Q.1
All of the following are examples of intelligent agent technology except ________.
Q.2
What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time?
Q.3
Which of the following is an Internet‐based company that makes it easy for one person to pay another over the Internet?
Q.4
The process of getting customers to pass along a company's marketing message to friends, family, and colleagues is known as _______.
Q.5
Complete price transparency in a perfect information marketplace is necessary for ____________ to take effect.
Q.6
What is a model of a proposed product, service, or system?
Q.7
Which of the following is not considered to be one of the three phases of e-commerce?
Q.8
Which factor determines when your IT system will be available for knowledge workers to access?
Q.9
Which of the following is used in B2B to pay for purchases?
Q.10
A security plan begins with a(n) is ______.
Q.11
The most prevalent online payment method is ______.
Q.12
When a transaction is processed online, how can the merchant verify the customer's identity?
Q.13
The most widely used encryption standard is ______.
Q.14
An electronic check is one form of what?
Q.15
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
Q.16
__________ influence the behavior of others through their personality, skills, or other factors.
Q.17
What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?
Q.18
Public key encryption uses multiple keys.ne key is used to encrypt data, while another is used to decrypt data.he key used to encrypt data is called the _______ key, while the key used to decrypt data is called the ________ key.
Q.19
The only payment system that is instantly convertible without intermediation is _______.
Q.20
What is the name of the division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses across government and private sectors?
Q.21
What type of ad appears on top of a web page?
Q.22
The most common type of Internet crime according to the IC3 is ______.
Q.23
All of the following are major categories of computer viruses except _________.
Q.24
A combination of software and information designed to provide security and information for payment is called a what?
Q.25
The most common form of securing channels is through ________.
Q.26
When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______.
Q.27
If you need to transfer money to another person via the internet, which of the following methods could you use?
Q.28
A(n) _________ represents data as two-dimensional tables with records organized in rows and attributes in columns.
Q.29
What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?
Q.30
All of the following are types of data mining except ______.
0 h : 0 m : 1 s