Study sets, textbooks, questions
Upgrade to remove ads
Combo with E-Commerce Chapter 11 Final Review and 2 others
Terms in this set (348)
Involves a group of people, shared social interaction, common ties among members, and people who share an area for some period of time.
online social network
An area online, where people who share common ties can interact with one another.
Offer members opportunities to interact with a general audience organized into general topics.
Offers members focused discussion groups, help, information, and knowledge relating to an area of shared practice.
interest-based social networks
Offer members focused discussion groups based on a shared interest in some specific topic.
Offer members focused discussions and interaction with other people who share the same affinity.
Online communities created for the purpose of pursuing organizational goals.
Markets in which prices are variable and based on the competition among participants who are buying or selling products and services.
The price of the product varies, depending directly on the demand characteristics of the customer and the supply situation of the seller.
One national price, everywhere, for everyone.
Permit the consumer to monitor specific auctions of interest.
Allows the consumer to enter a maximum price, and the auction software automatically bids for the goods up to that maximum price in small increments.
uniform pricing rule
There are multiple winners and they all pay the same price.
Winners pay different amounts depending on what they bid.
Bidders communicate prior to submitting their bids, and rig their bids to ensure that the lowest price is higher that it might otherwise be.
Sellers agree informally or formally to set floor prices on auction items below which they will not sell.
Most common form of auction; the highest bidder wins.
dutch internet auction
Public ascending price, multiple unit auction. Final price is lowest successful bid, which sets price for all higher bidders.
Suppliers or market makers who group unrelated buyers into a single purchase in return for offering a lower purchase price. Prices on multiple units fall as the number of buyers increase.
Use computer programs to search thousands of Web auction sites, and aggregate information on products, bids, auction duration, and bid increments.
The tendency to gravitate toward, and bid for, auction listings with one or more existing bids.
The winner's feeling after an auction that he or she paid too much for an item.
Concern that one will never know how much the ultimate winner might have paid, of the true value to the final winner.
The feeling of having been too cheap in bidding and failing to win.
general purpose portals
Attempt to attract a very large general audience and then retain the audience on-site by providing in-depth vertical content.
vertical market portals
Attempt to attract highly focused, loyal audiences with a deep interest in either community or specialized content.
_____ strategies can be used to improve the value that the business provides to its customers.
_____ strategies focus on reducing costs or generating value by working with suppliers or inbound shipping and freight service providers.
The _____ of an electronic commerce implementation includes the costs of hardware, software, design work outsourced, salaries and benefits for employees involved in the project, and the cost of maintaining the site once it is operational.
_____ is measured by the ease of expansion of bandwidth, disk space, and additional software (database, traffic analysis, and so on) that can be added to an account as it grows.
Which of the following techniques measures the amount of income that will be provided by a specific current expenditure?
Net Present Value
_____ is an example of a return on investment technique.
Hiring another company to provide the outside support for all or part of a project is called _____.
In many electronic commerce projects, the company outsources the initial site design and development to launch the project quickly. This approach is called _____.
In _____, the company identifies specific portions of the project that can be completely designed, developed, implemented, and operated by another firm that specializes in a particular function.
A(n) _____ is a company that offers start-up companies a physical location with offices, accounting and legal assistance, computers, and Internet connections at a very low monthly cost.
In _____, an existing company that wants to launch an electronic commerce initiative joins external equity partners and operational partners that can offer the experience and skills needed to develop and scale up the project very rapidly.
_____ are usually banks or venture capitalists that sometimes offer money, but are more likely to offer experience gained from guiding other start-ups that they have funded.
_____ are firms, such as system integrators and consultants, that have experience in moving projects along and scaling up prototypes.
The _____ is the existing company that wants to launch an electronic commerce initiative.
_____ provide the venture sponsor with knowledge of industry best practices.
_____ is a collection of formal techniques for planning and controlling the activities undertaken to achieve a specific goal.
The _____ should be a member of the internal team that sets the objectives for the project.
A(n) _____ is a person with specific training or skills in tracking costs and the accomplishment of specific objectives in a project.
