Name:     ID: 
 
Email: 

ADMI3315 SECOND PARTIAL TEST CHAPTERS 4, 10, 11 & 12

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

One group of active Internet users, ____, are intensive users of chat rooms, instant messaging services, electronic greeting card sites, and Web-based e-mail.
a.
routiners
c.
connectors
b.
surfers
d.
sportsters
 

 2. 

____ is the protection of individual rights to nondisclosure.
a.
Secrecy
c.
Sensitivity
b.
Security
d.
Privacy
 

 3. 

Companies that use ____ branding offer to help Web users in some way in exchange for their viewing an ad.
a.
perceived
c.
rational
b.
permitted
d.
emotional
 

 4. 

Which of the following has the advantages of being independent and portable?
a.
electronic check
c.
electronic cash
b.
paper check
d.
credit card
 

 5. 

____ is pretending to be someone you are not or representing a Web site as an original when it is really a fake.
a.
Spoofing
c.
Cybersquatting
b.
Warchalking
d.
Hash coding
 

 6. 

____ is a technique for committing fraud against the customers of online businesses.
a.
Chargeback
c.
Money laundering
b.
Phishing expedition
d.
Due diligence
 

 7. 

Electronic cash ____ means that it must be freely transferable between any two parties.
a.
independence
c.
convenience
b.
portability
d.
transparency
 

 8. 

A(n) ____ is a formal review of a project after it is up and running.
a.
network review
c.
postimplementation audit
b.
team review
d.
system review
 

 9. 

____ cards are by far the most popular form of consumer electronic payment online.
a.
Smart
c.
Credit
b.
Scrip
d.
Internet
 

 10. 

A(n) ____ is a program hidden inside another program or Web page that masks its true purpose.
a.
insider program
c.
mask program
b.
hidden route
d.
Trojan horse
 

 11. 

Which of the following is the electronic defacing of an existing Web site’s page?
a.
cybervandalism
c.
cybersquatting
b.
encryption
d.
steganography
 

 12. 

Any act or object that poses a danger to computer assets is known as a(n) ____.
a.
risk
c.
accident
b.
damage
d.
threat
 

 13. 

The marketing strategy that includes the practice of sending e-mail messages to people who have requested information on a particular topic or product is part of ____ marketing.
a.
passive
c.
conversion
b.
permission
d.
active
 

 14. 

A method for calculating affiliate commissions based on the number of visitors converted to customers is a(n) ____.
a.
click-through model
c.
pay-per-conversion model
b.
click model
d.
life-cycle model
 

 15. 

____ design and write the underlying code for dynamic database-driven Web pages.
a.
Web programmers
c.
Content creators
b.
Content editors
d.
Web graphics designers
 

 16. 

A(n) ____ occurs when a visitor requests a page from the Web site.
a.
index
c.
visit
b.
page access
d.
page load
 

 17. 

A(n) ____ attack occurs when hundreds or even thousands of people each send a message to a particular address.
a.
e-mail
c.
mass mail
b.
mail bomb
d.
nuisance
 

 18. 

The ____ rate of an advertising method is the percentage of recipients who respond to an ad or promotion.
a.
retention
c.
trigger
b.
conversion
d.
click-through
 

 19. 

____ is the protection of computer assets from unauthorized access, use, alteration, or destruction.
a.
Computer risk
c.
Computer security
b.
Computer damage
d.
Digital signature
 

 20. 

The pricing metric for measuring Web site advertising is ____.
a.
ACT
c.
CME
b.
CEM
d.
CPM
 

 21. 

Hiring another company to provide the outside support for all or part of a project is called ____.
a.
outsourcing
c.
portfolio managing
b.
personalizing
d.
fast venturing
 

 22. 

A(n) ____ carries no spending limit, and the entire amount charged to the card is due at the end of the billing period.
a.
smart card
c.
credit card
b.
debit card
d.
charge card
 

 23. 

The term ____ payment refers to all payments of less than $10.
a.
small
c.
microtransaction
b.
minitransaction
d.
mini
 

 24. 

