Ecommerce exam 2
percentage of visitors who become customers
Conversion rate is measure of the:
versioning
Creating multiple variations of information goods and selling these to different market segments at different prices is called.
Keylogger
Critics have pointed out the Chrome web browser suggest button which suggests queries based on searched terms entered by the user is in fact a type of
88
*Shoppers* constitute approximately ____ percent of the online internet audience.
sponsorship
A Crayola arts-and-craft column on a parenting Web site is an example of what form of advertising?
a tiny graphics file embedded in an email or Web page.
A Web beacon is:
firewall
A ____ is hardware or software that acts as a filter to prevent unwanted packets from entering a network
CRM system
A _____ is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.
subject private key
A digital certificate contains all of the following except the:
direct reference group
A person's profession or occupation is part of their:
$5
A typical banner ad might cost ____ per 1,0000 impressions.
5
A typical response rate for an email campaign would be ____ percent
psychological
A(n) ____ profile describes an individual's set of needs, drives, motivations, perception, and learned behaviors.
envelope
If you used a symmetric key encryption for large documents, with public key encryption to encrypt and send the symmetric key, you would be using a digital envelope
unique visitors
If you want to determine the size of your Web site's audience, the metric you will use for the most accounts measure will be:
number of time and ad is served
Impressions are a measure of the:
60 percent
In 2012, what was the approximate internet penetration rate for individuals that have attained less than a high school education?
network keyword
In ____ advertising, companies pay for ads to be placed dynamically on any participating Web site that the search engine determines is appropriate.
knowledge consumer have about how to conduct online transactions
In modeling online consumer behavior, consumer skills refers to the:
True
Interest-based advertising is another name for behavioral targeting.
$5 to $10
Legitimate email addresses based on a high-quality commercial opt in email list might cost ____ per thousand.
virtual currency
Linden Dollars, created for use in Second Life, are an example of:
drive-by download
Malware that comes with a downloaded file that a user requests is called a:
botnets
Most of the world's spam is delivered through which of the following:
True
Net neutrality refers to internet backbone owners reading all internet traffic equally
first mover
Netflix entered the market with a(n) ____ strategy.
Trojan horse/ worm
Netsky. P, which spreads by sending e-mails from an infected computer to all of the e-mail addresses found on that Infected computer, is an example of:
stored value/ debit card
None of the following payment systems offers immediate monetary value except:
82
On a typical day, approximately ____ percent of adult users in the United States logs on to the Internet.
checking the weather
On average, which of the following activities was most frequently engaged in by Internet users in 2012?
stored value payment system
P2P payment systems are a variation of what type of payment system?
is a component of email marketing
Permission marketing
social network advertising
Promoted Trends is an example of which of the following types of online advertising?
dual home systems
Proxy servers are also known as:
pays only for those users who do perform a specific action, such as registering, purchasing, etc.
Purchaisng an online ad n a CPA basis mean that the advertiser
time elapsed since the last action taken by a cusotmer.
Recency refers to the:
Cyber piracy
Registering a domain name some are identical to trademarks of others to divert web traffic to their own sites is an example of
Typo squatting
Registering the domain name google.com with the internet to divert web traffic from people misspelling google.com is an example of
In an "F" shaped pattern with a greater attention to the left side of the page.
Research studies have shown that viewers scan search engine result pages.
$1.7 million
Search engine advertising expenditure in 2012 were approximately:
True
Sending email marketing messages is typically less costly than sending Direct Mail marketing messages
Margins were low
Small ticket item sales outnumbered large ticket item sales during the early days of e-commerce for all of the following reasons except:
Very persuasive messages might reduce the need of multiple independent sources of information
Social consequence of the richness of internet formation is
spyware
Software that is used to obbtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
the less that individuals is influenced by friend's; purchases
Studies of the effects of social "connectedness" on Internet purchases indicate that the more "connected" an individual:
secret key encryption
Symmetric key encryption is also known as
True
T or F the optic model for informed consent requires an affirmative action by the consumer before a company can collect and use information
True
T or F: A Trojan Horse appears to be benign but then does something other than expected.
True
T or F: A majority of states in the United State have laws regulating or prohibiting spam.
True
T or F: A worm that does not need to be activated by a user in order for it to replicate itself.
True
T or F: Bundline is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices
True
T or F: Cookies, when combined with Web beacons, can be used to create cross-site profiles.
False
T or F: Credit cards are the dominant form of online payment throughout the world.
False
T or F: Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.
False
T or F: Display ads produced the highest click-through rates.
True
T or F: Drive-by downloads are now the most common method of infecting computers.
True
T or F: Ecommerce is a major conduct and generator of offline commerce.
