MISY 5350 Exam 1 Review: Quizzes
It is estimated that by 2024, B2B e-commerce will generate ________ in revenues.
$9.8 trillion
The world's online population was estimated to be around ________ in 2020.
4 billion
How long does copyright protection extend for corporate-owned works?
95 years
Which of the following statements about data breaches in 2019 is not true?
According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.
Which of the following did the Internet Advertising Bureau urge advertisers to abandon?
Adobe Flash
Which of the following is not considered a portal?
Amazon
Which of the following uses a subscription revenue model for books? eHarmony Amazon Kindle Unlimited Spotify Pandora
Amazon Kindle Unlimited
________ is the ability to ensure that an e-commerce site continues to function as intended.
Availability
Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet?
BGP
An intrusion detection system can perform all of the following functions except:
Blocking suspicious activity
Mint Bills is an example of which of the following EBPP business models?
Consolidator
Which of the following is a brute force attack which hackers launch via botnets and automated tools using known user name and password combinations?
Credential Stuffing
Django follows the ________ programming principle.
DRY
Which of the following can be considered synonymous with the term e-commerce?
Digital commerce
The ________ allows a natural language expression, such as Google.com to represent a numeric IP address.
Domain name system
Which of the following types of crowdfunding involves people making contributions to others with no expectation of any return?
Donor-based crowdfunding
Which of the following companies uses a transaction fee revenue model?
E*trade
Which of the following may offer its customers value chain management software?
E-procurement companies
All of the following can be considered a direct competitor of Priceline except:
ESPN
Which of the following statements is not true?
Economists take a purely technical approach to e-commerce.
Which of the following is not one of the basic technological foundations of the Internet?
FTP
Which of the following is a leading platform for social e-commerce?
The Spokeo case involved a claim for damages based on which of the following?
Fair Credit Reporting Act
All of the following may lead to a competitive advantage except: Superior product Lower price product Fewer product Global product
Fewer product
Which of the following is not a basic type of cloud computing service?
FiOS
The display of a third-party's website or page within your own website is called:
Framing
Which of the following is a platform for B2B e-commerce? Airbnb Go2Paper Facebook Groupon
Go2Paper
________ typically attack governments, organizations, and sometimes individuals for political purposes.
Hacktivists
The ________ helps define the overall structure of the Internet.
IAB
Which of the following IEEE standards has been labeled by the Wi-Fi Alliance as Wi-Fi 6?
IEEE 802.11ax
What is the first step in analyzing an ethical dilemma?
Identify and describe the facts
Which of the following is not a unique feature of e-commerce technology?
Information asymmetry
Which of the following refers to any disparity in relevant market information among parties in a transaction?
Information asymmetry
During which phase of the development of the Internet was the Domain Name System (DNS) introduced?
Institutional phase
Which of the following is an important societal issue related to e-commerce?
Intellectual property
All of the following are required for information to be considered a trade secret except:
It must be unique.
Which of the following typically includes a data flow diagram to describe the flow of information for an e-commerce site?
Logical design
Which of the following describes the basic web policy of large firms during the Invention period? Integrate social networks and the mobile platform with website marketing. Maintain a basic, static website depicting the firm's brand. Emphasize the necessity for the Web to generate profits. Use the Web to sell complex goods and services online.
Maintain a basic, static website depicting the firm's brand.
Which of the following is not a variation of the e-tailer business model?
Market creator
Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship?
Mobile e-commerce
The first web browser to make it possible to view documents on the Web with colored background, images, and animations was:
Mosaic
Which of the following is an example of the affiliate revenue model?
MyPoints
Which of the following occurred during the Commercialization phase of Internet development?
NSF privatized the operation of the Internet's backbone.
Which of the following has not been the subject of concern about its increasing market dominance in 2020-2021?
Netflix
________ is the ability to ensure that e-commerce participants do not deny their online actions.
Nonrepudiation
Which of the following statements is not true?
Overall transaction costs have dropped dramatically.
Which of the following is the most commonly used server-side scripting language?
PHP
________ represents the total number of users or customers an e-commerce business can obtain.
Reach
Which of the following is not a major business trend in e-commerce in 2020-2021?
Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.
All of the following statements about e-commerce in the United States in 2020 are true except: On-demand service firms fueled the growth of local e-commerce. Retail e-commerce and m-commerce grew as a result of the Covid-19 pandemic. Social e-commerce generated more revenue than mobile e-commerce. Mobile advertising accounted for almost 70% of all digital advertising spending.
Social e-commerce generated more revenue than mobile e-commerce.
Which of the following Supreme Court cases established that states can compel online retailers to collect and remit sales taxes even if they do not have a physical presence within the state?
South Dakota v. Wayfair
Which of the following is a programming language introduced by Apple specifically for developing iOS applications?
