Electronic Commerce MidTerm Review CH 1-5

Ace your homework & exams now with Quizwiz!

In the address http://www.company.com/clients.html, which of the following is the top-level domain?

.com

Which of the following companies uses a transaction fee revenue model?

E*Trade

Which of the following is not an example of the bricks-and-clicks e-tailing business model?

Bluefly

Which of the following is not a concern about IoT?

the high cost of sensors

Which of the following typically includes a data flow diagram to describe the flow of information for an e-commerce site?

logical design

The Data Encryption Standard uses a(n) ________-bit key.

56

Which of the following is an example of an on-demand service company?

Airbnb

All of the following statements about Apple Pay are true except which of the following?

Apple Pay is available for both iPhone 5s and iPhone 6s.

All of the following are methods of securing channels of communication except:

FTP

Which of the following is an example of social e-commerce?

Facebook

Which of the following is not a basic type of cloud computing service?

FiOS

Which of the following statements about Foursquare is not true?

Foursquare's business model faces significant intellectual property concerns.

________ typically attack governments, organizations, and sometimes individuals for political purposes.

Hacktivists

Which of the following organizations coordinates the Internet's systems of unique identifiers, such as IP addresses and top-level domain systems?

ICANN

Which of the following is not part of the LAMP open source Web development model?

Microsoft IIS

The first Web browser to make it possible to view documents on the Web with colored background, images, and animations was:

Mosaic

________ refers to the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation

What is the first step in developing an e-commerce security plan?

Perform a risk assessment.

________ is a utility program that allows you to check the connection between your client and a TCP/IP network.

Ping

Which of the following is not a community provider?

Priceline

Django is based on which of the following?

Python

Which of the following statements about responsive Web design (RWD) is not true?

RWD works best for sites that have complex functionality.

Which of the following is not a major business trend in e-commerce in 2015-2016?

Small businesses and entrepreneurs are hampered by the rising cost of market entry caused by increased presence of industry giants.

________ are the types of information systems capabilities needed to meet business objectives.

System functionalities

Which of the following is the core communications protocol for the Internet?

TCP/IP

Which of the following is the current standard used to protect Wi-Fi networks?

WPA2

Which of the following is not an open source software tool?

WebSphere

Which of the following verifies that the business objectives of the system as originally conceived are in fact working?

acceptance testing

The Internet Layer of TCP/IP is responsible for which of the following?

addressing, packaging, and routing messages

Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers?

disintermediation

The ________ allows a natural language expression, such as Google.com to represent a numeric IP address.

domain name system

What type of Internet access technology are Google and Facebook hoping to use to provide Internet access to remote parts of the world?

drones

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

spyware

All of the following are characteristics of HTML5 except:

support for digital rights management

All the following statements about symmetric key cryptography are true except:

symmetric key cryptography is computationally slower.

All of the following can be considered a precursor to e-commerce except:

the development of the smartphone.

An intrusion detection system can perform all of the following functions except:

blocking suspicious activity

A wealthy individual who invests personal funds in a start-up in exchange for an equity stock in the business is referred to as a(n) ________.

angel investor

In 2015, the world's online population was estimated to be around:

3.1 billion

Bitcoins are an example of:

digital cash

Which of the following refers to delays in messages caused by the uneven flow of information packets through the network?

latency

When talking about the physical elements of the Internet, the term redundancy refers to:

multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

Automatically redirecting a Web link to a different address is an example of which of the following?

pharming

All of the following are Web site design features that annoy customers except:

redundant navigation.

Which of the following refers to the complexity and content of a message?

richness

The primary way a Web site is able to personalize the content presented to a visitor is through the use of:

cookies.

All of the following are basic information requirements for a product database except:

customer ID numbers.

W.W. Grainger is an example of which of the following business models?

e-distributor

The business model of e-tailers is quite similar to that of:

e-distributors

All of the following were visions of e-commerce expressed during the early years of e-commerce except:

fast follower advantage.

Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service?

freemium strategy

Which of the following is not a unique feature of e-commerce technology?

information asymmetry

Which of the following refers to any disparity in relevant market information among parties in a transaction?

information asymmetry

Which of the following is one of the three primary societal issues related to e-commerce?

intellectual property

All of the following might be part of a Web site's middle-tier layer except:

legacy corporate applications.

Which of the following is a physical place you visit in order to transact?

marketplace

PayPal is an example of what type of payment system?

online stored value payment system

In general, the key to becoming a successful content provider is to:

own the content being provided.

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

packet switching.

The Transport Layer of TCP/IP is responsible for which of the following?

providing communication with the application by acknowledging and sequencing the packets to and from the application

Which of the following are Amazon's primary value propositions?

selection and convenience

Which of the following is a server-side technique that detects the attributes of the device making the request, and using predefined templates, loads a version of a site that is optimized for the device?

AWD

The process of comparing a Web site with that of its competitors in terms of response speed, quality of layout, and design is known as:

benchmarking.

Accessing data without authorization on Dropbox is an example of which of the following?

cloud security issue

Which element of the business model refers to the presence of substitute products in the market?

competitive environment

Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as:

incubators.

The existence of a large number of competitors in any one market segment may indicate:

the market is saturated.

E-commerce can be defined as:

the use of the Internet, the Web, and mobile apps to transact business.

A perfect market is one in which:

there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.

Which of the following is the minimum system architecture requirement for an e-commerce Web site that processes orders?

two-tier architecture

E-commerce is available just about everywhere and anytime. This is known as ________.

ubiquity

Which of the following involves testing a site program's modules one at a time?

unit testing

A ________ marketplace supplies products and services of interest to particular industries.

vertical

In which year can e-commerce be said to have begun?

1995

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.


Related study sets

HESI pharmacology remediation EAQ

View Set

12. Outcomes-based risk sharing (Value Based Agreements) for pharmaceuticals

View Set