Home
Subjects
Textbook solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Combo with E-Commerce Chapter 11 Final Review and 2 others
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (348)
social network
Involves a group of people, shared social interaction, common ties among members, and people who share an area for some period of time.
online social network
An area online, where people who share common ties can interact with one another.
general communities
Offer members opportunities to interact with a general audience organized into general topics.
practice networks
Offers members focused discussion groups, help, information, and knowledge relating to an area of shared practice.
interest-based social networks
Offer members focused discussion groups based on a shared interest in some specific topic.
affinity communities
Offer members focused discussions and interaction with other people who share the same affinity.
sponsored communities
Online communities created for the purpose of pursuing organizational goals.
auctions
Markets in which prices are variable and based on the competition among participants who are buying or selling products and services.
dynamic pricing
The price of the product varies, depending directly on the demand characteristics of the customer and the supply situation of the seller.
fixed pricing
One national price, everywhere, for everyone.
watch lists
Permit the consumer to monitor specific auctions of interest.
proxy bidding
Allows the consumer to enter a maximum price, and the auction software automatically bids for the goods up to that maximum price in small increments.
uniform pricing rule
There are multiple winners and they all pay the same price.
discriminatory pricing
Winners pay different amounts depending on what they bid.
bid rigging
Bidders communicate prior to submitting their bids, and rig their bids to ensure that the lowest price is higher that it might otherwise be.
price matching
Sellers agree informally or formally to set floor prices on auction items below which they will not sell.
english auction
Most common form of auction; the highest bidder wins.
dutch internet auction
Public ascending price, multiple unit auction. Final price is lowest successful bid, which sets price for all higher bidders.
demand aggregators
Suppliers or market makers who group unrelated buyers into a single purchase in return for offering a lower purchase price. Prices on multiple units fall as the number of buyers increase.
auction aggregators
Use computer programs to search thousands of Web auction sites, and aggregate information on products, bids, auction duration, and bid increments.
herd behavior
The tendency to gravitate toward, and bid for, auction listings with one or more existing bids.
winner's regret
The winner's feeling after an auction that he or she paid too much for an item.
seller's lament
Concern that one will never know how much the ultimate winner might have paid, of the true value to the final winner.
loser's lament
The feeling of having been too cheap in bidding and failing to win.
general purpose portals
Attempt to attract a very large general audience and then retain the audience on-site by providing in-depth vertical content.
vertical market portals
Attempt to attract highly focused, loyal audiences with a deep interest in either community or specialized content.
Downstream
_____ strategies can be used to improve the value that the business provides to its customers.
Upstream
_____ strategies focus on reducing costs or generating value by working with suppliers or inbound shipping and freight service providers.
TCO
The _____ of an electronic commerce implementation includes the costs of hardware, software, design work outsourced, salaries and benefits for employees involved in the project, and the cost of maintaining the site once it is operational.
Scalability
_____ is measured by the ease of expansion of bandwidth, disk space, and additional software (database, traffic analysis, and so on) that can be added to an account as it grows.
ROI
Which of the following techniques measures the amount of income that will be provided by a specific current expenditure?
Net Present Value
_____ is an example of a return on investment technique.
Outsourcing
Hiring another company to provide the outside support for all or part of a project is called _____.
Early Outsourcing
In many electronic commerce projects, the company outsources the initial site design and development to launch the project quickly. This approach is called _____.
Partial Outsourcing
In _____, the company identifies specific portions of the project that can be completely designed, developed, implemented, and operated by another firm that specializes in a particular function.
Incubator
A(n) _____ is a company that offers start-up companies a physical location with offices, accounting and legal assistance, computers, and Internet connections at a very low monthly cost.
Fast Venturing
In _____, an existing company that wants to launch an electronic commerce initiative joins external equity partners and operational partners that can offer the experience and skills needed to develop and scale up the project very rapidly.
Equity Partners
_____ are usually banks or venture capitalists that sometimes offer money, but are more likely to offer experience gained from guiding other start-ups that they have funded.
Operational Partners
_____ are firms, such as system integrators and consultants, that have experience in moving projects along and scaling up prototypes.
Venture Sponsor
The _____ is the existing company that wants to launch an electronic commerce initiative.
Operational Partners
_____ provide the venture sponsor with knowledge of industry best practices.
Project Management
_____ is a collection of formal techniques for planning and controlling the activities undertaken to achieve a specific goal.
Business Manager
The _____ should be a member of the internal team that sets the objectives for the project.
Project Manager
A(n) _____ is a person with specific training or skills in tracking costs and the accomplishment of specific objectives in a project.
Account Manager
A(n) _____ keeps track of multiple Web sites in use by a project or keeps track of the projects that will combine to create a larger Web site.
Application Specialist
Most large businesses have _____ who maintain accounting, human resources, and logistics software.
Web Programmers
_____ design and write the database-driven Web pages.
Customer Service Personnel
_____ help design and implement customer relationship management activities in the electronic commerce operation.
Network Operations
The _____ staff functions include load estimation and load monitoring, and designing and implementing fault-resistant technologies.
Database Administration
Most electronic commerce sites requires a(n) _____ function to support activities such as transaction processing, order entry, inquiry management, or shipment logistics.
Postimplementation Audit
A _____ is a formal review of a project after it is up and running.
Scrip
_____ is/are digital cash mired by a company instead of by a government.
Credit and Debit Cards
What payment method dominates online transactions today?
Not-For-Profit Fundraising
Most current scrip offerings, such as eScrip, focus on the _____ market.
Charge Card
A _____, offered by companies such as American Express, carries no spending limit, and the entire amount charged to the card is due at the end of the billing period.
Closed Loop
In a(n) _____ system, the card issuer pays the merchants that accept the card directly and does not use an intermediary, such as a bank or clearinghouse system.
Open Loop
Whenever a third party processes a transaction, the system is called a(n) _____ system.
Merchant
A(n) _____ bank is a bank that does business with sellers that want to accept payment cards.
Chargeback
When a cardholder successfully contests a charge, the merchant bank must retrieve the money it placed in the merchant account in a process called a(n) _____.
Automated Clearing House
ACH is short for _____.
Micropayments
Internet payments for items costing from a few cents to approximately a dollar are called _____.
Small Payment
The term _____ refers to all payments of less than $10.
Mobile
Some companies have begun to offer small payment and micropayment services through _____ telephone carriers.
Double Spending
_____ is spending a particular piece of electronic cash twice by submitting the same electronic currency to two different vendors.
Anonymous
_____ electronic cash is electronic cash that cannot be traced back to the person who spent it.
Serial Number
One way to be able to trace electronic cash is to attach a _____ to each electronic cash transaction.
Serial Numbers
Creating truly anonymous electronic cash requires a bank to issue electronic cash with embedded _____ such that the bank can digitally sign the electronic cash while removing any association of the cash with a particular customer.
Float
PayPal earns a profit on the _____, which is money that is deposited in Paypal accounts and not used immediately.
Peer-To-Peer
The free payment clearing service that PayPal provides to individuals is called a _____ payment system.
Client-Side
A(n) _____ electronic wallet stores a consumer's information on his/her own computer.
Client-Side
A disadvantage of _____ wallets is that they are not portable.
Smart Card
A _____ is a stored-value card that is a plastic card with an embedded microchip that can store information.
Paper Checks
The largest dollar volume of payments today are made using _____.
Phishing
_____ is a technique for committing fraud against the customers of online businesses.
Identify Theft
_____ is a criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit.
Spam
_____ is a key element in a phishing attack.
Computer Security
_____ is the protection of computer assets from unauthorized accessed, use, alteration, or destruction.
Threat
Any act or object that poses a danger to computer assets is known as a _____.
Logical
The protection of assets using nonphysical means is called _____ security.
Eavesdropper
A(n) _____ is a person or device that is able to listen in on and copy Internet transmissions.
Hacker
Originally, the term _____ was used to describe a dedicated programmer who enjoyed writing complex code that tested the limits of technology.
Secrecy
_____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.
Integrity
_____ refers to preventing unauthorized data modification.
Necessity
_____ Refers to preventing data delays or denials.
Web Bug
The purpose of a(n) _____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor's computer.
Active Content
_____ refers to programs that are embedded transparently in Web pages and that cause action to occur.
Applet
A(n) _____ is a small application program.
Trojan Horse
A(n) _____ is a program hidden inside another program or Web page that masks its true purpose.
Sun Microsystems
Java is a programming language developed by _____.
Active X Control
A(n) _____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.
Windows
Active X controls run only on computers with _____ operating systems.
Virus
A(n) _____ is software that attaches itself to another program and can cause damage when the host program is activated.
Steganography
The term _____ describes the process of hiding information within another piece of information.
Privacy
_____ is the protection of individual rights to nondisclosure.
Sniffer Programs
Software applications called _____ provide the means to record information that passes through a computer or router that is handling Internet traffic.
Backdoor
A(n) _____ allows anyone with knowledge of its existence to cause damage by observing transactions, deleting, data, or stealing data.
Cybervandalism
_____ is the electronic defacing of an existing Web site's page.
Spoofing
_____ is pretending to be someone you are not or representing a Web site as an original when it is really a fake.
Symmetric
_____ encryption encodes a message with an algorithm that uses a single numeric key, such as 456839420783, to encode and decode data.
Authenticity
A Web server can compromise _____ when it allows automatic directory listings.
A Buffer
_____ is an area of memory set aside to hold data read from a file or database.
Commerce Service Providers
_____ often offer Web server management and rent application software to businesses.
Managed
Commerce service providers are also called _____ service providers.
Catalog
A _____ is a listing of goods and services.
Filling Out Online Forms
In the early days of electronic commerce, shoppers deleted items they wanted to purchase by _____.
Billing
In a shopping cart, clicking the Checkout button usually displays a screen that asks for _____ and shipping information.
Stateless
The Web is a _____ system, unable to remember anything from one transmission or session to another.
Cookies
One way to uniquely identify users and store information about their choices is to create and store _____.
Transaction Processing
_____ occurs when the shopper proceeds to the virtual checkout counter by clicking a checkout button.
Distributed
Large information systems that store the same data in many different physical locations are called _____.
Component-Based
Application servers are usually grouped into two types: page-based and _____ systems.
Application Integration
_____ is accomplished by programs that transfer information from one application to another.
Component-Based
Larger businesses often prefer to use a _____ application system that separates the presentation logic from the business logic.
ERP
_____ software packages are business systems that integrate all facets of a business, including accounting, logistics, manufacturing, planning, project management, and treasury functions.
Enterprise Resource Planning
ERP is the acronym for _____.
Web Services
The W3C defines _____ as software systems that support interoperable machine-to-machine interaction over a network.
SOAP
_____ is a message passing protocol that defines how to send marked-up data from one software application to another across a network.
WSDL
_____ is used to describe the characteristics of the logic units that make up specific Web services.
Mall-Style
_____ CSPs provide small business with an Internet connection, Web site creation tools, and little or no banner advertising clutter.
Data Mining
_____ can help businesses find customers with common interest and discover previously unknown relationships among the data.
Midrange
_____ packages allow the merchant to have explicit control over merchandising choices, site layout, internal architecture, and remote and local management options.
IBM
WeSphere Commerce Suite is produced by _____.
Microsoft
Commerce Server is produced by _____.
Enterprise-Class
_____ software typically provides tools for linking to an supporting supply and purchasing activities.
Knowledge Management
_____ software often includes powerful search tools that use proprietary semantic and statistical algorithms to help users find the content, human experts, and other resources that can aid them in their research and decision-maing tasks.
Knowledge Management
_____ software is designed to help businesses mange the information in documents, rather than the documents themselves.
ecommerce
the conduct of selling, buying, logistics, or other organization management activities via the web
culture
the combination or language and atoms
globilization
to go worldwide in slope and approximation; a consumer can access the internet form anywhere at anytime
commerce
a negotiated exchange of valuable objects or services between two or more parties (a buyer and a seller); includes all activities that each of the parties undertake to complete the transaction
profit
revenue minus all expenses
socio-economic
group status based on social groupings and economic status, in terms of e-commerce, these groups may or may not be limited by financial security
EDI ( Electric Data Interchange)
Transaction that occurs when one business transmits computer-readable data in an open format.
