• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/225

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

225 Cards in this Set

  • Front
  • Back
T/F: Business-to-consumer electronic commerce occurs when a person sells an item through a Web auction site to another person.
False
Internet e-mail accounts are far more valuable than single-organization e-mail accounts because of the ____________________.
Network effect
The characteristic of economic activity explained by the example that the more product a person consumes, the less pleasure they derive from that product is known as the law of ____________________ returns.
diminishing
Electronic funds transfers are also called ____.
wire transfers
In the first wave of electronic commerce, ____________________ was the dominant language used on most Web sites.
English
Businesses that engage in EDI with each other are called ____.
trading partners
The term ____________________ refers to the theft of musical artists’ intellectual property.
digital piracy
A(n) ____ is a set of processes that combine to yield a profit.
business model
In a(n) ____, companies coordinate their strategies, resources, and skill sets by forming long-term, stable relationships with other companies and individuals based on shared purposes.
network economic structure
The practice of an existing firm replacing one or more of its supplier markets with its own hierarchical structure for creating the supplied product is called ____.
Question 10 answers
vertical integration
SWOT is the acronym for ____.
strengths, weaknesses, opportunities, and threats
T/F: The U.S. government is one of the largest EDI trading partners in the world.
True
The combination of language and customs is often called ____________________.
culture
A(n) ____________________ is a gathering of people who share a common interest, which takes place on the Internet.
virtual community
In the mid-1990s, ____ used a SWOT analysis to create a strong business strategy that has helped it become a strong competitor in its industry value chain.
Dell Computer
T/F: The legal environment in which electronic commerce is conducted is full of clear and concise laws.
False
T/F: An outsourcing profile is the collection of attributes that affect how easily a product can be packaged and delivered.
False
A(n) ____ is an independent firm that offers connection and transaction-forwarding services to buyers and sellers engaged in EDI.
VAN
The term ____________________ refers to a translation that considers multiple elements of the local environment, such as business and cultural practices, in addition to dialect variations in the language.
localization
____ is a good example of a company that sells its products to other businesses rather than to consumers.
Intel
T/F: A value-added network is an independent firm that offers connection and transaction-forwarding services to buyers and sellers engaged in EDI.
True
T/F: Businesses often calculate return-on-investment numbers after committing to new technology.
False
T/F: Brokerage fees and sales commissions are typically the largest part of transaction costs.
False
T/F: The industry value chain identifies opportunities up and down the product's life cycle for increasing the efficiency or quality of the product.
True
T/F: Researchers have found that customers are far more likely to buy products and services from Web sites in their own language, even if they can read English well.
True
The type of electronic commerce in which transactions are conducted between businesses on the Web is called ____.
B2B
Which of the following types of commerce is most suited to electronic commerce?
Sale/purchase of books and CDs
When strategic alliances or strategic partnerships are formed among companies operating on the Internet, these relationships are called ____.
virtual companies
SWOT analysis is performed ____.
when a business unit wants to analyze and evaluate
business opportunities
The combination of language and customs is often called ____.
culture
EDI stands for electronic data ____.
interchange
Companies and investors still use the idea of a(n) _____, which is a specific collection of business processes used to identify customers, market to those customers, and generate sales to those customers.
revenue model
____ costs are the total of all costs that a buyer and a seller incur as they gather information and negotiate a purchase-sale transaction.
Transaction
SWOT is short for strengths, weaknesses, opportunities, and ____.
threats
Software translation is also called ____.
machine translation
When packets leave a network to travel on the Internet, they must be translated into a standard format. ____ usually perform this translation function.
routers
In 1979, a group of students and programmers at Duke University and the University of North Carolina started ____________________, which allows anyone who connects to the network to read and post articles on a variety of subjects.
usenet
A(n) ____________________ is an intranet that has been extended to include specific entities outside the boundaries of the organization.
extranet
____________________ is the amount of data that can travel through a communication line per unit of time.
bandwidth
____ determine how the sending device indicates that it has finished sending a message, and how the receiving device indicates that it has received the message.
Protocols
The part of the Internet known as the _________________________ is a subset of the computers on the Internet that are connected to each other in a specific way that makes them and their contents easily accessible to each other.
Question 6 answers
world wide web
T/F: Intranets are not compatible with the Internet.
False
An extranet that uses public networks and their protocols to send sensitive data to partners, customers, suppliers, and employees using a system called IP tunneling or encapsulation is known as a(n) ____.
virtual private network
HTML and XML were derived from _____________________________________________.
