• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/110

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

110 Cards in this Set

  • Front
  • Back
Which of the following statements about client/server computing is true?
It connects multiple powerful personal computers together in one network with one or more servers dedicated to common functions that they all need.
Which of the following occurred during the Commercialization phase of Internet development?
NSF privatized the operation of the Internet's backbone.
Which of the following is the "killer app" of 2012?
social networks
The natural language convention used to represent IP addresses is called the:
domain name system.
The addresses used by browsers to identify the location of content on the Web are called:
uniform resource locators.
Which of the following was the largest source of mobile commerce revenue in 2012?
mobile retail purchases
What are 3 advantages of client/server computing over centralized mainframe computing?
It is easy to expand capacity by adding servers and clients.

Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer.

There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down.
_______ is a utility program that allows you to check the connection between your client and a TCP/IP network.
Ping
FTP is a protocol used to
transfer files to and from a server.
What are 3 current limitations of the current Internet?
architectural restrictions, which stipulate that numerous requests for the same file must each be answered individually, slowing network performance

HTML, which is not proficient for designing business documents or databases for Web viewing

limited bandwidth, which causes congestion and cannot adequately handle video and voice traffic
Which of the following is currently the most popular Web browser?
Internet Explorer
The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:
packet switching.
RSS is an XML format that
allows users to have digital content automatically sent to their computers over the Internet.
One of Internet2's projects is
a nationwide 100 gigabit-per-second network.
Google Apps is an example of cloud computing.
of cloud computing.
HTML is
the Internet protocol used to transfer Web pages.
Name 3 facts about iPhone apps
More than 30 billion have been downloaded.

They were estimated to generate over $2 billion in 2012.

They are distributed through Apple's App Store.
Which of the following is the core communications protocol for the Internet?
TCP/IP
The major technologies used with wireless local area networks are:
Wi-Fi and Bluetooth.
You could expect to find all of the following services in a Web server software package
data capture.

security services.

FTP.
When talking about the physical elements of the Internet, the term redundancy refers to:
multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.
Which of the following protocols is used to send mail to a server?
SMTP
Internet access providers typically provide faster ______ speeds than _______ speeds to consumers.
download, upload
In the address http://www.company.com/clients.html, which of the following is the top-level domain?
.com
___ is a model of computing in which firms and individuals obtain computing power and software applications over the Internet, rather than purchasing and installing it on their own computers.
Cloud computing
A(n) ________ is an audio presentation stored as an audio file and posted to the Web for users to download.
podcast
State 3 facts about fiber-optic cable.
There are thousands of miles of installed fiber-optic cable in the United States that are not being used.

It is thinner and lighter than coaxial or twisted pair cable.

It enables better data security than coaxial cable.
State 3 facts about the mobile platform.
Unlike PCs, smartphones do not need fans.

About 25% of the world's cell phones are smartphones.

The number of cell phones worldwide exceeds the number of PCs.
In the United States, there are two main types of cellular networks, CDMA and:
GSM.
Tablet computers rely on the Internet cloud for
processing and storage
State 3 basic technological foundations of the Internet.
TCP/IP communications protocol

client/server computing

packet-switching hardware
The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:
VoIP.
________ is one of the original Internet services and is used to transfer files from a server computer to a client computer and vice versa.
FTP
3 basic information requirements for a product database are
stock numbers.

product descriptions

inventory levels.
What are 3 main factors in web site optimization?
page content

page generation

page delivery
The cost of hardware, software, and telecommunications services needed to build a Web site have ________ over the last decade
decreased dramatically
Which of the following types of sites typically needs a high percent of secure pages?
trading
Accessibility rules do not help to ensure
that low-bandwidth users can access your Web site.
Name 3 things that can enhance page delivery speed.
using specialized content delivery networks.

increasing local bandwidth.

using edge caching services.
Using prebuilt templates is typically
one of the most cost-effective choices when building a Web site
What are 3 basic business objectives for an e-commerce site?
execute a transaction

provide production and supplier links

display goods
The leading Web server software is:
Apache.
Most of the time required to maintain an e-commerce site is spent on:
general administration and making changes and enhancements to the system.
The primary way a Web site is able to personalize the content presented to a visitor is through the use of:
cookies.
What are 3 types of application servers?
ad server

proxy server

mail server
Which of the following types of sites tends to have high to very high page views (hits)?
publishing/subscription
The Web server software used ________ how a Web site's Web pages look on users' computers.
does not significantly impact
Which of the following is the least expensive path to creating a mobile Internet presence?
resizing an existing Web site for mobile use
Which of the following is an example of dynamic content?
blog posts
Dynamic page generation makes ______ easier.
market segmentation
What are 3 simple steps for optimizing Web page content that can reduce response times?
avoiding unnecessary links to other pages on the site.

