Sale!

ECOM 210 Final Exam

$35.00 $25.00

Share on facebook
Share on whatsapp
Share on twitter
Share on pinterest
Share on linkedin
Share on reddit
Share on skype
Share on email

ECOM 210 Final Exam

Question 1.1. (TCO 2) Mobile devices used in m-commerce include (Points : 5)

cell phones and smart phones.
PDAs.
portable computers.
All of the above

 

Question 2.2. (TCO 2) What is an example of mobile entertainment that you might utilize via your smartphone? (Points : 5)

Music and video
Mobile games
Mobile gambling
All of the above

 

Question 3.3. (TCO 2) Infrastructures that support mobile computing are (Points : 5)

mobile devices, network access points, and servers.
WAP gateways, GPS locators, and GPS satellites.
PDAs, smartphones, and PCs.
web servers, mobile devices, and microbrowsers.

 

Question 4.4. (TCO 3) Companies that have both a physical location and an online website are called (Points : 5)

brick-and-mortar retailers.
virtual or pure-play companies.
click-and-mortar retailers.
channel partners.

 

Question 5.5. (TCO 3) The ethical issue by collaborative filtering is (Points : 5)

spamming.
invasion of privacy.
theft of intellectual property.
security.

Hi there! Get instant help with . Without paying anything upfront.

Question 6.6. (TCO 3) A company that creates and manages many-to-many markets is called a (Points : 5)

market maker.
transaction broker.
content disseminator.
viral marketer.

 

Question 7.7. (TCO 4) Access to a network should be based on (Points : 5)

the policy of least privilege, where access to network resources is blocked and permitted only when needed to conduct business.
the policy of acceptable use, where access is restricted by the firewall.
role-specific security protocols, where access is limited by a user’s level of trust.
the policy of need to know, where access by all nonemployees is blocked.

 

Question 8.8. (TCO 4) All of the following are characteristics of access control except (Points : 5)

access control determines which persons, programs, or machines can legitimately use a network resource and which resources he, she, or it can use.
access control lists (ACLs) define users’ rights, such as what they are allowed to read, view, write, print, copy, delete, execute, modify, or move.
all resources need to be considered together to identify the rights of users or categories of users.
after a user has been identified, the user must be authenticated.

 

Question 9.9. (TCO 4) Which of the following does not describe threats or attacks? (Points : 5)

Social engineering is a type of nontechnical attack to circumvent technological security measures by manipulating people to disclose crucial authentication information.
Even though most people are aware of phishing scams, phishers still remain a serious threat because they change their tactics and too many users are easily tricked by the scams.
The time to exploitation of today’s most sophisticated spyware and worms has increased from days to weeks because of stronger firewalls.
All of the above

 

Question 10.10. (TCO 4) All of the following are important security functions of proxy servers except (Points : 5)

improving network performance.
helping control inbound traffic to a network.
helping control outbound traffic to a network.
hiding the IP addresses of a company’s internal computers.

 

Question 11.11. (TCO 5) Sears’s marketing strategy would best be described as (Points : 5)

a brick-and-mortar strategy.
a shared-service mall strategy.
a click-and-mortar strategy.
direct marketing from a manufacturer.

 

Question 12.12. (TCO 5) The combination of the encrypted original message and the digital signature using the recipient’s public key is called (Points : 5)

digital envelope.
message digest.
hash.
public key.

 

Question 13.13. (TCO 5) Factors that come into play in determining whether a particular e-payment method achieves critical mass include all of the following except (Points : 5)

difficulty of use.
independence.
anonymity.
divisibility.

 

Question 14.14. (TCO 6) Which of the following is a private B2B e-marketplace? (Points : 5)

Company ABC sells machine parts to its 20 customers using a print catalog.
Company ABC participates with other producers and buyers to sell and buy machine parts on a central website.
Company ABC sells machine parts to its 20 customers on its website.
Company ABC sells CDs to the public on its website.

 

Question 15.15. (TCO 7) This is an exclusive right of the author or creator of artistic property to print, copy, sell, license, distribute, transform to another medium, translate, record, perform, or otherwise use it. (Points : 5)

Trademark
Patent
Intellectual property
Copyright

 

Question 16.16. (TCO 8) To avoid getting inaccurate information from participants of online surveys, marketers learn about customers by observing their behavior using each of the following except (Points : 5)

direct mailings.
cookies that allow a website to store on the user’s PC.
spyware that gathers user information through an Internet connection without the user’s knowledge.
data mining to analyze clickstream data.

 

 

  1. (TCO 1) Compare and contrast Web 1.0 versus Web 2.0.(Points : 35)
  2. (TCO 2) List and explain the major infrastructure elements and tools of e-supply chain management.(Points : 35)
  3. (TCO 6) What are some service industries that utilize B2B; list at least three and then describe how they utilize this application.(Points : 35)
  4. (TCO 6) Describe reverse-auction process and list the benefit of this process.(Points : 35)
  5. (TCO 5) List at least three different B2C business models and briefly describe them.(Points : 35)
  6. (TCO 6) Distinguish between organizational buyers and individual consumers.(Points : 35)
do-my-paper-pay-someone-to-write-my-paper

do you want to boost your grades? yes?

stop thinking we are eager to help you out

Payment Methods

Contact

Scroll to Top