BCIS 4720 Exam #1 Quiz Questions
During which period of time did the Institutionalization phase of Internet development take place? 1975-1995 1950-1960 1995 to the present 1961-1974
1975-1995
The world's online population was estimated to be around ________ in 2020. 400 billion 400 million 4 billion 40 billion
4 billion
Which of the following statements about cloud computing is not true? A public cloud is typically used by companies with stringent privacy and security requirements. Dropbox is an example of a public cloud. A private cloud may be hosted internally or externally. Hybrid clouds offer both public and private cloud options.
A public cloud is typically used by companies with stringent privacy and security requirements.
A template test is a form of which type of testing? system testing A/B testing unit testing acceptance testing
A/B testing
Which of the following uses a subscription revenue model for books? Pandora Spotify eHarmony Amazon Kindle Unlimited
Amazon Kindle Unlimited
________ is the ability to identify the person or entity with whom you are dealing on the Internet. Nonrepudiation Authenticity Integrity Availability
Authenticity
________ is the ability to ensure that an e-commerce site continues to function as intended. Integrity Authenticity Availability Nonrepudiation
Availability
Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet? FTP HTTP SMTP BGP
BGP
Which of the following uses a subscription-based sales revenue model? MyPoints Dollar Shave Club eBay Yahoo
Dollar Shave Club
All of the following can be considered a direct competitor of Priceline except: Travelocity. ESPN. Expedia. Orbitz.
ESPN.
A multi-tier architecture includes a web and database server. True False
False
The Internet has shown similar growth patterns as other electronic technologies of the past. True False
False
Which of the following is not a basic type of cloud computing service? FiOS SaaS PaaS IaaS
FiOS
________ is the ability to ensure that e-commerce participants do not deny their online actions. Integrity Authenticity Availability Nonrepudiation
Nonrepudiation
Which of the following is not a major business trend in e-commerce in 2020-2021? Retail e-commerce revenues exceed B2B e-commerce revenues for the first time. The mobile app ecosystem continues to grow. Social e-commerce continues to grow. On-demand service companies garner multibillion-dollar valuations.
Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.
Which of the following protocols is used to send mail to a server? HTTP SMTP FTP SSL
SMTP
All of the following statements about e-commerce in the United States in 2020 are true except: Social e-commerce generated more revenue than mobile e-commerce. Retail e-commerce and m-commerce grew as a result of the Covid-19 pandemic. On-demand service firms fueled the growth of local e-commerce. Mobile advertising accounted for almost 70% of all digital advertising spending.
Social e-commerce generated more revenue than mobile e-commerce.
Which of the following is the core communications protocol for the Internet? Telnet FTP TLS TCP/IP
TCP/IP
Which of the following is rarely used today, due to security concerns. SFTP Telnet TCP TLS
Telnet
Which of the following statements about Foursquare is not true? A. Foursquare characterizes itself as a leader on privacy issues. B. Foursquare initially struggled to find profitability. The growth in C. Foursquare's revenue has been driven primarily by significant increases in the numbers of users of its Swarm app. Foursquare is one of the Internet's largest location data tracking firms.
The growth in Foursquare's revenue has been driven primarily by significant increases in the numbers of users of its Swarm app.
Which of the following is a utility program that allows you to track the path of a message sent from a client computer to a remote computer on the Internet? Ping Telnet IMAP Tracert
Tracert
Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use. True False
True
WannaCry is an example of ransomware. True False
True
All of the following can be considered examples of the market creator business model except: Uber. Twitter. eBay. Priceline.
Twitter.
Which of the following verifies that the business objectives of the system are in fact working? system testing implementation testing acceptance testing unit testing
acceptance testing
The Internet Layer of TCP/IP is responsible for which of the following? placing packets on and receiving them from the network medium addressing, packaging, and routing messages providing communication with the application by acknowledging and sequencing the packets to and from the application providing a variety of applications with the ability to access the services of the lower layers
addressing, packaging, and routing messages
The process of comparing a website with that of its competitors in terms of response speed, quality of layout, and design is known as: split testing. funnel testing. benchmarking. system testing.
benchmarking.