A(n) _____ keeps track of multiple Web sites in use by a project or keeps track of the projects that will combine to create a larger Web site.
Most large businesses have _____ who maintain accounting, human resources, and logistics software.
_____ design and write the database-driven Web pages.
Customer Service Personnel
_____ help design and implement customer relationship management activities in the electronic commerce operation.
The _____ staff functions include load estimation and load monitoring, and designing and implementing fault-resistant technologies.
Most electronic commerce sites requires a(n) _____ function to support activities such as transaction processing, order entry, inquiry management, or shipment logistics.
A _____ is a formal review of a project after it is up and running.
_____ is/are digital cash mired by a company instead of by a government.
Credit and Debit Cards
What payment method dominates online transactions today?
Most current scrip offerings, such as eScrip, focus on the _____ market.
A _____, offered by companies such as American Express, carries no spending limit, and the entire amount charged to the card is due at the end of the billing period.
In a(n) _____ system, the card issuer pays the merchants that accept the card directly and does not use an intermediary, such as a bank or clearinghouse system.
Whenever a third party processes a transaction, the system is called a(n) _____ system.
A(n) _____ bank is a bank that does business with sellers that want to accept payment cards.
When a cardholder successfully contests a charge, the merchant bank must retrieve the money it placed in the merchant account in a process called a(n) _____.
Automated Clearing House
ACH is short for _____.
Internet payments for items costing from a few cents to approximately a dollar are called _____.
The term _____ refers to all payments of less than $10.
Some companies have begun to offer small payment and micropayment services through _____ telephone carriers.
_____ is spending a particular piece of electronic cash twice by submitting the same electronic currency to two different vendors.
_____ electronic cash is electronic cash that cannot be traced back to the person who spent it.
One way to be able to trace electronic cash is to attach a _____ to each electronic cash transaction.
Creating truly anonymous electronic cash requires a bank to issue electronic cash with embedded _____ such that the bank can digitally sign the electronic cash while removing any association of the cash with a particular customer.
PayPal earns a profit on the _____, which is money that is deposited in Paypal accounts and not used immediately.
The free payment clearing service that PayPal provides to individuals is called a _____ payment system.
A(n) _____ electronic wallet stores a consumer's information on his/her own computer.
A disadvantage of _____ wallets is that they are not portable.
A _____ is a stored-value card that is a plastic card with an embedded microchip that can store information.
The largest dollar volume of payments today are made using _____.
_____ is a technique for committing fraud against the customers of online businesses.
_____ is a criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit.
_____ is a key element in a phishing attack.
_____ is the protection of computer assets from unauthorized accessed, use, alteration, or destruction.
Any act or object that poses a danger to computer assets is known as a _____.
The protection of assets using nonphysical means is called _____ security.
A(n) _____ is a person or device that is able to listen in on and copy Internet transmissions.
Originally, the term _____ was used to describe a dedicated programmer who enjoyed writing complex code that tested the limits of technology.
_____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.
_____ refers to preventing unauthorized data modification.
_____ Refers to preventing data delays or denials.
The purpose of a(n) _____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor's computer.
_____ refers to programs that are embedded transparently in Web pages and that cause action to occur.
A(n) _____ is a small application program.
A(n) _____ is a program hidden inside another program or Web page that masks its true purpose.
Java is a programming language developed by _____.
Active X Control
A(n) _____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.
Active X controls run only on computers with _____ operating systems.
A(n) _____ is software that attaches itself to another program and can cause damage when the host program is activated.
The term _____ describes the process of hiding information within another piece of information.
_____ is the protection of individual rights to nondisclosure.
Software applications called _____ provide the means to record information that passes through a computer or router that is handling Internet traffic.
A(n) _____ allows anyone with knowledge of its existence to cause damage by observing transactions, deleting, data, or stealing data.
_____ is the electronic defacing of an existing Web site's page.
_____ is pretending to be someone you are not or representing a Web site as an original when it is really a fake.
_____ encryption encodes a message with an algorithm that uses a single numeric key, such as 456839420783, to encode and decode data.
