Chapter 1-6: E-commerce Security and Payment Systems

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is currently the most popular Web browser? A) Internet Explorer B) Safari C) Chrome D) Firefox

A) Internet Explorer

Which of the following is not a major trend in e-commerce payments in 2014-2015? A) Mobile retail payment volume decreases. B) PayPal remains the most popular alternative payment method. C) Apple introduces Apple Pay. D) Payment by credit and/or debit card remains the dominant form of online payment.

A) Mobile retail payment volume decreases.

Which of the following is not true about the mobile platform? A) Most smartphones use Intel chips. B) The number of cell phones worldwide exceeds the number of PCs. C) Over a third of the world's cell phones are smartphones. D) Unlike PCs, smartphones do not need fans.

A) Most smartphones use Intel chips.

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. A) Nonrepudiation B) Authenticity C) Availability D) Integrity

B) Authenticity

Which of the following is not a primary activity in a firm value chain? A) outbound logistics B) finance/accounting C) operations D) after-sales service

B) finance/accounting

All of the following are key design principles of responsive Web design except: A) flexible grid-based layouts. B) media queries. C) coding by convention. D) flexible images and media.

C) coding by convention.

eBay uses all of the following business models except: A) B2C market creator. B) C2C market creator. C) content provider. D) e-commerce infrastructure provider.

C) content provider.

Offline media is typically used for all of the following marketing activities except: A) education. B) exposure. C) conversation. D) branding.

C) conversation.

All of the following are basic information requirements for a product database except: A) product descriptions. B) stock numbers. C) customer ID numbers. D) inventory levels.

C) customer ID numbers.

The cost of hardware, software, and telecommunications services needed to build a Web site have ________ over the last decade. A) increased dramatically B) increased moderately C) decreased dramatically D) decreased slightly

C) decreased dramatically

Which of the following is not an example of an access control? A) firewalls B) proxy servers C) digital signatures D) login passwords

C) digital signatures

Which of the following is a characteristic of e-commerce during the Invention period? A) mobile technology B) earnings and profit emphasis C) disintermediation D) extensive government surveillance

C) disintermediation

The ________ allows a natural language expression, such as Google.com to represent a numeric IP address. A) uniform resource locator system B) Internet protocol addressing schema C) domain name system D) assigned numbers and names (ANN) system

C) domain name system

Which of the following is not an example of a PUP? A) adware B) browser parasite C) drive-by download D) spyware

C) drive-by download

Malware that comes with a downloaded file that a user requests is called a: A) Trojan horse. B) backdoor. C) drive-by download. D) PUP.

C) drive-by download.

Proxy servers are also known as: A) firewalls. B) application gateways. C) dual home systems. D) packet filters.

C) dual home systems.

W.W. Grainger is an example of which of the following business models? A) B2B service provider B) exchange C) e-distributor D) industry consortia

C) e-distributor

All of the following may lead to a competitive advantage except: A) less expensive suppliers. B) better employees. C) fewer products. D) superior products.

C) fewer products.

Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service? A) advertising revenue model B) subscription revenue model C) freemium strategy D) transaction fee revenue model

C) freemium strategy

A Web beacon is: A) a cookie that carries a virus. B) an executable cookie. C) an automated applet for performing Web searches. D) a tiny graphics file embedded in an e-mail or Web page.

D) a tiny graphics file embedded in an e-mail or Web page.

All of the following are basic functionality provided by Web servers except: A) site management tools. B) data capture tools. C) security services. D) a shopping cart.

D) a shopping cart.

Which of the following forms of online advertising is expected to grow the fastest between 2014 and 2018? A) paid search B) sponsorships C) search engines D) rich media

D) rich media

Which of the following would you use to verify that links on Web pages are valid? A) HTTP B) FTP C) data capture tools D) site management tools

D) site management tools

All of the following are examples of malicious code except: A) viruses. B) bots. C) worms. D) sniffers

D) sniffers

Which of the following features of e-commerce technology allows users to participate in the creation of online content? A) ubiquity B) global reach C) information density D) social technology

D) social technology

All of the following are characteristics of HTML5 except: A) a video element that replaces plug-ins such as Flash, QuickTime, and RealPlayer. B) use of CSS3. C) ability to access built-in functionality of mobile devices, such as GPS and swiping. D) support for digital rights management.

D) support for digital rights management.

All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except: A) search engines. B) online catalogs. C) social networks. D) targeted banner ads.

D) targeted banner ads.

Which of the following is not a key point of vulnerability when dealing with e-commerce? A) the client computer B) the server C) the communications pipeline D) the credit card companies

D) the credit card companies

Which of the following is not a limitation of the current Internet? A) the continued reliance on cables and wires for connectivity B) limited bandwidth, which causes congestion and cannot adequately handle video and voice traffic C) architectural restrictions, which stipulate that numerous requests for the same file must each be answered individually, slowing network performance D) the difficulty in expanding capacity by adding servers and clients

D) the difficulty in expanding capacity by adding servers and clients

Interactivity in the context of e-commerce provides which of the following functionalities? A) the ability to physically touch and manipulate a product B) complexity and content of a message C) the ability of consumers to create and distribute content D) the enabling of two-way communication between consumer and merchant

D) the enabling of two-way communication between consumer and merchant

Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users? A) ubiquity B) richness C) interactivity D) universal standards

D) universal standards

Which element of the business model addresses the question of why a customer should buy from the firm? A) revenue model B) competitive advantage C) market strategy D) value proposition

D) value proposition

Which type of investor typically becomes interested in a start-up company after it has begun generating revenue? A) incubators B) angel investors C) crowdfunders D) venture capital investors

D) venture capital investors

64) Creating multiple variations of information goods and selling these to different market segments at different prices is called: A) bundling. B) customization. C) dynamic pricing. D) versioning.

D) versioning.

Which business application is associated with the technological development of local area networks and client/server computing? A) transaction automation (e.g., payroll) B) desktop automation (e.g., word processing) C) industrial system automation (e.g., supply chain management) D) workgroup automation (e.g., document sharing)

D) workgroup automation (e.g., document sharing)

All of the following are fixed price strategies except: A) bundling. B) versioning. C) free pricing. D) yield management.

D) yield management.

Which of the following is an example of a sharing economy company? A) YouTube B) Airbnb C) Tumblr D) Facebook

B) Airbnb

In the address http://www.company.com/clients.html, which of the following is the top-level domain? A) .com B) company.com C) www D) http

A) .com

Which of the following statements about cloud computing is not true? A) A private cloud typically has multiple tenants. B) Public clouds are the most well-known type of cloud computing model. C) Hybrid clouds offer both public and private cloud options. D) A private cloud may be located either on a customer's premises or off the premises.

A) A private cloud typically has multiple tenants.

Which of the following is a prominent hacktivist group? A) Anonymous B) Anti-Phishing Working Group C) IC3 D) Symantec

A) Anonymous

The leading Web server software is: A) Apache. B) Microsoft Internet Information Server. C) Sun Solaris D) Google Enterprise Server

A) Apache.

