C A Tú

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 62

Của Tú: 10/10

1)

2)

3)

4)
5)

6)
To allow lower-level employees access to the corporate network while preventing them
from accessing private human resources documents, you would use:
A) access controls.
B) an authorization management system.
C) security tokens.
D) an authorization policy
7)

8)

9)

D. market creator
10)
11)

12)

13)
14)

15)
16)

17)
18)

19)

20)
Của Bảo: 8.5/10 (kiểm tra lại đáp án)
Của Nghi:
1. Which of the following was not able to successfully implement a freemium business model?

Select one:
a. Ning
b. Pandora
c. Dropbox
d. LinkedIn

2. Which of the following technologies has enabled the Internet to grow exponentially to
support millions of users, without overloading the network architecture?

Select one:
a. Wi-Fi
b. client/server computing
c. fiber optics
d. IPv6

3. The merger of media enterprises into powerful, synergistic combinations that can cross-
market content on many different platforms is referred to as:
Select one:
a. repackaging.
b. aggregation.
c. media transformation.
d. industry convergence.

4. What is the primary revenue model for an e-distributor?

Select one:
a. sales
b. advertising
c. subscription
d. transaction fee

5. All of the following are methods of securing channels of communication except:

Select one:
a. FTP.
b. SSL/TLS.
c. VPN.
d. certificates.

6. All of the following can be considered a precursor to e-commerce except:

Select one:
a. the French Minitel.
b. the development of the smartphone.
c. Baxter Healthcare's PC-based remote order entry system.
d. the development of Electronic Data Interchange standards.

7. A business model that uses advertising revenue to provide some content for free, combined
with an option to obtain additional content for a price is called a(n) ________ model.

Select one:
a. distribution
b. freemium
c. sales
d. a la carte

8. E-commerce is available just about everywhere and anytime. This is known as ________.

Select one:
a. ubiquity
b. information density
c. reach
d. richness
9. A metered subscription model is most similar to which of the following revenue models?

Select one:
a. affiliate
b. advertising
c. freemium
d. transaction fee

10. Which of the following protects original forms of expression in a tangible medium?

Select one:
a. trademark law
b. copyright law
c. trade secret law
d. patent law

11. Slammer is an example of which of the following?

Select one:
a. botnet
b. virus
c. Trojan horse
d. worm

12. Which of the following terms can be considered synonymous with the term e-commerce?

Select one:
a. the Internet
b. the Web
c. e-business
d. digital commerce
13. Which of the following may offer its customers value chain management software?

Select one:
a. exchanges
b. community providers
c. e-procurement companies
d. e-distributors

14. Which of the following e-commerce technology dimensions creates greater opportunities for
cyberbullying?

Select one:
a. information density
b. ubiquity
c. interactivity
d. social technology

15. Momo, Zalo-pay, Grab-pay... are examples of:

Select one:
a. digital cash.
b. e-wallet.
c. virtual currency.
d. peer-to-peer payment systems.

16. Which of the following is not a community provider?

Select one:
a. Pinterest
b. Priceline
c. LinkedIn
d. Facebook

17. Which of the following protocols is used to send mail to a server?

Select one:
a. SSL
b. FTP
c. HTTP
d. IMAP

18. How long does copyright protection extend for corporate-owned works?

Select one:
a. 50 years
b. 75 years
c. 95 years
d. 25 years

19. All of the following are limitations of the existing online credit card payment system except:

Select one:
a. social equity.
b. cost to consumers.
c. cost to merchants.
d. poor security.

2)Which of the following is not a variation of the e-tailer business model?

Select one:
a. market creator
b. virtual merchant
c. bricks-and-clicks
d. manufacturer-direct

A(n) _______ is a Web application that allows users to easily add and edit content on a Web
page.

Select one:

a. RSS feed

b. wiki

c. podcast

d. blog

An IPv4 address is expressed as a:

Select one:

a. 32-bit number that appears as a series of four separate numbers separated by periods.

b. 32-bit number that appears as a series of four separate numbers separated by semicolons.

c. 64-bit number that appears as a series of four separate numbers separated by semicolons.

d. 64-bit number that appears as a series of four separate numbers separated by periods.

Which of the following e-commerce technology dimensions creates greater opportunities for
cyberbullying?

Select one:

a. interactivity

b. social technology

c. ubiquity

d. information density

Which of the following is an example of an on-demand service company?

Select one:
a. YouTube

b. Airbnb

c. Facebook

d. Tumblr

Which of the following technologies are being developed to support e business and e-
commerce?

Select one:

a. Virtual Reality technology (AR)

b. Mobile broadband technology

c. All…

Which of the following statements about the television and premium video industry is not true?

Select one:

a. Americans spend more time watching television on a computer or mobile device than they do
on a traditional television set.

b. The television industry is the major source of premium video on the Internet.

c. Apple's iTunes store is the leading distributor of streaming video.

Od. Over-the-top entertainment services are a threat to cable television distributors.

Which of the following is not a variation of the e-tailer business model?

Select one:

a. market creator

Ob. virtual merchant

c. bricks-and-clicks

Od. manufacturer-direct
Which of the following gives a business model the most credibility with outside investors?

Select one:

a. the firm's market strategy

b. the firm's value proposition

c. the firm's market opportunity

d. the firm's management team

A business model that uses advertising revenue to provide some content for free, combined
with an option to obtain additional content for a price is called a(n) _______ model.

Select one:

a. sales

Ob. distribution

c. a la carte

d. freemium

A(n) _______ is a Web application that allows users to easily add and edit content on a Web
page.

Select one:

a. RSS feed

b. wiki

c. podcast

In general, the key to becoming a successful content provider is to:

Select one:

a. own the technology by which content is created, presented, and distributed.

b. provide online content for free.

c. own the content being provided.


d. provide other services as well as online content.

In which year can e-commerce be said to have begun?

Select one:

a. 2001

b. 1985

c. 1983

d. 1995

_______ refers to the ability to identify the person or entity with whom you are dealing on the
Internet.

Select one:

a. Availability

b. Nonrepudiation

c. Authenticity

Which of the following statements about the Web is not true?

Select one:

a. The Web is the technology upon which the Internet is based.

b. The Web provides access to pages written in HyperText Markup Language.

c. The Web was the original "killer app."

d. The Web is both a communications infrastructure and an information storage system.

_______ and _______ are typically the most easily identifiable aspects of a company's business
model.

Select one:

a. Revenue model; market strategy

b. Market strategy; market opportunity


c. Value proposition; revenue model

d. Value proposition; competitive environment

To allow lower-level employees access to the corporate network while preventing them from
accessing private human resources documents, you would use:

Select one:

a. security tokens.

b. an authorization policy.

Which of the following technologies are being developed to support e business and e-
commerce?

Select one:

a. Virtual Reality technology (AR)

b. Mobile broadband technology

c. All...

d. Electronic payment technology

E-commerce can be defined as:

Select one:

a. the use of any Internet technologies in a firm's daily activities.

b. any digitally enabled transactions among individuals and organizations.

c. the digital enablement of transactions and processes within an organization.

d. the use of the Internet, the Web, and mobile apps to transact business.

Which of the following statements is not true?

Select one:

a. Apple's Touch ID stores a user's actual fingerprint.


b. Biometric devices reduce the opportunity for spoofing

c. A retina scan is an example of a biometric device.

d. Biometric data stored on an iPhone is encrypted.

PayPal is an example of what type of payment system?

Select one:

a. digital credit card system

b. online stored value payment system

c. digital checking system

d. accumulating balance system

Accessing data without authorization on Dropbox is an example of which of the following?

Select one:

a. social network security issue

b. sniffing

c. mobile platform security issue

d. cloud security issue

In the ______ business model, a Web-based business builds a digital environment in which
buyers and sellers can meet, display products, search for products, and establish prices.

Select one:

a. portal

b. e-tailer

c. community provider

Của Khánh Văn: 8.5/10 (kiểm tra lại đáp án)

1.
2)

3)
4)

5)
6)

7)

8)
9)

10)

11)

12)
13)

14)

15)
16)

17)
18)

Của các bạn bên dưới:


Which of the following is a set of rules for transferring data?
Select one:
a. packet
b. router
c. protocol
d. IP address

________ refers to the ability to ensure that messages and data are only available to those
authorized to view them.
Select one:
a. Integrity
b. Confidentiality
c. Availability
d. Privacy

Which of the following statements about the Web is not true?


Select one:
a. The Web is both a communications infrastructure and an information storage system.
b. The Web is the technology upon which the Internet is based.
c. The Web provides access to pages written in HyperText Markup Language.
d. The Web was the original "killer app."

What is the primary revenue model for an e-distributor?


Select one:
a. transaction fee
b. advertising
c. subscription
d. Sales

All of the following may lead to a competitive advantage except:


Select one:
a. better employees.
b. superior products.
c. fewer products.
d. less expensive suppliers.
The use by a company of its competitive advantage to achieve more advantage in surrounding
markets is known as ________.
Select one:
a. market strategy
b. differentiation
c. leverage
d. Focus

All of the following can be considered a direct or indirect competitor of Amazon except:
Select one:
a. Walmart.
b. Starbucks.
c. Apple's iTunes Store.
d. EBay.

Downloading music tracks owned by record companies without paying for them is an example
of a violation of:
Select one:
a. patent law.
b. copyright law.
c. privacy law.
d. trademark law.

Linden Dollars, created for use in Second Life, are an example of:
Select one:
a. EBPP.
b. digital cash.
c. peer-to-peer payment systems.
d. virtual currency.

