Professional Documents
Culture Documents
C A Tú
C A Tú
C A Tú
1)
2)
3)
4)
5)
6)
To allow lower-level employees access to the corporate network while preventing them
from accessing private human resources documents, you would use:
A) access controls.
B) an authorization management system.
C) security tokens.
D) an authorization policy
7)
8)
9)
D. market creator
10)
11)
12)
13)
14)
15)
16)
17)
18)
19)
20)
Của Bảo: 8.5/10 (kiểm tra lại đáp án)
Của Nghi:
1. Which of the following was not able to successfully implement a freemium business model?
Select one:
a. Ning
b. Pandora
c. Dropbox
d. LinkedIn
2. Which of the following technologies has enabled the Internet to grow exponentially to
support millions of users, without overloading the network architecture?
Select one:
a. Wi-Fi
b. client/server computing
c. fiber optics
d. IPv6
3. The merger of media enterprises into powerful, synergistic combinations that can cross-
market content on many different platforms is referred to as:
Select one:
a. repackaging.
b. aggregation.
c. media transformation.
d. industry convergence.
Select one:
a. sales
b. advertising
c. subscription
d. transaction fee
Select one:
a. FTP.
b. SSL/TLS.
c. VPN.
d. certificates.
Select one:
a. the French Minitel.
b. the development of the smartphone.
c. Baxter Healthcare's PC-based remote order entry system.
d. the development of Electronic Data Interchange standards.
7. A business model that uses advertising revenue to provide some content for free, combined
with an option to obtain additional content for a price is called a(n) ________ model.
Select one:
a. distribution
b. freemium
c. sales
d. a la carte
8. E-commerce is available just about everywhere and anytime. This is known as ________.
Select one:
a. ubiquity
b. information density
c. reach
d. richness
9. A metered subscription model is most similar to which of the following revenue models?
Select one:
a. affiliate
b. advertising
c. freemium
d. transaction fee
10. Which of the following protects original forms of expression in a tangible medium?
Select one:
a. trademark law
b. copyright law
c. trade secret law
d. patent law
Select one:
a. botnet
b. virus
c. Trojan horse
d. worm
12. Which of the following terms can be considered synonymous with the term e-commerce?
Select one:
a. the Internet
b. the Web
c. e-business
d. digital commerce
13. Which of the following may offer its customers value chain management software?
Select one:
a. exchanges
b. community providers
c. e-procurement companies
d. e-distributors
14. Which of the following e-commerce technology dimensions creates greater opportunities for
cyberbullying?
Select one:
a. information density
b. ubiquity
c. interactivity
d. social technology
Select one:
a. digital cash.
b. e-wallet.
c. virtual currency.
d. peer-to-peer payment systems.
Select one:
a. Pinterest
b. Priceline
c. LinkedIn
d. Facebook
Select one:
a. SSL
b. FTP
c. HTTP
d. IMAP
18. How long does copyright protection extend for corporate-owned works?
Select one:
a. 50 years
b. 75 years
c. 95 years
d. 25 years
19. All of the following are limitations of the existing online credit card payment system except:
Select one:
a. social equity.
b. cost to consumers.
c. cost to merchants.
d. poor security.
Select one:
a. market creator
b. virtual merchant
c. bricks-and-clicks
d. manufacturer-direct
A(n) _______ is a Web application that allows users to easily add and edit content on a Web
page.
Select one:
a. RSS feed
b. wiki
c. podcast
d. blog
Select one:
a. 32-bit number that appears as a series of four separate numbers separated by periods.
b. 32-bit number that appears as a series of four separate numbers separated by semicolons.
c. 64-bit number that appears as a series of four separate numbers separated by semicolons.
d. 64-bit number that appears as a series of four separate numbers separated by periods.
Which of the following e-commerce technology dimensions creates greater opportunities for
cyberbullying?
Select one:
a. interactivity
b. social technology
c. ubiquity
d. information density
Select one:
a. YouTube
b. Airbnb
c. Facebook
d. Tumblr
Which of the following technologies are being developed to support e business and e-
commerce?
