insy ecomerce

¡Supera tus tareas y exámenes ahora con Quizwiz!

a tiny graphics file embedded in an email or we page

A Web beacon is: - a tiny graphics file embedded in an e-mail or Web page. -a cookie that carries a virus. -an executable cookie. -an automated applet for performing Web searches.

false

A cell phone's GPS is accurate to within 5 feet of the actual location of the phone TRUE/FALSE

true

Bundling is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices. -true/false

false

By 2012, social marketing had overtaken mobile marketing TRUE/FALSE

109 BILLION

By 2017, mobile commerce revenues are expected to be approximately: $109 million. $1.09 billion. $10.9 billion. $109 billion.

TRUE

Google provides the leading location-based marketing platform. TRUE/FALSE

CREDIT CRADS

In the United States, the primary form of online payment is: -PayPal. -debit cards. -credit cards. -Google Wallet.

true

PayPal requires the recipient of a payment to have a PayPal account to receive funds. TRUE/FALSE

RANSOMEWARE

Reventon is an example of: - a macro virus. -a backdoor. - ransomware. -a bot program.

social networks

Surveys have found that the least influential online marketing format for driving consumers to purchase is: -social networks. -the retailer's Web site. -display ad campaigns. -e-mail campaigns.

Lead Generation Card

Which of the following involves a coupon or other promotional offer that appears in users' Twitter timeline? -Promoted Trend -Lead Generation Card -Promoted Account -Promoted Tweet

DRIVE BY DOWNLOAD

Which of the following is not an example of a PUP? -drive-by download -spyware -adware -browser parasite

The number of smartphone users is still growing faster than the number of tablet users.

Which of the following statements about the use of tablets is not true? - The number of smartphone users is still growing faster than the number of tablet users. -Tablets are the largest source of mobile commerce revenues. -The growth rate of tablet users is expected to slow by 2015. -About 50% of the American Internet population now uses tablets.

confidiality

________ refers to the ability to ensure that messages and data are only available to those authorized to view them. - availabilty -confidentiality -privacy -integrity

percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

cquisition rate is a measure of the: -percentage of visitors who become customers. -percentage of existing customers who continue to buy on a regular basis. -percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages. - percentage of shoppers who do not return within a year after their initial purchase.

marketplace ads

facebook's display ads are called: -Sponsored Ads. -Brand Ads. - Marketplace Ads. -Promoted Ads.

google analytics

hich analytics tool did Fairmont Hotel use to measure the effectiveness of its online marketing and advertising? -IBM Digital Analytics -A custom Hadoop solution -WebTrends -Google Analytics

AMPLIFICATION

Encouraging users to click a Like button is an example of which step in the social marketing process? -community -fan acquisition -amplification -brand strength

20 to 30 cents, $3 to $7

Online bill payments are believed to cost ________ to process compared to ________ for paper bills. $1 to $2, $10 to $20 3 to $7, 20 to 30 cents $10 to $20, $ 1 to $2 $20 to 30 cents, $3 to $7

TRUE

Pinterest's visitors are predominantly women. TRUE /FALSE

TRUE

Promoted Tweets are Twitter's version of Google's Ad Words. TRUE/FALSE

false

Research has found that of all the standard formats of display ads, wide skyscraper ads are the most effective at holding a user's attention. -TRUE/ FALCE

spyware

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: -spyware. -a backdoor. -pupware. -adware.

perform a risk asesment

What is the first step in developing an e-commerce security plan? -Perform a risk assessment. -Create a security organization. -Perform a security audit. -Develop a security policy.

disney playdom

Which children's Web site was fined $3 million in 2011 for collecting and sharing children's personal information without consent of their parents? -Nick Jr. -NeoPets -Disney's Playdom -Emily's Dress Up

google

Which of the following earns the most location-based marketing revenue? -Google -Facebook -Apple -Twitter

information density

Which of the following features of e-commerce technology allows fine-grained, highly detailed information on consumers' real-time behavior to be gathered and analyzed? -social technology -information density -personalization/cust mization -interactivity