Which of the following is the largest producer of revenues in the entertainment industry?
Select one:
a. radio
b. television
c. video games
d. films

Which of the following was the original purpose of the Internet?


Select one:
a. to provide a network that would allow businesses to connect with consumers
b. to link large mainframe computers on different college campuses
c. to enable government agencies to track civilian communications
d. to develop a military communications systems that could withstand nuclear war

Which of the following is not a basic type of cloud computing service?


Select one:
a. FiOS
b. SaaS
c. IaaS
d. PaaS

Which of the following is not one of the basic technological foundations of the Internet?
Select one:
a. client/server computing
b. TCP/IP
c. packet switching
d. FTP

All of the following can be considered a direct or indirect competitor of Amazon except:
Select one:
a. Walmart.
b. eBay.
c. Apple's iTunes Store.
d. Starbucks.

Which element of the business model addresses what a firm provides that other firms do not
and cannot?
Select one:
a. revenue model
b. competitive advantage
c. market strategy
d. value proposition

Which ethical principle states that, when confronted with an ethical dilemma, individuals should
take the action that achieves the greater value for all of society?
Select one:
a. the Golden Rule
b. the Social Contract rule
c. the Collective Utilitarian principle
d. Risk Aversion

Which of the following is not one of the top three players in e-book publishing?
Select one:
a. Apple
b. Amazon
c. Google
d. Barnes & Noble

Over the past five years, book publishing revenues have:


Select one:
a. increased steadily.
b. decreased sharply.
c. decreased slightly.
d. remained stable.

Which of the following statements is not true?


Select one:
a. Biometric data stored on an iPhone is encrypted.
b. Biometric devices reduce the opportunity for spoofing.
c. A retina scan is an example of a biometric device.
d. Apple's Touch ID stores a user's actual fingerprint.

Which of the following may offer its customers value chain management software?
Select one:
a. community providers
b. e-distributors
c. exchanges
d. e-procurement companies

Organizations that typically provide an array of services to start-up companies along with a
small amount of funding are referred to as:
Select one:
a. angel investors.
b. venture capital investors.
c. crowdfunders.
d. incubators.

Confidentiality is sometimes confused with:


Select one:
a. privacy.
b. integrity.
c. authenticity.
d. nonrepudiation.

Question 1
All of the following can be considered a direct or indirect competitor of Amazon except:
Select one:
a. Walmart.
b. eBay.
c. Apple's iTunes Store.
d. Starbucks.
Question 2
Which element of the business model addresses what a firm provides that other firms do not
and cannot?
Select one:
a. revenue model
b. competitive advantage
c. market strategy
d. value proposition
Question 3
Which ethical principle states that, when confronted with an ethical dilemma, individuals should
take the action that achieves the greater value for all of society?
Select one:
a. the Golden Rule
b. the Social Contract rule
c. The collective Utilitarian principle
d. Risk Aversion
Question 4
Which of the following is not one of the top three players in e-book publishing?
Select one:
a. Apple
b. Amazon
c. Google
d. Barnes & Noble
Question 5
Over the past five years, book publishing revenues have:
Select one:
a. increased steadily.
b. decreased sharply.
c. decreased slightly.
d. remained stable.
Question 6
Which of the following statements is not true?
Select one:
a. Biometric data stored on an iPhone is encrypted.
b. Biometric devices reduce the opportunity for spoofing.
c. A retina scan is an example of a biometric device.
d. Apple's Touch ID stores a user's actual fingerprint.
Question 7
Which of the following may offer its customers value chain management software?
Select one:
a. community providers
b. e-distributors
c. exchanges
d. e-procurement companies
Question 8
Organizations that typically provide an array of services to start-up companies along with a
small amount of funding are referred to as:
Select one:
a. angel investors.
b. venture capital investors.
c. crowdfunders.
d. incubators.
Question 9
Confidentiality is sometimes confused with:
Select one:
a. privacy.
b. integrity.
c. authenticity.
d. nonrepudiation.
Question 10
A fingerprint scan is an example of which of the following?
Select one:
a. encryption
b. biometrics
c. IDS
d. firewall
Question 11
Interactivity in the context of e-business and e-commerce provides which of the following
functionalities?
Select one:
a. the ability to physically touch and manipulate a product
b. the ability of consumers to create and distribute content
c. complexity and content of a message
d. the enabling of two-way communication between consumer and merchant
Question 12
The backbone of the Internet is formed by:
Select one:
a. Tier 1 ISPs.
b. Metropolitan Area Exchanges (MAEs).
c. Network Access Points (NAPs).
d. Internet Exchange Points (IXPs).
Question 13 đáp án C nhưng ko phải
What is the first step in analyzing an ethical dilemma?
Select one:
a. Identify the options you can reasonably take.
b. Identify and describe the facts.
c. Define the conflict or dilemma and identify the higher-order values involved.
d. Identify the potential consequences of your opinions.
Question 14
Which of the following tools can companies use to track user statements and views on
newsgroups, chat groups, and other public forums?
Select one:
a. shopping carts
b. cookies
c. digital wallets
d. search engines
Question 15
The process of slicing digital messages into parcels, sending them along different
communication paths as they become available, and reassembling them at the destination point
is called:
Select one:
a. packet switching.
b. the Transmission Control Protocol.
c. routing.
d. the File Transfer Protocol.

