Make your own free website on Tripod.com

ADMI 3315

THIRD PARTIAL TEST: FRIDAY, DECEMBER 10TH

CHAPTERS 7, 10 & 11

READ LEARNING FROM FAILURES: DOUBLECLICK FOR READING COMPREHENSION QUESTIONS

READ THE TEXTBOOK TO FIND DETAILED ANSWERS FOR THESE TOPICS

 

CHAPTER 7

         WEB BUSINESSES AND THE LAW

         STUDY DEFINITIONS SHOWN ON FIGURE 6-13

         JURISDICTION ON THE INTERNET (CAN IT BE ESTABLISHED?)

         LIST AND DESCRIBE THE ELEMENTS OF A CONTRACT

         WRITTEN CONTRACTS ON THE WEB

         STATUTE OF FRAUDS, WRITING, SIGNATURE

         WARRANTY DISCLAIMER

         TERMS OF SERVICE (ToS)

         WARRANTY DISCLAIMER

         INTELLECTUAL PROPERTY,COPYRIGHT (DEFINITION AND CONDITIONS)

         FAIR USE, VICARIOUS COPYRIGHT INFRINGEMENT, PATENT, BUSINES PROCESS PANTENT

         TRADEMARK INFRINGEMENT (READ THE WHOLE TOPIC)

         CYBERSQUATTING, NAME CHANGING

         DIGITAL WATERMARK

         PRODUCT DISPARAGEMENT

         EXCEPTION IN US LAW FOR DEFAMATION

         WHAT IS FTC? MAIN FUNCTIONS OF THE FTC.

         ONLINE CRIME: WHAT ARE THE MAIN OBSTACLES FACED BY LAW ENFORCEMENT AUTHORITIES?

         COMPARE OPT-IN VS OPT-OUT

         WHAT IS THE IMPORTANCE OF ETHICAL ISSUES FOR WEB BUSINESSES?

         PRINCIPLES FOR HANDLING CUSTOMER DATA

         MAIN PURPOSE OF COPPA

 

CHAPTER 10

         COMPUTER SECURITY, PHYSICAL SECURITY, LOGICAL SECURITY

         WHAT IS A THREAT?

         WHAT IS AN EAVESDROPPER?

         CRACKERS OR HACKERS, WHITE HAT HACKER VS BLACK HAT HACKER

         DESCRIBE THE CONCEPT COOKIES

         FIRST-PARTY VS THIRD-PARTY COOKIES

         WHAT IS A WEB BUG? THEY ARE ALSO KNOWN AS ___________ BECAUSE ____________

         TROJAN HORSE, ZOMBIE (TROJAN HORSE), WORM

         WHAT IS THE FUNCTION OF A DIGITAL CERTIFICATE?

         WHAT IS STEGANOGRAPHY?

         WHAT IS A BIOMETRIC SECURITY DEVICE?

         WHAT IS CYBERVANDALISM?

         WHAT IS PHISHING?

         WHAT ARE WARDRIVERS?

         WHAT IS A DICTIONARY ATTACK PROGRAM?

         WHAT IS A MAIL BOMB ATTACK?

         WHAT IS A FIREWALL?

 

CHAPTER 11

         MOST POPULAR USES OF ELECTRONIC TRANSFERS

         CREDIT CARD, DEBIT CARD, CHARGE CARD

         PAYMENT ACCEPTANCE AND PROCESSING (STEPS)

         ITEMS A NEW MERCHANT MUST SUPPLY WHEN APPLYING FOR A MERCHANT ACCOUNT

         WHAT IS E-CASH?

         2 MAIN MARKETS FOR E-CASH

         MICROPAYMENTS VS. SMALL PAYMENTS

         ADVANTAGES AND DISADVANTAGES (CONCERNS) OF ELECTRONIC CASH

         WHAT IS PAYPAL?

         ELECTRONIC WALLETS

         MAGNETIC STRIP CARDS

         SMART CARDS

         PHISHING ATTACKS (BASIC STRUCTURE AND COUNTERMEASURES)