MIS 276 Final

Ace your homework & exams now with Quizwiz!

All of the following offer Web site building tools except: A. Wix B. Weebly C. Apache D. WordPress

C. Apache

All of the following are methods of improving the processing architecture of a Web site except: A. reviewing ASP code for operating efficiency B. don't separate shopping cart and credit card processing onto a dedicated server C. examining your database search times in order to optimize the database schema D. separating static content from dynamic content

B. don't separate shopping cart and credit card processing onto a dedicated server

Which of the following is not an example of a PUP? A. adware B. drive-by download C. browser parasite D. spyware

B. drive-by download

Proxy serves are also known as: A. application getaways B. dual home systems C. firewalls D. packet filters

B. dual home systems

Which of the following would you use to verify that links on Web pages are valid? A. data capture tools B. site management tool C. HTTP D. FTP

B. site management tool

Which of the following is an example of an integrity violation of e-commerce security? A. An unauthorized person intercepts an online communication and changes its contents B. A Web site is not actually operated by the entity the customer believes it to be C. A customer denies that he or she is the person who placed the order D. A merchant uses customer information in a manner not intended by the customer

A. An unauthorized person intercepts an online communication and changes its contents

Which of the following organizations involved with Internet governance has the United States recently transitioned control of to the private sector? A. ICANN B. IANA C. NTIA D. IGF

B. IANA

The ______ allows a natural language expression, such as Google.com to represent a numeric IP address. A. uniform resource locator system B. domain name system C. assigned numbers and names (ANN) system D. Internet protocol addressing schema

B. domain name system

Advantages of dynamic page generation include all of the following except: A. nearly cost-free price discrimination B. easier to change the contents of a database than to change the coding on an HTML page C. disables the use of content management systems which slow down system performance D. easy online market segmentation

C. disables the use of content management systems which show down system performance

_______ verifies that the business objectives of the system as originally conceived are in fact working. A. Unit testing B. Implementation testing C. System testing D. Acceptance testing

D. Acceptance testing

_____ is one of the original Internet services and is used to transfer files from a client computer to a web server computer and vice versa. A. SMTP B. HTTP C. SSL D. FTP

D. FTP

Which of the following statements about responsive Web design (RWD) is not true? A. RWD can be costly, often requiring a complete redesign of the web site's interface B. RWD makes it possible to design a Web site that automatically adjusts its layout and display according to the screen resolution of the device on which it is being viewed C. RWD tools include HTML5 and CSS3 D. RWD works best for sites that have complex functionality

D. RWD works best for sites that have complex functionality

To create a folder that could host your web page on a web server, you have to use on of the original TCP/IP protocol suite tools to create and alter the properties of the folder to make the web pages available to the public. The tool which allows you to logon to the web server operating system to setup and modify the properties of that folder is ________. A. SMTP B. FTP C. HTTP D. Telnet

D. Telnet

All of the following are basic functionality provided by e-commerce merchant server software except: A. a shopping cart B. credit card processing C. a product catalog D. marketing software

D. marketing software

The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called: A. VoIP B. VTP C. IPTP D. IP

A. VoIP

All of the following might be part of a Web site's middle-tier layer except: A. a materials requirements planning (MRP) server B. a database server C. an ad server D. a mail server

A. a materials requirements planning (MPR) server

All of the following are limitations of the existing online credit card payment system except: A. consumer difficult in repudiating charges B. cost to merchant C. social equity D. poor security

A. consumer difficult in repudiation charges

When talking about the physical elements of the Internet, the term redundancy refers to: A. multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs B. transmitting multiple copies of a single packet to safeguard against data loss C. delays in the messages caused by the uneven flow of information through the network D. the use of tiered high-speed switching computers to connect the backbone to regional and local networks

A. multiple duplicate devices and pathos in a network built so that data can be rerouted if a breakdown occurs

All of the following are characteristics of HTML5 except: A. support for digital rights management B. use of CSS3 C. ability to access built-in functionality of mobile devices, such as GPS and swiping D. a video element that replaces plug-ins such as Flash, QuickTime, and RealPlayer

A. support for digital rights management

All of the following statements about Apple Pay are true except which of the following? A. Apple Pay can be used for mobile payments at the point of sale at a physical store B. Apple Pay can use Touch ID biometric fingerprint scanning C. Apple Pay is about the fourth most popular mobile wallet at about 7% of all mobile wallet users D. Apple Pay relies on NFC chip technology

C. Apple Pay is about the fourth most popular mobile wallet at about 7% of all mobile wallet

_______ is a model of computing in which firms and individuals obtain computing power and software applications over the Internet, rather than purchasing and installing on their own computers. A. P2P computing B. Client/server computing C. Cloud computing D. Mobile computing

C. Cloud computing

________ refers to the ability to ensure that e-commerce participants do not deny their online actions. A. Integrity B. Authenticity C. Nonrepudiation D. Availability

C. Nonrepudiation

What is the first step in developing an e-commerce security plan? A. Create a security organization B. Develop a security policy C. Perform a risk assessment D. Perform a security audit

C. Perform a risk assessment

One of the main reasons IPv4 addresses will eventually be completely replaced by IPv6 address is the: A. Fiber optic technology has been slowly replacing cable and DSL. IPv4 simply doesn't work well with fiver optic cable B. IPv6 addresses include an encryption key that prevents all spoofing attacks by cyber criminals C. The capacity of IPv4 to deliver a unique address to each device attached is limited to 4.3 billion unique IP addresses. IPv6 allows for 1 quadrillion unique addresses. Eventually, every device connected to the internet will have its own unique IP address D. IPv4 addressing is being replaces by a new TCP/IP architecture

C. The capacity of IPv4 to deliver a unique address to each device attached is limited to 4.3 billion unique IP addresses. IPv6 allows for 1 quadrillion unique addresses. Eventually, every device connected to the internet will have its own unique IP address

It's a small application with limited functionality that can be installed and executed within a web page by an end user. _______ often take the form of on-screen devices such as clocks, event countdowns, auction-tickers, stock market tickers, flight arrival information, daily weather, phone books, picture etc... A. Podcasts B. Wikis C. Widgets D. Cookies

C. Widgets

A system design has two main components: A. business objectives and technology requirements B. a behavioral design and a technological design C. a logical design and a physical design D. front-end systems and back-end systems

C. a logical design and a physical design

The primary way a Web site is able to personalize the content presented to a visitor is through the use of: A. privacy policies B. accessibility rules C. cookies D. site management tools

C. cookies

Which of the following is not an example of a network access control? A. proxy servers B. firewalls C. digital signatures D. intrusion prevention system (IPS)

C. digital signatures

Which of the following is the second leading cause of data breaches? A. theft of a computer B. hackers C. employees error / negligence D. DDoS attack

C. employees error / negligence

All of the following are methods of protecting internet communications except: A. secure socket layer protocol B. digital certificates C. file transfer protocol D. digital envelopes

C. file transfer protocol


Related study sets

Chapter 11 Nutrition and Chronic disease A

View Set

Models- MOHO Chapter 8- Dimensions of Doing

View Set

Biology Chapters 16, 17, 18, & 23

View Set

SIE Exam Prep Quiz Questions Unit 6

View Set

Nursing Care of Children Online Practice 2019 B

View Set

Management EXAM 5 Cherry & Jacob

View Set

Final exam - ethical decision making USU

View Set

Accounting Theory & Practice Final - Weeks 1-5

View Set

Factoring, Assignment, and Pledging

View Set