A Web server can compromise _____ when it allows automatic directory listings.
_____ is an area of memory set aside to hold data read from a file or database.
Commerce Service Providers
_____ often offer Web server management and rent application software to businesses.
Commerce service providers are also called _____ service providers.
A _____ is a listing of goods and services.
Filling Out Online Forms
In the early days of electronic commerce, shoppers deleted items they wanted to purchase by _____.
In a shopping cart, clicking the Checkout button usually displays a screen that asks for _____ and shipping information.
The Web is a _____ system, unable to remember anything from one transmission or session to another.
One way to uniquely identify users and store information about their choices is to create and store _____.
_____ occurs when the shopper proceeds to the virtual checkout counter by clicking a checkout button.
Large information systems that store the same data in many different physical locations are called _____.
Application servers are usually grouped into two types: page-based and _____ systems.
_____ is accomplished by programs that transfer information from one application to another.
Larger businesses often prefer to use a _____ application system that separates the presentation logic from the business logic.
_____ software packages are business systems that integrate all facets of a business, including accounting, logistics, manufacturing, planning, project management, and treasury functions.
Enterprise Resource Planning
ERP is the acronym for _____.
The W3C defines _____ as software systems that support interoperable machine-to-machine interaction over a network.
_____ is a message passing protocol that defines how to send marked-up data from one software application to another across a network.
_____ is used to describe the characteristics of the logic units that make up specific Web services.
_____ CSPs provide small business with an Internet connection, Web site creation tools, and little or no banner advertising clutter.
_____ can help businesses find customers with common interest and discover previously unknown relationships among the data.
_____ packages allow the merchant to have explicit control over merchandising choices, site layout, internal architecture, and remote and local management options.
WeSphere Commerce Suite is produced by _____.
Commerce Server is produced by _____.
_____ software typically provides tools for linking to an supporting supply and purchasing activities.
_____ software often includes powerful search tools that use proprietary semantic and statistical algorithms to help users find the content, human experts, and other resources that can aid them in their research and decision-maing tasks.
_____ software is designed to help businesses mange the information in documents, rather than the documents themselves.
the conduct of selling, buying, logistics, or other organization management activities via the web
the combination or language and atoms
to go worldwide in slope and approximation; a consumer can access the internet form anywhere at anytime
a negotiated exchange of valuable objects or services between two or more parties (a buyer and a seller); includes all activities that each of the parties undertake to complete the transaction
revenue minus all expenses
group status based on social groupings and economic status, in terms of e-commerce, these groups may or may not be limited by financial security
EDI ( Electric Data Interchange)
Transaction that occurs when one business transmits computer-readable data in an open format.
Value Added Network
An independent firm that offers connections and EDI transaction services
EFT (Electric Funds Transfer)
The process of exchanging account information electronically over private communications networks
FTP (File Transfer Protocol)
transferring of information from one computer to another
The language of the world wide web
establishes where the data travels
the process of developing and diagramming a site's structure that best matches your user's needs
a hierarchical tree that facilitates quick access to information and helps users understand how you have organized content
Short uniformly organized pieces of information that particularly lend themselves to help presentations
A hierarchy with too many menu-selections, becomes a navigational nightmare for the user
a graphical structure that flows from the most important or most general to the most specific
a hierarchy that is viewed sequentially in a line one right after the other
a box that is drawn on your storyboard to represent where a graphic would be
too many sections
evaluating the form and function of your website design
a web like structure with non traditional linking page
a detailed structural outline of a website
a quick sketch of the site's navigational structure
a detailed sketch of each page
Completing a transaction online
all purchasing activities plus all the monitoring of elements
Purchase of goods for resale
Mail sent and received via postal service
business online between two businesses
the exchange of products over the internet
involves the concept that businesses and government agencies can use central web sites to exchange info
the exchange of products like on ebay
the exchange of products, services, or info between consumers like on priceline.com
an electronic tool used by online consumers to purchase goods or services
offers services to other companies like transaction processing
the division of a company which hires employees and takes care of all employee-related matters
when one business transfers computer readable data into an agreed upon format
a business that provides access to the internet via modem
consumer browsing for information from multiple sites
Global Positioning System
a site which provides a forum for buyers and sellers to trade items
a web-based private network that hosts internet applications on a local area network
VAN ( Value Added Network)
provides connections and ensures security for data
Using both graphics/images and text for websites
10 Mybtes per second, the speed at which the data is transported
the actual layout of the website
displaying two or more web pages at the same time in the same browser window
the navigation features of the website
using images as links from a home page or other web page
A point of entry into a website
entry into a website
Links are easy to follow and in logical order
The group of people a website from a home page
using any keyed text for links from a home page or other website pages
Words are hot linked from a home page or other website pages
the website's web address
A GIF based graphic file that moves
A technique for diminishing edges of a pixelated graphic
The basic overall color or design of your website
Characteristics such as age, sex, income, location, etc.