According to Ponemon Institute's 2019 survey, which of the following was not among the causes of the costliest cybercrimes? denial of service malicious insiders botnets web-based attacks
botnets
Which of the following is an unfair competitive advantage? access to global markets superior technology lower product prices brand name
brand name
Which element of the business model refers to the presence of substitute products in the market? competitive advantage value proposition competitive environment market opportunity
competitive environment
The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade. decreased slightly increased dramatically increased moderately decreased dramatically
decreased dramatically
What are the two most important management challenges in building a successful e-commerce presence? building a team with the right skill sets and closely managing the development process identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives having an accurate understanding of your business environment and an achievable business plan
developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives
Which of the following can be considered synonymous with the term e-commerce? the Internet e-business the Web digital commerce
digital commerce
Which of the following best defines e-commerce? the use of digital technologies in a firm's daily activities the digital enablement of transactions and processes within an organization any electronically based organizational activity that supports a firm's market exchanges digitally enabled commercial transactions between and among organizations and individuals
digitally enabled commercial transactions between and among organizations and individuals
Malware that comes with a downloaded file requested by a user is called a: drive-by download. backdoor. PUP. Trojan horse.
drive-by download.
Which of the following is another name for a revenue model? business strategy financial statements financial model business model
financial model
Most of the time required to maintain an e-commerce site is spent on: responding to emergency situations. changes in reports, data files, and links to backend databases. debugging code. general administration and making changes and enhancements to the system.
general administration and making changes and enhancements to the system.
Which of the following is not a unique feature of e-commerce technology? interactivity social technology richness information asymmetry
information asymmetry
Which of the following is not a key element of an elevator pitch? market opportunity exit strategy legal structure growth metrics
legal structure
Which of the following are the two main components of a systems design? logical design and physical design behavioral design and technological design front-end systems and back-end systems business objectives and technology requirements
logical design and physical design
The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called: packet switching. routing. hyperlinking. transporting.
packet switching.
Which of the following details the actual hardware components to be used in a system? physical design system functionalities plan architecture plan logical design
physical design
Confidentiality is sometimes confused with: privacy. authenticity. nonrepudiation. integrity.
privacy.
Which of the following is a set of rules for transferring data? IP address packet router protocol
protocol
The Transport Layer of TCP/IP is responsible for which of the following? providing a variety of applications with the ability to access the services of the lower layers providing communication with the application by acknowledging and sequencing the packets to and from the application placing packets on and receiving them from the network medium addressing, packaging, and routing messages
providing communication with the application by acknowledging and sequencing the packets to and from the application
Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text? information density personalization richness ubiquity
richness
Which of the following are central directories that list all domain names currently in use for specific domains? root servers Web servers DNS servers client servers
root servers
Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations? packet servers routers Web servers IP servers
routers
Which of the following is the best definition of transaction cost? the expense of changing national or regional prices the cost of participating in a market the cost merchants pay to bring their goods to market the cost of finding suitable products in the market
the cost of participating in a market
First movers often fail because: they lack complementary resources needed to sustain their advantages. they are operating in a perfect market. they fail to leverage their competitive assets. their competitive advantage is unfair.
they lack complementary resources needed to sustain their advantages.
Which of the following was the original purpose of the Internet? to enable government agencies to track civilian communications to develop a military communications system that could withstand nuclear war to link large mainframe computers on different college campuses to provide a network that would allow businesses to connect with consumers
to link large mainframe computers on different college campuses
Which of the following involves testing a site's program modules one at a time? acceptance testing unit testing system testing implementation testing
unit testing
Which element of the business model addresses what a firm provides that other firms do not and cannot? competitive advantage value proposition competitive environment market strategy
value proposition
Which of the following is an example of an online privacy violation? your e-mail being altered by a hacker your online purchasing history being sold to other merchants without your consent your e-mail being read by a hacker your computer being used as part of a botnet
your online purchasing history being sold to other merchants without your consent