Podcast
Questions and Answers
What is one major drawback of using email for communication?
What is one major drawback of using email for communication?
- Slow message delivery
- Limited character formatting options
- Spam issues (correct)
- High cost of sending messages
Which of the following is an example of a logical security measure?
Which of the following is an example of a logical security measure?
- Firewall maintenance
- Employee training programs
- Multi-factor authentication (correct)
- Physical surveillance systems
What is the purpose of a homepage in an e-commerce website?
What is the purpose of a homepage in an e-commerce website?
- To display detailed product descriptions
- To manage the shopping cart
- To serve as the main entry point for visitors (correct)
- To showcase customer reviews
What feature does a shopping cart provide to online customers?
What feature does a shopping cart provide to online customers?
Which of the following describes how emails can be formatted?
Which of the following describes how emails can be formatted?
What is the primary concern addressed by deploying firewalls?
What is the primary concern addressed by deploying firewalls?
Why is regular data backup important for e-commerce businesses?
Why is regular data backup important for e-commerce businesses?
What information is typically found on product pages of an e-commerce site?
What information is typically found on product pages of an e-commerce site?
What is one key principle of ethical business practices?
What is one key principle of ethical business practices?
Which of the following is considered consideration in a contract?
Which of the following is considered consideration in a contract?
What does Customer Relationship Management (CRM) primarily aim to improve?
What does Customer Relationship Management (CRM) primarily aim to improve?
Which element is NOT one of the three essential components of a contract?
Which element is NOT one of the three essential components of a contract?
Which practice is associated with social responsibility in business?
Which practice is associated with social responsibility in business?
What is NOT a function of Supply Chain Management (SCM) software?
What is NOT a function of Supply Chain Management (SCM) software?
What is a primary benefit of using emails in business?
What is a primary benefit of using emails in business?
Which of the following best describes knowledge management software?
Which of the following best describes knowledge management software?
What is the primary purpose of a security policy?
What is the primary purpose of a security policy?
Which of the following is NOT a step in creating a security policy?
Which of the following is NOT a step in creating a security policy?
What type of attack involves deceiving users to gain sensitive information?
What type of attack involves deceiving users to gain sensitive information?
Which of the following methods is commonly used for electronic fund transfers (EFT) in B2B transactions?
Which of the following methods is commonly used for electronic fund transfers (EFT) in B2B transactions?
What can SQL Injection lead to regarding sensitive data?
What can SQL Injection lead to regarding sensitive data?
Which option describes an acceptable behavior according to a security policy?
Which option describes an acceptable behavior according to a security policy?
Malware can enter a system through which of the following channels?
Malware can enter a system through which of the following channels?
Which form of payment is NOT typically considered an online payment method?
Which form of payment is NOT typically considered an online payment method?
Flashcards are hidden until you start studying
Study Notes
Ethical Practices in E-commerce
- Businesses should conduct their operations responsibly with transparency, respect for consumers, employees and the environment.
- Transparency requires businesses provide accurate information about products and services, including potential risks.
- Social responsibility means engaging in practices that contribute positively to the community and society.
- Sustainability focuses on minimizing the environmental impact of business operations.
- Inclusivity and accessibility aim to design websites and services that are accessible to all users, including those with disabilities.
Contract Essentials
- Contracts are promises between legal entities for an exchange of value.
- Essential elements of a contract include Offer, Acceptance and Consideration.
- An offer is a commitment with specified terms made to another party.
- Acceptance is the willingness to accept an offer with all its stated terms.
- Consideration is the agreed upon exchange of something valuable.
CRM, KM & SCM
- Customer Relationship Management (CRM) focuses on managing and analyzing customer interactions and data to improve customer service, satisfaction, and sales.
- Knowledge Management (KM) involves capturing, distributing, and using knowledge within an organization to enhance performance and decision-making.
- Supply Chain Management (SCM) helps companies coordinate planning and operations with their partners in industry supply chains.
Email Benefits and Drawbacks
- Email is a popular form of business communication.
- It is used for gathering information, executing transactions, and performing e-commerce tasks.
- Email messages can convey messages quickly and include various file formats.
- Drawbacks include time-consuming replies, potential for virus transmission, and spam.
Logical Security Measures
- Logical security measures protect digital information and systems from unauthorized access, attacks, and breaches.
- Access control ensures only authorized personnel can access sensitive systems and data.
- Firewalls protect the network from unauthorized access and cyber threats.
- Strong authentication mechanisms, such as multi-factor authentication, verify user identity.
- Data backup procedures ensure critical information can be restored in case of data loss.
Web Pages in E-Commerce
- Web pages act as digital storefronts for businesses to present products and services.
- The homepage is the main entry point, featuring branding, promotions, and links to product categories.
- Product pages provide detailed information about specific products.
- Category pages offer a selection of products within a specific category with filtering options.
- Shopping carts allow customers to view, add, or remove items from their purchases.
Security Policy
- A security policy outlines assets to be protected, reasons for protection, responsible individuals, and acceptable and unacceptable behaviors.
- The process for creating a security policy involves determining assets needing protection, identifying access needs, evaluating available resources, and developing a written policy.
Security Threats
- Phishing attacks involve deceptive emails or websites to trick users into providing sensitive information.
- Malware, like viruses, Trojans, and ransomware, can infect websites and lead to data breaches and financial losses.
- SQL Injection involves injecting malicious code into a website's database to access sensitive data.
Online Payment Methods
- Electronic Funds Transfers (EFTs) are commonly used in B2B transactions.
- Cash, checks, credit cards, and debit cards are common payment methods for consumers.
- Online payment methods include PayPal, prepaid cards, debit cards, credit cards, and store-branded cards.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.