Quiz 2: MKTG 333

¡Supera tus tareas y exámenes ahora con Quizwiz!

Approximately ________ of U.S. Internet users research online but do not buy. - 19% - 8% - 15% - 13%

13%

According to best practices for on-page SEO, what is the recommended amount of characters for the page title? - 150-300 - 50-60 - 60-150 - 155

50-60

When using multivariate testing, if you wish to test two different versions of an image, a button, and a piece of text, how many combinations will you need to test? - 2 -4 -6 -8

8

What is the correct HTML element for inserting a line break? - <break> - <lb> - <b> - <br>

<br>

What is the correct HTML for referring to an external style sheet? - <style src="mystyle.css"> - <stylesheet?mystyle.css</stylesheet> - <link rel="stylesheet" type="text/css" href="mystyle.css">

<link rel="stylesheet" type="text/css" href="mystyle.css">

How can you make a bulleted list with HTML? - <ol> - <list> - <ul> - <dl>

<ul>

All of the following are methods of securing channels of communication except: - digital certificates. - SSL/TLS. - VPN. - FTP.

FTP

Which of the following search engine algorithm updates targets websites that violate Google's guidelines? - Fred - Hummingbird - Penguin - Panda

Fred

Information elements that system must produce in order to achieve business objectives

Information Requirements

What is important for a good website user experience (UX)? - Making sure design elements including colors, layout, typography, etc. are aesthetically pleasing - Making sure all of the business requirements are up-to-date - Making sure you have appropriate money budgeted for ongoing maintenance - Making sure the user's interaction with the site is smooth, streamlined, enjoyable, "frictionless"

Making sure the user's interaction with the site is smooth, streamlined, enjoyable, "frictionless"

All of the following are features of Internet marketing (versus traditional) except: - More tactile - More peer-to-peer - More communal - More participatory

More tactile

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other? - IM - text messaging - DES - NFC

NFC

________ is the ability to ensure that e-commerce participants do not deny their online actions. - Authenticity - Nonrepudiation - Integrity - Availability

Nonrepudiation

Google introduced which of the following changes to its search algorithm to weed out low quality sites from search results? - - Knowledge Graph - Panda - Hummingbird - Penguin

Panda

What is the first step in developing an e-commerce security plan? - Develop a security policy. - Create a security organization. - Perform a risk assessment. - Perform a security audit.

Perform a risk assessment.

What is the first step in developing an e-commerce security plan? - Develop a security policy. - Perform a security audit. -Perform a risk assessment. - Create

Perform a risk assessment.

Which of the following is a Google algorithm update related to local search? - Penguin - Hummingbird - Panda - Possum

Possum

Which of the following statements about responsive web design (RWD) is not true? - RWD tools include HTML5 and CSS3. - RWD works best for sites that have complex functionality. - RWD can be costly. - RWD makes it possible to design a website that automatically adjusts its layout and display according to the screen resolution of the device on which it is being viewed.

RWD works best for sites that have complex functionality.

According to the text, which of the following is not true about search engine advertising? - Spending on search engine advertising constitutes about 44% of all online advertising spending. - Search engine advertising is the slowest growing type of online advertising. - The click-through rate for search engine marketing has been fairly steady over the years. - The top three search engine providers supply over 95% of all online searches.

Search engine advertising is the slowest growing type of online advertising.

The types of information system capabilities needed to achieve business objectives

System Functionalities

There can be many ad groups in one campaign in Google Ads. - True - False

True

What are the two most important factors shaping the consumers decision to purchase online. - Accessibility and Privacy - Personalization and Customization - Hedonism and Nonrepudiation - Trust and Utility

Trust and Utility

What are the two most important factors shaping the consumers decision to purchase online. - Hedonism and Nonrepudiation - Trust and Utility - Accessibility and Privacy - Personalization and Customization

Trust and Utility

All of the following are examples of cryptocurrencies except: - Monero. - Ripple. - Zelle. - Ethereum.

Zelle

All of the following are basic functionality provided by web servers except: - a shopping cart. - site management tools. - security services. - data capture tools.

a shopping cart.

Which of the following verifies that the business objectives of the system are in fact working? - acceptance testing - implementation testing - unit testing - system testing

acceptance testing

Which of the following verifies that the business objectives of the system are in fact working? - unit testing - acceptance testing - system testing - implementation testing

acceptance testing

Website user interface (UI) refers to the - blueprint for a website including layout and structure - appearance and presentation of a website - description of main components of a system and their relationship to one another - user's interaction with a website

appearance and presentation of a website

Website user interface (UI) refers to the - user's interaction with a website - appearance and presentation of a website - description of main components of a system and their relationship to one another - blueprint for a website including layout and structure

appearance and presentation of a website

Which is the correct CSS syntax? - body:color=black; - body {color: black;} - {body;color:black;} - {body:color=black;}

body {color: black;}

The primary way a website is able to personalize the content presented to a visitor is through the use of: - privacy policies. - accessibility rules. - cookies. - site management tools.

cookies XXX

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network. - PPTP - proxy server - firewall - virtual private network

firewall

Which of the following are the two main components of a systems design? - behavioral design and technological design - logical design and physical design - front-end systems and back-end systems - business objectives and technology requirements

logical design and physical design

Which of the following are the two main components of a systems design? - front-end systems and back-end systems - behavioral design and technological design - business objectives and technology requirements - logical design and physical design

logical design and physical design

All of the following are basic functionality provided by e-commerce merchant server software except: - a product catalog. - marketing analytics. - credit card processing. - a shopping cart.

marketing analytics??

