Uploaded by Thokozani Nkosi

mc

advertisement
Skip to main content
RICHFIELD
Search Modules
Resources
Bursaries and Graduate Programme
39
Thokozani Nkosi
M-COMMERCE 522(2021MCM522B)
Dashboard
Courses
HET
INFORMATION_TECHNOLOGY_-_RGIT
M-COMMERCE 522(2021MCM522B)
Welcome to M - COMMERCE 522
2021- Assignment 1 (Multiple-choice - Online)
Myself & My Guitar
Started on
State
ROHAN SEWRAJ
Wednesday, 4 August 2021, 8:51 AM
Finished
Completed on Wednesday, 4 August 2021, 9:02 AM
Time taken
10 mins 38 secs
Marks 25.00/25.00
Grade 100.00 out of 100.00
Question 1
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
When a customer chooses an item for purchase on a Web site, the item is placed in a virtual:
Select one:
a. basket.
b. box.
c. shopping cart.
d. shopping bag.
Feedback
The correct answer is: shopping cart.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 08:55 Saved: shopping cart.
Answer saved
3
4/08/21, 09:02 Attempt finished
Correct 1.00
Question 2
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
When Wal-Mart uses the Internet to purchase inventory items from a vendor company, it is using
the ____________ e-commerce model.
Select one:
a. B2E
b. B2B
c. C2C
d. B2C
Feedback
The correct answer is: B2B
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 08:55 Saved: B2B
3
4/08/21, 09:02 Attempt finished
Answer saved
Correct 1.00
Question 3
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
An example of B2C is:
Select one:
a. a law firm buying computer software for employees.
b. Wal-Mart buying pet food directly from the manufacturer, Iams.
c. a student buying a T-shirt from the Lands’ End website.
d. a university buying desks from a manufacturer.
Feedback
The correct answer is: a student buying a T-shirt from the Lands’ End website.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 08:55 Saved: a student buying a T-shirt from the Lands’ End website. Answer
saved
3
4/08/21, 09:02 Attempt finished
Question 4
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Correct 1.00
Question text
An intranet includes all of the following EXCEPT:
Select one:
a. middleware.
b. malware.
c. TCP/IP software.
d. firewalls.
Feedback
The correct answer is: malware.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 08:55 Saved: malware.
Answer saved
3
4/08/21, 09:02 Attempt finished
Correct 1.00
Question 5
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
____________ is communications software used by an intranet.
Select one:
a. Firmware
b. Middleware
c. Ethernet
d. NICware
Feedback
The correct answer is: Middleware
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 08:55 Saved: Middleware
Answer saved
3
4/08/21, 09:02 Attempt finished
Correct 1.00
Question 6
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
All of the following provide intranet security EXCEPT:
Select one:
a. data encryption.
b. data compression.
c. user authentication.
d. firewall.
Feedback
The correct answer is: data compression.
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 08:58 Saved: data compression.
3
4/08/21, 09:02 Attempt finished
Question 7
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Marks
Answer saved
Correct 1.00
Edit question
Question text
The ____________ requires health care providers and hospitals to protect the confidentiality of an
individual’s health information.
Select one:
a. National Infrastructure Protection Center
b. Health Insurance Portability and Accountability Act
c. ACM Code of Ethics
d. Intellectual Property Act
Feedback
The correct answer is: Health Insurance Portability and Accountability Act
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 08:58 Saved: Health Insurance Portability and Accountability Act
saved
3
4/08/21, 09:02 Attempt finished
Answer
Correct 1.00
Question 8
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The European Union’s ____________ establishes a high level of legal protection for the privacy of
individuals and personal data.
Select one:
a. Code of Ethics
b. National Infrastructure Protection Center
c. Data Protection Directive
d. Health Insurance Portability and Accountability Act
Feedback
The correct answer is: Data Protection Directive
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 08:58 Saved: Data Protection Directive
3
4/08/21, 09:02 Attempt finished
Correct 1.00
Question 9
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
____________ founded Amazon.com.
Select one:
a. Jeff Bezos
b. Alan Kay
c. Bill Gates
d. Andy Grove
Feedback
The correct answer is: Jeff Bezos
Comments
Make comment or override mark
Response history
Step
Time
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 08:58 Saved: Jeff Bezos
Answer saved
3
4/08/21, 09:02 Attempt finished
Correct 1.00
Question 10
Action State
Marks
Answer saved
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Cipher feedback (CFB) mode was created for those situations in which we need to send or receive r
bits of
Select one:
a. Encryption
b. Frames
c. Data
d. Pixels
Feedback
The correct answer is: Data
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 08:58 Saved: Data
3
4/08/21, 09:02 Attempt finished
Answer saved
Correct 1.00
Question 11
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
An encryption algorithm transforms plaintext into
Select one:
a. Empty Text
b. Cipher text
c. Simple Text
d. Plain Text
Feedback
The correct answer is: Cipher text
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 08:59 Saved: Cipher text
Answer saved
3
4/08/21, 09:02 Attempt finished
Correct 1.00
Question 12
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
A transposition cipher reorders (permutes) symbols in a
Select one:
a. block of signals
b. block of packets
c. block of slots
d. block of symbols
Feedback
The correct answer is: block of symbols
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 08:59 Saved: block of symbols Answer saved
3
4/08/21, 09:02 Attempt finished
Correct 1.00
Question 13
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Original message, before being transformed, is
Select one:
a. None of the optuion mention
b. Cipher text
c. decryption
d. plaintext
Feedback
The correct answer is: plaintext
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 08:59 Saved: plaintext Answer saved
3
4/08/21, 09:02 Attempt finished
Question 14
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Keys used in cryptography are
Select one:
a. secret key
Marks
Correct 1.00
b. public key
c. private key
d. All of the option mention
Feedback
The correct answer is: All of the option mention
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 08:59 Saved: All of the option mention
3
4/08/21, 09:02 Attempt finished
Correct 1.00
Question 15
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Relationship between a character in plaintext to a character is
Select one:
a. many-to-many relationship
b. None of the option mention
c. many-to-one relationship
d. one-to-many relationship
Feedback
The correct answer is: one-to-many relationship
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 08:51 Started Not yet answered
Answer saved
2
4/08/21, 08:59 Saved: one-to-many relationship
3
4/08/21, 09:02 Attempt finished
Answer saved
Correct 1.00
Question 16
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The _______is code embedded in some legitimate program that is set to “explode” when certain
conditions are met.
Select one:
a. Trap doors
b. Logic Bomb
c. Trojan horse
d. Virus
Feedback
The correct answer is: Logic Bomb
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 09:00 Saved: Logic Bomb
Answer saved
3
4/08/21, 09:02 Attempt finished
Correct 1.00
Question 17
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Heart of Data Encryption Standard (DES), is the
Select one:
a. DES function
b. Cipher
c. Encryption
d. Rounds
Feedback
The correct answer is: DES function
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 09:00 Saved: DES function
Answer saved
3
4/08/21, 09:02 Attempt finished
Correct 1.00
Question 18
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
DES stands for
Select one:
a. Data Encryption Slots
b. Data Encryption Solutions
c. Data Encryption Subscription
d. Data Encryption Standard
Feedback
The correct answer is: Data Encryption Standard
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 09:00 Saved: Data Encryption Standard
3
4/08/21, 09:02 Attempt finished
Answer saved
Correct 1.00
Question 19
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The criterion used to assess how user and business needs are met in software is:
Select one:
a. Compatibility.
b. Cost.
c. Functionality.
d. Security.
Feedback
The correct answer is: Cost.
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 09:00 Saved: Cost.
3
4/08/21, 09:02 Attempt finished
Question 20
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Marks
Answer saved
Correct 1.00
E-business software is best defined as to manage:
Select one:
a. sell-side e-commerce applications.
b. internal administrative applications.
c. buy-side applications.
Feedback
The correct answer is: sell-side e-commerce applications.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 09:00 Saved: sell-side e-commerce applications.
3
4/08/21, 09:02 Attempt finished
Correct 1.00
Question 21
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Advantage of CRM
Select one:
a. All of the option mentioned.
b. Cost of the Software.
c. Improve overall relationship with customer.
d. Customization of the Business.
Feedback
The correct answer is: Improve overall relationship with customer.
Comments
Make comment or override mark
Response history
Answer saved
Step
Time
Action State
Marks
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 09:01 Saved: Improve overall relationship with customer.
3
4/08/21, 09:02 Attempt finished
Answer saved
Correct 1.00
Question 22
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
CRM stands for
Select one:
a. Customer referred Management
b. All of the option mentioned
c. Customer Related Management
d. Customer Relationship Management
Feedback
The correct answer is: Customer Relationship Management
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 09:01 Saved: Customer Relationship Management
3
4/08/21, 09:02 Attempt finished
Question 23
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Marks
Correct 1.00
Answer saved
A well-built e-business infrastructure is a combination of.