Select one:
c. All…
Which of the following statements about the television and premium video industry is not true?
Select one:
a. Americans spend more time watching television on a computer or mobile device than they do
on a traditional television set.
b. The television industry is the major source of premium video on the Internet.
Select one:
a. market creator
c. bricks-and-clicks
Od. manufacturer-direct
Which of the following gives a business model the most credibility with outside investors?
Select one:
A business model that uses advertising revenue to provide some content for free, combined
with an option to obtain additional content for a price is called a(n) _______ model.
Select one:
a. sales
Ob. distribution
c. a la carte
d. freemium
A(n) _______ is a Web application that allows users to easily add and edit content on a Web
page.
Select one:
a. RSS feed
b. wiki
c. podcast
Select one:
Select one:
a. 2001
b. 1985
c. 1983
d. 1995
_______ refers to the ability to identify the person or entity with whom you are dealing on the
Internet.
Select one:
a. Availability
b. Nonrepudiation
c. Authenticity
Select one:
_______ and _______ are typically the most easily identifiable aspects of a company's business
model.
Select one:
To allow lower-level employees access to the corporate network while preventing them from
accessing private human resources documents, you would use:
Select one:
a. security tokens.
b. an authorization policy.
Which of the following technologies are being developed to support e business and e-
commerce?
Select one:
c. All...
Select one:
d. the use of the Internet, the Web, and mobile apps to transact business.
Select one:
Select one:
Select one:
b. sniffing
In the ______ business model, a Web-based business builds a digital environment in which
buyers and sellers can meet, display products, search for products, and establish prices.
Select one:
a. portal
b. e-tailer
c. community provider
1.
2)
3)
4)
5)
6)
7)
8)
9)
10)
11)
12)
13)
14)
15)
16)
17)
18)
________ refers to the ability to ensure that messages and data are only available to those
authorized to view them.
Select one:
a. Integrity
b. Confidentiality
c. Availability
d. Privacy
All of the following can be considered a direct or indirect competitor of Amazon except:
Select one:
a. Walmart.
b. Starbucks.
c. Apple's iTunes Store.
d. EBay.
Downloading music tracks owned by record companies without paying for them is an example
of a violation of:
Select one:
a. patent law.
b. copyright law.
c. privacy law.
d. trademark law.
Linden Dollars, created for use in Second Life, are an example of:
Select one:
a. EBPP.
b. digital cash.
c. peer-to-peer payment systems.
d. virtual currency.
Which of the following is the largest producer of revenues in the entertainment industry?
Select one:
a. radio
b. television
c. video games
d. films
Which of the following is not one of the basic technological foundations of the Internet?
Select one:
a. client/server computing
b. TCP/IP
c. packet switching
d. FTP
All of the following can be considered a direct or indirect competitor of Amazon except:
Select one:
a. Walmart.
b. eBay.
c. Apple's iTunes Store.
d. Starbucks.
Which element of the business model addresses what a firm provides that other firms do not
and cannot?
Select one:
a. revenue model
b. competitive advantage
c. market strategy
d. value proposition
Which ethical principle states that, when confronted with an ethical dilemma, individuals should
take the action that achieves the greater value for all of society?
Select one:
a. the Golden Rule
b. the Social Contract rule
c. the Collective Utilitarian principle
d. Risk Aversion
Which of the following is not one of the top three players in e-book publishing?
Select one:
a. Apple
b. Amazon
c. Google
d. Barnes & Noble
Which of the following may offer its customers value chain management software?
Select one:
a. community providers
b. e-distributors
c. exchanges
d. e-procurement companies
Organizations that typically provide an array of services to start-up companies along with a
small amount of funding are referred to as:
Select one:
a. angel investors.
b. venture capital investors.
c. crowdfunders.
d. incubators.
Question 1
All of the following can be considered a direct or indirect competitor of Amazon except:
Select one:
a. Walmart.
b. eBay.
c. Apple's iTunes Store.
d. Starbucks.
Question 2
Which element of the business model addresses what a firm provides that other firms do not
and cannot?
