One way to be able to trace electronic cash is to attach a(n) ____ to each electronic cash transaction.
Question 2 1 points Save
The free payment clearing service that PayPal provides to individuals is called a(n)____ payment system.
Question 3 1 points Save
The term ____ payment refers to all payments of less than $10.
Question 4 1 points Save
A(n) ____ is a stored-value card that is a plastic card with an embedded microchip that can store information.
Question 5 1 points Save
Which of the following has the advantages of being independent and portable?
Question 6 1 points Save
The ECML standard will expedite online processing for customers by simplifying the ____ procedure.
Question 7 1 points Save
____ cards are by far the most popular form of consumer electronic payment online.
Question 8 1 points Save
A(n) ____ can be an elaborate smart card with a microchip or a plastic card with a magnetic strip that records the currency balance.
Question 9 1 points Save
A(n) ____ electronic wallet stores a consumer's information on the his/her own computer.
Question 10 1 points Save
PayPal earns a profit on the ____, which is money that is deposited in PayPal accounts and not used immediately.
Question 11 1 points Save
Mondex is a(n) ____ that holds and dispenses electronic cash.
Question 12 1 points Save
The greatest advantage of using payment cards is their ____.
Question 13 1 points Save
Services such as ICVERIFY, PCAuthorize, and WebAuthorize connect directly to a network of banks called the ____.
Question 14 1 points Save
Cash, checks, credit cards, and debit cards account for more than ____ percent of all consumer payments in the United States.
Question 15 1 points Save
In a(n) ____ system, the card issuer pays the merchants that accept the card directly and does not use an intermediary, such as a bank or clearinghouse system.
Question 16 1 points Save
Mondex is a product of ____.
Question 17 1 points Save
The ____ is a special security model that confines Java applet actions to a set of rules defined by the security model.
Question 18 1 points Save
A(n) ____ is a type of virus that replicates itself on computers that it infects.
Question 19 1 points Save
____ secures connections between two computers.
Question 20 1 points Save
____ is the protection of individual rights to nondisclosure.
Question 21 1 points Save
____ security includes tangible protection devices, such as alarms, guards, fireproof doors, security fences, safes or vaults, and bombproof buildings.
Question 22 1 points Save
The purpose of a(n) ____ threat is to disrupt normal computer processing.
Question 23 1 points Save
____ encryption encodes a message with one of several available algorithms that use a single numeric key to encode and decode data.
Question 24 1 points Save
Which of the following refers to preventing data delays or denials?
Question 25 1 points Save
ActiveX controls can run on computers running the ____ operating system.
Question 26 1 points Save
A(n) ____ is a small application program.
Question 27 1 points Save
A Web server can compromise ____ if it allows automatic directory listings.
Question 28 1 points Save
Which of the following sends individual messages securely?
Question 29 1 points Save
A(n) ____ is software that attaches itself to another program and can cause damage when the host program is activated.
Question 30 1 points Save
____ encryption encodes messages by using two mathematically related numeric keys.
Question 31 1 points Save
Which of the following refers to preventing unauthorized data modification?
Question 32 1 points Save
Which of the following is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks?
Question 33 1 points Save
People who write programs or manipulate technologies to obtain unauthorized access to computers and networks are called ____.
white hat hackers
Question 34 1 points Save
Any ____ must be conspicuously made in writing, which means that it must be easily noticed in the body of the written agreement.
Question 35 1 points Save
If a statement injures the reputation of a product or service instead of a person, it is called ____.
Question 36 1 points Save
An early court decision in the ____ held that a telegraph transmission was a writing.
Question 37 1 points Save
A(n) ____ is a statement that the seller will not honor some or all implied warranties.
Question 38 1 points Save
A(n) ____ is any symbol executed or adopted for the purpose of authenticating a writing.
Question 39 1 points Save
____ is, in general, determined by the residence of the parties.
Question 40 1 points Save
A(n) ____ statement is a statement that is false and that injures the reputation of another person or company.
Question 41 1 points Save
____ is a form of control over physical space and the people and objects that reside in that space, and is a defining characteristic of statehood.
Question 42 1 points Save
If a company undertakes sufficient activities in a particular country, it establishes ____ with that country and becomes liable for filing tax returns in that country.
Question 43 1 points Save
Disputes that arise when one person has registered a domain name that is an existing trademark or company name are settled by the ____.
Question 44 1 points Save
Any company whose U.S.-based Web site generates income is subject to U.S. ____.
federal income tax
Question 45 1 points Save
The characteristics of laws are determined by the local culture's acceptance of or rejection of various business ____.
Question 46 1 points Save
____ mark the range of culture and reach of applicable laws very clearly.
Question 47 1 points Save
The physical boundary, when crossed, provides ____ that one set of rules has been replaced by a different set of rules.
Question 48 1 points Save
Most courts will hold that a(n) ____ exists when the terms of a contract have been reduced to some tangible form.
Question 49 1 points Save
The level of power asserted by a government is limited to that which is accepted by the culture that exists within its ____ boundaries.
Question 50 1 points Save
A(n) ____ is a commitment, with certain terms made to another party.
Question 51 1 points Save
A simple site that companies use to evaluate different Web designs is called a(n) ____.
Question 52 1 points Save
____ sends data packets to every computer on the path between one computer and another and clocks the packet’s roundtrip times.
Question 53 1 points Save
A(n) ____ file is a file on a Web site that is not linked to any page.