All of the following statements about Apple Pay are true except which of the following? A) Apple Pay is available for both iPhone 5s and iPhone 6s. B) Apple Pay is based on Touch ID biometric fingerprint scanning. C) Apple Pay can be used for mobile payments at the point of sale at a physical store. D) Apple Pay relies on the consumer having a credit card on file with Apple's iTunes.

A) Apple Pay is available for both iPhone 5s and iPhone 6s.

________ provides a set of standards for communicating between a browser and a program running on a server that allows for interaction between the user and server. A) CGI B) ColdFusion C) JavaScript D) VBScript

A) CGI

________ refers to the ability to ensure that messages and data are only available to those authorized to view them. A) Confidentiality B) Integrity C) Privacy D) Availability

A) Confidentiality

The ________ helps define the overall structure of the Internet. A) IAB B) IESG C) W3C D) ITU

A) IAB

Which of the following protocols is used to send mail to a server? A) IMAP B) FTP C) HTTP D) SSL

A) IMAP

Which of the following is not one of the four main methods advertisers use to behaviorally target ads? A) Nielsen ratings B) data collected from social networks C) integration of offline data D) clickstream data

A) Nielsen ratings

________ refers to the ability to ensure that e-commerce participants do not deny their online actions. A) Nonrepudiation B) Authenticity C) Availability D) Integrity

A) Nonrepudiation

In the United States, the primary form of online payment is: A) PayPal. B) Bill Me Later. C) Amazon Payment. D) Google Wallet.

A) PayPal.

________ is a utility program that allows you to check the connection between your client and a TCP/IP network. A) Ping B) Telnet C) Tracert D) Finger

A) Ping

Which of the following statements about responsive Web design (RWD) is not true? A) RWD works best for sites that have complex functionality. B) RWD tools include HTML5 and CSS3. C) RWD makes it possible to design a Web site that automatically adjusts its layout and display according to the screen resolution of the device on which it is being viewed. D) RWD can be costly.

A) RWD works best for sites that have complex functionality.

________ is an industry-standard database query and manipulation language. A) SQL B) PHP C) DBMS D) JSP

A) SQL

Which of the following statements about the Web is not true? A) The Web is the technology upon which the Internet is based. B) The Web was the original "killer app." C) The Web provides access to pages written in HyperText Markup Language. D) The Web is both a communications infrastructure and an information storage system.

A) The Web is the technology upon which the Internet is based.

Which of the following best describes the early years of e-commerce? A) They were a technological success but a mixed business success. B) They were a technological success but a business failure. C) They were a technological failure but a business success. D) They were a mixed technological and business success.

A) They were a technological success but a mixed business success.

Which of the following is not an example of a social network? A) Uber B) Twitter C) Pinterest D) Tumblr

A) Uber

The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called: A) VoIP. B) IPTP. C) VTP. D) IP.

A) VoIP.

Which of the following is not an open source software tool? A) WebSphere B) Apache C) MySQL D) PHP

A) WebSphere

The major technologies used with wireless local area networks are: A) Wi-Fi and Bluetooth. B) Wi-Fi and WiMax. C) Bluetooth and 3G. D) WiMax and 3G.

A) Wi-Fi and Bluetooth.

In 2013, the Target retail chain experienced which of the following? A) a large-scale data breach B) a DDoS attack that shut down its Web site C) a hacktivist attack to protest its wage policies D) a browser parasite

A) a large-scale data breach

A system design has two main components: A) a logical design and a physical design. B) a behavioral design and a technological design. C) business objectives and technology requirements. D) front-end systems and back-end systems.

A) a logical design and a physical design.

The ability to retain user attention and engagement is an important attribute for which revenue model? A) advertising revenue model B) subscription revenue model C) transaction fee revenue model D) sales revenue model

A) advertising revenue model

The early years of e-commerce were driven by all of the following factors except: A) an emphasis on exploiting traditional distribution channels. B) a huge infusion of venture capital funds. C) an emphasis on quickly achieving very high market visibility. D) visions of profiting from new technology

A) an emphasis on exploiting traditional distribution channels.

Which of the following is an unfair competitive advantage? A) brand name B) access to global markets C) lower product prices D) superior technology

A) brand name

All of the following are major technology trends in e-commerce in 2014-2015 except: A) cloud computing enables the creation of Big Data. B) firms are turning to Web analytics to make sense out of Big Data. C) the mobile computing and communications platform creates a new platform for online transactions, marketing, advertising, and media viewing. D) computing and networking component prices continue to fall dramatically.

A) cloud computing enables the creation of Big Data.

Which of the following is the most important tool in establishing a relationship with the customer? A) company Web site B) company CRM system C) Facebook D) search engine display ads

A) company Web site

Privacy is sometimes confused with: A) confidentiality. B) authenticity. C) integrity. D) nonrepudiation.

A) confidentiality.

Your company has just implemented a new, more efficient set of business processes that other firms cannot yet obtain. This will enable your firm to adopt a strategy of: A) cost competition. B) scope. C) scale. D) focus.

A) cost competition.

The Nike iD program is an example of which of the following marketing techniques? A) customer co-production B) transactive content C) price discrimination D) permission marketing

A) customer co-production

What are the two most important management challenges in building a successful e-commerce presence? A) developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives B) having an accurate understanding of your business environment and an achievable business plan C) building a team with the right skill sets and closely managing the development process D) identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site

A) developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

Bitcoins are an example of: A) digital cash. B) virtual currency. C) a stored value payment system. D) an EBPP system.

A) digital cash.

The business model of e-tailers is quite similar to that of: A) e-distributors. B) transaction brokers. C) exchanges. D) service providers.

A) e-distributors.

Which of the following is an example of the subscription revenue model? A) eHarmony B) eBay C) E*Trade D) Twitter

A) eHarmony

If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would: A) enable individual customization of the product by consumers. B) implement a strategy of commoditization. C) adopt a strategy of cost competition. D) develop a scope strategy to compete within a narrower market segment.

A) enable individual customization of the product by consumers.

Which of the following is not a main factor in determining the overall demand on an e-commerce site? A) file sizes of Web pages being served B) number of simultaneous users in peak periods C) speed of legacy applications that are needed to supply data to Web pages D) whether content is dynamic or static

A) file sizes of Web pages being served

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network. A) firewall B) virtual private network C) proxy server D) PPTP

A) firewall

Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time? A) global reach B) richness C) interactivity D) personalization

A) global reach

Business-to-consumer (B2C) e-commerce in the United States: A) has grown at double-digit rates between 2010 and 2014. B) has less revenue than C2C e-commerce. C) now constitutes over 40% of the overall U.S. retail market. D) is growing more slowly as it confronts its own fundamental limitations.

A) has grown at double-digit rates between 2010 and 2014.

Siri is a type of: A) intelligent personal assistant. B) widget. C) gadget. D) social network

A) intelligent personal assistant.

The overall rate of online credit card fraud is ________ % of all online card transactions. A) less than 1 B) around 5 C) around 10 D) around 15

A) less than 1

Unfair competitive advantages occur when: A) one competitor has an advantage others cannot purchase. B) market middlemen are displaced. C) information is equally distributed and transaction costs are low. D) firms are able to gather monopoly profits.

A) one competitor has an advantage others cannot purchase.

