Multiple Choice Identify the choice that best completes the
statement or answers the question.
|
|
1.
|
One group of active Internet users, ____, are intensive users of chat rooms,
instant messaging services, electronic greeting card sites, and Web-based e-mail.
a. | routiners | c. | connectors | b. | surfers | d. | sportsters |
|
|
2.
|
____ is the protection of individual rights to nondisclosure.
a. | Secrecy | c. | Sensitivity | b. | Security | d. | Privacy |
|
|
3.
|
Companies that use ____ branding offer to help Web users in some way in exchange
for their viewing an ad.
a. | perceived | c. | rational | b. | permitted | d. | emotional |
|
|
4.
|
Which of the following has the advantages of being independent and
portable?
a. | electronic check | c. | electronic cash | b. | paper check | d. | credit card |
|
|
5.
|
____ is pretending to be someone you are not or representing a Web site as an
original when it is really a fake.
a. | Spoofing | c. | Cybersquatting | b. | Warchalking | d. | Hash coding |
|
|
6.
|
____ is a technique for committing fraud against the customers of online
businesses.
a. | Chargeback | c. | Money laundering | b. | Phishing expedition | d. | Due diligence |
|
|
7.
|
Electronic cash ____ means that it must be freely transferable between any two
parties.
a. | independence | c. | convenience | b. | portability | d. | transparency |
|
|
8.
|
A(n) ____ is a formal review of a project after it is up and running.
a. | network review | c. | postimplementation audit | b. | team
review | d. | system
review |
|
|
9.
|
____ cards are by far the most popular form of consumer electronic payment
online.
a. | Smart | c. | Credit | b. | Scrip | d. | Internet |
|
|
10.
|
A(n) ____ is a program hidden inside another program or Web page that masks its
true purpose.
a. | insider program | c. | mask program | b. | hidden route | d. | Trojan horse |
|
|
11.
|
Which of the following is the electronic defacing of an existing Web
site’s page?
a. | cybervandalism | c. | cybersquatting | b. | encryption | d. | steganography |
|
|
12.
|
Any act or object that poses a danger to computer assets is known as a(n)
____.
a. | risk | c. | accident | b. | damage | d. | threat |
|
|
13.
|
The marketing strategy that includes the practice of sending e-mail messages to
people who have requested information on a particular topic or product is part of ____
marketing.
a. | passive | c. | conversion | b. | permission | d. | active |
|
|
14.
|
A method for calculating affiliate commissions based on the number of visitors
converted to customers is a(n) ____.
a. | click-through model | c. | pay-per-conversion model | b. | click
model | d. | life-cycle
model |
|
|
15.
|
____ design and write the underlying code for dynamic database-driven Web
pages.
a. | Web programmers | c. | Content creators | b. | Content editors | d. | Web graphics
designers |
|
|
16.
|
A(n) ____ occurs when a visitor requests a page from the Web site.
a. | index | c. | visit | b. | page access | d. | page load |
|
|
17.
|
A(n) ____ attack occurs when hundreds or even thousands of people each send a
message to a particular address.
a. | e-mail | c. | mass mail | b. | mail bomb | d. | nuisance |
|
|
18.
|
The ____ rate of an advertising method is the percentage of recipients who
respond to an ad or promotion.
a. | retention | c. | trigger | b. | conversion | d. | click-through |
|
|
19.
|
____ is the protection of computer assets from unauthorized access, use,
alteration, or destruction.
a. | Computer risk | c. | Computer security | b. | Computer damage | d. | Digital
signature |
|
|
20.
|
The pricing metric for measuring Web site advertising is ____.
|
|
21.
|
Hiring another company to provide the outside support for all or part of a
project is called ____.
a. | outsourcing | c. | portfolio managing | b. | personalizing | d. | fast venturing |
|
|
22.
|
A(n) ____ carries no spending limit, and the entire amount charged to the card
is due at the end of the billing period.
a. | smart card | c. | credit card | b. | debit card | d. | charge card |
|
|
23.
|
The term ____ payment refers to all payments of less than $10.
a. | small | c. | microtransaction | b. | minitransaction | d. | mini |
|
|
24.
|
A(n) ____ is a stored-value card that is a plastic card with an embedded
microchip that can store information.