Question 16
Complete
In general, the key to becoming a successful content provider is to:
Select one:
a. provide online content for free.
b. provide other services as well as online content.
c. own the technology by which content is created, presented, and distributed.
d. own the content being provided.
Question 17

A metered subscription model is most similar to which of the following revenue models?
Select one:
a. advertising
b. transaction fee
c. freemium
d. affiliate
Question 18

Which of the following technologies are being developed to support e-business and e-
commerce?
Select one:
a. Virtual Reality technology (AR)
b. All...
c. Electronic payment technology
d. Mobile broadband technology
Question 19
In which year can e-commerce be said to have begun?
Select one:
a. 1985
b. 1995
c. 2001
d. 1983
Question 20
Which of the following statements about e-sports is not true? đáp án C nhưng ko phải
Select one:
a. E-sports currently generates approximately $600 million globally.
b. Colleges are beginning to offer scholarships for players on their new video game teams.
c. E-sports will approach Hollywood in terms of global revenues by 2020.
d. E-sports is growing at approximately 25% a year.

Hùng
Question 1
A(n) ________ is a Web application that allows users to easily add and edit content on a Web
page.
Select one:
a. blog
b. RSS feed
c. wiki
d. podcast
Question 2
Which of the following forms of media generate the most revenue?
Select one:
a. newspapers
b. Internet
c. box office
d. television

Question 3
Which of the following statements about the Web is not true?
Select one:
a. The Web is the technology upon which the Internet is based.
b. The Web was the original "killer app."
c. The Web provides access to pages written in HyperText Markup Language.
d. The Web is both a communications infrastructure and an information storage system.

Question 4
All of the following are factors that will be considered in determining whether use of copyrighted
material is "fair use" except the:
Select one:
a. nature of the work used.
b. amount of the work used.
c. free availability of the work on the Web.
d. market effect of the use.

Question 5
Which of the following statements about the newspaper industry is not true?
Select one:
a. Newspaper circulation revenues have declined by 10% since 2000.
b. The growth of the mobile platform and social networks has potential to lessen the disruption
of the newspaper industry.
c. Online readership of newspapers is increasing.
d. The emergence of search engines such as Google has had a major impact on the newspaper
industry.

Question 6
Accessing data without authorization on Dropbox is an example of which of the following?
Select one:
a. mobile platform security issue
b. social network security issue
c. sniffing
d. cloud security issue

Question 7
______ refers to the ability to ensure that e-commerce participants do not deny their online
actions.
Select one:
a. Availability
b. Nonrepudiation
c. Integrity
d. Authenticity

Question 8
Which of the following is a physical place you visit in order to transact?
Select one:
a. the Internet
b. marketspace
c. marketplace
d. social network

Question 9
Which of the following gives a business model the most credibility with outside investors?
Select one:
a. the firm's market opportunity
b. the firm's management team
c. the firm's market strategy
d. the firm's value proposition

Question 10
E-commerce can be defined as:
Select one:
a. the use of any Internet technologies in a firm's daily activities.
b. any digitally enabled transactions among individuals and organizations.
c. the use of the Internet, the Web, and mobile apps to transact business.
d. the digital enablement of transactions and processes within an organization.

Question 11
Which of the following is not a concern about IoT?
Select one:
a. interoperability
b. the high cost of sensors
c. security
d. privacy

Question 12
Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an
invention for 20 years?
Select one:
a. trademark law
b. copyright law
c. trade secret law
d. patent law

Question 13
Which of the following is not a variation of the e-tailer business model?
Select one:
a. manufacturer-direct
b. market creator
c. bricks-and-clicks
d. virtual merchant

Question 14
201.61.186.227 is an example of an IP address.
Select one:
a. Địa chỉ IPv6
b. Địa chỉ IP Web
c. Địa chỉ IPv4
d. Địa chỉ IP email

Question 15
Which of the following tools can companies use to track user statements and views on
newsgroups, chat groups, and other public forums?
Select one:
a. digital wallets
b. search engines
c. cookies
d. shopping carts

Question 16
Automatically redirecting a Web link to a different address is an example of which of the
following?
Select one:
a. pharming
b. sniffing
c. social engineering
d. DDoS attack

Question 17
Which of the following protects original forms of expression in a tangible medium?
Select one:
a. copyright law
b. patent law
c. trade secret law
d. trademark law

Question 18
A metered subscription model is most similar to which of the following revenue models?
Select one:
a. affiliate
b. transaction fee
c. advertising
d. freemium

Question 19
An IPv4 address is expressed as a:
Select one:
a. 64-bit number that appears as a series of four separate numbers separated by periods.
b. 32-bit number that appears as a series of four separate numbers separated by periods.
c. 64-bit number that appears as a series of four separate numbers separated by semicolons.
d. 32-bit number that appears as a series of four separate numbers separated by semicolons.

