itec Flashcards

1
Q

what does e-commerce mean?

A

electronic commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

buying and selling goods and products over internet

A

e-commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

invention of the very old notion of “buy and sell”

A

e-commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

process of execution of commercial transactions electronically

A

e-commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

brings some new technology and new capabilities to business the best-known idea in electronic commerce

A

e-commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

has been Electronic Data Interchange (EDI)

A

e-commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

2 types of data interchange

A
  1. No Electronic Data Interchange (NEDI)
  2. With Electronic Data Interchange (EDI)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

it is a process that has no paper and no people involved

A

With Electronic Data Interchange (EDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

it is a process that involves paper and people

A

No Electronic Data Interchange (NEDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the ability to use these technologies appeared in the late _____ and allowed business companies and organizations to send commercial documentation electronically

A

1970s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Commercial enterprise on the Internet was strictly prohibited until ____

A

1991

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

around ____ when the first internet online shopping started

A

1994

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

it took about ____ years to introduce security protocols

A

five (5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

end of ____, many European and American business companies offered their services through the World Wide Web

A

2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of E-commerce Applications

A
  1. Business-to-Consumer
  2. Business-to-Business
  3. Consumer-to-Consumer
  4. Peer-to-Peer
  5. m-Commerce
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

activities that focus on retail transactions rather than activities conducted between two businesses

A

Business-to-Consumer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler and a retailer

A

Business-to-Business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

involves the electronically facilitated transactions between consumers through some third party

A

Consumer-to-Consumer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

refers almost exclusively to computer-based systems of sharing information directly with others via the Internet. It employs a network to put individuals in direct contact with each other in some form

A

Peer-to-Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

is short for mobile commerce

A

m-Commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

It is used to refer to the growing practice of conducting financial and promotional activities with the use of wireless handheld device. the transactions may be conducted using cell phones, personal digital assistants and other hand held devices that have operate with Internet access

A

m-Commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

example of Business-to-Consumer (B2C)

A

Amazon.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

a general merchandiser that sells consumer products to retail consumers

A

Amazon.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

example of Business-to-Business (B2B)

A

eSteel.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

a steel industry exchange that creates an electronic market for steel producers and users

A

eSteel.com

26
Q

example of Consumer-to-Consumer (C2C)

A

eBay.com

27
Q

creates a marketspace where consumers can auction or sell goods directly to other consumers

A

eBay.com

27
Q

creates a marketspace where consumers can auction or sell goods directly to other consumers

A

eBay.com

28
Q

example of Peer-to-Peer (P2P)

A

Gnutella

28
Q

which two biggest competing classified sites in the country merged?

A

sulit and ayosdito

29
Q

a software application that permits consumers to share music with one another directly, without the intervention of a market maker as in C2C e-commerce

A

Gnutella

30
Q

example of M-commerce (Mobile Commerce)

A

wireless mobile devices such as PDAs (Personal Digital Assistants) or cellphones

31
Q

it can be used to conduct commercial transactions

A

PDAs (Personal Digital Assistants) or cellphones

32
Q

US based multinational electronic commerce company

A

Amazon

33
Q

He founded Amazon.com, Inc. in 1994 and launched it online in 1995

A

Jeff Bezos

34
Q

original name of Amazon

A

Cadabra, Inc.

35
Q

software, hardware and network platform developed by Amazon.com subsidiary ______

A

Lab126

36
Q

online auction website

A

eBay

37
Q

first items sold on eBay was a ________ for _____

A

broken laser pointer
$14.83

38
Q

last ____, eBay launched its Business & Industrial category, breaking into the industrial surplus business

A

2005

39
Q

Generally, anything can be auctioned on the site as long as it is not illegal and does not violate the company’s Prohibited and Restricted Items policy.

A

eBay

40
Q

a major ecommerce presence not just in the Philippines, but across Southeast Asia

A

Lazada

41
Q

owned German e-commerce company founded by Rocket Internet in 2011

A

Lazada

42
Q

the site offers a wide range of items, including fashion apparel, electronics, car accessories, and home appliances

A

Lazada

43
Q

it has agreed to allow retail giant SM Investments, to use the store to sell its merchandise

A

Lazada

44
Q

Philippine classified ads site Sulit rebranded as ____ in 2014

A

OLX

45
Q

the deal translated into the merging of brands between Sulit and Ayosdito (the two were the biggest competing classifieds sites in the country)

A

OLX

46
Q

As a result of the merger, Ayosdito users were redirected to OLX as of ____

A

2015

47
Q

a secure system accomplishes its task with no unintended side effects

A

e-commerce security

48
Q

In the software development community, it describes the security features of a system

A

e-commerce security

49
Q

Common security features are ensuring passwords that are at least six characters long and encryption of sensitive data

A

e-commerce security

50
Q

information must be kept from unauthorized parties

A

privacy

51
Q

message must not be altered or tampered with

A

integrity

52
Q

sender and recipient must prove their identities to each other

A

authentication

53
Q

proof is needed that the message was indeed received

A

non-repudiation

54
Q

security concerns

A
  1. privacy
  2. integrity
  3. authentication
  4. non-repudiation
55
Q

securities on-line

A
  1. Digital Signatures and Certificates
  2. Secure Socket Layers (SSL)
  3. Firewalls and Kerberos
56
Q

the _____ is always responsible for security of the Internet connected PC where customer details are handled

A

merchant

57
Q

Where customers order by email, information should be encrypted by the?

A

merchant

58
Q

Where credit cards are taken online and processed later, it’s the _____ responsibility to check the security of the hosting company’s web server

A

merchant’s

59
Q

attacks

A
  1. Tricking the shopper
  2. Snooping the shopper’s computer
  3. Sniffing the network
  4. Guessing passwords
  5. Using denial of service attacks
  6. Using known server bugs
  7. Using server root exploits
60
Q

attacks and their defenses

A
  1. Install personal firewalls for the client machines.
  2. Store confidential information in encrypted form.
  3. Encrypt the stream using the Secure Socket Layer
  4. Use appropriate password policies
  5. Use threat model analysis, strict development policies, and external security audits