PayPal is an example of what type of payment system? A) online stored value payment system B) digital checking system C) accumulating balance system D) digital credit card system

A) online stored value payment system

MySQL is which of the following? A) open source database software B) a scripting language embedded in HTML documents C) Web server software D) Web site analytics software

A) open source database software

One of the predictions for the future of e-commerce is that: A) overall revenues from e-commerce will grow at an annualized rate of about 13% a year through 2018. B) the first movers from the early years of e-commerce will retain or increase their market share as they continue to exploit economies of scale and switching costs. C) prices will lower enough to encourage more consumers to engage in online shopping. D) the number of online shoppers will continue to grow at double-digit rates.

A) overall revenues from e-commerce will grow at an annualized rate of about 13% a year through 2018.

In general, the key to becoming a successful content provider is to: A) own the content being provided. B) own the technology by which content is created, presented, and distributed. C) provide online content for free. D) provide other services as well as online content.

A) own the content being provided.

Which of the following is the top online retailer ranked by online sales? A) Apple B) Amazon C) Staples D) Walmart

B) Amazon

Acquisition rate is a measure of the: A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages. B) percentage of visitors who become customers. C) percentage of existing customers who continue to buy on a regular basis. D) percentage of shoppers who do not return within a year after their initial purchase.

A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

Which of the following type of application server monitors and controls access to a main Web server and implements firewall protection? A) proxy server B) list server C) groupware server D) mail server

A) proxy server

Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text? A) richness B) ubiquity C) information density D) personalization

A) richness

What is the primary revenue model for an e-distributor? A) sales B) transaction fee C) advertising D) subscription

A) sales

Which of the following is not a practice that degrades the results and usefulness of search engines? A) social search B) link farms C) content farms D) click fraud

A) social search

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: A) spyware. B) a backdoor. C) pupware. D) adware.

A) spyware.

A digital certificate contains all of the following except the: A) subject's private key. B) subject's public key. C) digital signature of the certification authority. D) digital certificate serial number.

A) subject's private key.

In order from beginning to end, the major steps in the SDLC are: A) systems analysis/planning; systems design; building the system; testing; and implementation. B) systems design; testing; building the system; and implementation. C) systems analysis/planning; systems design; building the system; implementation; and testing. D) systems analysis/planning; implementation; building the system; and testing.

A) systems analysis/planning; systems design; building the system; testing; and implementation.

Above all, e-commerce is a ________ phenomenon. A) technology-driven B) finance-driven C) sociological D) government-driven

A) technology-driven

All of the following can be considered a precursor to e-commerce except: A) the development of the smartphone. B) Baxter Healthcare's PC-based remote order entry system. C) the French Minitel. D) the development of Electronic Data Interchange standards.

A) the development of the smartphone.

Which of the following gives a business model the most credibility with outside investors? A) the firm's management team B) the firm's value proposition C) the firm's market opportunity D) the firm's market strategy

A) the firm's management team

Which of the following is not a concern about IoT? A) the high cost of sensors B) interoperability C) security D) privacy

A) the high cost of sensors

E-commerce can be defined as: A) the use of the Internet, the Web, and mobile apps to transact business. B) the use of any Internet technologies in a firm's daily activities. C) the digital enablement of transactions and processes within an organization. D) any digitally enabled transactions among individuals and organizations.

A) the use of the Internet, the Web, and mobile apps to transact business.

A perfect market is one in which: A) there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production. B) one firm develops an advantage based on a factor of production that other firms cannot purchase. C) one participant in the market has more resources than the others. D) competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage

A) there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.

The basic value proposition of community providers is: A) they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests. B) they offer consumers valuable, convenient, time-saving, and low cost alternatives to traditional service providers. C) they create a digital electronic environment for buyers and sellers to meet, agree on a price, and transact. D) they increase customers' productivity by helping them get things done faster and more cheaply.

A) they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.

Dove's Real Beauty Sketches video ad is an example of which of the following? A) viral marketing B) local marketing C) affiliate marketing D) lead generation marketing

A) viral marketing

Which of the following types of merchants has the highest share of retail online sales? A) virtual (Web only) B) catalog/call center C) retail chain D) consumer brand manufacturer

A) virtual (Web only)

A(n) ________ is a Web application that allows users to easily add and edit content on a Web page. A) wiki B) podcast C) blog D) RSS feed

A) wiki

Which of the following is a server-side technique that detects the attributes of the device making the request, and using predefined templates, loads a version of a site that is optimized for the device? A) LAMP B) AWD C) mobile first design D) RoR

B) AWD

________ verifies that the business objectives of the system as originally conceived are in fact working. A) System testing B) Acceptance testing C) Unit testing D) Implementation testing

B) Acceptance testing

The overall retail market in the United States in 2017 was estimated at about: A) $47 trillion. B) $4.7 trillion. C) $490 billion. D) $47 billion.

B) $4.7 trillion.

How long does it take for 300,000 X-rays to be transmitted on a 100-gbps network? A) 10 seconds B) 1 minute C) 10 minutes D) 1 hour

B) 1 minute

In 2014, the world's online population was estimated to be around: A) 280 million. B) 2.8 billion. C) 28 billion. D) 280 billion

B) 2.8 billion.

Retail chains account for around ________ % of online retail firm revenues. A) 15 B) 35 C) 75 D) 95

B) 35

The Data Encryption Standard uses a(n) ________-bit key. A) 8 B) 56 C) 256 D) 512

B) 56

In the first 8 months of 2014, the percentage of all e-mail that is spam averaged around ________ %. A) 50 B) 60 C) 70 D) 80

B) 60

Which of the following statements about CAN-SPAM is not true? A) CAN-SPAM went into effect in January 2004. B) CAN-SPAM prohibits unsolicited e-mail (spam). C) CAN-SPAM prohibits the use of deceptive subject lines and false headers. D) Large spammers are among CAN-SPAM's biggest supporters.

B) CAN-SPAM prohibits unsolicited e-mail (spam).

A ________ is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer. A) customer service chat system B) CRM system C) data warehouse D) transactive content system

B) CRM system

In May 2014, the U.S. Department of Justice indicted five army members from which of the following countries for conducting industrial espionage against U.S. Steel and Westinghouse? A) Russia B) China C) Iran D) Iraq

B) China

Ruby on Rails is based on which of the following philosophies? A) SLDC B) CoC C) LAMP D) Ajax

B) CoC

Which of the following companies utilizes a transaction fee revenue model? A) Yahoo B) E*Trade C) Twitter D) Sears

B) E*Trade

Which of the following is not an advantage of client/server computing over centralized mainframe computing? A) It is easy to expand capacity by adding servers and clients. B) Each client added to the network increases the network's overall capacity and transmission speeds. C) Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer. D) There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down

B) Each client added to the network increases the network's overall capacity and transmission speeds.

Which of the following statements is not true? A) No one academic perspective dominates research about e-commerce. B) Economists take a purely technical approach to e-commerce. C) There are two primary approaches to e-commerce: behavioral and technical. D) Management scientists are interested in e-commerce as an opportunity to study how business firms can exploit the Internet to achieve more efficient business operations.

B) Economists take a purely technical approach to e-commerce.

