E-Commerce Midterm Examination
E-Commerce Midterm Examination
E-Commerce Midterm Examination
E-COMMERCE
MIDTERM EXAMINATION
5. B2C commerce
a. includes services such as legal advice
b. means only shopping for physical goods
c. means only customers should approach customers to sell
d. means only customers should approach business to buy
9. Which of the following would best explain why certain terms in an online
agreement might be found to be of NO LEGAL EFFECT?
a. the terms are boilerplate provisions
b. the terms are displayed in red font, rather than black
c. the terms cannot be stored electronically
d. the terms are not accessible to the customer until after the transaction is
complete
e. none of the above
10. Bread and Butter Inc has decided to begin retailing its products over the internet.
It is particularly worried that errors generated by its automated computer system may
result in filling under-priced orders. The company has retained you for advice on this
issue. Accordingly, you will advise them to design their web site so that
a. it creates invitations to treat.
b. it extends offers to purchase.
c. it encourages customers to accept offers only after reading all terms and
conditions.
d. it eliminates consideration.
e. none of the above
11. Which of the following may serve an authenticating function with respect to
electronic documents?
a. an electronic signature
b. a certification authority
c. public key infrastructure
d. cryptography
e. all of the above
12. Which of the following is used to verify the identity of the person purporting to
provide an electronic signature?
a. file formatting
b. a digital certificate
c. a court order
d. information security
e. digital watermarking
13. When you arrived at work this morning, there was a memo on your desk asking
you to draft a report that outlines how a public key infrastructure might be implemented
in the company’s business practices. Although you know that PKI can be used for both
encrypting messages and verifying electronic signatures, you are confused as to their
respective purposes. After conducting further research, which of the following will you
find to be TRUE?
a. decrypting a message requires the sender to use her public key, while
verifying her electronic signature requires the recipient to use his private
key
b. decrypting a message requires the recipient to use her private key, while
verifying her electronic signature requires the use of her public key
c. decrypting a message requires the sender to use her private key, while
verifying her electronic signature requires the use of her public key
Chapter 17 – Electronic Commerce
333
d. decrypting a message requires the recipient to use her public key, while
verifying her electronic signature requires the use of her private key
e. decrypting and encryption are one and the same
14. Which of the following security threats may be achieved by an online intruder?
2
a. dilution of corporate brands
b. causing system failures
c. stealing information-based assets
d. scaring off customers
e. all of the above
15. After your company’s web site is defaced by a hacker, you are assigned the task
of creating a policy aimed at avoiding similar attacks in the future. Because it has been
determined that the attack was internal, you have chosen to focus on deterring company
employees from such behaviour. Which of the following issues will you be sure to
include in the policy in order to achieve your goal?
a. use of confidential information
b. email use
c. computer mischief
d. monitoring employee communications
e. intercepting employee communications
16. Which of the following kinds of online behaviour might potentially attract
liability?
a. posting a defamatory remark
b. distributing materials subject to copyright
c. disclosing personal information
d. trademark infringement
e. all of the above
17. You have recently gone into business as a consultant, specializing in the area of
online consumer protection. As part of your services, you offer a seminar on how to
avoid fraudulent transactions. Which of the following practices will you immediately
suggest to your clients?
a. transacting as a mere conduit
b. adopting authentication procedures
c. utilizing an open-access network
d. implementing electronic contracting and instantaneous communication
e. all of the above
18. You have recently gone into business as a consultant, specializing in the area of
online consumer protection. As part of your services, you offer a seminar on how to
avoid online consumer complaints. Which of the following practices will you
immediately suggest to your clients?
a. be sure your online contracts include extensive use of specialized legal
terminology
b. weave promotional materials into the terms and conditions of sale
c. be sure to accurately describe all online goods and services
d. dispense with confirmation procedures
e. promise not to collect any personal information.
19. According to consumer protection principles, when should your business provide
a refund for a completed transaction?
a. when the purchase was in fact made by a third party stranger
b. when the transaction was the result of a keystroke error
c. when the customer has entered into the transaction without adequate
information
d. when the customer mistakenly entered into the transaction and has not yet
enjoyed a material benefit
e. all of the above
20. M!ke Internet Inc offers an internet connection and an email account for $9 per
month. The company does not retail goods, nor does it provide a forum for subscriber
auctions. The company will not disclose personal information about its customers unless
required to do so by law. Which of the following is most likely TRUE?
a. M!ke is an internet access provider
b. M!ke is an online service provider
c. M!ke is an online intermediary
d. M!ke is unlikely to be seen as a publisher of its customers’
communications
e. all of the above
Test II. Essay: Please explain each laws that govern the online business in the Philippines.
Even if your business is only found online or you have an online presence, there are four Philippine laws that still govern
over your actions. While there is a lot of technicality with regard to online transactions, the rule of thumb is that if you are
based and operating in the Philippines and your IP address is in the Philippines, then you are covered by these laws.
To avoid any inconvenience on your business transactions, these are the Philippine laws, rules, and regulations that you
must follow:
3
1. Republic Act No. 8792 or the Electronic Commerce Act of 2000
2. Implementing Rules and Regulations (IRR) of Republic Act No. 8792
3. DTI Department Administrative Order No. 8 – “Prescribing Guidelines for the Protection of Personal Data in
Information and Communications System in the Private Sector”
4. DTI-DOH-DA Joint Department Administrative Order (JDAO) No. 1, entitled Rules and Regulations for Consumer
Protection in a Transaction Covered by the Consumer Act of the Philippines