Value Added Network
An independent firm that offers connections and EDI transaction services
EFT (Electric Funds Transfer)
The process of exchanging account information electronically over private communications networks
FTP (File Transfer Protocol)
transferring of information from one computer to another
HTTP
The language of the world wide web
TCP/IP
establishes where the data travels
storyboard
the process of developing and diagramming a site's structure that best matches your user's needs
Balanced Hierarchy
a hierarchical tree that facilitates quick access to information and helps users understand how you have organized content
Chunk
Short uniformly organized pieces of information that particularly lend themselves to help presentations
Deep Hierarchy
A hierarchy with too many menu-selections, becomes a navigational nightmare for the user
Hierarchy
a graphical structure that flows from the most important or most general to the most specific
Linear Hierarchy
a hierarchy that is viewed sequentially in a line one right after the other
Placeholder
a box that is drawn on your storyboard to represent where a graphic would be
Shallow Hierarchy
too many sections
Site Assessment
evaluating the form and function of your website design
Webbed Hierarchy
a web like structure with non traditional linking page
Site Map
a detailed structural outline of a website
Flow Chart
a quick sketch of the site's navigational structure
Page Layout
a detailed sketch of each page
Transaction Processing
Completing a transaction online
E-Procurement
all purchasing activities plus all the monitoring of elements
Procurement
Purchase of goods for resale
Snail Mail
Mail sent and received via postal service
B2B
business online between two businesses
B2C
the exchange of products over the internet
B2G
involves the concept that businesses and government agencies can use central web sites to exchange info
C2C
the exchange of products like on ebay
C2B
the exchange of products, services, or info between consumers like on priceline.com
Shopping Cart
an electronic tool used by online consumers to purchase goods or services
Fulfillment Company
offers services to other companies like transaction processing
HR
the division of a company which hires employees and takes care of all employee-related matters
EDI
when one business transfers computer readable data into an agreed upon format
ISP
a business that provides access to the internet via modem
Logistics
consumer browsing for information from multiple sites
GPS
Global Positioning System
Web Auction
a site which provides a forum for buyers and sellers to trade items
Intranet
a web-based private network that hosts internet applications on a local area network
VAN ( Value Added Network)
provides connections and ensures security for data
Combination Menu
Using both graphics/images and text for websites
Ethernet Speed
10 Mybtes per second, the speed at which the data is transported
Form
the actual layout of the website
Frames
displaying two or more web pages at the same time in the same browser window
Function
the navigation features of the website
Graphics Menu
using images as links from a home page or other web page
Home Page
A point of entry into a website
Portal
entry into a website
Structured Menus
Links are easy to follow and in logical order
Target Audience
The group of people a website from a home page
Text Menu
using any keyed text for links from a home page or other website pages
Unstructured Menus
Words are hot linked from a home page or other website pages
URL
the website's web address
Animated GIF
A GIF based graphic file that moves
Anti-Aliasing
A technique for diminishing edges of a pixelated graphic
Applets
Programs written in javascript and added to the website
Background
The basic overall color or design of your website
Demographics
Characteristics such as age, sex, income, location, etc.
