11. The most common type of Internet crime according to the IC3 is ______________.
Credit card fraud
Check fraud
Non-delivery
Auction fraud
Correct answer: (D) Auction fraud
12. When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______________.
phishing
pharming
a Denial of Service (DoS) attack
spoofing
Correct answer: (C) a Denial of Service (DoS) attack
13. A security plan begins with a(n) is ______________.
security policy
risk assessment
implementation plan
security organization
Correct answer: (B) risk assessment
14. ______________ influence the behavior of others through their personality, skills, or other factors.
Opinion leaders
Direct reference groups
Indirect reference groups
Lifestyle groups
Correct answer: (A) Opinion leaders
15. A(n) ______________ represents data as two-dimensional tables with records organized in rows and attributes in columns.
database management system
data warehouse
SQL query
relational database
Correct answer: (D) relational database
16. Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called______________.
versioning
bundling.
transactive content
price discrimination
Correct answer: (A) versioning
17. Which of the following represents a limiting factor for the growth of e-commerce?
Persistent cultural attraction of physical markets and traditional shopping experiences
Inadequate selection of goods compared to physical marketplaces.
E-commerce lacks the convenience of other methods of transacting business
The potential audience for e-commerce is too low to support it as a widespread method of commerce
Correct answer: (A) Persistent cultural attraction of physical markets and traditional shopping experiences
18. Which of the following is a measure of the percentage of purchasers who return to a Web site within a year?
loyalty
reach
recency
unique visitors
Correct answer: (A) loyalty
19. Which of the following statements about privacy is true?
It is a moral right to be left alone
Only corporations and government need to be concerned about it
It has only just recently become a concern
It is most easily obtained on the Internet
Correct answer: (A) It is a moral right to be left alone
20. The redirection of traffic from a legitimate site to an infringing site is called ______________.