ECON 139 - Chapter 5, ECON139 Chapter 11, E-commerce (Chapters Vary)
Adware
A PUP that serves pop-up ads to your computer
Merchant Account
A bank account that allows companies to process credit card payments and receive funds from those transactions
Secure Negotiated Session
A client-server session in which the URL of the requested document, along with the contents, contents of forms, and the cookies exchanged, are encrypted
Virus
A computer program that has the ability to replicate or make copies of itself, and spread to other files
Pretty Good Privacy (PGP)
A widely used e-mail public key encryption software program
Bill presentment
A(n) _____ service provides an electronic version of an invoice with all of the details that would appear in the printed document.
Which of the following statements is not true? A) Apple's Touch ID stores a user's actual fingerprint B) Biometric devices reduce the opportunity for spoofing C) A retina scan is an example of a biometric device D) Biometric data stored on an iPhone is encrypted
A) Apple's Touch ID stores a user's actual fingerprint
A template test is a form of which type of testing?
A/B testing
False
Advertisers pay less to have their ad appear near a discussion of a technology related to their product or on a page that reviews the product.
White Hats
"Good" hackers who help organizations locate and fix security flaws
In 2016, there were more than ________ Internet hosts
1 billion
Telephone based wireless Internet
3 G: GSM & CDMA
In 2016, the world's online population was estimated to be around:
3.3 billion.
Pinterest visitors spend ________ a month on Facebook.
6.5 minutes
The size of the B2B market in 2017 was estimated at
6.7 trillion
In 2015, which age group has the fastest growing rate of Facebook usage?
64 and older
Around what percentage of Internet users in the United States use social networks on a regular basis?
85%
In 2016, almost ________ of Americans who access the Internet use a mobile device at least some of the time.
93%
False
All electronic commerce initiatives have the goal of providing revenue.
Virtual Private Network (VPN)
Allows remote users to securely access internal networks via the Internet, using the Point-to-Point Tunneling Protocol (PPTP)
The leading web server software is:
Apache.
When sellers agree informally or formally to set floor prices below which they will not sell on auction items, this is known as: A) discriminatory pricing. B) price matching. C) bid rigging. D) distress pricing.
B) price matching
All of the following statements about public key cryptography are true except: A) public key cryptography uses two mathematically related digital keys. B) public key cryptography ensures authentication of the sender. C) public key cryptography is does not ensure message integrity. D) public key cryptography is based on the idea of irreversible mathematical functions.
B) public key cryptography ensures authentication of the sender.
D) entertainment
B) retail
Shellshock is an example of which of the following? A) mobile malware B) software vulnerability C) denial of service D) botnets
B) software vulnerability
Which of the following measures the average length of stay at a website?
B) stickiness
D) the Internet has expanded the information intensity of the marketplace
B) the Internet has decreased the impact of brands
D) the more cookies are deleted, the less accurate ad server metrics become
B) the data typically stored in cookies includes a unique ID and email address
D) lead generation marketing
B) viral marketing
All of the following experienced high-profile data breaches in 2015 except: A) CVS B) Walgreens C) Amazon D) Experian
C) Amazon
___________ refers to the ability to ensure that an e-commerce site continues to function as intended. A) Non-repudiation B) Authenticity C) Availability D) Integrity
C) Availability
Which of the following is the most meaningful metric for video ads?
C) Completion rate
D) Graph Search
C) Hummingbird
D) Knowledge Graph
C) Panda
D) 30-day
D) 30-day
In 2015, which age group has the fastest growing rate of Facebook usage? A) 12-34 B) 35-45 C) 46-65 D) Adults over 65
D) Adults over 65
The technology used by early communities was limited to mostly: A) instant messaging B) FTP C) email D) bulletin boards
D) bulletin boards
D) yield management
D) yield managment
Which of the following companies use a transaction fee revenue model?
E*Trade
24x7 Service Availability
E-Commerce automates business of enterprises and services provided by them to customers are available anytime, anywhere
Non-Cash Payment
E-Commerce enables use of credit cards, debit cards, smart cards, electronic fund transfer via bank's website and other modes of electronics payment
________ create and sell access to digital markets.
E-procurement firms
Which of the following is an example of B2B e-commerce?
Go2Paper
Internet Protocols
HTTP Email: SMTP (typically used), POP3 (office), IMAP (enables access to email on server) FTP: transport files over internet Telnet: enable communication SSL/ TLS - secure communication
Data Breach
Occurs when an organization loses control over its information to outsiders
False
On Web sites that use the advertising-subscription revenue model, subscribers are typically subjected to much more advertising than they are on sites supported completely by advertising.
________ help you engage your customers in a conversation.
On-site blogs
IP - Internet Protocol
Provides Internet's addressing scheme
Firewall
Refers to either hardware or software that filters communication packets and prevents some packets from entering the network based on a security policy
EDI
Replaces postal mail, fax, and email
Inventory Management
Reports get generated instantly when required
An example of a company using the content provider model is
Rhapsody
Which of the following is an example of a CMS?
WordPress
business plan
a doscument that describes a firm's business model
Which of the following verifies that the business objectives of the system as originally conceived are in fact working?
acceptance testing
All of the following are methods of improving the processing architecture of a website except:
adding web servers.
Web client
any computing device attached to the Internet that is capable of making HTTP requests and displaying HTML pages, most commonly a Windows PC or Macintosh
The process of comparing a website with that of its competitors in terms of response speed, quality of layout, and design is known as:
benchmarking.
Which of the following involves e-mailing another seller's bidders and offering the same product for less?
bid siphoning
Which of the following is a characteristic of the Consolidation phase of e-commerce?
brand extension and strengthening becomes more important than creating new brands
Which of the following is an unfair competitive advantage?
brand name
market creator
builds a digital environment where buyers and sellers can meet, display products, search for products, and establish a price for products
GENI Initiative
develop new core functionality for internet
What are the two most important management challenges in building a successful e-commerce presence?
developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives
Which of the following basic system functionalities is used to display goods on a website?
digital catalog
Which of the following terms is synonymous with e-commerce?
digital commerce
Features on which foundations of e-commerce are built
email instant messaging search engines online chat streaming media cookies
asymmetry
exists whenever one participant in a market has more resources than other participants
Business-to-consumer (B2C) e-commerce in the United States:
has grown at double-digit rates between 2010 and 2016
most used app of the internet
All of the following are website design features that annoy customers except:
multi-browser functionality.
redundancy
multiple duplicate devices and paths in a network
server
network computer dedicated to common functions that the client computers on the network need
The term ________ refers to the advantages conferred as an auction site becomes larger in terms of visitors and products for sale.
network effects
Internet Today
recently exploded without disruption
photonics
the study of communicating with light waves
Web server
web server software or physical server
iMode
wireless standards that is a proprietary service of the Japanese company NTT DoCoMo
IP Address: IP version 6
128 bit, able to handle 1 quadrillion address
Internet Phase 1 - Innovation Phase
1964-1974 - building blocks
Internet Phase 2 - Institutionalization
1975-1995 - large institutions provide funding and legitimization
Web - a service that operates on the internet
1989-1991 web invented by Tim Berners 1993 - Mosaic Web browner 1994 - first commercial web browsers Netscape Navigator
In which year was e-commerce said to have begun
1995
Internet Phase 3 - Commercialization
1995 - Present - private corporations take over, expand internet backbone and local service
Internet 2 Project
350+ institutions collaborate to facilitate revolutionary Internet technologies Goals is to create leading edge very high speed network for national research communication Enable revolutionary Internet applications
Hourglass Model of the Internet
4 layers that looks like a hourglass Applications layer is growing most
When using multivariate testing, if you wish to test two different versions of an image, a button, and a piece of text, how many combinations will you need to test?
8
Which business strategy involves implementing a new, more efficient set of business processes that other firms cannot yet obtain?
strategy of cost competition
Domain Name System (DNS)
system for expressing numeric IP addresses in natural language
In order from beginning to end, the major steps in the SDLC are:
systems analysis/planning; systems design; building the system; testing; and implementation.