Select one:
a. All of the option mention
b. Understands costumer priorities
c. Structure and Stability
d. Safeguards information
Feedback
The correct answer is: All of the option mention
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 09:01 Saved: All of the option mention
3
4/08/21, 09:02 Attempt finished
Answer saved
Correct 1.00
Question 24
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
When crafting e-business direction, management must pay careful attention to three interlocking
layers:
Select one:
a. E-business application Infrastructure
b. All of the option mention
c. E-business design
d. E-business Infrastructure
Feedback
The correct answer is: All of the option mention
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 09:01 Saved: All of the option mention
3
4/08/21, 09:02 Attempt finished
Answer saved
Correct 1.00
Question 25
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
When preparing a website, designers should ensure that the site enables user-to-user
communication. This design feature is known as __________________.
Select one:
a. context
b. community
c. connection
d. commerce
Feedback
The correct answer is: context
Comments
Make comment or override mark
Response history
Step
Time
1
4/08/21, 08:51 Started Not yet answered
2
4/08/21, 09:01 Saved: context Answer saved
3
4/08/21, 09:02 Attempt finished
Finish review
Jump to...
Jump to...
Action State
Marks
Correct 1.00
Skip <span id="mod_quiz_navblock_title">Quiz navigation</span>
Quiz navigation
Show one page at a time
Finish review
Moodle Docs for this page
You are logged in as Thokozani Nkosi (Log out)
2021MCM522B
Get the mobile app
Skip to main content
RICHFIELD
Search Modules
Resources
Bursaries and Graduate Programme
39
Thokozani Nkosi
M-COMMERCE 522(2021MCM522B)
Dashboard
Courses
HET
INFORMATION_TECHNOLOGY_-_RGIT
M-COMMERCE 522(2021MCM522B)
Welcome to M - COMMERCE 522
2021- Assignment 1 (Multiple-choice - Online)
Picture of THULANI SIPHIWO MSIMANGO
Started on
State
THULANI SIPHIWO MSIMANGO
Wednesday, 4 August 2021, 1:18 PM
Finished
Completed on Wednesday, 11 August 2021, 9:44 AM
Time taken
6 days 20 hours
Marks 20.00/25.00
Grade 80.00 out of 100.00
Question 1
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
____________ is defined as two or more parties exchanging products, services, and/or information
using network technology.
Select one:
a. A network operating system
b. A neural network
c. Netware
d. E-commerce
Feedback
The correct answer is: E-commerce
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:39
Saved: E-commerce
Answer saved
3
11/08/21, 09:44
Attempt finished
Correct 1.00
Question 2
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
An example of B2C is:
Select one:
Marks
a. a student buying a T-shirt from the Lands’ End website.
b. a law firm buying computer software for employees.
c. a university buying desks from a manufacturer.
d. Wal-Mart buying pet food directly from the manufacturer, Iams.
Feedback
The correct answer is: a student buying a T-shirt from the Lands’ End website.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:39
Answer saved
Saved: a student buying a T-shirt from the Lands’ End website.
3
11/08/21, 09:44
Attempt finished
Correct 1.00
Question 3
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
A company’s e-commerce policies and consumer information privacy should be addressed in a(n):
Select one:
a. information code of ethics
b. Information firewall
c. CRM
d. VPN.
Feedback
The correct answer is: information code of ethics
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:39
Saved: information code of ethics
3
11/08/21, 09:44
Attempt finished
Answer saved
Correct 1.00
Question 4
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
A(n) ____________ connects many private networks from different companies for communication
through a private interorganizational information system.
Select one:
a. Internet
b. extranet
c. WAN
d. intranet
Feedback
The correct answer is: extranet
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:39
Saved: extranet Answer saved
3
11/08/21, 09:44
Attempt finished
Question 5
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Marks
Correct 1.00
Question text
The ability of Proctor & Gamble to have up-to-the-minute inventory information and to know when
to ship more product to Wal-Mart is an example of:
Select one:
a. C2C.
b. B2B.
c. B2C.
d. m-business.
Feedback
The correct answer is: B2B.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:39
Saved: B2B.
3
11/08/21, 09:44
Attempt finished
Answer saved
Correct 1.00
Question 6
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
____________ keeps unauthorized Internet users from accessing a computer.
Select one:
a. Middleware
b. Firewalls
c. TCP/IP
d. Ethernet
Feedback
The correct answer is: Firewalls
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:39
Saved: Firewalls Answer saved
3
11/08/21, 09:44
Attempt finished
Correct 1.00
Question 7
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
All of the following are typical uses of an intranet EXCEPT:
Select one:
a. posting the employee handbook.
b. allowing customers to purchase products through the Web.
c. allowing a group of employees to work on the same document.
d. posting changes to company policies.
Feedback
The correct answer is: allowing customers to purchase products through the Web.
Comments
Make comment or override mark
Response history
Step
Time
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:40
Answer saved
Saved: allowing customers to purchase products through the Web.
3
11/08/21, 09:44
Attempt finished
Question 8
Correct
Action State
Marks
Correct 1.00
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The ____________ requires health care providers and hospitals to protect the confidentiality of an
individual’s health information.
Select one:
a. Health Insurance Portability and Accountability Act
b. ACM Code of Ethics
c. National Infrastructure Protection Center
d. Intellectual Property Act
Feedback
The correct answer is: Health Insurance Portability and Accountability Act
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:40
Answer saved
Saved: Health Insurance Portability and Accountability Act
3
11/08/21, 09:44
Attempt finished
Correct 1.00
Question 9
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The European Union’s ____________ establishes a high level of legal protection for the privacy of
individuals and personal data.
Select one:
a. Code of Ethics
b. Data Protection Directive
c. National Infrastructure Protection Center
d. Health Insurance Portability and Accountability Act
Feedback
The correct answer is: Data Protection Directive
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:40
Saved: Data Protection Directive
3
11/08/21, 09:44
Attempt finished
Answer saved
Correct 1.00
Question 10
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
A ________is a program that can infect other programs by modifying them, the modification
includes a copy of the virus program, which can go on to infect other programs.
Select one:
a. Trap doors
b. Virus
c. Zombie
d. Worm
Feedback
The correct answer is: Virus
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:40
Saved: Virus
Answer saved
3
11/08/21, 09:44
Attempt finished
Correct 1.00
Question 11
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Data Encryption Standard (DES) was designed by
Select one:
a. Microsoft
b. None of the option mention
c. IBM
d. Apple
Feedback
The correct answer is: IBM
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:41
Saved: IBM
3
11/08/21, 09:44
Attempt finished
Answer saved
Question 12
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
An encryption algorithm transforms plaintext into
Select one:
Correct 1.00
a. Empty Text
b. Plain Text
c. Simple Text
d. Cipher text
Feedback
The correct answer is: Cipher text
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:41
Saved: Cipher text
Answer saved
3
11/08/21, 09:44
Attempt finished
Correct 1.00
Question 13
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
In symmetric-key cryptography, same key is used by
Select one:
a. Third Party
b. One Party
c. Both Party
d. Multi Party
Feedback
The correct answer is: Both Party
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:41
Saved: Both Party
Answer saved
3
11/08/21, 09:44
Attempt finished
Correct 1.00
Question 14
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
ECB stands for
Select one:
a. Electronic Code Book
b. Electronic Cipher Book
c. Electronic Cryptography Book
d. Electronic Control Book
Feedback
The correct answer is: Electronic Code Book
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:41
Saved: Electronic Code Book
3
11/08/21, 09:44
Attempt finished
Question 15
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Marks
Answer saved
Correct 1.00
In computer security, _________ means that computer system assets can be modified only by
authorized parities.
Select one:
a. Availability
b. Integrity
c. Authenticity
d. Confidentiality
Feedback
The correct answer is: Integrity
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:41
Saved: Integrity Answer saved
3
11/08/21, 09:44
Attempt finished
Correct 1.00
Question 16
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The ______is code that recognizes some special sequence of input or is triggered by being run from
a certain user ID of by unlikely sequence of events.
Select one:
a. Virus
b. Trojan horse
c. Trap doors
d. Logic Bomb
Feedback
The correct answer is: Trap doors
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:44
Saved: Trap doors
Answer saved
3
11/08/21, 09:44
Attempt finished
Correct 1.00
Question 17
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Which of the following is independent malicious program that need not any host program?
Select one:
a. Worm
b. Trap doors
c. Virus
d. Trojan horse
Feedback
The correct answer is: Worm
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:44
Saved: Worm
3
11/08/21, 09:44
Attempt finished
Question 18
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Marks
Answer saved
Correct 1.00
Edit question
Question text
DES stands for
Select one:
a. Data Encryption Solutions
b. Data Encryption Subscription
c. Data Encryption Standard
d. Data Encryption Slots
Feedback
The correct answer is: Data Encryption Standard
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:44
Saved: Data Encryption Standard
3
11/08/21, 09:44
Attempt finished
Question 19
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
B2B stands for:
Select one:
a. All of the option mention
b. Business to Government.
c. Business to Business.
d. Business to Consumer.
Feedback
The correct answer is: Business to Business.
Correct 1.00
Answer saved
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:44
Saved: Business to Business.
3
11/08/21, 09:44
Attempt finished
Answer saved
Correct 1.00
Question 20
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The criterion used to assess how user and business needs are met in software is:
Select one:
a. Security.
b. Cost.
c. Functionality.
d. Compatibility.
Feedback
The correct answer is: Cost.
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:44
Saved: Functionality.
Answer saved
3
11/08/21, 09:44
Attempt finished
Incorrect
Question 21
Correct
Mark 1.00 out of 1.00
Marks
0.00
Not flaggedFlag question
Edit question
Question text
CRM stands for
Select one:
a. Customer referred Management
b. Customer Related Management
c. All of the option mentioned
d. Customer Relationship Management
Feedback
The correct answer is: Customer Relationship Management
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:38
Saved: Customer Relationship Management
3
11/08/21, 09:44
Attempt finished
Answer saved
Correct 1.00
Question 22
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Which of the following have forward-thinking companies begun to use to promote their products
and services?
Select one:
a. SMS.
b. C2B.
c. B2C.
d. MMA.
Feedback
The correct answer is: B2C.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:38
Saved: SMS.
3
11/08/21, 09:44
Attempt finished
Answer saved
Incorrect
0.00
Question 23
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Delivering products and services that push is called
Select one:
a. Continuous Excellence
b. Operational Excellence
c. All of the option mention
d. Service Excellence
Feedback
The correct answer is: Continuous Excellence
Comments
Make comment or override mark
Response history
Step
Time
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:38
Saved: Operational Excellence Answer saved
3
11/08/21, 09:44
Attempt finished
Question 24
Action State
Marks
Incorrect
0.00
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
E-commerce involves the application of.
Select one:
a. Product Management systems
b. Services Management systems.
c. Knowledge Management systems.
d. All of the option mention.
Feedback
The correct answer is: Knowledge Management systems.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:38
Saved: All of the option mention.
Answer saved
3
11/08/21, 09:44
Attempt finished
0.00
Incorrect
Question 25
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
When preparing a website, designers should ensure that the site enables user-to-user
communication. This design feature is known as __________________.
Select one:
a. commerce
b. community
c. context
d. connection
Feedback
The correct answer is: context
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
4/08/21, 13:18 Started Not yet answered
2
11/08/21, 09:38
Saved: community
Answer saved
3
11/08/21, 09:44
Attempt finished
Incorrect
Finish review
Jump to...
Jump to...
Skip <span id="mod_quiz_navblock_title">Quiz navigation</span>
Quiz navigation
Show one page at a time
Finish review
Moodle Docs for this page
You are logged in as Thokozani Nkosi (Log out)
2021MCM522B
Get the mobile app
Skip to main content
RICHFIELD
Search Modules
Resources
Bursaries and Graduate Programme
39
Thokozani Nkosi
M-COMMERCE 522(2021MCM522B)
0.00
Dashboard
Courses
HET
INFORMATION_TECHNOLOGY_-_RGIT
M-COMMERCE 522(2021MCM522B)
Welcome to M - COMMERCE 522
2021- Assignment 1 (Multiple-choice - Online)
Picture of OFENTSE HENDRIETTE MAKANETA
Started on
State
OFENTSE HENDRIETTE MAKANETA
Thursday, 5 August 2021, 7:47 AM
Finished
Completed on Thursday, 5 August 2021, 9:04 AM
Time taken
1 hour 17 mins
Marks 16.00/25.00
Grade 64.00 out of 100.00
Question 1
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
A company’s e-commerce policies and consumer information privacy should be addressed in a(n):
Select one:
a. CRM
b. Information firewall
c. information code of ethics
d. VPN.
Feedback
The correct answer is: information code of ethics
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 08:10 Saved: information code of ethics
3
5/08/21, 09:04 Attempt finished
Answer saved
Correct 1.00
Question 2
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
When a customer chooses an item for purchase on a Web site, the item is placed in a virtual:
Select one:
a. basket.
b. shopping bag.
c. box.
d. shopping cart.
Feedback
The correct answer is: shopping cart.
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 08:10 Saved: shopping cart.
Answer saved
3
5/08/21, 09:04 Attempt finished
Correct 1.00
Question 3
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Marks
Question text
While shopping online, ____________ are used to keep track of what the customer has placed in the
“shopping cart”.
Select one:
a. registers
b. proxy servers
c. cookies
d. spiders
Feedback
The correct answer is: cookies
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 08:10 Saved: proxy servers
Answer saved
3
5/08/21, 09:04 Attempt finished
Incorrect
Question 4
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
M-commerce stands for:
Select one:
a. management commerce.
b. mobile commerce.
c. moderated commerce.
d. macro commerce.
Feedback
The correct answer is: mobile commerce.
0.00
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 08:10 Saved: mobile commerce.
3
5/08/21, 09:04 Attempt finished
Answer saved
Correct 1.00
Question 5
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The World Wide Web was developed in the:
Select one:
a. 1990s.
b. 1960s.
c. 1980s.
d. 1970s.
Feedback
The correct answer is: 1990s.
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 08:10 Saved: 1970s. Answer saved
3
5/08/21, 09:04 Attempt finished
Question 6
Incorrect
Mark 0.00 out of 1.00
Marks
Incorrect
0.00
Not flaggedFlag question
Edit question
Question text
A ____________ is an essential component of an intranet.
Select one:
a. LAN with a minimum of ten PCs
b. PDA
c. CRM
d. computer with server software
Feedback
The correct answer is: computer with server software
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 08:41 Saved: LAN with a minimum of ten PCs Answer saved
3
5/08/21, 09:04 Attempt finished
Question 7
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
____________ founded Amazon.com.
Select one:
a. Bill Gates
b. Jeff Bezos
c. Andy Grove
d. Alan Kay
Feedback
Incorrect
0.00
The correct answer is: Jeff Bezos
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 08:41 Saved: Jeff Bezos
Answer saved
3
5/08/21, 09:04 Attempt finished
Correct 1.00
Question 8
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
All of the following are typical uses of an intranet EXCEPT:
Select one:
a. posting the employee handbook.
b. allowing customers to purchase products through the Web.
c. allowing a group of employees to work on the same document.
d. posting changes to company policies.
Feedback
The correct answer is: allowing customers to purchase products through the Web.
Comments
Make comment or override mark
Response history
Step
Time
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 08:41 Saved: allowing customers to purchase products through the Web.
Answer saved
3
5/08/21, 09:04 Attempt finished
Question 9
Action State
Marks
Correct 1.00
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The ____________ requires health care providers and hospitals to protect the confidentiality of an
individual’s health information.
Select one:
a. Intellectual Property Act
b. National Infrastructure Protection Center
c. Health Insurance Portability and Accountability Act
d. ACM Code of Ethics
Feedback
The correct answer is: Health Insurance Portability and Accountability Act
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 08:41 Saved: Health Insurance Portability and Accountability Act
saved
3
5/08/21, 09:04 Attempt finished
Correct 1.00
Question 10
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
An encryption algorithm transforms plaintext into
Select one:
a. Cipher text
b. Plain Text
Answer
c. Simple Text
d. Empty Text
Feedback
The correct answer is: Cipher text
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 08:41 Saved: Cipher text
Answer saved
3
5/08/21, 09:04 Attempt finished
Correct 1.00
Question 11
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
In computer security, ________ means that the information in a computer system only be accessible
for reading by authorized parities.
Select one:
a. Integrity
b. Availability
c. Authenticity
d. Confidentiality
Feedback
The correct answer is: Confidentiality
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 08:52 Saved: Confidentiality Answer saved
3
5/08/21, 09:04 Attempt finished
Correct 1.00
Question 12
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
A transposition cipher reorders (permutes) symbols in a
Select one:
a. block of signals
b. block of symbols
c. block of slots
d. block of packets
Feedback
The correct answer is: block of symbols
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 08:52 Saved: block of symbols Answer saved
3
5/08/21, 09:04 Attempt finished
Correct 1.00
Question 13
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The type of threats on the security of a computer system or network are __________
i.Interruption
ii. Interception
iii. Modification
iv.Creation
v.Fabrication
Select one:
a. ii, iii, iv and v only
b. i, ii, iii and v only
c. All i, ii, iii, iv and v
d. i, ii, iii and iv only
Feedback
The correct answer is: i, ii, iii and v only
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 08:52 Saved: All i, ii, iii, iv and v
3
5/08/21, 09:04 Attempt finished
Question 14
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Marks
Answer saved
Incorrect
0.00
State whether true of false.i. A worm mails a copy of itself to other systems.ii. A worm executes a
copy of itself on another system.
Select one:
a. True, True
b. False, True
c. False, False
d. True, False
Feedback
The correct answer is: True, True
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 08:52 Saved: True, True
Answer saved
3
5/08/21, 09:04 Attempt finished
Correct 1.00
Question 15
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Keys used in cryptography are
Select one:
a. All of the option mention
b. public key
c. private key
d. secret key
Feedback
The correct answer is: All of the option mention
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 08:52 Saved: All of the option mention
3
5/08/21, 09:04 Attempt finished
Answer saved
Correct 1.00
Question 16
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The ______is code that recognizes some special sequence of input or is triggered by being run from
a certain user ID of by unlikely sequence of events.
