____ is a form of e-commerce in which the participants are individuals, with one serving as the buyer and the other as the seller. a. B2B b. B2C    c. C2C    d. C2B

Fundamentals of Information Systems
9th Edition
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Ralph Stair, George Reynolds
Chapter5: Electronic Commerce And Enterprise Systems
Section: Chapter Questions
Problem 5SAT
icon
Related questions
Question
  1. ____ is a form of e-commerce in which the participants are individuals, with one serving as the buyer and the other as the seller.

    a. B2B
    b. B2C
       c. C2C
       d. C2B
  2. A(n) ____ is a single Web site that offers many products and services at one Internet location.

    a. electronic exchange
    b. cybermall
       c. cybershop
       d. electronic shop

3.____ is also known as digital cash.

   a. Electronic credit
   b. Anonymous electronic cash
   c. Identified electronic cash
   d. Electronic cash

  1. A(n) ____ file is a file that contains information about visitors to a Web site.

    a. dynamic Web page
    b. static Web page
       c. HTML
       d. Web log
  2. ____ is a standard set of specifications for Internet applications that run on handheld, wireless devices.

    a. WPS
    b. HWP
       c. WAP
       d. WEP
  3. The most successful e-commerce models include ____ basic components.

    a. two
    b. three
       c. four
       d. five

 

 

  1. ____ is a communications protocol used to secure sensitive data.

    a. Telnet
    b. TCP
       c. FTP
       d. SSL

 

  1. ____ is software used by buyers to build the product they need online.

    a. Catalog management software
    b. Product configuration software
       c. E-commerce software
       d. E-commerce transaction processing software

 

  1. ____ is a form of e-commerce in which the participants are organizations.

    a. B2B
    b. B2C
       c. C2C
       d. C2B
  2. A(n) ____ is a person who enjoys computer technology and spends time learning and using computer systems.

    a. cracker
    b. script bunny
       c. insider
       d. hacker

  3. A(n) ____ is an application or system virus designed to "explode" or execute at a specified time and date.

    a. Trojan horse
    b. worm
       c. variant
       d. logic bomb
  4. In the public key infrastructure, the message receiver’s ____ key is used to ____ messages.

    a. public; encrypt
    b. public; decrypt
       c. private; encrypt
       d. private; decrypt
  5. ____ is a silicon computer chip that is nonvolatile and keeps its memory when the power is shut off.

    a. Expandable storage
    b. RAM
       c. Flash drive
       d. Enterprise storage
  6. Data is moved within a computer system in units called ____.

    a. bits
    b. MIPS
       c. nibs
       d. hertz
  7. ____ is a retrieval method in which data can be retrieved without the need to read and discard other data.

    a. Parallel access
    b. Sequential access
       c. Concurrent access
       d. Direct access
  8. ____ is a process by which human-readable data is converted into a machine-readable form.

    a. Data input
    b. Data entry
       c. Source data automation
       d. Data output

 

  1. A CD-ROM is an example of a(n) ____.

    a. magneto-optical disk
    b. optical disc
       c. digital versatile disk
       d. magnetic disk
  2. Technology ____ is the extent to which technology is deeply integrated into an area or department.

    a. infusion
    b. acceptance
       c. diffusion
       d. use
  3. ____ consists of a collection of approaches, tools, and techniques that fosters a commitment to quality throughout the organization.

    a. Six sigma
    b. Total quality management
       c. Continuous improvement
       d. Organizational structure

20.Which of the following is an example of a multiuser system?

   a. Thin client
   b. Mainframe
   c. Desktop
   d. Workstation

  1. ___ is a retrieval method in which data can be retrieved without the need to read and discard other data.

    a. Parallel access
    b. Sequential access
       c. Concurrent access
       d. Direct access
  2. Data is moved within a computer system in units called ____.

    a. bits
    b. MIPS
       c. nibs
       d. hertz
  3. The ____ is the portion of the CPU that performs mathematical calculations and makes logical comparisons.

    a. control unit
    b. ALU
       c. register
       d. primary storage
  4. A(n) ____ requires that text commands be given to the computer to perform basic activities.

    a. graphical user interface
    b. user interface
       c. command-based user interface
       d. application program interface
  5. ___ applications can be used to write letters, holiday greeting cards, work reports, and term papers.

    a. Spreadsheet
    b. Database
       c. Graphics
       d. Word processing
  6. The source code for the ____ operating system is freely available to everyone.

    a. Windows
    b. Linux
       c. Mac OS X
       d. NetWare
  7. ____ is an example of open-source database software.

    a. MySQL
    b. Linux
       c. Mozilla
       d. Jabber
  8. A significant and (ideally) long term benefit to a company over its competition is referred to as a competitive ____.

    a. advantage
    b. superiority
       c. leg-up
       d. supremacy
  9. Technology ____ is the extent to which technology is deeply integrated into an area or department.

    a. infusion
    b. acceptance
       c. diffusion
       d. use
  10. Business Process Reengineering has the qualities of being ____ and ____.

    a. worker driven, often led by outsiders
    b. narrow in scope, driven by senior executive
       c. worker driven, broad in scope
       d. broad in scope, often led by outsiders
  11. 30. The computer ____ is the structure, or configuration, of the hardware components of a computer system.

    system architecture
    b. hardware architecture
       c. system setup
       d. hardware schema
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Internet
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781337097536
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Principles of Information Systems (MindTap Course…
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781305971776
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
MIS
MIS
Computer Science
ISBN:
9781337681919
Author:
BIDGOLI
Publisher:
Cengage
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781305082168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning