E-Commerce CHAPTERS 5,6,7 Mixed

¡Supera tus tareas y exámenes ahora con Quizwiz!

A typical response rate for an e-mail campaign would be ________ %. 5 25 2 50

5

For a website that has 5 million visitors a month, and where on average, a visitor makes 10 page requests per visit, there will be ___ entries in the transaction log each month

5 million x 10 pages = 50 million

A typical response rate for an e-mail campaign would be?

5%

For a Web site that has 5 million visitors a month, and where on average, a visitor makes 10 page requests per visit, there will be ________ entries in the transaction log each month. 50 50 million 500,000 5 million

50 million

On a typical day, approximately ____ % of adult users in the United States logs on to the internet.

80%

"Shoppers" constitute approximately ________ % of the online Internet audience. 90 70 80 60

90

Shoppers constitute approximately___ % of the online internet audience.

90%

Conversion rate is a measure of the: A) percentage of visitors who become customers. B) percentage of existing customers who continue to buy on a regular basis. C) percentage of shoppers who do not return within a year after their initial purchase. D) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

A

Creating multiple variations of information goods and selling these to different market segments at different prices is called: A) versioning. B) dynamic pricing. C) bundling. D) customization

A

Facebook's share price fell dramatically after its IPO because investors feared that: A) Facebook would be unable to increase advertising revenues enough. B) privacy concerns were driving users away. C) Facebook's new marketing solutions would be difficult to monetize. D) new social networks such as Instagram were cannibalizing Facebook's audience.

A

Which of the following statements about Pinterest is not true? A) About 30% of online adults use Pinterest. B) Pinned photos and photo boards are available to all Pinterest users. C) Pinterest users are overwhelmingly female. D) Pinterest enables users to integrate their pins into their Facebook News Feeds and Twitter streams.

A

Which of the following is an example of an integrity violation of e- commerce security?

An unauthorized person intercepts an online communication and changes its contents

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

Which of the following is a prominent hacktivist group?

Anonymous

Which of the following statements is not true? A) Mobile shoppers and buyers are more affluent than the online population in general. B) Women are more active purchasers on smartphones than men. C) Younger consumers are more likely to research products and prices on mobile devices than older consumers. D) Men are more likely than women to buy digital content with a mobile device.

B

Purchasing an online ad on a CPA basis means that the advertiser: A) pays a prenegotiated fee for each click an ad receives. B) pays for impressions in 1,000 unit lots. C) pays only for those users who perform a specific action, such as registering, purchasing, etc. D) exchanges something of equal value for the ad space

C

The Data Encryption Standard uses a(n) ________-bit key. A) 256 B) 8 C) 56 D) 512

C

The incremental cost of building the next unit of a good is called the: A) variable cost. B) demand curve. C) marginal cost. D) fixed cost.

C

The number of people exposed to pins is a measure of which of the following? A) engagement B) community C) fan acquisition D) brand strength

C

The ratio of impressions to fans is a measure of: A) amplification. B) engagement. C) fan acquisition. D) community.

C

Which of the following is not one of the main elements of a comprehensive multi-channel marketing plan? A) mobile marketing B) social marketing C) local marketing D) offline marketing

C

A Crayola arts-and-crafts column on a parenting Web site is an example of what form of advertising? A) banner swapping B) public relations C) affiliate relationship D) sponsorship

D

By 2017, mobile commerce revenues are expected to be approximately: A) $109 million. B) $1.09 billion. C) $10.9 billion. D) $109 billion.

D

Which of the following dimensions of e-commerce security is not provided for by encryption? A) nonrepudiation B) confidentiality C) message integrity D) availability

D

Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media? A) Amplify B) TweetDeck C) Webtrends D) Curalate

D

Which of the following is not true about search engine advertising? A) Spending on search engine advertising constitutes almost half of all online advertising spending. B) The click-through rate for search engine marketing has been fairly steady over the years. C) The top three search engine providers supply over 95% of all online searches. D) Search engine advertising is the fastest growing type of online advertising.

D

Which of the following is the leading display ad site on mobile devices? A) Twitter B) Yahoo C) Google D) Facebook

D

Which of the following measures the ratio of items purchased to product views? A) cart conversion rate B) conversion rate C) view-to-cart ratio D) browse-to-buy ratio

D

Which of the following most helped Dagny Aslin of ExchangeHunterJumper.com in establishing her brand in the niche area of selling high-end competition horses? A) integrating online and offline marketing techniques to establish a consistent brand B) adapting marketing techniques to keep up with new Internet technologies C) valuing quality over quantity at each stage in the Web site development process D) establishing customer needs and habits as the top priority in all marketing decisions

D

Which of the following statements is not true? A) Mobile ads account for only 16% of Google's overall ad revenue. B) Mobile search ads generate about $8 billion a year for Google. C) Google charges more for desktop ads than it charges for mobile ads. D) Desktop search revenues are increasing for Google.

D

________ refers to the ability to ensure that e-commerce participants do not deny their online actions. A) Availability B) Integrity C) Authenticity D) Nonrepudiation

D

TLS does not guarantee server-side authentication.

FALSE

Text message generates the majority of mobile marketing spending.

FALSE

All of the following are methods of securing channels of communication except:

FTP

Which of the following is the leading display ad site on mobile devices?

Facebook

Contrary to predictions of analysts made during the early days of e-commerce, the Internet has let to both disintermediation and hypermediation on a widespread basis.

False

Credit cards are the dominant form of online payment throughout the world.

False

Credit cards are the dominant form of online payment throughout the world?

False

Deep packet inspection uses software installed on client computers to collect and analyze detailed information on page content viewed by users.

False

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties. True False

False

Facebook has more unique monthly visitors than LinkedIn, Twitter, Pinterest, Tumblr, and Instagram combined.

False

In 2013, mobile marketing grew at nearly the same rate as traditional online marketing.

False

In the United States today, single, white, young college-educated males with high income dominate the Internet in terms of percentage of Internet usage

False

It is expected that by 2017, mobile commerce will account for 50% of all e-commerce.

False

Mobile users spend most of their time browsing mobile Web sites.

False

Most adult social network participants do not have any expectation of personal privacy when using a social network.

False

Online retailing is one of the largest segments of the retail industry.

False

Online shoppers tend to browse for available products rather than search for specific products they have determined in advance.

False

Phishing attacks rely on browser parasites. True False

False

Research has found that of all the standard formats of display ads, wide skyscaper ads are most effective at holding a user's attention.

False

Research has found that of all the standard formats of display ads, wide skyscraper ads are the most effective at holding a user's attention.

False

Research has found that of all the standard formats of display ads, wide skyscraper ads are the most effective at holding a user's attention?

False

Social network sites have become major locations from which consumers directly purchase products.

False

T or F: Credit cards are the dominant form of online payment throughout the world.

False

T or F: Phishing attacks rely on browser parasites.

False

T or F: Price is more important than convenience as a factor in online purchase decisions.

False

T or F: Research has found that of all the standard formats of display ads, wide skyscraper ads are the most effective at holding a user's attention.

False

T or F: The concept of "customer satisfaction" is broader than the concept of "customer experience."

False

The retail industry is the largest investor in information technology.

False

rice is more important that convenience as a factor in online purchase decisions.

False

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network. firewall proxy server virtual private network PPTP

Firewall

The marketing technique known as_____ involves merchants offering products or services for a very low price for a short period of time.

Flash Marketing

The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time?

Flash marketing

Which of the following dominates mobile advertising?

Google

Which of the following would you implement to collect and analyze your company's big data?

Hadoop

refers to the ability to ensure that e- commerce participants do not deny their online actions?

Nonrepudiation

Which of the following examples illustrates the "Long Tail" phenomenon?

Over 50% of Netflix's 100,000 titles are rented at least once a day by someone.

All of the following are examples of malicious code except?

Sniffers

All of the following are traditional online marketing tools except?

Social marketing

Software that is used to obtain private user information such as a user's keystrokes or copies of e- mail is referred to as?

Spyware

Drive-by downloads are now the most common method of infecting computers.

TRUE

Google provides the leading location-based marketing platform.

TRUE

Insiders present a greater security threat to e-commerce sites than outsiders.

TRUE

About 25% of all search engine requests originate from mobile devices

True

Approximately two-thirds of U.S. Internet users use online banking.

True

Bundling is the process of selling of selling two or more product's individual prices

True

Bundling is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices.

True

By 2015, it is estimated that mobile marketing spending will account for around $16 billion annually.

True

Cookies, when combined with Web beacons, can be used to create cross- site profiles?

True

Cookies, when combined with Web beacons, can be used to create cross-site profiles.

True

Drive- by downloads are now the most common method of infecting computers?

True

E-commerce is a major conduit and generator of offline commerce.

True

Evidence suggests that real-time customer chat increases sales.

True

Evidence suggests that real-time customer chat increases sales. True False

True

Google defends its Library Project on the grounds of fair use.

True

Google provides the leading location-based marketing platform.

True

Groupon is an example of local commerce.

True

In 2013, the number of online buyers was over 150 million.

True

In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.

True

In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution. True False

True

In the United States, the service sector accounts for about 75% of all economic activity.

True

It is not necessarily illegal to use someone else's trademark in a metatag.

True

It is possible to opt-out of FB typically attract more visitors than a brand's Web site.

True

Online retailing provides an example of the powerful role that intermediaries continue to play in retail trade.

True

PayPal requires the recipient of a payment to have a PayPal account to receive funds.

True

Pinterest's visitors are predominantly women.

True

Promoted Tweets are Twitter's version of Google's Ad Words.

