MIS 395 Midterm
It is estimated that by 2022, the size of the B2B market will reach:
$7.3 trillion.
In the address, which of the following is the top-level domain?
.com
During which period of time did the Institutionalization phase of Internet development take place?
1975-1995
In which year can e-commerce be said to have begun?
1995
VTR measures the ________ response rate to an ad.
30-day
An IPv4 address is expressed as a:
32-bit number that appears as a series of four separate numbers separated by periods.
The Data Encryption Standard uses a(n) ________-bit key.
56
A template test is a form of which type of testing?
A/B testing
________ are a kind of middleware software that provides the glue connecting traditional corporate systems to the customer as well as all the functionality needed to conduct e-commerce.
Application servers
A ________ is a repository of customer information that records all contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.
CRM system
________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared pool of virtualized resources over the Internet.
Cloud computing
The concept behind document formatting had its roots in which of the following?
GML
________ typically attack governments, organizations, and sometimes individuals for political purposes.
Hacktivists
________ is an open source database that can store and analyze both structured and unstructured data.
Hadoop
The richness made possible by e-commerce technologies does which of the following?
It allows video, audio, and text to be integrated into a single marketing message and consuming experience.
________ is defined by company using its competitive advantage to gain in surrounding markets.
Leverage
According to Symantec, almost half of the e-mail addresses involved in business e-mail compromise (BEC) phishing that it analyzed had an IP address originating in:
Nigeria.
Which of the following protocols is used to send mail to a server?
SMTP
Which of the following is a simple but powerful method for strategizing about a business?
SWOT analysis
________ technologies are technologies that enable the incremental improvement of products and services.
Sustaining
________ are the types of information systems capabilities needed to meet business objectives.
System functionalities
________ was the first truly large-scale digitally enabled transaction system in the B2C arena.
The French Minitel
Which of the following statements about Foursquare is not true?
The growth in Foursquare's revenue since 2015 has been driven primarily by significant increases in the numbers of users of its Swarm app.
TCP/IP operates in which layer of Internet architecture?
Transport Services and Representation Standards layer
HTTP/2 is supported by almost all the leading web browsers.
True
The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:
VoIP
All of the following are involved in the effort to create standards for IoT except:
W3C.
A web beacon is:
a tiny graphics file embedded in an e-mail or web page.
Which of the following verifies that the business objectives of the system are in fact working?
acceptance testing
The Internet Layer of TCP/IP is responsible for which of the following?
addressing, packaging, and routing messages
Stickiness is an important attribute for which of the following revenue models?
advertising revenue model
You could expect to find all of the following services in a web server software package except:
an RSS aggregator.
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:
an authorization management system
Beebone is an example of which of the following?
botnet
eBay uses all of the following business models except:
content provider.
The primary way a website is able to personalize the content presented to a visitor is through the use of:
cookies
The Nike iD program is an example of which of the following marketing techniques?
customer co-production
Which system functionality must your website have to be able to personalize or customize a product for a client?
customer on-site tracking
E-commerce can be defined as:
digitally enabled commercial transactions between and among organizations and individuals.
Innovative entrepreneurs and their business firms that destroy existing business models are referred to as:
disruptors
Malware that comes with a downloaded file that a user requests is called a:
drive-by download.
What type of Internet access technology are Google and Facebook hoping to use to provide Internet access to remote parts of the world?
drones
Proxy servers are also known as:
dual home systems.
Amazon Business is an example of which of the following business models?
e-distributor
Ariba is an example of a(n):
e-procurement firm.
If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:
enable individual customization of the product by consumers.
Which of the following is not a primary activity in a firm value chain?
finance/accounting
Most of the time required to maintain an e-commerce site is spent on:
general administration and making changes and enhancements to the system.
Business-to-consumer (B2C) e-commerce in the United States:
grew at double-digit rates between 2010 and 2018.
The Seam is an example of a(n):
industry consortium.
During which phase of the development of the Internet was the Domain Name System (DNS) introduced?
institutional phase
Which dimension(s) of security is spoofing a threat to?
integrity and authenticity
In modeling online consumer behavior, the concept of "consumer skills" refers to the:
knowledge consumers have about how to conduct online transactions.
All of the following might be part of a website's middle-tier layer except:
legacy corporate applications.
The incremental cost of building the next unit of a good is called the:
marginal cost.
In the ________ business model, a web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products, and establish prices.
market creator
A ________ specifically details how you plan to find customers and to sell your product.
market strategy
The costs incurred by merchants in having to change product prices (such as the costs of reentering prices into computer systems) are referred to as which of the following?
menu costs
Unfair competitive advantages occur when:
one competitor has an advantage that others cannot purchase.
PayPal is an example of what type of payment system?
online stored value payment system
MySQL is which of the following?
open source database software
In general, the key to becoming a successful content provider is to:
own the content being provided.
The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:
packet switching.
Acquisition rate is a measure of the:
percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.
Confidentiality is sometimes confused with:
privacy
The Transport Layer of TCP/IP is responsible for which of the following?
providing communication with the application by acknowledging and sequencing the packets to and from the application
Asymmetric key cryptography is also known as:
public key cryptography
The total number of users or customers an e-commerce business can obtain is a measure of which of the following?
reach
A firm's ________ describes how a firm will produce a superior return on invested capital.
revenue model
What is the primary revenue model for an e-distributor?
sales
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
spyware.
Uber has been criticized for using which of the following?
surge pricing
Above all, e-commerce is a ________ phenomenon.
technology driven
Interactivity in the context of e-commerce provides which of the following functionalities?
the enabling of two-way communication between consumer and merchant
The existence of many competitors in any one market segment may indicate:
the market is saturated.
The term stateless refers to the fact that:
the server does not have to maintain an ongoing dedicated interaction with the client computer.
Recency refers to the:
time elapsed since the last visit made by a customer.
The financial services, travel services, and job placement services industries typically use the ________ business model.
transaction broker
If you want to determine the size of your website's audience, the metric you will use for the most accurate measurement will be:
unique visitors.
A ________ marketplace supplies products and services of interest to particular industries.
vertical
Which business application is associated with the technological development of local area networks and client/server computing?
workgroup automation (e.g., document sharing)