Select one:
a. Virus
b. Trojan horse
c. Trap doors
d. Logic Bomb
Feedback
The correct answer is: Trap doors
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 08:58 Saved: Trap doors
Answer saved
3
5/08/21, 09:04 Attempt finished
Correct 1.00
Question 17
Incorrect
Mark 0.00 out of 1.00
Marks
Not flaggedFlag question
Edit question
Question text
Heart of Data Encryption Standard (DES), is the
Select one:
a. Rounds
b. Cipher
c. Encryption
d. DES function
Feedback
The correct answer is: DES function
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 08:58 Saved: Rounds Answer saved
3
5/08/21, 09:04 Attempt finished
Incorrect
0.00
Question 18
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The _______is code embedded in some legitimate program that is set to “explode” when certain
conditions are met.
Select one:
a. Trojan horse
b. Trap doors
c. Virus
d. Logic Bomb
Feedback
The correct answer is: Logic Bomb
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 09:00 Saved: Logic Bomb
Answer saved
3
5/08/21, 09:04 Attempt finished
Correct 1.00
Question 19
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
E-business stands for
Select one:
a. Electronic business
b. All of the option mention
c. Electric business
d. Electron business
Feedback
The correct answer is: Electronic business
Comments
Make comment or override mark
Response history
Step
Time
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 09:00 Saved: Electronic business
3
5/08/21, 09:04 Attempt finished
Question 20
Action State
Marks
Answer saved
Correct 1.00
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
B2B stands for:
Select one:
a. All of the option mention
b. Business to Business.
c. Business to Government.
d. Business to Consumer.
Feedback
The correct answer is: Business to Business.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 09:00 Saved: Business to Business.
3
5/08/21, 09:04 Attempt finished
Correct 1.00
Question 21
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Supply chain management helps an organization in.
Select one:
a. Reducing production costs
b. Reduce the time it takes to make a product
c. All of the option mentioned
Answer saved
d. Increase the production cost
Feedback
The correct answer is: Reduce the time it takes to make a product
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 09:04 Saved: Reducing production costs
Answer saved
3
5/08/21, 09:04 Attempt finished
0.00
Incorrect
Question 22
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The Internet has:
Select one:
a. empowered intermediaries only.
b. empowered consumers only.
c. empowered businesses only.
d. empowered consumers and businesses alike.
Feedback
The correct answer is: empowered consumers and businesses alike.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 09:04 Saved: empowered consumers and businesses alike.
3
5/08/21, 09:04 Attempt finished
Correct 1.00
Answer saved
Question 23
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The type of website that engages consumers in interactions that will move them closer to a direct
purchase is known as a ______________ website.
Select one:
a. customer service
b. corporate
c. marketing
d. interactive
Feedback
The correct answer is: interactive
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 09:04 Saved: marketing
Answer saved
3
5/08/21, 09:04 Attempt finished
Incorrect
Question 24
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
E-commerce involves the application of.
Select one:
a. Services Management systems.
0.00
b. Product Management systems
c. Knowledge Management systems.
d. All of the option mention.
Feedback
The correct answer is: Knowledge Management systems.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 09:04 Saved: All of the option mention.
Answer saved
3
5/08/21, 09:04 Attempt finished
0.00
Incorrect
Question 25
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Delivering high quality products quickly, error free, and for a reasonable price is
Select one:
a. Continuous Excellence
b. All of the option mention
c. Service Excellence
d. Operational Excellence
Feedback
The correct answer is: Operational Excellence
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 07:47 Started Not yet answered
2
5/08/21, 09:04 Saved: All of the option mention
Answer saved
3
5/08/21, 09:04 Attempt finished
0.00
Incorrect
Finish review
Jump to...
Jump to...
Skip <span id="mod_quiz_navblock_title">Quiz navigation</span>
Quiz navigation
Show one page at a time
Finish review
Moodle Docs for this page
You are logged in as Thokozani Nkosi (Log out)
2021MCM522B
Get the mobile app
Skip to main content
RICHFIELD
Search Modules
Resources
Bursaries and Graduate Programme
39
Thokozani Nkosi
M-COMMERCE 522(2021MCM522B)
Dashboard
Courses
HET
INFORMATION_TECHNOLOGY_-_RGIT
M-COMMERCE 522(2021MCM522B)
Welcome to M - COMMERCE 522
2021- Assignment 1 (Multiple-choice - Online)
Picture of PATIENCE THABILE KHANYE
PATIENCE THABILE KHANYE
Started on
State
Thursday, 5 August 2021, 3:14 PM
Finished
Completed on Tuesday, 10 August 2021, 2:11 AM
Time taken
4 days 10 hours
Marks 24.00/25.00
Grade 96.00 out of 100.00
Question 1
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
When a customer chooses an item for purchase on a Web site, the item is placed in a virtual:
Select one:
a. box.
b. shopping cart.
c. basket.
d. shopping bag.
Feedback
The correct answer is: shopping cart.
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 01:56
Saved: shopping cart.
Answer saved
3
10/08/21, 02:11
Attempt finished
Correct 1.00
Question 2
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Marks
Edit question
Question text
While shopping online, ____________ are used to keep track of what the customer has placed in the
“shopping cart”.
Select one:
a. proxy servers
b. registers
c. spiders
d. cookies
Feedback
The correct answer is: cookies
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 01:56
Saved: cookies Answer saved
3
10/08/21, 02:11
Attempt finished
Correct 1.00
Question 3
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
____________ is defined as two or more parties exchanging products, services, and/or information
using network technology.
Select one:
a. Netware
b. A neural network
c. E-commerce
d. A network operating system
Feedback
The correct answer is: E-commerce
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 01:56
Saved: E-commerce
Answer saved
3
10/08/21, 02:11
Attempt finished
Correct 1.00
Question 4
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
A ____________ is an essential component of an intranet.
Select one:
a. PDA
b. CRM
c. LAN with a minimum of ten PCs
d. computer with server software
Feedback
The correct answer is: computer with server software
Comments
Make comment or override mark
Response history
Step
Time
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 01:56
Saved: computer with server software Answer saved
3
10/08/21, 02:11
Attempt finished
Question 5
Correct
Action State
Marks
Correct 1.00
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The Children’s ____________ of 1998 requires certain commercial Web sites to obtain parental
consent before collecting, using, or disclosing personal information about children under 13.
Select one:
a. Online Privacy Protection Act
b. Data Protection Directive
c. National Infrastructure Protection Center
d. Code of Ethics
Feedback
The correct answer is: Online Privacy Protection Act
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 01:56
Saved: Online Privacy Protection Act
3
10/08/21, 02:11
Attempt finished
Answer saved
Correct 1.00
Question 6
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Internet virtual private networks are preferred over extranets for all of the following reasons
EXCEPT:
Select one:
a. use of inexpensive leased phone lines.
b. good security.
c. data can be encapsulated.
d. communications are kept private.
Feedback
The correct answer is: use of inexpensive leased phone lines.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 02:02
Saved: use of inexpensive leased phone lines.
3
10/08/21, 02:11
Attempt finished
Correct 1.00
Question 7
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
____________ founded Amazon.com.
Select one:
a. Jeff Bezos
b. Bill Gates
c. Andy Grove
d. Alan Kay
Feedback
The correct answer is: Jeff Bezos
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 02:02
Saved: Jeff Bezos
Answer saved
3
10/08/21, 02:11
Attempt finished
Correct 1.00
Answer saved
Question 8
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The European Union’s ____________ establishes a high level of legal protection for the privacy of
individuals and personal data.
Select one:
a. Data Protection Directive
b. Health Insurance Portability and Accountability Act
c. Code of Ethics
d. National Infrastructure Protection Center
Feedback
The correct answer is: Data Protection Directive
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 02:02
Saved: Data Protection Directive
3
10/08/21, 02:11
Attempt finished
Correct 1.00
Question 9
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
All of the following are typical uses of an intranet EXCEPT:
Select one:
a. allowing customers to purchase products through the Web.
Answer saved
b. posting the employee handbook.
c. allowing a group of employees to work on the same document.
d. posting changes to company policies.
Feedback
The correct answer is: allowing customers to purchase products through the Web.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 02:02
Answer saved
Saved: allowing customers to purchase products through the Web.
3
10/08/21, 02:11
Attempt finished
Correct 1.00
Question 10
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Which of the following malicious program do not replicate automatically?
Select one:
a. Trojan Horse
b. Zombie
c. Virus
d. Worm
Feedback
The correct answer is: Trojan Horse
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 02:02
Saved: Trojan Horse
Answer saved
3
10/08/21, 02:11
Attempt finished
Correct 1.00
Question 11
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
In Cryptography, when text is treated at bit level, each character is replaced by
Select one:
a. 4 Bits
b. 6 Bits
c. 8 Bits
d. 10 B its
Feedback
The correct answer is: 8 Bits
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 02:05
Saved: 8 Bits
3
10/08/21, 02:11
Attempt finished
Question 12
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Marks
Answer saved
Correct 1.00
Cipher feedback (CFB) mode was created for those situations in which we need to send or receive r
bits of
Select one:
a. Encryption
b. Frames
c. Pixels
d. Data
Feedback
The correct answer is: Data
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 02:05
Saved: Data
3
10/08/21, 02:11
Attempt finished
Answer saved
Correct 1.00
Question 13
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
State whether true of false.i. A worm mails a copy of itself to other systems.ii. A worm executes a
copy of itself on another system.