True

Research shows that the two most important factors shaping the decision to purchase online are utility and trust.

True

Research shows that the two most important factors shaping the decision to purchase online are utility and trust. True False

True

Smishing attacks exploit SMS messages. True False

True

Spoofing involves attempting to hide a true identity by using someone else's e-mail or IP address?

True

T or F: Drive-by downloads are now the most common method of infecting computers.

True

T or F: In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.

True

T or F: Insiders present a greater security threat to e-commerce sites than outsiders.

True

T or F: Smishing attacks exploit SMS messages.

True

T or F: The U.S. federal government has historically not been in favor of the development and export of strong encryption systems.

True

T or F: The digital divide still persists along age, income, ethnic, and education dimensions.

True

T or F: Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

True

The Children's Online Privacy Protection Act (COPPA prohibits Web sites from collecting information on children under the age of 13

True

The Children's Protection Act (CIPA) requires schools and libraries in the United States to install technology protection measures in an effort to shield children from pornography.

True

The European Data Protection Directive prohibits the transfer of PII to organizations or countries that do not have similar privacy protection policies.

True

The FTC's privacy approach is now focused on targeting practices that are likely to cause harm or unwarranted intrusion into consumers' daily lives.

True

The cost of sending 10,000 e-mails in an advertising campaign is about the same as sending 5,000.

True

The digital divide still persists along age, income, ethnic, and education dimensions.

True

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software. True False

True

The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.

True

The power of suppliers is a key industry strategic factor.

True

Traditional desktop marketing remains the largest part of all online marketing.

True

Transaction logs are built into Web server software.

True

Transaction logs are built into Web server software. True False

True

Which of the following online advertising formats attracted the least amount of spending in 2013? classifieds e-mail search rich media

e-mail

Which of the following most helped Dagny Aslin of ExchangeHunterJumper.com in establishing her brand in the niche area of selling high end competition horses?

establishing customer needs and habits as the top priority in all marketing decisions.

In 2013, mobile marketing grew at nearly the same rate as traditional online marketing?

false

TLS does not guarantee server- side authentication?

false

Which of the following is the first step in the social marketing process?

fan aquisition

Which of the following features of e-commerce technology allows fine-grained, highly detailed information on consumers' real-time behavior to be gathered and analyzed? information density interactivity social technology personalization/customization

information density

Which of the following statements about Graph Search is not true?

it relies on google to supplement its search results

In modeling online consumer behavior, the concept of "consumer skills" refers to the:

knowledge consumers have about how to conduct online transactions.

In modeling online consumer behavior, the concept of "consumer skills" refers to the: education level of the consumer. product evaluation skills of the consumer. knowledge consumers have about how to conduct online transactions. communication skills of the consumer.

knowledge consumers have about how to conduct online transactions.

Which of the following is not one of the main elements of a comprehensive multi-channel marketing plan?

local marketing

Search engine advertising and marketing expenditures in 2013 were approximately: $19 million. $1.95 billion. $19.5 billion. $195 million.

$1.95 billion.

Approximately____ of the annual offline retail sales is influenced by online browsing.

1/3

By 2017 mobile commerce revenues are expected to be approximately

109 Billion

Companies are not permitting to collect personal information from children under the age of _____without parental consent.

13

Search engine advertising and marketing expenditures in 2013 were approximately:

19.5 Billion

Search engine advertising and marketing expenditures in 2013 were approximately?

19.5 billion

In 2013 location-based mobile marketing accounted for how much in marketing expenditures?

2.3 Billion

Online bill payments are believed to cost ________ to process compared to ________ for paper bills?

20 to 30 cents, 3 to 7

View- through rate measures the ________ response rate to an ad?

30 days

In 2013, mobile commerce revenues are approximately :

39 Billion

The Data Encryption Standard uses a(n) ________- bit key?

56

On a typical day, approximately ________ % of adult users in the United States logs on to the Internet.

80

A typical response rate for an e-mail campaign would be ________ %. A) 5 B) 2 C) 50 D) 25

A

All of the following are Pinterest marketing tools except: A) Promoted Accounts. B) Brand pages. C) Retail Pins. D) Follow button.

A

All of the following are factors in contributing to the increase in cybercrime except: A) the Internet's similarity to telephone networks. B) the Internet is an open, vulnerable design. C) the ability to remotely access the Internet. D) the ability to anonymously access the Internet.

A

All of the following marketing tools on Facebook require payment except: A) Facebook Offers. B) Marketplace Ads. C) Sponsored Stories. D) Promoted Posts.

A

All of the following marketing tools on Facebook require payment except: A) Facebook Offers. B) Promoted Posts. C) Sponsored Stories. D) Marketplace Ads.

A

All of the following statements about public key encryption are true except: A) public key encryption ensures authentication of the sender. B) public key encryption uses two mathematically related digital keys. C) public key encryption does not ensure message integrity. D) public key encryption is based on the idea of irreversible mathematical functions.

A

Approximately ________ of annual offline retail sales is influenced by online browsing. A) one-third B) three-quarters C) one-half D) one-quarter

A

By 2017, mobile commerce revenues are expected to be approximately: A)$109 billion. B)$109 million. C)$1.09 billion. D)$10.9 billion.

A

Symmetric key encryption is also known as: A) secret key encryption. B) public key encryption. C) PGP. D) PKI.

A

The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and: A) confidentiality. B) usability. C) functionality. D) viability.

A

What is the most frequent cause of stolen credit cards and card information today? A) the hacking and looting of corporate servers storing credit card information B) lost cards C) sniffing programs D) phishing attacks

A

Which of the following do Facebook users spend the most time on? A) News Feed B) Profiles C) Photos D) Graph Search

A

Which of the following is not a key point of vulnerability when dealing with e-commerce? A) the credit card companies B) the communications pipeline C) the client computer D) the server

A

Which of the following is not one of the main stages of the online purchasing process? A) browsing B) post-purchase service and loyalty C) interaction D) awareness

A

Which of the following measures the average length of stay at a Web site? A) stickiness B) loyalty C) recency D) retention rate

A

Encouraging users to click a Like button is an example of which step in the social marketing process? A) brand strength B) community C) fan acquisition D) amplification

D

P2P payment systems are a variation on what type of payment system? A) accumulating balance system B) digital credit card system C) digital checking system D) stored value payment system

D

Reventon is an example of: A) a macro virus. B) a bot program. C) a backdoor. D) ransomware.

D

SMS to friends, notifying friends of your location, and sharing offers with friends are ways to measure: A) fan acquisition. B) engagement. C) community. D) amplification.

D

The ratio of impressions to fans is a measure of: A) engagement. B) amplification. C) community. D) fan acquisition

D

Which of the following purchased Tumblr in May 2013? A) Facebook B) Google C) Twitter D) Yahoo

D

Which of the following left the WikiLeaks Web site effectively inoperable in August 2012?

DDoS attack

By 2012, social marketing had overtaken mobile marketing. (T/F)

F

Facebook does not sell display ads. (T/F)

F

Mobile users spend most of their time browsing mobile Web sites. (T/F)

F

T or F: A cell phone's GPS is accurate to within 5 feet of the actual location of the phone.

F

T or F: Traditional desktop marketing remains the largest part of all online marketing.

F

Digital Cash is legal tender that is instantly convertible into other forms of value without the inter mediation of any third parties.

FALSE

In the United States today, single, white, young , college educated males with high income donate the internet in terms of percentage of internet usage.

FALSE

Phising attacks rely on browser parasites.

FALSE

Which social marketing proved the most effective for ExchnageHunterJumper.com?

Facebook

All of the following marketing tools on Facebook require payment except:

Facebook offers

A cell phone's GPS is accurate to within 5 feet of the actual location of the phone.

False

An interstitial ad is typically contained in a pop- up window that the user must close in order to continue?

False

An interstitial ad is typically contained in a pop-up window that the user must close in order to continue

False

By 2012, social marketing had overtaken mobile marketing.

False

Consumers are primarily price-driven when shopping on the Internet.

False

Copyright protection protects against others copying the underlying ideas in a work.

False

Text message generates the majority of mobile marketing spending.

False

The Unlawful Internet Gambling Enforcement Act has eliminated all online gambling in the United States.

False

The concept of "customer satisfaction" is broader than the concept of "customer experience."

False

The concept of "customer satisfaction" is broader than the concept of "customer experience." True False

False

The concept of "customer satisfaction" is broader than the concept of "customer experience."?

False

The major impact of Internet real estate sites is in enabling online-only property transactions.

False

The online mortgage industry has transformed the process of obtaining a mortgage.

False

The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.

False

Which of the following is not true about social marketing?

In 2013 marketers will spend almost twice as much on social marketing as they do on mobile marketing.

Which of the following features of e- commerce technology allows fine- grained, highly detailed information on consumers' real- time behavior to be gathered and analyzed?

Information density

The richness made possible by e-commerce technologies does which of the following?

It allows video, audio, and text to be integrated into a single marketing message and consuming experience.

The richness made possible by e-commerce technologies does which of the following? It enables worldwide customer service and marketing communications. It reduces the cost of delivering marketing messages and receiving feedback from users. It allows consumers to become co-producers of the goods and services being sold. It allows video, audio, and text to be integrated into a single marketing message and consuming experience.

It allows video, audio, and text to be integrated into a single marketing message and consuming experience.

Which of the following is not one of the main elements of a comprehensive multi- channel marketing plan?

Local marketing

Online bill payment now accounts for ________ of all bill payments?

More than 50 %

Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?