Question 20
Which of the following was the top online video site in 2015 in terms of number of viewers?
Select one:
a. Facebook
b. Google Sites
c. Yahoo Sites
d. AOL

Kiệt
1. To allow lower-level employees access to the corporate network while preventing them from
accessing private human resources documents, you would use:
Select one:
a. security tokens.
b. access controls.
c. an authorization policy.
d. an authorization management system.

2. Downloading music tracks owned by record companies without paying for them is an
example of a violation of:
Select one:
a. patent law.
b. copyright law.
c. trademark law.
d. privacy law.

3. ________ convergence describes the development of hybrid devices that can combine the
functionality of two or more existing media platforms into a single device.
Select one:
a. Technological
b. Media
c. Content
d. Industry

4. Which ethical principle asks you to assume that virtually all tangible and intangible objects are
owned by someone else unless there is a specific declaration otherwise?
Select one:
a. the Golden Rule
b. No Free Lunch
c. the Social Contract rule
d. the Slippery Slope
5. Which of the following features of e-commerce technology allows users to participate in the
creation of online content?
Select one:
a. information density
b. global reach
c. ubiquity
d. social technology

6. A metered subscription model is most similar to which of the following revenue models?
Select one:
a. affiliate
b. freemium
c. advertising
d. transaction fee

7. Which of the following protocols is used to send mail to a server?


Select one:
a. SSL
b. IMAP
c. HTTP
d. FTP

8. A firm's ________ describes how a firm will produce a superior return on invested capital.
Select one:
a. competitive advantage
b. market strategy
c. revenue model
d. value proposition

9. The use by a company of its competitive advantage to achieve more advantage in


surrounding markets is known as ________.
Select one:
a. focus
b. differentiation
c. market strategy
d. leverage

10. PayPal is an example of what type of payment system?


Select one:
a. digital credit card system
b. online stored value payment system
c. accumulating balance system
d. digital checking system

11. What country intends to be the first to use Project Loon to provide universal Internet
access?
Select one:
a. Ghana
b. Australia
c. Sri Lanka
d. New Zealand

12. In general, the key to becoming a successful content provider is to:


Select one:
a. own the technology by which content is created, presented, and distributed.
b. provide online content for free.
c. own the content being provided.
d. provide other services as well as online content.

13. Momo, Zalo-pay, Grab-pay... are examples of:


Select one:
a. virtual currency.
b. e-wallet.
c. digital cash.
d. peer-to-peer payment systems.

14. Which of the following is not a variation of the e-tailer business model?
Select one:
a. virtual merchant
b. manufacturer-direct
c. market creator
d. bricks-and-clicks

15. Which of the following is the leading cause of data breaches?


Select one:
a. accidental disclosures
b. DDoS attacks
c. theft of a computer
d. hackers

16. A business model that uses advertising revenue to provide some content for free, combined
with an option to obtain additional content for a price is called a(n) ________ model.
Select one:
a. distribution
b. a la carte
c. freemium
d. sales

17. Content convergence describes convergence in the design, production, and ________ of
content.
Select one:
a. sales
b. distribution
c. consumption
d. marketing

18. Which of the following protects original forms of expression in a tangible medium?
Select one:
a. trademark law
b. patent law
c. copyright law
d. trade secret law
19. ________ refers to the ability to identify the person or entity with whom you are dealing on
the Internet.
Select one:
a. Integrity
b. Nonrepudiation
c. Authenticity
d. Availability

20. The merger of media enterprises into powerful, synergistic combinations that can cross-
market content on many different platforms is referred to as:
Select one:
a. aggregation.
b. industry convergence.
c. repackaging.
d. media transformation.

Which element of the business model refers to the presence of substitute products in the
market?
Select one:
a. competitive environment
b. competitive advantage
c. value proposition
d. market strategy

Interactivity in the context of e-business and e-commerce provides which of the following
functionalities?
Select one:
a. complexity and content of a message
b. the ability to physically touch and manipulate a product
c. the ability of consumers to create and distribute content
d. the enabling of two-way communication between consumer and merchant

Which of the following newspaper audience platforms has the higher percentage of readers?
Select one:
a. Web only
b. print/mobile
c. Web/mobile
d. print

All of the following use a social network marketing strategy except:


Select one:
a. Amazon.
b. Twitter.
c. Pinterest.
d. YouTube.