Standard Generalized Markup Language (SGML)
Usenet survives on the Internet today with over 1000 different topic areas that are called ____________________.
newsgroups
A(n) ____ is like a separate, covered commuter lane on a highway (the Internet) in which passengers are protected from being seen by the vehicles traveling in the other lanes.
VPN
____ was the first Web browser that became widely available for personal computers.
Mosaic
T/F: The set of rules for delivering Web page files over the Internet are in a protocol called the HTTP (Hypertext Transfer Protocol).
True
T/F: The Internet provides a high degree of security in its basic structure.
False
T/F: The POP protocol provides support for MIME.
True
The ____________________ Protocol specifies the addressing details for each packet, labeling each with the packet's origination and destination addresses.
internet
A(n) ____________________ server is a computer that stores files written in the hypertext markup language and lets other computers connect to it and read these files.
hypertext
T/F: Although fax, e-mail, and overnight carriers have been the main communications tools for business for many years, extranets can replace many of them at a lower cost.
True
T/F: The Web is software that runs on computers that are connected to the Internet.
True
A newer e-mail protocol that performs the same basic functions as POP, but includes additional features, is known as ____.
IMAP
T/F: Usenet survives on the Internet today, with over 1000 different topic areas that are called newsgroups.
True
T/F: Unfortunately, the Internet was not designed to be resistant to failure.
False
T/F: Computers do all of their internal calculations by using a base 2 (or binary) number system.
True
T/F: The markup language that is most commonly used on the Web is SGML.
False
T/F: In a linear hyperlink structure, the Web user opens an introductory page called a home page or start page, which links to other pages in a tree-like arrangement.
False
T/F: An extranet cannot be set up through the Internet.
False
T/F:Asymmetric connections provide different bandwidths to or from an ISP.
True
T/F: Internet2 is an experimental test bed for new networking technologies that is separate from the original Internet.
True
Internet Service Providers purchase Internet access rights from ____.
network access providers
The combination of telephone lines and the closed switches that connect them to each other is called a(n) ____.
circuit
The version of IP that has been in use for the past 20 years on the Internet is ____.
IPv4
____ is costly to set up and maintain, requires the use of expensive software tools, and is hard to learn.
SGML
What type of HTML tag can be used by Web designers to embed scripting language code into HTML pages?
Object tag
____ effectively creates a private passageway through the public Internet that provides secure transmission from one computer to another.
IP tunneling
Small Bluetooth networks are called ____.
piconets
A(n) ____ is a set of standards that defines, in detail, the relationships among RDF standards and specific XML tags within a particular knowledge domain.
ontology
The privatization of the Internet was substantially completed in the year ____.
1995
A network of computers that are located close together is called a(n) ____.
Local Area Network (LAN)
____ are a series of IP numbers that are not permitted on packets that travel on the Internet.
Private IP Adresses
A(n) ____ language is one that can be used to define other languages.
Question 20 answers
meta
Tags are easily distinguished in an HTML document because each tag is enclosed in ____.
angle brackets
A(n) ____ is a private, leased-line connection between two companies that physically connects their intranets to one another.
private network
____ is the amount of data that can travel through a communication line per unit of time.
Bandwidth
A resource description framework (RDF) is a set of standards for ____ syntax.
XML
T/F: The centralized architecture spreads risk over a large number of servers.
False
Which of the following conducts continual surveys to tally the number of Web sites in existence and measure the relative popularity of Internet Web server software?
Netcraft
T/F: The entity body returns the HTML page requested by the client machine.
Question 3 answers
True
A(n) ____ file is a file on a Web site that is not linked to any page.
Question 4 answers
orphan
____ are the dynamic page-generation technologies that are available from Sun Microsystems.
JSP
____________________ revision is a statistical technique in which additional knowledge is used to revise earlier estimates of probabilities.
Bayesian
____________________ is a Web-development framework that allows programmers to query data that is in XML format and generate output in multiple formats, including HTML.
Apache Cocoon
The performance of one Web server differs from that of another based on work load, operating system, and the size and type of Web pages served.
True
In a client/server architecture, a(n) ____ contains a command, the name of the target resource, and the protocol name and version number.
request line
T/F: A development site cannot reside on an existing PC running Web server software.
False
T/F: A black list spam filter can be implemented at the individual level.
