Filters
Question type

Study Flashcards

Choose the option below that best describes how a website owner can obtain a digital certificate.


A) Digital Certificates are automatically created when you register for a domain name
B) Visit a certificate authority and apply for a digital certificate
C) Digital Certificates are automatically created when you are listed in a search engine
D) none of the above

Correct Answer

verifed

verified

According to a recent U.S. Census report, the type of product that sells best online is


A) clothing, accessories, and footwear
B) food and candy
C) books, music, and videos
D) home appliances and electronics

Correct Answer

verifed

verified

Select a reason why a business would use E-Commerce.


A) reduced costs
B) ability to comparison shop
C) using shopping carts
D) none of the above

Correct Answer

verifed

verified

A

International Issues uniquely related to E-Commerce include:


A) currency conversion
B) browser version, screen resolution
C) culture
D) none of the above

Correct Answer

verifed

verified

Identify a protocol that allows data to be privately exchanged over public networks.


A) SSL
B) TCP
C) IP
D) None of the above

Correct Answer

verifed

verified

Select a major function of E-Commerce.


A) using SSL to encrypt orders
B) adding items to a shopping cart
C) the buying and selling of goods
D) none of the above

Correct Answer

verifed

verified

_____ A merchant account is a type of business bank account that allows a business to accept credit card payments.

Correct Answer

verifed

verified

A _______ is a form of an asymmetric key that also contains additional information about the entity holding the certificate.


A) SSL
B) SET
C) Digital Certificate
D) None of the above

Correct Answer

verifed

verified

Choose the true statement from those shown below:


A) A Merchant Account allows you to use SSL on your web site.
B) Shopping cart plug-ins or extensions are available for popular web authoring tools such as Microsoft FrontPage and Macromedia Dreamweaver.
C) Instant storefronts are what most large-scale E-Commerce sites use.
D) None of the above is true

Correct Answer

verifed

verified

Select an encryption method that uses a single shared, private key.


A) Symmetric Encryption
B) Asymmetric Encryption
C) Hash Algorithm
D) Security Lock Encryption

Correct Answer

verifed

verified

Select the term below that describes communication that uses a radio frequency to share information between electronic devices in close proximity.


A) cybersquatting
B) digital certificate
C) shopping cart
D) Near Field Communication (NFC)

Correct Answer

verifed

verified

Most commercial _________________ include(s) an online catalog, a shopping cart, and a secure order form.


A) web host providers
B) shopping cart software
C) web server software
D) e-commerce hosting packages

Correct Answer

verifed

verified

Identify a potential risk for businesses using E-Commerce.


A) increased customer satisfaction
B) the possibility of fraudulent transactions
C) inconvenience of returns
D) none of the above

Correct Answer

verifed

verified

The transfer of business data between different companies using networks is called ____.


A) FTP
B) EDI
C) e-mail
D) None of the above

Correct Answer

verifed

verified

Select the term below that describes an electronic payment for goods or services using a mobile device such as a smartphone.


A) symmetric encryption
B) cash payment
C) mobile payment
D) shopping cart

Correct Answer

verifed

verified

_____ Although E-commerce growth stalled during the recent economic downturn, it is again demonstrating growth.

Correct Answer

verifed

verified

_____ Decryption is the conversion of data into an unreadable form.

Correct Answer

verifed

verified

False

Identify a disadvantage of an instant online storefront.


A) the store is based on a template and may look very similar to other online stores
B) the store can be ready in minutes
C) the store cannot accept credit cards
D) none of the above

Correct Answer

verifed

verified

Encrypted data is called ______


A) ciphertext
B) cybersquatting
C) symmetric-key
D) shopping cart .

Correct Answer

verifed

verified

A

The practice of registering a domain name that is a trademark of another entity in the hopes of profiting by selling the domain name to the entity is called______.


A) symmetric encryption
B) cybersquatting
C) fraud
D) ciphertext

Correct Answer

verifed

verified

Showing 1 - 20 of 20

Related Exams

Show Answer