You are on page 1of 2

In this type of e-commerce, the sellers and buyers are organizations.

: consumer to business; business to


consumer; business to business; consumer to consumer. business to business
In a process called _________, a company allows nothing to run unless it is approved, whereas in a
process called _________, the company allows everything to run unless it is not approved.
whitelisting, blacklisting
Which of the following is not a strategy for mitigating the risk of threats against information?
All of the above are strategies for mitigating risk
The computing skills necessary to be a hacker are increasing. False
_____ auctions are the most common auction model for large purchases.: Reverse
The advantages of electronic commerce for consumers include all of the following except: You typically
cannot access additional information, so you do not have information overload.
Unintentional threats to information systems include all of the following except: malicious software
Electronic commerce provides opportunities for companies to do all of the following except: expand at
relatively high cost
Which of the following is not an example of Web 2.0 applications? Social Networks
E-commerce affects only businesses that sell products online. False
IT security is the responsibility of everyone in the organization. True
In this type of e-commerce, the sellers and buyers are organizations. business to business
Biometrics are an example of something the user knows something the user wants.
In the _____ marketplace model, EC technology is used to streamline the purchasing process in order to
reduce the cost of items purchased, the administrative cost of procurement, and the purchasing cycle
time. buy-side
You just started to work on a project with three other people. You realize that everyone has their own
notes, which makes it hard for you to keep track of what has been done and what still needs to be done.
Which of the following applications would you suggest the team use? A wiki
Which of the following is not a strategy for mitigating the risk of threats against information? All of the
above are strategies for mitigating risk
If you are an worker managing your fringe benefits over your company's intranet, you are engaging in
_______ e-commerce. business-to-employee
You can always trust the content of Web 2.0 sites. False
Unintentional threats to information systems include all of the following except malicious software
The advantages of electronic commerce for consumers include all of the following except You typically
cannot access additional information, so you do not have information overload.
LinkedIn is a _____________social networking site that makes money from advertising and services.
Business-oriented
Channel conflict occurs when click-and-mortar companies have problems with their regular distributors
when they sell directly to customers online. True
_________ involves building an inappropriate trust relationship with employees for the purpose of
gaining sensitive information or unauthorized access privileges. Social engineering
If you are an worker managing your fringe benefits over your company's intranet, you are engaging in
_______ e-commerce. business-to-employee
In _________ , the organization purchases insurance as a means to compensate for any loss. risk
transference
_____ refers to the practice of registering or using domain names for the purpose of profiting from the
goodwill or trademark belonging to someone else. Cybersquatting
You can always trust the content of Web 2.0 sites. False
Having one backup of your business data is sufficient for security purposes. False
Which of the following statements concerning Web 2.0 sites is false? They cannot be used to start a
business.
In the _____ marketplace model, EC technology is used to streamline the purchasing process in order to
reduce the cost of items purchased, the administrative cost of procurement, and the purchasing cycle
time. buy-side

You might also like