Select one:
a. True, True
b. True, False
c. False, False
d. False, True
Feedback
The correct answer is: True, True
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 02:05
Saved: True, True
Answer saved
3
10/08/21, 02:11
Attempt finished
Correct 1.00
Question 14
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Original message, before being transformed, is
Select one:
a. plaintext
b. decryption
c. None of the optuion mention
d. Cipher text
Feedback
The correct answer is: plaintext
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 02:05
Saved: plaintext Answer saved
3
10/08/21, 02:11
Attempt finished
Question 15
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Marks
Correct 1.00
Edit question
Question text
Relationship between a character in plaintext to a character is
Select one:
a. None of the option mention
b. one-to-many relationship
c. many-to-many relationship
d. many-to-one relationship
Feedback
The correct answer is: one-to-many relationship
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 02:05
Saved: one-to-many relationship
3
10/08/21, 02:11
Attempt finished
Answer saved
Correct 1.00
Question 16
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Which of the following is independent malicious program that need not any host program?
Select one:
a. Virus
b. Trap doors
c. Worm
d. Trojan horse
Feedback
The correct answer is: Worm
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 02:11
Saved: Worm
3
10/08/21, 02:11
Attempt finished
Answer saved
Correct 1.00
Question 17
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The ______is code that recognizes some special sequence of input or is triggered by being run from
a certain user ID of by unlikely sequence of events.
Select one:
a. Trojan horse
b. Trap doors
c. Logic Bomb
d. Virus
Feedback
The correct answer is: Trap doors
Comments
Make comment or override mark
Response history
Step
Time
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 02:07
Saved: Trap doors
Answer saved
3
10/08/21, 02:11
Attempt finished
Correct 1.00
Question 18
Correct
Action State
Marks
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
DES stands for
Select one:
a. Data Encryption Subscription
b. Data Encryption Solutions
c. Data Encryption Slots
d. Data Encryption Standard
Feedback
The correct answer is: Data Encryption Standard
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 02:07
Saved: Data Encryption Standard
3
10/08/21, 02:11
Attempt finished
Question 19
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
B2G stands for:
Select one:
a. Business to Consumer.
b. Business to Government.
c. Business to Business.
d. All of the option mention
Marks
Correct 1.00
Answer saved
Feedback
The correct answer is: Business to Government.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 02:07
Saved: Business to Government.
3
10/08/21, 02:11
Attempt finished
Answer saved
Correct 1.00
Question 20
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Operating systems software is primarily aimed at supporting business users in their tasks.
Select one:
a. True
b. False
Feedback
The correct answer is: False
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 02:07
Saved: False
3
10/08/21, 02:11
Attempt finished
Question 21
Correct
Mark 1.00 out of 1.00
Marks
Answer saved
Correct 1.00
Not flaggedFlag question
Edit question
Question text
Which of the following is not relevant to marketing via the Internet?
Select one:
a. Mobile marketing.
b. Click-and-mortar marketing.
c. Brick-and-mortar marketing.
d. Viral marketing.
Feedback
The correct answer is: Brick-and-mortar marketing.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 02:10
Saved: Brick-and-mortar marketing.
3
10/08/21, 02:11
Attempt finished
Question 22
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
CRM stands for
Select one:
a. Customer referred Management
b. All of the option mentioned
c. Customer Relationship Management
d. Customer Related Management
Feedback
Correct 1.00
Answer saved
The correct answer is: Customer Relationship Management
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 02:10
Saved: Customer Relationship Management
3
10/08/21, 02:11
Attempt finished
Answer saved
Correct 1.00
Question 23
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The Old Economy revolved around manufacturing companies that mainly focused on standardizing
their production, products and business processes, whereas the New Economy revolves around
________ businesses.
Select one:
a. Disintermediation
b. Operations management
c. Environmentalism
d. Information
Feedback
The correct answer is: Information
Comments
Make comment or override mark
Response history
Step
Time
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 02:10
Saved: Information
Answer saved
3
10/08/21, 02:11
Attempt finished
Correct 1.00
Question 24
Action State
Marks
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
E-commerce involves the application of.
Select one:
a. Knowledge Management systems.
b. Services Management systems.
c. All of the option mention.
d. Product Management systems
Feedback
The correct answer is: Knowledge Management systems.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 02:10
Saved: All of the option mention.
Answer saved
3
10/08/21, 02:11
Attempt finished
0.00
Incorrect
Question 25
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Which of the following is not one of the reasons that dot-com companies failed?
Select one:
a. Some companies found they lacked well-designed distribution systems.
b. Many companies overestimated the size of the market.
c. Some rushed into the market without proper research or planning.
d. Many relied too heavily on hype instead of developing sound marketing strategies.
Feedback
The correct answer is: Many companies overestimated the size of the market.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
5/08/21, 15:14 Started Not yet answered
2
10/08/21, 02:10
Answer saved
Saved: Many companies overestimated the size of the market.
3
10/08/21, 02:11
Attempt finished
Correct 1.00
Finish review
Jump to...
Jump to...
Skip <span id="mod_quiz_navblock_title">Quiz navigation</span>
Quiz navigation
Show one page at a time
Finish review
Moodle Docs for this page
You are logged in as Thokozani Nkosi (Log out)
2021MCM522B
Get the mobile app
Skip to main content
RICHFIELD
Search Modules
Resources
Bursaries and Graduate Programme
39
Thokozani Nkosi
M-COMMERCE 522(2021MCM522B)
Dashboard
Courses
HET
INFORMATION_TECHNOLOGY_-_RGIT
M-COMMERCE 522(2021MCM522B)
Welcome to M - COMMERCE 522
2021- Assignment 1 (Multiple-choice - Online)
Picture of NOMPUMELELO PAULINA MOLEFE
Started on
State
NOMPUMELELO PAULINA MOLEFE
Friday, 6 August 2021, 8:39 AM
Finished
Completed on Friday, 6 August 2021, 11:22 AM
Time taken
2 hours 43 mins
Marks 18.00/25.00
Grade 72.00 out of 100.00
Question 1
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
____________ is defined as two or more parties exchanging products, services, and/or information
using network technology.
Select one:
a. A neural network
b. A network operating system
c. Netware
d. E-commerce
Feedback
The correct answer is: E-commerce
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 08:48 Saved: E-commerce
Answer saved
3
6/08/21, 11:22 Attempt finished
Correct 1.00
Question 2
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
A company’s e-commerce policies and consumer information privacy should be addressed in a(n):
Select one:
a. CRM
b. VPN.
c. information code of ethics
d. Information firewall
Feedback
The correct answer is: information code of ethics
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 08:48 Saved: information code of ethics
3
6/08/21, 11:22 Attempt finished
Question 3
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Marks
Correct 1.00
Answer saved
Edit question
Question text
Internet-based companies are often referred to as:
Select one:
a. Fortune 100 companies.
b. dot coms.
c. brick-and-mortar companies.
d. CRMs.
Feedback
The correct answer is: dot coms.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 08:48 Saved: CRMs.
3
6/08/21, 11:22 Attempt finished
Answer saved
Incorrect
0.00
Question 4
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
____________ manages the communication protocols for an intranet.
Select one:
a. Middleware
b. Telecommunications
c. NIC
d. TCP/IP
Feedback
The correct answer is: TCP/IP
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 08:48 Saved: TCP/IP Answer saved
3
6/08/21, 11:22 Attempt finished
Correct 1.00
Question 5
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
M-commerce stands for:
Select one:
a. management commerce.
b. mobile commerce.
c. macro commerce.
d. moderated commerce.
Feedback
The correct answer is: mobile commerce.
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 08:48 Saved: mobile commerce.
3
6/08/21, 11:22 Attempt finished
Question 6
Correct
Mark 1.00 out of 1.00
Marks
Answer saved
Correct 1.00
Not flaggedFlag question
Edit question
Question text
Electronic communication between Wal-Mart and Proctor & Gamble is an example of a(n):
Select one:
a. neural network.
b. intranet.
c. extranet.
d. CRM.
Feedback
The correct answer is: extranet.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 09:21 Saved: extranet.
Answer saved
3
6/08/21, 11:22 Attempt finished
Correct 1.00
Question 7
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The ____________ requires health care providers and hospitals to protect the confidentiality of an
individual’s health information.
Select one:
a. Health Insurance Portability and Accountability Act
b. ACM Code of Ethics
c. Intellectual Property Act
d. National Infrastructure Protection Center
Feedback
The correct answer is: Health Insurance Portability and Accountability Act
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 09:21 Saved: Health Insurance Portability and Accountability Act
saved
3
6/08/21, 11:22 Attempt finished
Correct 1.00
Question 8
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
____________ founded Amazon.com.
Select one:
a. Andy Grove
b. Jeff Bezos
c. Bill Gates
d. Alan Kay
Feedback
The correct answer is: Jeff Bezos
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 09:21 Saved: Jeff Bezos
Answer saved
3
6/08/21, 11:22 Attempt finished
Correct 1.00
Answer
Question 9
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
All of the following are typical uses of an intranet EXCEPT:
Select one:
a. allowing a group of employees to work on the same document.
b. allowing customers to purchase products through the Web.
c. posting the employee handbook.
d. posting changes to company policies.
Feedback
The correct answer is: allowing customers to purchase products through the Web.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 09:21 Saved: allowing customers to purchase products through the Web.