Which of the following would be considered an indirect competitor of Travelocity? A) Priceline B) Expedia C) Orbitz D) TripAdvisor

B) Expedia

Which of the following is not one of the basic technological foundations of the Internet? A) client/server computing B) FTP C) TCP/IP D) packet switching

B) FTP

________ is one of the original Internet services and is used to transfer files from a server computer to a client computer and vice versa. A) SMTP B) FTP C) HTTP D) SSL

B) FTP

Which of the following would you implement to collect and analyze your company's Big Data? A) data warehouse B) Hadoop C) SQL D) profiling

B) Hadoop

During which phase of the development of the Internet was the personal computer invented? A) Commercialization phase B) Institutional phase C) Innovation phase D) Consolidation phase

B) Institutional phase

The layer of Internet architecture that ties the applications to the communications network and includes such services as security and authentication is called the: A) Network Technology Substrate layer. B) Middleware Services layer. C) Transport Services and Representation Standards layer. D) Applications layer.

B) Middleware Services layer.

The first Web browser to make it possible to view documents on the Web with colored background, images, and animations was: A) Netscape Navigator. B) Mosaic. C) Mozilla. D) Internet Explorer.

B) Mosaic.

Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other? A) DES B) NFC C) IM D) text messaging

B) NFC

The backbone of the Internet is formed by: A) Internet Exchange Points (IXPs). B) Network Service Providers (NSPs). C) Internet Service Providers (ISPs). D) Metropolitan Area Exchanges (MAEs).

B) Network Service Providers (NSPs).

Django is based on which of the following? A) PHP B) Python C) Perl D) Ruby on Rails

B) Python

An example of a company using the content provider model is: A) Priceline. B) Rhapsody. C) Dell. D) eBay.

B) Rhapsody

Which of the following is used to process certificates and private/public key information? A) HTTP B) Secure Sockets Layer/Transport Layer Security C) File Transfer Protocol D) data capture tools

B) Secure Sockets Layer/Transport Layer Security

Which of the following is not a major business trend in e-commerce in 2014-2015? A) Social e-commerce continues to grow. B) Small businesses and entrepreneurs are hampered by the rising cost of market entry caused by increased presence of industry giants. C) Sharing economy companies garner multi-billion dollar valuations. D) Mobile and social advertising platforms begin to challenge search engine marketing.

B) Small businesses and entrepreneurs are hampered by the rising cost of market entry caused by increased presence of industry giants.

________ are the types of information systems capabilities needed to meet business objectives. A) Information requirements B) System functionalities C) System design specifications D) Physical design specifications

B) System functionalities

Which of the following may offer its customers value chain management software? A) e-distributors B) e-procurement companies C) exchanges D) community providers

B) e-procurement companies

Which of the following statements about the Internet's impact on marketing is not true? A) The Internet has broadened the scope of marketing communications. B) The Internet has decreased the impact of brands. C) The Internet has increased the richness of marketing communications. D) The Internet has expanded the information intensity of the marketplace.

B) The Internet has decreased the impact of brands.

Which of the following statements about a free pricing strategy is false? A) Free products and services can knock out potential and actual competitors. B) The free pricing strategy was born in the early days of the Web. C) It is difficult to convert free customers into paying customers. D) Free products and services can help build market awareness.

B) The free pricing strategy was born in the early days of the Web.

Which of the following statements about Canada's anti-spam law is not true? A) Canada's law is based on an opt-in model. B) The law has no impact on companies located within the United States. C) The first phase of the law went into effect in 2014. D) The law applies to e-mail, texts, and social media messaging.

B) The law has no impact on companies located within the United States.

All of the following are true about iPhone apps except: A) They are distributed through Apple's App Store. B) They are cross-platform, open-source applications. C) Over 75 billion have been downloaded. D) Apple's goal of offering apps is to increase sales of iPhones, iPads, and iPods.

B) They are cross-platform, open-source applications.

Which of the following is not true about the use of apps? A) The average U.S. consumer spends over 2 hours and 45 minutes a day using apps. B) Users still spend less time using apps than they do using desktops or mobile Web sites. C) Apps are easier to control and monetize than Web sites. D) Over 175 million people in the United States launch a smartphone app more than 60 times a day.

B) Users still spend less time using apps than they do using desktops or mobile Web sites.

________ and ________ are typically the most easily identifiable aspects of a company's business model. A) Market strategy; market opportunity B) Value proposition; revenue model C) Value proposition; competitive environment D) Revenue model; market strategy

B) Value proposition; revenue model

Which of the following is an example of a CMS? A) Apache B) WordPress C) Dreamweaver CC D) Webtrends Analytics

B) WordPress

The address used by a browser to identify the location of content on the Web is called: A) a domain name. B) a uniform resource locator. C) an IP address. D) a file path.

B) a uniform resource locator.

The Internet Layer of TCP/IP is responsible for which of the following? A) placing packets on and receiving them from the network medium B) addressing, packaging, and routing messages C) providing communication with the application by acknowledging and sequencing the packets to and from the application D) providing a variety of applications with the ability to access the services of the lower layers

B) addressing, packaging, and routing messages

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use: A) access controls. B) an authorization management system. C) security tokens. D) an authorization policy.

B) an authorization management system.

Which of the following dimensions of e-commerce security is not provided for by encryption? A) confidentiality B) availability C) message integrity D) nonrepudiation

B) availability

Where does TLS operate within TCP/IP? A) between the Internet Layer and the Transport Layer B) between the Transport Layer and the Application Layer C) between the Network Interface Layer and the Transport Layer D) between the Internet Layer and the Application Layer

B) between the Transport Layer and the Application Layer

Rustock is an example of which of the following? A) worm B) botnet C) phishing D) hacktivism

B) botnet

Accessing data without authorization on Dropbox is an example of which of the following? A) social network security issue B) cloud security issue C) mobile platform security issue D) sniffing

B) cloud security issue

Which element of the business model relates to the power of customers and suppliers with respect to a business? A) value proposition B) competitive environment C) competitive advantage D) market strategy

B) competitive environment

Which of the following is the top-selling online retail category? A) apparel/accessories B) computers/electronics C) mass merchant/department stores D) office supplies

B) computers/electronics

) The primary way a Web site is able to personalize the content presented to a visitor is through the use of: A) privacy policies. B) cookies. C) accessibility rules. D) site management tools.

B) cookies.

All of the following are limitations of the existing online credit card payment system except: A) poor security. B) cost to consumers. C) cost to merchant. D) social equity

B) cost to consumers.

Which of the following basic system functionalities is used to display goods on a Web site? A) product database B) digital catalog C) shopping cart system D) customer database system

B) digital catalog

Over the past decade, the number of exchanges has: A) greatly increased. B) diminished sharply. C) stayed about the same. D) increased slowly but steadily.

B) diminished sharply.

What type of Internet access technology are Google and Facebook hoping to use to provide Internet access to remote parts of the world? A) Bluetooth B) drones C) WLANs D) DSL

B) drones

The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time. A) search engine marketing B) flash marketing C) yield management D) bait-and-switch

B) flash marketing

All of the following are issues facing Pinterest except: A) copyright infringement. B) inability to retain users. C) spam. D) scams.

B) inability to retain users.