Above all, e-commerce is a ________ phenomenon
technology driven
interactivity
technology that allows for two-way communication between merchant and consumer
Midleware Services layer
the "glue" that ties the applications to the communications networks, and includes such services as security, authentication, addresses, and storage repositories
When did the first online communities form?
the 1980s
Which of the following was the first large-scale digitally enabled transaction system in the B2C arena?
the French Minitel
HyperText Transfer Protocol (HTTP)
the Internet protocol used for transferring Web pages
Simple Mail Transfer Protocol
the Internet protocol used to send mail to a server
Uniform Resource Locator (URL)
the address used by a Web browser to identify the location of content on the Web
marketspace
the area of actual or potential commercial value in which a company intends to operate
Which of the following is not a significant influence on a company's competitive environment?
the availability of supportive organizational structures
richness
the complexity and content of a message
Transmission Control Protocol/Internet Protocol (TCP/IP)
the core communications protocol for the Internet
Which of the following is the best definition of transaction cost?
the cost of participating in a market
All of the following are considered a precursor to e-commerce except
the development of the smartphone
profit
the difference between the price a firm is able to charge for its products and the cost of producing and distributing goods
e-business
the digital enablement of transactions and processes within a firm, involving information systems under the control of a firm
packet
the discrete units into which digital message are sliced for transmission over the Internet
Interactivity in the context of e-commerce provides which of the following functionalities?
the enabling of two-way communication between consumer and merchant
Which of the following gives a business model the most credibility with outside investors?
the firm's management team
The existence of many competitors in any one market segment may indicate
the market is saturated
World Wide Web
the most popular service that runs on the Internet; provides easy access to over 8 billion web pages
electronic mail (e-mail)
the most used application of the Internet. Uses a series of protocols to enable messages containing text, images, sound, and video clips to be transferred from one internet user to another.
market strategy
the plan you put together tha details exactly how you intend to enter a new market and attract new customers
All of the following are major social trends in e-commerce in 2016-2017 except for:
the refusal of online retailers to accept taxation of Internet sales.
The term stateless refers to the fact that:
the server does not have to maintain an ongoing dedicated interaction with the client computer.
firm value chain
the set of activities a firm engages in to create final products from raw inputs
value chain
the set of activities performed in an industry or in a firm that transforms raw inputs into final products and services
universal computing
the sharing of files, information, graphics, sound, video, and other object across all computer platforms in thw rolds, regardless of operating systems
personalization
the targeting of marketing messages to specific individuals by adjusting the message to a person's name, interests, and past purchases
barriers to entry
the total cost of entering a new marketplace
reach
the total number of users or customers an e-commerce business can obtain
narrowband
the traditional telephone modem connection, now operating at 56.6 Kbps
D) search engine display ads
A) company website
D) viral marketing
A) context advertising
D) permission marketing
A) customer co-production
e-commerce
the use of the Internet and the Web to transact business. More formally, digitally enabled commercial transactions between and among organizations and individuals
E-commerce can be defined as
the use of the Internet, the Web, and mobile apps to transact business
Which of the following is not a major business trend in e-commerce in 2016-2017?
the weakening revenues of B2B e-commerce
A perfect market is one in which
there are no competitive advantages or asymmetries
The basic value proposition of community providers is:
they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.
Which of the following types of sites typically needs a high percentage of secure pages?
trading
The financial services, travel services, and job placement services industries typically use the ________ business model
transaction broker
E-mailing buyers to warn them away from a seller is a type of auction fraud known as ________.
transaction interference
Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders?
two-tier architecture
E-commerce is available just about everywhere and anytime. This is known as ________.
ubiquity
seven unique features of e-commerce technology
ubiquity, global reach, universal standards, richness, interactivity, information density, personalization/customization
Which of the following involves testing a site program's modules one at a time?
unit testing
Which of the following features of e-commerce technology is related to the concept of network externalities?
universal standards
P2P e-commerce
use of peer-to-peer technology, which enables Internet users to share files and computer resources directly without having to go through a central Web server, in e-commerce
mobile commerce
use of wireless digital devices to enable transactions on the web
Which element of the business model addresses what a firm provides that other firms cannot?
value proposition
A ________ is a networked business ecosystem that coordinates a firm's suppliers, distributors, and delivery firms with its own production needs using an Internet-based supply chain management system.
value web
Which type of investor typically becomes interested in a start-up company after it has begun generating revenue?
venture capital investors
A ________ marketplace supplies products and services of interest to particular industries.
vertical
Howard Rheingold, one of The Well's early participants, coined the term ________ to refer to "cultural aggregations that emerge when enough people bump into each other often enough in cyberspace."
virtual communities
One partial solution to high monitoring costs is ________ pricing. A) fixed B) dynamic C) allocated D) distress
A) fixed
Acquisition rate is a measure of the:
A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages
D) behavioral
A) query-driven
D) click fraud
A) social search
D) versioning
A) the Law of One Price
Which of the following is an example of an on-demand service company?
Airbnb
Spam (junk) Web Sites
Also referred to as link farms; promise to offer products or services, but in fact are just collections of advertisements
True
Although online banks let customers pay their bills electronically, most customers still receive their bills in the mail.
All of the following use a social network marketing strategy except:
Amazon
Which of the following is not considered a portal
Amazon
______ is an example of e-business
Amazon's inventory control system
All of the following use an advertising revenue model except:
Amazon.
Hash Function
An algorithm that produces a fixed-length number called a hash or message digest
Digital Cash
An alternative payment system in which unique, authenticated tokens represent cash value
Paywall
An approach where free content is available up to a point at which fees begin, is called a _____.
Risk Assessment
An assessment of the risks and points of vulnerability
Hacker
An individual who intends to gain unauthorized access to a computer system
False
An organization's Web presence is of lesser importance than its presence in the physical world.
Phishing
Any deceptive, online attempt by a third party to obtain confidential information for financial gain
Web Server software
Apache, Microsoft IIS basic capabilities: security services, FTP, search engine, data capture
All of the following offer website building tools except:
Apache.
Trojan Horse
Appears o be benign, but then does something other than expected. Often a way for viruses or other malicious code to be introduced into a computer system
Man-in-the-middle Attack (MitM)
Attack in which the attacker is able to intercept communications between two parties who believe they are directly communication with one another, when in fact the attacker is controlling the communications
Pharming
Automatically redirecting a Web link to an address different from the intended one, with the site masquerading as the intended destination
D) The law applies to email, texts, and social media messaging
B) The law has no impact on companies located within the United States
Which of the following statements illustrates the network effects that portals are subject to? A) Specialized vertical market portals attract only a small percentage of the audience, while a few large megaportals garner most of the market. B) The value of the portal to advertisers and consumers increases geometrically as reach increases. C) The greater the amount of content provided by a portal, the greater its value to the community. D) The greater number of portals available, the greater the potential audience for each.
B) The value of the portal to advertisers and consumers increases geometrically as reach increases.
Recency refers to the:
B) Time elapsed since the last visit made by a customer
Which of the following measures the percentage of customers who purchase once, but never return within a year?
B) attrition rate
D) anonymous browsing
B) firewalls
D) bait-and-switch
B) flash marketing
D) interactivity
B) information density
PCI-DSS is a standard established by which of the following? A) the banking industry B) the credit card industry C) the federal government D) the retail industry
B) the credit card industry
D) Free products and services can help build market awareness.
B) the free pricing strategy was born in the early days of the Web
D) reach
B) unique visitors
Internet Network Architecture
Backbone: high bandwidth fiber optic cable networks Private Networks owned by a variety of NSP Bandwidth 155 Mbps - 2.5 Gbps (bits)
Which of the following was not able to successfully implement a freemium business model?
Baremetrics
Which of the following is not a community provider?
Blue Nile
Which of the following is not an example of the bricks-and-clicks e-tailing business model?
Bluefly
Business Models for E-Commerce
Business-to-Business Business-to-Consumer Consumer-to-Business Business-to-Government Government-to-Business Government-to-Citizen
False
Business-to-business sellers are passive adopters of the Web catalog model.
A ________ permits the consumer to monitor specific auctions of interest, requiring the consumer to pay close attention only in the last few minutes of bidding.
watch list
The profit a seller makes at auction is a function of all of the following except:
watch lists.
Online forum & chat
web apps that enables internet users to communicate with each other.
Which of the following refers to the practice of researching a product online before purchasing it at a physical store?
webrooming
leverage
when a company uses its competitive advantages to achieve more advantage in surrounding markets
Which business application is associated with the technological development of local area networks and client/server computing?
workgroup automation
Which of the following has the Internet Advertising Bureau urged advertisers to abandon? A) HTML B) HTML5 C) Adobe Flash D) Adobe Acrobat
C) Adobe Flash
The attack on Dyn, Twitter, Amazon, and other major organizations in October 2016, is an example of which of the following? A) SQL injection attack B) browser parasite C) DDoS attack D) MitM attack
C) DDoS attack
D) It enables worldwide customer service and marketing communications.
C) It allows video, audio, and text to be integrated into a single marketing message and consuming experience.
D) lead generation marketing
C) affiliate marketing
Which of the following is not one of the three defining characteristics of a portal? A) commerce B) content C) auctions D) navigation of the Web
C) auctions
Which of the following measures the percentage of emails that could not be delivered?
C) bounce-back rate
Which of the following measures the ratio of items purchased to product views?
C) browse-to-by ratio
All of the following are benefits of auctions except: A) more efficient price discovery. B) lower transaction costs. C) decreased price transparency. D) increased market efficiency.