Answer saved
3
6/08/21, 11:22 Attempt finished
Correct 1.00
Question 10
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
In Cryptography, when text is treated at bit level, each character is replaced by
Select one:
a. 4 Bits
b. 6 Bits
c. 8 Bits
d. 10 B its
Feedback
The correct answer is: 8 Bits
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 09:21 Saved: 8 Bits
3
6/08/21, 11:22 Attempt finished
Answer saved
Correct 1.00
Question 11
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
A ________is a program that can infect other programs by modifying them, the modification
includes a copy of the virus program, which can go on to infect other programs.
Select one:
a. Trap doors
b. Worm
c. Zombie
d. Virus
Feedback
The correct answer is: Virus
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 10:32 Saved: Virus
3
6/08/21, 11:22 Attempt finished
Answer saved
Correct 1.00
Question 12
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Cipher feedback (CFB) mode was created for those situations in which we need to send or receive r
bits of
Select one:
a. Encryption
b. Frames
c. Pixels
d. Data
Feedback
The correct answer is: Data
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 10:32 Saved: Data
3
6/08/21, 11:22 Attempt finished
Question 13
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Marks
Answer saved
Correct 1.00
In symmetric-key cryptography, same key is used by
Select one:
a. Both Party
b. Third Party
c. Multi Party
d. One Party
Feedback
The correct answer is: Both Party
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 10:32 Saved: Both Party
Answer saved
3
6/08/21, 11:22 Attempt finished
Correct 1.00
Question 14
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The type of threats on the security of a computer system or network are __________
i.Interruption
ii. Interception
iii. Modification
iv.Creation
v.Fabrication
Select one:
a. All i, ii, iii, iv and v
b. ii, iii, iv and v only
c. i, ii, iii and v only
d. i, ii, iii and iv only
Feedback
The correct answer is: i, ii, iii and v only
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 10:32 Saved: i, ii, iii and v only Answer saved
3
6/08/21, 11:22 Attempt finished
Question 15
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Keys used in cryptography are
Select one:
a. public key
b. private key
c. secret key
d. All of the option mention
Feedback
The correct answer is: All of the option mention
Comments
Correct 1.00
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 10:32 Saved: All of the option mention
3
6/08/21, 11:22 Attempt finished
Answer saved
Correct 1.00
Question 16
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Heart of Data Encryption Standard (DES), is the
Select one:
a. Encryption
b. Cipher
c. DES function
d. Rounds
Feedback
The correct answer is: DES function
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 11:14 Saved: Cipher Answer saved
3
6/08/21, 11:22 Attempt finished
Question 17
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Marks
Incorrect
0.00
Edit question
Question text
The ______is code that recognizes some special sequence of input or is triggered by being run from
a certain user ID of by unlikely sequence of events.
Select one:
a. Virus
b. Trap doors
c. Logic Bomb
d. Trojan horse
Feedback
The correct answer is: Trap doors
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 11:14 Saved: Trap doors
Answer saved
3
6/08/21, 11:22 Attempt finished
Correct 1.00
Question 18
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Which of the following is independent malicious program that need not any host program?
Select one:
a. Trojan horse
b. Trap doors
c. Virus
d. Worm
Feedback
The correct answer is: Worm
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 11:14 Saved: Worm
3
6/08/21, 11:22 Attempt finished
Answer saved
Correct 1.00
Question 19
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
An information system always:
Select one:
a. None of the option mentioned
b. Is computer-based.
c. Requires hardware even if only a pencil.
d. Transforms inputs to information.
Feedback
The correct answer is: Requires hardware even if only a pencil.
Comments
Make comment or override mark
Response history
Step
Time
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 11:14 Saved: Transforms inputs to information.
3
6/08/21, 11:22 Attempt finished
Question 20
Incorrect
Action State
Marks
Incorrect
0.00
Answer saved
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The criterion used to assess how user and business needs are met in software is:
Select one:
a. Compatibility.
b. Security.
c. Cost.
d. Functionality.
Feedback
The correct answer is: Cost.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 11:14 Saved: Functionality.
Answer saved
3
6/08/21, 11:22 Attempt finished
Incorrect
Question 21
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Supply chain management helps an organization in.
Select one:
a. Reduce the time it takes to make a product
b. Reducing production costs
c. Increase the production cost
d. All of the option mentioned
0.00
Feedback
The correct answer is: Reduce the time it takes to make a product
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 11:22 Saved: All of the option mentioned
Answer saved
3
6/08/21, 11:22 Attempt finished
0.00
Incorrect
Question 22
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Which of the following have forward-thinking companies begun to use to promote their products
and services?
Select one:
a. C2B.
b. MMA.
c. B2C.
d. SMS.
Feedback
The correct answer is: B2C.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 11:22 Saved: SMS.
3
6/08/21, 11:22 Attempt finished
Answer saved
Incorrect
0.00
Question 23
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
When preparing a website, designers should ensure that the site makes effective use of the text,
pictures and video. This design feature is known as _________.
Select one:
a. content
b. context
c. connection
d. communication
Feedback
The correct answer is: content
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 11:22 Saved: content Answer saved
3
6/08/21, 11:22 Attempt finished
Question 24
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
E-commerce involves the application of.
Select one:
a. Product Management systems
Correct 1.00
b. All of the option mention.
c. Services Management systems.
d. Knowledge Management systems.
Feedback
The correct answer is: Knowledge Management systems.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 11:22 Saved: All of the option mention.
Answer saved
3
6/08/21, 11:22 Attempt finished
0.00
Incorrect
Question 25
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The E-commerce domain that involves business activity initiated by the consumer and targeted to
businesses is known as:
Select one:
a. Consumer to Consumer (C2C).
b. Business to Consumer (B2C).
c. Consumer to Business (C2B).
d. Business to Business (B2B).
Feedback
The correct answer is: Consumer to Business (C2B).
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 08:39 Started Not yet answered
2
6/08/21, 11:22 Saved: Consumer to Business (C2B).
3
6/08/21, 11:22 Attempt finished
Answer saved
Correct 1.00
Finish review
Jump to...
Jump to...
Skip <span id="mod_quiz_navblock_title">Quiz navigation</span>
Quiz navigation
Show one page at a time
Finish review
Moodle Docs for this page
You are logged in as Thokozani Nkosi (Log out)
2021MCM522B
Get the mobile app
Skip to main content
RICHFIELD
Search Modules
Resources
Bursaries and Graduate Programme
39
Thokozani Nkosi
M-COMMERCE 522(2021MCM522B)
Dashboard
Courses
HET
INFORMATION_TECHNOLOGY_-_RGIT
M-COMMERCE 522(2021MCM522B)
Welcome to M - COMMERCE 522
2021- Assignment 1 (Multiple-choice - Online)
Picture of JEROME BRIJLAL
Started on
State
JEROME BRIJLAL
Friday, 6 August 2021, 10:29 AM
Finished
Completed on Friday, 6 August 2021, 10:54 AM
Time taken
24 mins 30 secs
Marks 23.00/25.00
Grade 92.00 out of 100.00
Question 1
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
All of the following are advantages of using an intranet EXCEPT:
Select one:
a. reduced hardware and software costs.
b. security restrictions so employees cannot access the company network from home.
c. cross-platform capability.
d. open standards.
Feedback
The correct answer is: security restrictions so employees cannot access the company network from
home.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:35 Saved: security restrictions so employees cannot access the company
network from home. Answer saved
3
6/08/21, 10:54 Attempt finished
Question 2
Correct
Correct 1.00
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
A code of ethics should address all of the following EXCEPT for:
Select one:
a. scalability.
b. intended use of recorded personal information.
c. permission to record personal information.
d. policy on privacy.
Feedback
The correct answer is: scalability.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:35 Saved: scalability.
Answer saved
3
6/08/21, 10:54 Attempt finished
Correct 1.00
Question 3
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
A company’s e-commerce policies and consumer information privacy should be addressed in a(n):
Select one:
a. Information firewall
b. VPN.
c. CRM
d. information code of ethics
Feedback
The correct answer is: information code of ethics
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:35 Saved: information code of ethics
3
6/08/21, 10:54 Attempt finished
Correct 1.00
Question 4
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Communication software for an intranet includes:
Select one:
a. LAN.
b. WAN.
c. VPN.
d. TCP/IP.
Feedback
The correct answer is: TCP/IP.
Comments
Make comment or override mark
Response history
Step
Time
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:35 Saved: TCP/IP. Answer saved
3
6/08/21, 10:54 Attempt finished
Question 5
Action State
Marks
Correct 1.00
Answer saved
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The Children’s ____________ of 1998 requires certain commercial Web sites to obtain parental
consent before collecting, using, or disclosing personal information about children under 13.
Select one:
a. Code of Ethics
b. Online Privacy Protection Act
c. National Infrastructure Protection Center
d. Data Protection Directive
Feedback
The correct answer is: Online Privacy Protection Act
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:35 Saved: Online Privacy Protection Act
3
6/08/21, 10:54 Attempt finished
Answer saved
Correct 1.00
Question 6
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The ability of Proctor & Gamble to have up-to-the-minute inventory information and to know when
to ship more product to Wal-Mart is an example of:
Select one:
a. B2B.
b. B2C.
c. C2C.
d. m-business.