a software program running on a web server that interprets the data sent by a web page
a graphic that appears within a line of text
Form fields that are used to collect data entered by the user
a file format for images used with lots of color
another file format for pictures
Used to hold text and/ or graphics so that they do not change sizes on other pages
small graphics used to keep loading time down
Describes how many pixels are displayed on your screen
background of your webpage
ability for all persons even with disabilities
option on most computers that allow a user's computer to be configured for visual, hearing,and physical needs
browsers that validate websites for use by individuals with disabilities
dragon naturally speaking
voice activated software
windows program with powerful accessibility solution that reads information found on the computer and speaks it
Read Aloud Software
reads text aloud
Voice activated software
procedures to test website accuracy and availability
Voice Activated Software
allows use of computer by voice commands
WAI (Web Accessibility Initiative)
Guidelines developed and continually revised since 1999 to ensure that persons with disabilities can access the web
W3C (WWW Consortium)
non-profit organization that oversees and assists in monitoring the web
A word or symbol that is used in commerce to certify geographic origin
A mark used in commerce by the members of an association
Legal protection that gives the author of a work control over how the work is used
The act of registering, selling, or using a domain name of someone else's for profit
any word, name, symbol, device, or any combination, used a intended to be used in commerce with the owner's permission by someone other than its owner
a trademark or service mark used or intended to be used in commerce, by the members of a cooperative or association, or other group
Legal protection that gives the author of a work control over how that work is used
the act of registering, selling, or using an internet domain name with bad-faith
part of the trademark application process where a black and white drawing of the mark is included
Fair use Rule
Describes when and how much of a copyrighted work may be copied or used in another report
unauthorized access to computer systems for the purpose of stealing and compiling data
the right an individual or group of individuals has in an idea
the author has registered the piece with the us copyright office. Doing this makes it easier to prove copyright infringement
a company can register a trademark with the U.S. patent and trademark office. Only registered trademarks use the R symbol
any word, name, symbol, device, or any combination used or intended to be used in commerce
part of the trademark application process where a real example of how the mark is used in commerce is included
a distinctive word, phrase, logo, graphic symbol, slogan, or anything used to identify goods or services and distinguishes them in the marketplace
an author does not have to do anything to copyright a work. Pieces after 1989 do not have to contain the c symbol
a company does not have to do anything to have trademark protection. To designate an unregistered trademark a company would use "tm"
This function plans and manages financial resources and maintains the records and information related to the business
The process of moving products from the merchant to the customer
This function is responsible for developing, implementing, and evaluating the plans and activities of a business
This function is responsible for the process of planning and executing the conception, promotion, and distribution of goods and services to create exchanges that satisfy individual and organizational objectives
this function creates or obtains products or services for sale
a small piece of information sent from a web server to an individual's web browser so it can later be read back from that browser
characteristics such as age, sex, income, location, education, and religion
lifestyle characteristics which include activities, attitudes, customs, and traditions
The last page visited before the current web page
components of a movement in which people have one or more similar characteristics.
allows users to determine what features of a site they want to appear when they come to the site
a clearly identified segment of the market to which the company wants to appeal
Reports produced from software on your web server or provided by the company hosting your web site that tell you the domain of your visitors and their referring pages.
