Name:     ID: 
 
Email: 

ADMI3315 SECOND PARTIAL TEST CHAPTERS 4, 10, 11 & 12

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

The term ____ describes the process of hiding information within another piece of information.
a)
steganography
c)
ACL
b)
decryption
d)
firewall
 

 2. 

The ____ rate of an advertising method is the percentage of recipients who respond to an ad or promotion.
a)
trigger
c)
conversion
b)
retention
d)
click-through
 

 3. 

Hiring another company to provide the outside support for all or part of a project is called ____.
a)
fast venturing
c)
portfolio managing
b)
outsourcing
d)
personalizing
 

 4. 

Any act or object that poses a danger to computer assets is known as a(n) ____.
a)
threat
c)
risk
b)
damage
d)
accident
 

 5. 

The marketing strategy that includes the practice of sending e-mail messages to people who have requested information on a particular topic or product is part of ____ marketing.
a)
conversion
c)
permission
b)
passive
d)
active
 

 6. 

Which of the following refers to preventing unauthorized data modification?
a)
necessity
c)
secrecy
b)
completeness
d)
integrity
 

 7. 

Originally, the term ____ was used to describe a dedicated programmer who enjoyed writing complex code that tested the limits of technology.
a)
hacker
c)
wardriver
b)
eavesdropper
d)
cracker
 

 8. 

Which of the following is the electronic defacing of an existing Web site’s page?
a)
steganography
c)
cybervandalism
b)
encryption
d)
cybersquatting
 

 9. 

One of the key elements of a brand is ____.
a)
style
c)
marketspace
b)
perceived value
d)
micromarketing
 

 10. 

____ is the protection of computer assets from unauthorized access, use, alteration, or destruction.
a)
Computer security
c)
Computer risk
b)
Digital signature
d)
Computer damage
 

 11. 

____ is digital cash minted by a company instead of by a government.
a)
Virtual signal
c)
Electronic signal
b)
Scrip
d)
Digital signal
 

 12. 

Companies that use ____ branding offer to help Web users in some way in exchange for their viewing an ad.
a)
perceived
c)
emotional
b)
permitted
d)
rational
 

 13. 

International Data Corporation and Gartner, Inc. both estimated that the cost for a large company to build and implement an adequate entry-level electronic commerce site was about ____.
a)
$2 million
c)
$1 million
b)
$3 million
d)
$500,000
 

 14. 

A(n) ____ occurs when a visitor requests a page from the Web site.
a)
visit
c)
page access
b)
index
d)
page load
 

 15. 

A(n) ____ is a formal review of a project after it is up and running.
a)
system review
c)
network review
b)
team review
d)
postimplementation audit
 

 16. 

The pricing metric for measuring Web site advertising is ____.
a)
ACT
c)
CEM
b)
CME
d)
CPM
 

 17. 

A(n) ____ attack occurs when hundreds or even thousands of people each send a message to a particular address.
a)
e-mail
c)
nuisance
b)
mail bomb
d)
mass mail
 

 18. 

The first time that a particular visitor loads a Web site page is called a(n) ____.
a)
repeat visit
c)
page visit
b)
trial visit
d)
fresh visit
 

 19. 

____ is pretending to be someone you are not or representing a Web site as an original when it is really a fake.
a)
Warchalking
c)
Hash coding
b)
Spoofing
d)
Cybersquatting
 

 20. 

Some Web pages have banner ads that continue to load and reload as long as the page is open in the visitor’s Web browser. Each time the banner ad loads is a(n) ____.
a)
impression
c)
view
b)
click
d)
count
 

 21. 

A(n) ____ carries no spending limit, and the entire amount charged to the card is due at the end of the billing period.
a)
smart card
c)
debit card
b)
credit card
d)
charge card
 

 22. 

When a visitor clicks a banner ad to open the advertiser's page, that action is called a(n) ____.
a)
click-through
c)
click-on
b)
banner access
d)
impression
 

 23. 

A(n) ____ is a type of virus that replicates itself on computers that it infects.
a)
session
c)
message digest
b)
worm
d)
cookie
 

 24. 

