Skip to main content RICHFIELD Search Modules Resources Bursaries and Graduate Programme 39 Thokozani Nkosi M-COMMERCE 522(2021MCM522B) Dashboard Courses HET INFORMATION_TECHNOLOGY_-_RGIT M-COMMERCE 522(2021MCM522B) Welcome to M - COMMERCE 522 2021- Assignment 1 (Multiple-choice - Online) Myself & My Guitar Started on State ROHAN SEWRAJ Wednesday, 4 August 2021, 8:51 AM Finished Completed on Wednesday, 4 August 2021, 9:02 AM Time taken 10 mins 38 secs Marks 25.00/25.00 Grade 100.00 out of 100.00 Question 1 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text When a customer chooses an item for purchase on a Web site, the item is placed in a virtual: Select one: a. basket. b. box. c. shopping cart. d. shopping bag. Feedback The correct answer is: shopping cart. Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 08:55 Saved: shopping cart. Answer saved 3 4/08/21, 09:02 Attempt finished Correct 1.00 Question 2 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text When Wal-Mart uses the Internet to purchase inventory items from a vendor company, it is using the ____________ e-commerce model. Select one: a. B2E b. B2B c. C2C d. B2C Feedback The correct answer is: B2B Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 08:55 Saved: B2B 3 4/08/21, 09:02 Attempt finished Answer saved Correct 1.00 Question 3 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text An example of B2C is: Select one: a. a law firm buying computer software for employees. b. Wal-Mart buying pet food directly from the manufacturer, Iams. c. a student buying a T-shirt from the Lands’ End website. d. a university buying desks from a manufacturer. Feedback The correct answer is: a student buying a T-shirt from the Lands’ End website. Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 08:55 Saved: a student buying a T-shirt from the Lands’ End website. Answer saved 3 4/08/21, 09:02 Attempt finished Question 4 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Correct 1.00 Question text An intranet includes all of the following EXCEPT: Select one: a. middleware. b. malware. c. TCP/IP software. d. firewalls. Feedback The correct answer is: malware. Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 08:55 Saved: malware. Answer saved 3 4/08/21, 09:02 Attempt finished Correct 1.00 Question 5 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text ____________ is communications software used by an intranet. Select one: a. Firmware b. Middleware c. Ethernet d. NICware Feedback The correct answer is: Middleware Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 08:55 Saved: Middleware Answer saved 3 4/08/21, 09:02 Attempt finished Correct 1.00 Question 6 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text All of the following provide intranet security EXCEPT: Select one: a. data encryption. b. data compression. c. user authentication. d. firewall. Feedback The correct answer is: data compression. Comments Make comment or override mark Response history Step Time Action State 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 08:58 Saved: data compression. 3 4/08/21, 09:02 Attempt finished Question 7 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Marks Answer saved Correct 1.00 Edit question Question text The ____________ requires health care providers and hospitals to protect the confidentiality of an individual’s health information. Select one: a. National Infrastructure Protection Center b. Health Insurance Portability and Accountability Act c. ACM Code of Ethics d. Intellectual Property Act Feedback The correct answer is: Health Insurance Portability and Accountability Act Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 08:58 Saved: Health Insurance Portability and Accountability Act saved 3 4/08/21, 09:02 Attempt finished Answer Correct 1.00 Question 8 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The European Union’s ____________ establishes a high level of legal protection for the privacy of individuals and personal data. Select one: a. Code of Ethics b. National Infrastructure Protection Center c. Data Protection Directive d. Health Insurance Portability and Accountability Act Feedback The correct answer is: Data Protection Directive Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 08:58 Saved: Data Protection Directive 3 4/08/21, 09:02 Attempt finished Correct 1.00 Question 9 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text ____________ founded Amazon.com. Select one: a. Jeff Bezos b. Alan Kay c. Bill Gates d. Andy Grove Feedback The correct answer is: Jeff Bezos Comments Make comment or override mark Response history Step Time 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 08:58 Saved: Jeff Bezos Answer saved 3 4/08/21, 09:02 Attempt finished Correct 1.00 Question 10 Action State Marks Answer saved Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Cipher feedback (CFB) mode was created for those situations in which we need to send or receive r bits of Select one: a. Encryption b. Frames c. Data d. Pixels Feedback The correct answer is: Data Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 08:58 Saved: Data 3 4/08/21, 09:02 Attempt finished Answer saved Correct 1.00 Question 11 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text An encryption algorithm transforms plaintext into Select one: a. Empty Text b. Cipher text c. Simple Text d. Plain Text Feedback The correct answer is: Cipher text Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 08:59 Saved: Cipher text Answer saved 3 4/08/21, 09:02 Attempt finished Correct 1.00 Question 12 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text A transposition cipher reorders (permutes) symbols in a Select one: a. block of signals b. block of packets c. block of slots d. block of symbols Feedback The correct answer is: block of symbols Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 08:59 Saved: block of symbols Answer saved 3 4/08/21, 09:02 Attempt finished Correct 1.00 Question 13 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Original message, before being transformed, is Select one: a. None of the optuion mention b. Cipher text c. decryption d. plaintext Feedback The correct answer is: plaintext Comments Make comment or override mark Response history Step Time Action State 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 08:59 Saved: plaintext Answer saved 3 4/08/21, 09:02 Attempt finished Question 14 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Keys used in cryptography are Select one: a. secret key Marks Correct 1.00 b. public key c. private key d. All of the option mention Feedback The correct answer is: All of the option mention Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 08:59 Saved: All of the option mention 3 4/08/21, 09:02 Attempt finished Correct 1.00 Question 15 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Relationship between a character in plaintext to a character is Select one: a. many-to-many relationship b. None of the option mention c. many-to-one relationship d. one-to-many relationship Feedback The correct answer is: one-to-many relationship Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 08:51 Started Not yet answered Answer saved 2 4/08/21, 08:59 Saved: one-to-many relationship 3 4/08/21, 09:02 Attempt finished Answer saved Correct 1.00 Question 16 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The _______is code embedded in some legitimate program that is set to “explode” when certain conditions are met. Select one: a. Trap doors b. Logic Bomb c. Trojan horse d. Virus Feedback The correct answer is: Logic Bomb Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 09:00 Saved: Logic Bomb Answer saved 3 4/08/21, 09:02 Attempt finished Correct 1.00 Question 17 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Heart of Data Encryption Standard (DES), is the Select one: a. DES function b. Cipher c. Encryption d. Rounds Feedback The correct answer is: DES function Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 09:00 Saved: DES function Answer saved 3 4/08/21, 09:02 Attempt finished Correct 1.00 Question 18 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text DES stands for Select one: a. Data Encryption Slots b. Data Encryption Solutions c. Data Encryption Subscription d. Data Encryption Standard Feedback The correct answer is: Data Encryption Standard Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 09:00 Saved: Data Encryption Standard 3 4/08/21, 09:02 Attempt finished Answer saved Correct 1.00 Question 19 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The criterion used to assess how user and business needs are met in software is: Select one: a. Compatibility. b. Cost. c. Functionality. d. Security. Feedback The correct answer is: Cost. Comments Make comment or override mark Response history Step Time Action State 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 09:00 Saved: Cost. 3 4/08/21, 09:02 Attempt finished Question 20 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Marks Answer saved Correct 1.00 E-business software is best defined as to manage: Select one: a. sell-side e-commerce applications. b. internal administrative applications. c. buy-side applications. Feedback The correct answer is: sell-side e-commerce applications. Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 09:00 Saved: sell-side e-commerce applications. 3 4/08/21, 09:02 Attempt finished Correct 1.00 Question 21 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Advantage of CRM Select one: a. All of the option mentioned. b. Cost of the Software. c. Improve overall relationship with customer. d. Customization of the Business. Feedback The correct answer is: Improve overall relationship with customer. Comments Make comment or override mark Response history Answer saved Step Time Action State Marks 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 09:01 Saved: Improve overall relationship with customer. 