Feedback
The correct answer is: B2B.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:40 Saved: B2B.
3
6/08/21, 10:54 Attempt finished
Answer saved
Correct 1.00
Question 7
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
____________ founded Amazon.com.
Select one:
a. Bill Gates
b. Alan Kay
c. Andy Grove
d. Jeff Bezos
Feedback
The correct answer is: Jeff Bezos
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:40 Saved: Jeff Bezos
Answer saved
3
6/08/21, 10:54 Attempt finished
Correct 1.00
Question 8
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
All of the following are typical uses of an intranet EXCEPT:
Select one:
a. posting changes to company policies.
b. allowing customers to purchase products through the Web.
c. allowing a group of employees to work on the same document.
d. posting the employee handbook.
Feedback
The correct answer is: allowing customers to purchase products through the Web.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:40 Saved: allowing customers to purchase products through the Web.
Answer saved
3
6/08/21, 10:54 Attempt finished
Correct 1.00
Question 9
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The ____________ requires health care providers and hospitals to protect the confidentiality of an
individual’s health information.
Select one:
a. ACM Code of Ethics
b. Health Insurance Portability and Accountability Act
c. National Infrastructure Protection Center
d. Intellectual Property Act
Feedback
The correct answer is: Health Insurance Portability and Accountability Act
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:40 Saved: Health Insurance Portability and Accountability Act
saved
3
6/08/21, 10:54 Attempt finished
Correct 1.00
Question 10
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Which of the following malicious program do not replicate automatically?
Select one:
a. Trojan Horse
b. Virus
c. Zombie
d. Worm
Feedback
The correct answer is: Trojan Horse
Comments
Make comment or override mark
Response history
Answer
Step
Time
Action State
Marks
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:40 Saved: Trojan Horse
Answer saved
3
6/08/21, 10:54 Attempt finished
Correct 1.00
Question 11
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Cipher feedback (CFB) mode was created for those situations in which we need to send or receive r
bits of
Select one:
a. Data
b. Pixels
c. Encryption
d. Frames
Feedback
The correct answer is: Data
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:44 Saved: Data
3
6/08/21, 10:54 Attempt finished
Question 12
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Marks
Answer saved
Correct 1.00
Question text
A transposition cipher reorders (permutes) symbols in a
Select one:
a. block of packets
b. block of symbols
c. block of signals
d. block of slots
Feedback
The correct answer is: block of symbols
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:44 Saved: block of symbols Answer saved
3
6/08/21, 10:54 Attempt finished
Correct 1.00
Question 13
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Relationship between a character in plaintext to a character is
Select one:
a. many-to-one relationship
b. one-to-many relationship
c. many-to-many relationship
d. None of the option mention
Feedback
The correct answer is: one-to-many relationship
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:44 Saved: one-to-many relationship
3
6/08/21, 10:54 Attempt finished
Correct 1.00
Question 14
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Original message, before being transformed, is
Select one:
a. plaintext
b. Cipher text
c. None of the optuion mention
d. decryption
Feedback
The correct answer is: plaintext
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:44 Saved: plaintext Answer saved
3
6/08/21, 10:54 Attempt finished
Question 15
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Marks
Correct 1.00
Answer saved
Edit question
Question text
Cryptography, a word with Greek origins, means
Select one:
a. Closed Writing
b. Open Writing
c. Secret Writing
d. Corrupting Data
Feedback
The correct answer is: Secret Writing
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:44 Saved: Secret Writing
Answer saved
3
6/08/21, 10:54 Attempt finished
Correct 1.00
Question 16
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The ______is code that recognizes some special sequence of input or is triggered by being run from
a certain user ID of by unlikely sequence of events.
Select one:
a. Trojan horse
b. Virus
c. Logic Bomb
d. Trap doors
Feedback
The correct answer is: Trap doors
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:47 Saved: Trap doors
Answer saved
3
6/08/21, 10:54 Attempt finished
Correct 1.00
Question 17
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Which of the following is independent malicious program that need not any host program?
Select one:
a. Trap doors
b. Worm
c. Virus
d. Trojan horse
Feedback
The correct answer is: Worm
Comments
Make comment or override mark
Response history
Step
Time
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:47 Saved: Worm
3
6/08/21, 10:54 Attempt finished
Question 18
Correct
Action State
Marks
Answer saved
Correct 1.00
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Heart of Data Encryption Standard (DES), is the
Select one:
a. DES function
b. Encryption
c. Cipher
d. Rounds
Feedback
The correct answer is: DES function
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:47 Saved: DES function
Answer saved
3
6/08/21, 10:54 Attempt finished
Correct 1.00
Question 19
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
_____________ are networks that connect people within a company to each other and to the
company network.
Select one:
a. Intranets
b. Bitstreams
c. Extranets
d. Internets
Feedback
The correct answer is: Intranets
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:47 Saved: Intranets
Answer saved
3
6/08/21, 10:54 Attempt finished
Correct 1.00
Question 20
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Operating systems software is primarily aimed at supporting business users in their tasks.
Select one:
a. True
b. False
Feedback
The correct answer is: False
Comments
Make comment or override mark
Response history
Step
Time
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:47 Saved: False
3
6/08/21, 10:54 Attempt finished
Question 21
Incorrect
Action State
Marks
Answer saved
Correct 1.00
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Advantage of CRM
Select one:
a. Cost of the Software.
b. All of the option mentioned.
c. Customization of the Business.
d. Improve overall relationship with customer.
Feedback
The correct answer is: Improve overall relationship with customer.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:54 Saved: All of the option mentioned.
Answer saved
3
6/08/21, 10:54 Attempt finished
0.00
Question 22
Incorrect
Mark 0.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The Internet has:
Select one:
a. empowered businesses only.
b. empowered intermediaries only.
c. empowered consumers and businesses alike.
d. empowered consumers only.
Incorrect
Feedback
The correct answer is: empowered consumers and businesses alike.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:54 Saved: empowered consumers only.
Answer saved
3
6/08/21, 10:54 Attempt finished
0.00
Incorrect
Question 23
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Delivering products and services that push is called
Select one:
a. All of the option mention
b. Service Excellence
c. Operational Excellence
d. Continuous Excellence
Feedback
The correct answer is: Continuous Excellence
Comments
Make comment or override mark
Response history
Step
Time
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:54 Saved: Continuous Excellence
3
6/08/21, 10:54 Attempt finished
Question 24
Action State
Marks
Answer saved
Correct 1.00
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Delivering what customers want with hassle-free service and superior value is called
Select one:
a. Service Excellence
b. Operational Excellence
c. Continuous Excellence
d. All of the option mention
Feedback
The correct answer is: Service Excellence
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:54 Saved: Service Excellence
3
6/08/21, 10:54 Attempt finished
Answer saved
Correct 1.00
Question 25
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Which of the following is not one of the benefits of e-commerce to sellers?
Select one:
a. E-commerce offers greater flexibility in meeting customer needs.
b. E-commerce can help to reduce costs.
c. E-commerce increases the net cost per contact.
d. E-commerce is a powerful tool for customer relationship building.
Feedback
The correct answer is: E-commerce increases the net cost per contact.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
6/08/21, 10:29 Started Not yet answered
2
6/08/21, 10:54 Saved: E-commerce increases the net cost per contact. Answer saved
3
6/08/21, 10:54 Attempt finished
Correct 1.00
Finish review
Jump to...
Jump to...
Skip <span id="mod_quiz_navblock_title">Quiz navigation</span>
Quiz navigation
Show one page at a time
Finish review
Moodle Docs for this page
You are logged in as Thokozani Nkosi (Log out)
2021MCM522B
Get the mobile app
Skip to main content
RICHFIELD
Search Modules
Resources
Bursaries and Graduate Programme
39
Thokozani Nkosi
M-COMMERCE 522(2021MCM522B)
Dashboard
Courses
HET
INFORMATION_TECHNOLOGY_-_RGIT
M-COMMERCE 522(2021MCM522B)
Welcome to M - COMMERCE 522
2021- Assignment 1 (Multiple-choice - Online)
Picture of OLEFILE BENEDICT SEHOLE
Started on
State
OLEFILE BENEDICT SEHOLE
Wednesday, 18 August 2021, 7:34 PM
Finished
Completed on Wednesday, 18 August 2021, 8:00 PM
Time taken
25 mins 25 secs
Marks 25.00/25.00
Grade 100.00 out of 100.00
Question 1
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
____________ is defined as two or more parties exchanging products, services, and/or information
using network technology.
Select one:
a. E-commerce
b. Netware
c. A network operating system
d. A neural network
Feedback
The correct answer is: E-commerce
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:41
Saved: E-commerce
Answer saved
3
18/08/21, 20:00
Attempt finished
Correct 1.00
Question 2
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
A code of ethics should address all of the following EXCEPT for:
Select one:
a. permission to record personal information.
b. policy on privacy.
c. intended use of recorded personal information.
d. scalability.
Feedback
The correct answer is: scalability.
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:41
Saved: scalability.
Answer saved
3
18/08/21, 20:00
Attempt finished
Correct 1.00
Question 3
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Marks
Question text
All of the following are advantages of using an intranet EXCEPT:
Select one:
a. open standards.
b. reduced hardware and software costs.
c. security restrictions so employees cannot access the company network from home.
d. cross-platform capability.
