Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Management
Q:
A(n) _____ is usually a long binary number that is used with the encryption algorithm to "lock" the characters of the message being protected so that they are undecipherable without the number.
Q:
A(n) _____ is an attachment to an e-mail message or program embedded in a Web page that verifies that the sender or Web site is who it claims to be.
Q:
Browser _____ are programs that enhance the capabilities of browsers,handle Web content that a browser cannot handle.
Q:
A(n) _____ is a type of virus that replicates itself on thecomputers that it infects.
Q:
A(n) _____ is a Trojan horse that secretly takes over another computer for the purpose of launching attacks on other computers.
Q:
Most browsers allow users to limit theactions taken by Java applets and scripting languages by running them in a(n) _____,which is a functional subset of the full browser.
Q:
When a Trojan horse has taken over a large number of computers, the person who planted the virus can take control ofall the computers and form a(n) _____.
Q:
A(n) _____ cookie originates from a Web site other than the site being visited.
Q:
First-party cookies and third-party cookies represent classification of cookies by their _____.
Q:
Cookies are categorized as session or persistent based on _____.
Q:
Cookies placed on a client computer by a Web server site are called _____.
Q:
In the context of elements of a security policy, _____ refers to the secure identification of clients and servers with digital signatures and certificates.
Q:
The purpose of a(n) _____ is to disrupt normal computer processing, or deny processing entirely.
Q:
A(n) _____ occurs when an Internet e-mail message is intercepted and its contents are changed before it is forwarded to its original destination.
Q:
A(n) _____ is a procedure that recognizes, reduces, or eliminates a threat.
Q:
A _____ is an area of memory set aside to hold data read from a file or database.a. firewall b. cookiec. buffer d. worm
Q:
A _____ is a number thatsummarizes an encrypted information.a. digital certificate b. hash functionc. message digest d. hash algorithm
Q:
_____ encodes a message with an algorithm that uses a single numeric key to encode and decode data.a. Hash coding b. Symmetric encryptionc. Public-key encryption d. Decrypting
Q:
What is the purpose of supply chain management software?
Q:
What are the benefits of using a mall-style commerce service provider or a mall-style CSP ? What are the costs associated with them?
Q:
What is the difference between a static catalog and a dynamic catalog?
Q:
List at least five software components that large and complex electronic commerce sites can include in addition to a catalog display, shopping cart capabilities, and transaction processing.
Q:
What is the difference between shared hosting and dedicated hosting?
Q:
The practice of replacing a company's investment in computing equipment by selling Internet-based access to its own computing hardware and software is called _____.
Q:
The ways programs interconnect with each other over the Web are called as _____.
Q:
The _____ function of supply chain management software helps with tasks such as warehouse and transportation management.
Q:
The common format of the programs written for machine-to-machine communication using Web services was originally _____.
Q:
_____ is an open-source database product developed and maintained by a community of programmers on the Web.
Q:
Atom Publishing Protocol, which simplifies blog publishing, is a(n) _____ application.
Q:
A principle called _____ describes the way the Web uses networking architecture to identify and locate Web pages and the elements that make up those Web pages.
Q:
In the context of Web Services Specifications, the _____works as a sort of address book to identify the locations of Web services and theirassociated Web Services Description Language descriptions.
Q:
The design used by Web services that are built on the Representational State Transfer model is known as _____.
Q:
_____ uses simpler structures than SOAP protocols, often including an XML- or XHTML-tagged data set to implement Web services.
Q:
A general name for the ways programs interconnect with each other is _____.
Q:
Oracle and SAP are two major _____ vendors.
Q:
_____ application systems return pages generated by scripts that include the rules for presenting data on the Web page with the business logic.
Q:
The rules used in business based on which the actions that the application server software performs are determined are known as _____.
Q:
Making a company's information systems work together is called _____.
Q:
The rules a business establishes about its database structure, which are carefullythought out and take into account how the company does business are known as its _____.
Q:
A(n) _____ is a collection of information that is stored on a computer in a highly structured way.
Q:
A(n) _____ is a computerthat takes the request messages received by the Web server and runs applicationprograms that perform some kind of action based on the contents of the request messages.
Q:
A(n) _____ is a simple list written in Hyper Text Markup Language, HTML, that appears on a Web page or a series of Web pages.
Q:
The best hosting services provide Web server hardware and software combinations that are _____, which means they can be adapted to meet changing requirements when their clients grow.
Q:
The databases within the distributed information systems are known as _____.
Q:
A(n) _____ is a software that makes it easy for users to enter, edit, update, and retrieve information in the database.
Q:
_____ hosting means that the client's Web site is on a server that hosts other Web sites simultaneously and is operated by the service provider at its location.
Q:
The approach in which companies use their own servers and server software to do business online is known as _____.
Q:
_____ provide Internet access to companies and individuals.
Q:
Which of the following statements is true of knowledge management software?a. It helps an organization put away outdated information. b. It enhances the ability of users to collaborate among themselves.c. It does not include tools that read electronic documents. d. It does not provide users with a search functionality.