reducing unnecessary HTML comments.

using more efficient graphics.
Which of the following is used to process certificates and private/public key information?
SSL
________ is a programming language invented by Netscape used to control the objects on an HTML page and handle interactions with the browser.
JavaScript
Which of the following is the final stage suggested for a six-phase plan to develop an e-commerce presence?
mobile plan
Which of the following types of servers monitors and controls access to a main Web server and implements firewall protection?
proxy server
A "native" app is
one designed to specifically operate using a mobile device's hardware and operating system.
What are the two most important management challenges in building a successful e-commerce presence?
developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives
What are 3 important factors in Web site optimization?
buying search engine ads.

identifying market niches for your services or products.

selecting keywords and page titles.
The systems development life cycle methodology is useful when
creating an e-commerce Web site.
Name 3 web site design features that annoy customers.
splash pages

slow-loading pages

pop-under ads
What are 3 examples of the four kinds of e-commerce presence?
email list

Twitter Feed

print ad that refers to a Web site
What are 3 activities typically associated with a social media e-commerce presence?
conversation

advice

sharing
Which of the following helps you understand the marketing effectiveness of your e-commerce site?
site tracking and reporting system
Advantages of dynamic page generation include all of the following:
market segmentation.

nearly cost-free price discrimination

lowered menu costs.
Mobile Web apps are typically built using
HTML5 and Java.
Prior to the development of e-commerce, Web sites primarily delivered
static content.
In a two-tier architecture,
a Web server is linked to one middle-tier layer that typically includes a series of application servers, as well as to another back-end layer.
What are 3 main factors in determining overall demand for an e-commerce site?
number of items in inventory

type of content

user profiles
What are 3 basic functionalities provided by e-commerce merchant server software?
credit card processing.

a product catalog.

a shopping cart.
Which system functionality must your Web site have in order to be able to personalize or customize a product for a client?
customer on-site tracking
What are 3 basic functionalities provided by Web servers?
security services.

data capture tools.

site management tools.
The Conficker worm targeted:
Microsoft operating systems.
Credit cards are not
the dominant form of online payment throughout the world.
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
firewall
The Data Encryption Standard uses a(n) ________-bit key.
56
All of the following are features of cash except:
It provides float.
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
spyware.
According to the Computer Security Institute's 2011 Computer Crime and Security Survey, which of the following was the most commonly reported type of attack?
malware infection
Which dimension(s) of security is spoofing a threat to?
integrity and authenticity
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:
an authorization management system
None of the following payment systems offers immediate monetary value except:
stored value/debit card.
What is the last step in developing an e-commerce security plan?
Perform a security audit.
Which of the following is not a key point of vulnerability when dealing with e-commerce?
the credit card companies
TLS does not
guarantee server-side authentication.
All of the following are examples of stored value payment systems except:
credit cards
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
Authenticity
Which of the following dimensions of e-commerce security is not provided for by encryption?
availability
P2P payment systems are a variation on what type of payment system?
stored value payment system
The United States federal government has historically
not been in favor of the development and export of strong encryption systems.
Typically, the more security measures added to a Web site, the slower and more difficult it becomes to use.
True
________ refers to the ability to ensure that messages and data are only available to those authorized to view them.
Confidentiality
Drive-by downloads are now the most common method of infecting computers.
True
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
Which of the following is the primary federal statute used to combat computer crime?
Computer Fraud and Abuse Act
All of the following are factors in contributing to the increase in cybercrime except:
the Internet's similarity to telephone networks
All of the following are limitations of the existing online credit card payment system except:
cost to consumers.
A worm does not need to be activated by a user in order for it to replicate itself.
True
Symmetric key encryption is also known as:
secret key encryption.
All of the following were computer crimes committed in 2011-2012 except:
Melissa worm spreads through Microsoft Word templates.
Malware that comes with a downloaded file that a user requests is called a:
drive-by download.
All of the following statements about debit cards are true except:
Debit cards enable consumers to make purchases even if they do not have sufficient funds at the time of purchase.
An example of a privacy violation of e-commerce security is:
your online purchasing history being sold to other merchants without your consent.
All of the following statements about public key encryption are true except:
Public key encryption ensures authentication of the sender.
All of the following are methods of securing channels of communication except:
FTP
Linden Dollars, created for use in Second Life, are an example of:
virtual currency
Smishing attacks exploit SMS messages.
True
The overall rate of online credit card fraud is ________ percent of all online card transactions.
less than 1
Which of the following is not an example of an access control?
digital signatures
Phishing attacks rely on browser parasites.
confidentiality.
In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.
True.