Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
110 Cards in this Set
- Front
- Back
Which of the following statements about client/server computing is true?
|
It connects multiple powerful personal computers together in one network with one or more servers dedicated to common functions that they all need.
|
|
Which of the following occurred during the Commercialization phase of Internet development?
|
NSF privatized the operation of the Internet's backbone.
|
|
Which of the following is the "killer app" of 2012?
|
social networks
|
|
The natural language convention used to represent IP addresses is called the:
|
domain name system.
|
|
The addresses used by browsers to identify the location of content on the Web are called:
|
uniform resource locators.
|
|
Which of the following was the largest source of mobile commerce revenue in 2012?
|
mobile retail purchases
|
|
What are 3 advantages of client/server computing over centralized mainframe computing?
|
It is easy to expand capacity by adding servers and clients.
Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer. There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down. |
|
_______ is a utility program that allows you to check the connection between your client and a TCP/IP network.
|
Ping
|
|
FTP is a protocol used to
|
transfer files to and from a server.
|
|
What are 3 current limitations of the current Internet?
|
architectural restrictions, which stipulate that numerous requests for the same file must each be answered individually, slowing network performance
HTML, which is not proficient for designing business documents or databases for Web viewing limited bandwidth, which causes congestion and cannot adequately handle video and voice traffic |
|
Which of the following is currently the most popular Web browser?
|
Internet Explorer
|
|
The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:
|
packet switching.
|
|
RSS is an XML format that
|
allows users to have digital content automatically sent to their computers over the Internet.
|
|
One of Internet2's projects is
|
a nationwide 100 gigabit-per-second network.
|
|
Google Apps is an example of cloud computing.
|
of cloud computing.
|
|
HTML is
|
the Internet protocol used to transfer Web pages.
|
|
Name 3 facts about iPhone apps
|
More than 30 billion have been downloaded.
They were estimated to generate over $2 billion in 2012. They are distributed through Apple's App Store. |
|
Which of the following is the core communications protocol for the Internet?
|
TCP/IP
|
|
The major technologies used with wireless local area networks are:
|
Wi-Fi and Bluetooth.
|
|
You could expect to find all of the following services in a Web server software package
|
data capture.
security services. FTP. |
|
When talking about the physical elements of the Internet, the term redundancy refers to:
|
multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.
|
|
Which of the following protocols is used to send mail to a server?
|
SMTP
|
|
Internet access providers typically provide faster ______ speeds than _______ speeds to consumers.
|
download, upload
|
|
In the address http://www.company.com/clients.html, which of the following is the top-level domain?
|
.com
|
|
___ is a model of computing in which firms and individuals obtain computing power and software applications over the Internet, rather than purchasing and installing it on their own computers.
|
Cloud computing
|
|
A(n) ________ is an audio presentation stored as an audio file and posted to the Web for users to download.
|
podcast
|
|
State 3 facts about fiber-optic cable.
|
There are thousands of miles of installed fiber-optic cable in the United States that are not being used.
It is thinner and lighter than coaxial or twisted pair cable. It enables better data security than coaxial cable. |
|
State 3 facts about the mobile platform.
|
Unlike PCs, smartphones do not need fans.
About 25% of the world's cell phones are smartphones. The number of cell phones worldwide exceeds the number of PCs. |
|
In the United States, there are two main types of cellular networks, CDMA and:
|
GSM.
|
|
Tablet computers rely on the Internet cloud for
|
processing and storage
|
|
State 3 basic technological foundations of the Internet.
|
TCP/IP communications protocol
client/server computing packet-switching hardware |
|
The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:
|
VoIP.
|
|
________ is one of the original Internet services and is used to transfer files from a server computer to a client computer and vice versa.
|
FTP
|
|
3 basic information requirements for a product database are
|
stock numbers.
product descriptions inventory levels. |
|
What are 3 main factors in web site optimization?
|
page content
page generation page delivery |
|
The cost of hardware, software, and telecommunications services needed to build a Web site have ________ over the last decade
|
decreased dramatically
|
|
Which of the following types of sites typically needs a high percent of secure pages?
|
trading
|
|
Accessibility rules do not help to ensure
|
that low-bandwidth users can access your Web site.
|
|
Name 3 things that can enhance page delivery speed.
|
using specialized content delivery networks.
increasing local bandwidth. using edge caching services. |
|
Using prebuilt templates is typically
|
one of the most cost-effective choices when building a Web site
|
|
What are 3 basic business objectives for an e-commerce site?
|
execute a transaction
provide production and supplier links display goods |
|
The leading Web server software is:
|
Apache.
|
|
Most of the time required to maintain an e-commerce site is spent on:
|
general administration and making changes and enhancements to the system.
|
|
The primary way a Web site is able to personalize the content presented to a visitor is through the use of:
|
cookies.
|
|
What are 3 types of application servers?
|
ad server
proxy server mail server |
|
Which of the following types of sites tends to have high to very high page views (hits)?
|
publishing/subscription
|
|
The Web server software used ________ how a Web site's Web pages look on users' computers.
|
does not significantly impact
|
|
Which of the following is the least expensive path to creating a mobile Internet presence?
|
resizing an existing Web site for mobile use
|
|
Which of the following is an example of dynamic content?
|
blog posts
|
|
Dynamic page generation makes ______ easier.
|
market segmentation
|
|
What are 3 simple steps for optimizing Web page content that can reduce response times?
|
avoiding unnecessary links to other pages on the site.