Which of the following is currently the most popular Web browser?


Select one:
a. Safari
b. Internet Explorer
c. Chrome
d. Firefox

Which of the following is not considered a portal?


Select one:
a. AOL
b. Yahoo
c. MSN
d. Amazon
Tiên
Which of the following is not a concern about IoT?
Select one:
a. privacy
b. security
c. the high cost of sensors
d. interoperability

PayPal is an example of what type of payment system?


Select one:
a. digital credit card system
b. digital checking system
c. online stored value payment system
d. accumulating balance system

Automatically redirecting a Web link to a different address is an example of which of the


following?
Select one:
a. DDoS attack
b. social engineering
c. pharming
d. sniffing

All of the following are factors that will be considered in determining whether use of copyrighted
material is "fair use" except the:
Select one:
a. market effect of the use.
b. amount of the work used.
c. free availability of the work on the Web.
d. nature of the work used.

Which of the following is not a unique feature of e-business and e-commerce technologies?
Select one:
a. richness
b. information asymmetry
c. social technology
d. interactivity
Which of the following is the most common protocol for securing a digital channel of
communication?
Select one:
a. SSL/TLS
b. VPN
c. DES
d. HTTP

Which of the following e-commerce technology dimensions creates greater opportunities for
cyberbullying?
Select one:
a. information density
b. social technology
c. ubiquity
d. interactivity

To allow lower-level employees access to the corporate network while preventing them from
accessing private human resources documents, you would use:
Select one:
a. an authorization management system.
b. access controls.
c. an authorization policy.
d. security tokens.

Organizations that typically provide an array of services to start-up companies along with a
small amount of funding are referred to as:
Select one:
a. crowdfunders.
b. venture capital investors.
c. angel investors.
d. incubators.

Which of the following is the fastest growing segment of media revenues?


Select one:
a. Internet media
b. magazines
c. home video
d. radio

Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an
invention for 20 years?
Select one:
a. copyright law
b. trademark law
c. trade secret law
d. patent law

Which of the following features of e-commerce technology is related to the concept of network
externalities?
Select one:
a. information density
b. richness
c. universal standards
d. interactivity

Which of the following is not one of the top three players in e-book publishing?
Select one:
a. Barnes & Noble
b. Amazon
c. Apple
d. Google

What is the most frequent cause of stolen credit cards and card information today?
Select one:
a. lost cards
b. phishing attacks
c. sniffing programs
d. the hacking and looting of corporate servers storing credit card information

Bò đực
Question 1: Which ethical principle states that, when confronted with an ethical dilemma,
individuals should take the action that achieves the greater value for all of society?
Select one:
a. the Social Contract rule
b. the Golden Rule
c. the Collective Utilitarian principle
d. Risk Aversion

Question 2: The process of slicing digital messages into parcels, sending them along different
communication paths as they become available, and reassembling them at the destination point
is called:
Select one:
a. packet switching.
b. the Transmission Control Protocol.
c. routing.
d. the File Transfer Protocol.

Question 3: Stickiness is an important attribute for which of the following revenue models?
Select one:
a. sales model revenue
b. transaction fee revenue model
c. subscription model revenue
d. advertising model revenue

Question 4: All of the following are examples of business-to-business (B2B) business models
except:
Select one:
a. e-tailers.
b. exchanges. exchanges.
c. e-procurement.
d. e-distributors.

Question 5: ________ refers to the ability to identify the person or entity with whom you are
dealing on the Internet.
Select one:
a. Nonrepudiation
b. Integrity
c. Availability
d. Authenticity

Question 6: At the address http://www.company.com, which of the following is the top-level


domain?
Select one:
a. company.com
b. http
c. .com
d. www

Question 7: SET stands for________________ on e-commerce.


Select one:
a. Secure Electronic Transaction
b. Secure Electronic Transportation
c. Secure EXchange Transaction
d. Security Electronic Transaction

Question 8: Accessing data without authorization on Dropbox is an example of which of the


following?
Select one:
a. sniffing
b. mobile platform security issue
c. cloud security issue
d. social network security issue

Question 9: All of the following are limitations of the existing online credit card payment system
except:
Select one:
a. poor security.
b. cost to consumers.
c. social equity.
d. cost to merchants.

Question 10: Which of the following is another name for a revenue model?
Select one:
a. business model
b. financial model
c. financial statements
d. business strategy
Question 11: Which of the following is an example of e-business?
Select one:
a. the Amazon.com Web site
b. Amazon's inventory control system
c. Amazon's Pinterest page
d. an Amazon mobile app

Question 12: Which of the following tools can companies use to track user statements and
views on newsgroups, chat groups, and other public forums?
Select one:
a. digital wallets
b. cookies
c. shopping carts
d. search engines

Question 13: What type of Internet access technology are Google and Facebook hoping to use
to provide Internet access to remote parts of the world?
Select one:
a. DSL
b. WLANs
c. Bluetooth
d. drones

Question 14: Which of the following is not a concern about IoT?


