E-Business Final Exam
An IPv4 address is expressed as a:
32-bit number that appears as a series of four separate numbers separated by periods.
In the United States, about ________ of Internet traffic now occurs over Internet Protocol version 6 (IPv6).
40%
Which of the following statements about blockchain is not true?
A blockchain system is inherently centralized.
Which of the following situations would not qualify for the fair use exception to U.S. copyright law?
A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.
Which of the following is a server-side technique that detects the attributes of the device making the request, and using predefined templates, loads a version of a site optimized for the device?
AWD
________ are a kind of middleware software that provides the glue connecting traditional corporate systems to the customer as well as all the functionality needed to conduct e-commerce.
Application servers
Which of the following cases has chipped away at the Digital Millennium Copyright Act (DMCA) safe harbor protection?
BMG Rights Management v. Cox Communications
A ________ is a repository of customer information that records all contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.
CRM system
Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?
Choice/Consent
Which of the following is a core Fair Information Practices (FIP) principle?
Choice/Consent
Which of the following used a video coupled with an interactive game for smartphone users to increase awareness of its brand?
Domino's Pizza
All of the following are examples of an open-source web content management system (WCMS) except:
Dreamweaver CC.
Which of the following is not one of the basic technological foundations of the Internet?
FTP
Which of the following Facebook marketing features did Tonal use to motivate and interact with customers?
Facebook Groups
Which of the following cannot be used to retrieve objects from a database?
HTML
________ is an open-source database that can store and analyze both structured and unstructured data.
Hadoop
Which of the following coordinates the Internet's system of unique identifiers?
ICANN
What is the first step in analyzing an ethical dilemma?
Identify and describe the facts.
Which of the following is not a characteristic of a nearly perfect competitive market?
It is highly regulated.
Applications for Android operating system-based smartphones are typically written in which of the following?
Java
Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?
Notice/Awareness
Which of the following is not true about on-demand service firms?
On-demand service firms are a totally new phenomenon without precedent in the history of e-commerce.
A browser parasite is an example of which of the following?
PUP
What is the first step in developing an e-commerce security plan?
Perform a risk assessment.
Which of the following protocols does Facebook use for more than 75% of its Internet traffic?
QUIC
Which of the following is a simple but powerful method for describing a firm's strengths and weaknesses?
SWOT
The concept of a "sprint" is related to which of the following development methodologies?
Scrum
On-demand service firms are a totally new phenomenon without precedent in the history of e-commerce.
SimplyHired
Which ethical principle states that if an action cannot be taken repeatedly, then it's not right to take at all?
Slippery Slope
Google uses which of the following to build a global database of wireless access points and their geographic locations?
Street View cars
Which of the following is a programming language introduced by Apple specifically for developing iOS applications?
Swift
Which of the following is the core communications protocol for the Internet?
TCP/IP
Which of the following statements is not true?
The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.
________ was the first truly large-scale digitally enabled transaction system in the B2C arena.
The French Minitel
Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?
The Golden Rule
TCP/IP operates in which layer of Internet architecture?
Transport Services and Representation Standards layer
Which of the following is most similar to Pinterest?
Tumblr
Which of the following Twitter marketing tools involves a coupon or other promotional offer that appears in users' Twitter timeline?
Twitter Card
Which of the following is at the very heart of a company's business model?
Value proposition
The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:
VoIP
Which of the following standards provide for high-speed short-range Wi-Fi?
WiGig
Which of the following is the top app in terms of percentage reach?
YouTube
All of the following are basic functionality provided by web servers except:
a shopping cart.
How much time a month does the average U.S. adult spend on TikTok?
about 22 hours
Where does TLS operate within TCP/IP?
between the Internet Layer and the Transport Layer
Face ID is an example of which of the following?
biometrics
An intrusion detection system can perform all of the following functions except:
blocking suspicious activity.
Which of the following measures the percentage of e-mails that could not be delivered?
bounce-back rate
All of the following are challenges for catalog merchants except:
building sophisticated order entry and fulfillment systems.
Advantages of dynamic page generation include all of the following except:
client-side execution of programming.
Which of the following is the most important tool in establishing a relationship with the customer?
company website
Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:
cybersquatting
Which of the following best defines e-commerce?
digitally enabled commercial transactions between and among organizations and individuals
Innovative entrepreneurs and their business firms that destroy existing business models are referred to as:
disruptors
Which of the following basic ethical concepts plays an important role in defining privacy?
due process
What is another name for pro forma earnings?
earnings before income taxes, depreciation, and amortization (EBITDA)
If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:
enable individual customization of the product by consumers.
Which of the following involves using a variety of tools to encourage users to interact with content and brand?
engagement
All of the following are advantages of online retail except:
faster delivery of goods.
Which of the following is not a main factor in determining the overall demand on an e-commerce site?
file sizes of web pages being served
A strategy designed to compete within a narrow market or product segment is called a ________ strategy.
focus
Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service?
freemium strategy
The California Consumer Privacy Act (CCPA) and the California Privacy Rights and Enforcement Act (CPRA) together do all of the following except:
give residents the right to prevent government access to their personal information.
SupplyOn is an example of a(n):
industry consortium
Which of the followingrefers to any disparity in relevant market information among parties in a transaction?
information asymmetry
Which dimensions of security is spoofing a threat to?
integrity and authenticity
All of the following statements about patents are true except:
it is more difficult to obtain a copyright than it is to obtain a patent.
Which of the following typically includes a data flow diagram to describe the flow of information for an e-commerce site?
logical design
The incremental cost of building the next unit of a good is called the:
marginal cost.
Building which of the following is the least expensive path to creating a mobile presence?
mobile website
Which of the following has the second-highest share of online retail sales?
omnichannel merchants
PayPal is an example of which of the following types of payment system?
online stored value payment system
MySQL is which of the following?
open-source database software
All of the following are used for authentication except:
packet filters.
Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for a period of time, typically 20 years?
patent law
View-to-cart ratio is a measure of the:
percentage of views that lead to an add-to-cart action.
Acquisition rate is a measure of the:
percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.
All of the following are strategic factors that pertain specifically to a firm and its related businesses except:
power of customers.
Confidentiality is sometimes confused with:
privacy
Asymmetric key cryptography is also known as:
public key cryptography.
Which of the following is another term for amplification?
reach
A firm's ________ describes how a firm will produce a superior return on invested capital.
revenue model
All of the following are forms of display ads except:
rich media ads.
Which of the following refers to the number of interactions among members of a group and reflects the "connectedness" of the group, even if these connections are forced on users?
social density
Which of the following types of attacks resulted in a data breach at the online trading firm Robinhood that exposed the data of 6 million customers?
social engineering
Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?
social technology
Which of the following measures the average length of stay at a website?
stickiness
Uber has been criticized for using which of the following?
surge pricing
Above all, e-commerce is a ________ phenomenon.
technology driven
Next generation firewalls provide all of the following except:
the ability to automatically update applications on a client computer with security patches.
Which of the following factors is not a significant influence on a company's competitive environment?
the availability of supportive organizational structures
The term stateless refers to the fact that:
the server does not have to maintain an ongoing dedicated interaction with the client computer.
A perfect market is one in which:
there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.
A ________ marketplace supplies products and services of interest to a particular industry.
vertical
A social consequence of the richness of Internet information is:
very persuasive messages might reduce the need for multiple independent sources of information.
Which of the following is the preferred method of implementing a service-oriented architecture?
web services
Which of the following refers to the practice of researching a product online before purchasing it at a physical store?
webrooming
Conficker is an example of a:
worm
Which of the following is an example of a violation of your online privacy?
your online purchasing history being sold to other merchants without your consent