Deck 3: Ebusiness and Ecommerce
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/119
Play
Full screen (f)
Deck 3: Ebusiness and Ecommerce
1
The enterprise architecture describes the joint structure and behavior of the enterprise and its information system.
True
2
The enterprise architecture involves five enterprise architectural domains.
False
3
The data model uses structured query language to perform operations on data within a database.
True
4
Internet Explorer and Firefox are examples of Web servers.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
5
The relational data model is a three-dimensional structure similar in look to that of a cube.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
6
Software known as firewalls limits access to information on a company's servers from the rest of the world.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
7
One common type of electronic mail server is known as POP server.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
8
The Internet is a global system of interconnected computer networks.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
9
Some computers on the Internet need an Internet Protocol address.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
10
Web commerce is a type of eCommerce and eCommerce is a type of eBusiness.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
11
Data modeling is a database design process that proceeds through the conceptual,logical,and implementation phases.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
12
The corporate information factory can be represented by a 3-part model including data acquisition,management,and delivery.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
13
Under the Uniform Electronic Transaction Act,digital signatures are not legally binding in most states.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
14
File servers exist mainly as storage for electronic files.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
15
Domain names and their corresponding IP addresses are registered in electronic "phone books" at many sites on the Internet.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
16
eBusiness and eCommerce have the same meaning.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
17
eBusiness refers to the use of information technologies in some aspect of the business or organization.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
18
One reason for the worldwide popularity of the Internet is that it has brought universal standards of communication to all networks.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
19
Human resources is part of the application architecture of a company.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
20
The transactional interface is used for queries,analysis,and research whereas the decision support interface is used for access and manipulation of data in the operational database.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
21
A system such as an Internet store can be fully automated with no human intervention.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
22
A digital time-stamping service can be used to securely store private keys.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
23
The enterprise service bus (ESB)transfers data to users through a graphical user interface.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
24
Cookies prevent a merchant from viewing and analyzing a person's computer to determine any other Web sites that the person has visited.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
25
ATM cards are really smart cards because they are used for both identification and payment.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
26
A robot-type program that continually runs on a computer and exchanges information with users who request it is called a(n)________.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
27
Service-oriented architecture is an applications architecture design framework that facilitates the development of application suites that share information with each other.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
28
Blinding permits a bank to issue digital cash so that it is unable to link the payer to the payee.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
29
Almost all privacy statements prohibit Web merchants from sharing their customer information with other merchants.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
30
The ORM defines the typical business model in terms of four major domains: ________,________,________,and ________.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
31
Database drivers connect applications to printers.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
32
Digital cash and real cash are virtually identical because digital cash can only be "spent" once.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
33
Memory cards provide a high degree of security and can be used for complex financial transactions.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
34
When the intranets of two or more companies are linked together a(n)________ is formed.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
35
Another name for a digital ID is a digital certificate.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
36
The ________ ________ ________ is a reference model for business models in general.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
37
Anyone can issue his or her digital notes for use in Internet transactions.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
38
A major issue in electronic transactions is privacy.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
39
A guessed plaintext attack will succeed even though the sender adds a few random numbers at the end of a message.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
40
A merchant can obtain a third-party seal of approval,such as the AICPA's Web Trust,to assure its customers their privacy will be protected.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
41
Whereas ________ signatures are relatively easy to forge,________ signatures are next to impossible to forge.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
42
The Act which recognizes transactions as legally binding if electronic signatures are used is the ________ ________ ________ Act.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
43
The Electronic Bank of America might digitally sign a message that contains which of the following information?
A) The bank's name and address
B) The dollar value of the bank note being created
C) A unique serial number
D) All of the above
A) The bank's name and address
B) The dollar value of the bank note being created
C) A unique serial number
D) All of the above
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following is a common approach used to describe services and the SOAP protocol for communication between services?
A) SOA
B) WSDL
C) ESB
D) HTML
A) SOA
B) WSDL
C) ESB
D) HTML
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
45
A merchant's Web site may perform important functions,such as opening an encrypted ________ session.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
46
A(n)________ ________ ________ is a set of commands that a given piece of software makes available so that its functions and data can be accessed by other pieces of software.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
47
A sufficiently long key is a useful countermeasure against a(n)________ ________.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
48
An electronic ________ is essentially a computer program that keeps track of various keys,digital certificates,and other items of information associated with electronic funds.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
49
The ________ reference model defines the typical business model in terms of infrastructure,offering,customers,and finance.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
50
A(n)________ ________ is a collection of related documents,files,and programs that falls under the control of one individual.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following is considered a virtual electronic cash card?