Which of the following features of e-commerce technology allows fine-grained, highly detailed information on consumers' real-time behavior to be gathered and analyzed? A) personalization/customization B) information density C) social technology D) interactivity

B) information density

Which of the following typically includes a data flow diagram to describe the flow of information for an e-commerce site? A) physical design B) logical design C) testing plan D) co-location plan

B) logical design

All of the following are basic functionality provided by e-commerce merchant server software except: A) a product catalog. B) marketing software. C) a shopping cart. D) credit card processing.

B) marketing software.

Which source of e-commerce revenues has grown from nearly zero prior to 2007 to an estimated $84 billion in 2014? A) B2G e-commerce B) mobile B2C e-commerce C) B2B e-commerce D) social e-commerce

B) mobile B2C e-commerce

Impressions are a measure of the: A) number of times an ad is clicked. B) number of times an ad is served. C) number of http requests. D) number of pages viewed.

B) number of times an ad is served.

Which of the following is a Web application that enables Internet users to communicate with each other, although not in real time? A) mobile messaging B) online forum C) SMS messaging D) VoIP

B) online forum

All of the following are business models employed by the music industry except: A) subscription. B) peer-to-peer streaming. C) download-and-own. D) cloud streaming.

B) peer-to-peer streaming.

Conversion rate is a measure of the: A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages. B) percentage of visitors who become customers. C) percentage of existing customers who continue to buy on a regular basis. D) percentage of shoppers who do not return within a year after their initial purchase.

B) percentage of visitors who become customers.

All of the following statements about public key cryptography are true except: A) public key cryptography uses two mathematically related digital keys. B) public key cryptography ensures authentication of the sender. C) public key cryptography does not ensure message integrity. D) public key cryptography is based on the idea of irreversible mathematical functions.

B) public key cryptography ensures authentication of the sender.

A firm's ________ describes how a firm will produce a superior return on invested capital. A) value proposition B) revenue model C) market strategy D) competitive advantage

B) revenue model

Symmetric key cryptography is also known as: A) public key cryptography. B) secret key cryptography. C) PGP. D) PKI.

B) secret key cryptography.

All of the following are simple steps for optimizing Web page content that can reduce response times except: A) reducing unnecessary HTML comments. B) segmenting computer servers to perform dedicated functions. C) using more efficient graphics. D) avoiding unnecessary links to other pages on the site.

B) segmenting computer servers to perform dedicated functions.

Which of the following are Amazon's primary value propositions? A) personalization and customization B) selection and convenience C) reduction of price discovery cost D) management of product delivery

B) selection and convenience

Which of the following measures the average length of stay at a Web site? A) loyalty B) stickiness C) recency D) retention rate

B) stickiness

Which of the following is the best definition of transaction cost? A) the expense of changing national or regional prices B) the cost of participating in a market C) the cost of finding suitable products in the market D) the cost merchants pay to bring their goods to market

B) the cost of participating in a market

All of the following statements about cookies are true except: A) cookies can be used with Web bugs to create cross-site profiles of users. B) the data typically stored in cookies includes a unique ID and e-mail address. C) cookies make shopping carts possible by allowing a site to keep track of a user's actions. D) the more cookies are deleted, the less accurate ad server metrics become.

B) the data typically stored in cookies includes a unique ID and e-mail address.

What is the most frequent cause of stolen credit cards and card information today? A) lost cards B) the hacking and looting of corporate servers storing credit card information C) sniffing programs D) phishing attacks

B) the hacking and looting of corporate servers storing credit card information

The existence of a large number of competitors in any one market segment may indicate: A) an untapped market niche. B) the market is saturated. C) no one firm has differentiated itself within that market. D) a market that has already been tried without success.

B) the market is saturated.

The term stateless refers to the fact that: A) no one government entity controls the Internet. B) the server does not have to maintain an ongoing dedicated interaction with the client computer. C) system performance degrades as more simultaneous users require service. D) Web servers may maintain multiple instances of server software to handle requests.

B) the server does not have to maintain an ongoing dedicated interaction with the client computer.

Which of the following is not a major business trend in e-commerce in 2014-2015? A) the growth of a mobile app-based online economy. B) the weakening revenues of B2B e-commerce. C) the emergence of social e-commerce. D) the growth of the mobile advertising platform.

B) the weakening revenues of B2B e-commerce.

All of the following are characteristics of Web 2.0 sites and applications except: A) they support interactions among users. B) they rely solely on mobile access to the Web. C) they tend to rely on user-generated content. D) they tend to attract large audiences that provide marketers with extraordinary opportunities for targeted marketing and advertising.

B) they rely solely on mobile access to the Web.

Recency refers to the: A) percentage of customers who do not return during the next year after an initial purchase. B) time elapsed since the last action taken by a customer. C) percentage of existing customers who continue to buy on a regular basis. D) percentage of customers who return to the site within a year to make additional purchases.

B) time elapsed since the last action taken by a customer.

An e-commerce Web site that processes orders requires, at minimum, a ________ system architecture. A) single-tier B) two-tier C) three-tier D) multi-tier

B) two-tier

If you want to determine the size of your Web site's audience, the metric you will use for the most accurate measurement will be: A) page views. B) unique visitors. C) hits. D) reach.

B) unique visitors.

Linden Dollars, created for use in Second Life, are an example of: A) digital cash. B) virtual currency. C) EBPP. D) peer-to-peer payment systems.

B) virtual currency.

An example of an online privacy violation is: A) your e-mail being read by a hacker. B) your online purchasing history being sold to other merchants without your consent. C) your computer being used as part of a botnet. D) your e-mail being altered by a hacker.

B) your online purchasing history being sold to other merchants without your consent.

In 2014, roughly ________ million people in the United States accessed the Internet via tablets. A) 47 B) 67 C) 147 D) 167

C) 147

During which period of time did the Institutionalization phase of Internet development take place? A) 1950-1960 B) 1961-1974 C) 1975-1995 D) 1995-through the present

C) 1975-1995

In which year can e-commerce be said to have begun? A) 1983 B) 1985 C) 1995 D) 2001

C) 1995

Around ________ % of households in the United States have broadband access to the Internet. A) 45 B) 55 C) 75 D) 85

C) 75

In 2014, what was the approximate Internet penetration rate for individuals that have attained less than a high-school education? A) 45% B) 60% C) 75% D) 90%

C) 75%

Which of the following is not considered a portal? A) Yahoo B) MSN C) Amazon D) AOL

C) Amazon

________ refers to the ability to ensure that an e-commerce site continues to function as intended. A) Nonrepudiation B) Authenticity C) Availability D) Integrity

C) Availability

All of the following are using a subscription revenue model for e-books except: A) Amazon. B) Scribd. C) Barnes and Noble. D) Oyster.

C) Barnes and Noble.

Which of the following is not an example of the bricks-and-clicks e-tailing business model? A) Walmart B) Sears C) Bluefly D) Staples

C) Bluefly

________ create and sell access to digital markets. A) E-distributors B) Portals C) E-procurement firms D) Market creators

C) E-procurement firms

Which of the following statements about Foursquare is not true? A) Foursquare combines a social network business model with location-based technology. B) Foursquare began operating without a revenue model. C) Foursquare's business model faces significant intellectual property concerns. D) Foursquare has been able to command a high valuation from venture capital investors despite unimpressive revenue and profits.

