Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1-a physical system attack can be best described as: when unauthorized users gain access to an organization's computer equipment, perhaps by stealing or forging a

1-a physical system attack can be best described as:

when unauthorized users gain access to an organization's computer equipment, perhaps by stealing or forging a user's credentials

when users are convinced to release information that will enable fraudulent activity

when message traffic is illicitly captured and modified, perhaps by physically tapping into a network

when pieces of code installed in a system allow remote users or systems to control the system's actions

2- a denial of service attack would impact a user or organization in one or more of the following ways:

Prevent a financial firm from completing monetary transactions

Result in altered grade records for a school system

Disable all wireless access points within a large medical facility

Allow proprietary softwarecode to be stolen from a large software developmentfirm

Prevent a physician from accessing a patient's electronic health record

3-Personalization is an important part of e-commerce. Personalization includes having an understanding of the following information from a customer:

Personal Information

Preference Information

All of these

Demographic Information

Behavioral Information

4- According to the lecture, an e-commerce site component that provides for the integration of the look and feel of a site with other sites that use it as a service is called a:

Presentation Layer Component

Look and Feel Component

User Interaction Component

User Interface Connector Component

Integration Component

5-Hybrid physical and virtual e-commerce models are proving to be a valuable approach maintaining a competitive advantage because it facilitates:

Customers who order online may be able to pick-up products at stores or distribution centers, often without added delivery costs

Eliminates the need to charge shipping fees on all home deliveries.

Items not available in the correct style, color or size in the store can be ordered immediately.

Renders all previous advertising, marketing, logistics and distribution models for an organization obsolete, whichrequires an organization to deploy newupdatedmodels.

6-a security attack which prevents a user or organization from using their software, networks, and hardware is called a:

service attack

theft of data and software attack

denial of service attack

theft of service attack

preventative attack

7-The significant advantages of the "buy-online, pick-up-in-store" or BOPS model of hybrid e-commerce for the seller are:

An efficient and effective way to deliver streaming downloads of music and video productsthat can be returned to a physicalstore.

When used appropriately BOPS will result in a lower cost-to-serve ratio,

Allows the business to drop legacy marketing and distribution processes in favor of more streamlined and improved processes.

Allows a seller to offer free or reduced shipping fees by leveraging existing procurement, logistics and distribution channels.

8-Knowing the customers, their on-line activities and buying habits are key to the design, delivery and sustaining of an e-commerce presence. Which of the following site management components will help an organization understand their customer's behavior?

Indexing

BlogAnalysis

Profiling

Content and Catalog Management

9-Which of the followingdoes notsupport a physical and virtual hybrid e-commerce approach?

Emphasize a place for returns and complaints

Customers can inspect closeout and clearance merchandise at a particular store

Customers who orderonline are able to pick-up products at stores or distribution centers

e-commerce can leverage and augment other business capabilities already in place

Support on the spot ordering of out-of-stock or customized products.

10-Which of the following are complications that need to be considered regarding data ownership?

The country or countries were the data is stored and or accessed

Cloud computing, data mining and data analytics

The age of the data collected and the length of time it has been retained prior to being discarded.

The actual content of the data stored.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Quantitative Methods For Business

Authors: David Anderson, Dennis Sweeney, Thomas Williams, Jeffrey Cam

11th Edition

978-0324651812, 324651813, 978-0324651751

More Books

Students also viewed these General Management questions

Question

What is the scope of the intervention (e.g., all diverse groups)?

Answered: 1 week ago

Question

What is Ramayana, who is its creator, why was Ramayana written?

Answered: 1 week ago