Multiple Choice Identify the choice that best completes the
statement or answers the question.
|
|
1.
|
The term ____ describes the process of hiding information within another piece
of information.
a) | steganography | c) | ACL | b) | decryption | d) | firewall |
|
|
2.
|
The ____ rate of an advertising method is the percentage of recipients who
respond to an ad or promotion.
a) | trigger | c) | conversion | b) | retention | d) | click-through |
|
|
3.
|
Hiring another company to provide the outside support for all or part of a
project is called ____.
a) | fast venturing | c) | portfolio managing | b) | outsourcing | d) | personalizing |
|
|
4.
|
Any act or object that poses a danger to computer assets is known as a(n)
____.
a) | threat | c) | risk | b) | damage | d) | accident |
|
|
5.
|
The marketing strategy that includes the practice of sending e-mail messages to
people who have requested information on a particular topic or product is part of ____
marketing.
a) | conversion | c) | permission | b) | passive | d) | active |
|
|
6.
|
Which of the following refers to preventing unauthorized data
modification?
a) | necessity | c) | secrecy | b) | completeness | d) | integrity |
|
|
7.
|
Originally, the term ____ was used to describe a dedicated programmer who
enjoyed writing complex code that tested the limits of technology.
a) | hacker | c) | wardriver | b) | eavesdropper | d) | cracker |
|
|
8.
|
Which of the following is the electronic defacing of an existing Web
site’s page?
a) | steganography | c) | cybervandalism | b) | encryption | d) | cybersquatting |
|
|
9.
|
One of the key elements of a brand is ____.
a) | style | c) | marketspace | b) | perceived value | d) | micromarketing |
|
|
10.
|
____ is the protection of computer assets from unauthorized access, use,
alteration, or destruction.
a) | Computer security | c) | Computer risk | b) | Digital signature | d) | Computer damage |
|
|
11.
|
____ is digital cash minted by a company instead of by a government.
a) | Virtual signal | c) | Electronic signal | b) | Scrip | d) | Digital signal |
|
|
12.
|
Companies that use ____ branding offer to help Web users in some way in exchange
for their viewing an ad.
a) | perceived | c) | emotional | b) | permitted | d) | rational |
|
|
13.
|
International Data Corporation and Gartner, Inc. both estimated that the cost
for a large company to build and implement an adequate entry-level electronic commerce site was about
____.
a) | $2 million | c) | $1 million | b) | $3 million | d) | $500,000 |
|
|
14.
|
A(n) ____ occurs when a visitor requests a page from the Web site.
a) | visit | c) | page access | b) | index | d) | page load |
|
|
15.
|
A(n) ____ is a formal review of a project after it is up and running.
a) | system review | c) | network review | b) | team review | d) | postimplementation
audit |
|
|
16.
|
The pricing metric for measuring Web site advertising is ____.
|
|
17.
|
A(n) ____ attack occurs when hundreds or even thousands of people each send a
message to a particular address.
a) | e-mail | c) | nuisance | b) | mail bomb | d) | mass mail |
|
|
18.
|
The first time that a particular visitor loads a Web site page is called a(n)
____.
a) | repeat visit | c) | page visit | b) | trial visit | d) | fresh visit |
|
|
19.
|
____ is pretending to be someone you are not or representing a Web site as an
original when it is really a fake.
a) | Warchalking | c) | Hash coding | b) | Spoofing | d) | Cybersquatting |
|
|
20.
|
Some Web pages have banner ads that continue to load and reload as long as the
page is open in the visitor’s Web browser. Each time the banner ad loads is a(n) ____.
a) | impression | c) | view | b) | click | d) | count |
|
|
21.
|
A(n) ____ carries no spending limit, and the entire amount charged to the card
is due at the end of the billing period.
a) | smart card | c) | debit card | b) | credit card | d) | charge card |
|
|
22.
|
When a visitor clicks a banner ad to open the advertiser's page, that
action is called a(n) ____.
a) | click-through | c) | click-on | b) | banner access | d) | impression |
|
|
23.
|
A(n) ____ is a type of virus that replicates itself on computers that it
infects.
a) | session | c) | message digest | b) | worm | d) | cookie |
|
|
24.
