E-Commerce Business Models
30 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of a search engine?

  • To locate information for which you do not know an exact Web address (correct)
  • To deliver requested Web pages to your computer
  • To provide a means for users to interact with Web sites
  • To provide categorized lists of links arranged by subject

What is a Web server?

  • A Web page that provides links to other related Web pages
  • A collection of related Web pages and associated items
  • A computer that delivers requested Web pages to your computer (correct)
  • A means for users to interact with Web sites

What is the term for a business transaction that occurs over an electronic network?

  • HTTP
  • Web 2.0
  • URL
  • E-commerce (correct)

What is a unique address called that is used to locate a Web page?

<p>URL (A)</p> Signup and view all the answers

What is the term for Web sites that provide a means for users to interact?

<p>Web 2.0 (B)</p> Signup and view all the answers

What is the primary purpose of a Web browser?

<p>To allow users to access Web pages and Web 2.0 programs (A)</p> Signup and view all the answers

What is the Internet defined as?

<p>A worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals (B)</p> Signup and view all the answers

When was ARPANET, the precursor to the Internet, established?

<p>September 1969 (B)</p> Signup and view all the answers

What is one of the main goals of ARPANET?

<p>To allow scientists at different physical locations to share information and work together (C)</p> Signup and view all the answers

What is an example of a broadband Internet service?

<p>Cable Internet service (C)</p> Signup and view all the answers

What is the purpose of FTP?

<p>To move a file from one computer to another on the internet (A)</p> Signup and view all the answers

What is the term for a network that uses radio signals to provide high-speed internet connections to wireless computers and devices?

<p>Wi-Fi (B)</p> Signup and view all the answers

What is required to participate in e-commerce?

<p>A computer or mobile device with an Internet connection and a means to pay (C)</p> Signup and view all the answers

Which type of e-commerce involves the sale of goods and services to the general public?

<p>Business-to-consumer (B2C) (D)</p> Signup and view all the answers

What is the primary function of a website following the C2C business model?

<p>Helping consumers to sell their goods or services by publishing their information (D)</p> Signup and view all the answers

What is an example of a service provided by a business-to-business (B2B) e-commerce website?

<p>Online advertising (D)</p> Signup and view all the answers

Who is the primary customer in a B2C e-commerce business model?

<p>A consumer (B)</p> Signup and view all the answers

What is the main difference between a B2C and a C2C e-commerce business model?

<p>The target audience (D)</p> Signup and view all the answers

What is the primary goal of a website following the B2B business model?

<p>To sell products to an intermediate buyer who then sells the product to the final customer (D)</p> Signup and view all the answers

What is the term for software that is specifically designed to gain access or damage a computer without the knowledge of the owner?

<p>Malware (A)</p> Signup and view all the answers

What is the primary difference between a hacker and a cracker?

<p>A hacker tries to access a computer or network illegally, while a cracker has the intent of destroying data or stealing information (A)</p> Signup and view all the answers

What is the term for any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

<p>Computer Security Risk (B)</p> Signup and view all the answers

What is the primary goal of a customer in an e-commerce website?

<p>To buy products (C)</p> Signup and view all the answers

What type of malware is a Trojan?

<p>A type of malware that appears to be harmless but actually contains malicious code (A)</p> Signup and view all the answers

What is a type of security measure that can be implemented in both hardware and software?

<p>Firewall (C)</p> Signup and view all the answers

Which biometric identification scheme involves the analysis of facial characteristics?

<p>Face (D)</p> Signup and view all the answers

What is the biometric identification scheme that involves the analysis of the pattern of veins in the back of the hand and the wrist?

<p>Vein (C)</p> Signup and view all the answers

Which biometric identification scheme involves the analysis of the tone, pitch, cadence, and frequency of a person's voice?

<p>Voice (B)</p> Signup and view all the answers

How many types of biometric identification schemes are mentioned in the slides?

<p>7 (C)</p> Signup and view all the answers

What security measure is not mentioned in the slides?

<p>Encryption (B)</p> Signup and view all the answers

More Like This

E-commerce Business Models
13 questions
E-commerce Basics and Business Models
5 questions
E-commerce Overview and Technology
40 questions
Use Quizgecko on...
Browser
Browser