____ is a criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit.
a)
Identity theft
c)
Due diligence
b)
Money laundering
d)
Pharming
 

 25. 

A method for calculating affiliate commissions based on the number of visitors converted to customers is a(n) ____.
a)
life-cycle model
c)
click-through model
b)
click model
d)
pay-per-conversion model
 

 26. 

____ ads generate graphical activity that "float" over the Web page instead of opening in a separate window.
a)
Active
c)
Pop-up
b)
Float
d)
Interstitial
 

 27. 

A(n) ____ is a stored-value card that is a plastic card with an embedded microchip that can store information.
a)
charge card
c)
credit card
b)
smart card
d)
debit card
 

 28. 

The ____ of an electronic commerce implementation includes the costs of hardware, software, design work outsourced, salaries and benefits for employees involved in the project, and the cost of maintaining the site once it is operational.
a)
change management cost
c)
TCO
b)
Web site cost
d)
opportunity cost
 

 29. 

The term ____ payment refers to all payments of less than $10.
a)
mini
c)
small
b)
minitransaction
d)
microtransaction
 

 30. 

Electronic cash ____ means that it must be freely transferable between any two parties.
a)
transparency
c)
portability
b)
convenience
d)
independence
 

 31. 

A large banner ad called a(n) ____ is designed to be placed on the side of a Web page and remain visible as the user scrolls down the page.
a)
scroll ad
c)
vertical banner
b)
tower ad
d)
skyscraper ad
 

 32. 

One group of active Internet users, ____, are intensive users of chat rooms, instant messaging services, electronic greeting card sites, and Web-based e-mail.
a)
connectors
c)
surfers
b)
routiners
d)
sportsters
 

 33. 

____ is a technique for committing fraud against the customers of online businesses.
a)
Money laundering
c)
Phishing expedition
b)
Chargeback
d)
Due diligence
 

 34. 

A(n) ____ is a program hidden inside another program or Web page that masks its true purpose.
a)
Trojan horse
c)
mask program
b)
hidden route
d)
insider program
 

 35. 

Which of the following is a person or device that is able to listen in on and copy Internet transmissions?
a)
dropper
c)
listener
b)
controller
d)
eavesdropper
 

 36. 

The greatest advantage of using payment cards is their ____.
a)
worldwide acceptance
c)
nice-looking features
b)
billing methods
d)
high technology
 

 37. 

The ____ should be a member of the internal team that sets the objectives for the project.
a)
business manager
c)
application specialist
b)
account manager
d)
project manager
 

 38. 

____ is the protection of individual rights to nondisclosure.
a)
Secrecy
c)
Security
b)
Sensitivity
d)
Privacy
 

 39. 

____ cards are by far the most popular form of consumer electronic payment online.
a)
Smart
c)
Scrip
b)
Credit
d)
Internet
 

 40. 

____ design and write the underlying code for dynamic database-driven Web pages.
a)
Content editors
c)
Content creators
b)
Web programmers
d)
Web graphics designers
 

 41. 

A(n) ____ coordinates ad sharing so that other sites run one company’s ad while that company’s site runs other exchange members’ ads.
a)
banner replacement network
c)
banner discount network
b)
banner link network
d)
banner exchange network
 

 42. 

____ security includes tangible protection devices, such as alarms, guards, fireproof doors, security fences, safes or vaults, and bombproof buildings.
a)
Standard
c)
General
b)
Logical
d)
Physical
 

 43. 

A(n) ____ only purpose is to provide a way for a Web site to place cookies on a visitor’s computer.
a)
ACL’s
c)
Web bug’s
b)
digital ID’s
d)
gateway server’s
 

 44. 

____ refers to programs that are embedded transparently in Web pages and that cause action to occur.
a)
Action page
c)
Activity control
b)
Active content
d)
Home page
 

 45. 

Which of the following has the advantages of being independent and portable?
a)
paper check
c)
credit card
b)
electronic check
d)
electronic cash
 



 
         Start Over