C) Foursquare's business model faces significant intellectual property concerns.

Which of the following search engine algorithm updates enables Google's search engine to evaluate an entire sentence rather than just a key word? A) Panda B) Penguin C) Hummingbird D) Graph Search

C) Hummingbird

The richness made possible by e-commerce technologies does which of the following? A) It reduces the cost of delivering marketing messages and receiving feedback from users. B) It allows consumers to become co-producers of the goods and services being sold. C) It allows video, audio, and text to be integrated into a single marketing message and consuming experience. D) It enables worldwide customer service and marketing communications.

C) It allows video, audio, and text to be integrated into a single marketing message and consuming experience.

Which of the following statements about fiber-optic cable is not true? A) It transmit more data at faster speeds than coaxial or twisted pair cable. B) It is thinner and lighter than coaxial or twisted pair cable. C) It enables better data security than coaxial cable. D) Telecommunications firms have made substantial investments in cross-country fiber optic systems in the last decade.

C) It enables better data security than coaxial cable.

Which of the following is not part of the LAMP open source Web development model? A) Linux B) Apache C) Microsoft IIS D) PHP

C) Microsoft IIS

Which of the following examples illustrates the "Long Tail" phenomenon? A) Rhapsody music streaming service reported that its no play rate had increased to over 20%. B) The number of blockbuster "winner take all" video titles is declining. C) Over 50% of Netflix's 100,000 titles are rented at least once a day by someone. D) The average blog has a readership of slightly more than 1.

C) Over 50% of Netflix's 100,000 titles are rented at least once a day by someone.

Which of the following statements is not true? A) Information asymmetries are continually being introduced by merchants and marketers. B) Intermediaries have not disappeared. C) Overall transaction costs have dropped dramatically. D) Brands remain very important in e-commerce.

C) Overall transaction costs have dropped dramatically.

Which of the following is the most commonly used server-side scripting language? A) Ruby on Rails B) Django C) PHP D) Perl

C) PHP

All of the following statements about PKI are true except: A) The term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties. B) PKI is not effective against insiders who have a legitimate access to corporate systems including customer information. C) PKI guarantees that the verifying computer of the merchant is secure. D) The acronym PKI stands for public key infrastructure.

C) PKI guarantees that the verifying computer of the merchant is secure.

Google introduced which of the following changes to its search algorithm in 2011 to weed out low quality sites from search results? A) Penguin B) Hummingbird C) Panda D) Knowledge Graph

C) Panda

What is the first step in developing an e-commerce security plan? A) Create a security organization. B) Develop a security policy. C) Perform a risk assessment. D) Perform a security audit.

C) Perform a risk assessment.

Which of the following is not a community provider? A) LinkedIn B) Facebook C) Priceline D) Pinterest

C) Priceline

All of the following experienced high-profile data breaches in 2013 except: A) Evernote. B) Home Depot. C) Sony. D) Adobe.

C) Sony.

Which of the following is the core communications protocol for the Internet? A) Telnet B) FTP C) TCP/IP D) TLS

C) TCP/IP

Which of the following statements is true about the traditional tradeoff between the richness and reach of a marketing message prior to the development of the Web? A) Marketing messages had little richness. B) The smaller the audience reached, the less rich the message. C) The larger the audience reached, the less rich the message. D) Richness was unrelated to reach.

C) The larger the audience reached, the less rich the message.

TCP/IP operates in which layer of Internet architecture? A) Network Technology Substrate layer B) Middleware Services layer C) Transport Services and Representation Standards layer D) Applications layer

C) Transport Services and Representation Standards layer

Most of the world's malware is delivered via which of the following? A) viruses B) worms C) Trojan horses D) botnets

C) Trojan horses

________ involves testing a site program's modules one at a time. A) System testing B) Acceptance testing C) Unit testing D) Implementation testing

C) Unit testing

Which of the following is the current standard used to protect Wi-Fi networks? A) WEP B) TLS C) WPA2 D) WPA3

C) WPA2

The early years of e-commerce are considered: A) the most promising time in history for the successful implementation of first mover advantages. B) an economist's dream come true, where for a brief time consumers had access to all relevant market information and transaction costs plummeted. C) a stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year. D) a dramatic business success as 85% of dot-coms formed since 1995 became flourishing businesses.

C) a stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year.

Which of the following is a characteristic of the Consolidation phase of e-commerce? A) predominance of pure online strategies B) emphasis on revenue growth versus profits C) brand extension and strengthening becomes more important that creating new brands D) shift to a technology-driven approach

C) brand extension and strengthening becomes more important that creating new brands

Which of the following measures the ratio of items purchased to product views? A) conversion rate B) cart conversion rate C) browse-to-buy ratio D) view-to-cart ratio

C) browse-to-buy ratio

Most of the time required to maintain an e-commerce site is spent on: A) debugging code. B) responding to emergency situations. C) general administration and making changes and enhancements to the system. D) changes in reports, data files, and links to backend databases.

C) general administration and making changes and enhancements to the system.

Which of the following is the leading cause of data breaches? A) theft of a computer B) accidental disclosures C) hackers D) DDoS attacks

C) hackers

Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as: A) angel investors. B) crowdfunders. C) incubators. D) venture capital investors.

C) incubators.

SupplyOn is an example of a(n): A) private industrial network. B) exchange. C) industry consortium. D) e-distributor.

C) industry consortium.

Which of the following is not a unique feature of e-commerce technology? A) interactivity B) social technology C) information asymmetry D) richness

C) information asymmetry

Which dimension(s) of security is spoofing a threat to? A) integrity B) availability C) integrity and authenticity D) availability and integrity

C) integrity and authenticity

In modeling online consumer behavior, the concept of "consumer skills" refers to the: A) education level of the consumer. B) communication skills of the consumer. C) knowledge consumers have about how to conduct online transactions. D) product evaluation skills of the consumer

C) knowledge consumers have about how to conduct online transactions.

All of the following might be part of a Web site's middle-tier layer except: A) a database server. B) an ad server. C) legacy corporate applications. D) a mail server.

C) legacy corporate applications.

Which of the following is the top reason why consumers choose the online channel? A) availability of a wider variety of products B) social media influence C) lower prices D) the ability to shop 24/7

C) lower prices

The incremental cost of building the next unit of a good is called the: A) Law of One Price. B) variable cost. C) marginal cost. D) fixed cost.

C) marginal cost.

Which of the following is not a variation of the e-tailer business model? A) bricks-and-clicks B) virtual merchant C) market creator D) manufacturer-direct

C) market creator

Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship? A) consumer-to-consumer (C2C) B) social e-commerce C) mobile e-commerce D) business-to-business (B2B)

C) mobile e-commerce

Online bill payment now accounts for ________ of all bill payments, while paper checks account for ________. A) less than 10%, less than 25% B) about 25%, about 10% C) more than 50%, less than 25% D) 100%, 0%

C) more than 50%, less than 25%

Hits are a measure of the: A) number of times an ad is clicked. B) number of times an ad is served. C) number of http requests. D) number of pages viewed.

