BinderANSWERS 2.pdf - E-commerce 2013 9e(Laudon\/Traver Exam 2 Chapters 4 5 ANSWERS Question 1 1 1 pts What are the two most important management

BinderANSWERS 2.pdf - E-commerce 2013 9e(Laudon/Traver...

  • shamilton656
  • 1287
  • 63% (8) 5 out of 8 people found this document helpful

This preview shows page 1 out of 1287 pages.

You've reached the end of your free preview.

Want to read all 1287 pages?

Unformatted text preview: E-commerce 2013, 9e (Laudon/Traver) Exam 2 - Chapters 4 & 5 ANSWERS Question 1 1 / 1 pts What are the two most important management challenges in building a successful e-commerce presence? identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site building a team with the right skill sets and closely managing the development process developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives having an accurate understanding of your business environment and an achievable business plan Question 2 1 / 1 pts Which of the following basic system functionalities is used to display goods on a Web site? digital catalog product database shopping cart system customer database system Question 3 1 / 1 pts A system design has two main components: a logical design and a physical design. front-end systems and back-end systems. business objectives and technology requirements. a behavioral design and a technological design. Question 4 1 / 1 pts Which of the following helps you understand the marketing effectiveness of your e-commerce site? product database site tracking and reporting system inventory management system shopping cart Question 5 1 / 1 pts All of the following are basic information requirements for a product database except: product descriptions. inventory levels. customer ID numbers. stock numbers. Question 6 1 / 1 pts Which of the following typically includes a data flow diagram to describe the flow of information for a Web site? testing plan physical design co-location plan logical design Question 7 1 / 1 pts Which of the following details the actual hardware components to be used in a system? architecture plan logical design physical design system functionalities plan Question 8 1 / 1 pts Most of the time required to maintain an e-commerce site is spent on: debugging code. responding to emergency situations. general administration and making changes and enhancements to the system. changes in reports, data files, and links to backend databases. Question 9 1 / 1 pts An e-commerce site that cost $25,000 to develop is likely to require a yearly maintenance budget of approximately: $25,000. $5,000. $10,000. $50,000. Question 10 1 / 1 pts All of the following are simple steps for optimizing Web page content that can reduce response times except: avoiding unnecessary links to other pages on the site. reducing unnecessary HTML comments. segmenting computer servers to perform dedicated functions. using more efficient graphics. Question 11 1 / 1 pts All of the following can enhance page delivery speed except: using edge caching services. increasing the dynamic content on the pages. using specialized content delivery networks. increasing local bandwidth. Question 12 1 / 1 pts All of the following might be part of a Web site's backend layer except: a human resources system. a production MRP system. a pre-existing corporate database. an application server. Question 13 1 / 1 pts All of the following might be part of a Web site's middle-tier layer except: legacy corporate applications. an ad server. a mail server. a database server. Question 14 1 / 1 pts The leading Web server software is: Google Enterprise Server. Apache. Linux. Microsoft Internet Information Server. Question 15 1 / 1 pts All of the following are basic functionality provided by Web servers except: security services. a shopping cart. data capture tools. site management tools. Question 16 1 / 1 pts The systems development life cycle methodology is useful when creating an e-commerce Web site. True False Question 17 1 / 1 pts One of the most important challenges in developing an e-commerce presence is understanding that the technology must drive the business. True False Question 18 1 / 1 pts Using prebuilt templates is typically one of the most cost-effective choices when building a Web site. True False Question 19 1 / 1 pts The annual maintenance cost for a Web site is likely to be as high as its development cost. True False Question 20 1 / 1 pts In a two-tier architecture, a Web server is linked to one middle-tier layer that typically includes a series of application servers, as well as to another back-end layer. True False Question 21 1 / 1 pts Apache HTTP Web server software is based on Microsoft's Windows operating system. True False Question 22 1 / 1 pts The Web server software used does not significantly impact how a Web site's Web pages look on users' computers. True False Question 23 1 / 1 pts Prior to the development of e-commerce, Web sites primarily delivered static content. True False Question 24 1 / 1 pts Dynamic page generation makes market segmentation easier. True False Question 25 1 / 1 pts A list server is an application server used to provide a database for product descriptions and prices. True False Question 26 1 / 1 pts All of the following are factors in contributing to the increase in cybercrime except: the ability to anonymously access the Internet. the Internet's similarity to telephone networks. the ability to remotely access the Internet. the Internet is an open, vulnerable design. Question 27 1 / 1 pts The Computer Security Institute reported in its 2011 survey that approximately ________ percent of responding organizations experienced a computer security incident within the previous 12 months. 