3 4/08/21, 09:02 Attempt finished Answer saved Correct 1.00 Question 22 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text CRM stands for Select one: a. Customer referred Management b. All of the option mentioned c. Customer Related Management d. Customer Relationship Management Feedback The correct answer is: Customer Relationship Management Comments Make comment or override mark Response history Step Time Action State 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 09:01 Saved: Customer Relationship Management 3 4/08/21, 09:02 Attempt finished Question 23 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Marks Correct 1.00 Answer saved A well-built e-business infrastructure is a combination of. Select one: a. All of the option mention b. Understands costumer priorities c. Structure and Stability d. Safeguards information Feedback The correct answer is: All of the option mention Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 09:01 Saved: All of the option mention 3 4/08/21, 09:02 Attempt finished Answer saved Correct 1.00 Question 24 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text When crafting e-business direction, management must pay careful attention to three interlocking layers: Select one: a. E-business application Infrastructure b. All of the option mention c. E-business design d. E-business Infrastructure Feedback The correct answer is: All of the option mention Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 09:01 Saved: All of the option mention 3 4/08/21, 09:02 Attempt finished Answer saved Correct 1.00 Question 25 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text When preparing a website, designers should ensure that the site enables user-to-user communication. This design feature is known as __________________. Select one: a. context b. community c. connection d. commerce Feedback The correct answer is: context Comments Make comment or override mark Response history Step Time 1 4/08/21, 08:51 Started Not yet answered 2 4/08/21, 09:01 Saved: context Answer saved 3 4/08/21, 09:02 Attempt finished Finish review Jump to... Jump to... Action State Marks Correct 1.00 Skip <span id="mod_quiz_navblock_title">Quiz navigation</span> Quiz navigation Show one page at a time Finish review Moodle Docs for this page You are logged in as Thokozani Nkosi (Log out) 2021MCM522B Get the mobile app Skip to main content RICHFIELD Search Modules Resources Bursaries and Graduate Programme 39 Thokozani Nkosi M-COMMERCE 522(2021MCM522B) Dashboard Courses HET INFORMATION_TECHNOLOGY_-_RGIT M-COMMERCE 522(2021MCM522B) Welcome to M - COMMERCE 522 2021- Assignment 1 (Multiple-choice - Online) Picture of THULANI SIPHIWO MSIMANGO Started on State THULANI SIPHIWO MSIMANGO Wednesday, 4 August 2021, 1:18 PM Finished Completed on Wednesday, 11 August 2021, 9:44 AM Time taken 6 days 20 hours Marks 20.00/25.00 Grade 80.00 out of 100.00 Question 1 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text ____________ is defined as two or more parties exchanging products, services, and/or information using network technology. Select one: a. A network operating system b. A neural network c. Netware d. E-commerce Feedback The correct answer is: E-commerce Comments Make comment or override mark Response history Step Time Action State 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:39 Saved: E-commerce Answer saved 3 11/08/21, 09:44 Attempt finished Correct 1.00 Question 2 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text An example of B2C is: Select one: Marks a. a student buying a T-shirt from the Lands’ End website. b. a law firm buying computer software for employees. c. a university buying desks from a manufacturer. d. Wal-Mart buying pet food directly from the manufacturer, Iams. Feedback The correct answer is: a student buying a T-shirt from the Lands’ End website. Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:39 Answer saved Saved: a student buying a T-shirt from the Lands’ End website. 3 11/08/21, 09:44 Attempt finished Correct 1.00 Question 3 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text A company’s e-commerce policies and consumer information privacy should be addressed in a(n): Select one: a. information code of ethics b. Information firewall c. CRM d. VPN. Feedback The correct answer is: information code of ethics Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:39 Saved: information code of ethics 3 11/08/21, 09:44 Attempt finished Answer saved Correct 1.00 Question 4 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text A(n) ____________ connects many private networks from different companies for communication through a private interorganizational information system. Select one: a. Internet b. extranet c. WAN d. intranet Feedback The correct answer is: extranet Comments Make comment or override mark Response history Step Time Action State 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:39 Saved: extranet Answer saved 3 11/08/21, 09:44 Attempt finished Question 5 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Marks Correct 1.00 Question text The ability of Proctor & Gamble to have up-to-the-minute inventory information and to know when to ship more product to Wal-Mart is an example of: Select one: a. C2C. b. B2B. c. B2C. d. m-business. Feedback The correct answer is: B2B. Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:39 Saved: B2B. 3 11/08/21, 09:44 Attempt finished Answer saved Correct 1.00 Question 6 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text ____________ keeps unauthorized Internet users from accessing a computer. Select one: a. Middleware b. Firewalls c. TCP/IP d. Ethernet Feedback The correct answer is: Firewalls Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:39 Saved: Firewalls Answer saved 3 11/08/21, 09:44 Attempt finished Correct 1.00 Question 7 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text All of the following are typical uses of an intranet EXCEPT: Select one: a. posting the employee handbook. b. allowing customers to purchase products through the Web. c. allowing a group of employees to work on the same document. d. posting changes to company policies. Feedback The correct answer is: allowing customers to purchase products through the Web. Comments Make comment or override mark Response history Step Time 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:40 Answer saved Saved: allowing customers to purchase products through the Web. 3 11/08/21, 09:44 Attempt finished Question 8 Correct Action State Marks Correct 1.00 Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The ____________ requires health care providers and hospitals to protect the confidentiality of an individual’s health information. Select one: a. Health Insurance Portability and Accountability Act b. ACM Code of Ethics c. National Infrastructure Protection Center d. Intellectual Property Act Feedback The correct answer is: Health Insurance Portability and Accountability Act Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:40 Answer saved Saved: Health Insurance Portability and Accountability Act 3 11/08/21, 09:44 Attempt finished Correct 1.00 Question 9 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The European Union’s ____________ establishes a high level of legal protection for the privacy of individuals and personal data. Select one: a. Code of Ethics b. Data Protection Directive c. National Infrastructure Protection Center d. Health Insurance Portability and Accountability Act Feedback The correct answer is: Data Protection Directive Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:40 Saved: Data Protection Directive 3 11/08/21, 09:44 Attempt finished Answer saved Correct 1.00 Question 10 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text A ________is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs. Select one: a. Trap doors b. Virus c. Zombie d. Worm Feedback The correct answer is: Virus Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:40 Saved: Virus Answer saved 3 11/08/21, 09:44 Attempt finished Correct 1.00 Question 11 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Data Encryption Standard (DES) was designed by Select one: a. Microsoft b. None of the option mention c. IBM d. Apple Feedback The correct answer is: IBM Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:41 Saved: IBM 3 11/08/21, 09:44 Attempt finished Answer saved Question 12 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text An encryption algorithm transforms plaintext into Select one: Correct 1.00 a. Empty Text b. Plain Text c. Simple Text d. Cipher text Feedback The correct answer is: Cipher text Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:41 Saved: Cipher text Answer saved 3 11/08/21, 09:44 Attempt finished Correct 1.00 Question 13 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text In symmetric-key cryptography, same key is used by Select one: a. Third Party b. One Party c. Both Party d. Multi Party Feedback The correct answer is: Both Party Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:41 Saved: Both Party Answer saved 3 11/08/21, 09:44 Attempt finished Correct 1.00 Question 14 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text ECB stands for Select one: a. Electronic Code Book b. Electronic Cipher Book c. Electronic Cryptography Book d. Electronic Control Book Feedback The correct answer is: Electronic Code Book Comments Make comment or override mark Response history Step Time Action State 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:41 Saved: Electronic Code Book 3 11/08/21, 09:44 Attempt finished Question 15 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Marks Answer saved Correct 1.00 In computer security, _________ means that computer system assets can be modified only by authorized parities. Select one: a. Availability b. Integrity c. Authenticity d. Confidentiality Feedback The correct answer is: Integrity Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:41 Saved: Integrity Answer saved 3 11/08/21, 09:44 Attempt finished Correct 1.00 Question 16 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The ______is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. Select one: a. Virus b. Trojan horse c. Trap doors d. Logic Bomb Feedback The correct answer is: Trap doors Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:44 Saved: Trap doors Answer saved 3 11/08/21, 09:44 Attempt finished Correct 1.00 Question 17 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Which of the following is independent malicious program that need not any host program? Select one: a. Worm b. Trap doors c. Virus d. Trojan horse Feedback The correct answer is: Worm Comments Make comment or override mark Response history Step Time Action State 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:44 Saved: Worm 3 11/08/21, 09:44 Attempt finished Question 18 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Marks Answer saved Correct 1.00 Edit question Question text DES stands for Select one: a. Data Encryption Solutions b. Data Encryption Subscription c. Data Encryption Standard d. Data Encryption Slots Feedback The correct answer is: Data Encryption Standard Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:44 Saved: Data Encryption Standard 3 11/08/21, 09:44 Attempt finished Question 19 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text B2B stands for: Select one: a. All of the option mention b. Business to Government. c. Business to Business. d. Business to Consumer. Feedback The correct answer is: Business to Business. Correct 1.00 Answer saved Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:44 Saved: Business to Business. 3 11/08/21, 09:44 Attempt finished Answer saved Correct 1.00 Question 20 Incorrect Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Question text The criterion used to assess how user and business needs are met in software is: Select one: a. Security. b. Cost. c. Functionality. d. Compatibility. Feedback The correct answer is: Cost. Comments Make comment or override mark Response history Step Time Action State 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:44 Saved: Functionality. Answer saved 3 11/08/21, 09:44 Attempt finished Incorrect Question 21 Correct Mark 1.00 out of 1.00 Marks 0.00 Not flaggedFlag question Edit question Question text CRM stands for Select one: a. Customer referred Management b. Customer Related Management c. All of the option mentioned d. Customer Relationship Management Feedback The correct answer is: Customer Relationship Management Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:38 Saved: Customer Relationship Management 3 11/08/21, 09:44 Attempt finished Answer saved Correct 1.00 Question 22 Incorrect Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Question text Which of the following have forward-thinking companies begun to use to promote their products and services? Select one: a. SMS. b. C2B. c. B2C. d. MMA. Feedback The correct answer is: B2C. Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:38 Saved: SMS. 3 11/08/21, 09:44 Attempt finished Answer saved Incorrect 0.00 Question 23 Incorrect Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Question text Delivering products and services that push is called Select one: a. Continuous Excellence b. Operational Excellence c. All of the option mention d. Service Excellence Feedback The correct answer is: Continuous Excellence Comments Make comment or override mark Response history Step Time 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:38 Saved: Operational Excellence Answer saved 3 11/08/21, 09:44 Attempt finished Question 24 Action State Marks Incorrect 0.00 Incorrect Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Question text E-commerce involves the application of. Select one: a. Product Management systems b. Services Management systems. c. Knowledge Management systems. d. All of the option mention. Feedback The correct answer is: Knowledge Management systems. Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:38 Saved: All of the option mention. Answer saved 3 11/08/21, 09:44 Attempt finished 0.00 Incorrect Question 25 Incorrect Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Question text When preparing a website, designers should ensure that the site enables user-to-user communication. This design feature is known as __________________. Select one: a. commerce b. community c. context d. connection Feedback The correct answer is: context Comments Make comment or override mark Response history Step Time Action State Marks 1 4/08/21, 13:18 Started Not yet answered 2 11/08/21, 09:38 Saved: community Answer saved 3 11/08/21, 09:44 Attempt finished Incorrect Finish review Jump to... Jump to... Skip <span id="mod_quiz_navblock_title">Quiz navigation</span> Quiz navigation Show one page at a time Finish review Moodle Docs for this page You are logged in as Thokozani Nkosi (Log out) 2021MCM522B Get the mobile app Skip to main content RICHFIELD Search Modules Resources Bursaries and Graduate Programme 39 Thokozani Nkosi M-COMMERCE 522(2021MCM522B) 0.00 Dashboard Courses HET INFORMATION_TECHNOLOGY_-_RGIT M-COMMERCE 522(2021MCM522B) Welcome to M - COMMERCE 522 2021- Assignment 1 (Multiple-choice - Online) Picture of OFENTSE HENDRIETTE MAKANETA Started on State OFENTSE HENDRIETTE MAKANETA Thursday, 5 August 2021, 7:47 AM Finished Completed on Thursday, 5 August 2021, 9:04 AM Time taken 1 hour 17 mins Marks 16.00/25.00 Grade 64.00 out of 100.00 Question 1 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text A company’s e-commerce policies and consumer information privacy should be addressed in a(n): Select one: a. CRM b. Information firewall c. information code of ethics d. VPN. Feedback The correct answer is: information code of ethics Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 08:10 Saved: information code of ethics 3 5/08/21, 09:04 Attempt finished Answer saved Correct 1.00 Question 2 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text When a customer chooses an item for purchase on a Web site, the item is placed in a virtual: Select one: a. basket. b. shopping bag. c. box. d. shopping cart. Feedback The correct answer is: shopping cart. Comments Make comment or override mark Response history Step Time Action State 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 08:10 Saved: shopping cart. Answer saved 3 5/08/21, 09:04 Attempt finished Correct 1.00 Question 3 Incorrect Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Marks Question text While shopping online, ____________ are used to keep track of what the customer has placed in the “shopping cart”. Select one: a. registers b. proxy servers c. cookies d. spiders Feedback The correct answer is: cookies Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 08:10 Saved: proxy servers Answer saved 3 5/08/21, 09:04 Attempt finished Incorrect Question 4 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text M-commerce stands for: Select one: a. management commerce. b. mobile commerce. c. moderated commerce. d. macro commerce. Feedback The correct answer is: mobile commerce. 0.00 Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 08:10 Saved: mobile commerce. 3 5/08/21, 09:04 Attempt finished Answer saved Correct 1.00 Question 5 Incorrect Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Question text The World Wide Web was developed in the: Select one: a. 1990s. b. 1960s. c. 1980s. d. 1970s. Feedback The correct answer is: 1990s. Comments Make comment or override mark Response history Step Time Action State 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 08:10 Saved: 1970s. Answer saved 3 5/08/21, 09:04 Attempt finished Question 6 Incorrect Mark 0.00 out of 1.00 Marks Incorrect 0.00 Not flaggedFlag question Edit question Question text A ____________ is an essential component of an intranet. Select one: a. LAN with a minimum of ten PCs b. PDA c. CRM d. computer with server software Feedback The correct answer is: computer with server software Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 08:41 Saved: LAN with a minimum of ten PCs Answer saved 3 5/08/21, 09:04 Attempt finished Question 7 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text ____________ founded Amazon.com. Select one: a. Bill Gates b. Jeff Bezos c. Andy Grove d. Alan Kay Feedback Incorrect 0.00 The correct answer is: Jeff Bezos Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 08:41 Saved: Jeff Bezos Answer saved 3 5/08/21, 09:04 Attempt finished Correct 1.00 Question 8 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text All of the following are typical uses of an intranet EXCEPT: Select one: a. posting the employee handbook. b. allowing customers to purchase products through the Web. c. allowing a group of employees to work on the same document. d. posting changes to company policies. Feedback The correct answer is: allowing customers to purchase products through the Web. Comments Make comment or override mark Response history Step Time 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 08:41 Saved: allowing customers to purchase products through the Web. Answer saved 3 5/08/21, 09:04 Attempt finished Question 9 Action State Marks Correct 1.00 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The ____________ requires health care providers and hospitals to protect the confidentiality of an individual’s health information. Select one: a. Intellectual Property Act b. National Infrastructure Protection Center c. Health Insurance Portability and Accountability Act d. ACM Code of Ethics Feedback The correct answer is: Health Insurance Portability and Accountability Act Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 08:41 Saved: Health Insurance Portability and Accountability Act saved 3 5/08/21, 09:04 Attempt finished Correct 1.00 Question 10 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text An encryption algorithm transforms plaintext into Select one: a. Cipher text b. Plain Text Answer c. Simple Text d. Empty Text Feedback The correct answer is: Cipher text Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 08:41 Saved: Cipher text Answer saved 3 5/08/21, 09:04 Attempt finished Correct 1.00 Question 11 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text In computer security, ________ means that the information in a computer system only be accessible for reading by authorized parities. Select one: a. Integrity b. Availability c. Authenticity d. Confidentiality Feedback The correct answer is: Confidentiality Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 08:52 Saved: Confidentiality Answer saved 3 5/08/21, 09:04 Attempt finished Correct 1.00 Question 12 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text A transposition cipher reorders (permutes) symbols in a Select one: a. block of signals b. block of symbols c. block of slots d. block of packets Feedback The correct answer is: block of symbols Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 08:52 Saved: block of symbols Answer saved 3 5/08/21, 09:04 Attempt finished Correct 1.00 Question 13 Incorrect Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Question text The type of threats on the security of a computer system or network are __________ i.Interruption ii. Interception iii. Modification iv.Creation v.Fabrication Select one: a. ii, iii, iv and v only b. i, ii, iii and v only c. All i, ii, iii, iv and v d. i, ii, iii and iv only Feedback The correct answer is: i, ii, iii and v only Comments Make comment or override mark Response history Step Time Action State 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 08:52 Saved: All i, ii, iii, iv and v 3 5/08/21, 09:04 Attempt finished Question 14 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Marks Answer saved Incorrect 0.00 State whether true of false.i. A worm mails a copy of itself to other systems.ii. A worm executes a copy of itself on another system. Select one: a. True, True b. False, True c. False, False d. True, False Feedback The correct answer is: True, True Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 08:52 Saved: True, True Answer saved 3 5/08/21, 09:04 Attempt finished Correct 1.00 Question 15 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Keys used in cryptography are Select one: a. All of the option mention b. public key c. private key d. secret key Feedback The correct answer is: All of the option mention Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 08:52 Saved: All of the option mention 3 5/08/21, 09:04 Attempt finished Answer saved Correct 1.00 Question 16 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The ______is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. Select one: a. Virus b. Trojan horse c. Trap doors d. Logic Bomb Feedback The correct answer is: Trap doors Comments Make comment or override mark Response history Step Time Action State 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 08:58 Saved: Trap doors Answer saved 3 5/08/21, 09:04 Attempt finished Correct 1.00 Question 17 Incorrect Mark 0.00 out of 1.00 Marks Not flaggedFlag question Edit question Question text Heart of Data Encryption Standard (DES), is the Select one: a. Rounds b. Cipher c. Encryption d. DES function Feedback The correct answer is: DES function Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 08:58 Saved: Rounds Answer saved 3 5/08/21, 09:04 Attempt finished Incorrect 0.00 Question 18 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The _______is code embedded in some legitimate program that is set to “explode” when certain conditions are met. Select one: a. Trojan horse b. Trap doors c. Virus d. Logic Bomb Feedback The correct answer is: Logic Bomb Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 09:00 Saved: Logic Bomb Answer saved 3 5/08/21, 09:04 Attempt finished Correct 1.00 Question 19 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text E-business stands for Select one: a. Electronic business b. All of the option mention c. Electric business d. Electron business Feedback The correct answer is: Electronic business Comments Make comment or override mark Response history Step Time 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 09:00 Saved: Electronic business 3 5/08/21, 09:04 Attempt finished Question 20 Action State Marks Answer saved Correct 1.00 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text B2B stands for: Select one: a. All of the option mention b. Business to Business. c. Business to Government. d. Business to Consumer. Feedback The correct answer is: Business to Business. Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 09:00 Saved: Business to Business. 3 5/08/21, 09:04 Attempt finished Correct 1.00 Question 21 Incorrect Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Question text Supply chain management helps an organization in. Select one: a. Reducing production costs b. Reduce the time it takes to make a product c. All of the option mentioned Answer saved d. Increase the production cost Feedback The correct answer is: Reduce the time it takes to make a product Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 09:04 Saved: Reducing production costs Answer saved 3 5/08/21, 09:04 Attempt finished 0.00 Incorrect Question 22 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The Internet has: Select one: a. empowered intermediaries only. b. empowered consumers only. c. empowered businesses only. d. empowered consumers and businesses alike. Feedback The correct answer is: empowered consumers and businesses alike. Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 09:04 Saved: empowered consumers and businesses alike. 3 5/08/21, 09:04 Attempt finished Correct 1.00 Answer saved Question 23 Incorrect Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Question text The type of website that engages consumers in interactions that will move them closer to a direct purchase is known as a ______________ website. Select one: a. customer service b. corporate c. marketing d. interactive Feedback The correct answer is: interactive Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 09:04 Saved: marketing Answer saved 3 5/08/21, 09:04 Attempt finished Incorrect Question 24 Incorrect Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Question text E-commerce involves the application of. Select one: a. Services Management systems. 0.00 b. Product Management systems c. Knowledge Management systems. d. All of the option mention. Feedback The correct answer is: Knowledge Management systems. Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 09:04 Saved: All of the option mention. Answer saved 3 5/08/21, 09:04 Attempt finished 0.00 Incorrect Question 25 Incorrect Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Question text Delivering high quality products quickly, error free, and for a reasonable price is Select one: a. Continuous Excellence b. All of the option mention c. Service Excellence d. Operational Excellence Feedback The correct answer is: Operational Excellence Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 07:47 Started Not yet answered 2 5/08/21, 09:04 Saved: All of the option mention Answer saved 3 5/08/21, 09:04 Attempt finished 0.00 Incorrect Finish review Jump to... Jump to... Skip <span id="mod_quiz_navblock_title">Quiz navigation</span> Quiz navigation Show one page at a time Finish review Moodle Docs for this page You are logged in as Thokozani Nkosi (Log out) 2021MCM522B Get the mobile app Skip to main content RICHFIELD Search Modules Resources Bursaries and Graduate Programme 39 Thokozani Nkosi M-COMMERCE 522(2021MCM522B) Dashboard Courses HET INFORMATION_TECHNOLOGY_-_RGIT M-COMMERCE 522(2021MCM522B) Welcome to M - COMMERCE 522 2021- Assignment 1 (Multiple-choice - Online) Picture of PATIENCE THABILE KHANYE PATIENCE THABILE KHANYE Started on State Thursday, 5 August 2021, 3:14 PM Finished Completed on Tuesday, 10 August 2021, 2:11 AM Time taken 4 days 10 hours Marks 24.00/25.00 Grade 96.00 out of 100.00 Question 1 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text When a customer chooses an item for purchase on a Web site, the item is placed in a virtual: Select one: a. box. b. shopping cart. c. basket. d. shopping bag. Feedback The correct answer is: shopping cart. Comments Make comment or override mark Response history Step Time Action State 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 01:56 Saved: shopping cart. Answer saved 3 10/08/21, 02:11 Attempt finished Correct 1.00 Question 2 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Marks Edit question Question text While shopping online, ____________ are used to keep track of what the customer has placed in the “shopping cart”. Select one: a. proxy servers b. registers c. spiders d. cookies Feedback The correct answer is: cookies Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 01:56 Saved: cookies Answer saved 3 10/08/21, 02:11 Attempt finished Correct 1.00 Question 3 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text ____________ is defined as two or more parties exchanging products, services, and/or information using network technology. Select one: a. Netware b. A neural network c. E-commerce d. A network operating system Feedback The correct answer is: E-commerce Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 01:56 Saved: E-commerce Answer saved 3 10/08/21, 02:11 Attempt finished Correct 1.00 Question 4 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text A ____________ is an essential component of an intranet. Select one: a. PDA b. CRM c. LAN with a minimum of ten PCs d. computer with server software Feedback The correct answer is: computer with server software Comments Make comment or override mark Response history Step Time 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 01:56 Saved: computer with server software Answer saved 3 10/08/21, 02:11 Attempt finished Question 5 Correct Action State Marks Correct 1.00 Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The Children’s ____________ of 1998 requires certain commercial Web sites to obtain parental consent before collecting, using, or disclosing personal information about children under 13. Select one: a. Online Privacy Protection Act b. Data Protection Directive c. National Infrastructure Protection Center d. Code of Ethics Feedback The correct answer is: Online Privacy Protection Act Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 01:56 Saved: Online Privacy Protection Act 3 10/08/21, 02:11 Attempt finished Answer saved Correct 1.00 Question 6 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Internet virtual private networks are preferred over extranets for all of the following reasons EXCEPT: Select one: a. use of inexpensive leased phone lines. b. good security. c. data can be encapsulated. d. communications are kept private. Feedback The correct answer is: use of inexpensive leased phone lines. Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 02:02 Saved: use of inexpensive leased phone lines. 3 10/08/21, 02:11 Attempt finished Correct 1.00 Question 7 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text ____________ founded Amazon.com. Select one: a. Jeff Bezos b. Bill Gates c. Andy Grove d. Alan Kay Feedback The correct answer is: Jeff Bezos Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 02:02 Saved: Jeff Bezos Answer saved 3 10/08/21, 02:11 Attempt finished Correct 1.00 Answer saved Question 8 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The European Union’s ____________ establishes a high level of legal protection for the privacy of individuals and personal data. Select one: a. Data Protection Directive b. Health Insurance Portability and Accountability Act c. Code of Ethics d. National Infrastructure Protection Center Feedback The correct answer is: Data Protection Directive Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 02:02 Saved: Data Protection Directive 3 10/08/21, 02:11 Attempt finished Correct 1.00 Question 9 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text All of the following are typical uses of an intranet EXCEPT: Select one: a. allowing customers to purchase products through the Web. Answer saved b. posting the employee handbook. c. allowing a group of employees to work on the same document. d. posting changes to company policies. Feedback The correct answer is: allowing customers to purchase products through the Web. Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 02:02 Answer saved Saved: allowing customers to purchase products through the Web. 3 10/08/21, 02:11 Attempt finished Correct 1.00 Question 10 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Which of the following malicious program do not replicate automatically? Select one: a. Trojan Horse b. Zombie c. Virus d. Worm Feedback The correct answer is: Trojan Horse Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 02:02 Saved: Trojan Horse Answer saved 3 10/08/21, 02:11 Attempt finished Correct 1.00 Question 11 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text In Cryptography, when text is treated at bit level, each character is replaced by Select one: a. 4 Bits b. 6 Bits c. 8 Bits d. 10 B its Feedback The correct answer is: 8 Bits Comments Make comment or override mark Response history Step Time Action State 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 02:05 Saved: 8 Bits 3 10/08/21, 02:11 Attempt finished Question 12 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Marks Answer saved Correct 1.00 Cipher feedback (CFB) mode was created for those situations in which we need to send or receive r bits of Select one: a. Encryption b. Frames c. Pixels d. Data Feedback The correct answer is: Data Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 02:05 Saved: Data 3 10/08/21, 02:11 Attempt finished Answer saved Correct 1.00 Question 13 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text State whether true of false.i. A worm mails a copy of itself to other systems.ii. A worm executes a copy of itself on another system. Select one: a. True, True b. True, False c. False, False d. False, True Feedback The correct answer is: True, True Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 02:05 Saved: True, True Answer saved 3 10/08/21, 02:11 Attempt finished Correct 1.00 Question 14 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Original message, before being transformed, is Select one: a. plaintext b. decryption c. None of the optuion mention d. Cipher text Feedback The correct answer is: plaintext Comments Make comment or override mark Response history Step Time Action State 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 02:05 Saved: plaintext Answer saved 3 10/08/21, 02:11 Attempt finished Question 15 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Marks Correct 1.00 Edit question Question text Relationship