Select one:
a. revenue model
b. competitive advantage
c. market strategy
d. value proposition
Question 3
Which ethical principle states that, when confronted with an ethical dilemma, individuals should
take the action that achieves the greater value for all of society?
Select one:
a. the Golden Rule
b. the Social Contract rule
c. The collective Utilitarian principle
d. Risk Aversion
Question 4
Which of the following is not one of the top three players in e-book publishing?
Select one:
a. Apple
b. Amazon
c. Google
d. Barnes & Noble
Question 5
Over the past five years, book publishing revenues have:
Select one:
a. increased steadily.
b. decreased sharply.
c. decreased slightly.
d. remained stable.
Question 6
Which of the following statements is not true?
Select one:
a. Biometric data stored on an iPhone is encrypted.
b. Biometric devices reduce the opportunity for spoofing.
c. A retina scan is an example of a biometric device.
d. Apple's Touch ID stores a user's actual fingerprint.
Question 7
Which of the following may offer its customers value chain management software?
Select one:
a. community providers
b. e-distributors
c. exchanges
d. e-procurement companies
Question 8
Organizations that typically provide an array of services to start-up companies along with a
small amount of funding are referred to as:
Select one:
a. angel investors.
b. venture capital investors.
c. crowdfunders.
d. incubators.
Question 9
Confidentiality is sometimes confused with:
Select one:
a. privacy.
b. integrity.
c. authenticity.
d. nonrepudiation.
Question 10
A fingerprint scan is an example of which of the following?
Select one:
a. encryption
b. biometrics
c. IDS
d. firewall
Question 11
Interactivity in the context of e-business and e-commerce provides which of the following
functionalities?
Select one:
a. the ability to physically touch and manipulate a product
b. the ability of consumers to create and distribute content
c. complexity and content of a message
d. the enabling of two-way communication between consumer and merchant
Question 12
The backbone of the Internet is formed by:
Select one:
a. Tier 1 ISPs.
b. Metropolitan Area Exchanges (MAEs).
c. Network Access Points (NAPs).
d. Internet Exchange Points (IXPs).
Question 13 đáp án C nhưng ko phải
What is the first step in analyzing an ethical dilemma?
Select one:
a. Identify the options you can reasonably take.
b. Identify and describe the facts.
c. Define the conflict or dilemma and identify the higher-order values involved.
d. Identify the potential consequences of your opinions.
Question 14
Which of the following tools can companies use to track user statements and views on
newsgroups, chat groups, and other public forums?
Select one:
a. shopping carts
b. cookies
c. digital wallets
d. search engines
Question 15
The process of slicing digital messages into parcels, sending them along different
communication paths as they become available, and reassembling them at the destination point
is called:
Select one:
a. packet switching.
b. the Transmission Control Protocol.
c. routing.
d. the File Transfer Protocol.
Question 16
Complete
In general, the key to becoming a successful content provider is to:
Select one:
a. provide online content for free.
b. provide other services as well as online content.
c. own the technology by which content is created, presented, and distributed.
d. own the content being provided.
Question 17
A metered subscription model is most similar to which of the following revenue models?
Select one:
a. advertising
b. transaction fee
c. freemium
d. affiliate
Question 18
Which of the following technologies are being developed to support e-business and e-
commerce?
Select one:
a. Virtual Reality technology (AR)
b. All...
c. Electronic payment technology
d. Mobile broadband technology
Question 19
In which year can e-commerce be said to have begun?
Select one:
a. 1985
b. 1995
c. 2001
d. 1983
Question 20
Which of the following statements about e-sports is not true? đáp án C nhưng ko phải
Select one:
a. E-sports currently generates approximately $600 million globally.
b. Colleges are beginning to offer scholarships for players on their new video game teams.
c. E-sports will approach Hollywood in terms of global revenues by 2020.
d. E-sports is growing at approximately 25% a year.
Hùng
Question 1
A(n) ________ is a Web application that allows users to easily add and edit content on a Web
page.
