Business Applications and E-commerce Models Quiz
9 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which business application involves creating a database and spreadsheet for inventory and customer profiles using Local Area Network?

  • Applying accounting systems (correct)
  • Advertising through search engine marketing
  • Testing plan
  • Sharing documents and sending emails

In an e-distributor's revenue model, which element is included?

  • Personalization (correct)
  • Broker
  • Portal
  • Testing plan

Which security tool involves the use of two mathematically related digital keys?

  • Attacks target gullible cell phone users with verbal messages to call a certain number
  • The transformation of data into cipher text readable only by sender and receiver (correct)
  • Unauthorized use of another person's personal data for illegal financial benefit
  • Sender and receiver use the same digital key to encrypt and decrypt a message

What type of attack targets cell phone users with verbal messages to call a certain number and donate money under false pretenses?

<p>Vishing (C)</p> Signup and view all the answers

Which term describes the unauthorized use of personal data for illegal financial benefit, such as social security numbers and credit card details?

<p>Identity Fraud/Theft (B)</p> Signup and view all the answers

Which e-commerce site design element describes the flow of information, processing functions, and databases used?

<p>Logical design (C)</p> Signup and view all the answers

What is one of the elements involved in an e-distributor's revenue model?

<p>Brokers (D)</p> Signup and view all the answers

Which security tool involves the sender and receiver using the same digital key to encrypt and decrypt a message?

<p>The use of public-key cryptography to encrypt and send a symmetric key (C)</p> Signup and view all the answers

Which type of attack involves the transformation of data into ciphertext readable only by the sender and receiver?

<p>Smishing (D)</p> Signup and view all the answers

More Like This

Business Mathematics Quiz
5 questions

Business Mathematics Quiz

FlourishingCommonsense avatar
FlourishingCommonsense
Business Mathematics in Commerce
5 questions
E-Commerce Applications: Revenue Models and Strategies
30 questions
BCom in Computer Applications Overview
9 questions
Use Quizgecko on...
Browser
Browser