MISY 5350 Exam 1 Review: Quizzes

Ace your homework & exams now with Quizwiz!

It is estimated that by 2024, B2B e-commerce will generate ________ in revenues.

$9.8 trillion

The world's online population was estimated to be around ________ in 2020.

4 billion

How long does copyright protection extend for corporate-owned works?

95 years

Which of the following statements about data breaches in 2019 is not true?

According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.

Which of the following did the Internet Advertising Bureau urge advertisers to abandon?

Adobe Flash

Which of the following is not considered a portal?

Amazon

Which of the following uses a subscription revenue model for books? eHarmony Amazon Kindle Unlimited Spotify Pandora

Amazon Kindle Unlimited

________ is the ability to ensure that an e-commerce site continues to function as intended.

Availability

Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet?

BGP

An intrusion detection system can perform all of the following functions except:

Blocking suspicious activity

Mint Bills is an example of which of the following EBPP business models?

Consolidator

Which of the following is a brute force attack which hackers launch via botnets and automated tools using known user name and password combinations?

Credential Stuffing

Django follows the ________ programming principle.

DRY

Which of the following can be considered synonymous with the term e-commerce?

Digital commerce

The ________ allows a natural language expression, such as Google.com to represent a numeric IP address.

Domain name system

Which of the following types of crowdfunding involves people making contributions to others with no expectation of any return?

Donor-based crowdfunding

Which of the following companies uses a transaction fee revenue model?

E*trade

Which of the following may offer its customers value chain management software?

E-procurement companies

All of the following can be considered a direct competitor of Priceline except:

ESPN

Which of the following statements is not true?

Economists take a purely technical approach to e-commerce.

Which of the following is not one of the basic technological foundations of the Internet?

FTP

Which of the following is a leading platform for social e-commerce?

Facebook

The Spokeo case involved a claim for damages based on which of the following?

Fair Credit Reporting Act

All of the following may lead to a competitive advantage except: Superior product Lower price product Fewer product Global product

Fewer product

Which of the following is not a basic type of cloud computing service?

FiOS

The display of a third-party's website or page within your own website is called:

Framing

Which of the following is a platform for B2B e-commerce? Airbnb Go2Paper Facebook Groupon

Go2Paper

________ typically attack governments, organizations, and sometimes individuals for political purposes.

Hacktivists

The ________ helps define the overall structure of the Internet.

IAB

Which of the following IEEE standards has been labeled by the Wi-Fi Alliance as Wi-Fi 6?

IEEE 802.11ax

What is the first step in analyzing an ethical dilemma?

Identify and describe the facts

Which of the following is not a unique feature of e-commerce technology?

Information asymmetry

Which of the following refers to any disparity in relevant market information among parties in a transaction?

Information asymmetry

During which phase of the development of the Internet was the Domain Name System (DNS) introduced?

Institutional phase

Which of the following is an important societal issue related to e-commerce?

Intellectual property

All of the following are required for information to be considered a trade secret except:

It must be unique.

Which of the following typically includes a data flow diagram to describe the flow of information for an e-commerce site?

Logical design

Which of the following describes the basic web policy of large firms during the Invention period? Integrate social networks and the mobile platform with website marketing. Maintain a basic, static website depicting the firm's brand. Emphasize the necessity for the Web to generate profits. Use the Web to sell complex goods and services online.

Maintain a basic, static website depicting the firm's brand.

Which of the following is not a variation of the e-tailer business model?

Market creator

Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship?

Mobile e-commerce

The first web browser to make it possible to view documents on the Web with colored background, images, and animations was:

Mosaic

Which of the following is an example of the affiliate revenue model?

MyPoints

Which of the following occurred during the Commercialization phase of Internet development?

NSF privatized the operation of the Internet's backbone.

Which of the following has not been the subject of concern about its increasing market dominance in 2020-2021?

Netflix

________ is the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation

Which of the following statements is not true?

Overall transaction costs have dropped dramatically.

Which of the following is the most commonly used server-side scripting language?

PHP

________ represents the total number of users or customers an e-commerce business can obtain.

Reach

Which of the following is not a major business trend in e-commerce in 2020-2021?

Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.

All of the following statements about e-commerce in the United States in 2020 are true except: On-demand service firms fueled the growth of local e-commerce. Retail e-commerce and m-commerce grew as a result of the Covid-19 pandemic. Social e-commerce generated more revenue than mobile e-commerce. Mobile advertising accounted for almost 70% of all digital advertising spending.

Social e-commerce generated more revenue than mobile e-commerce.

Which of the following Supreme Court cases established that states can compel online retailers to collect and remit sales taxes even if they do not have a physical presence within the state?

South Dakota v. Wayfair

Which of the following is a programming language introduced by Apple specifically for developing iOS applications?

Swift

________ are the types of information systems capabilities needed to meet business objectives.

System functionalities

Which of the following statements is not true? A majority of states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred. The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers. The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates. The Federal Trade Commission has asserted that it has authority over corporations' data security practices.

