E-Commerce Final
The following are features of the Internet and the WWW, used as foundation for eCommerce:
- Virtual and Augmented Reality - Search engines - Communication tools, e-mail and discussion forms - Web 2.0 applications - Streaming media - Intelligent digital assistants
Which of the following statements about blockchain is not true?
A blockchain system is inherently centralized.
Which of the following statements about cloud computing is not true?
A public cloud is typically used by companies with stringent privacy and security requirements.
Which of the following is not a community provider?
Blue Nile
Which of the following measures the percentage of times an ad is clicked?
CTR
Which of the following is a core Fair Information Practices (FIP) principle?
Choice/Consent
Which of the following uses a subscription-based sales revenue model?
Dollar Shave Club
Which of the following companies uses a transaction fee revenue model?
E*Trade
Which of the following is not one of the basic technological foundations of the Internet?
FTP
3-Tier web architectures have 2 layers: a client/server side and a databases side.
False
Consumers are primarily price-driven when shopping on the Internet.
False
On-demand service companies are characterized by the free sharing of resources between the company and consumers.
False
Price transparency refers to the ease with which consumers can find out what merchants pay for products.
False
Social technologies change industry structure by weakening powerful sales channels and shifts bargaining power to consumers.
False
Which of the following is not a basic type of cloud computing service?
FiOS
Please match the following technologies with the appropriate Tier in the 3-Tier web architecture.
Font-End (User Interface): - JavaScript - HTML Middle Tier (Server): - PHP - ASP - JSP Back-End (Database) - SQL - DBMS functions
Which of the following is a platform for B2B e-commerce?
Go2Paper
Please find the best match for the following terms/paradigms.
HTML -> Front Tier Back End -> MySQL PHP -> Middle Tier Distributed DBMS -> Scalability Java Script -> Front tier processing
Which of the following would you implement to collect and analyze your company's big data?
Hadoop
What is the first step in analyzing an ethical dilemma?
Identify and describe the facts.
Which of the following is not a technology for enabling proximity marketing?
Lens Studio
Which of the following is not true about social marketing?
More than 50% of Twitter's ad revenues are generated by desktop users.
Which of the following statements about native advertising is not true?
Native advertising is a new form of advertising found only online.
Which of the following is not true about on-demand service firms?
On-demand service firms are a totally new phenomenon without precedent in the history of e-commerce.
Which of the following statements about the mobile platform is not true?
Over 220 Million Americans used tablet computer apps in 2018.
Which of the following is not true about mobile marketing?
People use most of their mobile minutes while they are on the go, outside of the home.
Which of the following statements about responsive web design (RWD) is not true?
RWD works best for sites that have complex functionality.
Which of the following protocols is used to send mail to a server?
SMTP
Which of the following is the most common protocol for securing a digital channel of communication?
SSL/TLS
Which of the following is a simple but powerful method for strategizing about a business?
SWOT analysis
Which of the following is not true about search engine advertising?
Search engine advertising is the slowest growing type of online advertising.
Which of the following is the core communications protocol for the Internet?
TCP/IP
Big data plays an important role in predictive marketing.
True
E-commerce has increased price competition in many markets
True
Each database understands its query language and converts each submitted query to server-readable form and executes it to retrieve results.
True
Net neutrality refers to the idea that Internet service providers (ISPs), including cable Internet and wireless carriers, should treat all data on the Internet in the same manner, and not discriminate or price differentially by content, protocol, platform, hardware, or application.
True
On-demand service companies collect a fee from both sellers and buyers who use the platform.
True
Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.
True
The SDLC methodology helps developers to understand the business objectives of a system and design an appropriate solution.
True
The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.
True
Which of the following is a micro-blogging social network site that allows users to send and receive 280-character messages, as well as news articles, photos, and videos?
All of the following are examples of social networks except:
Y Combinator
eCommerce. Which of the following are valid Business to Consumer Business Models.
Yes: - E-tailer - Market creator - Content Provider - Transaction broker No: - e-distributor - e-procurement - exchanges
Revenue in eCommerce. The following are revenue models in eCommerce.
Yes: - Sales revenue model - Transaction fee revenue model - Affiliate revenue model - Advertising revenue model No: - HTTPS model - HTTP revenue model
The public (asymmetric) key encryption systems uses 2 keys (one private and one public). The following are characteristics associated with the public/private key pair.
