Exam 8: The Web-Enabled Enterprise

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

File Transfer Protocol (FTP) is a common way of transmitting files from one computer to another.

(True/False)
4.9/5
(39)

__________is a secured protocol used for confidential transactions.

(Multiple Choice)
4.8/5
(30)

On the Web,__________ includes identifying the sites your audience frequently visits.

(Multiple Choice)
4.8/5
(49)

The purpose of __________is to know the consumers better so the business can serve them better,while streamlining its marketing and sales operations.

(Short Answer)
5.0/5
(29)

Affiliates are compensated in many ways such as pay per sale,pay per click,and pay per lead.

(True/False)
4.8/5
(37)

In dedicated hosting the host dedicates a server to the client,and the client can fully control the content on the server's disks.

(True/False)
4.8/5
(39)

While __________might sound benign,many privacy advocates claim that it violates privacy rights.

(Multiple Choice)
4.8/5
(37)

__________is a process for outsourcing a variety of tasks to a distributed group of people,both online or offline.

(Multiple Choice)
4.9/5
(32)

__________technology enables one server to be virtually split into many addressable servers,each for a different client and with its own domain name.

(Short Answer)
4.7/5
(38)

Wireless technologies enable what some people call mobile commerce,or__________ .

(Short Answer)
4.8/5
(36)

To__________ is to make a digital audio recording,usually of voice,and post the file on the Web so that people can download it and listen to it.

(Short Answer)
4.8/5
(45)

Traditional retailers,often called brick­and­mortar businesses,have extended their "storefront" by launching an e­ tailing arm.

(True/False)
4.9/5
(29)

__________webpages can be built with several programming tools: CGI,Java servlets,PHP,and ASP (Active Server Pages).

(Short Answer)
4.9/5
(37)

In__________ ,the hosting company owns the server and the server management software.

(Multiple Choice)
4.9/5
(40)

__________is a cyberattack tactic used to trick Internet users into giving up personal information such as PINs and account numbers.

(Short Answer)
4.8/5
(37)

Software designed to trace and report your online behavior without your knowledge is called__________ .

(Short Answer)
4.9/5
(32)

Organizations can leverage __________to communicate with consumers immediately.

(Multiple Choice)
4.9/5
(33)

The usage of__________ in web technologies ensures that data exchanged between the SCM systems of two organizations are interpreted correctly.

(Short Answer)
4.8/5
(39)

Instant messaging (IM) offers users real-time online interactivity.

(True/False)
4.9/5
(40)

__________includes cookies and other,more sophisticated applications that are installed on your computer unbeknownst to you and transmit information about you while you are online.

(Multiple Choice)
4.7/5
(38)
Showing 21 - 40 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)