25 75 45 95 Question 28 1 / 1 pts The overall rate of online credit card fraud is ________ percent of all online card transactions. around 1 less than 1 around 5 around 10 Question 29 1 / 1 pts According to the Computer Security Institute's 2011 Computer Crime and Security Survey, which of the following was the most commonly reported type of attack? Web site defacement malware infection insider abuse laptop theft Question 30 1 / 1 pts The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and: viability. confidentiality. usability. functionality. Question 31 1 / 1 pts ________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. Nonrepudiation Integrity Availability Authenticity Question 32 1 / 1 pts Which of the following is an example of an integrity violation of e-commerce security? A merchant uses customer information in a manner not intended by the customer. A Web site is not actually operated by the entity the customer believes it to be. An unauthorized person intercepts an online communication and changes its contents. A customer denies that he or she is the person who placed the order. Question 33 1 / 1 pts An example of a privacy violation of e-commerce security is: your e-mail being altered by a hacker. your computer being used as part of a botnet. your online purchasing history being sold to other merchants without your consent. your e-mail being read by a hacker. Question 34 1 / 1 pts ________ refers to the ability to ensure that messages and data are only available to those authorized to view them. Privacy Integrity Availability Confidentiality Question 35 1 / 1 pts Which of the following is not a key point of vulnerability when dealing with e-commerce? the credit card companies the client computer the communications pipeline the server Question 36 1 / 1 pts All of the following were computer crimes committed in 2011-2012 except: A Stuxnet worm wiped computers in the Iranian Oil Ministry clean. 77 million user credit card numbers stolen from Sony's PlayStation gameserver. Russian hackers posting over 6 million Facebook usernames and passwords online. Melissa worm spreads through Microsoft Word templates. Question 37 1 / 1 pts Which of the following is a prominent hacktivist group? Symantec Anti-Phishing Working Group IC3 Anonymous Question 38 1 / 1 pts Most of the world's spam is delivered via which of the following? viruses Trojan horses worms botnets Question 39 1 / 1 pts Botnets are typically used for all of the following except: stealing information from computers. phishing attacks. storing network traffic for analysis. DDoS attacks. Question 40 1 / 1 pts Software that is used to obtain private user information such as a user's keystrokes or copies of email is referred to as: spyware. pupware. a backdoor. adware. Question 41 1 / 1 pts Typically, the more security measures added to a Web site, the slower and more difficult it becomes to use. True False Question 42 1 / 1 pts A worm does not need to be activated by a user in order for it to replicate itself. True False Question 43 1 / 1 pts A Trojan horse appears to be benign, but then does something other than expected. True False Question 44 1 / 1 pts Phishing attacks rely on browser parasites. True False Question 45 1 / 1 pts Insiders present a greater security threat to e-commerce sites than outsiders. True False Question 46 1 / 1 pts The use of a digital signature helps to ensure integrity, authenticity, and nonrepudiation. True False Question 47 1 / 1 pts Drive-by downloads are now the most common method of infecting computers. True False Question 48 1 / 1 pts Smishing attacks exploit SMS messages. True False Question 49 1 / 1 pts TLS does not guarantee server-side authentication. True False Question 50 1 / 1 pts The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software. True False Quiz Score: 50 out of 50 Submission Details: Time: 31 minutes Current Score: 50 out of 50 Kept Score: 50 out o Question 1 1 / 1 pts Which of the following activities is the one engaged in by the highest percentage of online users? using a social networking site researching products and services using e-mail reading news Question 2 1 / 1 pts Which of the following age groups had the lowest percentage of Internet access in 2012? 