444 Flashcards
1) In public key encryption the keys are mathematically related so that data encrypted with one key be decrypted using only the other key
True
2) In transaction fee revenue model, a company receives a fee for enabling or executing a transaction
True
3) DoS attacks are used to destroy information and access restricted areas of a company’s information system
False
Malicious software program, referred to as spyware, include a variety of threats, such as computer, viruses worms, and Trojan horse.
False
Malware
5) service provider creates revenue by providing digital Contant, such as an use, Music photos or video over the web
False
Content provider
6) the logical view of a database presents an interest agreeing to the user
False
7) Big data enables users to view the same data in different ways using multiple dimensions
False
OLAP
Which of the following companies is the market creator business model?
A) Haraj.com
B) Expedia
C) Extra.com
D) Google
A
9) which of the following dimensions of e-commerce technology, involves the integration of video, audio and text marketing messages into a single marketing message and consumer experience?
A) Ubiquity
B) Richness
C) Interactivity
D) Information density
B
10) Compared to traditional goods, digital goods have:
A) Lower cost of production
B) Higher marginal cost per unit
C) Equivalent copying costs
D) Lower distribution costs
A
11) which of the following is an example of the content provider, Internet business model?
A) Absher
B) Noon.com
C) Shahed.net
D) Facebook
C
Which of the following dimension of e-commerce technology has the potential to raise the quality of information?
A) Information density
B) Richness
C) Customization
D) Interactivity
A
13) supply chain management systems are considered to be an ___________ because they automate the flow of information across company boundaries.
A) KMS
B) enterprise system
C) MIS
D) Interorganizational system
D
Which of the following is not one of the unique features of e-commerce technology?
A) information density
B) transparency
C) richness
D) social technology
B
15) field in a database table that enables users to find related information in another database table.
A) Data
B) Server
C) Foreign key
D) Primary key
C
Special software to create and maintain a database and enable individual business application to extract the data. They need without having to create separate files or data definitions in their computer programs.
A) Database
B) Database administration
C) Database management system (DBMS)
D) information
C
17) using smart cards to access the building is an example of biometric authentication methods
False
18) associations in a data mining technique aims to discover different grouping within data
False
Features of social e-commerce driving it’s growth is/are:
A) Timeline
B) Social sign-on
C) Collaborative shopping
D) All the above
D
When someone miss your presents his herself using a fake email address to action is called
A) Sniffing
B) Spoofing
C) Logging
D) War driving
B
Rogue software program that attaches itself to other software programs or data files in order to be executed is:
A) worm
B) Trojan horse
C) viruses
D) keylogger
C
22) A combination of hardware and software that prevents unauthorized access to meet work
A) DDOS
B) TOKEN
C) SMART CARD
D) FIREWALLS
D
Information density is the total amount and quality of information available to all the market participants
True
Market Street creators is providing an online meeting place where people with similar interests
False