E-commerce Exam 1 study guide
Which of the following statements about blockchain is not true?
A blockchain system is inherently centralized.
Which of the following statements about cloud computing is not true?
A public cloud is typically used by companies with stringent privacy and requirements
Which of the following measures the percentage of times an ad is clicked?
CTR
what element of the business model refers to the presence of substitute products in the market
Competitive environment
Match the following technologies with the appropriate tier in the 3-tier web architecture
DBMS functions - 3 SQL - 3 HTML - 1 ASP - 2 JavaScript - 1 JSP - 2 PHP - 2
Which of the following can be considered synonyms with the term e-commerce?
Digital commerce
E-commerce can be defined as
Digitally enabled commercial transactions between and among organizations and individuals
Which if the following is not one of the basic technological foundations of the internet?
FTP
3-tier web architecture has 2 layers: a client/server side and a DB side
False
Price transparency refers to the ease with which consumers can find out what merchants pay for products
False
Which of the following is not a basic type of cloud computing service?
FiOS
which of the following is another name for Revenue model
Financial model
Which of the following is a platform for B2B e-commerce
Go2Paper
B2C e commerce in the Us
Grew at double-digit rates between 2010-2018
Which of the following would you implement to collect and analyze your company's big data?
Hadoop
Which of the following is not a unique feature of e-commerce technology
Information asymmetry
Which of the following statements about native advertising is not true?
Native advertising is a new form of advertising found only online.
which of the following statements about the mobile platform is not true
Over 220 Americans used tablet computer apps in 2018
The transport layer of the TCP/IT is responsible for which of the following?
Providing communication with the application by acknowledging and sequencing the packets to and from the application
Which of the following statements about responsive web design (RWD) is not true?
RWD works best for sites that have complex functionality
Which of the following protocols is used to send mail to a server?
SMTP
Which of the following is the most common protocol for securing a digital channel of communication?
SSL/TLS
Which of the following is a simple but powerful method for strategizing about a business?
SWOT
Which of the following is not true about search engine advertising?
Search engine advertising is the slowest growing type of online advertising.
Which of the following is the core communication protocol for the internet?
TCP/IP
First movers often fail because
They lack complementary resources needed to sustain their advantages
Each DB understands its query language and conveys each submitted query to server-readable form and executes it to retrieve results
True
Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.
True
The SDLC methodology helps developers to understand the business objectives of a system and design an appropriate solution.
True
E-commerce is available just about everywhere and anytime is known as
Ubiquity
The address used by a browser to identify the location of content on the web is called
Uniform resource locator
what element of the business model addresses with a firm provides the other firms do and cannot
Value Proposition
All of the following are examples of social networks except
Y combinator
Stickiness is an important attribute for which of the following Revenue models
advertising Revenue model
All of the following are key design principles of responsive web design except:
coding by convention
Which of the following is the most important tool in establishing a relationship with the customer?
company website
Which of the following is not one of the main stages of the online purchasing process?
conversation
all of the following may lead to competitive Advantage except
fewer products
Which of the following typically includes a data flow diagram (DFD) to describe the flow of information for an e-commerce site?
logical design
Beginning the e-commerce development process with a mobile presence rather than a desktop website is referred to as which of the following?
mobile first design
in general the key to becoming a successful content provider is to
on the content being provided
PayPal is an example of what type of payment system?
online stored value payment system
Confidentiality is sometimes confused with:
privacy
Asymmetric key cryptography is also known as:
public key cryptography.
All of the following are "traditional" online marketing tools except:
social marketing
Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?
social media
Which of the following features of e-commerce technology allows users to participate in the creation of online content?
social technology
A digital certificate contains all of the following except the:
subject's private key
All the following statements about symmetric key cryptography are true except:
symmetric key cryptography is computationally slower.
In order from beginning to end, the major steps in the SDLC are:
systems analysis/planning; systems design; building the system; testing; and implementation
All of the following are online communications used to support the evaluation of alternatives stages of the consumer decision process except:
targeted banner ads
PCI-DSS is a standard established by which of the following?
the credit card industry
All of the following statements about cookies are true except:
the data typically stored in cookies includes a unique ID and e-mail address.
the existence of many competitors in one market may suggest
the market is saturated
A perfect Market is one in which
there are no competitive advantages or asymmetries because all firms have equal access to all the factors to produce
Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders?
two-tier architecture
Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?
universal standards
_______ and ___________ are typically the most easily identifiable aspects of a company's business model
value proposition; Revenue model
Which of the following involves creating a skeleton version that focuses on functionality rather than design?
wireframing
Which of the following is an example of an online privacy violation?
your online purchasing history being sold to other merchants without your consent