True
T/F: The smaller servers used in the decentralized architecture are more expensive than the large servers used in the centralized approach.
False
T/F: With remote server administration, a Web site administrator can control a Web site from any Internet-connected computer.
True
A(n) ____________________ is a corporate network that houses internal memos, corporate policy handbooks, expense account worksheets, and a variety of other corporate documents.
intranet
____ is a program that allows users to log onto a computer that is connected to the Internet.
Telnet
A large collection of servers is called a(n) ____________________.
server farm
____________________ are messages rejected by a white spam filter that should not have been.
False positives
Independent testing labs such as ____ test software, hardware systems, and network products for users.
Mindcraft
The server computer on which database management system software runs is often called a(n) ____________________ server.
database
T/F: The basic Web client/server model is a three-tier model.
False
T/F: The basic Web client/server model is a two-tier model because it has only one client and one server.
True
T/F: Microsoft Internet Information Server (IIS) comes bundled with current versions of Microsoft Windows Server operating systems.
Question 2 answers
True
T/F: Information that accompanies an e-mail message is commonly referred to as a link.
False
T/F: Tracert (TRACE RouTe) is a program that sends data packets to every computer on the path (Internet) between one computer and another computer and clocks the packets' round-trip times.
True
T/F: A benchmark switch is a piece of network hardware that monitors the workloads of servers attached to it and assigns incoming Web traffic to the server that has the most available capacity at that instant in time.
False
A(n) ____ page is a Web page whose content is shaped by a program in response to user requests.
dynamic
____ continually conducts surveys to tally the number of Web sites in existence and measure the relative popularity of Internet Web server software.
Netcraft
____ is a program that installs on individual client computers and works with many different e-mail clients to provide content filtering.
POPFile
____ is a program that runs on UNIX operating systems and allows a user to obtain some information about other network users.
Finger
____ is the term used to describe the testing that compares the performance of hardware and software.
Benchmarking
The server computer on which database management software runs is often called a(n) ____.
Question 11 answers
database server
Rob McCool developed ____ while he was working at the University of Illinois at the NCSA in 1994.
Apache HTTP Server
A(n) ____ filter examines From addresses and compares them to a list of known good sender addresses.
white list spam
A Web ____ consists of data that is captured by a Web server about visitor information.
log file
____ is the number of HTTP requests that a particular hardware and software combination can process in a unit of time.
throughput
___________________ is a combination of software tools that let application software in one organization communicate with other applications over a network by using a specific set of standard protocols known by their acronyms: SOAP, UDDI, and WSDL.
Web services
____________________ can help businesses find customers with common interests and discover previously unknown relationships among the data.
Data mining
T/F: Buying and using midrange electronic commerce software is less expensive than using a CSP.
False
T/F: Some companies create their own CRM software using outside consultants and their own IT staffs.
True
The Web is a(n) ____ system, unable to remember anything from one transmission or session to another.
stateless
____ software is a type of software designed to help businesses manage the information in documents (rather than the documents themselves).
Knowledge management
One way to uniquely identify users and to store information about their choices is to create and store ____.
cookies
T/F: CRM software performs two general types of functions: planning and execution
False
______________________________ are in the business of providing Internet access to companies and individuals.
Internet Service Providers (ISPs)
____ CSPs provide small business with an Internet connection, Web site creation tools, and little or no banner advertising clutter.
Mall-style
The best hosting services provide Web server hardware and software combinations that are ____________________, which means that they can be adapted to meet changing requirements when their clients grow.
scalable
____________________ application systems return pages generated by scripts that include the rules for presenting data on the Web page with the business logic.
Page-based
____________________ provide data feeds between two different companies.
Web services
T/F: The type of electronic commerce software an organization needs depends on several factors, including the expected size of the enterprise and its projected traffic and sales.
True
Application servers are usually grouped into two types: page-based and ____.
component based
____________________ software helps companies control the large amounts of text, graphics, and media files that have become a key part of doing business.
Content management
The goal of ________________________________________ is to understand each customer’s specific needs and then customize a product or service to meet those needs.
customer relationship management (CRM)
Much of the data in Web services applications is stored and transmitted in ____________________ format.
XML
____________________ hosting means that the client’s Web site is on a server that hosts other Web sites simultaneously and is operated by the service provider at its location.
Shared
The ____ is a message passing protocol that defines how to send marked up data from one software application to another across a network.
