INSY 3330: Ch. 5-6

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

In the United States, the primary form of online payment is:

credit cards

Which of the following online advertising formats attracted the least amount of spending in 2013?

e-mail

Credit cards are the dominant form of online payment throughout the world.

false

In the United States today, single, white, young college-educated males with high income dominate the Internet in terms of percentage of Internet usage.

false

________ refers to the ability to ensure that e-commerce participants do not deny their online actions.

nonrepudiation

Hits are a measure of the:

number of http requests

Purchasing an online ad on a CPA basis means that the advertiser:

pays only for those users who perform a specific action, such as registering, purchasing, etc.

What is the most frequent cause of stolen credit cards and card information today?

the hacking and looting of corporate servers storing credit card information

A typical response rate for an e-mail campaign would be ________ %.

5

For a Web site that has 5 million visitors a month, and where on average, a visitor makes 10 page requests per visit, there will be ________ entries in the transaction log each month.

50 million

________ refers to the ability to ensure that an e-commerce site continues to function as intended.

Availibility

Botnets are typically used for all of the following except:

phishing attacks

The research firm Cybersource estimated that online credit card fraud in the United States amounted to about ________ in 2012.

3.5 billion

View-through rate measures the ________ response rate to an ad.

30-day

The Data Encryption Standard uses a(n) ________-bit key.

56

"Shoppers" constitute approximately ________ % of the online Internet audience.

90

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

A ________ is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.

CRM system

Which of the following countries has been found to have engaged in cyberespionage against Google?

China

Which of the following is not a feature that is driving the growth of social marketing and advertising?

affiliate programs

Which of the following dimensions of e-commerce security is not provided for by encryption?

availibility

Which of the following is not one of the main stages of the online purchasing process?

browsing

Which of the following is the most important tool in establishing a relationship with the customer?

company Web site

The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:

confidentiality

All of the following are limitations of the existing online credit card payment system except:

cost to consumers

The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time.

flash marketing

Which of the following is the top concern of Internet users about purchasing online?

lack of trust in the purchase process

The overall rate of online credit card fraud is ________ % of all online card transactions.

less than 1%

Which of the following is not one of the main elements of a comprehensive multi-channel marketing plan?

local marketing

None of the following payment systems offers immediate monetary value except:

stored value/debit card

A digital certificate contains all of the following except the:

subject's private key

All of the following statements about cookies are true except:

the data typically stored in cookies includes a unique ID and e-mail address.

Drive-by downloads are now the most common method of infecting computers.

true

Evidence suggests that real-time customer chat increases sales.

true

In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.

true

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

true

Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?

two-factor authentication

Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?

universal standards

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

Authenticity

Which of the following would you implement to collect and analyze your company's big data?

Hadoop

An intrusion detection system can perform all of the following functions except:

blocking suspicious activity

Rustock is an example of which of the following?

botnet

The Nike iD program is an example of which of the following marketing techniques?

customer co-production

Research has found that of all the standard formats of display ads, wide skyscraper ads are the most effective at holding a user's attention.

false

Approximately ________ of annual offline retail sales is influenced by online browsing.

one-third

All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except:

targeted banner ads

Creating multiple variations of information goods and selling these to different market segments at different prices is called:

versioning

Search engine advertising and marketing expenditures in 2013 were approximately:

19.5 billion

Most of the world's spam is delivered via which of the following?

Botnets

Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?

NFC


Kaugnay na mga set ng pag-aaral

Hash Algorithms and Encryption Methods

View Set

Psych Ch. 32 Issues Related to Human Sexuality & Gender Dysphoria

View Set

Chapter 46: Management of Patients with Metabolic Disorders

View Set

Unit 2 Part II Study Guide Second One

View Set

Organizational Management Final- Quizzes and Etc.

View Set