C) number of http requests.

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called: A) routing. B) the Transmission Control Protocol. C) packet switching. D) the File Transfer Protocol.

C) packet switching.

Purchasing an online ad on a CPA basis means that the advertiser: A) pays for impressions in 1,000 unit lots. B) pays a pre-negotiated fee for each click an ad receives. C) pays only for those users who perform a specific action, such as registering, purchasing, etc. D) exchanges something of equal value for the ad space.

C) pays only for those users who perform a specific action, such as registering, purchasing, etc.

The Transport Layer of TCP/IP is responsible for which of the following? A) placing packets on and receiving them from the network medium B) addressing, packaging, and routing messages C) providing communication with the application by acknowledging and sequencing the packets to and from the application D) providing a variety of applications with the ability to access the services of the lower layers

C) providing communication with the application by acknowledging and sequencing the packets to and from the application

All of the following are steps one can take to right-size a Web site's hardware platform and meet demands for service except: A) scaling hardware vertically. B) scaling hardware horizontally. C) replacing static pages with dynamically generated pages. D) improving processing architecture.

C) replacing static pages with dynamically generated pages.

Portals primarily generate revenue in all of the following ways except: A) charging advertisers for ad placement. B) collecting transaction fees. C) sales of goods. D) charging subscription fees.

C) sales of goods.

Which of the following helps you understand the marketing effectiveness of your e-commerce site? A) shopping cart B) product database C) site tracking and reporting system D) inventory management system

C) site tracking and reporting system

All of the following are traditional online marketing tools except: A) affiliate marketing. B) e-mail and permission marketing. C) social marketing. D) sponsorship marketing.

C) social marketing.

Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers? A) Web site B) e-mail C) social media D) offline media

C) social media

Uber has been criticized for using which of the following? A) flash marketing B) bundling C) surge pricing D) freemium

C) surge pricing

All the following statements about symmetric key cryptography are true except: A) in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message. B) the Data Encryption Standard is a symmetric key encryption system. C) symmetric key cryptography is computationally slower. D) symmetric key cryptography is a key element in digital envelopes.

C) symmetric key cryptography is computationally slower.

Which of the following was the first truly large-scale digitally enabled transaction system in the B2C arena? A) Telex B) the Baxter Healthcare system C) the French Minitel D) EDI

C) the French Minitel

Next generation firewalls provide all of the following except: A) an application-centric approach to firewall control B) the ability to identify applications regardless of the port, protocol, or security evasion tools used C) the ability to automatically update applications with security patches D) the ability to identify users regardless of the device or IP address

C) the ability to automatically update applications with security patches

Which of the following factors is not a significant influence on a company's competitive environment? A) how many competitors are active B) what the market share of each competitor is C) the availability of supportive organizational structures D) how competitors price their products

C) the availability of supportive organizational structures

All of the following are major social trends in e-commerce in 2014-2015 except for: A) the impact of social networks on privacy. B) the continuing conflict over copyright management and control. C) the refusal of online retailers to accept taxation of Internet sales. D) the growth of government surveillance of Internet communications.

C) the refusal of online retailers to accept taxation of Internet sales.

Which of the following types of sites typically needs a high percentage of secure pages? A) Web services B) customer self-service C) trading D) publishing/subscription

C) trading

Internet traffic is predicted to do which of the following over the next 5 years? A) decrease B) double C) triple D) quadruple

C) triple

Which of the following features of e-commerce technology is related to the concept of network externalities? A) richness B) interactivity C) universal standards D) information density

C) universal standards

A ________ is a networked business ecosystem that coordinates a firm's suppliers, distributors, and delivery firms with its own production needs using an Internet-based supply chain management system. A) value chain B) value system C) value web D) business strategy

C) value web

Which of the following is not true regarding e-commerce today? A) Economists' visions of a friction-free market have not been realized. B) Consumers are less price-sensitive than expected. C) There remains considerable persistent price dispersion. D) The market middlemen disappeared.

D) The market middlemen disappeared.

The size of the B2B market in 2014 was estimated to be around: A) $570 million. B) $5.7 billion. C) $570 billion. D) $5.7 trillion.

D) $5.7 trillion.

In 2014, there were an estimated ________ Internet hosts. A) 1 million B) 10 million C) 100 million D) 1 billion

D) 1 billion

For a Web site that has 10 million visitors a month, and where on average, a visitor makes 10 page requests per visit, there will be ________ entries in the transaction log each month. A) 100,000 B) 1 million C) 10 million D) 100 million

D) 100 million

View-through rate measures the ________ response rate to an ad. A) 30-minute B) 24-hour C) 7-day D) 30-day

D) 30-day

Zeus is an example of which of the following? A) SQL injection attack B) browser parasite C) DDoS attack D) Trojan horse

D) Trojan horse

An IPv4 address is expressed as a: A) 32-bit number that appears as a series of four separate numbers separated by semicolons. B) 64-bit number that appears as a series of four separate numbers separated by semicolons. C) 64-bit number that appears as a series of four separate numbers separated by periods. D) 32-bit number that appears as a series of four separate numbers separated by periods.

D) 32-bit number that appears as a series of four separate numbers separated by periods.

"Shoppers" constitute approximately ________ % of the online Internet audience. A) 60 B) 70 C) 80 D) 90

D) 90

All of the following use an advertising revenue model except: A) Twitter. B) Yahoo. C) Google. D) Amazon.

D) Amazon.

Which of the following is an example of an integrity violation of e-commerce security? A) A Web site is not actually operated by the entity the customer believes it to be. B) A merchant uses customer information in a manner not intended by the customer. C) A customer denies that he or she is the person who placed the order. D) An unauthorized person intercepts an online communication and changes its contents.

D) An unauthorized person intercepts an online communication and changes its contents.

All of the following offer Web site building tools except: A) Weebly B) Google Sites C) WordPress D) Apache

D) Apache

The Web runs in which layer of Internet architecture? A) Network Technology Substrate layer B) Middleware Services layer C) Transport Services and Representation Standards layer D) Applications layer

D) Applications layer

Which of the following technologies could you use to place the content of your Web site in a database so that you can then dynamically generate requests for pages? A) Apache web server B) proxy server C) shopping cart D) CMS

D) CMS

________ is a model of computing in which firms and individuals obtain computing power and software applications over the Internet, rather than purchasing and installing it on their own computers. A) Client/server computing B) P2P computing C) Mobile computing D) Cloud computing

D) Cloud computing

Which of the following is not a mobile messaging application? A) Facebook Messenger B) WhatsApp C) Viber D) Cortana

D) Cortana

All of the following are methods of securing channels of communication except: A) SSL/TLS. B) certificates. C) VPN. D) FTP.

D) FTP.

The concept behind document formatting had its roots in which of the following? A) XML B) SGML C) HTML D) GML

D) GML

Which of the following statements about e-commerce in the United States in 2014 is not true? A) Mobile e-commerce generates more revenue than social e-commerce. B) Over 160 million Americans are expected to make at least one purchase online. C) B2B e-commerce is about 10 times the size of B2C e-commerce. D) Growth rates for retail e-commerce are higher in the United States than in China.