NFC

Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other? DES text messaging NFC IM

NFC

Which of the following is not one of the 4 main methods advertisers use to behaviorally target ads:

Nielsen ratings

Which of the following is not one of the four main methods advertisers use to behaviorally target ads?

Nielsen ratings

Refers to the ability to ensure that e-commerce participants do not deny their online actions

Nonrepudiation

________ refers to the ability to ensure that e-commerce participants do not deny their online actions. Authenticity Integrity Availability Nonrepudiation

Nonrepudiation

Which of the following examples illustrates the "Long Tail" phenomenon? Over 50% of Netflix's 100,000 titles are rented at least once a day by someone. Rhapsody music streaming service reported that its no play rate had increased to over 20%. The number of blockbuster "winner take all" video titles is declining. The average blog has a readership of slightly more than 1.

Over 50% of Netflix's 100,000 titles are rented at least once a day by someone.

All of the following statements about PKI are true except?

PKI guarantees that the verifying computer of the merchant is secure

All of the following methods about PKI are true except:

PKI guarantees that the verifying computer of the merchant is secure.

All of the following statements about PKI are true except:

PKI guarantees that the verifying computer of the merchant is secure.

What is the first step in developing an e-commerce security plan? Create a security organization. Perform a security audit. Perform a risk assessment. Develop a security policy.

Perform a risk assessment.

Botnets are typically use for all of the following except:

Phishing attacks

Reventon is an example of?

Ransomware

Which of the following is not true about search engine advertising?

Search engine advertising is the fastest growing type of online advertising.

Which of the following is not true about search engine advertising? Search engine advertising is the fastest growing type of online advertising. The top three search engine providers supply over 95% of all online searches. Spending on search engine advertising constitutes almost half of all online advertising spending. The click-through rate for search engine marketing has been fairly steady over the years.

Search engine advertising is the fastest growing type of online advertising.

P2P payment systems are a variation on what type of payment system?

Stored value payment

Brand pages on Facebook typically attract more visitors than a brand's Web site. (T/F)

T

Pinterest's visitors are predominantly women. (T/F)

T

T or F: About 25% of all search engine requests originate from mobile devices.

T

T or F: Brand pages on Facebook typically attract more visitors than a brand's Web site.

T

T or F: Google provides the leading location-based marketing platform.

T

A Trojan horse appears to be benign but then does something other than expected.

TRUE

Brand pages on facebook typically attract more visitors than a brand's website.

TRUE

Cookies when combined with web beacons, can be used to create cross-site profiles

TRUE

Pinterest visitors are predominantly women

TRUE

Spoofing involves attempting to hide a true identity by using someone else's e-mail or IP address.

TRUE

The cost of sending 10,000 emails in an advertising campaign is about the same as sending 5,000.

TRUE

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

TRUE

Which of the following statements about the Internet's impact on marketing is not true?

The Internet has decreased the impact of brands

Which of the following statements about the Internet's impact on marketing is not true?

The Internet has decreased the impact of brands.

Which of the following statements about a free pricing strategy is false?

The free pricing strategy was born in the early days of the Web

Which of the following statements about a free pricing strategy is false?

The free pricing strategy was born in the early days of the Web.

Which of the following statements about the use of tablets is not true?

The number of smart phone users is still growing faster than the number of tablet users.

Impressions are a measure of the?

The number of times an ad is served

A Trojan horse appears to be benign, but then does something other than expected. True False

True

A worm does not need to be activated by a user in order for it to replicate itself.

True

A worm does not need to be activated by a user in order for it to replicate itself. True False

True

A worm does not need to be activated by a user in order for it to replicate itself?

True

Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.

True

Mobile commerce currently accounts for more retail goods sold than social commerce.

True

Net neutrality refers to Internet backbone owners treating all Internet traffic equally.

True

Online career sites are being threatened by both job search engines and aggregators.

True

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use. True False

True

e-commerce is a major conduit and generator of offline commerce

True

Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?

Two-factor authentification

If you want to determine the side of your website's audience, the metric you would use for the most accurate measurement will be:

Unique Visitors

If you want to determine the size of your Web site's audience, the metric you will use for the most accurate measurement will be?

Unique visitors

Which of the following features of e- commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?

Universal standards

Which of the following forms of online advertising is growing the fastest? video rich media sponsorships paid search

Video

Which of the following online advertising formats is the most effective?

Video ads

A Web beacon is: an automated applet for performing Web searches. a cookie that carries a virus. a tiny graphics file embedded in an e-mail or Web page. an executable cookie.

a tiny graphics file embedded in an e-mail or Web page.

Which of the following is not a feature that is driving the growth of social marketing and advertising?

affiliate programs

Encouraging users to click a like button is an example of which step in the social marketing process:

amplification

To allow lower- level employees access to the corporate network while preventing them from accessing private human resources documents, you would use?

an authorization management system.

An intrusion detection system can perform all of the following functions except:

blocking suspicious activity.