between a character in plaintext to a character is Select one: a. None of the option mention b. one-to-many relationship c. many-to-many relationship d. many-to-one relationship Feedback The correct answer is: one-to-many relationship Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 02:05 Saved: one-to-many relationship 3 10/08/21, 02:11 Attempt finished Answer saved Correct 1.00 Question 16 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Which of the following is independent malicious program that need not any host program? Select one: a. Virus b. Trap doors c. Worm d. Trojan horse Feedback The correct answer is: Worm Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 02:11 Saved: Worm 3 10/08/21, 02:11 Attempt finished Answer saved Correct 1.00 Question 17 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The ______is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. Select one: a. Trojan horse b. Trap doors c. Logic Bomb d. Virus Feedback The correct answer is: Trap doors Comments Make comment or override mark Response history Step Time 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 02:07 Saved: Trap doors Answer saved 3 10/08/21, 02:11 Attempt finished Correct 1.00 Question 18 Correct Action State Marks Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text DES stands for Select one: a. Data Encryption Subscription b. Data Encryption Solutions c. Data Encryption Slots d. Data Encryption Standard Feedback The correct answer is: Data Encryption Standard Comments Make comment or override mark Response history Step Time Action State 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 02:07 Saved: Data Encryption Standard 3 10/08/21, 02:11 Attempt finished Question 19 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text B2G stands for: Select one: a. Business to Consumer. b. Business to Government. c. Business to Business. d. All of the option mention Marks Correct 1.00 Answer saved Feedback The correct answer is: Business to Government. Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 02:07 Saved: Business to Government. 3 10/08/21, 02:11 Attempt finished Answer saved Correct 1.00 Question 20 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Operating systems software is primarily aimed at supporting business users in their tasks. Select one: a. True b. False Feedback The correct answer is: False Comments Make comment or override mark Response history Step Time Action State 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 02:07 Saved: False 3 10/08/21, 02:11 Attempt finished Question 21 Correct Mark 1.00 out of 1.00 Marks Answer saved Correct 1.00 Not flaggedFlag question Edit question Question text Which of the following is not relevant to marketing via the Internet? Select one: a. Mobile marketing. b. Click-and-mortar marketing. c. Brick-and-mortar marketing. d. Viral marketing. Feedback The correct answer is: Brick-and-mortar marketing. Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 02:10 Saved: Brick-and-mortar marketing. 3 10/08/21, 02:11 Attempt finished Question 22 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text CRM stands for Select one: a. Customer referred Management b. All of the option mentioned c. Customer Relationship Management d. Customer Related Management Feedback Correct 1.00 Answer saved The correct answer is: Customer Relationship Management Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 02:10 Saved: Customer Relationship Management 3 10/08/21, 02:11 Attempt finished Answer saved Correct 1.00 Question 23 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The Old Economy revolved around manufacturing companies that mainly focused on standardizing their production, products and business processes, whereas the New Economy revolves around ________ businesses. Select one: a. Disintermediation b. Operations management c. Environmentalism d. Information Feedback The correct answer is: Information Comments Make comment or override mark Response history Step Time 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 02:10 Saved: Information Answer saved 3 10/08/21, 02:11 Attempt finished Correct 1.00 Question 24 Action State Marks Incorrect Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Question text E-commerce involves the application of. Select one: a. Knowledge Management systems. b. Services Management systems. c. All of the option mention. d. Product Management systems Feedback The correct answer is: Knowledge Management systems. Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 02:10 Saved: All of the option mention. Answer saved 3 10/08/21, 02:11 Attempt finished 0.00 Incorrect Question 25 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Which of the following is not one of the reasons that dot-com companies failed? Select one: a. Some companies found they lacked well-designed distribution systems. b. Many companies overestimated the size of the market. c. Some rushed into the market without proper research or planning. d. Many relied too heavily on hype instead of developing sound marketing strategies. Feedback The correct answer is: Many companies overestimated the size of the market. Comments Make comment or override mark Response history Step Time Action State Marks 1 5/08/21, 15:14 Started Not yet answered 2 10/08/21, 02:10 Answer saved Saved: Many companies overestimated the size of the market. 3 10/08/21, 02:11 Attempt finished Correct 1.00 Finish review Jump to... Jump to... Skip <span id="mod_quiz_navblock_title">Quiz navigation</span> Quiz navigation Show one page at a time Finish review Moodle Docs for this page You are logged in as Thokozani Nkosi (Log out) 2021MCM522B Get the mobile app Skip to main content RICHFIELD Search Modules Resources Bursaries and Graduate Programme 39 Thokozani Nkosi M-COMMERCE 522(2021MCM522B) Dashboard Courses HET INFORMATION_TECHNOLOGY_-_RGIT M-COMMERCE 522(2021MCM522B) Welcome to M - COMMERCE 522 2021- Assignment 1 (Multiple-choice - Online) Picture of NOMPUMELELO PAULINA MOLEFE Started on State NOMPUMELELO PAULINA MOLEFE Friday, 6 August 2021, 8:39 AM Finished Completed on Friday, 6 August 2021, 11:22 AM Time taken 2 hours 43 mins Marks 18.00/25.00 Grade 72.00 out of 100.00 Question 1 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text ____________ is defined as two or more parties exchanging products, services, and/or information using network technology. Select one: a. A neural network b. A network operating system c. Netware d. E-commerce Feedback The correct answer is: E-commerce Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 08:48 Saved: E-commerce Answer saved 3 6/08/21, 11:22 Attempt finished Correct 1.00 Question 2 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text A company’s e-commerce policies and consumer information privacy should be addressed in a(n): Select one: a. CRM b. VPN. c. information code of ethics d. Information firewall Feedback The correct answer is: information code of ethics Comments Make comment or override mark Response history Step Time Action State 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 08:48 Saved: information code of ethics 3 6/08/21, 11:22 Attempt finished Question 3 Incorrect Mark 0.00 out of 1.00 Not flaggedFlag question Marks Correct 1.00 Answer saved Edit question Question text Internet-based companies are often referred to as: Select one: a. Fortune 100 companies. b. dot coms. c. brick-and-mortar companies. d. CRMs. Feedback The correct answer is: dot coms. Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 08:48 Saved: CRMs. 3 6/08/21, 11:22 Attempt finished Answer saved Incorrect 0.00 Question 4 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text ____________ manages the communication protocols for an intranet. Select one: a. Middleware b. Telecommunications c. NIC d. TCP/IP Feedback The correct answer is: TCP/IP Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 08:48 Saved: TCP/IP Answer saved 3 6/08/21, 11:22 Attempt finished Correct 1.00 Question 5 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text M-commerce stands for: Select one: a. management commerce. b. mobile commerce. c. macro commerce. d. moderated commerce. Feedback The correct answer is: mobile commerce. Comments Make comment or override mark Response history Step Time Action State 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 08:48 Saved: mobile commerce. 3 6/08/21, 11:22 Attempt finished Question 6 Correct Mark 1.00 out of 1.00 Marks Answer saved Correct 1.00 Not flaggedFlag question Edit question Question text Electronic communication between Wal-Mart and Proctor & Gamble is an example of a(n): Select one: a. neural network. b. intranet. c. extranet. d. CRM. Feedback The correct answer is: extranet. Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 09:21 Saved: extranet. Answer saved 3 6/08/21, 11:22 Attempt finished Correct 1.00 Question 7 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The ____________ requires health care providers and hospitals to protect the confidentiality of an individual’s health information. Select one: a. Health Insurance Portability and Accountability Act b. ACM Code of Ethics c. Intellectual Property Act d. National Infrastructure Protection Center Feedback The correct answer is: Health Insurance Portability and Accountability Act Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 09:21 Saved: Health Insurance Portability and Accountability Act saved 3 6/08/21, 11:22 Attempt finished Correct 1.00 Question 8 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text ____________ founded Amazon.com. Select one: a. Andy Grove b. Jeff Bezos c. Bill Gates d. Alan Kay Feedback The correct answer is: Jeff Bezos Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 09:21 Saved: Jeff Bezos Answer saved 3 6/08/21, 11:22 Attempt finished Correct 1.00 Answer Question 9 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text All of the following are typical uses of an intranet EXCEPT: Select one: a. allowing a group of employees to work on the same document. b. allowing customers to purchase products through the Web. c. posting the employee handbook. d. posting changes to company policies. Feedback The correct answer is: allowing customers to purchase products through the Web. Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 09:21 Saved: allowing customers to purchase products through the Web. Answer saved 3 6/08/21, 11:22 Attempt finished Correct 1.00 Question 10 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text In Cryptography, when text is treated at bit level, each character is replaced by Select one: a. 4 Bits b. 6 Bits c. 8 Bits d. 10 B its Feedback The correct answer is: 8 Bits Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 09:21 Saved: 8 Bits 3 6/08/21, 11:22 Attempt finished Answer saved Correct 1.00 Question 11 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text A ________is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs. Select one: a. Trap doors b. Worm c. Zombie d. Virus Feedback The correct answer is: Virus Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 10:32 Saved: Virus 3 6/08/21, 11:22 Attempt finished Answer saved Correct 1.00 Question 12 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Cipher feedback (CFB) mode was created for those situations in which we need to send or receive r bits of Select one: a. Encryption b. Frames c. Pixels d. Data Feedback The correct answer is: Data Comments Make comment or override mark Response history Step Time Action State 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 10:32 Saved: Data 3 6/08/21, 11:22 Attempt finished Question 13 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Marks Answer saved Correct 1.00 In symmetric-key cryptography, same key is used by Select one: a. Both Party b. Third Party c. Multi Party d. One Party Feedback The correct answer is: Both Party Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 10:32 Saved: Both Party Answer saved 3 6/08/21, 11:22 Attempt finished Correct 1.00 Question 14 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The type of threats on the security of a computer system or network are __________ i.Interruption ii. Interception iii. Modification iv.Creation v.Fabrication Select one: a. All i, ii, iii, iv and v b. ii, iii, iv and v only c. i, ii, iii and v only d. i, ii, iii and iv only Feedback The correct answer is: i, ii, iii and v only Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 10:32 Saved: i, ii, iii and v only Answer saved 3 6/08/21, 11:22 Attempt finished Question 15 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Keys used in cryptography are Select one: a. public key b. private key c. secret key d. All of the option mention Feedback The correct answer is: All of the option mention Comments Correct 1.00 Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 10:32 Saved: All of the option mention 3 6/08/21, 11:22 Attempt finished Answer saved Correct 1.00 Question 16 Incorrect Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Question text Heart of Data Encryption Standard (DES), is the Select one: a. Encryption b. Cipher c. DES function d. Rounds Feedback The correct answer is: DES function Comments Make comment or override mark Response history Step Time Action State 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 11:14 Saved: Cipher Answer saved 3 6/08/21, 11:22 Attempt finished Question 17 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Marks Incorrect 0.00 Edit question Question text The ______is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. Select one: a. Virus b. Trap doors c. Logic Bomb d. Trojan horse Feedback The correct answer is: Trap doors Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 11:14 Saved: Trap doors Answer saved 3 6/08/21, 11:22 Attempt finished Correct 1.00 Question 18 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Which of the following is independent malicious program that need not any host program? Select one: a. Trojan horse b. Trap doors c. Virus d. Worm Feedback The correct answer is: Worm Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 11:14 Saved: Worm 3 6/08/21, 11:22 Attempt finished Answer saved Correct 1.00 Question 19 Incorrect Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Question text An information system always: Select one: a. None of the option mentioned b. Is computer-based. c. Requires hardware even if only a pencil. d. Transforms inputs to information. Feedback The correct answer is: Requires hardware even if only a pencil. Comments Make comment or override mark Response history Step Time 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 11:14 Saved: Transforms inputs to information. 3 6/08/21, 11:22 Attempt finished Question 20 Incorrect Action State Marks Incorrect 0.00 Answer saved Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Question text The criterion used to assess how user and business needs are met in software is: Select one: a. Compatibility. b. Security. c. Cost. d. Functionality. Feedback The correct answer is: Cost. Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 11:14 Saved: Functionality. Answer saved 3 6/08/21, 11:22 Attempt finished Incorrect Question 21 Incorrect Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Question text Supply chain management helps an organization in. Select one: a. Reduce the time it takes to make a product b. Reducing production costs c. Increase the production cost d. All of the option mentioned 0.00 Feedback The correct answer is: Reduce the time it takes to make a product Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 11:22 Saved: All of the option mentioned Answer saved 3 6/08/21, 11:22 Attempt finished 0.00 Incorrect Question 22 Incorrect Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Question text Which of the following have forward-thinking companies begun to use to promote their products and services? Select one: a. C2B. b. MMA. c. B2C. d. SMS. Feedback The correct answer is: B2C. Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 11:22 Saved: SMS. 3 6/08/21, 11:22 Attempt finished Answer saved Incorrect 0.00 Question 23 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text When preparing a website, designers should ensure that the site makes effective use of the text, pictures and video. This design feature is known as _________. Select one: a. content b. context c. connection d. communication Feedback The correct answer is: content Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 11:22 Saved: content Answer saved 3 6/08/21, 11:22 Attempt finished Question 24 Incorrect Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Question text E-commerce involves the application of. Select one: a. Product Management systems Correct 1.00 b. All of the option mention. c. Services Management systems. d. Knowledge Management systems. Feedback The correct answer is: Knowledge Management systems. Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 11:22 Saved: All of the option mention. Answer saved 3 6/08/21, 11:22 Attempt finished 0.00 Incorrect Question 25 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as: Select one: a. Consumer to Consumer (C2C). b. Business to Consumer (B2C). c. Consumer to Business (C2B). d. Business to Business (B2B). Feedback The correct answer is: Consumer to Business (C2B). Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 08:39 Started Not yet answered 2 6/08/21, 11:22 Saved: Consumer to Business (C2B). 3 6/08/21, 11:22 Attempt finished Answer saved Correct 1.00 Finish review Jump to... Jump to... Skip <span id="mod_quiz_navblock_title">Quiz navigation</span> Quiz navigation Show one page at a time Finish review Moodle Docs for this page You are logged in as Thokozani Nkosi (Log out) 2021MCM522B Get the mobile app Skip to main content RICHFIELD Search Modules Resources Bursaries and Graduate Programme 39 Thokozani Nkosi M-COMMERCE 522(2021MCM522B) Dashboard Courses HET INFORMATION_TECHNOLOGY_-_RGIT M-COMMERCE 522(2021MCM522B) Welcome to M - COMMERCE 522 2021- Assignment 1 (Multiple-choice - Online) Picture of JEROME BRIJLAL Started on State JEROME BRIJLAL Friday, 6 August 2021, 10:29 AM Finished Completed on Friday, 6 August 2021, 10:54 AM Time taken 24 mins 30 secs Marks 23.00/25.00 Grade 92.00 out of 100.00 Question 1 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text All of the following are advantages of using an intranet EXCEPT: Select one: a. reduced hardware and software costs. b. security restrictions so employees cannot access the company network from home. c. cross-platform capability. d. open standards. Feedback The correct answer is: security restrictions so employees cannot access the company network from home. Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:35 Saved: security restrictions so employees cannot access the company network from home. Answer saved 3 6/08/21, 10:54 Attempt finished Question 2 Correct Correct 1.00 Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text A code of ethics should address all of the following EXCEPT for: Select one: a. scalability. b. intended use of recorded personal information. c. permission to record personal information. d. policy on privacy. Feedback The correct answer is: scalability. Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:35 Saved: scalability. Answer saved 3 6/08/21, 10:54 Attempt finished Correct 1.00 Question 3 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text A company’s e-commerce policies and consumer information privacy should be addressed in a(n): Select one: a. Information firewall b. VPN. c. CRM d. information code of ethics Feedback The correct answer is: information code of ethics Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:35 Saved: information code of ethics 3 6/08/21, 10:54 Attempt finished Correct 1.00 Question 4 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Communication software for an intranet includes: Select one: a. LAN. b. WAN. c. VPN. d. TCP/IP. Feedback The correct answer is: TCP/IP. Comments Make comment or override mark Response history Step Time 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:35 Saved: TCP/IP. Answer saved 3 6/08/21, 10:54 Attempt finished Question 5 Action State Marks Correct 1.00 Answer saved Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The Children’s ____________ of 1998 requires certain commercial Web sites to obtain parental consent before collecting, using, or disclosing personal information about children under 13. Select one: a. Code of Ethics b. Online Privacy Protection Act c. National Infrastructure Protection Center d. Data Protection Directive Feedback The correct answer is: Online Privacy Protection Act Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:35 Saved: Online Privacy Protection Act 3 6/08/21, 10:54 Attempt finished Answer saved Correct 1.00 Question 6 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The ability of Proctor & Gamble to have up-to-the-minute inventory information and to know when to ship more product to Wal-Mart is an example of: Select one: a. B2B. b. B2C. c. C2C. d. m-business. Feedback The correct answer is: B2B. Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:40 Saved: B2B. 3 6/08/21, 10:54 Attempt finished Answer saved Correct 1.00 Question 7 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text ____________ founded Amazon.com. Select one: a. Bill Gates b. Alan Kay c. Andy Grove d. Jeff Bezos Feedback The correct answer is: Jeff Bezos Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:40 Saved: Jeff Bezos Answer saved 3 6/08/21, 10:54 Attempt finished Correct 1.00 Question 8 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text All of the following are typical uses of an intranet EXCEPT: Select one: a. posting changes to company policies. b. allowing customers to purchase products through the Web. c. allowing a group of employees to work on the same document. d. posting the employee handbook. Feedback The correct answer is: allowing customers to purchase products through the Web. Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:40 Saved: allowing customers to purchase products through the Web. Answer saved 3 6/08/21, 10:54 Attempt finished Correct 1.00 Question 9 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The ____________ requires health care providers and hospitals to protect the confidentiality of an individual’s health information. Select one: a. ACM Code of Ethics b. Health Insurance Portability and Accountability Act c. National Infrastructure Protection Center d. Intellectual Property Act Feedback The correct answer is: Health Insurance Portability and Accountability Act Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:40 Saved: Health Insurance Portability and Accountability Act saved 3 6/08/21, 10:54 Attempt finished Correct 1.00 Question 10 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Which of the following malicious program do not replicate automatically? Select one: a. Trojan Horse b. Virus c. Zombie d. Worm Feedback The correct answer is: Trojan Horse Comments Make comment or override mark Response history Answer Step Time Action State Marks 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:40 Saved: Trojan Horse Answer saved 3 6/08/21, 10:54 Attempt finished Correct 1.00 Question 11 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Cipher feedback (CFB) mode was created for those situations in which we need to send or receive r bits of Select one: a. Data b. Pixels c. Encryption d. Frames Feedback The correct answer is: Data Comments Make comment or override mark Response history Step Time Action State 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:44 Saved: Data 3 6/08/21, 10:54 Attempt finished Question 12 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Marks Answer saved Correct 1.00 Question text A transposition cipher reorders (permutes) symbols in a Select one: a. block of packets b. block of symbols c. block of signals d. block of slots Feedback The correct answer is: block of symbols Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:44 Saved: block of symbols Answer saved 3 6/08/21, 10:54 Attempt finished Correct 1.00 Question 13 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Relationship between a character in plaintext to a character is Select one: a. many-to-one relationship b. one-to-many relationship c. many-to-many relationship d. None of the option mention Feedback The correct answer is: one-to-many relationship Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:44 Saved: one-to-many relationship 3 6/08/21, 10:54 Attempt finished Correct 1.00 Question 14 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Original message, before being transformed, is Select one: a. plaintext b. Cipher text c. None of the optuion mention d. decryption Feedback The correct answer is: plaintext Comments Make comment or override mark Response history Step Time Action State 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:44 Saved: plaintext Answer saved 3 6/08/21, 10:54 Attempt finished Question 15 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Marks Correct 1.00 Answer saved Edit question Question text Cryptography, a word with Greek origins, means Select one: a. Closed Writing b. Open Writing c. Secret Writing d. Corrupting Data Feedback The correct answer is: Secret Writing Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:44 Saved: Secret Writing Answer saved 3 6/08/21, 10:54 Attempt finished Correct 1.00 Question 16 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The ______is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. Select one: a. Trojan horse b. Virus c. Logic Bomb d. Trap doors Feedback The correct answer is: Trap doors Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:47 Saved: Trap doors Answer saved 3 6/08/21, 10:54 Attempt finished Correct 1.00 Question 17 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Which of the following is independent malicious program that need not any host program? Select one: a. Trap doors b. Worm c. Virus d. Trojan horse Feedback The correct answer is: Worm Comments Make comment or override mark Response history Step Time 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:47 Saved: Worm 3 6/08/21, 10:54 Attempt finished Question 18 Correct Action State Marks Answer saved Correct 1.00 Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Heart of Data Encryption Standard (DES), is the Select one: a. DES function b. Encryption c. Cipher d. Rounds Feedback The correct answer is: DES function Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:47 Saved: DES function Answer saved 3 6/08/21, 10:54 Attempt finished Correct 1.00 Question 19 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text _____________ are networks that connect people within a company to each other and to the company network. Select one: a. Intranets b. Bitstreams c. Extranets d. Internets Feedback The correct answer is: Intranets Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:47 Saved: Intranets Answer saved 3 6/08/21, 10:54 Attempt finished Correct 1.00 Question 20 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Operating systems software is primarily aimed at supporting business users in their tasks. Select one: a. True b. False Feedback The correct answer is: False Comments Make comment or override mark Response history Step Time 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:47 Saved: False 3 6/08/21, 10:54 Attempt finished Question 21 Incorrect Action State Marks Answer saved Correct 1.00 Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Question text Advantage of CRM Select one: a. Cost of the Software. b. All of the option mentioned. c. Customization of the Business. d. Improve overall relationship with customer. Feedback The correct answer is: Improve overall relationship with customer. Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:54 Saved: All of the option mentioned. Answer saved 3 6/08/21, 10:54 Attempt finished 0.00 Question 22 Incorrect Mark 0.00 out of 1.00 Not flaggedFlag question Edit question Question text The Internet has: Select one: a. empowered businesses only. b. empowered intermediaries only. c. empowered consumers and businesses alike. d. empowered consumers only. Incorrect Feedback The correct answer is: empowered consumers and businesses alike. Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:54 Saved: empowered consumers only. Answer saved 3 6/08/21, 10:54 Attempt finished 0.00 Incorrect Question 23 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Delivering products and services that push is called Select one: a. All of the option mention b. Service Excellence c. Operational Excellence d. Continuous Excellence Feedback The correct answer is: Continuous Excellence Comments Make comment or override mark Response history Step Time 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:54 Saved: Continuous Excellence 3 6/08/21, 10:54 Attempt finished Question 24 Action State Marks Answer saved Correct 1.00 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Delivering what customers want with hassle-free service and superior value is called Select one: a. Service Excellence b. Operational Excellence c. Continuous Excellence d. All of the option mention Feedback The correct answer is: Service Excellence Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:54 Saved: Service Excellence 3 6/08/21, 10:54 Attempt finished Answer saved Correct 1.00 Question 25 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Which of the following is not one of the benefits of e-commerce to sellers? Select one: a. E-commerce offers greater flexibility in meeting customer needs. b. E-commerce can help to reduce costs. c. E-commerce increases the net cost per contact. d. E-commerce is a powerful tool for customer relationship building. Feedback The correct answer is: E-commerce increases the net cost per contact. Comments Make comment or override mark Response history Step Time Action State Marks 1 6/08/21, 10:29 Started Not yet answered 2 6/08/21, 10:54 Saved: E-commerce increases the net cost per contact. Answer saved 3 6/08/21, 10:54 Attempt finished Correct 1.00 Finish review Jump to... Jump to... Skip <span id="mod_quiz_navblock_title">Quiz navigation</span> Quiz navigation Show one page at a time Finish review Moodle Docs for this page You are logged in as Thokozani Nkosi (Log out) 2021MCM522B Get the mobile app Skip to main content RICHFIELD Search Modules Resources Bursaries and Graduate Programme 39 Thokozani Nkosi M-COMMERCE 522(2021MCM522B) Dashboard Courses HET INFORMATION_TECHNOLOGY_-_RGIT M-COMMERCE 522(2021MCM522B) Welcome to M - COMMERCE 522 2021- Assignment 1 (Multiple-choice - Online) Picture of OLEFILE BENEDICT SEHOLE Started on State OLEFILE BENEDICT SEHOLE Wednesday, 18 August 2021, 7:34 PM Finished Completed on Wednesday, 18 August 2021, 8:00 PM Time taken 25 mins 25 secs Marks 25.00/25.00 Grade 100.00 out of 100.00 Question 1 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text ____________ is defined as two or more parties exchanging products, services, and/or information using network technology. Select one: a. E-commerce b. Netware c. A network operating system d. A neural network Feedback The correct answer is: E-commerce Comments Make comment or override mark Response history Step Time Action State Marks 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:41 Saved: E-commerce Answer saved 3 18/08/21, 20:00 Attempt finished Correct 1.00 Question 2 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text A code of ethics should address all of the following EXCEPT for: Select one: a. permission to record personal information. b. policy on privacy. c. intended use of recorded personal information. d. scalability. Feedback The correct answer is: scalability. Comments Make comment or override mark Response history Step Time Action State 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:41 Saved: scalability. Answer saved 3 18/08/21, 20:00 Attempt finished Correct 1.00 Question 3 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Marks Question text All of the following are advantages of using an intranet EXCEPT: Select one: a. open standards. b. reduced hardware and software costs. c. security restrictions so employees cannot access the company network from home. d. cross-platform capability. Feedback The correct answer is: security restrictions so employees cannot access the company network from home. Comments Make comment or override mark Response history Step Time Action State 1 18/08/21, 19:34 Marks Started Not yet answered 2 18/08/21, 19:41 Saved: security restrictions so employees cannot access the company network from home. Answer saved 3 18/08/21, 20:00 Attempt finished Correct 1.00 Question 4 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text ____________ keeps unauthorized Internet users from accessing a computer. Select one: a. Firewalls b. Ethernet c. Middleware d. TCP/IP Feedback The correct answer is: Firewalls Comments Make comment or override mark Response history Step Time Action State Marks 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:41 Saved: Firewalls Answer saved 3 18/08/21, 20:00 Attempt finished Correct 1.00 Question 5 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text A ____________ is an essential component of an intranet. Select one: a. CRM b. LAN with a minimum of ten PCs c. computer with server software d. PDA Feedback The correct answer is: computer with server software Comments Make