How JustAnswer Works:
  • Ask an Expert
    Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional Answer
    Via email, text message, or notification as you wait on our site.
    Ask follow up questions if you need to.
  • 100% Satisfaction Guarantee
    Rate the answer you receive.
Ask Scott Your Own Question
Scott
Scott, MIT Graduate
Category: Homework
Satisfied Customers: 3040
Experience:  MIT Graduate (Math, Programming, Science, and Music)
3546829
Type Your Homework Question Here...
Scott is online now
A new question is answered every 9 seconds

One way to be able to trace electronic cash is to attach

Customer Question

One way to be able to trace electronic cash is to attach a(n) ____ to each electronic cash transaction.
name
digital certificate
serial number
watermark
Question 2 1 points Save
The free payment clearing service that PayPal provides to individuals is called a(n)____ payment system.
peer-to-peer
electronic
B2C
B2B
Question 3 1 points Save
The term ____ payment refers to all payments of less than $10.
mini
small
minitransaction
microtransaction
Question 4 1 points Save
A(n) ____ is a stored-value card that is a plastic card with an embedded microchip that can store information.
credit card
debit card
charge card
smart card
Question 5 1 points Save
Which of the following has the advantages of being independent and portable?
electronic check
paper check
credit card
electronic cash
Question 6 1 points Save
The ECML standard will expedite online processing for customers by simplifying the ____ procedure.
identification
calculating
form-filling
transaction
Question 7 1 points Save
____ cards are by far the most popular form of consumer electronic payment online.
Scrip
Credit
Internet
Smart
Question 8 1 points Save
A(n) ____ can be an elaborate smart card with a microchip or a plastic card with a magnetic strip that records the currency balance.
stored-value card
credit card
electronic card
virtual card
Question 9 1 points Save
A(n) ____ electronic wallet stores a consumer's information on the his/her own computer.
server-side
client-side
online
virtual
Question 10 1 points Save
PayPal earns a profit on the ____, which is money that is deposited in PayPal accounts and not used immediately.
scrip
commission
transaction cost
float
Question 11 1 points Save
Mondex is a(n) ____ that holds and dispenses electronic cash.
smart card
credit card
debit card
Internet card
Question 12 1 points Save
The greatest advantage of using payment cards is their ____.
high technology
billing methods
worldwide acceptance
nice-looking features
Question 13 1 points Save
Services such as ICVERIFY, PCAuthorize, and WebAuthorize connect directly to a network of banks called the ____.
ACH
SET
TCP
IP
Question 14 1 points Save
Cash, checks, credit cards, and debit cards account for more than ____ percent of all consumer payments in the United States.
30
40
50
90
Question 15 1 points Save
In a(n) ____ system, the card issuer pays the merchants that accept the card directly and does not use an intermediary, such as a bank or clearinghouse system.
open loop
closed loop
virtual loop
technical loop
Question 16 1 points Save
Mondex is a product of ____.
IBM
AmericaBank
Visa
MasterCard International
Question 17 1 points Save
The ____ is a special security model that confines Java applet actions to a set of rules defined by the security model.
security box
Java model
Java sandbox
Java ++
Question 18 1 points Save
A(n) ____ is a type of virus that replicates itself on computers that it infects.
worm
cookie
session
message digest
Question 19 1 points Save
____ secures connections between two computers.
Digital ID
S-HTTP
SSL
DNS
Question 20 1 points Save
____ is the protection of individual rights to nondisclosure.
Secrecy
Privacy
Security
Sensitivity
Question 21 1 points Save
____ security includes tangible protection devices, such as alarms, guards, fireproof doors, security fences, safes or vaults, and bombproof buildings.
Logical
Physical
General
Standard
Question 22 1 points Save
The purpose of a(n) ____ threat is to disrupt normal computer processing.
privacy
necessity
secrecy
integrity
Question 23 1 points Save
____ encryption encodes a message with one of several available algorithms that use a single numeric key to encode and decode data.
PGP
Symmetric
Asymmetric
AEC
Question 24 1 points Save
Which of the following refers to preventing data delays or denials?
integrity
secrecy
necessity
readiness
Question 25 1 points Save
ActiveX controls can run on computers running the ____ operating system.