30-49 65+ 50-64 18-29 Question 3 1 / 1 pts Studies of the effects of social "connectedness" on Internet purchases indicate that the more "connected" an individual: the less that individual is influenced by friends' purchases. the less purchasing that individual does. the more purchasing that individual does. the more that individual shares purchasing decisions with friends. Question 4 1 / 1 pts Approximately ________ in annual offline retail sales is influenced by online browsing. $120 million $102 billion $1.2 trillion $12 million Question 5 1 / 1 pts Which of the following is not a social marketing technique? video marketing app marketing Pinterest marketing game marketing Question 6 1 / 1 pts All of the following are traditional online marketing tools except: sponsorship marketing. social marketing. permission marketing. affiliate marketing. Question 7 1 / 1 pts The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time. flash marketing bait-and-switch yield management search engine marketing Question 8 1 / 1 pts Permission marketing: allows Web site users to "turn off" display ads. is required now by federal law via "opt-in" regulations. is a component of e-mail marketing. is a method of pre-approved marketing to juveniles. Question 9 1 / 1 pts All of the following are attributes of personalized marketing except: targeting of individuals. use of mass media. unique price. suitable for highly complex products. Question 10 1 / 1 pts Creating multiple variations of information goods and selling these to different market segments at different prices is called: versioning. bundling. dynamic pricing. customization. Question 12 1 / 1 pts Specialized marketing firms called ________ sell ad opportunities from a range of participating sites that receive payment for displaying ads. Question 13 1 / 1 pts In the United States today, single, white, young college-educated males with high income dominate the Internet in terms of percentage of Internet usage. True False Question 14 1 / 1 pts Price is the top factor in online purchase decisions. True False Question 15 1 / 1 pts Research shows that the two most important factors shaping the decision to purchase online are utility and trust. True False Question 16 1 / 1 pts Evidence suggests that real-time customer chat increases sales. True False Question 17 1 / 1 pts Cookies, when combined with Web beacons, can be used to create cross-site profiles. True False Question 18 1 / 1 pts The marginal cost of the production of information goods distributed over the Internet is zero or near zero. True False Question 19 1 / 1 pts Bundling is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices. True False What are the two most important management challenges in building a successful e-commerce presence? identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site building a team with the right skill sets and closely managing the development process developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives having an accurate understanding of your business environment and an achievable business plan Question 2 1 / 1 pts Which of the following basic system functionalities is used to display goods on a Web site? digital catalog product database shopping cart system customer database system Question 3 1 / 1 pts A system design has two main components: a logical design and a physical design. front-end systems and back-end systems. business objectives and technology requirements. a behavioral design and a technological design. Question 4 1 / 1 pts Which of the following helps you understand the marketing effectiveness of your e-commerce site? product database site tracking and reporting system inventory management system shopping cart Question 5 1 / 1 pts All of the following are basic information requirements for a product database except: product descriptions. inventory levels. customer ID numbers. stock numbers. Question 6 1 / 1 pts Which of the following typically includes a data flow diagram to describe the flow of information for a Web site? testing plan physical design co-location plan logical design Question 7 1 / 1 pts Which of the following details the actual hardware components to be used in a system? architecture plan logical design physical design system functionalities plan Question 8 1 / 1 pts Most of the time required to maintain an e-commerce site is spent on: debugging code. responding to emergency situations. general administration and making changes and enhancements to the system. changes in reports, data files, and links to backend databases. Question 9 1 / 1 pts An e-commerce site that cost $25,000 to develop is likely to require a yearly maintenance budget of approximately: $25,000. $5,000. $10,000. $50,000. Question 10 1 / 1 pts All of the following are simple steps for optimizing Web page content that can reduce response times except: avoiding unnecessary links to other pages on the site. reducing