A) Memory card
B) eBusiness card
C) Signature-transporting card
D) Answers A and C are correct.
A) Memory card
B) eBusiness card
C) Signature-transporting card
D) Answers A and C are correct.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
52
Digital IDs are issued by a(n)________ ________.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
53
A(n)________ is the process of linking and sequencing services in order to make them work together.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
54
________ is one of the adverse results of privacy problems on the Internet.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
55
The activities that relate to moving the product are often referred to as ________ activities.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
56
A domain name is
A) an alias name that can be used in place of an IP number.
B) an alias name that can be used in place of an ISP.
C) a series of numbers such as 207.49.159.2.
D) used by a firewall to keep intruders out of a network.
A) an alias name that can be used in place of an IP number.
B) an alias name that can be used in place of an ISP.
C) a series of numbers such as 207.49.159.2.
D) used by a firewall to keep intruders out of a network.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
57
A(n)________ ________ ________ model is a set of best practices for a given business process or group of processes.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
58
The technique of ________ permits bank to issue digital cash so that it is unable to link the payer to the payee.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
59
The verification of a digital signature involves the use of a(n)________ algorithm.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
60
The four levels of abstraction in the value reference model are ________,________,________,and ________.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
61
A client is
A) a robot-type program that runs on a computer and exchanges information with users.
B) another name for a proxy server.
C) a user program that accesses and exchanges information with servers.
D) a program that holds incoming electronic mail.
A) a robot-type program that runs on a computer and exchanges information with users.
B) another name for a proxy server.
C) a user program that accesses and exchanges information with servers.
D) a program that holds incoming electronic mail.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following contain subsets of the data contained in the operational database and data warehouse?
A) Data marts
B) Data mining warehouse
C) OLAP
D) All of these answers are correct.
A) Data marts
B) Data mining warehouse
C) OLAP
D) All of these answers are correct.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
63
Servers that exist to support eBusiness are
A) mail servers.
B) file servers.
C) Web servers.
D) All of the above support eBusiness.
A) mail servers.
B) file servers.
C) Web servers.
D) All of the above support eBusiness.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
64
One major difference between an organization's intranet and the Internet is
A) the intranet may be totally unavailable to outsiders.
B) the Internet may be totally unavailable to outsiders.
C) an intranet user almost never can access the Internet.
D) the Internet operates over a local area network.
A) the intranet may be totally unavailable to outsiders.
B) the Internet may be totally unavailable to outsiders.
C) an intranet user almost never can access the Internet.
D) the Internet operates over a local area network.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
65
The technique that permits a bank to issue digital cash so that it is unable to link the payer to the payee is called
A) laundering money.
B) using a blinded digital signature.
C) using a generic digital signature.
D) digitized recycling.
A) laundering money.
B) using a blinded digital signature.
C) using a generic digital signature.
D) digitized recycling.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
66
A message which contains a digital signature
A) must be encrypted along with the signature.
B) must be sent once as plaintext and once as ciphertext if no message digest exits.
C) does not have to be encrypted when a message digest is used as a digital signature.
D) Answers B and C are correct.
A) must be encrypted along with the signature.
B) must be sent once as plaintext and once as ciphertext if no message digest exits.
C) does not have to be encrypted when a message digest is used as a digital signature.
D) Answers B and C are correct.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
67
SQL allows user to
A) define data in a relational database.
B) access data in a relational database.
C) manipulate data in a relational database.
D) All of these answers are correct.
A) define data in a relational database.
B) access data in a relational database.
C) manipulate data in a relational database.
D) All of these answers are correct.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
68
Electronic commerce poses many problems with consumer's privacy.Small pieces of information that are placed on a user's computer by an electronic merchant are called
A) spybots.
B) cookies.
C) worms.
D) viruses.
A) spybots.
B) cookies.
C) worms.
D) viruses.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
69
The protocol that specifies the format of all documents on the World Wide Web is ________.