Rustock is an example of which of the following?

botnet

Most of the world's spam is delivered via which of the following?

botnets

Which of the following measures the ratio of items purchased to product views?

browse-to-buy ratio

Which of the following measures the ratio of items purchased to product views? view-to-cart ratio conversion rate cart conversion rate browse-to-buy ratio

browse-to-buy ratio

Which of the following is the most important tool in establishing a relationship with the customer? company Web site Facebook search engine display ads company CRM system

company Web site

The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:

confidentiality.

All of the following are limitations of the existing online credit card payment system except:

cost to consumers

In the United States the primary form of online payment is:

credit cards

In the United States, the primary form of online payment is:

credit cards.

Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?

curalate

The Nike iD program is an example of which of the following marketing techniques?

customer co-production

Which of the following is not an example of an access control?

digital signatures

Proxy servers are also known as:

dual home systems

Which of the following advertising formats attracted the least amount of spending in 2013?

e-mail

Which of the following is the most popular use for mobile devices?

entertainment

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

firewall

The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time.

flash marketing

Which analytics tool did Fairmont Hotel use to measure the effectiveness of its online marketing and advertising ?

google analytics

Which of the following is the top concern of Internet users about purchasing online? lack of trust in the purchase process shipping costs difficulty of returning products inability to see and touch before buying

inability to see and touch before buying

Which of the following is the top concern for internet users about purchasing online?

inability to see or touch before buying

Which dimensions of security is spoofing a threat to?

integrity and authenticity

The incremental cost of building the next unit of a good is called the:

marginal cost

Hits are a measure of the:

number of http requests.

Impressions are a measure of the: number of pages viewed. number of times an ad is clicked. number of times an ad is served. number of http requests.

number of times an ad is clicked.

Impressions are a measure of the :

number of times an ad is served.

Impressions are a measure of the:

number of times an ad is served.

Approximately ________ of annual offline retail sales is influenced by online browsing. one-half three-quarters one-quarter one-third

one-third

Which of the following examples illustrates the "Long Tail" phenomenon?

over 50% of Netflix 100,000 titles are rented at least once per day by someone.

All of the following are used for authentication except: packet filters. certificates of authority. biometric devices. digital signatures.

packet filters.

Conversion Rate is a measure of the:

percentage of visitors who became customers.

Acquisition rate is a measure of the: percentage of shoppers who do not return within a year after their initial purchase. percentage of visitors who become customers. percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages. percentage of existing customers who continue to buy on a regular basis.

percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

Reventon is an example of:

ransomware

Symmetric key encryption is also known as :

secret key encription

Symmetric key encryption is also known as: public key encryption. secret key encryption. PGP. PKI.

secret key encryption.

All of the following are examples of malicious code except:

sniffers.

All of the following are traditional online marketing tools except: e-mail and permission marketing. sponsorship marketing. affiliate marketing. social marketing.

social marketing.

Surveys have found that the least influential online marketing format for driving consumers to purchase is:

social networks

Which of the following measures the average length of stay at a Web site?

stickiness

Which of the following measures the average length of stay at a web site?

stickiness

None of the following payment systems offers immediate monetary value except:

store value/ debit card

None of the following payment systems offers immediate monetary value except: credit cards. personal checks. stored value/debit card. accumulating balance.

stored value/debit card.

A digital certificate contains all of the following except the:

subject's private key.

A digital certificate contains all of the following except the: digital signature of the certification authority. subject's private key. digital certificate serial number. subject's public key.

subject's private key.

Studies of the effects of social "connectedness" on Internet purchases indicate that the more "connected" an individual: the more that individual shares purchasing decisions with friends. the less that individual is influenced by friends' purchases. the less purchasing that individual does. the more purchasing that individual does.

the less that individual is influenced by friends' purchases.

Which of the following is a real time feed showing a friends activities, chats, and music listening on facebook?

ticker

A Web beacon is?

tiny graphics file embedded in an e-mail or Web page

Smishing attacks exploit SMS messages.

true

Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?

two-factor authentication

If you want to determine the size of your Web site's audience, the metric you will use for the most accurate measurement will be: reach. hits. unique visitors. page views.

unique visitors.

Which of the following online advertising formats is the most effective?

video ads

Linden Dollars, created for use in Second life, are an example of :

virtual currency

Bitcoins are an example of:

virtual currency.

Linden Dollars, created for use in Second Life, are an example of:

virtual currency.

Which of the following statements about a free pricing strategy is false?

was born in the early days of the web

Refers to the ability to identify the person or entity with whom you are dealing on the Internet?

Authenticity

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. Nonrepudiation Availability Integrity Authenticity

Authenticity

________ refers to the ability to identify the person or entity with whom you are dealing on the internet.

Authenticity

______ refers to the ability to ensure that an e-commerce site continues to function as intended.

Availability

______refers to the ability to ensure that an e- commerce site continues to function as intended?

Availability

All of the following are examples of malicious code except: A) worms. B) sniffers. C) viruses. D) bots.