A(n) ____ is a stored-value card that is a plastic card with an embedded microchip that can store information.
a.
charge card
c.
smart card
b.
debit card
d.
credit card
 

 25. 

A(n) ____ only purpose is to provide a way for a Web site to place cookies on a visitor’s computer.
a.
Web bug’s
c.
ACL’s
b.
digital ID’s
d.
gateway server’s
 

 26. 

____ ads generate graphical activity that "float" over the Web page instead of opening in a separate window.
a.
Float
c.
Active
b.
Interstitial
d.
Pop-up
 

 27. 

One of the key elements of a brand is ____.
a.
perceived value
c.
micromarketing
b.
style
d.
marketspace
 

 28. 

The first time that a particular visitor loads a Web site page is called a(n) ____.
a.
page visit
c.
repeat visit
b.
trial visit
d.
fresh visit
 

 29. 

The ____ should be a member of the internal team that sets the objectives for the project.
a.
business manager
c.
account manager
b.
project manager
d.
application specialist
 

 30. 

____ security includes tangible protection devices, such as alarms, guards, fireproof doors, security fences, safes or vaults, and bombproof buildings.
a.
Physical
c.
Standard
b.
General
d.
Logical
 

 31. 

Some Web pages have banner ads that continue to load and reload as long as the page is open in the visitor’s Web browser. Each time the banner ad loads is a(n) ____.
a.
impression
c.
click
b.
view
d.
count
 

 32. 

The ____ of an electronic commerce implementation includes the costs of hardware, software, design work outsourced, salaries and benefits for employees involved in the project, and the cost of maintaining the site once it is operational.
a.
TCO
c.
Web site cost
b.
opportunity cost
d.
change management cost
 

 33. 

Which of the following is a person or device that is able to listen in on and copy Internet transmissions?
a.
dropper
c.
controller
b.
listener
d.
eavesdropper
 

 34. 

Originally, the term ____ was used to describe a dedicated programmer who enjoyed writing complex code that tested the limits of technology.
a.
wardriver
c.
cracker
b.
hacker
d.
eavesdropper
 

 35. 

A large banner ad called a(n) ____ is designed to be placed on the side of a Web page and remain visible as the user scrolls down the page.
a.
tower ad
c.
skyscraper ad
b.
scroll ad
d.
vertical banner
 

 36. 

International Data Corporation and Gartner, Inc. both estimated that the cost for a large company to build and implement an adequate entry-level electronic commerce site was about ____.
a.
$1 million
c.
$500,000
b.
$3 million
d.
$2 million
 

 37. 

____ is digital cash minted by a company instead of by a government.
a.
Scrip
c.
Digital signal
b.
Electronic signal
d.
Virtual signal
 

 38. 

The term ____ describes the process of hiding information within another piece of information.
a.
decryption
c.
ACL
b.
steganography
d.
firewall
 

 39. 

Which of the following refers to preventing unauthorized data modification?
a.
integrity
c.
necessity
b.
completeness
d.
secrecy
 

 40. 

____ is a criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit.
a.
Pharming
c.
Identity theft
b.
Due diligence
d.
Money laundering
 

 41. 

When a visitor clicks a banner ad to open the advertiser's page, that action is called a(n) ____.
a.
impression
c.
click-on
b.
click-through
d.
banner access
 

 42. 

A(n) ____ coordinates ad sharing so that other sites run one company’s ad while that company’s site runs other exchange members’ ads.
a.
banner replacement network
c.
banner exchange network
b.
banner link network
d.
banner discount network
 

 43. 

____ refers to programs that are embedded transparently in Web pages and that cause action to occur.
a.
Activity control
c.
Active content
b.
Home page
d.
Action page
 

 44. 

The greatest advantage of using payment cards is their ____.
a.
high technology
c.
billing methods
b.
nice-looking features
d.
worldwide acceptance
 

 45. 

A(n) ____ is a type of virus that replicates itself on computers that it infects.
a.
worm
c.
cookie
b.
session
d.
message digest
 



 
         Start Over