Wednesday, 2 August 2017

MIS672 Final Exam




MIS672 Final Exam

 Click Link Below To Buy:


Contact Us:
      Hwcoursehelp@gmail.com

Final Examination

1. E-commerce can be defined as:                                -
a.    the use of the Internet and the Web to transact business.
b.    the digital enablement of transactions and processes within a firm.
c.             digitally enabled commercial transactions between and among organizations and individuals. d.    both (a) and (c).

2. The following are all unique features of e-commerce technology:       
a.    interactivity, global reach, information asymmetry, personalization/customization. b.    universal standards, richness, information density, interactivity.
c.    information density, universal standards, personalization/customization, sales force-driven. d.    local/regional reach, interactivity, richness, personalization/customization.

3. Disintermediation refers to:  
a.    new opportunities for middlemen to aggregate content, products and services.
b.            the disappearance of market middlemen and the destruction of traditional distribution channels. c.        hyper-competition.
d.    the fact that when everyone uses the same tool or product, all participants receive more value.

4. In addition to the Internet and the World Wide Web, which of the following technologies is integral to understanding e-commerce?
a.    Client/server computing b.    Wireless computing
c.    Peer-to-peer computing d.    Mainframe computing

5. Today, the portal business model is to:_          
a.    serve solely as a gateway to the Internet. b.    be a destination site.
c.    provide an integrated package of content and services all in one place. d.      both (b) and (c).

6. A/An                        is a company that offers access to Internet-based software applications to other companies.
a.    market creator b.    ASP
c.    exchange
d.    portal

7. The global scale of the Internet impacts the business environment in all of the following ways except:__
a.    it lowers costs of industry and firm operations through production and sales efficiencies. b.    it enables competition on a worldwide scope.
c.    it increases the importance of having a local and regional sales force.
d.    it lowers barriers to entry, yet greatly expands market at the same time.

8. The basic building blocks of the Internet include all of the following except:_
a.    client/server computing.
b.            the SMTP, POP, and IMAP protocols. c. the TCP/IP communications protocol.



d.    packet-switching hardware.

9. The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:         
a.    routing.
b.    the Transmission Control protocol. c.    packet switching.
d.    the File Transfer Protocol.

10. Specialized computers that interconnect the thousands of computers that make up the Internet in order to transmit message parcels along available communication paths and on to their destinations are called:
a.    transponders. b.    routers.
c.    servers.
d.    clients.

11. A set of rules for formatting, ordering, compressing, and error-checking messages is called a/an:      
a.    algorithm. b.    domain.
c.    statute.
d.    protocol.

12. The Internet Layer of TCP/IP is responsible for:         
a.    placing packets on and receiving them from the network medium. b.    addressing, packaging, and routing messages.
c.             providing communication with the application by acknowledging and sequencing the packets to and from the application.
d.    providing a variety of application with the ability to access the services of the lower layers.

13. Internet addresses (IP addresses) are currently expressed as a:        
a.    32-bit number that appears as a series of four separate numbers separated by semicolons. b.    128-bit number that appears as a series of four separate numbers separated by periods.
c.    64-bit number that appears as a series of four separate numbers separated by periods. d.    32-bit number that appears as a series of four separate numbers separated by periods.

14. The addresses used by browsers to identify the location of content on the Web are called:  
a.    domain names.
b.    uniform resource locators. c.              IP addresses.
d.    Hypertext Transfer Protocol.

15. Which of the following statement about client/server computing is true?
a.    It exploded the available communications capacity. b.    It provided communication rules and regulations.
c.             It connects multiple powerful personal computers together in one network with one or more computers dedicated to common functions that they all need.
d.    It does not provide sufficient computing capacity to support graphics or color.

16. Which of the following is not an advantage of client/server computing over centralized mainframe computing?
a.    It is easy to expand capacity by adding servers and clients.
b.    It uses photonics to greatly increase capacity and transmission speeds.
c.             It is less vulnerable because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer.
d.    There is less risk that a system will completely malfunction because backup or mirror servers can



pick up the slack if one server goes down.

17. Which of the following protocols is used to send mail to a server?:
a.    SMTP
b.    FTP
c.    HTTP
d.    SSL

18.                 is a utility program that allows you to track the path of a message you send from your client to a remote computer on the Internet.
a.    Telnet b.    Ping
c.    Tracert d.    Finger

19.                          is a set of standards for communicating between a browser and a program running on a server that allows for interaction between the user and server.
a.    CGI
b.            ColdFusion c.     JavaScript d.       VBScript

20. Which of the following languages did Microsoft invent to compete with Java?
a.    VBScript b.    ActiveX
c.    ColdFusion
d.    Java Server Pages

21. Which of the following would not be an appropriate choice for an e-commerce suite for a medium-sized business?
a.    Microsoft Commerce Server 2002 Standard Edition
b.            IBM Websphere Commerce Suite Professional Entry edition c.    Microsoft Commerce Server 2002 Enterprise Edition
d.    Blue Martini Commerce

22. Dynamic page generation makes all of the following possible except:              
a.    lowered menu costs. b.    market segmentation.
c.    nearly cost-free price discrimination. d.    multi-browser functionality.

23. The leading Web server software is:               
a.    Apache HTTP.
b.            Microsoft Internet Information Server. c.             Sun.
d.    Zeus.

24. Which of the following might include a data flow diagram to describe the flow of information for a
Web site?
a.    Physical design b.    Logical design c.    Testing plan
d.    Co-location plan

25. What are the most important management challenges in building a successful e-commerce site?
a.    Developing a clear understanding of business objectives and knowing how to choose the right




                technology to achieve those objectives                   
b.    Building a site quickly
c.    Building a site inexpensively
d.    Choosing the right people to build the site

26. The most popular Internet activity is:_           
a.    general Web surfing. b.    e-mail.
c.    reading news.
d.    shopping online.

27. Which of the following is an example of an integrity violation of e-commerce security?
a.    A customer denies that he or she is the person who placed the order
b.    An unauthorized person intercepts an online communication and changes its contents c.      A Web site is not actually operated  by the entity the customer believes it to be
d.    A merchant uses customer information in a manner not intended by the customer

28. Bugbear is an example of a:_              
a.    macro virus
b.    script virus/worm
c.    Trojan horse/worm d.    file infecting virus

29. Encryption can provide all of the following dimensions of e-commerce security except:              :
a.    authentication. b.    Confidentiality.
c.    message integrity. d.    privacy.

30. A                  is a software application that acts as a filter between a company’s private network and the
Internet.
a.    firewall
b.            virtual private network c.             proxy server
d.    PPTP

31. All of the following are used for authentication except:_       
a.    digital signatures.
b.            certificates of authority. c.           biometric devices.
d.    packet filters.

32. An account created by depositing funds and from which funds are paid out or withdrawn as needed is a:
a.    credit card account.
b.            accumulating balance system. c.               stored value payment system. d.    none of the above.

33. All of the following are important federal regulations of payment systems except:_                
a.    Regulation Z. b.    Regulation E. c.    EFTA.
d.    Regulation P.

34. Mondex is an example of a:_                                 
                a.    smart card.                 



 
b.    digital checking payment system.
c.    digital credit card.
d.    digital accumulating balance payment system.

35. All of the following are examples of scrip except:      
a.    trading stamps. b.    point programs. c.    smart cards.
d.    consumer loyalty currency.

No comments:

Post a Comment