Select one:
a. blog
b. RSS feed
c. wiki
d. podcast
Question 2
Which of the following forms of media generate the most revenue?
Select one:
a. newspapers
b. Internet
c. box office
d. television
Question 3
Which of the following statements about the Web is not true?
Select one:
a. The Web is the technology upon which the Internet is based.
b. The Web was the original "killer app."
c. The Web provides access to pages written in HyperText Markup Language.
d. The Web is both a communications infrastructure and an information storage system.
Question 4
All of the following are factors that will be considered in determining whether use of copyrighted
material is "fair use" except the:
Select one:
a. nature of the work used.
b. amount of the work used.
c. free availability of the work on the Web.
d. market effect of the use.
Question 5
Which of the following statements about the newspaper industry is not true?
Select one:
a. Newspaper circulation revenues have declined by 10% since 2000.
b. The growth of the mobile platform and social networks has potential to lessen the disruption
of the newspaper industry.
c. Online readership of newspapers is increasing.
d. The emergence of search engines such as Google has had a major impact on the newspaper
industry.
Question 6
Accessing data without authorization on Dropbox is an example of which of the following?
Select one:
a. mobile platform security issue
b. social network security issue
c. sniffing
d. cloud security issue
Question 7
______ refers to the ability to ensure that e-commerce participants do not deny their online
actions.
Select one:
a. Availability
b. Nonrepudiation
c. Integrity
d. Authenticity
Question 8
Which of the following is a physical place you visit in order to transact?
Select one:
a. the Internet
b. marketspace
c. marketplace
d. social network
Question 9
Which of the following gives a business model the most credibility with outside investors?
Select one:
a. the firm's market opportunity
b. the firm's management team
c. the firm's market strategy
d. the firm's value proposition
Question 10
E-commerce can be defined as:
Select one:
a. the use of any Internet technologies in a firm's daily activities.
b. any digitally enabled transactions among individuals and organizations.
c. the use of the Internet, the Web, and mobile apps to transact business.
d. the digital enablement of transactions and processes within an organization.
Question 11
Which of the following is not a concern about IoT?
Select one:
a. interoperability
b. the high cost of sensors
c. security
d. privacy
Question 12
Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an
invention for 20 years?
Select one:
a. trademark law
b. copyright law
c. trade secret law
d. patent law
Question 13
Which of the following is not a variation of the e-tailer business model?
Select one:
a. manufacturer-direct
b. market creator
c. bricks-and-clicks
d. virtual merchant
Question 14
201.61.186.227 is an example of an IP address.
Select one:
a. Địa chỉ IPv6
b. Địa chỉ IP Web
c. Địa chỉ IPv4
d. Địa chỉ IP email
Question 15
Which of the following tools can companies use to track user statements and views on
newsgroups, chat groups, and other public forums?
Select one:
a. digital wallets
b. search engines
c. cookies
d. shopping carts
Question 16
Automatically redirecting a Web link to a different address is an example of which of the
following?
Select one:
a. pharming
b. sniffing
c. social engineering
d. DDoS attack
Question 17
Which of the following protects original forms of expression in a tangible medium?
Select one:
a. copyright law
b. patent law
c. trade secret law
d. trademark law
Question 18
A metered subscription model is most similar to which of the following revenue models?
Select one:
a. affiliate
b. transaction fee
c. advertising
d. freemium
Question 19
An IPv4 address is expressed as a:
Select one:
a. 64-bit number that appears as a series of four separate numbers separated by periods.
b. 32-bit number that appears as a series of four separate numbers separated by periods.
c. 64-bit number that appears as a series of four separate numbers separated by semicolons.
d. 32-bit number that appears as a series of four separate numbers separated by semicolons.
Question 20
Which of the following was the top online video site in 2015 in terms of number of viewers?
Select one:
a. Facebook
b. Google Sites
c. Yahoo Sites
d. AOL
Kiệt
1. To allow lower-level employees access to the corporate network while preventing them from
accessing private human resources documents, you would use:
Select one:
a. security tokens.
b. access controls.
c. an authorization policy.
d. an authorization management system.