Q:
_____ is an example of an enterprise-class electronic software.a. Microsoft COM b. Sales Cartc. Oracle E-Business Suite d. Common Object Request Broker Architecture
Q:
_____ software typically provides tools for linking to and supporting supply activities.a. Enterprise-class b. Content managementc. Web hosting d. Knowledge management
Q:
Enterprise-class electronic commerce software:a. provides tools for supporting purchase activities. b. is restricted to small online businesses.c. requires a single computer to operate. d. runs devoid of a Web server system.
Q:
WebSphere Commerce Professional, a family of electronic commerce packages, is produced by _____.a. Microsoft b. Intelc. Oracle d. IBM
Q:
A _____ storesthe information about items in a database, usually on a separate computer that isaccessible to the server that is running the Web site itself.a. shopping cart software b. transaction processing softwarec. dynamic catalog d. middleware
Q:
_____ helps companies control the large amounts of text,graphics, and media files that have become crucial to doing business.a. Content management software b. Supply chain management softwarec. Operations management software d. Inventory tracking software
Q:
_____ provide small businesses with a basic Web site, online store design tools, storefront templates, and an easy-to-use interface.a. Mall-style CSPs b. Basic CSPsc. Suppliers of enterprise-class products d. Suppliers of Web development tools
Q:
_____ is used to describe the characteristics of the logic units that make up specific Web services.a. Web Services Description Language b. Universal Description, Discovery, and Integration Specificationc. Representational State Transfer d. Simple Object Access Protocol
Q:
_____ is a message-passing protocol that defines how to send marked-up data from one software application to another across a network.a. File Transfer Protocol b. Encryption Protocolc. Hypertext Transfer Protocol d. Simple Object Access Protocol
Q:
The W3C defines _____ as software systems that support interoperable machine-to-machine interaction over a network.a. offline transactions b. Web servicesc. credit transactions d. programming languages
Q:
In the context of electronic commerce, ERP is the acronym for _____.a. electronic record processing b. enterprise resource planningc. enterprise record provider d. electronic resource provider
Q:
_____ software packages are business systems that integrate all facets of a business, including accounting, logistics, manufacturing, marketing, planning, project management, and treasury functions.a. Enterprise resource planning b. Supply chain managementc. Data services d. Customer relationship management
Q:
A _____ application system separates the presentation logic from the business logic.a. page-based b. JSP-basedc. component-based d. PHP-based
Q:
A program transferring information from order entry systems in several different divisions to a single accountsreceivable is an example of _____.a. application integration b. data miningc. co-location d. interoperability
Q:
Application servers are usually grouped into two types: page-based and _____ systems.a. server-based b. component-basedc. script-based d. group-based
Q:
Large information systems that store the same data in many different physical locations are commonly called _____ information systems.a. centralized b. distributedc. stack-based d. server-centric
Q:
_____ occurs when the shopper proceeds to the virtual checkout counter by clicking a checkout button.a. Debugging b. Catalog displayc. Transcription d. Transaction processing
Q:
One way the shopping cart software stores information about specific shoppers and their purchases is by creating _____.a. Web logs b. cookiesc. IP addresses d. filters
Q:
HTTP messaging is a(n) _____ system which does not retain information from one transmission or session to another, thus shopping cart software must store information about specific shoppers and their purchases.a. stateless b. blockedc. unverifiable d. unidentifiable
Q:
In a shopping cart, clicking the checkout button usually displays a screen that asks for _____ and shipping information.a. stocking b. orderingc. billing d. sourcing
Q:
In the early days of electronic commerce, shoppers selected items they wanted to purchase by filling out online forms which required a shopper to _____.a. manually enter product descriptions b. place items into a shopping cartc. enter into a video chat with the vendor d. e-mail credit card information
Q:
A _____ is a listing of goods and services.a. tier b. bugc. catalog d. code
Q:
Commerce service providers are also called _____ service providers.a. hosting b. managedc. incubating d. liaisoning
Q:
_____ often offer Web server management and rent application software to businesses.
a. Middleware vendors b. Enterprise resource planning vendors
c. Database providers d. Commerce service providers
Q:
All companies create their own customer relations management software using outside consultants and their own IT staffs.
a. True
b. False
Q:
Supply chain management software performs two general types of functions: planning and execution.
a. True
b. False
Q:
Supply chain management planning software helps companies develop coordinated demand forecasts using information from each participant in the supply chain.
a. True
b. False
Q:
Knowledge management software helps companiespreserve the knowledge gained through the use of information so that future users canbenefit from the learning of current users.
a. True
b. False
Q:
IBM and Oracle provide content management software as components in other enterprise software packages.
a. True
b. False
Q:
The term "enterprise" is used in information systems to describe a system that serves multiple locations or divisions of one company and encompasses all areas of the business or enterprise.
a. True
b. False
Q:
A small commerce site can have a very simple static catalog.
a. True
b. False