True
T or F: Evidence suggests that real-time customer chat increases sales
True
T or F: Google defends its Library project on the grounds of
True
T or F: Households with income of below $75,000 are obtaining Internet access at faster rates than households with incomes above that level
False
T or F: In 2012, mobile marketing grew nearly the same rate as traditional online marketing.
False
T or F: In general, the costs for offline customer acquisition are lower than online, but more effective.
True
T or F: In order to accept payments by credit card, online merchants typically must have a merchant account with a bank or financial institution.
False
T or F: In the United States today, single, white, young college educated males with high income dominate the Internet of internet usage.
True
T or F: Insiders present a greater security threat to ecommerce sites than outsiders
True
T or F: Online advertising methods include sponsorship, email marketing, and referrals.
False
T or F: Online banking is more popular with men than with women.
False
T or F: Online video advertising now accounts for the largest amount of the Internet advertising spending.
True
T or F: Paypal requires the recipient of a payment to have a PayPal account to receive funds
False
T or F: Phishing attacks rely on browser parasites.
True
T or F: Price is the top factor in online purchase decisions
True
T or F: Research indicates that social network influences may not extend to distant friends
True
T or F: Research shows that the two most important factors shaping the decision to purchase online are utility and trust.
True
T or F: Search engines marketing saves consumers cognitive energy and reduces research cost
True
T or F: Smishing attacks exploit SMS messages
False
T or F: TLS does not guarantee server-side authentication
True
T or F: The United States federal government has historically not been in favor of the development and export of strong encryption systems.
False
T or F: The amount spent on online advertising in 2012 accounts for approximately 10% of the total amount spent on all advertising
True
T or F: The easiset and least expensive way to prevent threats to system integrity is to install anti-virus software
True
T or F: The marginal cost of production of information goods distributed over the Internet is zero or near zero
False
T or F: The sole purpose of marketing communications is sales.
True
T or F: The use of the digital signature helots tto ensure uintegriity , authenticitym and nonrepudiation.
True
T or F: Transaction logs are built into Web server software
True
T or F: Typically, the more security measures added to a Web site, the slower and more difficult it becomes to use.
False
T or F: Versioning involves selling the same products at different prices
True
T or F: spending on social advertising is less than 10% of spending on all online advertising
False
T or F: students have shown that the most successful marketing campaigns concentrate efforts along a single marketing channel
False
T or False: The four generic market entry strategies are first mover, fast follower, and pure play.
7% - 8%
THe typical dwell rate for rich media and video ads is:
True
TRL the children's online privacy protection act Coppa prohibits the websites from collecting information on children under the age of 13
45
The Computer Security Institute reported in its 2011 survey that approximately ____ percent of responding organizations experience a computer security incident within the previous 12 months.
Microsoft operating systems
The Conficker worm targeted:
56
The Data Encryption Standard uses a(n) _____ -bit key.
True
The European data protection directive prevents the transfer of pii to organizations are countries that do not have similar privacy protection policies
customer cooperation
The Nike ID program is an example of which of the following marketing merchant techniques?
$37.3 billion
The amount spent on online advertising in 2012 was approximately:
culture
The broadest factor in consumer behavior is:
less intensely involved with the Internet than
The dial-up audience us ____ the broadband audience.
Framing
The display of a third party's website or page within your own website is called
True
The fdic's Privacy approach is now focused on targeting practices that are likely to cause harm or unwanted intrusion into consumers daily life
marginal cost
The incremental cost of building the next unit of a good is called the:
flash marketing
The marketing techniques known as ____ involves merchants offering products or services for a very low price for a short periods of time.
Exclusive sponsor arrangement
The most expensive form of online advertising on a per thousand views basis is a
less than 1
The overall rate of online credit card fraud is _____ percent of all online card transactions
70
The percentage of all email that is spam was approximately ____ percent in 2012.
False
The principle of responsibility means that individuals organizations why you should be held accountable to other for the consequences of their actions
It allows video, audio, and text to be integrated into a single marketing message and consuming experience
The richness made possible by ecommerce technologies does which of the following?