Beginning the e-commerce development process with a mobile presence rather than a desktop website is referred to as which of the following? - mobile first design - RWD - RESS - AWD

mobile first design

All of the following are website design features that annoy customers except: - multi-browser functionality. - splash pages. -slow-loading pages. - pop-under ads.

multi-browser functionality.

Search engine optimization (SEO) is best executed when companies focus on what content is important to _____. - publishers - people - advertisers - executives

people

Which of the following is not a practice that degrades the results and usefulness of search engines? - link farms - social search - content farms - click fraud

social search

A digital certificate contains all of the following except the: - subject's public key. -subject's private key. - digital signature of the certification authority. - digital certificate serial number.

subject's private key.

A multi-channel marketing plan contains all of the following except - mobile marketing - website - traditional online marketing - surveys

surveys

All the following statements about symmetric key cryptography are true except: - in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message. - symmetric key cryptography is computationally slower. - symmetric key cryptography is a key element in digital envelopes. - the Data Encryption Standard is a symmetric key encryption system.

symmetric key cryptography is computationally slower

All the following statements about symmetric key cryptography are true except: - symmetric key cryptography is computationally slower. - the Data Encryption Standard is a symmetric key encryption system. - symmetric key cryptography is a key element in digital envelopes. - in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message.

symmetric key cryptography is computationally slower.

There can be many keywords in one Ad Group in Google Ads. - True - False

true

About 8% of Internet users don't shop online reporting issues with the - utility factors and hedonic factors - None of these - accessibility factors and privacy factors - trust factor and hassle factors

trust factor and hassle factors

Which of the following involves testing a site's program modules, or sections of a website, one at a time? - implementation testing - acceptance testing - unit testing - system testing

unit testing

Online shoppers deciding to purchase online consider utility, which includes - Better prices, convenience, speed - Honesty, fairness, delivery - All of these - Perception of credibility, ease of use, perceived risk

Better prices, convenience, speed

Online shoppers deciding to purchase online consider utility, which includes - Honesty, fairness, delivery - All of these - Perception of credibility, ease of use, perceived risk - Better prices, convenience, speed

Better prices, convenience, speed

List of capabilities you want your site to have

Business Objectives

____ uses hundreds or even thousands of computers to attack the target network from numerous launch points. - A Denial of Service (DoS) attack - A man-in-the-middle (MitM) attack - A Distributed Denial of Service (DDoS) attack - Pharming

A Distributed Denial of Service (DDoS) attack

____ uses hundreds or even thousands of computers to attack the target network from numerous launch points. - A man-in-the-middle (MitM) attack - Pharming - A Denial of Service (DoS) attack - A Distributed Denial of Service (DDoS) attack

A Distributed Denial of Service (DDoS) attack

Which of the following is a server-side technique that detects the attributes of the device making the request, and using predefined templates, loads a version of a site optimized for the device? - AWD - mobile first design - RoR - LAMP

AWD

What does CSS stand for? - Cascading Style Sheets - Colorful Style Sheets - Creative Style Sheets - Computer Style Sheets

Cascading Style Sheets

What does CSS stand for? - Computer Style Sheets - Creative Style Sheets - Colorful Style Sheets - Cascading Style Sheets

Cascading Style Sheets

The term for search engines scouring the Internet for content, looking over the code/content for each URL they find is _____. - Ranking - Querying - Crawling - Indexing

Crawling

In order from beginning to end, the major steps in the System Development Lifecycle (SDLC) are: - systems analysis/planning; systems design; building the system; implementation; and testing. - systems analysis/planning; implementation; building the system; and testing. - systems analysis/planning; systems design; building the system; testing; and implementation. - systems design; testing; building the system; and implementation.

systems analysis/planning; systems design; building the system; testing; and implementation.

n order from beginning to end, the major steps in the System Development Lifecycle (SDLC) are: - systems analysis/planning; implementation; building the system; and testing. - systems analysis/planning; systems design; building the system; testing; and implementation. - systems design; testing; building the system; and implementation. - systems analysis/planning; systems design; building the system; implementation; and testing.

systems analysis/planning; systems design; building the system; testing; and implementation.

All of the following are online communications used to support the evaluation of alternatives stages of the consumer decision process except: - social networks. - search engines. - targeted banner ads. - online catalogs.

targeted banner ads.

All of the following are online communications used to support the evaluation of alternatives stages of the consumer decision process except: - targeted banner ads. - online catalogs. - search engines. - social networks.

targeted banner ads.

All of the following are online communications used to support the evaluation of alternatives stages of the consumer decision process except: social networks. search engines. targeted banner ads online catalogs.

targeted banner ads.

The website function of anchoring the brand online refers to - differentiating product. - informing and educating the customer. - the central point for all marketing messages. - None of these

the central point for all marketing messages.

PCI-DSS is a standard established by which of the following? - the credit card industry - the retail industry - the federal government - the banking industry

the credit card industry

PCI-DSS is a standard established by which of the following? - the federal government - the retail industry - the credit card industry - the banking industry

the credit card industry


Conjuntos de estudio relacionados

Introductory Logic Lesson 3 - Extension and Intension

View Set

EAQ Prioritization (Week 3), Week 5 in Class delegation assignment, Week 2 Delegation quiz, EAQ Delegation Wk 2

View Set

The Absolute True Diary of a part time Indian

View Set

Chapter 5, Imperial Reforms and Colonial Protests, 1763-1774

View Set

Public Econ Quizlet 3 Quiz 3, Public Economics Quiz 2, Public Economics: Parts 1 and 2

View Set