COMPUTERS3

Card Set Information

Author:
wrexshop
ID:
290510
Filename:
COMPUTERS3
Updated:
2014-12-03 01:02:34
Tags:
COMPUTER
Folders:

Description:
COMPUTERS
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user wrexshop on FreezingBlue Flashcards. What would you like to do?


  1. JAVA
    SHOPPING CART APPLICATIONS
  2. ACTIVEX
    PROGRAMS CAN BE WRITTEN WITH THIS TO ADD FUNCTIONALITY TO WEB PAGES
  3. COOKIE
    TEXT FILE CONTAINING IDENTIFYING INFORMATION FOR A STORE
  4. STOREFRONT SOFTWARE
    CONTAINS ALL FUNCTIONALITY FOR DIRECT SALES WITHOUT INTERMEDIARY
  5. DESKTOP PUBLISHING
    SOFTWARE DESIGNED TO CREATE PROFESSIONAL LOOKING BOOK PAGES AN D COVERS
  6. WHAT IS IN A COOKIE?
    COMPANY NAME AND CUSTOMER IDENTITY CODE
  7. INTENTIONAL DECEPTION OF GAINING SOMETHING IN VALUE
    FRAUD
  8. RESULTS IN IMPERSONATION OF THE VICTIM TO GAIN ACCESS TO THEIR FUNDS
    IDENTITY THEFT
  9. ELECTRONIC MESSAGE SENT TO TRICK SOMEONE INTO DIVULGING SENSITIVE OR PRIVATE INFORMATION
    PHISHING
  10. PROGRAM THAT FACILITATES UNWANTED ADVERTISING
    ADWARE
  11. PROGRAM THAT SCANS COOKIES AND RECORDS BROWSING HABITS
    SPYWARE
  12. When a network server of a supplier connects over the Internet to a network server of a manufacturer in order to exchange data, the new network is called an ________.
    EXTRANET
  13. Which type of key is used if both the sender and the receiver use the same key to encrypt and decrypt messages?
    SYMMETRIC
  14. Consumers shopping on the Internet from other consumers would be referred to as ________.
    consumer to consumer (C2C)
  15. encoded text formed as a result of shifting your fingers on the keyboard
    cipher texT
  16. uses a private key to encrypt data uniquely identifying the prograM
    digital signature
  17. used to lock and unlock a message
    KEY
  18. changing unrecognizable code back to plain text
    DECRYPTION
  19. a number sequence assigned to a letter for security
    CODE GROUP
  20. The purpose of a(n) ________ is to get the lowest price on supplies
    REVERSE AUCTION
  21. private communication systems between suppliers and manufacturers
    ELECTRONIC DATA INTERCHANGE (EDI)
  22. private supplier's network
    EXTRANET
  23. online sale held to get the highest selling price for the seller
    AUCTION
  24. a way that online business has lowered costs and changed the job market
    disintermediation
  25. ONE OF THE MOST POPULAR ONLINE AUCTIONS
    EBAY
  26. If someone has an idea for a potential business, he/she might seek funding from a
    VENTURE CAPITALIST
  27. If a student decides to do most of his/her Christmas shopping on the Internet, it would be referred to as
    business to consumer (B2C)
  28. Which of the following is TRUE about classified ads on the Internet
    Ads are in large collections classified by category
  29. The removal of an intermediate step or distributor for business transactions is called
    disintermediation
  30. Commercial activities between businesses would be referred to as
    business to business (B2B)
  31. When shopping online, most Web sites provide a(n) ________ to allow users to keep track of their purchases prior to checkout.
    shopping cart
  32. Which of the following would adware most likely perform?
    Adware is responsible for unwanted popups while browsing the Internet.
  33. when both parties use the same key to encrypt and decrypt a message
    symmetric key
  34. when two different keys are used to encrypt and decrypt a message
    private key
  35. code that is not easily understood by unauthorized people
    encryption
  36. the original message
    plain text
  37. specializes in certifying the legitimacy of domain names
    certificate authority

What would you like to do?

Home > Flashcards > Print Preview