Foreground
Text color
Form handler
a software program running on a web server that interprets the data sent by a web page
Inline Graphic
a graphic that appears within a line of text
Input Controls
Form fields that are used to collect data entered by the user
JPEG
a file format for images used with lots of color
PNG
another file format for pictures
Tables
Used to hold text and/ or graphics so that they do not change sizes on other pages
Thumbnails
small graphics used to keep loading time down
Resolution
Describes how many pixels are displayed on your screen
Wallpaper
background of your webpage
accessibility
ability for all persons even with disabilities
accessibility wizards
option on most computers that allow a user's computer to be configured for visual, hearing,and physical needs
Alternate Browsers
browsers that validate websites for use by individuals with disabilities
dragon naturally speaking
voice activated software
JAWS
windows program with powerful accessibility solution that reads information found on the computer and speaks it
Read Aloud Software
reads text aloud
ViaVoice
Voice activated software
Valediction Methods
procedures to test website accuracy and availability
Voice Activated Software
allows use of computer by voice commands
WAI (Web Accessibility Initiative)
Guidelines developed and continually revised since 1999 to ensure that persons with disabilities can access the web
W3C (WWW Consortium)
non-profit organization that oversees and assists in monitoring the web
Certification Mark
A word or symbol that is used in commerce to certify geographic origin
Collective Mark
A mark used in commerce by the members of an association
Copyright
Legal protection that gives the author of a work control over how the work is used
Cyber Separating
The act of registering, selling, or using a domain name of someone else's for profit
Certification Mark
any word, name, symbol, device, or any combination, used a intended to be used in commerce with the owner's permission by someone other than its owner
Collective Mark
a trademark or service mark used or intended to be used in commerce, by the members of a cooperative or association, or other group
Copyright
Legal protection that gives the author of a work control over how that work is used
Cyber Squatting
the act of registering, selling, or using an internet domain name with bad-faith
Drawing page
part of the trademark application process where a black and white drawing of the mark is included
Fair use Rule
Describes when and how much of a copyrighted work may be copied or used in another report
Hacking
unauthorized access to computer systems for the purpose of stealing and compiling data
Intellectual property
the right an individual or group of individuals has in an idea
Registered copyright
the author has registered the piece with the us copyright office. Doing this makes it easier to prove copyright infringement
Registered trademark
a company can register a trademark with the U.S. patent and trademark office. Only registered trademarks use the R symbol
Service mark
any word, name, symbol, device, or any combination used or intended to be used in commerce
Specimen page
part of the trademark application process where a real example of how the mark is used in commerce is included
Trademark
a distinctive word, phrase, logo, graphic symbol, slogan, or anything used to identify goods or services and distinguishes them in the marketplace
Unregistered copyright
an author does not have to do anything to copyright a work. Pieces after 1989 do not have to contain the c symbol
Unregistered trademark
a company does not have to do anything to have trademark protection. To designate an unregistered trademark a company would use "tm"
Accounting/Finance
This function plans and manages financial resources and maintains the records and information related to the business
Distribution
The process of moving products from the merchant to the customer
Management/ Administration
This function is responsible for developing, implementing, and evaluating the plans and activities of a business
Marketing
This function is responsible for the process of planning and executing the conception, promotion, and distribution of goods and services to create exchanges that satisfy individual and organizational objectives
Production
this function creates or obtains products or services for sale
cookies
a small piece of information sent from a web server to an individual's web browser so it can later be read back from that browser
Demographics
characteristics such as age, sex, income, location, education, and religion
Psychographics
lifestyle characteristics which include activities, attitudes, customs, and traditions
Referring page
The last page visited before the current web page
Segment
components of a movement in which people have one or more similar characteristics.
Site personalization
allows users to determine what features of a site they want to appear when they come to the site
Target market
a clearly identified segment of the market to which the company wants to appeal
Traffic logs
Reports produced from software on your web server or provided by the company hosting your web site that tell you the domain of your visitors and their referring pages.
Affiliate programs
a site agrees to place a merchants ad without charge. The affiliate only gets paid when a visitor clicks on the link and buys something
Auto responders
programs that analyze incoming email and replies with a canned response
Banner advertising
online advertising technique where small hyper lined advertisements are placed on frequently visited pages of a website
Channel Rotation
a banner advertisement is placed within a particular category of a web site. This is more focused on the company's target market
Classified Ad
text ad just like a classified ad in print except it is listed on a website
CPM
cost per 1000 impressions
Ezine
online magazines or email newsletters
Fulfillment company
It warehouses a merchants goods and processes orders for the merchant
General rotation
a banner advertisement is randomly displayed on a web site
Goods
tangible products, they have a touch and feel
Listserv
an emailing list that receives newsletters and updates
Newsgroup
electronic billboards where people post questions and comments, they are broken into interest groups
Number of click throughs
the number of times viewers click on the banner
Number of impressions
the number of times a banner is displayed to individual viewers
Opt-in
mailing list that people have voluntarily given their email address in order to receive the email from that company
Press release
a short news article sent to various media channels
Return Policy
how the company deals with a customer who wants to return a purchase
Secure socket layer
needed to provide credit card security for browser
Services
intangible products, they give a benefit or satisfaction
Order fulfillment
in the relationship between buyer and seller, there are many activities that transpire between the buyer's selection of the product and the shipment of the selected product to the buyer selecting merchandise, responding to the order
Response Time
refers to the amount of time it takes a seller to responded to an inquiry for purchase/service.