D) Growth rates for retail e-commerce are higher in the United States than in China.

Which of the following cannot be used to retrieve objects from a database? A) CGI B) ASP C) JSP D) HTML

D) HTML

Which of the following organizations involved with Internet governance has the United States recently announced it would transition control of? A) ICANN B) IGF C) NTIA D) IANA

D) IANA

Which of the following organizations coordinates the Internet's systems of unique identifiers, such as IP addresses and top-level domain systems? A) IETF B) IAB C) W3C D) ICANN

D) ICANN

Which of the following is a mobile photo-sharing application? A) YouTube B) Tumblr C) Wikipedia D) Instagram

D) Instagram

The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices. A) Internet Engineering Steering Group (IESG) B) World Wide Web Consortium (W3C) C) Internet Engineering Task Force (IETF) D) Internet Society (ISOC)

D) Internet Society (ISOC)

Which of the following is not a characteristic of a perfect competitive market? A) Price, cost, and quality information are equally distributed. B) A nearly infinite set of suppliers compete against one another. C) Customers have access to all relevant information worldwide. D) It is highly regulated.

D) It is highly regulated.

________ is a programming language invented by Netscape used to control the objects on an HTML page and handle interactions with the browser. A) VBScript B) ActiveX C) ColdFusion D) JavaScript

D) JavaScript

Which of the following describes the basic Web policy of large firms during the Invention period? A) Integrate social networks and the mobile platform with Web site marketing. B) Emphasize the necessity for the Web to generate profits. C) Use the Web to sell complex goods and services online. D) Maintain a basic, static Web site depicting the firm's brand.

D) Maintain a basic, static Web site depicting the firm's brand.

Which of the following is an example of the affiliate revenue model? A) Oyster B) eBay C) L.L. Bean D) MyPoints

D) MyPoints

Which of the following occurred during the Commercialization phase of Internet development? A) The fundamental building blocks of the Internet were realized in actual hardware and software. B) Mosaic was invented. C) The Domain Name System was introduced. D) NSF privatized the operation of the Internet's backbone.

D) NSF privatized the operation of the Internet's backbone.

Which of the following was not able to successfully implement a freemium business model? A) Pandora B) Dropbox C) LinkedIn D) Ning

D) Ning

Which of the following is not true about search engine advertising? A) Spending on search engine advertising constitutes over 40% of all online advertising spending. B) The top three search engine providers supply over 95% of all online searches. C) The click-through rate for search engine marketing has been fairly steady over the years. D) Search engine advertising is the fastest growing type of online advertising.

D) Search engine advertising is the fastest growing type of online advertising.

All of the following can be considered a direct or indirect competitor of Amazon except: A) eBay. B) Apple's iTunes Store. C) Walmart. D) Starbucks.

D) Starbucks.

All of the following are methods of improving the processing architecture of a Web site except: A) separating static content from dynamic content. B) optimizing ASP code. C) optimizing the database schema. D) adding Web servers.

D) adding Web servers.

All of the following are important factors in Web site optimization except: A) selecting keywords and page titles. B) identifying market niches for your services or products. C) buying search engine ads. D) adhering to accessibility guidelines.

D) adhering to accessibility guidelines.

Which of the following is not a feature that is driving the growth of social marketing and advertising? A) social sign-on B) network notification C) collaborative shopping D) affiliate programs

D) affiliate programs

You could expect to find all of the following services in a Web server software package except: A) security services. B) FTP. C) search engine. D) an RSS aggregator.

D) an RSS aggregator.

An intrusion detection system can perform all of the following functions except: A) examining network traffic. B) setting off an alarm when suspicious activity is detected. C) checking network traffic to see if it matches certain patterns or preconfigured rules. D) blocking suspicious activity.

D) blocking suspicious activity.

Advantages of dynamic page generation include all of the following except: A) lowered menu costs. B) market segmentation. C) nearly cost-free price discrimination. D) client-side execution of programming

D) client-side execution of programming

Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture? A) fiber optics B) Wi-Fi C) IPv6 D) client/server networking

D) client/server networking

Which of the following is not one of the main stages of the online purchasing process? A) post-purchase service and loyalty B) awareness C) evaluation D) conversation

D) conversation

Which system functionality must your Web site have in order to be able to personalize or customize a product for a client? A) an ad server B) a site tracking and reporting system C) an inventory management system D) customer on-site tracking

D) customer on-site tracking

Which of the following online advertising formats attracted the least amount of spending in 2014? A) search B) classifieds C) rich media D) e-mail

D) e-mail

All of the following are examples of business-to-business (B2B) business models except: A) e-distributors. B) e-procurement. C) exchanges. D) e-tailers.

D) e-tailers.

Which of the following is a characteristic of the Reinvention phase of e-commerce? A) massive proliferation of dot-com start-ups B) widespread adoption of broadband networks C) rapid growth of search engine advertising D) expansion of e-commerce to include services as well as goods

D) expansion of e-commerce to include services as well as goods

All of the following were visions of e-commerce expressed during the early years of e-commerce except: A) a nearly perfect information marketspace. B) friction-free commerce. C) disintermediation. D) fast follower advantage.

D) fast follower advantage.

A strategy designed to compete within a narrow market or product segment is called a ________ strategy. A) scope B) differentiation C) cost D) focus

D) focus

Which of the following is one of the three primary societal issues related to e-commerce? A) liability B) anonymity C) equity D) intellectual property

D) intellectual property

A ________ specifically details how you plan to find customers and to sell your product. A) sales analysis B) business plan C) competitive strategy D) market strategy

D) market strategy

When talking about the physical elements of the Internet, the term redundancy refers to: A) transmitting multiple copies of a single packet to safeguard against data loss. B) the use of tiered high-speed switching computers to connect the backbone to regional and local networks. C) delays in messages caused by the uneven flow of information through the network. D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

Which of the following is not a primary source of ad fraud? A) browser extensions that insert ads into a premium publisher's Web site and then list the ads as available on a programmatic ad exchange B) ad targeting firms that create bots that imitate the behavior of real shoppers and then charge advertisers C) botnets hired by publishers to click on Web pages to create phony traffic D) native advertising that is displayed on a social media site

D) native advertising that is displayed on a social media site

Which of the following is not one of the basic business objectives for an e-commerce site? A) display goods B) execute a transaction C) provide production and supplier links D) optimize system architecture

D) optimize system architecture

All of the following are used for authentication except: A) digital signatures. B) certificates of authority. C) biometric devices. D) packet filters.

D) packet filters.

Which of the following details the actual hardware components to be used in a system? A) architecture plan B) system functionalities plan C) logical design D) physical design

D) physical design

All of the following are Web site design features that annoy customers except: A) slow-loading pages. B) pop-under ads. C) splash pages. D) redundant navigation.

D) redundant navigation.

Which of the following is a high-speed, medium-range, broadband wireless metropolitan area network? A) Wi-Fi B) WiMAX C) Bluetooth D) ZigBee

WiMAX


संबंधित स्टडी सेट्स

Chapter 1: Introduction to Accounting and Business

View Set

Socrates, Aristotle, and Plato the three philosophers

View Set

CompTia Security+ Post Assessment

View Set