Legal in the United States but illegal in Europe
The sharing of users stored cookie information between web sites and without the user's knowledge is
confidentiality
The six key dimensions to e-commerce security are nonrepudiation authenticity, availability, integrity, privacy, and:
728 x 90 pixels
The size of a leader board is:
False
The unlawful internet gambling Enforcement Act has eliminated all online gambling in the United States
an authorization management system
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents , you would use:
subculture
Toyota's use of the Internet to the larger Hispanic customers is an example of targeting a specific:
False
Trf Deep packet inspection uses software installed on client computers to collect and analyze detailed information on page content viewed by users
True
Trf colon the growth rate of search engine advertising is slowing compared to other formats
False
Trf copyright protection protects against others come copying the underlying ideas in a work
True
Trf ethical principle of universalism states that if an action is not right for all situations then it is not right for any situation
True
Trf it is not necessary it legal to use someone else's trademark in meta tag
True
Trf liability is a feature of political systems in which a body of laws in place that permits individuals to recover Damage Done to them but other actions systems or organizations
False
Trf most adult social network participants do not have any expectation of personal privacy when using a social network
False
Trf the 2003 can - spam act required at the Federal Trade Commission established do not email registry
True
Trf the children's internet protection act cipa requires schools and libraries in the United States to install technology protection measures in an effort to Shield children from pornography
.03%-.30%
Typical click-through rates for an onlien display ad are:
30- day
View through rate measures the ____ response rate to an ad.
brand extender
Walmart used which of the following market entry strategies
Requires firms to have a consumer affirmatively opt-in before pii is collected
What is the FTC recommendation regarding Choice as it relates to personal identifiable information pii?
Perform a risk assessment
What is the first step in developing an ecommerce security plan?
Perform a security audit
What is the last step in developing an e-commerce security plan?
the hacking and looting of corporate servers storing credit card information
What is the most frequent cause of stolen credit card and card information today?
universal standards
Which if the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users>
The free pricing strategy was born in the early days of the Web
Which if the following statements about a free pricing strategic is false?
using email
Which of the following activities is the one engaged in by the highest percentage of online users?
Barnesandnoble.com the Best place to buy textbooks
Which of the following advertising messages is a branding communication?
65+
Which of the following age groups had the lowest percentage of Internet access in 2012?
18-29
Which of the following age groups has the l highest percentage of Internet access?
Black, non-Hispanice
Which of the following demographic groups had the greatest increase in Internet access between 2002 and 2012?
integrity and authenticity
Which of the following dimension(s) of security is spoofing a threat to
availability
Which of the following dimensions of ecommerce security is not provided for by encryption?
over 50 percent of Netflix's 100,000 titles are rented at lease once a day by someone
Which of the following examples illustrates the"long Tall" phenomenon?
informational density
Which of the following features of ecommerce technology allows fine-grained, highly detailed information on consumers real-time behavior to be gathered and analyzed?
Video
Which of the following forms of online advertising is growing the fastest?
Search engine keywords purchase
Which of the following forms of online advertising typically has the highest click-through rate?
Which of the following generated the most social advertising revenues in 2012?
Anonymous
Which of the following is a prominent hacktivist group?
NFC
Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?
social class
Which of the following is an example of an indirect reference group?
An unauthorized person intercepts an online communication and changes its contents
Which of the following is an example of integrity violation of ecommerce today?
Search engine ads
Which of the following is an example of pull advertising?
personal intelligent agents
Which of the following is not a feature that is driving social ecommerce growth?
the credit card companies
Which of the following is not a key point of vulnerability when dealing with ecommerce?
Promoted Shopping
Which of the following is not a kind of Twitter marketing product?
Redundant navigation
Which of the following is not a major web design features that impact online purchasing?
Social search
Which of the following is not a practice that degrades the results and usefulness of search engines?
app marketing
Which of the following is not a social marketing technique
drive-by dowload
Which of the following is not an example of a PUP?
digital signature
Which of the following is not an example of an access control?
Online cost forces benefits are well-established and understood
Which of the following is not one of the advantages of online advertising?
Spending on search engine advertising is overtaken by video ad
Which of the following is not one of the current trends in Internet advertising?
Nielsen ratings
Which of the following is not one of the four main methods advertisers use to behaviourally Target ads?
local marketing
Which of the following is not one of the main elements of a comprehensive multi- channel marketing plan?
Search engine advertising is the fastest growing type of online advertising
Which of the following is not true about search engine advertising?
Computer fraud and Abuse Act
Which of the following is the primary federal statue used to combat computer crime?
inability to see and touch before buying.
Which of the following is the top concern of internet users about purchasing online?
Stickiness
Which of the following measures the average length of stay at a website?
Checkout conversion rate
Which of the following measures the ratio of actual orders to check out started
Browse to buy ratio
Which of the following measures the ratio of items purchased to product views?
Which of the following online advertising format attracted the least amount of spending in 2012?
Video ads
Which of the following online advertising format is the most effective?
The internet has decreased the impact of brands
Which of the following statements about the internet's impact on marketing is not true ?
Wide skyscraper
Which of the following types of display ads is 160 x 600 pixels?
behavioral
Which of the following types of online marketing segmentation and targeting involves tracking the action users take on a Web site?
denigraohic
Which of the following types of online marketing segmentation and targeting involves using age, ethnic, religion, etc.?
search
Which of the following types of online marketing segmentation and targeting involves using consumers explicitly expressed interest to segment and target?