Inventory management
relies on how well a seller manages the product inventory---consider cost of shortage, stock on hand, just in time tracking
Stock on hand
too small/ decreases response time, too large increases cost
Just in time inventory
determines the amount of ability to respond to customer inquiry, determines ability to anticipate and respond to inventory
Manual inventory controls
counting and collecting info manually by hand, if done periodically due to expertise
Continuous inventory controls
managed with electronic database, updated instantaneously, best for online selling
order fulfillment
when the selected object is shipped to the buyer
response time
refers to the amount of time it takes a seller to respond to an inquiry for purchase or service
inventory management
relies on how well a seller manages the product inventory
stock on hand
too small decreases response time, too large increases cost
just in time inventory
products manufactured as needed
tracking inventory
determines the ability to respond to inventory
continuous inventory controls
managed with electric database updated instantaneously best for online selling
product distribution channels
refers to all of the steps in the movement of products or services to the customer
indirect distribution channels
refers to all of the steps in the movement of products
direct distribution channels
company produces goods/services and delivers them
inter-mediation
middle man
dis-intermediation
process of loosing distribution channels when they are no longer needed
Re-intermediation
adding a level of the distribution system
Profitability
the ability to make a profit after expenses are deducted from success
Productivity
amount of output to make a profit after expenses are deducted
e-checks
allow consumers to write paperless checks
e-cash
drawn from online customers banking account
globalization
the act of becoming worldwide in scope or application
culture
customary beliefs of a social group
internet infrastructure
the computers and software connected to the internet
jurisdiction
the ability of the government to exert control over a person or corporation
permanent establishment
physical location of an organization
international business
an organization or business which conducts electronic commerce around the globe
income taxes
taxes that are levied by national, state, and local governments
transaction taxes
include sales taxes, use taxes, etc
tariffs
imposed on imported goods
exchange rate
the ratio at which the principal of two currencies may be traded
currency conversion
process of using a financial formula incorporating current exchange rate
asynchronous
no timing requirement for communication
domain name
a web address used in URLS
domain extension
suffix that indicates which top level domain it belongs to
Outsourcing
when a company hires another company to handle some of the tasks related to the creation and maintenance of a web site.
Job Displacement
due to changes in the market place, the demand for certain job types is decreased and in some instances become obsolete
Intermediaries
Refers to the "Middleman" that exists in the value chain between the manufacturing of the product and its delivery to the buyer
Dis-Inter-mediation
when a segment of the value chain becomes unnecessary or is replaced by another intermediary
Database Software
a collection of data records with fields such as names, addresses, etc
SQL
structured query language is the standardized language used to request information from a database
Dynamic online catalog
employs sophisticated database software that quickly retrieves and updates data such as inventory ability.
Storefront software packages
fully integrated software packages that provide users with all of the tools necessary to create an e-commerce site
Security software
software that provides protection for both merchant and customer data
Encryption software
software that scrambles data into a secret code that can only be broken by complicated mathematical algorithms
Firewall software
software that surrounds an intranet to prevent unauthorized access by examining each message or request that enters and exits the intranet
Digital Certificates
certificates that verify that the sender of a message is who he or she claims to be and provides the person who receives the message with the public key required to encrypt a reply
Storage Area Network
a network that exists exclusively to provide storage for the massive amount of data entailed in an e-commerce business
ISP
connects a computer to the internet a basic account with an isp provides customers with an email address limited or full access to the internet
ASP
this is a company that offers individuals or enterprises access over the internet to application programs and related services that would otherwise have to be located in their own personal or enterprise computers.