reducing unnecessary HTML comments. using more efficient graphics. |
|
Which of the following is used to process certificates and private/public key information?
|
SSL
|
|
________ is a programming language invented by Netscape used to control the objects on an HTML page and handle interactions with the browser.
|
JavaScript
|
|
Which of the following is the final stage suggested for a six-phase plan to develop an e-commerce presence?
|
mobile plan
|
|
Which of the following types of servers monitors and controls access to a main Web server and implements firewall protection?
|
proxy server
|
|
A "native" app is
|
one designed to specifically operate using a mobile device's hardware and operating system.
|
|
What are the two most important management challenges in building a successful e-commerce presence?
|
developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives
|
|
What are 3 important factors in Web site optimization?
|
buying search engine ads.
identifying market niches for your services or products. selecting keywords and page titles. |
|
The systems development life cycle methodology is useful when
|
creating an e-commerce Web site.
|
|
Name 3 web site design features that annoy customers.
|
splash pages
slow-loading pages pop-under ads |
|
What are 3 examples of the four kinds of e-commerce presence?
|
email list
Twitter Feed print ad that refers to a Web site |
|
What are 3 activities typically associated with a social media e-commerce presence?
|
conversation
advice sharing |
|
Which of the following helps you understand the marketing effectiveness of your e-commerce site?
|
site tracking and reporting system
|
|
Advantages of dynamic page generation include all of the following:
|
market segmentation.
nearly cost-free price discrimination lowered menu costs. |
|
Mobile Web apps are typically built using
|
HTML5 and Java.
|
|
Prior to the development of e-commerce, Web sites primarily delivered
|
static content.
|
|
In a two-tier architecture,
|
a Web server is linked to one middle-tier layer that typically includes a series of application servers, as well as to another back-end layer.
|
|
What are 3 main factors in determining overall demand for an e-commerce site?
|
number of items in inventory
type of content user profiles |
|
What are 3 basic functionalities provided by e-commerce merchant server software?
|
credit card processing.
a product catalog. a shopping cart. |
|
Which system functionality must your Web site have in order to be able to personalize or customize a product for a client?
|
customer on-site tracking
|
|
What are 3 basic functionalities provided by Web servers?
|
security services.
data capture tools. site management tools. |
|
The Conficker worm targeted:
|
Microsoft operating systems.
|
|
Credit cards are not
|
the dominant form of online payment throughout the world.
|
|
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
|
firewall
|
|
The Data Encryption Standard uses a(n) ________-bit key.
|
56
|
|
All of the following are features of cash except:
|
It provides float.
|
|
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
|
spyware.
|
|
According to the Computer Security Institute's 2011 Computer Crime and Security Survey, which of the following was the most commonly reported type of attack?
|
malware infection
|
|
Which dimension(s) of security is spoofing a threat to?
|
integrity and authenticity
|
|
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:
|
an authorization management system
|
|
None of the following payment systems offers immediate monetary value except:
|
stored value/debit card.
|
|
What is the last step in developing an e-commerce security plan?
|
Perform a security audit.
|
|
Which of the following is not a key point of vulnerability when dealing with e-commerce?
|
the credit card companies
|
|
TLS does not
|
guarantee server-side authentication.
|
|
All of the following are examples of stored value payment systems except:
|
credit cards
|
|
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
|
Authenticity
|
|
Which of the following dimensions of e-commerce security is not provided for by encryption?
|
availability
|
|
P2P payment systems are a variation on what type of payment system?
|
stored value payment system
|
|
The United States federal government has historically
|
not been in favor of the development and export of strong encryption systems.
|
|
Typically, the more security measures added to a Web site, the slower and more difficult it becomes to use.
|
True
|
|
________ refers to the ability to ensure that messages and data are only available to those authorized to view them.
|
Confidentiality
|
|
Drive-by downloads are now the most common method of infecting computers.
|
True
|
|
Which of the following is an example of an integrity violation of e-commerce security?
|
An unauthorized person intercepts an online communication and changes its contents.
|
|
Which of the following is the primary federal statute used to combat computer crime?
|
Computer Fraud and Abuse Act
|
|
All of the following are factors in contributing to the increase in cybercrime except:
|
the Internet's similarity to telephone networks
|
|
All of the following are limitations of the existing online credit card payment system except:
|
cost to consumers.
|
|
A worm does not need to be activated by a user in order for it to replicate itself.
|
True
|
|
Symmetric key encryption is also known as:
|
secret key encryption.
|
|
All of the following were computer crimes committed in 2011-2012 except:
|
Melissa worm spreads through Microsoft Word templates.
|
|
Malware that comes with a downloaded file that a user requests is called a:
|
drive-by download.
|
|
All of the following statements about debit cards are true except:
|
Debit cards enable consumers to make purchases even if they do not have sufficient funds at the time of purchase.
|
|
An example of a privacy violation of e-commerce security is:
|
your online purchasing history being sold to other merchants without your consent.
|
|
All of the following statements about public key encryption are true except:
|
Public key encryption ensures authentication of the sender.
|
|
All of the following are methods of securing channels of communication except:
|
FTP
|
|
Linden Dollars, created for use in Second Life, are an example of:
|
virtual currency
|
|
Smishing attacks exploit SMS messages.
|
True
|
|
The overall rate of online credit card fraud is ________ percent of all online card transactions.
|
less than 1
|
|
Which of the following is not an example of an access control?
|
digital signatures
|
|
Phishing attacks rely on browser parasites.
|
confidentiality.
|
|
In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.
|
True.
|