a site agrees to place a merchants ad without charge. The affiliate only gets paid when a visitor clicks on the link and buys something
programs that analyze incoming email and replies with a canned response
online advertising technique where small hyper lined advertisements are placed on frequently visited pages of a website
a banner advertisement is placed within a particular category of a web site. This is more focused on the company's target market
text ad just like a classified ad in print except it is listed on a website
cost per 1000 impressions
online magazines or email newsletters
It warehouses a merchants goods and processes orders for the merchant
a banner advertisement is randomly displayed on a web site
tangible products, they have a touch and feel
an emailing list that receives newsletters and updates
electronic billboards where people post questions and comments, they are broken into interest groups
Number of click throughs
the number of times viewers click on the banner
Number of impressions
the number of times a banner is displayed to individual viewers
mailing list that people have voluntarily given their email address in order to receive the email from that company
a short news article sent to various media channels
how the company deals with a customer who wants to return a purchase
Secure socket layer
needed to provide credit card security for browser
intangible products, they give a benefit or satisfaction
in the relationship between buyer and seller, there are many activities that transpire between the buyer's selection of the product and the shipment of the selected product to the buyer selecting merchandise, responding to the order
refers to the amount of time it takes a seller to responded to an inquiry for purchase/service.
relies on how well a seller manages the product inventory---consider cost of shortage, stock on hand, just in time tracking
Stock on hand
too small/ decreases response time, too large increases cost
Just in time inventory
determines the amount of ability to respond to customer inquiry, determines ability to anticipate and respond to inventory
Manual inventory controls
counting and collecting info manually by hand, if done periodically due to expertise
Continuous inventory controls
managed with electronic database, updated instantaneously, best for online selling
when the selected object is shipped to the buyer
refers to the amount of time it takes a seller to respond to an inquiry for purchase or service
relies on how well a seller manages the product inventory
stock on hand
too small decreases response time, too large increases cost
just in time inventory
products manufactured as needed
determines the ability to respond to inventory
continuous inventory controls
managed with electric database updated instantaneously best for online selling
product distribution channels
refers to all of the steps in the movement of products or services to the customer
indirect distribution channels
refers to all of the steps in the movement of products
direct distribution channels
company produces goods/services and delivers them
process of loosing distribution channels when they are no longer needed
adding a level of the distribution system
the ability to make a profit after expenses are deducted from success
amount of output to make a profit after expenses are deducted
allow consumers to write paperless checks
drawn from online customers banking account
the act of becoming worldwide in scope or application
customary beliefs of a social group
the computers and software connected to the internet
the ability of the government to exert control over a person or corporation
physical location of an organization
an organization or business which conducts electronic commerce around the globe
taxes that are levied by national, state, and local governments
include sales taxes, use taxes, etc
imposed on imported goods
the ratio at which the principal of two currencies may be traded
process of using a financial formula incorporating current exchange rate
no timing requirement for communication
a web address used in URLS
suffix that indicates which top level domain it belongs to
when a company hires another company to handle some of the tasks related to the creation and maintenance of a web site.
due to changes in the market place, the demand for certain job types is decreased and in some instances become obsolete
Refers to the "Middleman" that exists in the value chain between the manufacturing of the product and its delivery to the buyer
when a segment of the value chain becomes unnecessary or is replaced by another intermediary
a collection of data records with fields such as names, addresses, etc
structured query language is the standardized language used to request information from a database
Dynamic online catalog
employs sophisticated database software that quickly retrieves and updates data such as inventory ability.