|
____ is a criminal act in which the perpetrator gathers personal information
about a victim and then uses that information to obtain credit.
a) | Identity theft | c) | Due diligence | b) | Money laundering | d) | Pharming |
|
|
25.
|
A method for calculating affiliate commissions based on the number of visitors
converted to customers is a(n) ____.
a) | life-cycle model | c) | click-through model | b) | click model | d) | pay-per-conversion
model |
|
|
26.
|
____ ads generate graphical activity that "float" over the Web page
instead of opening in a separate window.
a) | Active | c) | Pop-up | b) | Float | d) | Interstitial |
|
|
27.
|
A(n) ____ is a stored-value card that is a plastic card with an embedded
microchip that can store information.
a) | charge card | c) | credit card | b) | smart card | d) | debit card |
|
|
28.
|
The ____ of an electronic commerce implementation includes the costs of
hardware, software, design work outsourced, salaries and benefits for employees involved in the
project, and the cost of maintaining the site once it is operational.
a) | change management cost | c) | TCO | b) | Web site cost | d) | opportunity
cost |
|
|
29.
|
The term ____ payment refers to all payments of less than $10.
a) | mini | c) | small | b) | minitransaction | d) | microtransaction |
|
|
30.
|
Electronic cash ____ means that it must be freely transferable between any two
parties.
a) | transparency | c) | portability | b) | convenience | d) | independence |
|
|
31.
|
A large banner ad called a(n) ____ is designed to be placed on the side of a Web
page and remain visible as the user scrolls down the page.
a) | scroll ad | c) | vertical banner | b) | tower ad | d) | skyscraper ad |
|
|
32.
|
One group of active Internet users, ____, are intensive users of chat rooms,
instant messaging services, electronic greeting card sites, and Web-based e-mail.
a) | connectors | c) | surfers | b) | routiners | d) | sportsters |
|
|
33.
|
____ is a technique for committing fraud against the customers of online
businesses.
a) | Money laundering | c) | Phishing expedition | b) | Chargeback | d) | Due diligence |
|
|
34.
|
A(n) ____ is a program hidden inside another program or Web page that masks its
true purpose.
a) | Trojan horse | c) | mask program | b) | hidden route | d) | insider program |
|
|
35.
|
Which of the following is a person or device that is able to listen in on and
copy Internet transmissions?
a) | dropper | c) | listener | b) | controller | d) | eavesdropper |
|
|
36.
|
The greatest advantage of using payment cards is their ____.
a) | worldwide acceptance | c) | nice-looking features | b) | billing
methods | d) | high
technology |
|
|
37.
|
The ____ should be a member of the internal team that sets the objectives for
the project.
a) | business manager | c) | application specialist | b) | account
manager | d) | project
manager |
|
|
38.
|
____ is the protection of individual rights to nondisclosure.
a) | Secrecy | c) | Security | b) | Sensitivity | d) | Privacy |
|
|
39.
|
____ cards are by far the most popular form of consumer electronic payment
online.
a) | Smart | c) | Scrip | b) | Credit | d) | Internet |
|
|
40.
|
____ design and write the underlying code for dynamic database-driven Web
pages.
a) | Content editors | c) | Content creators | b) | Web programmers | d) | Web graphics
designers |
|
|
41.
|
A(n) ____ coordinates ad sharing so that other sites run one company’s ad
while that company’s site runs other exchange members’ ads.
a) | banner replacement network | c) | banner discount
network | b) | banner link network | d) | banner exchange network |
|
|
42.
|
____ security includes tangible protection devices, such as alarms, guards,
fireproof doors, security fences, safes or vaults, and bombproof buildings.
a) | Standard | c) | General | b) | Logical | d) | Physical |
|
|
43.
|
A(n) ____ only purpose is to provide a way for a Web site to place cookies on a
visitor’s computer.
a) | ACL’s | c) | Web bug’s | b) | digital ID’s | d) | gateway
server’s |
|
|
44.
|
____ refers to programs that are embedded transparently in Web pages and that
cause action to occur.
a) | Action page | c) | Activity control | b) | Active content | d) | Home page |
|
|
45.
|
Which of the following has the advantages of being independent and
portable?
a) | paper check | c) | credit card | b) | electronic check | d) | electronic cash |
|