Yes: - There is no Session Key - Each keys pair is unique - The public key is shared No: - The session key is kept on the server - The Private key is shared with the PKI only - Public key is used for decryption and private key for encryption
The following are features that must be considered when designing a mobile presence:
Yes: - Mobile hardware - Interface - Displays - Connectivity No: - Mobile phone type - User's gender
The address used by a browser to identify the location of content on the Web is called:
a uniform resource locator.
The main objective of the GDPR is to strengthen the rights of citizens to their own personal information and to strengthen oversight of firms to ensure that they implement these individual rights.
advertising networks
Encouraging users to click a Like button is an example of which step in the social marketing process?
amplification
Omni-channel merchants are also referred to as:
bricks-and-clicks companies.
All of the following are key design principles of responsive web design except:
coding by convention.
Which of the following is the most important tool in establishing a relationship with the customer?
company website
Which element of the business model refers to the presence of substitute products in the market?
competitive environment
Which of the following is not one of the main stages of the online purchasing process?
conversation
Which of the following refers to those forms of social sharing that occur off the major social networks, through alternative communication tools?
dark social
Which of the following uses software installed at the ISP level to track user clickstream behavior?
deep packet inspection
Which of the following can be considered synonymous with the term e-commerce?
digital commerce
E-commerce can be defined as:
digitally enabled commercial transactions between and among organizations and individuals.
Which of the following is not a major trend in the online recruitment services industry?
disintermediation
Which of the following basic ethical concepts plays an important role in defining privacy?
due process
Which of the following is not one of the seven major segments of the retail industry?
electronics and computers
If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:
enable individual customization of the product by consumers.
Which of the following is the most popular use for mobile devices?
entertainment
Which of the following is the first step in the social marketing process?
fan acquisition
All of the following are advantages of online retail except:
faster delivery of goods.
Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?
global reach
Business-to-consumer (B2C) e-commerce in the United States:
grew at double-digit rates between 2010 and 2018.
Which of the following is not a unique feature of e-commerce technology?
information asymmetry
Which of the following typically includes a data flow diagram (DFD) to describe the flow of information for an e-commerce site?
logical design
The term supply-push refers to:
making products prior to orders being received based on estimated demand.
Beginning the e-commerce development process with a mobile presence rather than a desktop website is referred to as which of the following?
mobile first design
PayPal is an example of what type of payment system?
online stored value payment system
Confidentiality is sometimes confused with:
privacy
The Transport Layer of TCP/IP is responsible for which of the following?
providing communication with the application by acknowledging and sequencing the packets to and from the application
Asymmetric key cryptography is also known as:
public key cryptography.
Which of the following is another term for amplification?
reach
Portals primarily generate revenue in all of the following ways except:
sales of goods
Which of the following refers to the number of interactions among members of a group and reflects the "connectedness" of the group, even if these connections are forced on users?
social density
All of the following are "traditional" online marketing tools except:
social marketing.
Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?
social media
Which of the following features of e-commerce technology allows users to participate in the creation of online content?
social technology
A digital certificate contains all of the following except the:
subject's private key.
All the following statements about symmetric key cryptography are true except:
symmetric key cryptography is computationally slower.
In order from beginning to end, the major steps in the SDLC are:
systems analysis/planning; systems design; building the system; testing; and implementation.
All of the following are online communications used to support the evaluation of alternatives stages of the consumer decision process except:
targeted banner ads.
All of the following statements about the MOTO sector are true except:
the MOTO sector is also referred to as the specialty store sector.
Which of the following factors is not a significant influence on a company's competitive environment?
the availability of supportive organizational structures
PCI-DSS is a standard established by which of the following?
the credit card industry
All of the following statements about cookies are true except:
the data typically stored in cookies includes a unique ID and e-mail address.
Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders?
two-tier architecture
E-commerce is available just about everywhere and anytime. This is known as:
ubiquity.
Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?
universal standards
A social consequence of the richness of Internet information is:
very persuasive messages might reduce the need for multiple independent sources of information.
Which of the following involves creating a skeleton version that focuses on functionality rather than design?
wireframing
Which of the following is an example of an online privacy violation?
your online purchasing history being sold to other merchants without your consent