All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
electronic commerce
Questions and Answers of
Electronic Commerce
Best Cutting Boards (BCB) makes and sells handcrafted wood cutting boards online. BCB offers about 100 different products for sale on its Web site, which sees about 9000 visitors per month. The
You are an information technology (IT) consultant to Materials Equipment, Inc. (MEI), a major industrial equipment distributor. Its products include materials-handling machinery for
What is a countermeasure?
In about 100 words, explain the difference between session cookies and persistent cookies. In your answer, be sure to include how each type of cookie is used.
What is a white hat hacker?
Write a paragraph in which you explain the concept of a sandbox and describe how it can be used to reduce security risks in client computers.
Briefly explain what secrecy, integrity, and necessity are in the context of computer security.
In a paragraph or two, explain what a botnet is and how it could cause more damage than a single Trojan horse attack.
What is a man-in-the-middle exploit?
In about 100 words, explain what assurances a certification authority (CA) provides to a business that purchases one of its digital certificates. In your answer, describe what general procedures a CA
What is a security policy?
Provide one example of an integrity violation.
In a paragraph or two, describe the purpose and use of a sniffer program.
In about 100 words, describe the function of an anonymous Web service and explain why an individual or company might want to use such a service.
What is a session cookie?
What is a third-party cookie?
In about 200 words, explain the differences between private-key encryption and public-key encryption. In your answer, include examples of when and why each might be used.
What is a Web bug?
What is active content?
What is a scripting language?
What is a zombie?
What is a macro virus?
How is a multivect or worm or virus a more severe threat than other worms or viruses?
What is signed code?
What is a biometric security device?
What is a backdoor?
Who are most likely to be victimized by a phishing expedition?
Briefly describe what occurs in a denial-of-service attack.
What is a hash algorithm and when might it be used?
What is a message digest?
What is a dictionary attack?
How does a packet-filter firewall work?
What is computer forensics?
Name the most common forms of payment used in online transactions.
In about 100 words, discuss issues that arise when processing small payments (under $10) for online transactions. Be sure to describe the solutions to any problems you identify, including the names
One of the fastest-growing segments of the online payments business is mobile payments. U.S. mobile payments are expected to reach $140 billion by 2019 and purchases using mobile devices could
What types of companies are most likely to use biller-direct EBPP systems?
In a paragraph, explain how payment processing is different for credit cards and debit cards.
Rod and Martha Nelson started The Moose Hut (TMH), a gift shop in Calgary, Alberta, more than 15 years ago. The Nelsons have capitalized on the tourist trade drawn by the Calgary Stampede, which is
What types of companies are most likely to use consolidator EBPP systems?
In about 100 words, explain what a “card not present” transaction is and why it presents a greater risk than card present transactions for a retail business.
Use W3C Link Checker or Elsop LinkScan Quick Check to check the links on any Web site of your choice. Print a few pages of the report and be prepared to turn them in to your instructor. Be patient.
What is the function of a request message in a two-tier client-server architecture.
In about 100 words, describe the key characteristics of a blade server and outline reasons that an online business might prefer to use blade servers for Web server applications.
What is the relationship between UNIX and Linux?
Large computing installations (such as server farms) can have significant impacts on the environment. In about 100 words, summarize these impacts and recommend measures that can be taken to reduce
What is open source software?
In about 100 words, outline the benefits and costs of using a decentralized instead of a centralized server architecture for an online business operation.
Name one specific concern that business organizations have about e-mail attachments.
Briefly explain the difference between client-level and server-level spam filtering.
What problem is created by false positives in white list spam filters?
Briefly explain how a challenge-response system works to reduce spam.
What is Bayesian revision?
What is teergrubing?
Provide one example of the type of information that might be included in a Web log file.
What is an orphan file on a Web server?
In a Web server, what is throughput?
What is a load-balancing switch?
What is a content delivery network?
What are the main functions of a commerce service provider?
In one or two paragraphs, outline the differences between shared and dedicated hosting.
How does Web server co-location differ from a shared Web server?
In about 100 words, outline the key elements that should be a part of any electronic commerce software package.
How does Web server co-location differ from a shared Web server?
Giving online customers alternative paths that lead to products in which they might be interested is important. In about 100 words, explain how static and dynamic catalogs could either facilitate or
Why is the stateless nature of the Internet a problem for shopping cart software?
In about 200 words, explain why shopping cart abandonment could be a problem for an online retailer and describe at least two measures that can be taken to reduce its occurrence.
Outline the function of a fulfillment integration provider.
In a paragraph or two, describe the goals of enterprise application integration and explain why XML is often used in such efforts.
What is a product recommendation trigger?
In about 100 words, describe the idea behind software as a service (SaaS). In your answer, include at least three examples of electronic commerce software packages or components that are
What is shopping cart abandonment?
In about 200 words, outline the difference between the Simple Object Access Protocol (SOAP) and the Representational State Transfer (REST) principle as they are used in the creation of Web services.
Name the main functions of shopping cart software.
Electronic commerce software must summarize sales and shipments. In about 100 words, explain how software for a small online store might accomplish this task and contrast it with how software for a
Why is the calculation of sales taxes a complex matter?
In two or three paragraphs, outline the differences between knowledge management software and content management software. Include a description of at least one application of each that might be
List the steps that must occur to process an online retail sales transaction.
In two or three paragraphs, explain how database software could be an important part of a customer relationship management system as used in an online business.
Why would database management software be an important component of an online business Web site’s technology?
What is middleware?
What is business logic?
Why is application integration an important part of running an online business?
Which business functions are integrated in a typical ERP system?
What is the difference between software as a service (SaaS) and Web services?
Briefly describe one example of a Web service that might be a useful part of an online Web site.
What are the key differences between a basic commerce service provider (CSP) and a mallstyle CSP?
What is the key function of a content management system as used in an online business?
The CAN-SPAM law prohibits a business from including misleading information in an e-mail header if the message is related to a transaction. In about 100 words, explain why the drafters of the law
How do most U.S. Web sites obtain a user’s agreement to its end-user license agreement (EULA)?
The Good Grow Seed Company sells vegetable and flower seeds to home gardeners online and has noticed that many of its customers order the same types of seeds each year when they plant their gardens.
Use your favorite Web search engine to obtain a list of Web pages that include the words “privacy statement.” Visit the Web pages on the search results list until you find a page that includes
What is an implied warranty?
What is a meetup?
What is the function of a request message in a two-tier client-server architecture.
List the main tasks performed by a Web server computer.
In about 200 words, distinguish between white-list and black-list spam filters, then outline the advantages and disadvantages of each.
Name and briefly define the different types of server computers that might be used in an online business.
In about 200 words, distinguish between white-list and black-list spam filters, then outline the advantages and disadvantages of each.
What is dynamic Web page content?
Showing 400 - 500
of 762
1
2
3
4
5
6
7
8