unnecessary HTML comments. segmenting computer servers to perform dedicated functions. using more efficient graphics. Question 11 1 / 1 pts All of the following can enhance page delivery speed except: using edge caching services. increasing the dynamic content on the pages. using specialized content delivery networks. increasing local bandwidth. Question 12 1 / 1 pts All of the following might be part of a Web site's backend layer except: a human resources system. a production MRP system. a pre-existing corporate database. an application server. Question 13 1 / 1 pts All of the following might be part of a Web site's middle-tier layer except: legacy corporate applications. an ad server. a mail server. a database server. Question 14 1 / 1 pts The leading Web server software is: Google Enterprise Server. Apache. Linux. Microsoft Internet Information Server. Question 15 1 / 1 pts All of the following are basic functionality provided by Web servers except: security services. a shopping cart. data capture tools. site management tools. Question 16 1 / 1 pts The systems development life cycle methodology is useful when creating an e-commerce Web site. True False Question 17 1 / 1 pts One of the most important challenges in developing an e-commerce presence is understanding that the technology must drive the business. True False Question 18 1 / 1 pts Using prebuilt templates is typically one of the most cost-effective choices when building a Web site. True False Question 19 1 / 1 pts The annual maintenance cost for a Web site is likely to be as high as its development cost. True False Question 20 1 / 1 pts In a two-tier architecture, a Web server is linked to one middle-tier layer that typically includes a series of application servers, as well as to another back-end layer. True False Question 21 1 / 1 pts Apache HTTP Web server software is based on Microsoft's Windows operating system. True False Question 22 1 / 1 pts The Web server software used does not significantly impact how a Web site's Web pages look on users' computers. True False Question 23 1 / 1 pts Prior to the development of e-commerce, Web sites primarily delivered static content. True False Question 24 1 / 1 pts Dynamic page generation makes market segmentation easier. True False Question 25 1 / 1 pts A list server is an application server used to provide a database for product descriptions and prices. True False Question 26 1 / 1 pts All of the following are factors in contributing to the increase in cybercrime except: the ability to anonymously access the Internet. the Internet's similarity to telephone networks. the ability to remotely access the Internet. the Internet is an open, vulnerable design. Question 27 1 / 1 pts The Computer Security Institute reported in its 2011 survey that approximately ________ percent of responding organizations experienced a computer security incident within the previous 12 months. 25 75 45 95 Question 28 1 / 1 pts The overall rate of online credit card fraud is ________ percent of all online card transactions. around 1 less than 1 around 5 around 10 Question 29 1 / 1 pts According to the Computer Security Institute's 2011 Computer Crime and Security Survey, which of the following was the most commonly reported type of attack? Web site defacement malware infection insider abuse laptop theft Question 30 1 / 1 pts The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and: viability. confidentiality. usability. functionality. Question 31 1 / 1 pts ________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. Nonrepudiation Integrity Availability Authenticity Question 32 1 / 1 pts Which of the following is an example of an integrity violation of e-commerce security? A merchant uses customer information in a manner not intended by the customer. A Web site is not actually operated by the entity the customer believes it to be. An unauthorized person intercepts an online communication and changes its contents. A customer denies that he or she is the person who placed the order. Question 33 1 / 1 pts An example of a privacy violation of e-commerce security is: your e-mail being altered by a hacker. your computer being used as part of a botnet. your online purchasing history being sold to other merchants without your consent. your e-mail being read by a hacker. Question 34 1 / 1 pts ________ refers to the ability to ensure that messages and data are only available to those authorized to view them. Privacy Integrity Availability Confidentiality Question 35 1 / 1 pts Which of the following is not a key point of vulnerability when dealing with e-commerce? the credit card companies the client computer the communications pipeline the server Question 36 1 / 1 pts All of the following were computer crimes committed in 2011-2012 except: A Stuxnet worm wiped computers in the Ira...
View Full Document

  • Fall '08
  • Salah
  • Business, Management

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes