Internet marketing Midterm
in the address http://www.company.com/clients.html, which of the following is the top level domain
.com
in 2014, there were an estimated __ internet hosts
1 billion
approximately ____ in annual offline retail sales is influenced by online browsing
1.2 trillion
during which period of time did the institution phase of internet development take place
1975-1995
in 2014, the world's online population was estimated to be around:
2.8 billion
an IPv4 address is expressed as a
32-bit number that appears as a series of four separate numbers separated by periods
retail chains account for around __ % of online retail firm revenues
35
the overall retail market in the united states in 2017 was estimated at about
4.7 trillion
the computer security institute reported in its 2011 survey that approximately ____ percent of responding organization experienced a computer security incident within the previous 12 months
45
in 2012 what was the approximate internet penetration rate for individuals that have attained less than a high-school education?
60 percent
on a typical day, approximately ____ percent of adult users in the united states logs on to the internet
82
a ____ is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer
CRM system
all of the following are methods of securing channels of communication except:
FTP
the ___ helps define the overall structure of the internet
IAB
which of the following organizations involved with internet governance has the united states recently announced it would transition control of
IANA
which of the following organizations coordinates the internet's systems of unique identifiers, such as IP addresses and top-level domain systems?
ICANN
the layer of the internet architecture that ties the application to the communications network and includes such services as security and authentication is called the :
Middleware services layer
which of the following is an example of the affiliate revenue model?
MyPoints
which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other
NFC
which of the following is the most commonly used server-side scripting language?
PHP
all of the following statements about PKI are true except:
PKI guarantees that the verifying computer of the merchant is secure
which of the following statements about responsive web design (rwd) is not true?
RWD works best for sites that have complex functionality
An example of a company using the content provider model is:
Rhapsody
____ is an industry-standard database query and manipulation language
SQL
a system design has two main components:
a logical design and physical design
a web beacon is:
a tiny graphics file embedded in an e-mail or web page
the address used by a browser to identify the location of content on the web is called:
a uniform resource locater
all of the following are issues facing pinterest except:
a. spam b. copyright infringement c. inability to retain users d. scams c
which of the following is not considered a portal
a. yahoo b. amazon c. MSN d. aol
all of the following are methods of improving the processing architecture of a web site except:
adding web servers
All of the following are important factors in web site optimization except:
adhering to accessibility guidelines
the ability to retain user attention and engagement is an important attribute for which revenue model?
advertising revenue model
which of the following is a prominent hacktivist group
anonymous
all of the following offer web site building tools except:
apache
which of the following is not a social marketing technique?
app marketing
___ refers to the ability to identify the person or entity with whom you are dealing on the internet
authenticity
___ refers to the ability to ensure that an e-commerce site continues to function as intended
availability
all of the following can be considered a precursor to e-commerce except:
baxter healthcare's pc based remote order entry system
which of the following types of online market segmentation and targeting involves tracking the actions users take on a web site?
behavioral
where does TLS operate within TCP/IP
between the transport later and the application layer
which of the following demographic groups had the greatest increase in internet access between 2002 and 2012
black, non-hispanic
most of the world's spam is delivered via of the following
botnets
walmart used which of the following market entry strategies?
brand extender
which of the following is a characteristic of the consolidation phase of e-commerce?
brand extension and strengthening becomes more important that creating new brands
which of the following is an unfair competitive advantage?
brand name
which of the following technologies has enabled the internet to grow exponentially to support millions of users, without overloading the network architecture?
client/sever networking
all of the following are major technology trends in e-commerce in 2014-2015 except:
cloud computing enables the creation of big data
which of the following is the primary federal statute used to combat computer crime?
computer fraud and abuse act
which of the following is the top-selling online retail category?
computers/electronics
___ refers to the ability to ensure that messages and data are only available to those authorized to view them
confidentiality
the six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:
confidentiality
the primary way a website is able to personalize the context presented to a visitor is through the use of:
cookies
which of the following is not a mobile messaging application
cortana
all of the following are limitations of the existing online credit card payment system except:
cost to consumers
all of the following are examples of stored value payment systems except:
credit cards
the broadest factor in consumer behavior is:
culture
the nike iD program is an example of which of the following marketing techniques?
customer co - production
which system functionality must your web site have in order to be able to personalize or customize a product for a client?
customer on-site tracking
all of the following statements about debit cards are true except:
debit cards enable consumers to make purchases even if they do not have sufficient funds at the time of purchase
the cost of hardware, software, and telecommunications services needed to build a website have _____ last decade
decreased dramatically
which of the following types of online market segmentation and targeting involves using age, ethnicity, religion, etc?
demographic
what are the two most important management challenges in building a successful e-commerce presence?
developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives
which of the following basic system functionalities is used to display goods on a website?
digital catalog
a person's profession or occupation is part of their:
direct reference group
malware that comes with a downloaded file that a user requests is called a:
drive-by download
which of the following is not an example of PUP?
drive-by download
what type of internet access technology are google and facebook hoping to use to provide internet access to remote parts of the world
drones
w.w. grainger is an example of which of the following business models?
e-distributor
which of the following is not an advantage of client/server computing over centralized mainframe computing?
each client added to the network increases the network's overall capacity and transmizzion speeds
which of the following is not true
economists take a purely technical approach to e-commerce
Which of the following is a characteristic of the reinvention phase of e-commerce
expansion of e-commerce to include services as well as goods
WLAN-based internet access derives from he same technological foundations as telephone-based wireless internet access
false
a company's strong linkages with its customers decrease switching costs
false
a list server is an example of a buy-side application server that provides a database for product descriptions and prices
false
a value proposition defines how a company's product or service fulfills the needs of a customer.
false
first movers are always more successful than follower firms.
false
scale economies are efficiencies that result from flattening the hierarchy of an organization
false
sharing economy companies are characterized by the free sharing of resources between the company and consumers.
false
all of the following may lead to a competitive advantage except:
fewer products
which of the following is not a primary activity in a firm value chain?
finance/accounting
netflix entered the market with a _____ strategy
first mover
the marketing technique known as ___ involves merchant offering products or services for a very low price for a short period of time
flash marketing
which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service?
freemium strategy
which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?
global reach
the concept behind document formatting had its roots in which of the following
gml
which of the following statements about e-commerce in the united states in 2014 is not true?
growth rates for retail e-commerce are higher in the united states than in china
which of the following cannot be used to retrieve objects from a database?
html
which of the following is top concern of internet users about purchasing online?
inability to see and touch before buying
SupplyOn is an example of an
industry consortium
which of the following is a mobile photo-sharing application
which of the following is one of the three primary societal issues to e-commerce
intellectual property
which of the following is currently the most popular web browser
internet explorer
the richness made possible by e-commerce technologies does which of the following?
it allows video, audio, and text to be integrated into a single marketing message and consuming experience.
which of the following is not a characteristic of a perfect competitive market?
it is highly regulated
all of the following are features of cash except:
it provides float
___ is a programming language invented by netscape used to control the objects on an HTML page and handle interactions with the browser
javascript
all of the following might be a part of a web site's middle-tier layer except:
legacy corporate applications
the overall rate of online credit card fraud is ___ percent of all online card transactions.
less than 1
which of the following describes the basic web policy of large firms during the Invention period?
maintain a basic, static web site depicting the firm's brand
according to the computer security institute's 2011 computer crime and security survey, which of the following was the most commonly reported type of attack?
malware infection
the incremental cost of building the next unit of a good is called the:
marginal cost
which of the following is not a variation of the e-tailer business model?
market creator
A ____ specifically details how you plan to find customers and to sell your product
market strategy
all of the following were computer crimes committed in 2011-2012 except:
melissa worm spreads through microsoft word templates
which source of e-commerce revenues has grown from nearly zero prior to 2007 to an estimated $84 billion in 2014
mobile B2C e-commerce
which of the following is not true about the mobile platform
most smart phones use Intel chips
which of the following is a web application that enables internet users to communicate with each other, although not in real time
online forum
mysql is which of the following
open source database software
which of the following examples illustrates the "long tail" phenomenon?
over 50 percent of netflix's 100,000 tiles are rented a tleast once a day by someone
in general, the key to becoming a successful content provider is to:
own the content being provided
all of the following are used for authentication except:
packet filters
what is the last step in the developing an e-commerce security plan?
perform a security audit
botnets are typically used for all of the following except:
phishing attacks
___ is a utility program that allows you to check the connection between your client and a TCP/IP network
ping
which of the following is not a community provider?
priceline
which of the following is not a kind of twitter marketing product
promoted shopping
the transport layer of TCP/IP is responsible for which of the following
providing communication with the application by acknowledging and sequencing the packets to and from the application
all of the following are website design features that annoy customers except:
redundant navigation
all of the following are steps one can take to right-size a web site's hardware platform and meet demands for service except:
replacing static pages with dynamically generated pages.
what is the primary revenue model for an e-distributor?
sales
portals primarily generate revenue in all of the following ways except:
sales of goods
all of the following are simple steps for optimizing web page content that can reduce response times except:
segmenting computer servers to perform dedicated functions.
all of the following are examples of malicious code except:
sniffers
all of the following are traditional online marketing tools except:
social marketing
none of the following payment system offers immediate monetary value except:
stored value/ debit card
toyota's use of the internet to target hispanic customers is an example of targeting a specific:
subculture
a digital certificate contains all of the following except the :
subject's private key
in order from beginning to end, the major steps in the SDLC are:
systems analysis/planning;system design; building the system; testing; and implementation
all of the following are online communications that are used to support the evaluation of alternative stage of the consumer decision process except:
targeted banner ads
which of the following factors is not a significant influence on a company's competitive environment?
the availability of supportive organizational structures
which of the following is not a key point of vulnerability when dealing with e-commerce?
the credit card companies
all of the following statements about cookies are true except:
the data typically stored in cookies includes a unique ID and e-mail address
interactivity in the context of e-commerce provides which of the following functionalities?
the enabling of two-way communication between consumer and merchant
which of the following gives a business model the most credibility with outside investors?
the firm's management team
which of the following was the first truly large-scale digitally enabled transaction system in the b2c arena?
the french minitel
what is the most frequent of stolen credit cards and card information today?
the hacking and looting of corporate servers storing credit card information
which of the following statements about the internet's impact on marketing is not true?
the internet has decreased the impact of brands
studies of the effects of social "connectedness" on internet purchases indicate that the more "connected" an individual:
the less that individual is influenced by friends' purchases.
all of the following are important clickstream behavior factors except:
the number of advertisements viewed
All of the following are major social trends in e-commerce in 2014-2015 except for:
the refusal of online retailers to accept taxation of internet sales
the term stateless refers to the fact that:
the server does not have to maintain an ongoing dedicated interaction with the client computer
e-commerce can be defined as:
the use of the internet, the web, and mobile apps to transact busniess
which of the following is not a major business trend in e-commerce in 2014-2015
the weakening revenues of b2b e-commerce
which of the following best describes the early years of e-commerce?
they were a technological success but a business failure
TCP/IP operates in which layer of Internet architecture?
transport services and representation standards layer
internet traffic is predicted to do which of the following over the next 5 years?
triple
FiOS is an advanced form of DSL
true
IANA is the organization currently in charge of assigning ip addresses
true
IPv6 provides for 128-bit IP addresses
true
SaaS and PaaS providers can typically provide services at lower costs through scale economies
true
amazon web services is an example of cloud computing
true
http is the internet protocol used to transfer web pages
true
personalization involves targeting marketing messages to specific individuals by adjusting the message based upon a consumer's preference or past purchasing behavior.
true
php is an open source, general purpose scripting language that is most frequently used in server-side web applications to generate dynamic web page content.
true
prior to the development of e-commerce, web sites primarily delivered static HTML pages.
true
retail e-commerce in the united states is expected to continue growing at double-digit growth rates in 2014-2015
true
social technologies change industry structure by shifting programming and editorial decisions to consumers and creating substitute entertainment products
true
storing html pages in ram rather than on a server's hard drive is an inexpensive way to fine-tune the processing architecture of a website
true
the annual maintenance cost for a web site is likely to be as high as its development cost.
true
the emergence of mobile, social, and local e-commerce occurred during the consolidation period of e-commerce
true
the fact that e-commerce is conducted on the basis of universal standards reduces search costs for consumers
true
the internet has shown extraordinary growth patterns compared to other electronic technologies of the past.
true
the internet of things is based on sensors that can collect data and connect to the internet
true
the internet's universal standards can change industry structure by lowering barriers to entry and intensifying competition within an industry.
true
the major hub in the united states where the internet backbone intersects with regional and local networks are now commonly referred to as internet exchange points
true
the online marketplace is characterized by persistent price dispersion
true
the reinvention period of e-commerce is as much a sociological phenomenon as it is a technological or business phenomenon
true
the systems development life cycle methodology that can be used to create an e-commerce web site has five major steps.
true
the term unfit fitness refers to a situation in which employees of a firm have the wrong skills for the current environment
true
using prebuilt templates is typically one of the most cost-effective choices when building an e-commerce site.
true
the jobs act and issuance of enabling regulations by the securities and exchange commission allows a start up company to use crowdfunding to solicit accredited investors to invest in small and early-stage start ups
ture
an e-commerce web site that processes orders required, at minimum, a ____ system architecture
two-tier
involves testing a site program's modules one at a time
unit testing
which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?
universal standards
which of the following features of e-commerce technology is related to the concept of network externalities?
universal standards
all the following are attributes of personalized marketing except:
use of mass media
which of the following types of merchants has the highest share of retail online sales?
virtual (web only)
linden dollars, created for use in second life, are an example of:
virtual currency
an example of a privacy violation of e-commerce security is:
your online purchasing history being sold to other merchants without your consent
which of the following is a server-side technique that detects the attributes of the device making the request, and using predefined templates, loads a version of a site that is optimized for the device
AWD