C) decreased price transparency
Proxy servers are also known as: A) firewalls B) application gateways C) dual home systems D) packet filters
C) dual home systems
Instagram is an example of a(n): A) interest-based social network B) affinity community/social network C) general community D) practice network
C) general community
D) product evaluation skills of the consumer
C) knowledge consumers have about how to conduct online transactions
D) fixed cost
C) marginal cost
D) number of pages viewed
C) number of HTTP requests
D) keyword advertising
C) programmatic advertising
________ refers to the use of secondary user IDs or bidders who have no actual intention to buy to artificially raise the price of an item. A) Bid manipulation B) Shill feedback C) Shill bidding D) Bid rigging
C) shill bidding
D) sponsorship marketing
C) social marketing
D) freemium
C) surge pricing
Public Key Infrastructure (PKI)
CAs and digital certificate procedures hat are accepted by all parties
________ provides a set of standards for communicating between a browser and a program running on a server that allows for interaction between the user and server.
CGI
Which of the following technologies is used to separate the design and presentation of content from the content creation process?
CMS
Cannibalization
Channel conflict is also referred to as _____.
Ruby on Rails is based on which of the following philosophies?
CoC
Botnet
Collection of captured bot computers
Exploit Kit
Collection of exploits bundled together and rented or sold as a commercial product
True
Companies can adapt their catalog revenue model online by replacing or supplementing their print catalogs with information on their Web sites.
True
Companies change their revenue models to meet the needs of the new changing Web users.
True
Companies that have existing sales outlets and distribution networks often worry that their Web sites will take away sales from those outlets and networks.
Fee-for-service
Companies using _____ revenue model charge a fee based on the value of the service provided on the Web.
True
Companies using a digital content revenue model sell rights to access the information they own.
Which of the following is not a major technology trend in e-commerce in 2016-2017?
Computing and networking component prices increase dramatically.
Cloud Computing
Computing power and software over the internet (Google Apps) Fastest growing form of computing Radically reduces cost of building and operating web sites, infrastructure, IT support, hardware and software
Which of the following is an example of C2C e-commerce?
Craigslist
Hacktivism
Cybervandalism and data theft for political purposes
All of the following are prominent hacktivist groups except: A) Anonymous B) LulzSec C) Impact Team D) Avid Life
D) Avid Life
___________ typically attack governments, organizations, and sometimes individuals for political purposes. A) Crackers B) White hats C) Grey hats D) Hacktivists
D) Hacktivists
Yahoo owns all of the following except: A) Tumblr. B) Flickr. C) Aviate. D) Instagram.
D) Instagram
Priceline is an example of a(n): A) English auction. B) Dutch auction. C) penny auction. D) Name Your Own Price auction
D) Name Your Own Price auction
D) Search engine advertising is the fastest growing type of online advertising.
D) Search engine advertising is the fasted growing type of online advertising.
________ has tentatively agreed to purchase Yahoo. A) AT&T B) Microsoft C) AOL D) Verizon
D) Verizon
D) a tiny graphics file embedded in an email or web page
D) a tiny graphics file embedded in an email or web page
D) conversation
D) conversation
D) email
D) email
ESPN.com is an example of a: A) general purpose portal. B) vertical market portal based on affinity group. C) vertical market portal based on focused content. D) focused content portal.
D) focused content portal
D) native advertising that is displayed on a social media site
D) native advertising that is displayed on a social media site
D) online retailers
D) online retailers
Which of the following is not one of the typical portal revenue sources? A) commissions on sales B) subscription fees C) tenancy deals D) referral fees
D) referral fees
D) rich media
D) rich media
D) targeted banner ads
D) targeted banner ads
D) universal standards
D) universal standards
D) versioning
D) versioning
PDI-DSS (Payment Card Industry-Data Security Standards)
Data security standards instituted by the five major credit card companies
Improved Sales
Dependencies to buy a products reduce at large and sales increases
Authorization Policies
Determine differing levels of access to information assets for differing levels of users
Access Controls
Determine who can gain legitimate access to a network
Data Encryption Standard (DES)
Developed by the National Security Agency (NSA) and IBM. Uses a 56-bit encryption key
US-CERT
Division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses across government and private sectors
Which of the following types of auctions is perfect for sellers that have many identical items to sell?
Dutch Internet auctions
All of the following types of auctions involve single units except:
Dutch Internet.
Advertising / Marketing
E-Commerce increases the reach of advertising of products and services of businesses
Support
E-Commerce provides various ways to provide pre sales and post sales assistance to provide better services to customers
Communication Improvement
E-Commerce provides ways for faster, efficient, reliable communication with customers and partners
All of the following would be considered a direct competitor of Priceline except
ESPN
Which of the following statements is not true?
Economists take a purely technical approach to e-commerce.
Security Organization
Educates and trains users, keeps management aware of security threats and breakdowns, and maintains the tools chosen to implement security
EDI
Electronic Data Interchange
False
Electronic books are rapidly replacing physical books.
E-Commerce
Electronics Commerce
A(n) ________, in which the highest bidder wins, is the most common form of auction.
English auction
Authorization Management System
Establishes where and when a user is permitted to access certain parts of a Web site
Intrusion Detection System (IDS)
Examines network traffic, watching to see if it matches certain patterns or preconfigured rules indicative of an attack
Social Engineering
Exploitation of human fallibility and gullibility to distribute malware
Which of the following is an example of social e-commerce?
Backdoor
Feature of viruses, worms, and Trojans that allows attacker to remotely access a compromised computer
Most significant private initiatives
Fiber optics and Mobile wireless internet services
Heartbleed Bug
Flaw in OpenSSL encryption system that allowed hackers to decrypt an SSL session and discover user names, passwords, and other user data
Denial of Service Attack (DoS)
Flooding a Web site with useless traffic to inundate and overwhelm the network
Electronic Billing Presentment and Payment System (EBPP)
Form of online payment system for monthly bills
Extranet
Formed when firms permit outsiders to access their internal TCP/IP networks
Which of the following cannot be used to retrieve objects from a database?
HTML
TCP/IP Protocol Suite:
HTTP: Hyper Text Transfer Telnet: Communicating for remote access FTP: File Transfer Protocol SMTP: Simple Mail Transfer
Black Hats
Hackers who act with the intention of causing harm
Grey Hats
Hackers who believe they are pursuing some greater good by breaking in and revealing system flaws
Intrusion Prevention System (IPS)
Has all the functionality of an IDS, with the additional ability to take steps to prevent and block suspicious activities
________ is the tendency to gravitate toward, and bid for, auction listings with one or more existing bids.
Herd behavior
WiMax
High speed, medium range broadband wireless metropolitan area network
HTML
Hypertext Markup Langauge - most used for websites HTML5 is newest version
Who Governs the Internet
IAB ICANN IESG IETF ISOC W3C ITU
domain name
IP address expressed in natural language
Domain name
IP addresses expressed in natual language 1 IP number can have multiple domain names
The laws of the state
Identify the force preventing U.S. professionals from extending their practices on the Web.
Search Engines
Identify webpage that match queries based on keywords, page ranking Also serve as shopping tools most common internet activity
Which of the following statements about Foursquare is not true?
In 2016, Foursquare decided to refocus its effort on developing a subscription-based revenue model.
Mass media
In the _____ approach, firms prepare advertising and promotional materials about the firm and its products or services and broadcast them to potential customers.
Flexibility
In the context of accessibility, one of the best ways to accommodate a broad range of visitor needs is to build _____ into the Web site's interface.
Cope Today
In the context of professional services using a fee-for-service revenue model, _____ was a pioneer in offering online therapy to patients in the United States.
False
In the fee-for-service model, the fee is based on the number or size of transactions the service providers process.
Authentication Procedures
Include the use of digital signatures, certificates of authority, and public key infrastructure
Malicious Code (Malware)
Includes a variety of threats such as viruses, worms, Trojan horses, and bots
Which of the following statements about Instagram is not true?
Instagram is owned by Twitter.
Yahoo owns all of the following except:
Instagram.
Cybervandalism
Intentionally disrupting, defacing, or even destroying a site
2.5G network
Interim cellular network that provides speeds of 60-144 Kbps using General Packet Radio Switching
IXP
Internet X-change points: hubs where backbone interests with regional and local networks and backbone owners connect with one another
IP
Internet protocol - language in which networks communicate
IP address
Internt address expressed as a 32-bit number that appears as a series of four separate numbers marked off by periods, such as 64.49.254.91
Spoofing
Involves attempting to hide a true identity by using someone else's e-mail or IP address
Security Audit
Involves the routine review of access logs (identifying how outsiders are using the site as well as how insiders are accessing the site's assets)
Identity Fraud
Involves the unauthorized use of another person's personal data for illegal financial benefit
Which of the following is not a characteristic of a perfect competitive market
It is highly regulated
Electronic Bulletin Boards
It is the electronic transfer of money from one bank account to another, either within a single financial institution or across multiple institutions, via computer-based systems, without the direct intervention of the bank staff
CANs
LANs operating within a single organization that leases Internet access directly from regional or national carrier
Future Internet
Latency solutions - differentiated quality of service - Guaranteeing service levels and lower error rates -declining cost - Internet of Things - objects connected via sensors / RFID to internet
An example of a practice network is:
Linux.org.
