BUIS 463 Week of 12/04/17 Circle the correct answer to each question. 1) To impl
ID: 384080 • Letter: B
Question
BUIS 463 Week of 12/04/17 Circle the correct answer to each question. 1) To implement a successful electronic commerce web site the project manager must include the following in the project plan: a) Change Management b) Crowd Funding c) RFID d) Bar Coding 2) To be successful a payment system for electronic commerce must accept a) Digital Cash b) Personal Checks c) ATM payments d) Credit Cards 3) The "man in the middle" refers to: a) A player's position on a basketball court b) An Internet integrity violation c) A phishing attack d) A project manager caught in the middle of a debate between two EC site programmers 4) Middleware is software that connects: a) KM, SCM and CRM b) Websphere to XML c) Information about sales and inventory shipments to accounting and inventory management software d) All of the above 5) The World Wide Web's design is based on a) Client/server architecture b) Load balancing architecture c) Linus and Unix d) NginxExplanation / Answer
1. Change Management (It’s your playbook for what is going to happen if someone suggests that the project should be doing something different to what is currently planned and a good way to avoid project failure)
2. Credit Cards
3. A Phishing Attack (Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication MAN IN THE MIDDLE ATTACK also has the same purpose to steal information and make the actual parties believe as if they are talking to each other. But in true essence, they are being controlled by the attacker)
4. All of above (The primary purpose of Middleware is to connect two/more applications so that communication between them becomes easy. It primarily passes data between them after processing of data.)
5. Client/Server Architecture (The Web is based on a client-server architecture, meaning that protocols take the form of a request for information and a response with information. A client does not share any of its resources, but requests a server's content or service function. Clients therefore initiate communication sessions with servers which await incoming requests.)
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.