B

Display ads constitute about ________ % of mobile ad spending. A) 15 B) 33 C) 20 D) 66

B

How does Google Analytics track user behavior at a participating Web site? A) cookies B) beacons C) server logs D) super cookies

B

In 2013, location-based mobile marketing accounted for how much in marketing expenditures? A) $23 billion B) $2.3 billion C) $23 million D) $230 million

B

Miller Coors used which of the following techniques to alert Blue Moon beer fans as to where it could be purchased? A) Geo-social based services B) Geo-fencing C) E9-1-1 D) Geo-search

B

Online bill payments are believed to cost ________ to process compared to ________ for paper bills. A) $1 to $2, $10 to $20 B) 20 to 30 cents, $3 to $7 C) 3 to $7, 20 to 30 cents D) $10 to $20, $ 1 to $2

B

The newest and fastest growing segment of the digital marketing universe is: A) Twitter marketing. B) location-based mobile marketing. C) Pinterest marketing. D) Facebook marketing.

B

The richness made possible by e-commerce technologies does which of the following? A) It reduces the cost of delivering marketing messages and receiving feedback from users. B) It allows video, audio, and text to be integrated into a single marketing message and consuming experience. C) It enables worldwide customer service and marketing communications. D) It allows consumers to become co-producers of the goods and services being sold.

B

Which of the following countries has been found to have engaged in cyberespionage against Google? A) Iraq B) China C) Russia D) Iran

B

Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media? A) TweetDeck B) Curalate C) Amplify D) Webtrends

B

Which of the following is not one of the four main methods advertisers use to behaviorally target ads? A) clickstream data B) Nielsen ratings C) data collected from social networks D) integration of offline data

B

Which of the following provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand? A) Enhanced Profile Pages B) Amplify C) Lead Generation Cards D) Promoted Accounts

B

Which of the following purchased Tumblr in May 2013? A) Facebook B) Yahoo C) Google D) Twitter

B

Which of the following statements about CAN-SPAM is not true? A) CAN-SPAM prohibits the use of deceptive subject lines and false headers. B) CAN-SPAM prohibits unsolicited e-mail (spam). C) CAN-SPAM went into effect in January 2004. D) Large spammers are among CAN-SPAM's biggest supporters.

B

Which of the following statements about the Internet's impact on marketing is not true? A) The Internet has increased the richness of marketing communications. B) The Internet has decreased the impact of brands. C) The Internet has broadened the scope of marketing communications. D) The Internet has expanded the information intensity of the marketplace.

B

________ refers to the ability to ensure that an e-commerce site continues to function as intended. A) Authenticity B) Availability C) Nonrepudiation D) Integrity

B

Most of the world's spam is delivered via which of the following? worms botnets viruses Trojan horses

Bonet

Most of the world's spam is delivered via which of the following?

Botnets

Which of the following is not one of the main stages of the online purchasing process?

Browsing

Which children's Web site was fined $3 million in 2011 for collecting and sharing children's personal information without consent of their parents? A) NeoPets B) Nick Jr. C) Disney's Playdom D) Emily's Dress Up

C

Which dimension(s) of security is spoofing a threat to? A) availability and integrity B) availability C) integrity and authenticity D) integrity

C

Which of the following involves a coupon or other promotional offer that appears in users' Twitter timeline? A) Promoted Trend B) Promoted Account C) Lead Generation Card D) Promoted Tweet

C

Which of the following is a real-time feed showing a friend's activities, chats, and music listening on Facebook? A) Social Graph B) Timeline C) Ticker D) News Feed

C

Which of the following is a real-time feed showing a friend's activities, chats, and music listening on Facebook? A) News Feed B) Timeline C) Ticker D) Social Graph

C

Which of the following is the leading display ad site on mobile devices? A) Google B) Twitter C) Facebook D) Yahoo

C

Which of the following is the most popular use for mobile devices? A) socializing B) shopping C) entertainment D) performing tasks, such as finances

C

Which of the following most helped Dagny Aslin of ExchangeHunterJumper.com in establishing her brand in the niche area of selling high-end competition horses? A) valuing quality over quantity at each stage in the Web site development process B) establishing customer needs and habits as the top priority in all marketing decisions C) adapting marketing techniques to keep up with new Internet technologies D) integrating online and offline marketing techniques to establish a consistent brand

A

Which of the following online advertising formats attracted the least amount of spending in 2013? A) e-mail B) classifieds C) rich media D) search

A

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. A) Authenticity B) Availability C) Integrity D) Nonrepudiation

A

Which of the following is not a feature that is driving the growth of social marketing and advertising?

Affiliate Programs

A Web beacon is: A) an automated applet for performing Web searches. B) an executable cookie. C) a tiny graphics file embedded in an e-mail or Web page. D) a cookie that carries a virus.