Select one:
a. security
b. privacy
c. the high cost of sensors
d. interoperability

Question 15: Linden Dollars, created for use in Second Life, are an example of:
Select one:
a. digital cash.
b. virtual currency.
c. peer-to-peer payment systems.
d. EBPP.

Question 16: To allow lower-level employees access to the corporate network while preventing
them from accessing private human resources documents, you would use:
Select one:
a. security tokens.
b. access controls.
c. an authorization policy.
d. an authorization management system.

Question 17: Which of the following is not a basic type of cloud computing service?
Select one:
a. SaaS
b. PaaS
c. FiOS
d. IaaS

Question 18: Which of the following is an unfair competitive advantage?


Select one:
a. brand name
b. superior technology
c. access to global markets
d. lower product prices

Question 19: Which of the following statements about the television and premium video industry
is not true?
Select one:
a. spend more time watching television on a computer or mobile device than they do Americans
on a traditional television set.
b. The television industry is the major source of premium video on the Internet.
c. Apple's iTunes store is the leading distributor of streaming video.
d. Over-the-top entertainment services are a threat to cable television distributors.

Question 20: The overall rate of online credit card fraud is ________ of all online card
transactions.
Select one:
a. less than 1%
b. around 15%
c. around 10%
d. around 5%

Của ai đó
Stickiness is an important attribute for which of the following revenue models?
Select one:
a. sales revenue model
b. transaction fee revenue model
c. subscription revenue model
d. advertising revenue model

The process of slicing digital messages into parcels, sending them along different
communication paths as they become available, and reassembling them at the destination point
is called:
Select one:
a. packet switching.
b. the Transmission Control Protocol.
c. routing.
d. the File Transfer Protocol.

All of the following are examples of business-to-business (B2B) business models except:
Select one:
a. e-tailers.
b. exchanges.
c. e-procurement.
d. e-distributors.
________ refers to the ability to identify the person or entity with whom you are dealing on the
Internet.
Select one:
a. Nonrepudiation
b. Integrity
c. Availability
d. Authenticity

In the address http://www.company.com, which of the following is the top-level domain?


Select one:
a. company.com
b. http
c. .com
d. www

Của những ngày trước


Which element of the business model addresses what a firm provides that other firms do
not and cannot?
Select one:
a. competitive advantage
b. market strategy
c. revenue model
d. value proposition

Which of the following gives a business model the most credibility with outside investors?
Select one:
a. the firm's market strategy
b. the firm's market opportunity
c. the firm's value proposition
d. the firm's management team

eBay uses all of the following business models except:


Select one:
a. content provider.
b. e-commerce infrastructure provider.
c. B2C market creator.
d. C2C market creator.

All of the following can be considered a direct or indirect competitor of Amazon except:
Select one:
a. Apple's iTunes Store.
b. eBay.
c. Walmart.
d. Starbucks.
The business model of e-tailers is quite similar to that of:
Select one:
a. e-distributors.
b. transaction brokers.
c. service providers.
d. exchanges.

Which of the following is the core communications protocol for the Internet?
Select one:
a. TCP/IP
b. FTP
c. TLS
d. Telnet

An IPv4 address is expressed as a:


Select one:
a. 64-bit number that appears as a series of four separate numbers separated by
semicolons.
b. 64-bit number that appears as a series of four separate numbers separated by periods.
c. 32-bit number that appears as a series of four separate numbers separated by periods.
d. 32-bit number that appears as a series of four separate numbers separated by
semicolons.

Which of the following is a Web application that enables Internet users to communicate with
each other, although not in real time?
Select one:
a. SMS messaging
b. VoIP
c. mobile messaging
d. online forum

How many bits does an IPv6 address have?


Select one:
a. 32
b. 512
c. 128
d. 64

A(n) ________ is a Web application that allows users to easily add and edit content on a
Web page.
Select one:
a. blog
b. RSS feed
c. wiki
d. podcast

Which of the following is currently the most popular Web browser?


Select one:
a. Chrome
b. Firefox
c. Internet Explorer
d. Safari

________ is a model of computing in computer processing, storage, software, and other


services are provided as a shared pool of virtualized resources over the Internet.
Select one:
a. P2P computing
b. Cloud computing
c. Mobile computing
d. Client/server computing

In the address http://www.company.com, which of the following is the top-level domain?


Select one:
a. company.com
b. www
c. http
d. .com

Which of the following is not a basic type of cloud computing service?