Swift
________ are the types of information systems capabilities needed to meet business objectives.
System functionalities
Which of the following statements is not true? A majority of states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred. The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers. The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates. The Federal Trade Commission has asserted that it has authority over corporations' data security practices.
The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.
Which of the following statements about the Web is not true?
The Web is the technology upon which the internet is based.
Which of the following gives a business model the most credibility with outside investors?
The firm's management team
Which of the following statements about Foursquare is not true?
The growth in Foursquare's revenue has been driven primarily by significant increases in the numbers of users of its Swarm app.
TCP/IP operates in which layer of Internet architecture?
Transport Services and Representation Standards layer
All of the following can be considered examples of the market creator business model except:
E-commerce is available just about everywhere and anytime. This is known as: Ubiquity Richness Reach Information density
Ubiquity
Which of the following involves testing a site's program modules one at a time?
Unit testing
Which of the following features of e-commerce technology is related to the concept of network externalities?
Universal standards
All of the following primarily use an advertising revenue model except:
Walmart
All of the following are platforms for C2C e-commerce except: Craigslist. Facebook Marketplace. Walmart. Etsy.
Walmart.
Which of the following standards provide for high-speed short-range Wi-Fi?
WiGig
A(n) ________ allows users to easily add and edit content on a web page.
Wiki
Which business application is associated with the technological development of local area networks and client/server computing?
Workgroup automation (document sharing)
All of the following are platforms for social e-commerce except:
Y Combinator
The address used by a browser to identify the location of content on the Web is called: a domain name. an IP address. a Uniform Resource Locator. a file path.
a Uniform Resource Locator.
The early years of e-commerce were driven by all of the following factors except: an emphasis on quickly achieving very high market visibility. an emphasis on exploiting traditional distribution channels. visions of profiting from new technology. a huge infusion of venture capital funds.
an emphasis on exploiting traditional distribution channels.
All of the following are key design principles of responsive web design except:
coding by convention.
eBay uses all of the following business models except: e-commerce infrastructure provider. C2C market creator. content provider. B2C market creator.
content provider.
Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of: cybersquatting. cyberpiracy. framing. Metatagging.
cybersquatting.
Which of the following is not a key factor for establishing e-commerce security? data integrity technology organizational policies laws and industry standards
data integrity
The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade.
decreased dramatically
Which of the following involves bypassing the target site's home page and going directly to a content page? cybersquatting metatagging framing deep linking
deep linking
Which of the following refers to the displacement of market middle men and the creation of a new direct relationship between producers and consumers?
disintermediation
Which of the following is not an example of a potentially unwanted program (PUP)?
drive-by download
Which of the following basic ethical concepts plays an important role in defining privacy?
due process
The California Consumer Privacy Act (CCPA) does all of the following except:
gives residents the right to prevent government access to their personal information.
Which of the following is Google hoping to use to provide Internet access to remote parts of the world? unused, low-powered television channels WLANs EDI high-altitude balloons
high-altitude balloons
Which of the following statements about mobile apps is not true?
iOS apps are cross-platform, open-source applications.
All of the following might be part of a website's middle-tier layer except:
legacy corporate applications.
Which of the following enables Internet users to communicate with each other, although not in real time?
online forum
In general, the key to becoming a successful content provider is to:
own the content being provided.
Which of the following is not one of the basic technological foundations of the Internet?
packet switching FTP TCP/IP client/server computing
The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:
packet switching.
All of the following are examples of business-to-business (B2B) business models except: e-distributors. exchanges. portals. e-procurement.
portals.
The Transport Layer of TCP/IP is responsible for which of the following?
providing communication with the application by acknowledging and sequencing the packets to and from the application
All of the following statements about public key cryptography are true except: public key cryptography uses two mathematically related digital keys. public key cryptography ensures authentication of the sender. public key cryptography does not ensure message integrity. public key cryptography is based on the idea of irreversible mathematical functions.
public key cryptography ensures authentication of the sender.
Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text? personalization richness information density ubiquity
richness
Which of the following are central directories that list all domain names currently in use for specific domains?
root servers
Which of the following would you use to verify that links on web pages are valid?
site management tools
Which of the following is the best definition of transaction cost? the expense of changing national or regional prices the cost merchants pay to bring their goods to market the cost of finding suitable products in the market the cost of participating in a market
the cost of participating in a market
All of the following can be considered a precursor to e-commerce except: telephone based modem the development of the smartphone electronic data interchange (EDI) the Minitel
the development of the smartphone.
Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders?
two-tier architecture
Which element of the business model addresses what a firm provides that other firms do not and cannot?
value proposition competitive environment competitive advantage market strategy
Which of the following is the preferred method of implementing a service-oriented architecture? Scrum prototyping DevOps web services
web services
Which of the following involves creating a skeleton version that focuses on functionality rather than design? Scrum DevOps wireframing web services
wireframing