(^650) Answers
- There are risks in any business venture, including e-commerce. Risks associated
with e-commerce include increased competition, fraudulent transactions, and
security issues. - SSL (Secure Sockets Layer) is a protocol that allows data to be privately exchanged
over public networks such as the Internet. An online shopper can check the
following to determine if SSL is being used:
● The https protocol will display in the browser address bar instead of http.
● A lock icon will display in the status bar area of the browser window. If this
icon is clicked, information about the digital certificate and encryption level
being used will display.
Checkpoint 12.2
- Three payment models commonly used on the Web are cash, check, and credit.
Credit is the most popular. Consumers are used to using credit cards. Processes
used for accepting credit cards at stores are easily adapted to online use. - Answers will vary. People make online purchases for many reasons including the
following: convenience, lower cost, and ease of shipping. If you did not check for
SSL the last time you purchased an item on the Web, most likely, you’ll look for
it in the future. - E-commerce solutions include instant storefronts, off-the-shelf shopping cart soft-
ware that you or your Web host installs, and custom solutions. The easiest entry
to e-commerce is an instant storefront. Although this does not provide the most
flexibility, you can get a store up and running in an afternoon. An easy semi-
custom solution would be to create your own Web site but use PayPal to process
the shopping cart and credit card transactions.
Review Questions
- c
- a
- b
- c
- b
- a
- b
- a
- d
10. b
11. symmetric encryption
12. EDI
13. asymmetric key
14. SSL
15. The Web site developers may use
an automatic translation program
or other customized Web transla-
tion service.
Chapter 13
Checkpoint 13.1
- A search engine is programmatically driven. Individuals submit a form to request
that the search engine’s robot program visits their Web site. The robot (sometimes
called a spider) program “walks” the Web site, following links. Based on the pro-