Windows
Linux
UNIX
Mac
Question 26 1 points Save
A(n) ____ is a small application program.
applet
buffer
cipher
procedure
Question 27 1 points Save
A Web server can compromise ____ if it allows automatic directory listings.
necessity
integrity
secrecy
wardrivers
Question 28 1 points Save
Which of the following sends individual messages securely?
Digital ID
S-HTTP
DNS
SSL
Question 29 1 points Save
A(n) ____ is software that attaches itself to another program and can cause damage when the host program is activated.
applet
cookie
virus
message digest
Question 30 1 points Save
____ encryption encodes messages by using two mathematically related numeric keys.
Physical
Asymmetric
Symmetric
Logical
Question 31 1 points Save
Which of the following refers to preventing unauthorized data modification?
integrity
secrecy
necessity
completeness
Question 32 1 points Save
Which of the following is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks?
objective
Java++
ActiveX
plug-in
Question 33 1 points Save
People who write programs or manipulate technologies to obtain unauthorized access to computers and networks are called ____.
eavesdropper
crackers
white hat hackers
wardrivers
Question 34 1 points Save
Any ____ must be conspicuously made in writing, which means that it must be easily noticed in the body of the written agreement.
patent
warranty disclaimer
contract
offer
Question 35 1 points Save
If a statement injures the reputation of a product or service instead of a person, it is called ____.
defamatory
product defamation
product disparagement
company defamation
Question 36 1 points Save
An early court decision in the ____ held that a telegraph transmission was a writing.
1600s
1700s
1800s
1900s
Question 37 1 points Save
A(n) ____ is a statement that the seller will not honor some or all implied warranties.
invalid contract
unsigned warranty
warranty disclaimer
patent
Question 38 1 points Save
A(n) ____ is any symbol executed or adopted for the purpose of authenticating a writing.
name
icon
picture
signature
Question 39 1 points Save
____ is, in general, determined by the residence of the parties.
Jurisdiction
Subject-matter jurisdiction
Personal jurisdiction
Forum selection
Question 40 1 points Save
A(n) ____ statement is a statement that is false and that injures the reputation of another person or company.
defamatory
fraudulent
deceptive
critical
Question 41 1 points Save
____ is a form of control over physical space and the people and objects that reside in that space, and is a defining characteristic of statehood.
Ethics
Culture
Laws
Power
Question 42 1 points Save
If a company undertakes sufficient activities in a particular country, it establishes ____ with that country and becomes liable for filing tax returns in that country.
copy control
notice
ToS
nexus
Question 43 1 points Save
Disputes that arise when one person has registered a domain name that is an existing trademark or company name are settled by the ____.
WIPO
common law
statutory law
ACPA
Question 44 1 points Save
Any company whose U.S.-based Web site generates income is subject to U.S. ____.
fair use
federal income tax
property tax
VAT
Question 45 1 points Save
The characteristics of laws are determined by the local culture's acceptance of or rejection of various business ____.
efforts
effects
cultures
customs
Question 46 1 points Save
____ mark the range of culture and reach of applicable laws very clearly.
Territorial borders
Culture lines
Ethical standards
Contracts
Question 47 1 points Save
The physical boundary, when crossed, provides ____ that one set of rules has been replaced by a different set of rules.
effect
power
notice
legitimacy
Question 48 1 points Save
Most courts will hold that a(n) ____ exists when the terms of a contract have been reduced to some tangible form.
writing
file
agreement
term
Question 49 1 points Save
The level of power asserted by a government is limited to that which is accepted by the culture that exists within its ____ boundaries.
ethical
cultural
geographic
confined
Question 50 1 points Save
A(n) ____ is a commitment, with certain terms made to another party.
contract
offer
acceptance
consideration
Question 51 1 points Save
A simple site that companies use to evaluate different Web designs is called a(n) ____.
development site
B2B site
B2C site
VPN site
Question 52 1 points Save
____ sends data packets to every computer on the path between one computer and another and clocks the packet’s roundtrip times.
