Chapter 2,5,11
________ is another name for transorganizational business processes.
Collaborative commerce
T or F: Phishing attacks rely on browser parasites.
False
An ________ primarily serves businesses that primarily buy direct goods on a spot purchasing basis.
exchange
Private industrial networks are direct descendants of:
existing EDI networks.
Exostar is an example of a(n):
industry consortium.
All of the following use an advertising revenue model except:
Amazon (Facebook, yahoo, google do)
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
Which of the following is an example of an e-procurement Net marketplace?
Ariba
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
Authenticity
Which of the following companies utilizes a transaction fee revenue model?
E*Trade
All of the following are methods of securing channels of communication except:
FTP
T or F: Virtually all firms, both large and small, now use Electronic Data Interchange (EDI) systems.
False
Which of the following is another name for a private industrial network?
PTX
A(n) ________ system continuously links the activities of buying, making, and moving products from suppliers to purchasing firms, as well as integrating order entry systems.
SCM
All of the following can be considered a direct or indirect competitor of Amazon.com except:
Starbucks
T or F: A Trojan horse appears to be benign, but then does something other than expected.
True
T or F: Collaborative commerce is primarily concerned with the development of a rich communications environment.
True
T or F: MRO goods are also known as indirect goods.
True
A ________ coordinates a firm's suppliers, distributors, and delivery firms with its own production needs using an Internet-based supply chain management system.
Value Web
Which of the following was the first step in the development of B2B commerce?
automated order entry systems
Which of the following dimensions of e-commerce security is not provided for by encryption?
availability
Which element of the business model examines who else occupies the firm's intended marketspace?
competitive environment
The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:
confidentiality.
EDI began as a(n) ________ system.
document automation
Proxy servers are also known as:
dual home systems
An ________ provides electronic catalogs that represent the products of thousands of direct manufacturers.
e-distributor
Which of the following primarily deal with indirect goods?
e-distributors and e-procurement Net marketplaces
The business model of e-distributors is quite similar to that of:
e-tailers.
If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:
enable individual customization of the product by consumers.
Which of the following primarily deal with direct goods?
exchanges and industry consortia
An example of an indirect good in the fast-food industry is:
fax paper.
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
firewall
A strategy designed to compete within a narrow market or product segment is called a ________ strategy.
focus
Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?
global reach
An ________ primarily serves businesses that primarily buy direct goods on a contract purchasing basis.
industry consortium
All of the following are key elements of a business model except:
information technology strategy.
Which of the following is a method of inventory cost management that seeks to eliminate excess inventory?
just-in-time production
According to the Computer Security Institute's 2011 Computer Crime and Security Survey, which of the following was the most commonly reported type of attack?
malware infection
A business document that specifically details how you plan on selling your product and find new customers is called a:
market strategy.
Which of the following is the fastest growing form of online B2B e-commerce?
private industrial networks
What is the first step in the procurement process?
search for suppliers
Which of the following are Amazon's primary value propositions?
selection and convenience
A digital certificate contains all of the following except the:
subject's private key.
Which of the following terms refers to the total flow of value among firms?
total inter-firm trade
Expedia is an example of a:
transaction broker.
Analysts predict that B2B e-commerce in the United States will grow by 2016 to approximately:
$5.6 trillion
Which of the following statements about Groupon is not true?
Groupon has yet to show a profit.
________ refers to the ability to ensure that e-commerce participants do not deny their online actions
Nonrepudiation
Horizontal or general portals primarily generate revenue in all of the following ways except:
sales of goods.
The existence of a large number of competitors in any one market segment may indicate:
the market is saturated.
Malware that comes with a downloaded file that a user requests is called a:
drive-by download
An ________ is an independently owned, online marketplace that connects hundreds to potentially thousands of suppliers and buyers in a dynamic, real-time environment.
exchange
Stickiness is an important attribute for which revenue model?
advertising revenue model
________ is a method for ensuring that suppliers precisely deliver ordered parts at a specific time and to a particular location.
Tight coupling
Your solar-panel manufacturing firm has developed a unique and patented process for creating high-efficiency solar panels at a fraction of current costs. This will enable your firm to adopt a strategy of:
cost competition.
The Computer Security Institute reported in its 2011 survey that approximately ________ percent of responding organizations experienced a computer security incident within the previous 12 months.
45
The last step in the procurement process is:
sending a remittance payment.
Which element of the business model addresses the question of why a customer should buy from the firm?
value proposition