System Development Life Cycle
29 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is one of the characteristics of ubiquity in e-commerce?

  • Virtual transaction (correct)
  • Cultural boundaries
  • Physical presence
  • High transaction costs

What is an example of digital goods?

  • Software (correct)
  • Books
  • Clothing
  • Furniture

What is the main difference between B2B and B2C e-commerce?

  • Target audience (correct)
  • Type of products
  • Payment methods
  • Type of business

What is one of the ways that e-commerce has changed marketing?

<p>Providing new ways of identifying and communicating with customers (D)</p> Signup and view all the answers

What is an example of a business model in e-commerce?

<p>Portal (A)</p> Signup and view all the answers

What is behavioral targeting in e-commerce?

<p>Collecting information on a consumer and advertising to them based on their interests (A)</p> Signup and view all the answers

What is the primary focus of social e-commerce?

<p>Integrating social media platforms with online shopping (C)</p> Signup and view all the answers

What is the main goal of social network marketing?

<p>To leverage individuals' influence over others to sell products (B)</p> Signup and view all the answers

What type of technology enables the computer-to-computer exchange of standard transactions?

<p>Electronic data interchange (EDI) (D)</p> Signup and view all the answers

What type of platform connects multiple buyers and sellers?

<p>Net marketplace (A)</p> Signup and view all the answers

What is the primary benefit of the internet and networking in B2B e-commerce?

<p>Automation of procurement processes (A)</p> Signup and view all the answers

What is the primary goal of the testing phase in system development?

<p>To ensure the system runs as intended (A)</p> Signup and view all the answers

What type of methodology is focused on modelling processes or actions that manipulate data?

<p>Process-orientated (C)</p> Signup and view all the answers

What is the purpose of the conversion phase in system development?

<p>To change from the old system to the new one (C)</p> Signup and view all the answers

What is the primary unit in systems analysis and design?

<p>Object (A)</p> Signup and view all the answers

What type of diagram visually represents how data moves through a system?

<p>Data flow diagram (B)</p> Signup and view all the answers

In object-orientated modelling, what do objects fall under?

<p>Classes (B)</p> Signup and view all the answers

What is a major consequence of organizations' increasing reliance on computers?

<p>Vulnerability to disruptions (A)</p> Signup and view all the answers

What is the primary goal of controls in an organization?

<p>To ensure the safety of assets, accuracy of records, and adherence to management standards (C)</p> Signup and view all the answers

What is a major reason why computer systems are vulnerable to disruptions?

<p>Hardware problems, such as breakdowns and configuration errors (A)</p> Signup and view all the answers

What is a characteristic of the internet that makes it vulnerable to abuse?

<p>Its openness (B)</p> Signup and view all the answers

What is a type of risk associated with the use of computers and networks outside of a firm's control?

<p>Loss and theft of portable devices (D)</p> Signup and view all the answers

What is an example of a risk associated with the internet?

<p>Unencrypted VOIP (B)</p> Signup and view all the answers

What is the main goal of ransomware?

<p>To demand payment in exchange for restoring access to data (D)</p> Signup and view all the answers

Which type of attack involves intercepting and reading unencrypted data in network traffic?

<p>Sniffing (D)</p> Signup and view all the answers

What is the primary difference between a virus and a worm?

<p>A worm spreads to other devices, while a virus does not (A)</p> Signup and view all the answers

What is the purpose of a rogue access point?

<p>To allow intruders to access network drives and files (A)</p> Signup and view all the answers

What is the goal of a DDoS attack?

<p>To make a website or online service inaccessible to real users (A)</p> Signup and view all the answers

What is the main characteristic of a Trojan?

<p>It disguises itself as harmless or legitimate software (C)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser