Business Management > QUESTIONS & ANSWERS > E-commerce Questions and Answers, Download Now to Score A+!!! (All)

E-commerce Questions and Answers, Download Now to Score A+!!!

Document Content and Description Below

Question 1 1 / 1 pts What are the two most important management challenges in building a successful e-commerce presence? identifying the key components of your business plan and selecting the righ... t software, hardware, and infrastructure for your site building a team with the right skill sets and closely managing the development process developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives having an accurate understanding of your business environment and an achievable business plan Question 2 1 / 1 pts Which of the following basic system functionalities is used to display goods on a Web site? digital catalog product database shopping cart system customer database system Question 3 1 / 1 pts A system design has two main components: a logical design and a physical design. front-end systems and back-end systems. business objectives and technology requirements. a behavioral design and a technological design. Question 4 1 / 1 pts Which of the following helps you understand the marketing effectiveness of your e-commerce site? product database site tracking and reporting system inventory management system shopping cart Question 5 1 / 1 pts All of the following are basic information requirements for a product database except: product descriptions. inventory levels. customer ID numbers. stock numbers. Question 6 1 / 1 pts Which of the following typically includes a data flow diagram to describe the flow of information for a Web site? testing plan physical design co-location plan logical design Question 7 1 / 1 pts Which of the following details the actual hardware components to be used in a system? architecture plan logical design physical design system functionalities plan Question 8 1 / 1 pts Most of the time required to maintain an e-commerce site is spent on: debugging code. responding to emergency situations. general administration and making changes and enhancements to the system. changes in reports, data files, and links to backend databases. Question 9 1 / 1 pts An e-commerce site that cost $25,000 to develop is likely to require a yearly maintenance budget of approximately: $25,000. $5,000. $10,000. $50,000. Question 10 1 / 1 pts All of the following are simple steps for optimizing Web page content that can reduce response times except: avoiding unnecessary links to other pages on the site. reducing unnecessary HTML comments. segmenting computer servers to perform dedicated functions. using more efficient graphics. Question 11 1 / 1 pts All of the following can enhance page delivery speed except: using edge caching services. increasing the dynamic content on the pages. using specialized content delivery networks. increasing local bandwidth. Question 12 1 / 1 pts All of the following might be part of a Web site's backend layer except: a human resources system. a production MRP system. a pre-existing corporate database. an application server. Question 13 1 / 1 pts All of the following might be part of a Web site's middle-tier layer except: legacy corporate applications. an ad server. a mail server. a database server. Question 14 1 / 1 pts The leading Web server software is: Google Enterprise Server. Apache. Linux. Microsoft Internet Information Server. Question 15 1 / 1 pts All of the following are basic functionality provided by Web servers except: security services. a shopping cart. data capture tools. site management tools. Question 16 1 / 1 pts The systems development life cycle methodology is useful when creating an e-commerce Web site. True False Question 17 1 / 1 pts One of the most important challenges in developing an e-commerce presence is understanding that the technology must drive the business. True False Question 18 1 / 1 pts Using prebuilt templates is typically one of the most cost-effective choices when building a Web site. True False Question 19 1 / 1 pts The annual maintenance cost for a Web site is likely to be as high as its development cost. True False Question 20 1 / 1 pts In a two-tier architecture, a Web server is linked to one middle-tier layer that typically includes a series of application servers, as well as to another back-end layer. True False Question 21 1 / 1 pts Apache HTTP Web server software is based on Microsoft's Windows operating system. True False Question 22 1 / 1 pts The Web server software used does not significantly impact how a Web site's Web pages look on users' computers. True False Question 23 1 / 1 pts Prior to the development of e-commerce, Web sites primarily delivered static content. True False Question 24 1 / 1 pts Dynamic page generation makes market segmentation easier. True False Question 25 1 / 1 pts A list server is an application server used to provide a database for product descriptions and prices. True False Question 26 1 / 1 pts All of the following are factors in contributing to the increase in cybercrime except: the ability to anonymously access the Internet. the Internet's similarity to telephone networks. the ability to remotely access the Internet. the Internet is an open, vulnerable design. Question 27 1 / 1 pts The Computer Security Institute reported in its 2011 survey that approximately ________ percent of responding organizations experienced a computer security incident within the previous 12 months. 25 75 45 95 Question 28 1 / 1 pts The overall rate of online credit card fraud is ________ percent of all online card transactions. around 1 less than 1 around 5 around 10 Question 29 1 / 1 pts According to the Computer Security Institute's 2011 Computer Crime and Security Survey, which of the following was the most commonly reported type of attack? Web site defacement malware infection insider abuse laptop theft Question 30 1 / 1 pts The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and: viability. confidentiality. usability. functionality. Question 31 1 / 1 pts ________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. Nonrepudiation Integrity Availability Authenticity Question 32 1 / 1 pts Which of the following is an example of an integrity violation of e-commerce security? A merchant uses customer information in a manner not intended by the customer. A Web site is not actually operated by the entity the customer believes it to be. An unauthorized person intercepts an online communication and changes its contents. A customer denies that he or she is the person who placed the order. Question 33 1 / 1 pts An example of a privacy violation of e-commerce security is: your e-mail being altered by a hacker. your computer being used as part of a botnet. your online purchasing history being sold to other merchants without your consent. your e-mail being read by a hacker. Question 34 1 / 1 pts ________ refers to the ability to ensure that messages and data are only available to those authorized to view them. Privacy Integrity Availability Confidentiality Question 35 1 / 1 pts Which of the following is not a key point of vulnerability when dealing with e-commerce? the credit card companies the client computer the communications pipeline the server Question 36 1 / 1 pts All of the following were computer crimes committed in 2011-2012 except: A Stuxnet worm wiped computers in the Iranian Oil Ministry clean. 77 million user credit card numbers stolen from Sony's PlayStation gameserver. Russian hackers posting over 6 million Facebook usernames and passwords online. Melissa worm spreads through Microsoft Word templates. Question 37 1 / 1 pts Which of the following is a prominent hacktivist group? Symantec Anti-Phishing Working Group IC3 Anonymous Question 38 1 / 1 pts Most of the world's spam is delivered via which of the following? viruses Trojan horses worms botnets Question 39 1 / 1 pts Botnets are typically used for all of the following except: stealing information from computers. phishing attacks. storing network traffic for analysis. DDoS attacks. Question 40 1 / 1 pts Software that is used to obtain private user information such as a user's keystrokes or copies of email is referred to as: spyware. pupware. a backdoor. adware. Question 41 1 / 1 pts Typically, the more security measures added to a Web site, the slower and more difficult it becomes to use. True False Question 42 1 / 1 pts A worm does not need to be activated by a user in order for it to replicate itself. True False Question 43 1 / 1 pts A Trojan horse appears to be benign, but then does something other than expected. True False [Show More]

Last updated: 2 years ago

Preview 1 out of 14 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$8.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

108
0

Document information


Connected school, study & course


About the document


Uploaded On

Jul 23, 2021

Number of pages

14

Written in

Seller


seller-icon
Nutmegs

Member since 4 years

614 Documents Sold

Reviews Received
77
14
8
2
21
Additional information

This document has been written for:

Uploaded

Jul 23, 2021

Downloads

 0

Views

 108

Document Keyword Tags


$8.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·