444 Flashcards
1) In public key encryption the keys are mathematically related so that data encrypted with one key be decrypted using only the other key
True
2) In transaction fee revenue model, a company receives a fee for enabling or executing a transaction
True
3) DoS attacks are used to destroy information and access restricted areas of a company’s information system
False
Malicious software program, referred to as spyware, include a variety of threats, such as computer, viruses worms, and Trojan horse.
False
Malware
5) service provider creates revenue by providing digital Contant, such as an use, Music photos or video over the web
False
Content provider
6) the logical view of a database presents an interest agreeing to the user
False
7) Big data enables users to view the same data in different ways using multiple dimensions
False
OLAP
Which of the following companies is the market creator business model?
A) Haraj.com
B) Expedia
C) Extra.com
D) Google
A
9) which of the following dimensions of e-commerce technology, involves the integration of video, audio and text marketing messages into a single marketing message and consumer experience?
A) Ubiquity
B) Richness
C) Interactivity
D) Information density
B
10) Compared to traditional goods, digital goods have:
A) Lower cost of production
B) Higher marginal cost per unit
C) Equivalent copying costs
D) Lower distribution costs
A
11) which of the following is an example of the content provider, Internet business model?
A) Absher
B) Noon.com
C) Shahed.net
D) Facebook
C
Which of the following dimension of e-commerce technology has the potential to raise the quality of information?
A) Information density
B) Richness
C) Customization
D) Interactivity
A
13) supply chain management systems are considered to be an ___________ because they automate the flow of information across company boundaries.
A) KMS
B) enterprise system
C) MIS
D) Interorganizational system
D
Which of the following is not one of the unique features of e-commerce technology?
A) information density
B) transparency
C) richness
D) social technology
B
15) field in a database table that enables users to find related information in another database table.
A) Data
B) Server
C) Foreign key
D) Primary key
C