SOAP
T/F: With dedicated hosting, the service provider makes a Web server available to the client, but the client does not share the server with other clients of the service provider.
True
T/F: A static catalog stores the information about items in a database, usually on a separate computer that is accessible to the server running the Web site itself.
False
T/F: A database manager is software that stores information in a highly structured way.
True
T/F: Large businesses typically spend between $500,000 and $1 million to launch an electronic commerce site.
False
T/F: Enfinity includes support for secure transactions.
True
T/F: Content management software helps companies do four main things: collect and organize information, share the information among users, enhance the ability of users to collaborate, and preserve the knowledge gained through the use of information so that future users can benefit from the learning of current users.
False
____ means that the client's Web site is on a server that hosts other Web sites simultaneously and is operated by the service provider at its location.
Shared hosting
____ is a listing of goods and services.
A catalog
Making a company's information systems work together is called ____ and is an important goal of companies when they install middleware.
interoperability
For businesses that want to sell more than a few items, ____ offers its Pro Merchant program.
Amazon
Buying and using midrange electronic commerce software is significantly more expensive than using a hosted site, with annual costs ranging from $2000 to ____.
$50,000
____ software must obtain data from operations software that conducts activities such as sales automation, customer service center operations, and marketing campaigns.
Customer relationship management
In a(n) ____ service, the service provider rents a physical space to the client to install its own server hardware.
co-location
____ occurs when the shopper proceeds to the virtual checkout counter by clicking a checkout button.
Transaction processing
The actions that the application server software performs are determined by the rules used in the business. These rules are called ____.
business logic
____ can help businesses find customers with common interests and discover previously unknown relationships among the data.
Data mining
The final step of the process of creating an electronic commerce Web site is to create the ____ that will connect the site to the company's existing product and transaction-processing databases.
middleware
____ software helps companies control the large amounts of text, graphics, and media files that have become a key part of doing business.
Content management
T/F: A computer that has experienced a necessity threat slows processing to an intolerably slow speed.
True
A Web server can compromise ____ if it allows automatic directory listings.
secrecy
T/F: Zombie attacks can be traced back to their creators very easily.
False
T/F: Developers use active content because it extends the functionality of HTML and moves some data processing chores from the busy server machine to the user’s client computer.
True
T/F: Message packets on the Internet travel a planned path from a source node to a destination node.
False
T/F:Digital certificates never expire.
False
T/F:JavaScript and VBScript are examples of active content forms.
True
T/F: E-mail secrecy issues address whether company supervisors should be permitted to read employees’ messages randomly.
False
Any act or object that poses a danger to computer assets is known as a(n) ____.
threat
Originally, the term ____ was used to describe a dedicated programmer who enjoyed writing complex code that tested the limits of technology.
hacker
____ encryption encodes a message with one of several available algorithms that use a single numeric key to encode and decode data.
Symmetric
Special software applications called ____ provide the means to record information that passes through a computer or router that is handling Internet traffic.
sniffer programs
T/F: The shorter the session key, the more resistant the encryption is to attack.
False
T/F: A Web browser that has entered into an SSL session indicates that it is in an encrypted session.
True
____ is pretending to be someone you are not or representing a Web site as an original when it is really a fake.
Spoofing
T/F: Absolute security is relatively easy to achieve.
False
____ is the protection of individual rights to nondisclosure.
Privacy
A(n) ____ is a person or device that is able to listen in on and copy Internet transmissions.
eavesdropper
The electronic defacing of an existing Web site page is _____.
Cybervandalism
T/F: Any message traveling on the Internet is subject to secrecy, integrity, and necessity threats.
True
T/F: A cracker is a technologically skilled person who obtains unauthorized entry into computers or network systems.
True
T/F: One way to control threats from active content is to use digital certificates.
True
T/F: Asymmetric encryption encodes a message with one of several available algorithms that use a single numeric key, such as 456839420783, to encode and decode data.
False
T/F: Networks inside a firewall are often called untrusted, whereas networks outside the firewall are called trusted.
False
T/F: Ethical hackers are often hired by companies to test computer security safeguards.
True
____ is the general name for a procedure, either physical or logical, that recognizes, reduces, or eliminates a threat.
Countermeasure
A(n) ____ is a program hidden inside another program or Web page that masks its true purpose.
