Exam 2 - Chapter 5 Questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

A(n) _____ is an attachment to an email message or data embedded in a Website that verifies the identity of a sender or Website.

digital certificate

The identification of specific markets to target them with tailored advertising messages is referred to as _____.

market segmentation

T or F: Bartering is a technique used by advertisers to recapture shoppers who abandoned a Website without making a purchase.

False

T or F: Smart card use is restricted to data associated with financial transactions.

False

T or F: With an online transaction processing (OLTP) system, each transaction is accumulated over a period of time and prepared for processing in a large batch of similar transactions.

False

_____ exchanges are open to any set of buyers and sellers within a given market and provide services and a common technology platform to their members.

Independent

Which of the following forms of e-commerce has created an opportunity for many people to make a living out of selling items on auction Websites? 1) Consumer-to-consumer (C2C) e-commerce 2) Business-to-consumer (B2C) e-commerce 3) Consumer-to-business (C2B) e-commerce 4) Business-to-business (B2B) e-commerce

1) Consumer-to-consumer (C2C) e-commerce

_____ is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process. 1) Consumer-to-consumer (C2C) e-commerce 2) Business-to-consumer (B2C) e-commerce 3) Business-to-business (B2B) e-commerce 4) Consumer-to-business (C2B) e-commerce

1) Consumer-to-consumer (C2C) e-commerce

_____ involves reentering data that was not typed or scanned correctly. 1) Data correction 2) Data manipulation 3) Data editing 4) Data encryption

1) Data correction

_____ divides the pool of potential customers into subgroups usually defined in terms of demographic characteristics. 1) Market segmentation 2) Social networking 3) Disintermediation 4) Market augmentation

1) Market segmentation

With _____, business transactions are accumulated over a period of time for processing in a single unit. 1) batch processing systems 2) real-time transaction processing systems 3) online transaction processing systems 4) on-demand processing systems

1) batch processing systems

The ______ is a security technique associated with the use of credit cards at the time of purchase that checks additional digits printed on the back of the credit cards. 1) Payment Card Industry security standard 2) Card Verification Number 3) Advanced Authorization 4) Address Verification System

2) Card Verification Number

In the context of enterprise resource planning (ERP) systems, the most efficient and effective ways to complete a business process are called _____. 1) streamlined processes 2) best practices 3) current approaches 4) process improvements

2) best practices

A(n) _____ is central to individuals and organizations of all sizes and ensures that information can be shared across all business functions and all levels of management to support the running and managing of a business. 1) procurement system 2) enterprise system 3) transaction processing system 4) batch processing system

2) enterprise system

Conversion to an e-commerce or m-commerce system enables organizations to _________. 1) implement an enterprise resource planning (ERP) system 2) improve the level of customer service 3) increase the cost of doing business 4) reinforce consumer-to-consumer (C2C) e-commerce

2) improve the level of customer service

Through e-government, _____. 1) ​only individual citizens can interact with the government 2) ​any government unit, business or individual can interact with the government 3) ​only businesses can interact with the government 4) ​only government agencies can interact with one another

2) ​any government unit, business or individual can interact with the government

Authentication technologies are used by many organizations to _____. 1) confirm the uniform resource locator (URL) of their suppliers' Websites 2) secure sensitive data during e-commerce 3) confirm the identity of a user requesting access to information or assets 4) verify the accuracy of their product descriptions and prices

3) confirm the identity of a user requesting access to information or assets

The information about invoices to customers is tracked by ____ system. 1) value chain system 2) supply chain management 3) transaction processing system 4) product lifecycle management

3) transaction processing system

Which of the following forms of e-commerce is more likely to offer a more customized product offering? 1) Consumer-to-consumer (C2C) e-commerce 2) Business-to-business (B2B) e-commerce 3) ​Business-to-consumer (B2C) e-commerce 4) Business-to-government (B2G) e-commerce

3) ​Business-to-consumer (B2C) e-commerce

Which of the following types of processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms? 1) Batch processing 2) Business intelligence processing 3) Multiple unit processing 4) Online transaction processing

4) Online transaction processing

A small business is currently using a paper-based system for billing, which is slow and error-prone. Which system upgrade will make the process faster and have fewer errors? 1) Manual entry of data into spreadsheet system 2) Scanning hand-written bills 3) Enterprise resource planning system 4) Source data automation

4) Source data automation

According to the classification of enterprise resource planning (ERP) vendors, _____ vendors target medium-sized firms with annual revenues in the $50 million to $1 billion range operating out of one or more locations. 1) Tier I 2) Tier IV 3) Tier III 4) Tier II

4) Tier II

_____ is the use of information and communications technology to simplify the sharing of information, speed formerly paper-based processes, and improve the relationship between citizens and government.

E-government

T or F: A business-to-business (B2B) market is considerably larger than a business-to-consumer (B2C) market.

True

T or F: Lack of trust in online sellers is one of the most frequently cited reasons that some consumers are not willing to purchase online.

True

With _____, transactions are accumulated for as long as necessary to meet the needs of the users of a system.

batch processing systems


Conjuntos de estudio relacionados

Vocab Level F Mastery Test Units 13-15

View Set

ACCT 3001 Adaptive Practice CH 1 - 13

View Set