comment or override mark Response history Step Time Action State 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:41 Saved: computer with server software Answer saved 3 18/08/21, 20:00 Attempt finished Question 6 Correct Mark 1.00 out of 1.00 Marks Correct 1.00 Not flaggedFlag question Edit question Question text Most intranets use ____________ topology to connect the nodes of the network. Select one: a. fiber optic b. satellite c. wireless d. Ethernet Feedback The correct answer is: Ethernet Comments Make comment or override mark Response history Step Time Action State Marks 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:44 Saved: Ethernet Answer saved 3 18/08/21, 20:00 Attempt finished Correct 1.00 Question 7 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text All of the following are typical uses of an intranet EXCEPT: Select one: a. posting changes to company policies. b. allowing a group of employees to work on the same document. c. allowing customers to purchase products through the Web. d. posting the employee handbook. Feedback The correct answer is: allowing customers to purchase products through the Web. Comments Make comment or override mark Response history Step Time Action State Marks 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:44 Answer saved Saved: allowing customers to purchase products through the Web. 3 18/08/21, 20:00 Attempt finished Correct 1.00 Question 8 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The ____________ requires health care providers and hospitals to protect the confidentiality of an individual’s health information. Select one: a. National Infrastructure Protection Center b. Health Insurance Portability and Accountability Act c. Intellectual Property Act d. ACM Code of Ethics Feedback The correct answer is: Health Insurance Portability and Accountability Act Comments Make comment or override mark Response history Step Time Action State Marks 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:44 Answer saved Saved: Health Insurance Portability and Accountability Act 3 18/08/21, 20:00 Attempt finished Correct 1.00 Question 9 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text ____________ founded Amazon.com. Select one: a. Jeff Bezos b. Bill Gates c. Alan Kay d. Andy Grove Feedback The correct answer is: Jeff Bezos Comments Make comment or override mark Response history Step Time Action State Marks 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:44 Saved: Jeff Bezos Answer saved 3 18/08/21, 20:00 Attempt finished Correct 1.00 Question 10 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text An encryption algorithm transforms plaintext into Select one: a. Empty Text b. Plain Text c. Simple Text d. Cipher text Feedback The correct answer is: Cipher text Comments Make comment or override mark Response history Step Time Action State Marks 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:44 Saved: Cipher text Answer saved 3 18/08/21, 20:00 Attempt finished Correct 1.00 Question 11 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Which of the following malicious program do not replicate automatically? Select one: a. Trojan Horse b. Zombie c. Worm d. Virus Feedback The correct answer is: Trojan Horse Comments Make comment or override mark Response history Step Time Action State Marks 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:48 Saved: Trojan Horse Answer saved 3 18/08/21, 20:00 Attempt finished Correct 1.00 Question 12 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Cipher feedback (CFB) mode was created for those situations in which we need to send or receive r bits of Select one: a. Data b. Pixels c. Encryption d. Frames Feedback The correct answer is: Data Comments Make comment or override mark Response history Step Time Action State Marks 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:48 Saved: Data 3 18/08/21, 20:00 Attempt finished Answer saved Correct 1.00 Question 13 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text In computer security, _________ means that computer system assets can be modified only by authorized parities. Select one: a. Integrity b. Availability c. Authenticity d. Confidentiality Feedback The correct answer is: Integrity Comments Make comment or override mark Response history Step Time Action State Marks 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:48 Saved: Integrity Answer saved 3 18/08/21, 20:00 Attempt finished Correct 1.00 Question 14 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text In symmetric-key cryptography, key locks and unlocks box is Select one: a. same b. shared c. private d. public Feedback The correct answer is: same Comments Make comment or override mark Response history Step Time Action State Marks 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:48 Saved: same 3 18/08/21, 20:00 Attempt finished Answer saved Correct 1.00 Question 15 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Cryptography, a word with Greek origins, means Select one: a. Closed Writing b. Corrupting Data c. Secret Writing d. Open Writing Feedback The correct answer is: Secret Writing Comments Make comment or override mark Response history Step Time Action State 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:48 Saved: Secret Writing Answer saved 3 18/08/21, 20:00 Attempt finished Correct 1.00 Question 16 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Marks The _______is code embedded in some legitimate program that is set to “explode” when certain conditions are met. Select one: a. Virus b. Logic Bomb c. Trap doors d. Trojan horse Feedback The correct answer is: Logic Bomb Comments Make comment or override mark Response history Step Time Action State Marks 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:54 Saved: Logic Bomb Answer saved 3 18/08/21, 20:00 Attempt finished Correct 1.00 Question 17 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Heart of Data Encryption Standard (DES), is the Select one: a. Rounds b. Cipher c. DES function d. Encryption Feedback The correct answer is: DES function Comments Make comment or override mark Response history Step Time Action State Marks 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:54 Saved: DES function Answer saved 3 18/08/21, 20:00 Attempt finished Correct 1.00 Question 18 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Which of the following is independent malicious program that need not any host program? Select one: a. Worm b. Virus c. Trojan horse d. Trap doors Feedback The correct answer is: Worm Comments Make comment or override mark Response history Step Time Action State 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:54 Saved: Worm 3 18/08/21, 20:00 Attempt finished Question 19 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Marks Answer saved Correct 1.00 Edit question Question text _____________ are networks that connect people within a company to each other and to the company network. Select one: a. Bitstreams b. Extranets c. Intranets d. Internets Feedback The correct answer is: Intranets Comments Make comment or override mark Response history Step Time Action State Marks 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:54 Saved: Intranets Answer saved 3 18/08/21, 20:00 Attempt finished Correct 1.00 Question 20 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Operating systems software is primarily aimed at supporting business users in their tasks. Select one: a. True b. False Feedback The correct answer is: False Comments Make comment or override mark Response history Step Time Action State Marks 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:54 Saved: False 3 18/08/21, 20:00 Attempt finished Answer saved Correct 1.00 Question 21 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Which of the following is not relevant to marketing via the Internet? Select one: a. Click-and-mortar marketing. b. Brick-and-mortar marketing. c. Mobile marketing. d. Viral marketing. Feedback The correct answer is: Brick-and-mortar marketing. Comments Make comment or override mark Response history Step Time Action State 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:59 Saved: Brick-and-mortar marketing. 3 18/08/21, 20:00 Attempt finished Question 22 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Marks Correct 1.00 Answer saved Edit question Question text Advantage of CRM Select one: a. Improve overall relationship with customer. b. Customization of the Business. c. Cost of the Software. d. All of the option mentioned. Feedback The correct answer is: Improve overall relationship with customer. Comments Make comment or override mark Response history Step Time Action State 1 18/08/21, 19:34 Marks Started Not yet answered 2 18/08/21, 19:59 saved Saved: Improve overall relationship with customer. 3 Attempt finished 18/08/21, 20:00 Answer Correct 1.00 Question 23 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text The type of website that engages consumers in interactions that will move them closer to a direct purchase is known as a ______________ website. Select one: a. interactive b. marketing c. corporate d. customer service Feedback The correct answer is: interactive Comments Make comment or override mark Response history Step Time Action State Marks 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:59 Saved: interactive Answer saved 3 18/08/21, 20:00 Attempt finished Correct 1.00 Question 24 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Which of the following is not one of the reasons that dot-com companies failed? Select one: a. Some companies found they lacked well-designed distribution systems. b. Many relied too heavily on hype instead of developing sound marketing strategies. c. Some rushed into the market without proper research or planning. d. Many companies overestimated the size of the market. Feedback The correct answer is: Many companies overestimated the size of the market. Comments Make comment or override mark Response history Step Time 1 18/08/21, 19:34 Started Not yet answered 2 18/08/21, 19:59 Answer saved Saved: Many companies overestimated the size of the market. 3 18/08/21, 20:00 Attempt finished Question 25 Action State Marks Correct 1.00 Correct Mark 1.00 out of 1.00 Not flaggedFlag question Edit question Question text Which of the following is not one of the benefits of e-commerce to sellers? Select one: a. E-commerce offers greater flexibility in meeting customer needs. b. E-commerce is a powerful tool for customer relationship building. c. E-commerce can help to reduce costs. d. E-commerce increases the net cost per contact. Feedback The correct answer is: E-commerce increases the net cost per contact. Comments Make comment or override mark Response history Step Time Action State 1 18/08/21, 19:34 Marks Started Not yet answered 2 18/08/21, 19:59 saved Saved: E-commerce increases the net cost per contact. Answer 3 Attempt finished 18/08/21, 20:00 Correct 1.00 Finish review Jump to... Jump to... Skip <span id="mod_quiz_navblock_title">Quiz navigation</span> Quiz navigation Show one page at a time Finish review Moodle Docs for this page You are logged in as Thokozani Nkosi (Log out) 2021MCM522B Get the mobile app