________ typically include a data flow diagram to describe the flow of information for an e-commerce site.
Logical designs
Drive-by-download
Malware that comes with a downloaded file that a user requests
Worm
Malware that is designed to spread from computer to computer
Ransomware (scareware)
Malware that prevents you from accessing your computer or files and demands that you pay a fine
True
Many classified advertising sites generate substantial revenue, replacing newspapers' historical role as the primary carrier of classified ads.
Fitting Rooms
Many clothing Web sites offer virtual models on which customers can try clothes, such services are referred to as virtual _____.
Which of the following is the most successful of Facebook's apps?
Messenger
Electronic Email
Method of exchanging messages between people using electronics
Which of the following companies was an early investor in Facebook?
Microsoft
CERT Coordination Center
Monitors and tracks online criminal activity reported to it by private corporations and government agencies that seek out its help
True
Most successful advertising on the Web is targeted at specific groups.
Streaming Media
Music, video, other large files sent to users in chunks so that when received and played, file comes through uninterrupted
Which of the following is an example of the affiliate revenue model?
MyPoints
Which of the following early leaders in social networking has been reinvented as a music-oriented social network?
Myspace
Which of the following types of auctions "shields the brand" of the seller?
Name Your Own Price auction
Priceline is an example of a(n):
Name Your Own Price auction.
Cons of Cloud Computing
Need internet all the time that is reliable Sensitive information is stored somewhere out there
Four TCP/IP layers
Network interface layer Internet layer Transport layer Application layer
Internet
Network of networks, links businesses, educational institutions, gov agencies, and individuals
Which of the following has the highest penetration of social network usage among the general population?
North America
Which of the following is a standard that makes it possible to access data from any application regardless of the database and operating system software being used?
ODBC
The color settings on computer monitors vary widely
One problem that the Web presents for clothing retailers of all types that _____.
Maladvertising
Online advertising that contains malicious code
Fee-for-transaction
Online stock brokerage firms use a(n) _____ revenue model, which allows them to charge their customers a commission for each trade executed.
Improved Sales
Orders for the products can be generated anytime, anywhere without any human intervention
Packet Switching Process
Original text message --> digitized into bits --> broken into packets --> header info added to each packet indicating destination, and other control information such as how many bits are in the total message and how many packets
Which of the following statements is not true?
Overall transaction costs have dropped dramatically.
Which of the following is the most commonly used server-side scripting language?
PHP
False
People spend less time at a sticky Web site and are thus, exposed to very little advertising.
Online Stored Value Payment System
Permits consumers to make instant, online payments to merchants and other individuals based on value stored in an online account
Communication modes
Personal contact and mass media approaches are often called _____.
Security Token
Physical device or software that generates an identifier that can be used in addition to or in place of a password
Utility Programs
Ping: Tracert: how packet traveled
All of the following can be considered a direct or indirect competitor of Amazon except
Priceline
Mobile Platform
Primary Internet access Tablets Smartphones Smart watches
Potentially Unwanted Program (PUP)
Program that installs itself on a computer, typically without the user's informed consent
False
Publishers do not experience sales losses as a result of online distribution.
Django is based on which of the following?
Python
Which of the following is an example of the subscription revenue model?
Scribd
________ is used to process certificates and private/public key information.
Secure Sockets Layer/Transport Layer Security
Routing Internet Messages: TCP/IP and Packet Switching
Sending prepares address, TCP/IP breaks data into packets, packets travel router to router, reassembled at destination point
______ refers to the use of secondary user IDs or bidders who have no actual intention to buy to artificially raise the price of an item.
Shill bidding
Which of the following is not a major business trend in e-commerce in 2016-2017?
Small businesses and entrepreneurs are hampered by the rising cost of market entry caused by increased presence of industry giants.
Each of the following is one of the top six social network sites in the United States except:
Snapchat.
Which of the following statements about e-commerce in the United States in 2016 is not true?
Social e-commerce generates more revenue than mobile e-commerce
Proxy Server (proxy)
Software server that handles all communications originating from or being sent to the Internet, acting as a spokesperson or bodyguard for the organization
Zero-Day Vulnerability
Software vulnerability that has been previously unreported and for which no patch yet exists
________ technologies are technologies that enable the incremental improvement of products and services.
Sustaining
________ are the types of information systems capabilities needed to meet business objectives.
System functionalities
Intranet
TCP/IP network located within a single organization for communications and processing (protected from being access from external)
SQL Injection Attack
Takes advantage of poorly coded Web application software that fails to properly validate or filter data entered by a user on a Web page
Cipher Text
Text that has been encrypted and thus cannot be read by anyone other than the sender and the receiver
True
The Internet is not a mass medium, even though a large number of people now use it and many companies seem to view their Web sites as billboards or broadcasts.
Advertising-subscription mixed
The New York Times and The Wall Street Journal use the _____ revenue model.
Which of the following was the original "killer app" that made the Internet commercially interesting and extraordinarily popular?
The Web
Which of the following statements about the Web is not true?
The Web is the technology upon which the Internet is based.
True
The Web provides a way for technical content developers to reach retail customers.
One of the first online virtual communities was:
The Well.
Personal Shopper
The _____ is an intelligent agent program that learns the customer's preferences and makes suggestions.
Stickiness
The _____ of a Web site is its ability to keep visitors at the site and attract repeat visitors.
Privacy
The ability to control the use of information about oneself
Availability
The ability to ensure that an e-commerce site continues to function as intended
Nonrepudiation
The ability to ensure that e-commerce participants do not deny (i.e., repudiate) their online actions
Integrity
The ability to ensure that information being displayed on a Web site or transmitted or received over the Internet has not been altered in any way by an unauthorized party
Confidentiality
The ability to ensure that messages and data are available only to those who are authorized to view them
Authenticity
The ability to identify the identify of a person or entity with whom you are dealing on the Internet
Implementation Plan
The action steps you will take to achieve the security plan goals
True
The advertising-support revenue model is the one used by broadcast network television in the United States.
True
The defining characteristic of the mass media promotion process is that the seller is active and the buyer is passive
Reintermediation
The introduction of a new intermediary, such as a fee-for-transaction Web site, into a value chain is called _____.
Which of the following statements is true about the traditional tradeoff between the richness and reach of a marketing message prior to the development of the Web?
The larger the audience reached, the less rich the message.
Which of the following is not true regarding e-commerce today?
The market middlemen disappeared.
Advanced Encryption Standard (AES)
The most widely used symmetric key algorithm offering 128-, 192-, and 256-bit keys
Encryption
The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the receiver. The purpose of encryption is (a) to secure stored information and (b) to secure information transmission
Biometrics
The study of measurable biological or physical characteristics
information density
The total amount and quality of information available to all market participants
Which of the following statements illustrates the network effects that portals are subject to?
The value of the portal to advertisers and consumers increases geometrically as reach increases.
True
There has been little consensus on how to measure and charge for site visitor views, even after almost 20 years of experience with the medium.
Which of the following best describes the early years of e-commerce?
They were a technological success but a mixed business success
Which of the following is not an element of friction-free commerce?
Transaction costs are high.
TCP
Transmission Control Protocol - establishes connection among sending and receiving Web computers Handles assembly of packets at point of transmission and reassembly at receiving
Facebook was the leader in U.S. ad spending revenues on social networks in 2015. What company earned the second most amount of ad spending revenue?
In 2015, Fortune 500 companies used ________ more than Facebook.
Which of the following is the second leading social network in the United States in terms of number of members?
Public Key Cryptography
Two mathematically related digital keys are used: a public key and a private key. The private key is kept secret by the owner, and the public key is widely disseminated. Both keys can be used to encrypt and decrypt a message. However, once the keys are used to encrypt a message, that same key cannot by used to unencrypt the message
Ben Shneiderman
Two pioneers of usability testing are _____ and Jakob Nielsen.
Paperless
Type of exchange of business information in E-Commerce
Bot
Type of malicious code that can be covertly installed on a computer when connected to the Internet. Once installed, the bot responds to external commands sent by the attacker
Virtual Currency
Typically circulates within an internal virtual world community or is issued by a specific corporate entity, and used to purchase virtual goods
Which of the following is not true about the use of apps?
Users still spend less time using apps than they do using desktops or mobile websites.
Distributed Denial of Service Attack (DDoS)
Using numerous computers to attack the target network from numerous launch points
Which of the following is a leading social network in Russia?
VK
________ and ________ are typically the most easily identifiable aspects of a company's business model.
Value proposition, revenue model
False
Web catalog retailers typically refrain from having return policies on unused merchandise.