Storefront software packages
fully integrated software packages that provide users with all of the tools necessary to create an e-commerce site
software that provides protection for both merchant and customer data
software that scrambles data into a secret code that can only be broken by complicated mathematical algorithms
software that surrounds an intranet to prevent unauthorized access by examining each message or request that enters and exits the intranet
certificates that verify that the sender of a message is who he or she claims to be and provides the person who receives the message with the public key required to encrypt a reply
Storage Area Network
a network that exists exclusively to provide storage for the massive amount of data entailed in an e-commerce business
connects a computer to the internet a basic account with an isp provides customers with an email address limited or full access to the internet
this is a company that offers individuals or enterprises access over the internet to application programs and related services that would otherwise have to be located in their own personal or enterprise computers.
establishing the validity of ones claimed identity
Black hat hacker
a person who breaks into a computer system with the purpose of inflicting damage or stealing data
a persistent error in software or hardware. If the bug is in software, it can be corrected by changing the program
small piece of information collected and saved in the browser from a site and retrieved when the user returns to that site
a person who breaks into a computer system without authorization, whose purpose is to do damage
registering an internet name for the purpose of reselling it for a profit
Denial of Service
a condition in which a system can no longer respond to normal requests
Encrypted service/ browser
use in order to protect against unlawful access to a user's credit card number
Denial of service attack
a bug or virus that will not allow a user to log on to a website
process of encoding information using a secret key to produce a string of unintelligible characters
designed to protect individual privacy
Fair Trade Act
acts that deal with fraudulent sales, protects against misinterpretation
an internet filter is a piece of software controlled by authority that filters by keyword
computer system or software that prevents unauthorized access to provide data to outside users
To write program source code
Interstate Tax Freedom act
proposed legislation that suggests the federal government mandate a 5% internet tax on internet commerce
Interstate commerce Act
regulates shipment of products via surface transportation
Millennium Digital commerce act
states that electronic commerce contracts are valid when signed electronically
setting up fraudulent web site that contains copies of pages from a legitimate web site
it is a scam to steal valuable information such as credit card and social security numbers
risk introduced to a company when someone accesses a company's website using a browser
verifies the host's identity to computers that access it
preserves the vibrant and competitive free market that presently exists for the internet and other interactive computer services
procedure of verifying the identity of a remote user
a for profit organization that provides products that allow the web sites to transmit encrypted data to authenticate the web site through the use of digital certificates.
operating and maintaining your own server
using an outside company to serve your website
a listing of goods or services that may include photographs or descriptions
a feature that allows user to add, delete, view, and update items for purchase
Transaction and payment processing
processes the shopper's request as they proceed to the virtual checkout counter
From handling software
specialized software that allows users to provide responses and submit the data to the servers
Asymmetric digital subscriber line
a network that allows your computer to communicate at approximately one mbps
rats web user requests to e-commerce servers
direct connection with the capacity to deliver approximately 5 mbps
Discussion group software
software that supports discussion threads
Sets with similar terms
comp sci final, CSC Final
WGU - C182 - Quiz
Sets found in the same folder
BCIS 4720 Test 2
michaels final set full
Other sets by this creator
Combo with E-commerce Final and 2 others
chpter 12 ecomm
CH 12 Ecomm
Combo with BUS134B Ch.15- Evaluating an Integrated…
True/False: a and (b or c) == (a and b) or (a and c)
A d-ary heap is like a binary heap, but (with one possible exception) non-leaf nodes have d children instead of 2 children. a. How would you represent a d-ary heap in an array? b. What is the height of a d-ary heap of n elements in terms of n and d? c. Give an efficient implementation of EXTRACT-MAX in a d-ary max-heap. Analyze its running time in terms of d and n. d. Give an efficient implementation of INSERT in a d-ary max-heap. Analyze its running time in terms of d and n. e. Give an efficient implementation of INCREASE-KEY (A, i, k), which flags an error if K < A[i], but otherwise sets A[i] = k and then updates the d-ary max-heap structure appropriately. Analyze its running time in terms of d and n.
What are the five major activities of an operating system with regard to file management?
Write the corresponding Python expression of the following mathematical expression. 2π
Other Quizlet sets
Disc 9 - Soil & Water
Bio Lab Midterm
Chapter 25 Study Guide
Supply Chain Test 3
Each case clause within a switch statement contains a value followed by which punctuation mark?
Which file inside the CUPS configuration directory contains the definition of the printers?
What is the meaning of x = 0; in Java?
What is a possible data type for a variable that stores the value 128?