Select one:
a. SaaS
b. IaaS
c. PaaS
d. FiOS

Which of the following technologies has enabled the Internet to grow exponentially to
support millions of users, without overloading the network architecture?
Select one:
a. client/server computing
b. Wi-Fi
c. IPv6
d. fiber optics

What is the most frequent cause of stolen credit cards and card information today?
Select one:
a. the hacking and looting of corporate servers storing credit card information
b. sniffing programs
c. lost cards
d. phishing attacks
Approximately ________ of the Internet population in the United States reads magazines
online.
Select one:
a. one-quarter
b. three-quarters
c. one-half
d. one-third

All of the following are examples of technology convergence except:


Select one:
a. the iPad.
b. smartphones.
c. Apple TV.
d. Amazon Books Publishing.

Which of the following was the top online video site in 2015 in terms of number of viewers?
Select one:
a. Facebook
b. Yahoo Sites
c. AOL
d. Google Sites

The leading merchants of digital games are Apple's App Store and:
Select one:
a. the Google Play store.
b. Twitch.tv.
c. Xbox.
d. Amazon Digital.

Which of the following statements about the newspaper industry is not true?
Select one:
a. Online readership of newspapers is increasing.
b. The growth of the mobile platform and social networks has potential to lessen the
disruption of the newspaper industry.
c. Newspaper circulation revenues have declined by 10% since 2000.
d. The emergence of search engines such as Google has had a major impact on the
newspaper industry.

SET stands for________________ on e-commerce.


Select one:
a. Security Electronic Transaction
b. Secure EXchange Transaction
c. Secure Electronic Transaction
d. Secure Electronic Transportation
Which of the following is an example of an integrity violation of e-commerce security?
Select one:
a. A customer denies that he or she is the person who placed the order.
b. A Web site is not actually operated by the entity the customer believes it to be.
c. An unauthorized person intercepts an online communication and changes its contents.
d. A merchant uses customer information in a manner not intended by the customer.
The overall rate of online credit card fraud is ________ of all online card transactions.
Select one:
a. around 15%
b. less than 1%
c. around 10%
d. around 5%
All of the following statements about Apple Pay are true except which of the following?
Select one:
a. Apple Pay can be used for mobile payments at the point of sale at a physical store.
b. Apple Pay is based on Touch ID biometric fingerprint scanning.
c. Apple Pay relies on NFC chip technology.
d. Apple Pay is available for both iPhone 13 and iPhone 15.
Which of the following statements is not true?
Select one:
a. Biometric devices reduce the opportunity for spoofing.
b. A retina scan is an example of a biometric device.
c. Biometric data stored on an iPhone is encrypted.
d. Apple's Touch ID stores a user's actual fingerprint.

Which of the following is not a major trend in e-commerce payments in 2023?


Select one:
a. Mobile retail payment volume decreases.
b. Payment by credit and/or debit card remains the dominant form of online payment.
c. Apple introduces Apple Pay.
d. PayPal remains the most popular alternative payment method

Software that is used to obtain private user information such as a user's keystrokes or
copies of e-mail is referred to as:
Select one:
a. spyware.
b. browser parasite.
c. adware.
d. a backdoor.

Which of the following is an example of an online privacy violation?


Select one:
a. your online purchasing history being sold to other merchants without your consent
b. your computer being used as part of a botnet
c. your e-mail being altered by a hacker
d. your e-mail being read by a hacker

https://quizlet.com/vn/585398570/e-commerce-chapter-1-flash-cards/?
fbclid=IwAR0vrGQXEAVVKZ9_UiVc46xEj09D4LOsfrf59xjox4LEQW5ZsgaNHhAhoEc
https://quizlet.com/208891241/ecommerce-chapter-5-quiz-1-flash-cards/?
fbclid=IwAR38O3WJkBQfQ44hxTznOumPiOLbr97PV1POm6SYQqYdyE6naXYSsl7l6PQ
https://quizlet.com/538504833/csis-1010-chapter-10-quiz-flash-cards/?fbclid=IwAR03LUF19-
quNrl2zBjOacRcUtyRNxtF-BGCZwWLFNCizFxXfmnFRA9p-lg
https://quizlet.com/213409928/e-commerce-chapter-3-flash-cards/?fbclid=IwAR2Xz-
oPMe0JGNNzDKVk9YGxxpRmX6OEcDw_JZPKOyWbce8rxADq0GPIXac
https://quizlet.com/80165093/topic-2-flash-cards/?
fbclid=IwAR1jGHXfZpT7TdfasyuxJhiGw0HUWjtB5wu--NDLlFg7gU4ou8JsJHT1Rz0
https://quizlet.com/213548285/e-commerce-chapter-2-matching-flash-cards/?
fbclid=IwAR1Np2PYQrmnP2yJlKCVnyVjdDakni69rIQaYfz9BWMPjHWXubRrGt1ukT4

You might also like