Telnet
Tracert
Ping
Finger
Question 53 1 points Save
A(n) ____ file is a file on a Web site that is not linked to any page.
lost
index
orphan
data
Question 54 1 points Save
In the period from 1996 through 2003, ____ enjoyed the highest increase in Internet Web sites of all Web servers.
NCSA
IIS
iPlanet
Apache
Question 55 1 points Save
The ____ is the part of the TCP/IP rules that defines the formats used to transfer files between TCP/IP-connected computers.
URL
FRC
FTP
ASCII
Question 56 1 points Save
Which of the following is the number of HTTP requests that a particular hardware and software combination can process in a unit of time?
output
throughput
orderput
Tracert
Question 57 1 points Save
A(n) ____ indicates the HTTP version used by the server, the status of the response, and an explanation of the status information.
response header field
response header message
response entity body
response header line
Question 58 1 points Save
A(n) ____ is a feature that maintains more than one server on one machine.
virtual host
entity body
link checker
server farm
Question 59 1 points Save
____ programs calculate and display the number of hops between computers.
Link checker
Server architecture
Benchmarking
Route tracing
Question 60 1 points Save
One way to choose Web server hardware configurations is to run tests on various combinations, remembering to consider the system’s ____.
effectiveness
reliability
availability
scalability
Question 61 1 points Save
Which of the following comes bundled with current versions of Microsoft Windows Server operating systems?
HTTP server
ONE server
IIS
iPlanet server
Question 62 1 points Save
An optional ____ is sometimes used to pass bulk information to the server.
request line
request message
entity body
request header
Question 63 1 points Save
A(n) ____ spam filter examines From addresses and compares them to a list of known good sender addresses.
black list
full-privilege
Tracert
white list
Question 64 1 points Save
A content-filtering technique that uses a white list for a confirmation procedure is called ____.
Ping
benchmarking
challenge-response
server-side scripting
Question 65 1 points Save
A(n) ____ spam filter looks for From addresses in incoming messages that are known to be spammers.
full-privilege
black list
white list
Tracert
Question 66 1 points Save
____ Server has dominated the Web since 1996 because it is free and performs very efficiently.
Apache HTTP
Microsoft IIS
UNIX
AIX
Question 67 1 points Save
Which of the following returns information describing the server’s attributes?
response header line
response header message
response header field
response entity body
Question 68 1 points Save
Transaction processing occurs when the shopper proceeds to the virtual counter by clicking a(n) ____ button.
delete
redo
checkout
quit
Question 69 1 points Save
____ is a Yahoo! supplied software product that is used to examine statistical information, set up acceptable payment methods, set up preferred customer shipping methods, and change global settings.
Transaction
Manager
Shopping cart
Catalog
Question 70 1 points Save
____ software packages integrate all facets of a business, including planning, manufacturing, sales, and marketing.
ERP
UPS
URL
UDDI
Question 71 1 points Save
A(n) ____ is a computer that takes the request messages received by the Web server and runs application programs that perform some kind of action based on the contents of the request message.
application server
database manager
Component Object Model
SCM
Question 72 1 points Save
____ CSP’s provide small business with an Internet connection, Web site creation tools, and little or no banner advertising clutter.
Mall-style
Store-style
List-style
Data mining
Question 73 1 points Save
Microsoft Component Object Model (COM) is an example of a(n) ____ application server.
server-based
component-based
page-based
script-based
Question 74 1 points Save
____ reports provide data mining capabilities that search through the site data collected in log files.
BizLand.com
Hypermart
Yahoo! Store
Bigstep
Question 75 1 points Save
A(n) ____ is a list of goods and services.
file
database
catalog
record
Question 76 1 points Save
Which of the following is now a standard of electronic commerce that keeps track of the items the customer has selected and allows customers to add new items or remove items?
shopping list
shopping cart
order form
transaction list
Question 77 1 points Save
ERP is the acronym for ____.
electronic record processing
enterprise resource planning
enterprise record provider
electronic resource provider
Question 78 1 points Save
The Web is a(n) ____ system, unable to remember anything from one transmission or session to another.
stateless
stateful
cacheless
checkless
Question 79 1 points Save
One way to uniquely identify users and to store information about their choices is to create and store ____.