False
Web companies with unprofitable growth phases for long durations retained their revenue models to grow successfully.
______ is not an open source software tool.
WebSphere
Facebook purchased which of the following for $22 billion?
True
When customers buy a product, they are also buying the service element included with that product.
_______ refers to the feeling that one has paid too high a price for an item won at auction.
Winner's regret
WPA2
Wireless security standard that uses the AES algorithm for encryption and CCMP, a more advanced authentication code protocol
Cracker
Within the hacking community, a term typically used to denote a hacker with criminal intent
All of the following are major players in hosting/co-location/cloud services except:
WordPress.
Internet
Worldwide network of computer networks built on common standards
All of the following are examples of social networks except:
Y Combinator
After Google, the next portal/search engine site with the most unique visitors is:
Yahoo.
Addressable media
_____ are advertising efforts directed to a known recipient and include mail, telephone calls, and e-mail.
Usability
_____ is an important element of creating an effective Web presence.
Usability testing
_____ is the testing and evaluation of a site by its owner to ensure ease of use for site visitors.
LexisNexis
_____ offers a variety of information services for lawyers and law enforcement officials, court cases, public records, and resources for law libraries.
Digital products
_____ tend to have large up-front costs. Once those costs are incurred, additional units can be made at very low additional cost.
intranet
a TCP/IP network located within a single organization for purposes of communications and information processing
e-commerce business model
a business model that aims to use and leverage the unique qualities of the Internet and the World Wide Web
cable modem
a cable television technology that piggybacks digital access to the Internet on top of the analog video cable providing television signals to a home
sales revenue model
a company derives revenue by selling goods, information, or services
subscription revenue model
a company offers its users content or services and charges a subcription fee for access to some or all of its offerings
advertising revenue model
a company provides a forum for advertisements and receive fees from advertisers
transaction fee revenue model
a company receives a fee for enabling or executing a transaction
affiliate revenue model
a company steers business to an affiliate and receives a referral fee or percentage of the revenues from any resulting sales
application services provider (ASP)
a company that sells access to Internet-based software applications to other companies
e-distributer
a company that supplies products and services directly to individual businesses
first mover advantage
a competitive market advantage for a firm that results from being the first into a marketplace with a serviceable product or service
Internet2
a consortium of more than 200 universities, government agencies, and private businesses that are collaborating to find ways to make the Internet more efficient
first mover
a firm that is first to market in a particular area and that moves quickly to gather market share
IP telephony
a general term for the technologies that use VoIP and the internet;s packet-switched network to transmit voice and other forms of audio communication over the Internet
perfect market
a market in which there are no competitive advantages or asymmetries because all forms have equal access to all the factors of production
package switching
a method of slicing digital messages into packets, sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive at their destination
client/server computing
a modlel of computing in which powerful personal computers are connected in a network togetherwith one or more servers
Internet Message Access Protocol (IMAP)
a more current e-mail protocol that allows users to search, organize, and filter their mail prior to downloading it from the server
eXtensible Markup Language (XML)
a new markup language specification developed by the W3C (World Wide Web Consortium) that is designed to describe data and information
diffserv (differentiated quality of service)
a new technology that assigns levels of priority to packets based on the type of data being transmitted
client
a powerful personal computer that is part of a network
Ping
a program that allows you to check the connection between your client and the server
Secure Sockets Layer (SSL)
a protocol that secures communications between the client and the server
Post Office Protocol 3 (POP3)
a protocol used by the client to retrieve mail from an Internet server
WAP (Wireless Application Protocol)
a realtively new protocol that can support virtually any wireless network and is supported by every operating system
GigaPop
a regional Gigabit Point of Presence, or point of access to the Internet2 network, that supports at least one gigabit (1 billion bits) per second information transfer
business model
a set of planned activites designed to result in a profit in a marketplace
business strategy
a set of plans for achieving superior long-term returns on the capital invested in a business firm
protocol
a set of rules and standards for data transfers
IP mutlicasting
a set of technologies that enables efficient delivery of data to many locations on a network
All of the following are basic functionality provided by web servers except:
a shopping cart.
commoditization
a situation where there are no differences among products or services, and the only basis of choosing products is price
The early years of e-commerce are considered
a stunning technological success
Digital Subscriber Line (DSL)
a telephone technology for delivering high-speed access through ordinary telephone lines found in homes or businesses
Telnet
a terminal emulation program that runs in TCP/IP
cookie
a tool used by websites to sotre information about a user. When a visitor enters a website, the site sends a small text file to the users computer so that info from the site can be loaded more quickly for future vists.
friction-free commerce
a vision of commerce in which information is equally distributed, transaction costs are low, prices can be dynamically adjusted to reflect actual demand, intermediaries decline, and unfair competitive advantages are eliminated
Hypertext
a way of formatting pages with embedded links that connect documents to one another, and that also link pages to other objects such as sound, video, or animation
competitive advantage
achieved by a firm when it can produce a superior product a superior product and/or bring the product to market at a lower price than most, or all, of its competitors
All of the following are important factors in search engine optimization except:
adhering to privacy policies.
Stickiness is an important attribute for which of the following revenue models?
advertising revenue model
Which of the following is a community of members who self-identify with a demographic or geographic category?
affinity community
NaturallyCurly is an example of a(n):
affinity community.
Healthboards is an example of a(n) ________ social network.
affinity-based
The early years of e-commerce were driven by all of the following factors except
an emphasis on exploiting traditional distribution channels
exchange
an independent digital electronic marketplace where suppliers and commercial purchasers can conduct transactions
T1
an international teleport standards for digital communication that offers guaranteed delivery at 1.54 Mbps
T3
an international teleport standards for digital communication that offers guaranteed delivery at 45 Mbps
A wealthy individual who invests personal funds in a start-up in exchange for an equity share in the business is referred to as a(n) ________.
angel investor
information asymmetry
any disparity in relevant market information among parties in a transaction
second generation (2G) cellular networks
are relatively slow circuit-switched digital networks that can transmit data at about 10 Kbps
All of the following are examples of Web 2.0 sites and applications except
auction sites
Which of the following is not one of the three defining characteristics of a portal?
auctions
ubiquity
available just about everywhere, at all times
Which of the following describes the basic web policy of large firms during the Invention period?
basic, static website depicting firm's brand
AOL is focusing its strategy on all of the following except:
being an ISP.
The technology used by early online communities was limited to mostly:
bulletin boards.
Big Band
can accommodate
Advantages of dynamic page generation include all of the following except:
client-side execution of programming
Pathping
combines the functionality offered by Ping and Tracert
Which element of the business model refers to the presence of substitute products in the market?
competitive environment
routing algorithm
computer program that ensures that packets take the best available path toward their destination
Last Mile
connection from user's device to internet 2 basic types of wireless - telephone - computer network based
fiber-optic cable
consists of up to hundreds of strands of glass or plastic that use light to transmit data
C2C e-commerce
consumers selling to other consumers
eBay uses all of the following business models except:
content provider.
Offline media is typically used for all of the following marketing activities except:
conversation
The primary way a website personalizes the content presented to a visitor is through the use of:
cookies
e-procurement firm
creates and sells acces to digital electronic markets
All of the following are basic information requirements for a product database except
customer ID numbers.
Which system functionality must your website have in order to be able to personalize or customize a product for a client?
customer on-site tracking
The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade.
decreased dramatically
value proposition
defines how a company's product or serive fulfills the needs of customers
latency
delays in messages caused by the uneven flow of information packets through the network
revenue model
describes how the firm will earn revenue, produce profits, and provide a superior return on invested capital
private indistrial network
digital network designed to coordinate the flow of communictions among firms engaged in business together
Over the past decade, the number of exchanges has:
diminished sharply.
Which of the following is a characteristic of e-commerce during the Invention period
disintermediation
Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers?
disintermediation
disintermediation
displacement of market middlmen who trasitionally are intermediaries between producers and consumers by a new direct relationship between manufacturers and content originators with their costomer
Instant Messaging
display words on computer instantly
Innovative entrepreneurs and their business firms that destroy existing business models are referred to as ________.
disruptors
content provider
distributes information content, such as digital news, music, photos, video, and artwork over the Web
Amazon is an example of which of the following business models?
e-distributor
The business model of e-tailers is similar to that of
e-distributors
Which of the following may offer its customers value chain management software?
e-procurement companies
Which of the following is the market leader in C2C auctions?
eBay
Which of the following is an example of an e-commerce first mover that failed?
eToys
scale economics
efficiencies that arise from increasing the size of a business
management team
employees of the company responsible for making the business model work
If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:
enable individual customization of the product by consumers.
