444 Flashcards

1
Q

1) In public key encryption the keys are mathematically related so that data encrypted with one key be decrypted using only the other key

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2) In transaction fee revenue model, a company receives a fee for enabling or executing a transaction

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3) DoS attacks are used to destroy information and access restricted areas of a company’s information system

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malicious software program, referred to as spyware, include a variety of threats, such as computer, viruses worms, and Trojan horse.

A

False

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5) service provider creates revenue by providing digital Contant, such as an use, Music photos or video over the web

A

False
Content provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

6) the logical view of a database presents an interest agreeing to the user

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

7) Big data enables users to view the same data in different ways using multiple dimensions

A

False
OLAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following companies is the market creator business model?
A) Haraj.com
B) Expedia
C) Extra.com
D) Google

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

9) which of the following dimensions of e-commerce technology, involves the integration of video, audio and text marketing messages into a single marketing message and consumer experience?
A) Ubiquity
B) Richness
C) Interactivity
D) Information density

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

10) Compared to traditional goods, digital goods have:
A) Lower cost of production
B) Higher marginal cost per unit
C) Equivalent copying costs
D) Lower distribution costs

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

11) which of the following is an example of the content provider, Internet business model?
A) Absher
B) Noon.com
C) Shahed.net
D) Facebook

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following dimension of e-commerce technology has the potential to raise the quality of information?
A) Information density
B) Richness
C) Customization
D) Interactivity

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

13) supply chain management systems are considered to be an ___________ because they automate the flow of information across company boundaries.
A) KMS
B) enterprise system
C) MIS
D) Interorganizational system

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is not one of the unique features of e-commerce technology?
A) information density
B) transparency
C) richness
D) social technology

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

15) field in a database table that enables users to find related information in another database table.
A) Data
B) Server
C) Foreign key
D) Primary key

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Special software to create and maintain a database and enable individual business application to extract the data. They need without having to create separate files or data definitions in their computer programs.
A) Database
B) Database administration
C) Database management system (DBMS)
D) information

A

C

17
Q

17) using smart cards to access the building is an example of biometric authentication methods

A

False

18
Q

18) associations in a data mining technique aims to discover different grouping within data

A

False

19
Q

Features of social e-commerce driving it’s growth is/are:
A) Timeline
B) Social sign-on
C) Collaborative shopping
D) All the above

A

D

20
Q

When someone miss your presents his herself using a fake email address to action is called
A) Sniffing
B) Spoofing
C) Logging
D) War driving

A

B

21
Q

Rogue software program that attaches itself to other software programs or data files in order to be executed is:
A) worm
B) Trojan horse
C) viruses
D) keylogger

A

C

22
Q

22) A combination of hardware and software that prevents unauthorized access to meet work
A) DDOS
B) TOKEN
C) SMART CARD
D) FIREWALLS

A

D

23
Q

Information density is the total amount and quality of information available to all the market participants

A

True

24
Q

Market Street creators is providing an online meeting place where people with similar interests

A

False

25
Q

Firewall is a combination of hardware and software that prevent unauthorized users from accessing private networks

A

True

26
Q

Selling the same goods in different targeted group of different pieces is called:
A) cost customization
B) price on going
C) price discrimination
D) cost optimization

A

C

27
Q

Permits used to create a new tables containing only desired information
A) project
B) join
C) select

A

A

28
Q

Identity theft
A) Spoofing
B) Sniffing
C) Phishing
None of the above

A

C

29
Q

Phishing is a type of sniffing which send email looks like legitimate business

A

False

30
Q

30) eavesdropper, drive-by buildings, and try to detect SSID and gain access to network and resourcees
A) Rogue access points
B) Service set identifiers
C) War driving
D) none

A

C