Trojan horse
The purpose of a(n) ____ is to disrupt normal computer processing, or deny processing entirely.
necessity threat
A(n) ____ is an area of memory set aside to hold data read from a file or database.
buffer
The field of ____ is responsible for the collection, preservation, and analysis of computer-related evidence.
computer forensics
A(n) ____ is a person or device that can listen in on and copy Internet transmissions.
eavesdropper
____ is a scripting language developed by Netscape to enable Web page designers to build active content.
JavaScript
The science that studies encryption is called ____.
cryptography
A(n) ____ is software or a hardware–software combination that is installed in a network to control the packet traffic moving through it.
firewall
The SANS Institute has played a role in the creation of the ____, a Web site that provides current information on the location and intensity of computer attacks throughout the world.
Internet Storm Center
T/F:Estimates of the cost of billing one person by mail range between $1 and $1.50.
True
T/F: Closed loop systems involve three or more parties.
False
T/F: Money laundering is a technique used by criminals to convert money that they have obtained illegally into cash that they can spend without having it identified as the proceeds of an illegal activity.
True
T/F: An advantage of client-side wallets is that they are portable.
False
T/F: Most magnetic strip cards hold value that can be recharged by inserting them into the appropriate machines, inserting currency into the machine, and withdrawing the card; the card's strip stores the increased cash value.
True
T/F: The basic structure of a phishing attack is fairly simple.
True
Scrip is digital cash minted by a company instead of by a(n) ____.
government
Whenever a third party, such as an intermediary bank processes a transaction, the system is called a(n) ____.
open loop system
Internet payments for items costing from a few cents to approximately a dollar are called ____.
micropayments
A(n) ____ stores a consumer's information on his or her own computer.
client-side electronic wallet
Which of the following statements is true about smart cards?
Smart cards have been in use for more than a decade.
Today, the largest dollar volume of payments are made using ____.
paper checks
____ is like a gift certificate that is good at more than one store.
scrip
When a cardholder successfully contests a charge, the merchant bank must retrieve the money it placed in the merchant account in a process called a(n) ____.
chargeback
____ is spending a particular piece of electronic cash twice by submitting the same electronic currency to two different vendors.
Double-spending
Formerly called Passport or Microsoft .NET Passport, ____ is a single sign-in service that includes a server-side electronic wallet operated by Microsoft.
MicrosoftWindows Live ID
A(n) ____ can be an elaborate smart card with a microchip or a plastic card with a magnetic strip that records the currency balance.
stored-value card
____ is the term used to describe the delay that occurs between the time that a person writes a check and the time that check clears the person's bank.
Float
Common ____________________ cards include prepaid phone, copy, subway, and bus cards.
stored-value
A(n) ____________________ card can store about 100 times the amount of information that a magnetic strip plastic card can store.
smart
T/F: A debit card removes the amount of the sale from the cardholder's bank account and transfers it to the seller's bank account.
True
With a(n) ____________________ card, credit theft is much more difficult because the key to unlock the encrypted information is a PIN.
smart
____________________ can be accomplished by purchasing goods or services with ill-gotten electronic cash.
Money laundering
A(n) ____ bank is a bank that does business with sellers that want to accept payment cards.
merchant
T/F: The threat of detection and prosecution is the main deterrent to double spending.
True
____________________ is a server-side electronic wallet offered by the Web portal site Yahoo!
Yahoo! Wallet
ACH is short for ____.
Automated Clearing House
T/F: The additional cost of using electronic cash is nearly zero.
True
T/F: American Express and Discover card are examples of open loop systems.
False
A(n) ____________________, serving a function similar to a physical wallet, holds credit card numbers, electronic cash, owner identification, and other owner contact information.
electronic wallet
U.S. laws define organized crime, also called ____________________, as unlawful activities conducted by a highly organized, disciplined association for profit.
racketeering
T/F: Double-spending can neither be detected nor prevented with truly anonymous electronic cash.
True
Microsoft Windows ____________________ (formerly called Passport or Microsoft .NET Passport) is a single sign-in service that includes a server-side electronic wallet operated by Microsoft.
Live ID
_________________________ has its own NetCoin electronic cash system and offers electronic cash through its NetCoin Center.
KCOM (KDD Communications)
T/F: Many stores that accept credit cards require a minimum purchase amount of $50.
False
A(n) ____ electronic wallet stores a consumer's information on the his/her own computer.
client-side
Businesspeople often use the term ____________________ as a general term to describe all types of plastic cards that consumers use to make purchases.
payment card
T/F: PayFlow is an online payment system developed by IBM that is now operated by VeriSign.
False