E-Commerce Final – Flashcards
Unlock all answers in this set
Unlock answersquestion
_____ strategies can be used to improve the value that the business provides to its customers.
answer
Downstream
question
_____ strategies focus on reducing costs or generating value by working with suppliers or inbound shipping and freight service providers.
answer
Upstream
question
The _____ of an electronic commerce implementation includes the costs of hardware, software, design work outsourced, salaries and benefits for employees involved in the project, and the cost of maintaining the site once it is operational.
answer
TCO
question
_____ is measured by the ease of expansion of bandwidth, disk space, and additional software (database, traffic analysis, and so on) that can be added to an account as it grows.
answer
Scalability
question
Which of the following techniques measures the amount of income that will be provided by a specific current expenditure?
answer
ROI
question
_____ is an example of a return on investment technique.
answer
Net Present Value
question
Hiring another company to provide the outside support for all or part of a project is called _____.
answer
Outsourcing
question
In many electronic commerce projects, the company outsources the initial site design and development to launch the project quickly. This approach is called _____.
answer
Early Outsourcing
question
In _____, the company identifies specific portions of the project that can be completely designed, developed, implemented, and operated by another firm that specializes in a particular function.
answer
Partial Outsourcing
question
A(n) _____ is a company that offers start-up companies a physical location with offices, accounting and legal assistance, computers, and Internet connections at a very low monthly cost.
answer
Incubator
question
In _____, an existing company that wants to launch an electronic commerce initiative joins external equity partners and operational partners that can offer the experience and skills needed to develop and scale up the project very rapidly.
answer
Fast Venturing
question
_____ are usually banks or venture capitalists that sometimes offer money, but are more likely to offer experience gained from guiding other start-ups that they have funded.
answer
Equity Partners
question
_____ are firms, such as system integrators and consultants, that have experience in moving projects along and scaling up prototypes.
answer
Operational Partners
question
The _____ is the existing company that wants to launch an electronic commerce initiative.
answer
Venture Sponsor
question
_____ provide the venture sponsor with knowledge of industry best practices.
answer
Operational Partners
question
_____ is a collection of formal techniques for planning and controlling the activities undertaken to achieve a specific goal.
answer
Project Management
question
The _____ should be a member of the internal team that sets the objectives for the project.
answer
Business Manager
question
A(n) _____ is a person with specific training or skills in tracking costs and the accomplishment of specific objectives in a project.
answer
Project Manager
question
A(n) _____ keeps track of multiple Web sites in use by a project or keeps track of the projects that will combine to create a larger Web site.
answer
Account Manager
question
Most large businesses have _____ who maintain accounting, human resources, and logistics software.
answer
Application Specialist
question
_____ design and write the database-driven Web pages.
answer
Web Programmers
question
_____ help design and implement customer relationship management activities in the electronic commerce operation.
answer
Customer Service Personnel
question
The _____ staff functions include load estimation and load monitoring, and designing and implementing fault-resistant technologies.
answer
Network Operations
question
Most electronic commerce sites requires a(n) _____ function to support activities such as transaction processing, order entry, inquiry management, or shipment logistics.
answer
Database Administration
question
A _____ is a formal review of a project after it is up and running.
answer
Postimplementation Audit
question
_____ is/are digital cash mired by a company instead of by a government.
answer
Scrip
question
What payment method dominates online transactions today?
answer
Credit and Debit Cards
question
Most current scrip offerings, such as eScrip, focus on the _____ market.
answer
Not-For-Profit Fundraising
question
A _____, offered by companies such as American Express, carries no spending limit, and the entire amount charged to the card is due at the end of the billing period.
answer
Charge Card
question
In a(n) _____ system, the card issuer pays the merchants that accept the card directly and does not use an intermediary, such as a bank or clearinghouse system.
answer
Closed Loop
question
Whenever a third party processes a transaction, the system is called a(n) _____ system.
answer
Open Loop
question
A(n) _____ bank is a bank that does business with sellers that want to accept payment cards.
answer
Merchant
question
When a cardholder successfully contests a charge, the merchant bank must retrieve the money it placed in the merchant account in a process called a(n) _____.
answer
Chargeback
question
ACH is short for _____.
answer
Automated Clearing House
question
Internet payments for items costing from a few cents to approximately a dollar are called _____.
answer
Micropayments
question
The term _____ refers to all payments of less than $10.
answer
Small Payment
question
Some companies have begun to offer small payment and micropayment services through _____ telephone carriers.
answer
Mobile
question
_____ is spending a particular piece of electronic cash twice by submitting the same electronic currency to two different vendors.
answer
Double Spending
question
_____ electronic cash is electronic cash that cannot be traced back to the person who spent it.
answer
Anonymous
question
One way to be able to trace electronic cash is to attach a _____ to each electronic cash transaction.
answer
Serial Number
question
Creating truly anonymous electronic cash requires a bank to issue electronic cash with embedded _____ such that the bank can digitally sign the electronic cash while removing any association of the cash with a particular customer.
answer
Serial Numbers
question
PayPal earns a profit on the _____, which is money that is deposited in Paypal accounts and not used immediately.
answer
Float
question
The free payment clearing service that PayPal provides to individuals is called a _____ payment system.
answer
Peer-To-Peer
question
A(n) _____ electronic wallet stores a consumer's information on his/her own computer.
answer
Client-Side
question
A disadvantage of _____ wallets is that they are not portable.
answer
Client-Side
question
A _____ is a stored-value card that is a plastic card with an embedded microchip that can store information.
answer
Smart Card
question
The largest dollar volume of payments today are made using _____.
answer
Paper Checks
question
_____ is a technique for committing fraud against the customers of online businesses.
answer
Phishing
question
_____ is a criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit.
answer
Identify Theft
question
_____ is a key element in a phishing attack.
answer
Spam
question
_____ is the protection of computer assets from unauthorized accessed, use, alteration, or destruction.
answer
Computer Security
question
Any act or object that poses a danger to computer assets is known as a _____.
answer
Threat
question
The protection of assets using nonphysical means is called _____ security.
answer
Logical
question
A(n) _____ is a person or device that is able to listen in on and copy Internet transmissions.
answer
Eavesdropper
question
Originally, the term _____ was used to describe a dedicated programmer who enjoyed writing complex code that tested the limits of technology.
answer
Hacker
question
_____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.
answer
Secrecy
question
_____ refers to preventing unauthorized data modification.
answer
Integrity
question
_____ Refers to preventing data delays or denials.
answer
Necessity
question
The purpose of a(n) _____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor's computer.
answer
Web Bug
question
_____ refers to programs that are embedded transparently in Web pages and that cause action to occur.
answer
Active Content
question
A(n) _____ is a small application program.
answer
Applet
question
A(n) _____ is a program hidden inside another program or Web page that masks its true purpose.
answer
Trojan Horse
question
Java is a programming language developed by _____.
answer
Sun Microsystems
question
A(n) _____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.
answer
Active X Control
question
Active X controls run only on computers with _____ operating systems.
answer
Windows
question
A(n) _____ is software that attaches itself to another program and can cause damage when the host program is activated.
answer
Virus
question
The term _____ describes the process of hiding information within another piece of information.
answer
Steganography
question
_____ is the protection of individual rights to nondisclosure.
answer
Privacy
question
Software applications called _____ provide the means to record information that passes through a computer or router that is handling Internet traffic.
answer
Sniffer Programs
question
A(n) _____ allows anyone with knowledge of its existence to cause damage by observing transactions, deleting, data, or stealing data.
answer
Backdoor
question
_____ is the electronic defacing of an existing Web site's page.
answer
Cybervandalism
question
_____ is pretending to be someone you are not or representing a Web site as an original when it is really a fake.
answer
Spoofing
question
_____ encryption encodes a message with an algorithm that uses a single numeric key, such as 456839420783, to encode and decode data.
answer
Symmetric
question
A Web server can compromise _____ when it allows automatic directory listings.
answer
Authenticity
question
_____ is an area of memory set aside to hold data read from a file or database.
answer
A Buffer
question
_____ often offer Web server management and rent application software to businesses.
answer
Commerce Service Providers
question
Commerce service providers are also called _____ service providers.
answer
Managed
question
A _____ is a listing of goods and services.
answer
Catalog
question
In the early days of electronic commerce, shoppers deleted items they wanted to purchase by _____.
answer
Filling Out Online Forms
question
In a shopping cart, clicking the Checkout button usually displays a screen that asks for _____ and shipping information.
answer
Billing
question
The Web is a _____ system, unable to remember anything from one transmission or session to another.
answer
Stateless
question
One way to uniquely identify users and store information about their choices is to create and store _____.
answer
Cookies
question
_____ occurs when the shopper proceeds to the virtual checkout counter by clicking a checkout button.
answer
Transaction Processing
question
Large information systems that store the same data in many different physical locations are called _____.
answer
Distributed
question
Application servers are usually grouped into two types: page-based and _____ systems.
answer
Component-Based
question
_____ is accomplished by programs that transfer information from one application to another.
answer
Application Integration
question
Larger businesses often prefer to use a _____ application system that separates the presentation logic from the business logic.
answer
Component-Based
question
_____ software packages are business systems that integrate all facets of a business, including accounting, logistics, manufacturing, planning, project management, and treasury functions.
answer
ERP
question
ERP is the acronym for _____.
answer
Enterprise Resource Planning
question
The W3C defines _____ as software systems that support interoperable machine-to-machine interaction over a network.
answer
Web Services
question
_____ is a message passing protocol that defines how to send marked-up data from one software application to another across a network.
answer
SOAP
question
_____ is used to describe the characteristics of the logic units that make up specific Web services.
answer
WSDL
question
_____ CSPs provide small business with an Internet connection, Web site creation tools, and little or no banner advertising clutter.
answer
Mall-Style
question
_____ can help businesses find customers with common interest and discover previously unknown relationships among the data.
answer
Data Mining
question
_____ packages allow the merchant to have explicit control over merchandising choices, site layout, internal architecture, and remote and local management options.
answer
Midrange
question
WeSphere Commerce Suite is produced by _____.
answer
IBM
question
Commerce Server is produced by _____.
answer
Microsoft
question
_____ software typically provides tools for linking to an supporting supply and purchasing activities.
answer
Enterprise-Class
question
_____ software often includes powerful search tools that use proprietary semantic and statistical algorithms to help users find the content, human experts, and other resources that can aid them in their research and decision-maing tasks.
answer
Knowledge Management
question
_____ software is designed to help businesses mange the information in documents, rather than the documents themselves.
answer
Knowledge Management