VIDEO

Which of the following forms of online advertising is growing the fastest? -sponsorships -video -rich media -paid search

curalate

Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media? -Webtrends -Amplify -Curalate -TweetDeck

afilliate programs

Which of the following is not a feature that is driving the growth of social marketing and advertising? -network notification -affiliate programs -collaborative -shopping -social sign-on

fan aquisition

Which of the following is the first step in the social marketing process? amplification fan acquisition community engagement

Women are more active purchasers on smartphones than men.

Which of the following statements is not true? -Men are more likely than women to buy digital content with a mobile device. -Younger consumers are more likely to research products and prices on mobile devices than older consumers. -Women are more active purchasers on smartphones than men. -Mobile shoppers and buyers are more affluent than the online population in general.

Desktop search revenues are increasing for Google.

Which of the following statements is not true? -Mobile ads account for only 16% of Google's overall ad revenue. -Google charges more for desktop ads than it charges for mobile ads. -Desktop search revenues are increasing for Google. -Mobile search ads generate about $8 billion a year for Google.

tweets

Your Facebook News Feed includes all of the following except: -app activity -tweets. -status updates. -Likes.

13

Companies are not permitted to collect personal information from children under the age of ________ without parental consent. -16 -13 -10 -8

Percentage of visitors who become customers.

Conversion rate is a measure of the: -percentage of shoppers who do not return within a year after their initial purchase. -percentage of existing customers who continue to buy on a regular basis. -percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages. -percentage of visitors who become customers.

versioning

Creating multiple variations of information goods and selling these to different market segments at different prices is called: - customization -bundling -dynamic pricig -versioning

56

The Data Encryption Standard uses a(n) ________-bit key. -8 -56 -512 -256

china

Which of the following countries has been found to have engaged in cyberespionage against Google? -China -Russia -Iraq -Iran

google

Which of the following dominates mobile advertising? -Facebook -Apple -Google -Twitter

location bases mobil marketing

The newest and fastest growing segment of the digital marketing universe is: - location-based -mobile marketing. -Facebook marketing. -Pinterest marketing. -Twitter marketing.

FAN AQUISITION

The number of people exposed to pins is a measure of which of the following? -fan acquisition -brand strength -community -engagement

less tan 1

The overall rate of online credit card fraud is ________ % of all online card transactions. around 5 around 1 around 10 less than 1

subj. private key

A digital certificate contains all of the following except the: -digital certificate serial number - subjects public key -subjects private key -digital signiture of the certification authority

true

About 25% of all search engine requests originate from mobile devices TRUE/FALSE

COST TO CONSUMERS

All of the following are limitations of the existing online credit card payment system except: -poor security. -cost to consumers. -cost to merchant. -social equity

your online purchasing history being sold to other merchants without your consent

An example of a privacy violation of e-commerce security is: -your online purchasing history being sold to other merchants without your consent. -your e-mail being altered by a hacker. -your computer being used as part of a botnet. -your e-mail being read by a hacker.

Facebook would be unable to increase advertising revenues enough.

Facebook's share price fell dramatically after its IPO because investors feared that: -Facebook's new marketing solutions would be difficult to monetize. -Facebook would be unable to increase advertising revenues enough. -New social networks such as Instagram were cannibalizing -Facebook's audience. privacy concerns were driving users away.

TRUE

In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution. TRUE/FALSE

FALSE

In the United States today, single, white, young college-educated males with high income dominate the Internet in terms of percentage of Internet usage TRUE/FALSE


Conjuntos de estudio relacionados

ISEC Chapter 10 Practice Questions

View Set

BIOL220 Development: Reproduction

View Set

Chp 20 Financing the Real Estate Transaction

View Set

翰林-104(下)-BOOK 2-文法選擇(第三次月考) $$$

View Set