2. Downloading music tracks owned by record companies without paying for them is an
example of a violation of:
Select one:
a. patent law.
b. copyright law.
c. trademark law.
d. privacy law.
3. ________ convergence describes the development of hybrid devices that can combine the
functionality of two or more existing media platforms into a single device.
Select one:
a. Technological
b. Media
c. Content
d. Industry
4. Which ethical principle asks you to assume that virtually all tangible and intangible objects are
owned by someone else unless there is a specific declaration otherwise?
Select one:
a. the Golden Rule
b. No Free Lunch
c. the Social Contract rule
d. the Slippery Slope
5. Which of the following features of e-commerce technology allows users to participate in the
creation of online content?
Select one:
a. information density
b. global reach
c. ubiquity
d. social technology
6. A metered subscription model is most similar to which of the following revenue models?
Select one:
a. affiliate
b. freemium
c. advertising
d. transaction fee
8. A firm's ________ describes how a firm will produce a superior return on invested capital.
Select one:
a. competitive advantage
b. market strategy
c. revenue model
d. value proposition
11. What country intends to be the first to use Project Loon to provide universal Internet
access?
Select one:
a. Ghana
b. Australia
c. Sri Lanka
d. New Zealand
14. Which of the following is not a variation of the e-tailer business model?
Select one:
a. virtual merchant
b. manufacturer-direct
c. market creator
d. bricks-and-clicks
16. A business model that uses advertising revenue to provide some content for free, combined
with an option to obtain additional content for a price is called a(n) ________ model.
Select one:
a. distribution
b. a la carte
c. freemium
d. sales
17. Content convergence describes convergence in the design, production, and ________ of
content.
Select one:
a. sales
b. distribution
c. consumption
d. marketing
18. Which of the following protects original forms of expression in a tangible medium?
Select one:
a. trademark law
b. patent law
c. copyright law
d. trade secret law
19. ________ refers to the ability to identify the person or entity with whom you are dealing on
the Internet.
Select one:
a. Integrity
b. Nonrepudiation
c. Authenticity
d. Availability
20. The merger of media enterprises into powerful, synergistic combinations that can cross-
market content on many different platforms is referred to as:
Select one:
a. aggregation.
b. industry convergence.
c. repackaging.
d. media transformation.
Which element of the business model refers to the presence of substitute products in the
market?
Select one:
a. competitive environment
b. competitive advantage
c. value proposition
d. market strategy
Interactivity in the context of e-business and e-commerce provides which of the following
functionalities?
Select one:
a. complexity and content of a message
b. the ability to physically touch and manipulate a product
c. the ability of consumers to create and distribute content
d. the enabling of two-way communication between consumer and merchant
Which of the following newspaper audience platforms has the higher percentage of readers?
Select one:
a. Web only
b. print/mobile
c. Web/mobile
d. print
All of the following are factors that will be considered in determining whether use of copyrighted
material is "fair use" except the:
Select one:
a. market effect of the use.
b. amount of the work used.
c. free availability of the work on the Web.
d. nature of the work used.
Which of the following is not a unique feature of e-business and e-commerce technologies?
Select one:
a. richness
b. information asymmetry
c. social technology
d. interactivity
Which of the following is the most common protocol for securing a digital channel of
communication?
Select one:
a. SSL/TLS
b. VPN
c. DES
d. HTTP
Which of the following e-commerce technology dimensions creates greater opportunities for
cyberbullying?
Select one:
a. information density
b. social technology
c. ubiquity
d. interactivity
To allow lower-level employees access to the corporate network while preventing them from
accessing private human resources documents, you would use:
Select one:
a. an authorization management system.
b. access controls.
c. an authorization policy.
d. security tokens.
Organizations that typically provide an array of services to start-up companies along with a
small amount of funding are referred to as:
Select one:
a. crowdfunders.
b. venture capital investors.
c. angel investors.
d. incubators.
Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an
invention for 20 years?
Select one:
a. copyright law
b. trademark law
c. trade secret law
d. patent law
Which of the following features of e-commerce technology is related to the concept of network
externalities?
