Card Set Information
SHOPPING CART APPLICATIONS
PROGRAMS CAN BE WRITTEN WITH THIS TO ADD FUNCTIONALITY TO WEB PAGES
TEXT FILE CONTAINING IDENTIFYING INFORMATION FOR A STORE
CONTAINS ALL FUNCTIONALITY FOR DIRECT SALES WITHOUT INTERMEDIARY
SOFTWARE DESIGNED TO CREATE PROFESSIONAL LOOKING BOOK PAGES AN D COVERS
WHAT IS IN A COOKIE?
COMPANY NAME AND CUSTOMER IDENTITY CODE
INTENTIONAL DECEPTION OF GAINING SOMETHING IN VALUE
RESULTS IN IMPERSONATION OF THE VICTIM TO GAIN ACCESS TO THEIR FUNDS
ELECTRONIC MESSAGE SENT TO TRICK SOMEONE INTO DIVULGING SENSITIVE OR PRIVATE INFORMATION
PROGRAM THAT FACILITATES UNWANTED ADVERTISING
PROGRAM THAT SCANS COOKIES AND RECORDS BROWSING HABITS
When a network server of a supplier connects over the Internet to a network server of a manufacturer in order to exchange data, the new network is called an ________.
Which type of key is used if both the sender and the receiver use the same key to encrypt and decrypt messages?
Consumers shopping on the Internet from other consumers would be referred to as ________.
consumer to consumer (C2C)
encoded text formed as a result of shifting your fingers on the keyboard
uses a private key to encrypt data uniquely identifying the prograM
used to lock and unlock a message
changing unrecognizable code back to plain text
a number sequence assigned to a letter for security
The purpose of a(n) ________ is to get the lowest price on supplies
private communication systems between suppliers and manufacturers
ELECTRONIC DATA INTERCHANGE (EDI)
private supplier's network
online sale held to get the highest selling price for the seller
a way that online business has lowered costs and changed the job market
ONE OF THE MOST POPULAR ONLINE AUCTIONS
If someone has an idea for a potential business, he/she might seek funding from a
If a student decides to do most of his/her Christmas shopping on the Internet, it would be referred to as
business to consumer (B2C)
Which of the following is TRUE about classified ads on the Internet
Ads are in large collections classified by category
The removal of an intermediate step or distributor for business transactions is called
Commercial activities between businesses would be referred to as
business to business (B2B)
When shopping online, most Web sites provide a(n) ________ to allow users to keep track of their purchases prior to checkout.
Which of the following would adware most likely perform?
Adware is responsible for unwanted popups while browsing the Internet.
when both parties use the same key to encrypt and decrypt a message
when two different keys are used to encrypt and decrypt a message
code that is not easily understood by unauthorized people
the original message
specializes in certifying the legitimacy of domain names