Question
1-a physical system attack can be best described as: when unauthorized users gain access to an organization's computer equipment, perhaps by stealing or forging a
1-a physical system attack can be best described as:
when unauthorized users gain access to an organization's computer equipment, perhaps by stealing or forging a user's credentials
when users are convinced to release information that will enable fraudulent activity
when message traffic is illicitly captured and modified, perhaps by physically tapping into a network
when pieces of code installed in a system allow remote users or systems to control the system's actions
2- a denial of service attack would impact a user or organization in one or more of the following ways:
Prevent a financial firm from completing monetary transactions
Result in altered grade records for a school system
Disable all wireless access points within a large medical facility
Allow proprietary softwarecode to be stolen from a large software developmentfirm
Prevent a physician from accessing a patient's electronic health record
3-Personalization is an important part of e-commerce. Personalization includes having an understanding of the following information from a customer:
Personal Information
Preference Information
All of these
Demographic Information
Behavioral Information
4- According to the lecture, an e-commerce site component that provides for the integration of the look and feel of a site with other sites that use it as a service is called a:
Presentation Layer Component
Look and Feel Component
User Interaction Component
User Interface Connector Component
Integration Component
5-Hybrid physical and virtual e-commerce models are proving to be a valuable approach maintaining a competitive advantage because it facilitates:
Customers who order online may be able to pick-up products at stores or distribution centers, often without added delivery costs
Eliminates the need to charge shipping fees on all home deliveries.
Items not available in the correct style, color or size in the store can be ordered immediately.
Renders all previous advertising, marketing, logistics and distribution models for an organization obsolete, whichrequires an organization to deploy newupdatedmodels.
6-a security attack which prevents a user or organization from using their software, networks, and hardware is called a:
service attack
theft of data and software attack
denial of service attack
theft of service attack
preventative attack
7-The significant advantages of the "buy-online, pick-up-in-store" or BOPS model of hybrid e-commerce for the seller are:
An efficient and effective way to deliver streaming downloads of music and video productsthat can be returned to a physicalstore.
When used appropriately BOPS will result in a lower cost-to-serve ratio,
Allows the business to drop legacy marketing and distribution processes in favor of more streamlined and improved processes.
Allows a seller to offer free or reduced shipping fees by leveraging existing procurement, logistics and distribution channels.
8-Knowing the customers, their on-line activities and buying habits are key to the design, delivery and sustaining of an e-commerce presence. Which of the following site management components will help an organization understand their customer's behavior?
Indexing
BlogAnalysis
Profiling
Content and Catalog Management
9-Which of the followingdoes notsupport a physical and virtual hybrid e-commerce approach?
Emphasize a place for returns and complaints
Customers can inspect closeout and clearance merchandise at a particular store
Customers who orderonline are able to pick-up products at stores or distribution centers
e-commerce can leverage and augment other business capabilities already in place
Support on the spot ordering of out-of-stock or customized products.
10-Which of the following are complications that need to be considered regarding data ownership?
The country or countries were the data is stored and or accessed
Cloud computing, data mining and data analytics
The age of the data collected and the length of time it has been retained prior to being discarded.
The actual content of the data stored.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started