The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.

Which of the following statements about the Web is not true?

The Web is the technology upon which the internet is based.

Which of the following gives a business model the most credibility with outside investors?

The firm's management team

Which of the following statements about Foursquare is not true?

The growth in Foursquare's revenue has been driven primarily by significant increases in the numbers of users of its Swarm app.

TCP/IP operates in which layer of Internet architecture?

Transport Services and Representation Standards layer

All of the following can be considered examples of the market creator business model except:

Twitter

E-commerce is available just about everywhere and anytime. This is known as: Ubiquity Richness Reach Information density

Ubiquity

Which of the following involves testing a site's program modules one at a time?

Unit testing

Which of the following features of e-commerce technology is related to the concept of network externalities?

Universal standards

All of the following primarily use an advertising revenue model except:

Walmart

All of the following are platforms for C2C e-commerce except: Craigslist. Facebook Marketplace. Walmart. Etsy.

Walmart.

Which of the following standards provide for high-speed short-range Wi-Fi?

WiGig

A(n) ________ allows users to easily add and edit content on a web page.

Wiki

Which business application is associated with the technological development of local area networks and client/server computing?

Workgroup automation (document sharing)

All of the following are platforms for social e-commerce except:

Y Combinator

The address used by a browser to identify the location of content on the Web is called: a domain name. an IP address. a Uniform Resource Locator. a file path.

a Uniform Resource Locator.

The early years of e-commerce were driven by all of the following factors except: an emphasis on quickly achieving very high market visibility. an emphasis on exploiting traditional distribution channels. visions of profiting from new technology. a huge infusion of venture capital funds.

an emphasis on exploiting traditional distribution channels.

All of the following are key design principles of responsive web design except:

coding by convention.

eBay uses all of the following business models except: e-commerce infrastructure provider. C2C market creator. content provider. B2C market creator.

content provider.

Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of: cybersquatting. cyberpiracy. framing. Metatagging.

cybersquatting.

Which of the following is not a key factor for establishing e-commerce security? data integrity technology organizational policies laws and industry standards

data integrity

The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade.

decreased dramatically

Which of the following involves bypassing the target site's home page and going directly to a content page? cybersquatting metatagging framing deep linking

deep linking

Which of the following refers to the displacement of market middle men and the creation of a new direct relationship between producers and consumers?

disintermediation

Which of the following is not an example of a potentially unwanted program (PUP)?

drive-by download

Which of the following basic ethical concepts plays an important role in defining privacy?

due process

The California Consumer Privacy Act (CCPA) does all of the following except:

gives residents the right to prevent government access to their personal information.

Which of the following is Google hoping to use to provide Internet access to remote parts of the world? unused, low-powered television channels WLANs EDI high-altitude balloons

high-altitude balloons

Which of the following statements about mobile apps is not true?

iOS apps are cross-platform, open-source applications.

All of the following might be part of a website's middle-tier layer except:

legacy corporate applications.

Which of the following enables Internet users to communicate with each other, although not in real time?

online forum

In general, the key to becoming a successful content provider is to:

own the content being provided.

Which of the following is not one of the basic technological foundations of the Internet?

packet switching FTP TCP/IP client/server computing

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

packet switching.

All of the following are examples of business-to-business (B2B) business models except: e-distributors. exchanges. portals. e-procurement.

portals.

The Transport Layer of TCP/IP is responsible for which of the following?

providing communication with the application by acknowledging and sequencing the packets to and from the application

All of the following statements about public key cryptography are true except: public key cryptography uses two mathematically related digital keys. public key cryptography ensures authentication of the sender. public key cryptography does not ensure message integrity. public key cryptography is based on the idea of irreversible mathematical functions.

public key cryptography ensures authentication of the sender.

Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text? personalization richness information density ubiquity

richness

Which of the following are central directories that list all domain names currently in use for specific domains?

root servers

Which of the following would you use to verify that links on web pages are valid?

site management tools

Which of the following is the best definition of transaction cost? the expense of changing national or regional prices the cost merchants pay to bring their goods to market the cost of finding suitable products in the market the cost of participating in a market

the cost of participating in a market

All of the following can be considered a precursor to e-commerce except: telephone based modem the development of the smartphone electronic data interchange (EDI) the Minitel

the development of the smartphone.

Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders?

two-tier architecture

Which element of the business model addresses what a firm provides that other firms do not and cannot?

value proposition competitive environment competitive advantage market strategy

Which of the following is the preferred method of implementing a service-oriented architecture? Scrum prototyping DevOps web services

web services

Which of the following involves creating a skeleton version that focuses on functionality rather than design? Scrum DevOps wireframing web services

wireframing


Related study sets

Examen Oral (Contesta con pronombres.)

View Set

Mental Health Exam 2 part 2 ch. 10 & 14

View Set

Anatomy and Physiology Muscular System

View Set

Chapter 28 Hematologic Function & Treatment Modalities

View Set

Hormonal Regulation of Male Reproductive Function

View Set