C

A digital certificate contains all of the following except the: A) subject's public key. B) digital certificate serial number. C) subject's private key. D) digital signature of the certification authority.

C

All of the following were popular types of online marketing before 2007 except: A) e-mail. B) corporate Web sites. C) mobile marketing. D) display ads.

C

An intrusion detection system can perform all of the following functions except: A) checking network traffic to see if it matches certain patterns or preconfigured rules. B) setting off an alarm when suspicious activity is detected. C) blocking suspicious activity. D) examining network traffic.

C

Companies are not permitted to collect personal information from children under the age of ________ without parental consent. A) 8 B) 10 C) 13 D) 16

C

Encouraging users to click a Like button is an example of which step in the social marketing process? A) brand strength B) community C) amplification D) fan acquisition

C

Facebook's marketing success on both desktop and mobile platforms is based on: A) fees for Brand Pages and other specialized business marketing tools. B) the sale of user clickstream data. C) ads inserted into users' News Feeds. D) ads targeted through Facebook's Open Graph and Graph Search tools.

C

How can a smartphone's gyroscope and accelerometer be used in product marketing? A) to speed up delivery of large multimedia files B) to locate the user's geographical position C) to enhance user interaction with mobile multimedia D) to provide accurate data on the user's destination and speed

C

In 2013, what was the approximate Internet penetration rate for individuals that have attained less than a high-school education? A) 90% B) 45% C) 60% D) 75%

C

Which social marketing proved the most effective for ExchangeHunterJumper.com? A) YouTube B) Pinterest C) Facebook D) Instagram

C

Which of the following countries has been found to have engaged in cyber espionage against google?

CHINA

A ______ is a depository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.

CRM

A ________ is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.

CRM system

Which of the following countries has been found to have engaged in cyber espionage against Google?

China

Which of the following countries has been found to have engaged in cyberespionage against Google?

China

Which of the following is the most important tool in establishing a relationship with the customer?

Company website

The six key dimensions to e- commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and?

Confidentiality

________ refers to the ability to ensure that messages and data are only available to those authorized to view them. Privacy Integrity Confidentiality Availability

Confidentiality

Cookies, when combined with Web beacons, can be used to create cross-site profiles. True False

Cookies, when combined with Web beacons, can be used to create cross-site profiles. True False

All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except: social networks. online catalogs. targeted banner ads. search engines.

targeted banner ads.

All of the following are factors in contributing to the increase in cybercrime except?

the Internet's similarity to telephone networks

All of the following are factors in contributing to the increase in cybercrime except: the ability to remotely access the Internet. the Internet is an open, vulnerable design. the ability to anonymously access the Internet. the Internet's similarity to telephone networks.

the Internet's similarity to telephone networks.

Which of the following is not a key point of vulnerability when dealing with e- commerce?

the credit card companies

Conversion rate is a measure of the: percentage of shoppers who do not return within a year after their initial purchase. percentage of visitors who become customers. percentage of existing customers who continue to buy on a regular basis. percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

All the following statements about symmetric key encryption are true except?

symmetric key cryptography is computationally slower

All of the following statements about symmetric key encryption are true except;

symmetric key encryption is computationally slower.

All the following statements about symmetric key encryption are true except: symmetric key encryption is a key element in digital envelopes. in symmetric key encryption, both the sender and the receiver use the same key to encrypt and decrypt a message. the Data Encryption Standard is a symmetric key encryption system. symmetric key encryption is computationally slower.

symmetric key encryption is computationally slower.

All of the following statements about cookies are true except:

the data typically stored in cookies includes a unique ID and e-mail address.

What is the most frequent cause of stolen credit cards and card information today?

the hacking and looting of corporate servers storing credit card information

How can a smart phone's gyroscope and accelerometer be used in product marketing?

to enhance user interaction with mobile multimedia

Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?

universal standards

Creating multiple variations of information goods and selling these to different market segments at different prices is called: bundling. versioning. dynamic pricing. customization.

versioning

Which of the following forms of online advertising is growing the fastest?

video

Facebook's share price fell dramatically after its IPO because investors feared that :

would be unable to increase advertising revenues enough.

All of the following are fixed price strategies except:

yield management.

An example of a privacy violation of e-commerce security is:

your online purchasing history being sold to other merchants without your consent.


Conjuntos de estudio relacionados

Marketing Final Exam Chapter's 10,11, & 12

View Set

Fundies IV Midterm + Final (ALL) Quizzes

View Set

3.1 ATP Synthase and Chemiosmosis Theory

View Set

exasperation irritation, frustration exemplary outstanding extenuating guilt diminishing florid flushed, ornate fortuitous lucky frugal thrifty hackneyed overused, cliched haughty arrogant, condescending hedonist pleasure seeker hypothesis theory

View Set

2: U2L1: Demonstrative Adjectives & Demonstrative Pronouns

View Set