RAM
cookies
hard drives
CD-RAM
Question 80 1 points Save
Commerce Server 2002 is produced by ____.
Microsoft
Intel
Oracle
IBM
Question 81 1 points Save
Large information systems that store the same data in many different physical locations are called ____ information systems.
brokered
distributed
dispersed
component
Question 82 1 points Save
The characteristics of the logic unit that make up specific Web services are described using the ____.
WSDL
UDDI
W3C
SOAP
Question 83 1 points Save
Which of the following provides a connection between e-commerce software and a company’s existing accounting system?
Firmware
Software
Middleware
Endware
Question 84 1 points Save
In a shopping cart, clicking the “Checkout” button displays a screen that asks for ____ and shipping information.
stock availability
item descriptions
billing
tracking numbers
Question 85 1 points Save
The ____ is the existing company that wants to launch an electronic commerce initiative.
equity partner
venture sponsor
operational partner
call center
Question 86 1 points Save
Who is responsible for the system’s reliable and secure operation?
graphics designer
network operations staff
systems administrator
Web programmer
Question 87 1 points Save
In many electronic commerce projects, the company outsources the initial site design and development to launch the project quickly. This approach is called ____.
partial outsourcing
late outsourcing
fast venturing
early outsourcing
Question 88 1 points Save
A(n) ____ is a person with specific training or skills in tracking costs and the accomplishment of specific objectives in a project.
business manager
account manager
project manager
application specialist
Question 89 1 points Save
Most electronic commerce sites require some kind of ____ function to support activities such as transaction processing, order entry, inquiry management, or shipment logistics.
audit
database administration
system administration
call center
Question 90 1 points Save
____ strategies can be used to improve the value that the business provides to its customers.
Building
Downstream
Upstream
Purchasing
Question 91 1 points Save
Major investments in equipment, personnel, and other assets are called ____.
early outsourcing
capital projects
late outsourcing
key investments
Question 92 1 points Save
International Data Corporation and Gartner, Inc. both estimated that the cost for a large company to build and implement an adequate entry-level electronic commerce site was about ____.
$1 million
$2 million
$3 million
$500,000
Question 93 1 points Save
The ____ staff functions include load estimation and load monitoring, and designing and implementing fault-resistant technologies.
call center
system administration
database administration
network operations
Question 94 1 points Save
Hiring another company to provide the outside support for all or part of a project is called ____.
outsourcing
fast venturing
portfolio managing
personalizing
Question 95 1 points Save
A(n) ____ is a person trained in art, layout, and composition and who also understands how Web pages are constructed.
Content editor
Web programmer
Web graphics designer
Content creator
Question 96 1 points Save
A(n) ____ is a formal review of a project after it is up and running.
postimplementation audit
team review
system review
network review
Question 97 1 points Save
Most large businesses have ____ who maintain accounting, human resources, and logistic software.
application specialists
project managers
account managers
business managers
Question 98 1 points Save
Which of the following is a company that offers start-up companies a physical location with offices, accounting and legal assistance, computers, and Internet connections at a very low monthly cost?
prototype
incubator
call center
metric
Question 99 1 points Save
Which of the following is an example of a return on investment technique?
downstream strategy
postimplementation audit
TCO
net present value
Question 100 1 points Save
The ____ should be a member of the internal team that sets the objectives for the project.
business manager
account manager
application specialist
project manager
Submitted: 5 years ago.
Category: Homework
Expert:  Lindie-mod replied 5 years ago.
Hi, I’m a moderator for this topic and I wonder whether you’re still waiting for an answer. If you are, please let me know and I will do my best to find an Expert to assist you right away. If not, feel free to let me know and I will cancel this question for you. Thank you!
Customer: replied 5 years ago.

Yes I am still waiting for an answer ..I think the category should have been homework

Expert:  Lindie-mod replied 5 years ago.
Sometimes, finding the right Expert can take a little longer than expected and we thank you greatly for your understanding. We’ll be in touch again shortly.
Customer: replied 5 years ago.
I am still waiting on an answer
Customer: replied 5 years ago.
I no longer need your help

Related Homework Questions