Feedback
The correct answer is: security restrictions so employees cannot access the company network from
home.
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
18/08/21, 19:34
Marks
Started Not yet answered
2
18/08/21, 19:41
Saved: security restrictions so employees cannot access the
company network from home. Answer saved
3
18/08/21, 20:00
Attempt finished
Correct 1.00
Question 4
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
____________ keeps unauthorized Internet users from accessing a computer.
Select one:
a. Firewalls
b. Ethernet
c. Middleware
d. TCP/IP
Feedback
The correct answer is: Firewalls
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:41
Saved: Firewalls Answer saved
3
18/08/21, 20:00
Attempt finished
Correct 1.00
Question 5
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
A ____________ is an essential component of an intranet.
Select one:
a. CRM
b. LAN with a minimum of ten PCs
c. computer with server software
d. PDA
Feedback
The correct answer is: computer with server software
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:41
Saved: computer with server software Answer saved
3
18/08/21, 20:00
Attempt finished
Question 6
Correct
Mark 1.00 out of 1.00
Marks
Correct 1.00
Not flaggedFlag question
Edit question
Question text
Most intranets use ____________ topology to connect the nodes of the network.
Select one:
a. fiber optic
b. satellite
c. wireless
d. Ethernet
Feedback
The correct answer is: Ethernet
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:44
Saved: Ethernet Answer saved
3
18/08/21, 20:00
Attempt finished
Correct 1.00
Question 7
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
All of the following are typical uses of an intranet EXCEPT:
Select one:
a. posting changes to company policies.
b. allowing a group of employees to work on the same document.
c. allowing customers to purchase products through the Web.
d. posting the employee handbook.
Feedback
The correct answer is: allowing customers to purchase products through the Web.
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:44
Answer saved
Saved: allowing customers to purchase products through the Web.
3
18/08/21, 20:00
Attempt finished
Correct 1.00
Question 8
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The ____________ requires health care providers and hospitals to protect the confidentiality of an
individual’s health information.
Select one:
a. National Infrastructure Protection Center
b. Health Insurance Portability and Accountability Act
c. Intellectual Property Act
d. ACM Code of Ethics
Feedback
The correct answer is: Health Insurance Portability and Accountability Act
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:44
Answer saved
Saved: Health Insurance Portability and Accountability Act
3
18/08/21, 20:00
Attempt finished
Correct 1.00
Question 9
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
____________ founded Amazon.com.
Select one:
a. Jeff Bezos
b. Bill Gates
c. Alan Kay
d. Andy Grove
Feedback
The correct answer is: Jeff Bezos
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:44
Saved: Jeff Bezos
Answer saved
3
18/08/21, 20:00
Attempt finished
Correct 1.00
Question 10
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
An encryption algorithm transforms plaintext into
Select one:
a. Empty Text
b. Plain Text
c. Simple Text
d. Cipher text
Feedback
The correct answer is: Cipher text
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:44
Saved: Cipher text
Answer saved
3
18/08/21, 20:00
Attempt finished
Correct 1.00
Question 11
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Which of the following malicious program do not replicate automatically?
Select one:
a. Trojan Horse
b. Zombie
c. Worm
d. Virus
Feedback
The correct answer is: Trojan Horse
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:48
Saved: Trojan Horse
Answer saved
3
18/08/21, 20:00
Attempt finished
Correct 1.00
Question 12
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Cipher feedback (CFB) mode was created for those situations in which we need to send or receive r
bits of
Select one:
a. Data
b. Pixels
c. Encryption
d. Frames
Feedback
The correct answer is: Data
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:48
Saved: Data
3
18/08/21, 20:00
Attempt finished
Answer saved
Correct 1.00
Question 13
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
In computer security, _________ means that computer system assets can be modified only by
authorized parities.
Select one:
a. Integrity
b. Availability
c. Authenticity
d. Confidentiality
Feedback
The correct answer is: Integrity
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:48
Saved: Integrity Answer saved
3
18/08/21, 20:00
Attempt finished
Correct 1.00
Question 14
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
In symmetric-key cryptography, key locks and unlocks box is
Select one:
a. same
b. shared
c. private
d. public
Feedback
The correct answer is: same
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:48
Saved: same
3
18/08/21, 20:00
Attempt finished
Answer saved
Correct 1.00
Question 15
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Cryptography, a word with Greek origins, means
Select one:
a. Closed Writing
b. Corrupting Data
c. Secret Writing
d. Open Writing
Feedback
The correct answer is: Secret Writing
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:48
Saved: Secret Writing
Answer saved
3
18/08/21, 20:00
Attempt finished
Correct 1.00
Question 16
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Marks
The _______is code embedded in some legitimate program that is set to “explode” when certain
conditions are met.
Select one:
a. Virus
b. Logic Bomb
c. Trap doors
d. Trojan horse
Feedback
The correct answer is: Logic Bomb
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:54
Saved: Logic Bomb
Answer saved
3
18/08/21, 20:00
Attempt finished
Correct 1.00
Question 17
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Heart of Data Encryption Standard (DES), is the
Select one:
a. Rounds
b. Cipher
c. DES function
d. Encryption
Feedback
The correct answer is: DES function
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:54
Saved: DES function
Answer saved
3
18/08/21, 20:00
Attempt finished
Correct 1.00
Question 18
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Which of the following is independent malicious program that need not any host program?
Select one:
a. Worm
b. Virus
c. Trojan horse
d. Trap doors
Feedback
The correct answer is: Worm
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:54
Saved: Worm
3
18/08/21, 20:00
Attempt finished
Question 19
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Marks
Answer saved
Correct 1.00
Edit question
Question text
_____________ are networks that connect people within a company to each other and to the
company network.
Select one:
a. Bitstreams
b. Extranets
c. Intranets
d. Internets
Feedback
The correct answer is: Intranets
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:54
Saved: Intranets
Answer saved
3
18/08/21, 20:00
Attempt finished
Correct 1.00
Question 20
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Operating systems software is primarily aimed at supporting business users in their tasks.
Select one:
a. True
b. False
Feedback
The correct answer is: False
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:54
Saved: False
3
18/08/21, 20:00
Attempt finished
Answer saved
Correct 1.00
Question 21
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Which of the following is not relevant to marketing via the Internet?
Select one:
a. Click-and-mortar marketing.
b. Brick-and-mortar marketing.
c. Mobile marketing.
d. Viral marketing.
Feedback
The correct answer is: Brick-and-mortar marketing.
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:59
Saved: Brick-and-mortar marketing.
3
18/08/21, 20:00
Attempt finished
Question 22
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Marks
Correct 1.00
Answer saved
Edit question
Question text
Advantage of CRM
Select one:
a. Improve overall relationship with customer.
b. Customization of the Business.
c. Cost of the Software.
d. All of the option mentioned.
Feedback
The correct answer is: Improve overall relationship with customer.
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
18/08/21, 19:34
Marks
Started Not yet answered
2
18/08/21, 19:59
saved
Saved: Improve overall relationship with customer.
3
Attempt finished
18/08/21, 20:00
Answer
Correct 1.00
Question 23
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
The type of website that engages consumers in interactions that will move them closer to a direct
purchase is known as a ______________ website.
Select one:
a. interactive
b. marketing
c. corporate
d. customer service
Feedback
The correct answer is: interactive
Comments
Make comment or override mark
Response history
Step
Time
Action State
Marks
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:59
Saved: interactive
Answer saved
3
18/08/21, 20:00
Attempt finished
Correct 1.00
Question 24
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Which of the following is not one of the reasons that dot-com companies failed?
Select one:
a. Some companies found they lacked well-designed distribution systems.
b. Many relied too heavily on hype instead of developing sound marketing strategies.
c. Some rushed into the market without proper research or planning.
d. Many companies overestimated the size of the market.
Feedback
The correct answer is: Many companies overestimated the size of the market.
Comments
Make comment or override mark
Response history
Step
Time
1
18/08/21, 19:34
Started Not yet answered
2
18/08/21, 19:59
Answer saved
Saved: Many companies overestimated the size of the market.
3
18/08/21, 20:00
Attempt finished
Question 25
Action State
Marks
Correct 1.00
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Edit question
Question text
Which of the following is not one of the benefits of e-commerce to sellers?
Select one:
a. E-commerce offers greater flexibility in meeting customer needs.
b. E-commerce is a powerful tool for customer relationship building.
c. E-commerce can help to reduce costs.
d. E-commerce increases the net cost per contact.
Feedback
The correct answer is: E-commerce increases the net cost per contact.
Comments
Make comment or override mark
Response history
Step
Time
Action State
1
18/08/21, 19:34
Marks
Started Not yet answered
2
18/08/21, 19:59
saved
Saved: E-commerce increases the net cost per contact. Answer
3
Attempt finished
18/08/21, 20:00
Correct 1.00
Finish review
Jump to...
Jump to...
Skip <span id="mod_quiz_navblock_title">Quiz navigation</span>
Quiz navigation
Show one page at a time
Finish review
Moodle Docs for this page
You are logged in as Thokozani Nkosi (Log out)
2021MCM522B
Get the mobile app
Related documents
Download