Authentication
establishing the validity of ones claimed identity
Black hat hacker
a person who breaks into a computer system with the purpose of inflicting damage or stealing data
Bug
a persistent error in software or hardware. If the bug is in software, it can be corrected by changing the program
Cookie
small piece of information collected and saved in the browser from a site and retrieved when the user returns to that site
Cracker
a person who breaks into a computer system without authorization, whose purpose is to do damage
Cybersquatting
registering an internet name for the purpose of reselling it for a profit
Denial of Service
a condition in which a system can no longer respond to normal requests
Encrypted service/ browser
use in order to protect against unlawful access to a user's credit card number
Denial of service attack
a bug or virus that will not allow a user to log on to a website
Encryption
process of encoding information using a secret key to produce a string of unintelligible characters
E-privacy act
designed to protect individual privacy
Fair Trade Act
acts that deal with fraudulent sales, protects against misinterpretation
Filtering software
an internet filter is a piece of software controlled by authority that filters by keyword
Firewall
computer system or software that prevents unauthorized access to provide data to outside users
Hocking
To write program source code
Interstate Tax Freedom act
proposed legislation that suggests the federal government mandate a 5% internet tax on internet commerce
Interstate commerce Act
regulates shipment of products via surface transportation
Millennium Digital commerce act
states that electronic commerce contracts are valid when signed electronically
Pharming
setting up fraudulent web site that contains copies of pages from a legitimate web site
Phishing
it is a scam to steal valuable information such as credit card and social security numbers
Security
risk introduced to a company when someone accesses a company's website using a browser
Site certificate
verifies the host's identity to computers that access it
Telecommunications Act
preserves the vibrant and competitive free market that presently exists for the internet and other interactive computer services
User authentication
procedure of verifying the identity of a remote user
Veri-sign
a for profit organization that provides products that allow the web sites to transmit encrypted data to authenticate the web site through the use of digital certificates.
Internal hosting
operating and maintaining your own server
External hosting
using an outside company to serve your website
Catalog
a listing of goods or services that may include photographs or descriptions
Shopping cart
a feature that allows user to add, delete, view, and update items for purchase
Transaction and payment processing
processes the shopper's request as they proceed to the virtual checkout counter
From handling software
specialized software that allows users to provide responses and submit the data to the servers
Asymmetric digital subscriber line
a network that allows your computer to communicate at approximately one mbps
Web server
rats web user requests to e-commerce servers
Cable modem
direct connection with the capacity to deliver approximately 5 mbps
Discussion group software
software that supports discussion threads
Sets with similar terms
APCSP Vocab
64 terms
comp sci final, CSC Final
71 terms
ISYS
132 terms
WGU - C182 - Quiz
69 terms
Sets found in the same folder
BCIS 4720 Test 2
199 terms
michaels final set full
199 terms
p2
51 terms
E-Commerce Final
100 terms
Other sets by this creator
Combo with E-commerce Final and 2 others
2,000 terms
chpter 12 ecomm
517 terms
CH 12 Ecomm
343 terms
Combo with BUS134B Ch.15- Evaluating an Integrated…
487 terms
Verified questions
COMPUTER SCIENCE
True/False: a and (b or c) == (a and b) or (a and c)
COMPUTER SCIENCE
A d-ary heap is like a binary heap, but (with one possible exception) non-leaf nodes have d children instead of 2 children. a. How would you represent a d-ary heap in an array? b. What is the height of a d-ary heap of n elements in terms of n and d? c. Give an efficient implementation of EXTRACT-MAX in a d-ary max-heap. Analyze its running time in terms of d and n. d. Give an efficient implementation of INSERT in a d-ary max-heap. Analyze its running time in terms of d and n. e. Give an efficient implementation of INCREASE-KEY (A, i, k), which flags an error if K < A[i], but otherwise sets A[i] = k and then updates the d-ary max-heap structure appropriately. Analyze its running time in terms of d and n.
COMPUTER SCIENCE
What are the five major activities of an operating system with regard to file management?
COMPUTER SCIENCE
Write the corresponding Python expression of the following mathematical expression. 2π
Other Quizlet sets
Disc 9 - Soil & Water
78 terms
Bio Lab Midterm
49 terms
Chapter 25 Study Guide
31 terms
Supply Chain Test 3
56 terms
Related questions
QUESTION
Each case clause within a switch statement contains a value followed by which punctuation mark?
QUESTION
Which file inside the CUPS configuration directory contains the definition of the printers?
QUESTION
What is the meaning of x = 0; in Java?
QUESTION
What is a possible data type for a variable that stores the value 128?