Select one:
a. information density
b. richness
c. universal standards
d. interactivity
Which of the following is not one of the top three players in e-book publishing?
Select one:
a. Barnes & Noble
b. Amazon
c. Apple
d. Google
What is the most frequent cause of stolen credit cards and card information today?
Select one:
a. lost cards
b. phishing attacks
c. sniffing programs
d. the hacking and looting of corporate servers storing credit card information
Bò đực
Question 1: Which ethical principle states that, when confronted with an ethical dilemma,
individuals should take the action that achieves the greater value for all of society?
Select one:
a. the Social Contract rule
b. the Golden Rule
c. the Collective Utilitarian principle
d. Risk Aversion
Question 2: The process of slicing digital messages into parcels, sending them along different
communication paths as they become available, and reassembling them at the destination point
is called:
Select one:
a. packet switching.
b. the Transmission Control Protocol.
c. routing.
d. the File Transfer Protocol.
Question 3: Stickiness is an important attribute for which of the following revenue models?
Select one:
a. sales model revenue
b. transaction fee revenue model
c. subscription model revenue
d. advertising model revenue
Question 4: All of the following are examples of business-to-business (B2B) business models
except:
Select one:
a. e-tailers.
b. exchanges. exchanges.
c. e-procurement.
d. e-distributors.
Question 5: ________ refers to the ability to identify the person or entity with whom you are
dealing on the Internet.
Select one:
a. Nonrepudiation
b. Integrity
c. Availability
d. Authenticity
Question 9: All of the following are limitations of the existing online credit card payment system
except:
Select one:
a. poor security.
b. cost to consumers.
c. social equity.
d. cost to merchants.
Question 10: Which of the following is another name for a revenue model?
Select one:
a. business model
b. financial model
c. financial statements
d. business strategy
Question 11: Which of the following is an example of e-business?
Select one:
a. the Amazon.com Web site
b. Amazon's inventory control system
c. Amazon's Pinterest page
d. an Amazon mobile app
Question 12: Which of the following tools can companies use to track user statements and
views on newsgroups, chat groups, and other public forums?
Select one:
a. digital wallets
b. cookies
c. shopping carts
d. search engines
Question 13: What type of Internet access technology are Google and Facebook hoping to use
to provide Internet access to remote parts of the world?
Select one:
a. DSL
b. WLANs
c. Bluetooth
d. drones
Question 15: Linden Dollars, created for use in Second Life, are an example of:
Select one:
a. digital cash.
b. virtual currency.
c. peer-to-peer payment systems.
d. EBPP.
Question 16: To allow lower-level employees access to the corporate network while preventing
them from accessing private human resources documents, you would use:
Select one:
a. security tokens.
b. access controls.
c. an authorization policy.
d. an authorization management system.
Question 17: Which of the following is not a basic type of cloud computing service?
Select one:
a. SaaS
b. PaaS
c. FiOS
d. IaaS
Question 19: Which of the following statements about the television and premium video industry
is not true?
Select one:
a. spend more time watching television on a computer or mobile device than they do Americans
on a traditional television set.
b. The television industry is the major source of premium video on the Internet.
c. Apple's iTunes store is the leading distributor of streaming video.
d. Over-the-top entertainment services are a threat to cable television distributors.
Question 20: The overall rate of online credit card fraud is ________ of all online card
transactions.
Select one:
a. less than 1%
b. around 15%
c. around 10%
d. around 5%
Của ai đó
Stickiness is an important attribute for which of the following revenue models?
Select one:
a. sales revenue model
b. transaction fee revenue model
c. subscription revenue model
d. advertising revenue model
The process of slicing digital messages into parcels, sending them along different
communication paths as they become available, and reassembling them at the destination point
is called:
Select one:
a. packet switching.
b. the Transmission Control Protocol.
c. routing.
d. the File Transfer Protocol.
All of the following are examples of business-to-business (B2B) business models except:
Select one:
a. e-tailers.
b. exchanges.
c. e-procurement.
d. e-distributors.
