1. ____ is a collection of formal techniques for planning and controlling the activities undertaken to achieve a specific goal.
2. ____ design and write the database-driven Web pages.
3. ____ strategies can be used to improve the value that the business provides to its customers.
4. A ____ is a formal review of a project after it is up and running.
5. ____ help design and implement customer relationship management activities in the electronic commerce operation.
6. _____ is an example of a return on investment technique.
1. Straver BUS 107 Quiz 9 NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/bus-107-
strayer/bus-107-quiz-9-new
For more classes visit
http://www.assignmentcloud.com
BUS 107 Quiz 9 NEW
1._refers to programs that are embedded
transparently in Web pages and that cause
action
to occur.
2. A Web server can compromise if it allows
automatic directory listings.
3. The protection of assets using nonphysical
means is called_security.
4. Software applications called__provide the
means to record information that passes
through a computer or router that is handling
Internet
traffic.
2. 5._refers to protecting against unauthorized
data disclosure and ensuring the authenticity of
the data source.
6._encryption encodes a message with an
algorithm that uses a single numeric key, such as
456839420783, to encode and decode data.
7. Originally, the term_was used to describe a
dedicated programmer who enjoyed writing
complex code that tested the limits of technology.
8. Any act or object that poses a danger to
computer assets is known as a ____.
9. _refers to preventing data delays or denials.
10. A_, offered by companies such as American
Express, carries no spending limit, and the entire
amount charged to the card is due at the end of
the
billing period.
11. Creating truly anonymous electronic cash
requires a bank to issue electronic cash with
embedded ____ such that the bank can digitally
sign
the electronic cash while removing any
association of the cash with a particular
customer.
3. 12. is spending a particular piece of electronic
cash twice by submitting the same electronic
currency to two different vendors.
13. In a(n)_system, the card issuer pays the
merchants that accept the card directly and does
not use an intermediary, such as a bank or
clearinghouse system.
14._refers to preventing data delays or denials.
15._is a key element in a phishing attack.
16. Internet payments for items costing from a few
cents to approximately a dollar are called ____.
17. What payment method dominates online
transactions today?
18. Whenever a third party processes a
transaction, the system is called a(n)_system.
19. ACH is short for_.
20._is a technique for committing fraud against
the customers of online businesses.