TCP/IP
enable services similar to telephone
Web server software
enables a computer to deliver web pages to clients on network, responds to request by sending HTTP request
The amount of time visitors spend on a site is a measure of ________.
engagement
The fact that participating in an Internet auction means that you will need to purchase a computer, learn to use it, and pay for Internet access, is an example of ________ costs.
equipment
Which of the following is a characteristic of the Reinvention phase of e-commerce?
expansion of e-commerce to include services as well as goods
Mobile Apps
explode in 2012 - 20% of mobile owners research products, 35% made purchase
XML
extensible Markup language designed to describe data and information tags used are defined by user
All of the following were visions expressed during the early years of e-commerce except
fast follower advantage
Threatening negative feedback in return for a benefit is an example of:
feedback extortion.
All of the following may lead to a competitive advantage except:
fewer products
Which of the following is not a main factor in determining the overall demand on an e-commerce site?
file sizes of web pages being served
Which of the following is not a primary activity in a firm value chain?
finance/accounting
Which of the following is another name for a revenue model?
financial model
Internet Services Provider (ISP)
firm that provides the lowest level of service in the multi-tiered Internet architecture by leasing Internet access to home owners, small businesses, and some large institutions
One partial solution to high monitoring costs is ________ pricing.
fixed
A strategy designed to compete within a narrow market or product segment is called a ________ strategy.
focus
ESPN.com is an example of a:
focused content portal.
Hypertext
formatted with embedded links - links connect documents to one another
extranet
formed when firms permit outsiders to access their internal TCP/IP networks
Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service?
freemium strategy
Most of the time required to maintain an e-commerce site is spent on
general administration and making changes and enhancements to the system.
Instagram is an example of a(n):
general community/social network
campus area network (CAN)
generally, a local area network operating within a single organization that leases access to the Web directly from regional national carriers
Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?
global reach
WiFI
high speed, fixed broadband wireless lan. different versions for home and business market. Limited range
backbone
high-bandwith fiber-optic cable that transports data across the Internet
All of the following are issues facing Pinterest except
inability to retain users
Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as
incubators
TheSeam is an example of a(n):
industry consortium.
industry consortia
industry-owned vertical marketplace that serve specific industries
Which of the following is not a unique feature of e-commerce technology?
information asymmetry
Which of the following refers to any disparity in relevant market information among parties in a transaction?
information asymmetry
Which of the following is one of the three primary societal issues related to e-commerce?
intellectual property
A Web site designed to give yachting enthusiasts a common discussion area would be classified as a(n):
interest-based social network.
First Mile
internet services that carry bulk traffic over distances older lines replaced with fiber optics
Applications layer
layer of Internet architecture that contains alient applications
Transport Services and Representation Standards layer
layer of Internet architecture that houses the TCP/IP protocol
Network Technology Substrate layer
layer of Internet technology that is composed of telecommunications networks and protocols
All of the following might be part of a website's middle-tier layer except:
legacy corporate applications
Which of the following is not a key element of an elevator pitch?
legal structure
The use of a company's competitive advantage to penetrate surrounding markets is known as ________.
leverage
Which of the following is not one of the top factors a business should consider when planning an Internet auction?
location of auction
Which of the following are the two main components of a systems design?
logical design and physical design
Ultra-wideband (UWB)
low power, short range high bandwidth network
Bluetooth
low speed, short range connection
In the ________ business model, a web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products, and establish prices.
market creator
Which of the following is not a variation of the e-tailer business model?
market creator
A ________ specifically details how you plan to find customers and sell your product.
market strategy
All of the following are basic functionality provided by e-commerce merchant server software except:
marketing analytics.
Which of the following is a physical place you visit to conduct business?
marketplace
marketspace
marketplace extended beyond traditional boundaries and removed from a temporal and geographic location
bandwidth
measures how much data can be transferred over a communications medium within a fixed period of time; is usually expressed in bits per second (bps), kilobits per second (Kbps), or megabits per second (Mbps)
The costs incurred by merchants changing product prices (such as the costs of reentering prices into computer systems) are referred to as:
menu costs
GSM (Global System for Mobile Communications)
mobile communications system widely used in Europe and Asia that uses narrowband Time Division Multiple Access (TDMA)
CDMA (Code Division Multiple Access)
mobile communications system widely used in the United States that used in the United States that uses the full spectrum of radio frequencies and digitally encrypts each call
Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship?
mobile e-commerce
The time spent watching and reviewing auction bids is a part of ________ costs.
monitoring
value web
networked trans-business system that coordinates the value chains of several firms
Which form of testing compares a control page with one that is very different?
new concept test
Third generation (3G) cellular network
new generation of cellular phone standards that can connect users to the Web at 2.4 Mbps
Bluetooth
new technology standard for short-range wireless communication under 100 meters
Which social network functionality allows users to view a list of updates from friends as well as advertisements and notifications in chronological order?
newsfeed
GPRS (General Packet Radio Services)
next generation technology carries data in packets, just like the Internet, but over radio frwquencies that make wireless communication possible
unfair competitve advantage
occurs when one firm develops an advantage based on a factor that other firms cannot purchase
network effect
occurs where users receive value from the fact everyone else uses the same tool or product
service provider
offers services online
portal
offers users powerful Web search tolls as well as an integrated package of content and services all in one place
Unfair competitive advantages occur when
one competitor has an advantage others cannot purchase
WWW
one of internet's most popular services, trillions of webpages
Tracert
one of several route-tracing utilities that allow you to follow the path of a message you send from your client to a remote computer on the Internet
HyperText Markup Language (HTML)
one of the next generation of GMLs that is relatively easy to use in Web page design. HTML provides Web page designers with a fixed set of markups "tags" are used to format a Web page
File Transfer Protocol (FTP)
one of the original Internet services. Part of the TCP/IP protocol that permits users to transfer files from the server to their client computer, and vice versa
B2C e-commerce
online businesses selling to individual consumers
B2B e-commerce
online businesses selling to other businesses
e-tailer
online retail store
Web 2.0
online social networks - services that support communication among networks of friends and peers - blogs - really simple syndication - allows to have digital content automatically send to their computers over the internet - podcasting -wikis -music and video services - VOIP - IPTV - video conferencing and telepresence
MySQL is which of the following?
open source database software
Which of the following is not one of the basic business objectives for an e-commerce site?
optimize system architecture
In general, the key to becoming a successful content provider is to:
own the content being provided
Network Service Provider (NSP)
owns and controls one of the major networks comprising the Internet's backbone
All of the following are business models employed in the online music industry except
peer-to-peer streaming
Which of the following details the actual hardware components to be used in a system?
physical design
marketplace
physical space you visit in order to transact
organizational development
plan describes how the company will organize the work that needs to be accomplished
Client/Server Computing
powerful personal computers (clients) connected in network with one or more servers Offer resources: storing files software applications access to printers
A(n) ________ offers members focused discussion groups, help, information, and knowledge related to an area of shared practice.
practice network
When sellers agree informally or formally to set floor prices below which they will not sell on auction items, this is known as:
price matching.
Which of the following is not a risk or cost of Internet auctions?
price transparency
web browers
primary purpose to display web pages internet explorer: 49% of market mozilla firefox - 18% - open source browser
Really Simple Syndication (RSS)
program that allows users to have digital content, including text, articles, blogs and podcast audio files, automatically sent to their computers over the internet
Wireless markup Language (WML)
programming language for devices using WAP
TCP
protocol that establishes the connections among sending and receiving Web computers and handles the assembly of packets at the point of trasmission, and their reassembly at the receiving end
IP
protocol that provides the Internet's addressing scheme and is responsible for the actual delivery of the packets
ISP (Internet Service Providers)
provide lowest level of service to individuals, small business, and some instititions Types of Services: Narrowband Broadband
Application Layer
provides a wide variety of applications with the ability to access the services of the lower layers
Which of the following allows the consumer to enter a maximum price and the auction software automatically places incremental bids up to that maximum price as their original bid is surpassed?
proxy bidding
Which of the following types of application server monitors and controls access to a main web server and implements firewall protection?
proxy server
The total number of users or customers an e-commerce business can obtain is called:
reach
Which of the following is not one of the typical portal revenue sources?
referral fees
intellectual property
refers to all forms of human expression that can be put into a tangible medium such as text, CDs, or the Web
differentiation
refers to all the ways producers can make their products unique and different to distinguish them from those of competitors
broadband
refers to any communications technology that permits clients to play streaming audio and video files at acceptable speeds-generally anything above 100 Kbps
market opportunity
refers to the company's intended marketspace and the overall potential financial opportunities available to the firm in that marketspace
industry structure
refers to the nature of the players in an industry and their relative bargaining power
competitive environment
refers to the other companies operating in the same marketspace selling similar products
All of the following are steps one can take to right-size a website's hardware platform and meet demands for service except:
replacing static pages with dynamically generated pages.
complimentary resources
resources and assets not directly involved in the production of the product but required for success, such as marketing, management, financial assets, reputation
Internet Layer
responsible for addressing, packing, and routing messages on the Internet
Network Interface Layer
responsible for placing packets on and receiving them from the network medium
Transport Layer
responsible for providing communication with the application by acknowledging and sequencing the packets to and from the application
A firm's ________ describes how a firm will produce a return on invested capital.
revenue model
Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text?
richness
Which of the following refers to the complexity and content of a message?
richness
What is the primary revenue model for an e-distributor?
sales
Portals primarily generate revenue in all of the following ways except:
sales of goods
All of the following are simple steps for optimizing web page content that can reduce response times except:
segmenting computer servers to perform dedicated functions.