SQL
____ is an industry-standard database query and manipulation language.
confidentiality
____ refers to the ability to ensure that messages and data are only available to those authorized to view them
nonrepudiation
_____ refers to the ability that the ecommerce participates do not deny their online actions
authenticity
_____ refers to the ability the person or entity with whom you are dealing on the Internet.
availability
_____ refers to the ability to ensure that an ecommerce site continues to function as inteneded
95 years
How long does copyright protection extend to corporate owned works?
malware infection
According to the Computer Security Institute 2011's Computer Crime and Security Survey, which of the following was the most commonly reported type of attack?
design look
According to the Fogg et al. 2003 study, which of the following is the most important factor in the credibility of a Web site?
percentage of visitors who indicate an interest in a site's products by registering or visiting a product;s pages.
Acquisition rate is a measure of the:
use of mass media
All of the following are attributes of personalized marketing except:
Family member identities
All of the following are data elements that are often gathered by eCommerce sites except
sniffers
All of the following are example of malicious code except:
credit cards
All of the following are examples of stored value payment systems except:
the internet's similarity to telephone networks
All of the following are factors in contributing to the increase in cybercrime except:
Availability of the work on the web
All of the following are factors that will be considered in determining whether use of copyrighted material is fair use except the
it provides float
All of the following are features of cash except:
yield management
All of the following are fixed price strategies except:
the number of advertisements viewed
All of the following are important clickstream behavior factors except:
cost to consumers
All of the following are limitations of the existing online credit card payment system except:
FTP
All of the following are method of securing channels of communication except:
targeted banner ads
All of the following are online communications that are used to support the evaluation of alternative stage of the consumer decision
targeted banner ads
All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except:
ISPs
All of the following are stakeholders in payment systems except:
social marketing
All of the following are traditional online marketing tools except:
Having a dot-com domain is no longer considered preferable, especially in the United States.
All of the following are true statements about the choice of a domain except:
packet filters
All of the following are used for authentication except:
Interstitials typically last 30 seconds
All of the following statement about interstitials are true except:
CAN_SPAM prohibits unsolicited email (spam)
All of the following statements about CAN-SPAM are true except:
The dmca makes Intranet service providers isps responsible and accountable for hosting websites or providing services to in French regardless of whether the ISP is aware of infringement
All of the following statements about Digital Millennium Copyright Act dmca are true except
PKI guarantee that the verifying computer of the merchant is secure
All of the following statements about PKI are true except:
The data typically stored in cookies includes a unique ID and email address
All of the following statements about cookies are true except:
Debit cards enable consumers to make purchases even if they do not have sufficient funds at the time of the purchase.
All of the following statements about debit cards are true except:
It is more difficult to obtain a copyright than it is to obtain a patent
All of the following statements about patents are true except
Public key encryption ensures authentication of the sender
All of the following statements about public key encryption are true except:
Symmetric key encryption is computationally slower
All of the following statements about symmetric key encryption are true except:
Relative dispersion of process for online goods have decreased.
All of the following statements are true except:
Melissa worm spreads through Microsoft Word spreads
All of the following were computer crimes committed in 2011- 2012 except:
Up to 10 years imprisonment for a first offense
All the following are possible penalties for violating the Digital Millennium Copyright Act except
One-click purchasing
Amazon has a patent on
Web site functionality
Amazon's "one click" purchase capability is an example of using ____ to enhance sales.
your online purchasing history being sold to other merchants without your consent
An example of a privacy violation of e-commerce security is:
1.2 trillion
Approximately _____ in annual offline retail sales is influenced by online browsing.
viral marketing
Axe's posting of video ads online that were subsequently forwarded and shared by millions of internet users is an example of:
phishing attacks
Botnets are typically used for all of the following except:
$10
CAN- SPAM imposes fines of ____ for each unsolicited pornographic email.
percentage of times an ad is clicked
CTR is a measure of the:
number of http request
Hits are a measure of the:
recipient who have expressed an interest in receiving messages from the advertiser:
Direct email marketing refers to marketing emails sent to:
Infringement
Disputes over Federal trademarks involves establishing
Simplified choice
Do not track falls under which of the following principles in the FTC new privacy framework?
Copyright law
Downloading music tracks on bike record companies without paying for them
50 million
For a Web site that has 5 million visitors a month, and where on average, a visitor makes 10 page requests per visit, there will be entries in the transaction log for each month.
content quality
Frequency of Web sites use is a function of four independent variables : Web site organization, perceived ease of use, perceived usefulness of the Web sites, and:
Privacy
Google Gmail advertising has raised concerns about which of the following issues?