Question 54 1 points Save
In the period from 1996 through 2003, ____ enjoyed the highest increase in Internet Web sites of all Web servers.
Question 55 1 points Save
The ____ is the part of the TCP/IP rules that defines the formats used to transfer files between TCP/IP-connected computers.
Question 56 1 points Save
Which of the following is the number of HTTP requests that a particular hardware and software combination can process in a unit of time?
Question 57 1 points Save
A(n) ____ indicates the HTTP version used by the server, the status of the response, and an explanation of the status information.
response header field
response header message
response entity body
response header line
Question 58 1 points Save
A(n) ____ is a feature that maintains more than one server on one machine.
Question 59 1 points Save
____ programs calculate and display the number of hops between computers.
Question 60 1 points Save
One way to choose Web server hardware configurations is to run tests on various combinations, remembering to consider the system’s ____.
Question 61 1 points Save
Which of the following comes bundled with current versions of Microsoft Windows Server operating systems?
Question 62 1 points Save
An optional ____ is sometimes used to pass bulk information to the server.
Question 63 1 points Save
A(n) ____ spam filter examines From addresses and compares them to a list of known good sender addresses.
Question 64 1 points Save
A content-filtering technique that uses a white list for a confirmation procedure is called ____.
Question 65 1 points Save
A(n) ____ spam filter looks for From addresses in incoming messages that are known to be spammers.
Question 66 1 points Save
____ Server has dominated the Web since 1996 because it is free and performs very efficiently.
Question 67 1 points Save
Which of the following returns information describing the server’s attributes?
response header line
response header message
response header field
response entity body
Question 68 1 points Save
Transaction processing occurs when the shopper proceeds to the virtual counter by clicking a(n) ____ button.
Question 69 1 points Save
____ is a Yahoo! supplied software product that is used to examine statistical information, set up acceptable payment methods, set up preferred customer shipping methods, and change global settings.
Question 70 1 points Save
____ software packages integrate all facets of a business, including planning, manufacturing, sales, and marketing.
Question 71 1 points Save
A(n) ____ is a computer that takes the request messages received by the Web server and runs application programs that perform some kind of action based on the contents of the request message.
Component Object Model
Question 72 1 points Save
____ CSP’s provide small business with an Internet connection, Web site creation tools, and little or no banner advertising clutter.
Question 73 1 points Save
Microsoft Component Object Model (COM) is an example of a(n) ____ application server.
Question 74 1 points Save
____ reports provide data mining capabilities that search through the site data collected in log files.
Question 75 1 points Save
A(n) ____ is a list of goods and services.
Question 76 1 points Save
Which of the following is now a standard of electronic commerce that keeps track of the items the customer has selected and allows customers to add new items or remove items?
Question 77 1 points Save
ERP is the acronym for ____.
electronic record processing
enterprise resource planning
enterprise record provider
electronic resource provider
Question 78 1 points Save
The Web is a(n) ____ system, unable to remember anything from one transmission or session to another.
Question 79 1 points Save
One way to uniquely identify users and to store information about their choices is to create and store ____.
Question 80 1 points Save
Commerce Server 2002 is produced by ____.
Question 81 1 points Save
Large information systems that store the same data in many different physical locations are called ____ information systems.
Question 82 1 points Save
The characteristics of the logic unit that make up specific Web services are described using the ____.
Question 83 1 points Save
Which of the following provides a connection between e-commerce software and a company’s existing accounting system?
Question 84 1 points Save
In a shopping cart, clicking the “Checkout” button displays a screen that asks for ____ and shipping information.
Question 85 1 points Save
The ____ is the existing company that wants to launch an electronic commerce initiative.
Question 86 1 points Save
Who is responsible for the system’s reliable and secure operation?
network operations staff
Question 87 1 points Save
In many electronic commerce projects, the company outsources the initial site design and development to launch the project quickly. This approach is called ____.
Question 88 1 points Save
A(n) ____ is a person with specific training or skills in tracking costs and the accomplishment of specific objectives in a project.
Question 89 1 points Save
Most electronic commerce sites require some kind of ____ function to support activities such as transaction processing, order entry, inquiry management, or shipment logistics.
Question 90 1 points Save
____ strategies can be used to improve the value that the business provides to its customers.
Question 91 1 points Save
Major investments in equipment, personnel, and other assets are called ____.
Question 92 1 points Save
International Data Corporation and Gartner, Inc. both estimated that the cost for a large company to build and implement an adequate entry-level electronic commerce site was about ____.
Question 93 1 points Save
The ____ staff functions include load estimation and load monitoring, and designing and implementing fault-resistant technologies.
Question 94 1 points Save
Hiring another company to provide the outside support for all or part of a project is called ____.
Question 95 1 points Save
A(n) ____ is a person trained in art, layout, and composition and who also understands how Web pages are constructed.
Web graphics designer
Question 96 1 points Save
A(n) ____ is a formal review of a project after it is up and running.
Question 97 1 points Save
Most large businesses have ____ who maintain accounting, human resources, and logistic software.
Question 98 1 points Save
Which of the following is a company that offers start-up companies a physical location with offices, accounting and legal assistance, computers, and Internet connections at a very low monthly cost?
Question 99 1 points Save
Which of the following is an example of a return on investment technique?
net present value
Question 100 1 points Save
The ____ should be a member of the internal team that sets the objectives for the project.