Top-Rated Free Essay
Preview

E-Commerce Midterm Study Guide

Powerful Essays
959 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
E-Commerce Midterm Study Guide
Midterm Study Guide
1. What is cybercrime, and what contributes to it?
Contributors:
the ability to anonymously access the Internet the Internet is an open, vulnerable design the ability to remotely access the Internet
2. In a 2011 survey, what did the computer institute report that responding organizations experience in computer security incidents… what %? 45%
3. Nonrepudiation refers to the ability to insure e-commerce participants do not deny their online actions.
4. Redundancy multiple duplicate devices and paths in a network
5. The backbone of the Internet is formed by Network Service Providers.
6. What is the FTP, and what does it do? FTP is one of the original internet services. Part of the TCP/IP protocol that permits users to transfer files from the server to their client computer, and vice versa
7. Define a podcast. An audio presentation sch as a radio show, audio from a movie, or simply a personal audio presentation- stored as an audio file and posted to the web
8. Cloud computing is a model of computing in which firms and individuals obtain computing power and software applications over the Internet, rather than purchasing and installing it on their own computers..
9. Define client/server computing. It connects multiple powerful personal computers together in one network with one or more servers dedicated to common functions that they all need.
10. What are uniform resource locators? The addresses used by browsers to identify the location of content on the Web
11. IPv4 address is expressed as 32-bit number that appears as a series of four separate numbers separated by periods.
12. Telepresence creates an environment in a room using multiple cameras and screens which surround the user
13. What is the Transport layer of TCP/IP? It is responsible for providing communication with the application by acknowledging and sequencing the packets to and from the application
14. Tracert one of several route-tracing utilities that allow you to follow the path of a message you send from your client to a remote computer on the internet
15. Innovation phase of Ethernet. Phase of the development of the Internet in which the Ethernet was invented
16. What happened during the commercialization phase of Internet development? NSF privatized the operation of the Internet's backbone
17. Know examples of bricks and clicks e-tailing businesses.
Examples include:
Walmart.com
Sears.com
18. Market strategy as defined in e-commerce. A business document that specifically details how you plan on selling your product and find new customers
19. Know definition and examples of portals.
A portal offers integrated package of content, content-search, and social network services
Examples include:
Yahoo
AOL
MSN
Facebook
20. Know direct and indirect competitors of Amazon
Apple's iTunes Store.
Barnesandnoble.com
eBay

21. What is market saturation? situation in which a product has become distributed within a market
22. What is a revenue model? describes how a firm will produce a superior return on invested capital.
23. Cost competitors- two firms looking to produce a superior product or bring the product to the market at a lower price than the other
24. Value propositions element of the business model that addresses the question of why a customer should buy from the firm
25. Key elements of a business model market strategy, competitive environment, and organizational development
What is the bow tie analogy of the Web? The structure of the web “tendrils” are pages that neither link to nor are linked from the center
26. Is B2C e-commerce growing? Yes and has grown at double digit rates in 2011 and 2012
27. When did e-commerce begin? 1994
28. Stumbleupon allows you to rate, categorize, and share the content you find online
29. Mobile e-commerce distinguished by the type of technology used in the transaction rather than by the nature of the market relationship
30. Is Wikepedia a social network? no
31. In 2012, what was the world’s online population? 2.3 billion
32. Definition of transaction cost. The cost of participating in a market
33. Richness integration of video, audio, and text marketing messages into a single marketing message and consuming experience
34. Global broadcasting provide a worldwide, high capacity, one-way transmission means for a variety of data, imagery, and other information required to support joint forces
35. Define e-commerce- the use of the internet and web to transact business
36. How many people in 2012 accessed the Internet by mobile devices? 120 million people
37. Know about E-Commerce in 2012.
Almost 50% of adult internet users visited an online social network daily.
Social e-commerce generated more revenue than local e-commerce.
Approximately 150 million users made at least one purchase online.

38. Define NFC set of short-range wireless technologies used to share information among devices within about 2 inches of each other
39. Secret key encryption also known as symmetric key encryption
40. What are examples of malicious code? Viruses, worms, bots
41. Spyware Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail
42. Phishing attacks- any deceptive, online attempt by a third party to obtain confidential information for financial gain
43. Botnets typically used for stealing information from computers, storing network traffic for analysis, DDoS attacks
44. Prominent hacktivist groups Anonymous
45. Confidentiality the ability to ensure that messages and data are only available to those authorized to view them.
46. Privacy policy- a set of public statements declaring to your customers how you treat their personal information that you gather on the site
47. Availability ability to ensure that an e-commerce site continues to function as intended.
48. Authenticity ability to identify the person or entity with whom you are dealing on the Internet

You May Also Find These Documents Helpful

  • Satisfactory Essays

    3 - An user must type in a URL for a web page, which stands for:…

    • 1464 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    11. What are the last 64 bits of a IPv6 IP address called? How are these bits used?…

    • 692 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Essay

    • 443 Words
    • 2 Pages

    Client/ server computing – is a program that distinguishes relationship between the client and the server. The client will request a service or resource from another program and this is the server. Once the server has fulfilled the client’s request the connection is terminated. Overall a client/server computing is linking to a computer system where a central server supports a number of networked workstations.…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    6) TCP/IP: The Transmission Control Protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet and the methods for reassembly of the original document or file at the destination. The Internet Protocol specifies the structure of those packets and how to route them to the proper destination.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Cnt 4513 Study Guild

    • 578 Words
    • 3 Pages

    Note: This study guild also include the material covered before midterm for completeness. You can focus on Chapter 4 and 5…

    • 578 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 9

    • 474 Words
    • 2 Pages

    C) FTP (File transfer protocol) - is a standard way of gathering files between computers on the Internet over IP/TCP…

    • 474 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Study Guide Data Comm

    • 1683 Words
    • 7 Pages

    b) a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information.…

    • 1683 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    It 240 Appendix F

    • 260 Words
    • 2 Pages

    Transmission Control Protocol / Internet Protocol (TCP/IP) TCP is the protocol used in networking that provides a connection-oriented, reliable way for applications to communicate large amount of data at one time over a network. IP is a connectionless protocol responsible for addressing network devices, and routing packets between…

    • 260 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    10. What is the term for each grouping of 8 bits in an IP address?…

    • 800 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    References: Comer, D. E. (2009, 2009,2004,2001,1999,1997). Computer Networks And Internets (5th ed.). Upper Saddle River, New Jersey: Pearson Education, Inc.…

    • 1195 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Netstat

    • 481 Words
    • 2 Pages

    1. The Netstat command indicates that POP3 is in use on a remote server. Which port is the remote server most likely using?…

    • 481 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT1210 Unit 2

    • 443 Words
    • 2 Pages

    1. Computer Networking - A combination of many components that work together so that many different devices can communicate.…

    • 443 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Web page-a collection of content (text, images, video, and audio) that web browsers display in a…

    • 483 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    IP specifies the addressing details for each of the packets of information that the TCP has created. Just like a letter needs an address to know where it is to be sent, so to the IP creates these addresses for the disassembled packets of information. The IP labels each packet with the origination and destination addresses. These addresses have two functions, the host is identified and it provides a logical location service.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 lab 7 jarad krum

    • 696 Words
    • 2 Pages

    3. What is the significance of the TCP, 3-Way Handshake for applications that utilize TCP as a transport protocol? Which application in your protocol capture uses TCP as a transport protocol?…

    • 696 Words
    • 2 Pages
    Good Essays