29 Questions
What is one of the characteristics of ubiquity in e-commerce?
Virtual transaction
What is an example of digital goods?
Software
What is the main difference between B2B and B2C e-commerce?
Target audience
What is one of the ways that e-commerce has changed marketing?
Providing new ways of identifying and communicating with customers
What is an example of a business model in e-commerce?
Portal
What is behavioral targeting in e-commerce?
Collecting information on a consumer and advertising to them based on their interests
What is the primary focus of social e-commerce?
Integrating social media platforms with online shopping
What is the main goal of social network marketing?
To leverage individuals' influence over others to sell products
What type of technology enables the computer-to-computer exchange of standard transactions?
Electronic data interchange (EDI)
What type of platform connects multiple buyers and sellers?
Net marketplace
What is the primary benefit of the internet and networking in B2B e-commerce?
Automation of procurement processes
What is the primary goal of the testing phase in system development?
To ensure the system runs as intended
What type of methodology is focused on modelling processes or actions that manipulate data?
Process-orientated
What is the purpose of the conversion phase in system development?
To change from the old system to the new one
What is the primary unit in systems analysis and design?
Object
What type of diagram visually represents how data moves through a system?
Data flow diagram
In object-orientated modelling, what do objects fall under?
Classes
What is a major consequence of organizations' increasing reliance on computers?
Vulnerability to disruptions
What is the primary goal of controls in an organization?
To ensure the safety of assets, accuracy of records, and adherence to management standards
What is a major reason why computer systems are vulnerable to disruptions?
Hardware problems, such as breakdowns and configuration errors
What is a characteristic of the internet that makes it vulnerable to abuse?
Its openness
What is a type of risk associated with the use of computers and networks outside of a firm's control?
Loss and theft of portable devices
What is an example of a risk associated with the internet?
Unencrypted VOIP
What is the main goal of ransomware?
To demand payment in exchange for restoring access to data
Which type of attack involves intercepting and reading unencrypted data in network traffic?
Sniffing
What is the primary difference between a virus and a worm?
A worm spreads to other devices, while a virus does not
What is the purpose of a rogue access point?
To allow intruders to access network drives and files
What is the goal of a DDoS attack?
To make a website or online service inaccessible to real users
What is the main characteristic of a Trojan?
It disguises itself as harmless or legitimate software
Test your knowledge of the system development life cycle, including design, programming, testing, conversion, and production and maintenance phases.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free