Quiz 2: MKTG 333
Approximately ________ of U.S. Internet users research online but do not buy. - 19% - 8% - 15% - 13%
13%
According to best practices for on-page SEO, what is the recommended amount of characters for the page title? - 150-300 - 50-60 - 60-150 - 155
50-60
When using multivariate testing, if you wish to test two different versions of an image, a button, and a piece of text, how many combinations will you need to test? - 2 -4 -6 -8
8
What is the correct HTML element for inserting a line break? - <break> - <lb> - <b> - <br>
<br>
What is the correct HTML for referring to an external style sheet? - <style src="mystyle.css"> - <stylesheet?mystyle.css</stylesheet> - <link rel="stylesheet" type="text/css" href="mystyle.css">
<link rel="stylesheet" type="text/css" href="mystyle.css">
How can you make a bulleted list with HTML? - <ol> - <list> - <ul> - <dl>
<ul>
All of the following are methods of securing channels of communication except: - digital certificates. - SSL/TLS. - VPN. - FTP.
FTP
Which of the following search engine algorithm updates targets websites that violate Google's guidelines? - Fred - Hummingbird - Penguin - Panda
Fred
Information elements that system must produce in order to achieve business objectives
Information Requirements
What is important for a good website user experience (UX)? - Making sure design elements including colors, layout, typography, etc. are aesthetically pleasing - Making sure all of the business requirements are up-to-date - Making sure you have appropriate money budgeted for ongoing maintenance - Making sure the user's interaction with the site is smooth, streamlined, enjoyable, "frictionless"
Making sure the user's interaction with the site is smooth, streamlined, enjoyable, "frictionless"
All of the following are features of Internet marketing (versus traditional) except: - More tactile - More peer-to-peer - More communal - More participatory
More tactile
Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other? - IM - text messaging - DES - NFC
NFC
________ is the ability to ensure that e-commerce participants do not deny their online actions. - Authenticity - Nonrepudiation - Integrity - Availability
Nonrepudiation
Google introduced which of the following changes to its search algorithm to weed out low quality sites from search results? - - Knowledge Graph - Panda - Hummingbird - Penguin
Panda
What is the first step in developing an e-commerce security plan? - Develop a security policy. - Create a security organization. - Perform a risk assessment. - Perform a security audit.
Perform a risk assessment.
What is the first step in developing an e-commerce security plan? - Develop a security policy. - Perform a security audit. -Perform a risk assessment. - Create
Perform a risk assessment.
Which of the following is a Google algorithm update related to local search? - Penguin - Hummingbird - Panda - Possum
Possum
Which of the following statements about responsive web design (RWD) is not true? - RWD tools include HTML5 and CSS3. - RWD works best for sites that have complex functionality. - RWD can be costly. - RWD makes it possible to design a website that automatically adjusts its layout and display according to the screen resolution of the device on which it is being viewed.
RWD works best for sites that have complex functionality.
According to the text, which of the following is not true about search engine advertising? - Spending on search engine advertising constitutes about 44% of all online advertising spending. - Search engine advertising is the slowest growing type of online advertising. - The click-through rate for search engine marketing has been fairly steady over the years. - The top three search engine providers supply over 95% of all online searches.
Search engine advertising is the slowest growing type of online advertising.
The types of information system capabilities needed to achieve business objectives
System Functionalities
There can be many ad groups in one campaign in Google Ads. - True - False
True
What are the two most important factors shaping the consumers decision to purchase online. - Accessibility and Privacy - Personalization and Customization - Hedonism and Nonrepudiation - Trust and Utility
Trust and Utility
What are the two most important factors shaping the consumers decision to purchase online. - Hedonism and Nonrepudiation - Trust and Utility - Accessibility and Privacy - Personalization and Customization
Trust and Utility
All of the following are examples of cryptocurrencies except: - Monero. - Ripple. - Zelle. - Ethereum.
Zelle
All of the following are basic functionality provided by web servers except: - a shopping cart. - site management tools. - security services. - data capture tools.
a shopping cart.
Which of the following verifies that the business objectives of the system are in fact working? - acceptance testing - implementation testing - unit testing - system testing
acceptance testing
Which of the following verifies that the business objectives of the system are in fact working? - unit testing - acceptance testing - system testing - implementation testing
acceptance testing
Website user interface (UI) refers to the - blueprint for a website including layout and structure - appearance and presentation of a website - description of main components of a system and their relationship to one another - user's interaction with a website
appearance and presentation of a website
Website user interface (UI) refers to the - user's interaction with a website - appearance and presentation of a website - description of main components of a system and their relationship to one another - blueprint for a website including layout and structure
appearance and presentation of a website
Which is the correct CSS syntax? - body:color=black; - body {color: black;} - {body;color:black;} - {body:color=black;}
body {color: black;}
The primary way a website is able to personalize the content presented to a visitor is through the use of: - privacy policies. - accessibility rules. - cookies. - site management tools.
cookies XXX
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network. - PPTP - proxy server - firewall - virtual private network
firewall
Which of the following are the two main components of a systems design? - behavioral design and technological design - logical design and physical design - front-end systems and back-end systems - business objectives and technology requirements
logical design and physical design
Which of the following are the two main components of a systems design? - front-end systems and back-end systems - behavioral design and technological design - business objectives and technology requirements - logical design and physical design
logical design and physical design
All of the following are basic functionality provided by e-commerce merchant server software except: - a product catalog. - marketing analytics. - credit card processing. - a shopping cart.
marketing analytics??