Which of the following represent Amazon's primary value proposition(s)?
selection and convenience
All of the following are solutions to the problem of high monitoring costs except:
seller rating systems.
Which of the following involves a concern that one will never know how much the ultimate winner might have paid, or the true value to the final winner?
seller's lament
B2B service provider
sells business services to other firms
database server
server designed to access specific information with a database
ad server
server designed to deliver targeted banner ads
mail server
server that provides e-mail messages
video server
server that serves video clips
Zigbee
short range, low power wireless network for remotely controlling digital devices
Which of the following would you use to verify that links on web pages are valid?
site management tools
transaction broker
site that processes transaction for cosumers that are normally handled in person, by phone, or mail
community provider
sites that create a digital online environment where people with similar interests can transact (buy and sell goods), communicate with like-minded people, and receive interest-related information
Cookies
small text files deposited by web site on user's computer to store information about user, accessed when user next visits web sites - can help personalize web site experience - can pose privacy threat
Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?
social media
Digital Signature (e-signature)
"signed" cipher text that can be sent over the Internet
The overall retail market in the United States in 2016 was estimated at about
$4.8 trillion.
Packet Switching
-divides messages into packets -sent along different communication paths -reassembles packages once they arrive at destination - algorithmic can learn to choose the best possible paths - less expensive than circuit switching
Which of the following features of e-commerce technology allows users to participate in the creation of online content?
social technology
intelligent agent
software program that gathers and/or filters information ona specific topic and the provides a list of results for the user
Web server software
software that enables a computer to deliver Web pages written in HTML to client computers on a network that request this service by sending an HTTP request
router
special-purpose computer that interconnects the computer networks that make up the Internet and routes packets to their ultimate destination as they travel the Internet
universal standards
standards that are shared by all nations around the world
Which of the following is a leading social network in Russia? A) VK B) Tuenti C) Orkut D) Mixi
A) VK
After Google, the next portal/search engine site with the most unique visitors is: A) Yahoo. B) Microsoft. C) AOL. D) Facebook
A) Yahoo
D) consumers look at native ads much more frequently than display ads
B) native advertising is a new form advertising found only online
D) number of pages viewed
B) number of times an ad is served
D) transactive content system
B) CRM system
IP Address: IP version 4
32 bit number can handle up to 4 billion addresses four sets of integer numbers marked off by periods 201.61.186.227 Class C address: Network identified by first three sets, computer identified by last set
Digital Certificate
A digital document issued by a certification authority that contains a variety of identifying information
False
A disadvantage of the Web catalog revenue model is that the products sold in physical stores cannot be sold on the web.
True
A good Web site design can provide many image-creation and image-enhancing features very effectively - it can serve as a sales brochure, a product showroom, a financial report, and employment ad, and a customer contact point.
Information dissemination
A key goal for the Web sites of many not-for-profit organizations is _____.
E-Commerce
A methodology of modern business which addresses the need of business organizations, vendors, and customers to reduce cost and improve the quality of goods and services while increasing the speed of delivery
Browser Parasite
A program that can monitor and change the settings of a user's browser
Spyware
A program used to obtain information such as a user's keystrokes, e-mail, instant messages, and so on
Catalog
A revenue model where the seller establishes a brand image, and then uses the strength of that image to sell through printed information mailed to prospective buyers, who place orders by mail or telephone is called the _____ model.
Near Field Communication (NFC)
A set of short-range wireless technologies used to share information among devices
Security Policy
A set of statements prioritizing the information risks, identifying acceptable risk targets, and identifying the mechanisms for achieving these targets
Digital Envelope
A technique that uses symmetric encryption for large documents, but public key cryptography to encrypt and send the symmetric key
Certification Authority (CA)
A trusted third party that issues digital certificates
Sniffer
A type of eavesdropping program that monitors information traveling over a network
Session Key
A unique symmetric encryption key chosen for a single secure session
D) clickstream data
A) Nielsen ratings
D) Large spammers area among CAN-SPAM's biggest supporters
B) CAN-SPAM prohibits unsolicited email (spam)
D) profiling
B) Hadoop
Conversion rate is a measure of the:
B) Percentage of visitors who become customers
All of the following statements about Apple Pay are true except which of the following? A) Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions B) Apple Pay is based on Touch ID biometric fingerprint scanning C) Apple Pay can be used for mobile payments at the point of sale at a physical store D) Apple Pay relied on NFC chip technology
A) Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions
__________ refers to the ability to ensure that messages and data are only available to those authorized to view them. A) Confidentiality B) Integrity C) Privacy D) Availability
A) Confidentiality
Which of the following statements about Instagram is not true? A) Instagram is owned by Twitter. B) Instagram is a photo-sharing app. C) Instagram is growing more quickly than Facebook. D) In terms of time spent per month by users, Instagram is second only to Facebook.
A) Instagram is owned by Twitter.
Which of the following is not a major trend in e-commerce payments in 2016-2017? A) mobile retail payment volume decreases B) PayPal remains the most popular alternative payment method C) Google refocuses Google Wallet solely on sending and receiving money D) Payment by credit and/or debit card remains the dominant form of online payment
A) Mobile retail payment volume decreases
____________ refers to the ability to ensure that e-commerce participants do not deny their online actions. A) Non-repudiation B) Authenticity C) Availability D) Integrity
A) Non-repudiation
_____________ has the highest penetration of social network usage among the general population. A) North America B) Latin America C) Europe D) Asia-Pacific
A) North America
Confidentiality is sometimes confused with: A) Privacy B) Authenticity C) Integrity D) Non-repudiation
A) Privacy
Which of the following was designed to cripple Iranian nuclear centrifuges? A) Stuxnet B) Flame C) Snake D) Storm
A) Stuxnetd
One of the first online virtual communities was: A) The Well B) Myspace C) AOL D) Salon.com
A) The Well
In 2016, Yahoo revealed that it had experienced which of the following? A) a high profile data breach B) a DDoS attach that shut down its website C) a hacktivist attack to protest its employment policies D) a browser parasite
A) a high profile data breach
A fingerprint scan is an example of which of the following? A) biometrics B) encryption C) IDS D) firewall
A) biometrics
Bitcoins are an example of: A) digital cash B) virtual currency C) a store value payment system D) an EBPP system
A) digital cash
The fact that participating in an Internet auction means that you will need to purchase a computer, learn to use it, and pay for Internet access, is an example of ____________ costs. A) equipment B) fulfillment C) delayed consumption D) monitoring
A) equipment
Threatening negative feedback in return for a benefit is an example of: A) feedback extortion. B) offensive shill feedback. C) defensive shill feedback. D) sending spam.
A) feedback extortion
A ___________ is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network. A) firewall B) virtual private network C) proxy server D) PPTP
A) firewall
A website designed to give horse enthusiasts a common discussion area would be classified as a(n): A) interest-based social network B) affinity community C) practice network D) sponsored community
A) interest-based social network
PayPal is an example of a(n): A) online stored value payment system B) digital checking system C) accumulating balance system D) digital credit card system
A) online stored value payment system
A(n) ________ offers members focused discussion groups, help, information, and knowledge related to an area of shared practice. A) practice network B) general community C) affinity community D) interest-based social network
A) practice network
All of the following are solutions to the problem of high monitoring costs except: A) seller rating systems. B) watch lists. C) proxy bidding. D) fixed pricing.
A) seller rating systems
Software that is used to obtain private user information such as a user's keystrokes or copies of email is referred to as: A) spyware B) a backdoor C) browser parasite D) adware
A) spyware
A digital certificate contains all of the following except the: A) subject's private key B) subjects' public key C) digital signature of the certification authority D) digital certificate serial number
A) subject's private key
E-mailing buyers to warn them away from a seller is a type of auction fraud known as ________. A) transaction interference B) bid siphoning C) bid rigging D) shill bidding
A) transaction interference
___________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. A) Non-repudiation B) Authenticity C) Availability D) Integrity
B) Authenticity
All of the following are examples of social/mobile peer-to-peer payment systems except: A) Venmo B) Bill Me Later C) Square Cash D) Google Wallet
B) Bill Me Later
All of the following types of auctions generally involve single units except: A) English auction. B) Dutch Internet. C) Name Your Own Price auction. D) penny auction.
B) Dutch Internet
______________ is the second leading social network in the United States in terms of monthly unique visitors. A) Twitter B) LinkedIn C) Instagram D) Pinterest
B) LinkedIn
Each of the following is a top six social network site in the United States except: A) Tumblr B) Myspace C) Instagram D) Pinterest
B) Myspace
Which of the following early leaders in social networking has been reinvented as a music-oriented social network? A) Vevo B) Myspace C) Polyvore D) Tumblr
B) Myspace
Which of the following types of auctions "shields the brand" of the seller? A) English auction B) Name Your Own Price auction C) Dutch auction D) penny auction
B) Name Your Own Price auction
________ allows the consumer to enter a maximum price and the auction software automatically places incremental bids up to that maximum price as their original bid is surpassed. A) A watch list B) Proxy bidding C) Sealed bidding D) Price matching
B) Proxy bidding
Which of the following is an example of an online privacy violation? A) Your email being read by a hacker. B) Your online purchasing history being sold to other merchants without your consent. C) Your computer being used as part of a botnet. D) Your email being altered by a hacker.
B) Your online purchasing history being sold to other merchants without your consent.
Bloom is an example of a(n): A) interest-based social network B) affinity community C) sponsored community D) practice network
B) affinity community
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use: A) access controls B) an authorization management system C) security tokens D) an authorization policy
B) an authorization management system
Angler is an example of : A) a worm B) an exploit kit C) phishing D) hacktivisim
B) an exploit kit
Which of the following dimensions of e-commerce security does not involve encryption? A) confidentiality B) availability C) message integrity D) non-repudiation
B) availability
Which of the following involves e-mailing another seller's bidders and offering the same product for less? A) transaction interception B) bid siphoning C) shill bidding D) persistent bidding
B) bid siphoning
Accessing data without authorization on Dropbox is an example of which of the following? A) social network security issue B) cloud security issue C) mobile platform security issue D) sniffing
B) cloud security issue
All of the following are limitations of the existing online credit card payment system except: A) poor security B) cost to consumers C) cost to merchant D) social equity
B) cost to consumers
Which of the following is the market leader in C2C auctions? A) Amazon B) eBay C) uBid D) eBid
B) eBay
The time spent watching and reviewing auction bids is a part of ________ costs. A) pricing B) monitoring C) delayed consumption D) fulfillment
B) monitoring
When did the first online communities form? A) the 1970s B) the 1980s C) the 1990s D) the 2000s
B) the 1980s
What is the most frequent cause of stolen credit cards and card information today? A) lost cards B) the hacking and looting of corporate servers storing credit card information C) sniffing programs D) phishing attacks
B) the hacking and looting of corporate servers storing credit card information
Howard Rheingold, one of The Well's early participants, coined the term ____________, to refer to "cultural aggregations that emerge when enough people bump into each other often enough in cyberspace." A) social networks B) virtual communities C) community portals D) social forums
B) virtual communities
Linden Dollars, created for use in Second Life, are an example of: A) digital cash B) virtual currency C) EBPP D) peer-to-peer payment systems
B) virtual currency
Conficket is an example of a: A) virus B) worm C) Trojan horse D) botnet
B) worm
Which of the following types of auctions is most often associated with sellers that have many identical items to sell? A) English auctions B) Name Your Own Price auctions C) Dutch Internet auctions D) group buying auctions
C) Dutch Internet auctions
A(n) ________, in which the highest bidder wins, is the most common form of auction. A) Dutch Internet auction B) Japanese auction C) English auction D) reverse auction
C) English auction
________ is the tendency to gravitate toward, and bid for, auction listings with one or more existing bids. A) Group buying B) Winner's regret C) Herd behavior D) Bid rigging
C) Herd behavior
In 2015, Fortune 500 companies used _____________ more than Facebook. A) no other social networks B) Tumblr C) LinkedIn D) Pinterest
C) LinkedIn
On which of the following do users spend the least amount of time per month? A) Snapchat B) Tumblr C) LinkedIn D) Pinterest
C) LinkedIn
____________ was an early investor in Facebook. A) Google B) Apple C) Microsoft D) LinkedIn
C) Micosoft
_____________ recently acquired LinkedIn. A) Facebook B) Google C) Microsoft D) Verizon
C) Microsoft
Which of the following statements is not true? A) Most states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred. B) The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers. C) The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates. D) The Federal Trade Commission has asserted that it has authority over corporations' data security practices.
C) The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.
Facebook owns _______________. A) Pinterest B) Snapchat C) WhatsApp D) Tumblr
C) WhatsApp
Which of the following is a community of members who self-identify with a demographic or geographic category? A) practice network B) sponsored community C) affinity community D) interest-based social network
C) affinity community
Healthboards is an example of a(n) ___________ social network. A) practice-based B) interest-based C) affinity-based D) general
C) affinity-based
Which of the following is not an example of an access control? A) firewalls B) proxy servers C) digital signatures D) login passwords
C) digital signatures
26) Which of the following is not an example of a PUP? A) adware B) browser parasite C) drive-by download D) spyware
C) drive-by download
Malware that comes with a downloaded file requested by a user is called a: A) Trojan horse B) backdoor C) drive-by download D) PUP
C) drive-by download
Which of the following is the leading cause of data breaches? A) theft of a computer B) accidental disclosures C) hackers D) DDoS attacks
C) hackers
Which dimension(s) of security is spoofing a threat to? A) integrity B) availability C) integrity and authenticity D) availability and integrity
C) integrity and authenticity
Which of the following is not one of the top factors a business should consider when planning an Internet auction? A) type of product B) type of auction C) location of auction D) bid increments
C) location of auction
The term ________ refer(s) to the advantages conferred as an auction site becomes larger in terms of visitors and products for sale. A) siphoning B) herd behavior C) network effects D) channel expansion
C) network effects
Which social network functionality allows users to view a list of updates from friends as well as advertisements and notification in chronological order? A) message board B) timeline C) newsfeed D) friends' network
C) newsfeed
__________ of procurement officers use auctions to purchase goods. A) Eighty per cent (80%) B) Less than a quarter C) Over one third D) Twenty-five per cent (25%)
C) over one third
What is the first step in developing an e-commerce security plan? A) create a security organization B) develop a security policy C) perform a risk assessment D) perform a security audit
C) perform a risk assessment
Automatically redirecting a web link to a different address is an example of: A) sniffing B) social engineering C) pharming D) DDoS attack
C) pharming
Which of the following is not a risk or cost of Internet auctions? A) delayed consumption costs B) equipment costs C) price transparency D) trust risks
C) price transparency
Which of the following involves a concern that one will never know how much the ultimate winner might have paid, or the true value to the final winner? A) herd behavior B) winner's regret C) seller's lament D) loser's lament
C) seller's lament
Next generation firewalls provide all of the following except: A) an application-centric approach to firewall control. B) the ability to identify applications regardless of the port, protocol, or security evasion tools used. C) the ability to automatically update applications with security patches. D) the ability to identify users regardless of the device or IP address.
C) the ability to automatically update applications with security patches.
A ________ permits the consumer to monitor specific auctions of interest, requiring the consumer to pay close attention only in the last few minutes of bidding. A) bidding fee auction B) channel manager C) watch list D) rating system
C) watch list
Which of the following is an example of an integrity violation of e-commerce security? A) A website is not actually operated by the entity the customer believes it to be. B) A merchant uses customer information in a manner not intended by the customer. C) A customer denies that he or she is the person who placed the order. D) An unauthorized person intercepts an online communication and changes its contents.
D) An unauthorized person intercepts an online communication and changes its contents.
_______________ is an example of a practice network? A) PredictWallstreet B) Instagram C) Debater D) Doximity
D) Doximity
Facebook was the leader in U.S. ad spending revenues on social networks in 2016. What company earned the second most amount of ad spending revenue? A) Snapchat B) LinkedIn C) Pinterest D) Twitter
D) Twitter
________ refers to the feeling that one has paid too high a price for an item won at auction. A) Seller's lament B) Winner's lament C) Loser's regret D) Winner's regret
D) Winner's regret
____________ is not an example of malicious code. A) Scareware B) a Trojan horse C) a bot D) a sniffer
D) a sniffer
An intrusion detection system can perform all of the following functions except: A) examining network traffic B) setting off an alarm when suspicious activity is detected C) checking network traffic to see if it matches certain patterns or preconfigured rules D) blocking suspicious activity
D) blocking suspicious activity
According to Ponemon Institute;s 2015 survey, which of the following was not among the causes of the costliest cybercrimes? A) malicious insiders B) malicious code C) denial of service D) botnets
D) botnets
The amount of time visitors spend on a site is a measure of ________. A) reach B) loyalty C) conversation D) engagement
D) engagement
All of the following are used for authentication except: A) digital signatures B) certificates of authority C) biometric devices D) packet filters
D) packet filters
The profit a seller makes at auction is a function of all of the following except: A) initial pricing B) auction length. C) the number of units for auction. D) watch lists
D) watch lists