Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Question
An enterprise license is also known as a(n) ________ license.A) shrink-wrap
B) volume
C) click-wrap
D) shareware
E) implied
Answer
This answer is hidden. It contains 1 characters.
Related questions
Q:
Electronic commerce is limited to transactions between businesses and consumers, which is known as business-to-consumer (B2C) EC.
Q:
Ben buys a camera from Xenthix which starts malfunctioning, as the camera fell down from his hand and broke its lens. When he opts for an exchange, the customer representative says that an exchange or repair is not possible because the damage is of a physical nature and not covered under warranty. Which of the following consequences, if true, would be an example of consumer-to-consumer electronic commerce?
A) Ben sells the camera to Balvinder Singh on Iora.com.
B) Ben files an online suit against Xenthix.
C) Ben files a complaint on Xenthix's Web site asking for a refund.
D) Ben buys another camera from Xenthix's online store.
E) Ben sells the camera to the world's largest used camera dealer Koenister.com.
Q:
The form of electronic commerce that is used by organizations to conduct business with business partners without involving the end consumer is known as ________ electronic commerce.
A) business-to-consumer
B) peer-to-peer
C) business-to-business
D) business-to-intermediary
E) business-to-supplier
Q:
Data centers managed by a third party that rents out space to multiple organizational customers are known as ________.
A) collocation facilities
B) multi-bay stations
C) serial port facilities
D) data ease facilities
E) datahub stations
Q:
Which of the following statements is true about an IP address?
A) The format of an IP address is a 64-bit numeric address.
B) It is written as eight numbers separated by periods.
C) Each number separated by periods can have any number between 0 and 999.
D) It can be used to navigate to particular Web addresses.
E) It is written as a number with a period at the end.
Q:
The suffix ".org" is reserved for ________.
A) governmental entities
B) commercial organizations
C) network organizations
D) educational institutions
E) non-profit organizations
Q:
Web servers process user requests for pages using the ________.
A) Hypertext Transfer Protocol
B) TOC Protocol
C) Address Resolution Protocol
D) Dynamic Host Configuration Protocol
E) Trivial File Transfer Protocol
Q:
The standard method of specifying the format of Web pages is called ________.
A) Structured Query Language (SQL)
B) Practical Extraction and Report Language (PERL)
C) Extensible Markup Language (XML)
D) Assembly Language (AL)
E) Hypertext Markup Language (HTML)
Q:
Which of the following features of the Web contains not only information but also references or links to other documents?
A) proxy server
B) Web ring
C) hypertext
D) codec
E) domain name
Q:
A ________ is a software application that can be used to locate and display Web pages, including text, graphics, and multimedia content.
A) Webcam
B) keylogger
C) proxy server
D) Web browser
E) Webmaster
Q:
The ________ is a system of interlinked documents on the Internet, or a graphical user interface to the Internet that provides users with a simple, consistent interface to access a wide variety of information.
A) private branch exchange
B) World Wide Web
C) point to point protocol
D) Media Access Control Address
E) parameter random access memory
Q:
Which of the following computer networks is used for providing wireless communication between devices, using technologies such as Bluetooth?
A) personal area network
B) storage area network
C) campus area network
D) metropolitan area network
E) body sensor network
Q:
Spyware is electronic junk mail or junk newsgroup postings usually posted for the purpose of advertising some product and/or service.
Q:
Logic bombs are variations of a worm that can reproduce themselves to disrupt the normal functioning of a computer.
Q:
The term social engineering refers to misrepresenting oneself to trick others into revealing information.
Q:
________ refers to offering stolen proprietary software for free over the Internet.
A) Bot herding
B) Warez peddling
C) Spam filtering
D) Viral marketing
E) Spear phishing
Q:
________ are false messages circulated online about new viruses, earthquakes, kids in trouble, cancer causes, or any other topic of public interest.
A) Internet hoaxes
B) Honeypots
C) Cookies
D) Logic bombs
E) Malware
Q:
A(n) ________ typically consists of a distorted image displaying a combination of letters and/or numbers that a user has to input into a form before submitting it.
A) American Standard Code for Information Interchange (ASCII)
B) Comprehensive TeX Archive Network (CTAN)
C) Entity-Relationship Diagram (ERD)
D) Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)
E) Organization for the Advancement of Structured Information Standards (OASIS)
Q:
When using Yahoo Messenger, Roger gets an unsolicited advertisement from a company. The advertisement contains a link to connect to the merchant's Web site. Which of the following is the most suitable way of describing this type of advertisement?
A) adware
B) cookie
C) Internet hoax
D) spam
E) cyber squatting
Q:
Computers that are located in homes, schools, and businesses are infected with viruses or worms to create armies of zombie computers to execute ________ attacks.
A) digital marketing
B) malware
C) adware
D) denial-of-service
E) product-as-service
Q:
When Shelly downloaded an arcade game from an unknown Internet Web site, an unauthorized connection unknown to Shelly was established with her computer. The arcade game is most likely to be ________.
A) spyware
B) a worm
C) adware
D) a Trojan horse
E) encryption
Q:
Ronald downloads a movie from the Internet onto his company's computer. During this process, his system gets infected with a virus. The virus spreads rapidly in the company's network causing the server to crash. This type of virus is most likely to be ________.
A) adware
B) phishing mail
C) spam
D) a worm
E) a Trojan horse
Q:
Identify a true statement about a vulnerability scanner.
A) It analyzes network traffic and captures unencrypted passwords.
B) It presents a view of long-term technology integration.
C) It tests targeted systems for weaknesses.
D) It presents a view of short-term technology integration.
E) It ensures high-quality leads when a search is conducted online.
Q:
What is a request for proposal (RFP)? What areas does a request for proposal cover?
Q:
In a basic relationship, the buyer and the supplier set preferences and prices to benefit each other.
Q:
A request for proposal (RFP) is sent to buyers who might potentially be interested in buying hardware and/or software for the system.
Q:
________ licenses are activated as soon as the packaging of the software has been removed.
A) Click-wrap
B) Shareware
C) Shrink-wrap
D) Volume
E) Implied
Q:
Corrective maintenance involves making changes to an information system to evolve its functionality, to accommodate changing business needs, or to migrate it to a different operating environment.
Q:
Data flows represent the movement of data through an organization or within an information system.
Q:
Analysts interview people informed about the operation and issues of the current or proposed system.