________ refers to the ability to identify the person or entity with whom you are dealing on the
Internet.
Select one:
a. Nonrepudiation
b. Integrity
c. Availability
d. Authenticity
Which of the following gives a business model the most credibility with outside investors?
Select one:
a. the firm's market strategy
b. the firm's market opportunity
c. the firm's value proposition
d. the firm's management team
All of the following can be considered a direct or indirect competitor of Amazon except:
Select one:
a. Apple's iTunes Store.
b. eBay.
c. Walmart.
d. Starbucks.
The business model of e-tailers is quite similar to that of:
Select one:
a. e-distributors.
b. transaction brokers.
c. service providers.
d. exchanges.
Which of the following is the core communications protocol for the Internet?
Select one:
a. TCP/IP
b. FTP
c. TLS
d. Telnet
Which of the following is a Web application that enables Internet users to communicate with
each other, although not in real time?
Select one:
a. SMS messaging
b. VoIP
c. mobile messaging
d. online forum
A(n) ________ is a Web application that allows users to easily add and edit content on a
Web page.
Select one:
a. blog
b. RSS feed
c. wiki
d. podcast
Which of the following technologies has enabled the Internet to grow exponentially to
support millions of users, without overloading the network architecture?
Select one:
a. client/server computing
b. Wi-Fi
c. IPv6
d. fiber optics
What is the most frequent cause of stolen credit cards and card information today?
Select one:
a. the hacking and looting of corporate servers storing credit card information
b. sniffing programs
c. lost cards
d. phishing attacks
Approximately ________ of the Internet population in the United States reads magazines
online.
Select one:
a. one-quarter
b. three-quarters
c. one-half
d. one-third
Which of the following was the top online video site in 2015 in terms of number of viewers?
Select one:
a. Facebook
b. Yahoo Sites
c. AOL
d. Google Sites
The leading merchants of digital games are Apple's App Store and:
Select one:
a. the Google Play store.
b. Twitch.tv.
c. Xbox.
d. Amazon Digital.
Which of the following statements about the newspaper industry is not true?
Select one:
a. Online readership of newspapers is increasing.
b. The growth of the mobile platform and social networks has potential to lessen the
disruption of the newspaper industry.
c. Newspaper circulation revenues have declined by 10% since 2000.
d. The emergence of search engines such as Google has had a major impact on the
newspaper industry.
Software that is used to obtain private user information such as a user's keystrokes or
copies of e-mail is referred to as:
Select one:
a. spyware.
b. browser parasite.
c. adware.
d. a backdoor.
https://quizlet.com/vn/585398570/e-commerce-chapter-1-flash-cards/?
fbclid=IwAR0vrGQXEAVVKZ9_UiVc46xEj09D4LOsfrf59xjox4LEQW5ZsgaNHhAhoEc
https://quizlet.com/208891241/ecommerce-chapter-5-quiz-1-flash-cards/?
fbclid=IwAR38O3WJkBQfQ44hxTznOumPiOLbr97PV1POm6SYQqYdyE6naXYSsl7l6PQ
https://quizlet.com/538504833/csis-1010-chapter-10-quiz-flash-cards/?fbclid=IwAR03LUF19-
quNrl2zBjOacRcUtyRNxtF-BGCZwWLFNCizFxXfmnFRA9p-lg
https://quizlet.com/213409928/e-commerce-chapter-3-flash-cards/?fbclid=IwAR2Xz-
oPMe0JGNNzDKVk9YGxxpRmX6OEcDw_JZPKOyWbce8rxADq0GPIXac
https://quizlet.com/80165093/topic-2-flash-cards/?
fbclid=IwAR1jGHXfZpT7TdfasyuxJhiGw0HUWjtB5wu--NDLlFg7gU4ou8JsJHT1Rz0
https://quizlet.com/213548285/e-commerce-chapter-2-matching-flash-cards/?
fbclid=IwAR1Np2PYQrmnP2yJlKCVnyVjdDakni69rIQaYfz9BWMPjHWXubRrGt1ukT4