Exam 1 - Required Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

E-commerce can be defined as: A) any electronically based organizational activity that supports a firm's market exchanges. B) the use of any Internet technologies in a firm's daily activities. C) the digital enablement of transactions and processes within an organization. D) any digitally enabled transactions among individuals and organizations.

A) any electronically based organizational activity that supports a firm's market exchanges.

The ________ allows a natural language expression, such as Google.com to represent a numeric IP address. A) domain name system B) Internet protocol addressing schema C) assigned numbers and names (ANN) system D) uniform resource locator system

A) domain name system

Proxy servers are also known as: A) dual home systems. B) firewalls. C) packet filters. D) application gateways.

A) dual home systems.

Which of the following online advertising formats attracted the least amount of spending in 2018? A) e-mail B) classifieds C) search D) rich media

A) e-mail

A perfect market is one in which: A) one firm develops an advantage based on a factor of production that other firms cannot purchase. B) there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production. C) one participant in the market has more resources than the others. D) competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage.

A) one firm develops an advantage based on a factor of production that other firms cannot purchase.

Asymmetric key cryptography is also known as: A) public key cryptography. B) PGP. C) secret key cryptography. D) PKI.

A) public key cryptography.

Which of the following is not an example of malicious code? A) sniffer B) ransomware C) Trojan horse D) bot

A) sniffer

All of the following are "traditional" online marketing tools except: A) social marketing B) sponsorship marketing. C) e-mail and permission marketing. D) affiliate marketing.

A) social marketing

Which of the following is not a practice that degrades the results and usefulness of search engines? A) social search B) link farms C) click fraud D) content farms

A) social search

Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users? A) universal standards B) ubiquity C) richness D) information density

A) universal standards

Which element of the business model addresses what a firm provides that other firms do not and cannot? A) value proposition B) market strategy C) competitive environment D) competitive advantage

A) value proposition

Creating multiple variations of information goods and selling these to different market segments at different prices is called: A) versioning. B) bundling. C) customization. D) dynamic pricing.

A) versioning.

________ is the ability to identify the person or entity with whom you are dealing on the Internet. A) Availability B) Authenticity C) Nonrepudiation D) Integrity

B) Authenticity

Which of the following is not one of the basic technological foundations of the Internet? A) TCP/IP B) FTP C) client/server computing D) packet switching

B) FTP

All of the following are issues facing Pinterest except: A) scams. B) inability to retain users. C) copyright infringement. D) spam.

B) inability to retain users.

All of the following statements about public key cryptography are true except: A) public key cryptography does not ensure message integrity. B) public key cryptography ensures authentication of the sender. C) public key cryptography uses two mathematically related digital keys. D) public key cryptography is based on the idea of irreversible mathematical functions.

B) public key cryptography ensures authentication of the sender.

If you want to determine the size of your website's audience, the metric you will use for the most accurate measurement will be: A) reach. B) unique visitors. C) page views. D) hits.

B) unique visitors.

Which of the following statements about cloud computing is not true? A) Hybrid clouds offer both public and private cloud options. B) A private cloud may be hosted internally or externally. C) A public cloud is typically used by companies with stringent privacy and security requirements. D) Dropbox is an example of a public cloud.

C) A public cloud is typically used by companies with stringent privacy and security requirements.

Which of the following occurred during the Commercialization phase of Internet development? A) Personal computers were invented. B) The Domain Name System was introduced. C) NSF privatized the operation of the Internet's backbone. D) The fundamental building blocks of the Internet were realized in actual hardware and software.

C) NSF privatized the operation of the Internet's backbone.

Transport Services and Representation Standards layer A) Internet Exchange Points (IXPs). WRONG B) Network Access Points (NAPs). C) Tier 1 ISPs. D) Metropolitan Area Exchanges (MAEs).

C) Tier 1 ISPs

Which of the following is not a unique feature of e-commerce technology? A) interactivity B) richness C) information asymmetry D) social technology

C) information asymmetry

Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations? A) packet servers B) Web servers C) routers D) IP servers

C) routers

Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders? A) three-tier architecture B) multi-tier architecture C) two-tier architecture D) single-tier architecture

C) two-tier architecture

Which of the following is the most common protocol for securing a digital channel of communication? A) HTTP B) DES C) VPN D) SSL/TLS

D) SSL/TLS

Which of the following is not true about search engine advertising? A) The top three search engine providers supply over 95% of all online searches. B) The click-through rate for search engine marketing has been fairly steady over the years. C) Spending on search engine advertising constitutes about 44% of all online advertising spending. D) Search engine advertising is the slowest growing type of online advertising.

D) Search engine advertising is the slowest growing type of online advertising

What are the two most important management challenges in building a successful e-commerce presence? A) building a team with the right skill sets and closely managing the development process B) identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site C) having an accurate understanding of your business environment and an achievable business plan D) developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

D) developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

Which of the following is not one of the basic business objectives for an e-commerce site? A) display goods B) execute a transaction C) provide production and supplier links D) optimize system architecture

D) optimize system architecture

Which of the following gives a business model the most credibility with outside investors? A) the firm's market opportunity B) the firm's value proposition C) the firm's market strategy D) the firm's management team

D) the firm's management team

The basic value proposition of community providers is: A) they create a digital electronic environment for buyers and sellers to meet, agree on a price, and transact. B) they increase customers' productivity by helping them get things done faster and more cheaply. C) they offer consumers valuable, convenient, time-saving, and low-cost alternatives to traditional service providers. D) they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.

D) they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.

Which of the following is an example of an online privacy violation? A) your computer being used as part of a botnet B) your e-mail being altered by a hacker C) your e-mail being read by a hacker D) your online purchasing history being sold to other merchants without your consent

D) your online purchasing history being sold to other merchants without your consent


Ensembles d'études connexes

Physiology_Lab_ Practical 2_ 6.3

View Set

Ch 4 Adult health, physical, nutritional and cultural assessment

View Set

NURS 247--Prep U Questions--2nd Test

View Set

Ch. 2 Test - Research Methods in Psychology

View Set

Modules 7 - 9: Available and Reliable Networks

View Set

movement (occurring at the joint)

View Set