a. | charge card | c. | smart card | b. | debit card | d. | credit card |
|
|
25.
|
A(n) ____ only purpose is to provide a way for a Web site to place cookies on a
visitor’s computer.
a. | Web bug’s | c. | ACL’s | b. | digital ID’s | d. | gateway
server’s |
|
|
26.
|
____ ads generate graphical activity that "float" over the Web page
instead of opening in a separate window.
a. | Float | c. | Active | b. | Interstitial | d. | Pop-up |
|
|
27.
|
One of the key elements of a brand is ____.
a. | perceived value | c. | micromarketing | b. | style | d. | marketspace |
|
|
28.
|
The first time that a particular visitor loads a Web site page is called a(n)
____.
a. | page visit | c. | repeat visit | b. | trial visit | d. | fresh visit |
|
|
29.
|
The ____ should be a member of the internal team that sets the objectives for
the project.
a. | business manager | c. | account manager | b. | project manager | d. | application
specialist |
|
|
30.
|
____ security includes tangible protection devices, such as alarms, guards,
fireproof doors, security fences, safes or vaults, and bombproof buildings.
a. | Physical | c. | Standard | b. | General | d. | Logical |
|
|
31.
|
Some Web pages have banner ads that continue to load and reload as long as the
page is open in the visitor’s Web browser. Each time the banner ad loads is a(n) ____.
a. | impression | c. | click | b. | view | d. | count |
|
|
32.
|
The ____ of an electronic commerce implementation includes the costs of
hardware, software, design work outsourced, salaries and benefits for employees involved in the
project, and the cost of maintaining the site once it is operational.
a. | TCO | c. | Web site cost | b. | opportunity cost | d. | change management
cost |
|
|
33.
|
Which of the following is a person or device that is able to listen in on and
copy Internet transmissions?
a. | dropper | c. | controller | b. | listener | d. | eavesdropper |
|
|
34.
|
Originally, the term ____ was used to describe a dedicated programmer who
enjoyed writing complex code that tested the limits of technology.
a. | wardriver | c. | cracker | b. | hacker | d. | eavesdropper |
|
|
35.
|
A large banner ad called a(n) ____ is designed to be placed on the side of a Web
page and remain visible as the user scrolls down the page.
a. | tower ad | c. | skyscraper ad | b. | scroll ad | d. | vertical banner |
|
|
36.
|
International Data Corporation and Gartner, Inc. both estimated that the cost
for a large company to build and implement an adequate entry-level electronic commerce site was about
____.
a. | $1 million | c. | $500,000 | b. | $3 million | d. | $2 million |
|
|
37.
|
____ is digital cash minted by a company instead of by a government.
a. | Scrip | c. | Digital signal | b. | Electronic signal | d. | Virtual signal |
|
|
38.
|
The term ____ describes the process of hiding information within another piece
of information.
a. | decryption | c. | ACL | b. | steganography | d. | firewall |
|
|
39.
|
Which of the following refers to preventing unauthorized data
modification?
a. | integrity | c. | necessity | b. | completeness | d. | secrecy |
|
|
40.
|
____ is a criminal act in which the perpetrator gathers personal information
about a victim and then uses that information to obtain credit.
a. | Pharming | c. | Identity theft | b. | Due diligence | d. | Money
laundering |
|
|
41.
|
When a visitor clicks a banner ad to open the advertiser's page, that
action is called a(n) ____.
a. | impression | c. | click-on | b. | click-through | d. | banner access |
|
|
42.
|
A(n) ____ coordinates ad sharing so that other sites run one company’s ad
while that company’s site runs other exchange members’ ads.
a. | banner replacement network | c. | banner exchange
network | b. | banner link network | d. | banner discount network |
|
|
43.
|
____ refers to programs that are embedded transparently in Web pages and that
cause action to occur.
a. | Activity control | c. | Active content | b. | Home page | d. | Action page |
|
|
44.
|
The greatest advantage of using payment cards is their ____.
a. | high technology | c. | billing methods | b. | nice-looking features | d. | worldwide
acceptance |
|
|
45.
|
A(n) ____ is a type of virus that replicates itself on computers that it
infects.
a. | worm | c. | cookie | b. | session | d. | message digest |
|