System Development Life Cycle
29 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is one of the characteristics of ubiquity in e-commerce?

  • Virtual transaction (correct)
  • Cultural boundaries
  • Physical presence
  • High transaction costs
  • What is an example of digital goods?

  • Software (correct)
  • Books
  • Clothing
  • Furniture
  • What is the main difference between B2B and B2C e-commerce?

  • Target audience (correct)
  • Type of products
  • Payment methods
  • Type of business
  • What is one of the ways that e-commerce has changed marketing?

    <p>Providing new ways of identifying and communicating with customers</p> Signup and view all the answers

    What is an example of a business model in e-commerce?

    <p>Portal</p> Signup and view all the answers

    What is behavioral targeting in e-commerce?

    <p>Collecting information on a consumer and advertising to them based on their interests</p> Signup and view all the answers

    What is the primary focus of social e-commerce?

    <p>Integrating social media platforms with online shopping</p> Signup and view all the answers

    What is the main goal of social network marketing?

    <p>To leverage individuals' influence over others to sell products</p> Signup and view all the answers

    What type of technology enables the computer-to-computer exchange of standard transactions?

    <p>Electronic data interchange (EDI)</p> Signup and view all the answers

    What type of platform connects multiple buyers and sellers?

    <p>Net marketplace</p> Signup and view all the answers

    What is the primary benefit of the internet and networking in B2B e-commerce?

    <p>Automation of procurement processes</p> Signup and view all the answers

    What is the primary goal of the testing phase in system development?

    <p>To ensure the system runs as intended</p> Signup and view all the answers

    What type of methodology is focused on modelling processes or actions that manipulate data?

    <p>Process-orientated</p> Signup and view all the answers

    What is the purpose of the conversion phase in system development?

    <p>To change from the old system to the new one</p> Signup and view all the answers

    What is the primary unit in systems analysis and design?

    <p>Object</p> Signup and view all the answers

    What type of diagram visually represents how data moves through a system?

    <p>Data flow diagram</p> Signup and view all the answers

    In object-orientated modelling, what do objects fall under?

    <p>Classes</p> Signup and view all the answers

    What is a major consequence of organizations' increasing reliance on computers?

    <p>Vulnerability to disruptions</p> Signup and view all the answers

    What is the primary goal of controls in an organization?

    <p>To ensure the safety of assets, accuracy of records, and adherence to management standards</p> Signup and view all the answers

    What is a major reason why computer systems are vulnerable to disruptions?

    <p>Hardware problems, such as breakdowns and configuration errors</p> Signup and view all the answers

    What is a characteristic of the internet that makes it vulnerable to abuse?

    <p>Its openness</p> Signup and view all the answers

    What is a type of risk associated with the use of computers and networks outside of a firm's control?

    <p>Loss and theft of portable devices</p> Signup and view all the answers

    What is an example of a risk associated with the internet?

    <p>Unencrypted VOIP</p> Signup and view all the answers

    What is the main goal of ransomware?

    <p>To demand payment in exchange for restoring access to data</p> Signup and view all the answers

    Which type of attack involves intercepting and reading unencrypted data in network traffic?

    <p>Sniffing</p> Signup and view all the answers

    What is the primary difference between a virus and a worm?

    <p>A worm spreads to other devices, while a virus does not</p> Signup and view all the answers

    What is the purpose of a rogue access point?

    <p>To allow intruders to access network drives and files</p> Signup and view all the answers

    What is the goal of a DDoS attack?

    <p>To make a website or online service inaccessible to real users</p> Signup and view all the answers

    What is the main characteristic of a Trojan?

    <p>It disguises itself as harmless or legitimate software</p> Signup and view all the answers

    Use Quizgecko on...
    Browser
    Browser