Beginning the e-commerce development process with a mobile presence rather than a desktop website is referred to as which of the following? - mobile first design - RWD - RESS - AWD
mobile first design
All of the following are website design features that annoy customers except: - multi-browser functionality. - splash pages. -slow-loading pages. - pop-under ads.
multi-browser functionality.
Search engine optimization (SEO) is best executed when companies focus on what content is important to _____. - publishers - people - advertisers - executives
people
Which of the following is not a practice that degrades the results and usefulness of search engines? - link farms - social search - content farms - click fraud
social search
A digital certificate contains all of the following except the: - subject's public key. -subject's private key. - digital signature of the certification authority. - digital certificate serial number.
subject's private key.
A multi-channel marketing plan contains all of the following except - mobile marketing - website - traditional online marketing - surveys
surveys
All the following statements about symmetric key cryptography are true except: - in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message. - symmetric key cryptography is computationally slower. - symmetric key cryptography is a key element in digital envelopes. - the Data Encryption Standard is a symmetric key encryption system.
symmetric key cryptography is computationally slower
All the following statements about symmetric key cryptography are true except: - symmetric key cryptography is computationally slower. - the Data Encryption Standard is a symmetric key encryption system. - symmetric key cryptography is a key element in digital envelopes. - in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message.
symmetric key cryptography is computationally slower.
There can be many keywords in one Ad Group in Google Ads. - True - False
true
About 8% of Internet users don't shop online reporting issues with the - utility factors and hedonic factors - None of these - accessibility factors and privacy factors - trust factor and hassle factors
trust factor and hassle factors
Which of the following involves testing a site's program modules, or sections of a website, one at a time? - implementation testing - acceptance testing - unit testing - system testing
unit testing
Online shoppers deciding to purchase online consider utility, which includes - Better prices, convenience, speed - Honesty, fairness, delivery - All of these - Perception of credibility, ease of use, perceived risk
Better prices, convenience, speed
Online shoppers deciding to purchase online consider utility, which includes - Honesty, fairness, delivery - All of these - Perception of credibility, ease of use, perceived risk - Better prices, convenience, speed
Better prices, convenience, speed
List of capabilities you want your site to have
Business Objectives
____ uses hundreds or even thousands of computers to attack the target network from numerous launch points. - A Denial of Service (DoS) attack - A man-in-the-middle (MitM) attack - A Distributed Denial of Service (DDoS) attack - Pharming
A Distributed Denial of Service (DDoS) attack
____ uses hundreds or even thousands of computers to attack the target network from numerous launch points. - A man-in-the-middle (MitM) attack - Pharming - A Denial of Service (DoS) attack - A Distributed Denial of Service (DDoS) attack
A Distributed Denial of Service (DDoS) attack
Which of the following is a server-side technique that detects the attributes of the device making the request, and using predefined templates, loads a version of a site optimized for the device? - AWD - mobile first design - RoR - LAMP
AWD
What does CSS stand for? - Cascading Style Sheets - Colorful Style Sheets - Creative Style Sheets - Computer Style Sheets
Cascading Style Sheets
What does CSS stand for? - Computer Style Sheets - Creative Style Sheets - Colorful Style Sheets - Cascading Style Sheets
Cascading Style Sheets
The term for search engines scouring the Internet for content, looking over the code/content for each URL they find is _____. - Ranking - Querying - Crawling - Indexing
Crawling
In order from beginning to end, the major steps in the System Development Lifecycle (SDLC) are: - systems analysis/planning; systems design; building the system; implementation; and testing. - systems analysis/planning; implementation; building the system; and testing. - systems analysis/planning; systems design; building the system; testing; and implementation. - systems design; testing; building the system; and implementation.
systems analysis/planning; systems design; building the system; testing; and implementation.
n order from beginning to end, the major steps in the System Development Lifecycle (SDLC) are: - systems analysis/planning; implementation; building the system; and testing. - systems analysis/planning; systems design; building the system; testing; and implementation. - systems design; testing; building the system; and implementation. - systems analysis/planning; systems design; building the system; implementation; and testing.
systems analysis/planning; systems design; building the system; testing; and implementation.
All of the following are online communications used to support the evaluation of alternatives stages of the consumer decision process except: - social networks. - search engines. - targeted banner ads. - online catalogs.
targeted banner ads.
All of the following are online communications used to support the evaluation of alternatives stages of the consumer decision process except: - targeted banner ads. - online catalogs. - search engines. - social networks.
targeted banner ads.
All of the following are online communications used to support the evaluation of alternatives stages of the consumer decision process except: social networks. search engines. targeted banner ads online catalogs.
targeted banner ads.
The website function of anchoring the brand online refers to - differentiating product. - informing and educating the customer. - the central point for all marketing messages. - None of these
the central point for all marketing messages.
PCI-DSS is a standard established by which of the following? - the credit card industry - the retail industry - the federal government - the banking industry
the credit card industry
PCI-DSS is a standard established by which of the following? - the federal government - the retail industry - the credit card industry - the banking industry
the credit card industry