve business objectives= A. Business objectives B. System functionalities C. Information requirements D. Systems design

C. Information requirements

Which of the following is NOT a kind of search engine marketing/advertising? A. Sponsored links B. Keyword advertising C. Interstitial advertising D. Network keyword advertising

C. Interstitial advertising

A primary disadvantage of open-source software solutions for e-commerce= A. Cost B. Availability C. Lack of staff expertise D. Lack of customization

C. Lack of staff expertise

Ralph is determining a path for his e-commerce site based on how data will move through his system. He is creating: A. Physical design B. Website design C. Logical design D. Spatial design

C. Logical design

In a multi-tier e-commerce architecture, application, ad, and mail servers typically live in the__________layer. A. Web server layer B. Initial layer C. Middle-tier layer D. Backend layer

C. Middle-tier layer

Which is the most efficient way to accommodate mobile users? A. Mobile app B. Native app C. Mobile website D. Hybrid app

C. Mobile website

The 5 major steps in the systems development life cycle are system analysis/planning, systems design, building the system, implementation, and A. Funding B. Scope determination C. Testing D. Decommissioning

C. Testing

Selling the same car as both a Chevrolet and Buick to different demographics at different prices is ___________. A. Price differentiation B. Price discrimination C. Versioning D. Customization

C. Versioning

Bonus Question: What is defcon

Convention of hackers that come to las vegas Take over the hotel for the entire time they are there and they hack everything

What is the most important factor in effecting the speed of a site

Customer demand

The least expensive way to protect your computer from malicious code is: A. Firewall B. VPN C. SSL D. Antivirus software

D. Antivirus software

The three key points of vulnerability in an e-commerce environment are client, server, and: A. Web interface B. Web page C. Processor D. Communications pipeline

D. Communications pipeline

The biggest advantage of insourcing website development is: A. Cost B. Look C. Maintenance D. Control

D. Control

Adding multiple computers to split processing work is known as __________ scaling. A. Vertical B. Open source C. Flat D. Horizontal

D. Horizontal

When Jimmy uses his Gmail app on his iPhone, hyperlinks still make use of his built-in web-browser. This scenario is an example of a: A. Mobile app B. Native app C. Mobile website D. Hybrid app

D. Hybrid app

The biggest disadvantage to insourcing website development is: A. Security B. Hours to build C. Inconvenience D. Lack of in-house skills

D. Lack of in-house skills

Why is e-mail marketing still popular? A. Established methodology B. Effective returns C. High click through rate D. Low cost

D. Low cost

Print, TV & radio are considered to be _________media. A. Old school B. Traditional C. Dead D. Offline

D. Offline

Being able to control the way that someone uses your personal information= A. Nonrepudiation B. Authenticity C. Confidentiality D. Privacy

D. Privacy

Kent was buying Batman action figures from Amazon on a wifi connection. A second party used malicious software to analyze packets between Kent's laptop and a wifi access point. The hacker was likely using A. E-mail wiretapping B. Spoofing C. Phishing D. Sniffer software

D. Sniffer software

Which of the following is NOT a challenge to building an e-commerce presence? A. Developing clear understanding of business objectives B. Knowing how to choose the right tech to meet those objectives C. There is no "full-proof" way of building a presence D. There is a lack of effective, low-cost technology

D. There is a lack of effective, low-cost technology

Using the public internet as an extension of your own network is called: A. SSL B. TSL C. WPA2 D. VPN

D. VPN

True or false: Basic public key cryptography does a great job in authenticating senders.

False

True/False: A database designed to compare two or more attributes to determine patterns in consumer behavior is called an integrated database.

False

True/False: Government regulations have helped to control spam e-mail.

False

True/False: Hacking "good guys" are known as grey hats.

False

True/False: In symmetric key cryptography, the sender and recipient use different keys.

False

True/False: Internet service providers are against repealing consumer privacy laws.

False

True/False: Microsoft IIS is the most popular web server software on the market.

False

True/False: The growth rate for home broadband propagation in the U.S. shows no signs of slowing down.

False

True/false: PKI is effective against company insiders.

False

True/false: Static web pages are bandwidth intensive.

False

True/false: The term "firewall" refers only to hardware-based network protection.

False

True/false: Using multiple tiers centralizes system resources and decreases the ability to scale.

False

Bonus Question: Explain why it is a good or bad thing for consumers in general with google getting rid of third party cookies

Good because our information is not going to other companies only google Bad because google could be showing a lot of bias

Bonus question: Name the bug that exploited a weakness in the transport layer of SSL.

Heartbleed

What is Equifax

Is a credit reporting agency Problem started to occur in march or april, found out in july, waited till about september to tell the public Apache was behind this They sold their stocks before they told the public

Who sold the first ever tweet

Jack Dorsey

Bonus question: What is Dr. Tonkin's twins name

Kirt

Small country known as blockchain island

Malta

Bonus question: Name a Smart TV company who has been fined for listening in on consumers

Samsung or Vizio

Bonus Question: What is Dr. Tonkin's pet peeve

The back button on my.francis

What is unique about Malta's approach to crypto currencies?

They are regulating it

True/False: A major disadvantage of Certification Authorities is that they are largely self-policing

True

True/False: Google Analytics is considered to be a third-party tool.

True

True/False: Print/TV ads are still regarded as being more trustworthy than online ads.

True

True/False: Social marketing/advertising is the fastest growing type of online marketing.

True

True/false: A video streaming server is a type of web application server.

True

True/false: Instant scalability is an advantage of outsourcing website development.

True

True/false: Malware, exploits, viruses, and other online hazards are collectively known as malicious code.

True

Typosquat

When you mistype a website like barnes and noble to barnes and nibble

Who are the hacking good guys

White hats

What does software as a service mean?

You are buying it from someone else

What are non-fungible tokens

a unit of data stored on a digital ledger, called a blockchain, that certifies a digital asset to be unique and therefore not interchangeable. NFTs can be used to represent items such as photos, videos, audio and other types of digital files

What is google analytics

a web analytics service offered by Google that tracks and reports website traffic, currently as a platform inside the Google Marketing Platform brand

Spam got its name from

monty python

What will google give you when you check your spam box?

recipes


Related study sets

Astronomy/Astrophysics/Cosmology Practice Questions

View Set

M2 Project Initiation and Integration

View Set

Chap 12 Sec 10 Updates Questions

View Set

AP Human Geography: Process of Deterioration

View Set

Introduction to Applied Behavior Analysis

View Set

Media And Society: Celebrity Midterm

View Set