Electronic Commerce
Q1. Statutory law is the part of British and U.S. law that is established by the history of court decisions that has accumulated over many years. a. true b. false Q2. It is possible for a seller to create explicit warranties, often unintentionally, by making statements in brochures about product performance or suitability for particular tasks. a. true b. false Q3. One of the major privacy controversies in the United States today is the opt-in vs. opt-out issue. a. true b. false Q4. ____ is a form of control over physical space and the people and objects that reside in that space, and is a defining characteristic of statehood. a. Ethics b. Culture c. Laws d. Power Q5. A(n) ____ can be formed by two or more parties that act as if a contract exists, even if no contract has been written and signed. a. offer b. implied contract c. consideration d. contract Q6. The physical boundary, when crossed, provides ____ that one set of rules has been replaced by a different set of rules. a. effect b. power c. notice d. legitimacy Q7. The Value Added Tax is the most common transfer tax used in the U.S. a. true b. false Q8. Disputes that arise when one person has registered a domain name that is an existing trademark or company name are settled by the ____. a. WIPO b. common law c. statutory law d. ACPA Q9. ____ are the dynamic page technologies that are available from Sun Microsystems. a. ASP b. PHP c. JSP d. HTTP Q10. A simple site that companies use to evaluate different Web designs is called a(n) ____. a. development site b. B2B site c. B2C site d. VPN site Q11. The decentralized architecture requires expensive computers and is more sensitive to the effects of technical problems. a. true b. false Q12. ____ allows the user to log on as a guest. a. Dynamic FTP b. Anonymous FTP c. Full-privilege FTP d. Guest FTP Q13. ____, developed by Microsoft, is a server-side scripting mechanism to build dynamic sites. a. ASP b. SQL c. ODBC d. Oracle Q14. A development site cannot reside on an existing PC running Web server software. a. true b. false Q15. ____ is electronic junk mail, also known as unsolicited commercial e-mail. a. Spam b. CGI c. VPN d. Java Q16. The centralized architecture spreads risk over a large number of servers. a. true b. false Q17. Good sites give buyers alternative ways to find products. a. true b. false Q18. ValueWeb is an example of a commerce service provider. a. true b. false Q19. Bigstep serves as the host for such sites as Kennedy Space Center Space Shop, The Sharper Image, PalmPilotGear, and Rolling Stone magazine. a. true b. false Q20. ____ software packages integrate all facets of a business, including planning, manufacturing, sales, and marketing. a. ERP b. UPS c. URL d. UDDI Q21. For a selling business, ____ software provides standard electronic commerce activities, such as secure transaction processing and fulfillment. a. midrange b. e-business c. Web hosting d. server-based Q22. ____ software is a type of software designed to help businesses manage the information in documents (rather then the documents themselves). a. Programming management b. Knowledge management c. Indexing management d. Information management Q23. A key element of the Web services approach is that programmers can write software that accesses certain units of business application logic without knowing the details of how each unit is implemented. a. true b. false Q24. The characteristics of the logic unit that make up specific Web services are described using the ____. a. WSDL b. UDDI c. W3C d. SOAP Q25. Worms can spread quickly through the Internet. a. true b. false Q26. An integrity violation implies a(n) secrecy violation. a. true b. false Q27. A(n) ____ key is used by an encryption algorithm to create cipher text from plain text during a single secure transmission. a. public b. session c. private d. backdoor Q28. Any message traveling on the Internet is subject to secrecy, integrity, and necessity violations. a. true b. false Q29. One of the oldest and best known CAs is Microsoft. a. true b. false Q30. Necessity refers to preventing data delays or denials (removal) within the context of computer security. a. true b. false Q31. ____ provides a way of hiding an encrypted file within another file so that a casual observer cannot detect that there is anything of importance in the container file. a. ACL b. Decryption c. Steganography d. Firewall Q32. Cookie Crusher controls cookies after they are stored on a user's hard drive. a. true b. false Q33. Online cash storage is the virtual equivalent of money kept in a wallet. a. true b. false Q34. Sending bills and receiving payments over the Internet can drop transaction cost to an average of 50 cents per bill. a. true b. false Q35. A(n) ____ bank is a bank that does business with sellers that want to accept payment cards. a. online b. merchant c. virtual d. broker Q36. InternetCash allows consumers to send money instantly and securely to anyone with an e-mail address. a. true b. false Q37. Research has shown that filling out forms ranks high on online customers' list of gripes about online shopping. a. true b. false Q38. A(n) ____ is a stored-value card that is a plastic card with an embedded microchip that can store information. a. credit card b. debit card c. charge card d. smart card Q39. The greatest advantage of using payment cards is their ____. a. high technology b. billing methods c. worldwide acceptance d. nice-looking features Q40. The term ____ payment refers to all payments of less than $10. a. mini b. small c. minitransaction d. microtransaction Q41. When a merchant accepts payment cards for online payment or for orders placed over the telephone, this is called card missing transactions because the merchant and the consumer locations are different. a. true b. false Q42. TCO techniques measure the amount of income that will be provided by a specific current expenditure. a. true b. false Q43. A(n) ____ is a person trained in art, layout, and composition and who also understands how Web pages are constructed. a. Content editor b. Web programmer c. Web graphics designer d. Content creator Q44. A(n) ____ is a formal review of a project after it is up and running. a. postimplementation audit b. team review c. system review d. network review Q45. A(n) ____ is a company that handles incoming customer telephone calls and e-mails for other clients. a. call center b. incubator c. ROI d. TCO Q46. The best way to manage any complex electronic commerce implementation is to use formal management techniques. a. true b. false Q47. Electronic commerce initiatives are, in general, more successful than other types of information systems initiatives. a. true b. false Q48. Most electronic commerce sites require some kind of ____ function to support activities such as transaction processing, order entry, inquiry management, or shipment logistics. a. audit b. database administration c. system administration d. call center Q49. ROI measurements can be biased in a way that gives undue weight to costs. a. true b. false Q50. Most changes in the cost of hardware are upward. a. true b. false