A) HTML
B) hyperlinks
C) URL
D) ciphertext
A) HTML
B) hyperlinks
C) URL
D) ciphertext
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
70
There are different types of electronic wallet-sized cards used in virtual cash transactions.ATM cards are classified as
A) shared-key cards.
B) signature-creating cards.
C) memory cards.
D) signature-transporting cards.
A) shared-key cards.
B) signature-creating cards.
C) memory cards.
D) signature-transporting cards.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
71
Which feature below would not be considered a highly convenient feature for consumers of an Internet store transaction?
A) Consumers usually must wait for delivery of items purchased via delivery by third parties.
B) Internet store transactions can be completed without any human intervention on the part of the vendor.
C) Internet stores are "open" 24 × 7 with virtually worldwide access.
D) Internet stores accept most credit cards.
A) Consumers usually must wait for delivery of items purchased via delivery by third parties.
B) Internet store transactions can be completed without any human intervention on the part of the vendor.
C) Internet stores are "open" 24 × 7 with virtually worldwide access.
D) Internet stores accept most credit cards.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
72
One type of server which acts as an electronic post office is called a ________.
A) file server
B) mail server
C) Web server
D) commerce server
A) file server
B) mail server
C) Web server
D) commerce server
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
73
________ servers and ________ servers make applications and data in databases available to remote clients.
A) Application; database
B) Application; mail
C) File; database
D) Web; mail
A) Application; database
B) Application; mail
C) File; database
D) Web; mail
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
74
Privacy is a major issue in electronic transactions.Therefore,the Internet should not be used if
A) a bank uses a different digital signature for each denomination of currency.
B) digital signatures need to be issued for coins used in electronic transactions.
C) the IP address of one of the parties to a transaction needs to remain fully confidential.
D) All of these answers are correct.
A) a bank uses a different digital signature for each denomination of currency.
B) digital signatures need to be issued for coins used in electronic transactions.
C) the IP address of one of the parties to a transaction needs to remain fully confidential.
D) All of these answers are correct.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
75
The AICPA's Web Trust attestation program provides assurance that a merchant's Web site has
A) some type of functioning information protection.
B) business practices disclosure.
C) transaction integrity.
D) All of these answers are correct.
A) some type of functioning information protection.
B) business practices disclosure.
C) transaction integrity.
D) All of these answers are correct.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
76
A plaintext message can be changed into a ciphertext message by using
A) a password.
B) a digital key.
C) Answers A and B are both correct.
D) Neither answer A nor B is correct.
A) a password.
B) a digital key.
C) Answers A and B are both correct.
D) Neither answer A nor B is correct.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
77
Which statement below regarding keys is false?
A) Each user should create his or her own public and private keys.
B) Using a central office authority to create and distribute keys is highly recommended.
C) The longer the life of the key, the more security that must be applied to protect it.
D) Sensitive keys should be themselves protected by passwords.
A) Each user should create his or her own public and private keys.
B) Using a central office authority to create and distribute keys is highly recommended.
C) The longer the life of the key, the more security that must be applied to protect it.
D) Sensitive keys should be themselves protected by passwords.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
78
There are different types of electronic wallet-sized cards used in virtual cash transactions.The card that shows the most promise for wide-scale retail transaction use in the foreseeable future is the
A) shared-key card.
B) signature-creating card.
C) memory card.
D) signature-transporting card.
A) shared-key card.
B) signature-creating card.
C) memory card.
D) signature-transporting card.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
79
If Company A wants to send Company B a secure message,Company A will use Company B's public key to encrypt the message.Company B must then
A) use Company A's public key to decrypt the message.
B) use its private key to decrypt the message.
C) use Company A's private key to decrypt the message.
D) use its public key to decrypt the message.
A) use Company A's public key to decrypt the message.
B) use its private key to decrypt the message.
C) use Company A's private key to decrypt the message.
D) use its public key to decrypt the message.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
80
A three-tiered application architecture involves applications that contain ________ tiers.
A) conceptual, logical, and physical
B) conceptual, knowledge, and functional
C) presentation, logic, and data
D) planning, design, and implementation
A) conceptual, logical, and physical
B) conceptual, knowledge, and functional
C) presentation, logic, and data
D) planning, design, and implementation
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck