E-Com Final study guide
Which of the following age groups has the highest percentage of Internet access?
18-29
E-commerce can be said to have begun in:
1995
On a typical day, approximately ________ percent of adult users in the United States logs on to the Internet.
82
"Shoppers" constitute approximately ________ percent of the online Internet audience.
88
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
The leading Web server software is:
Apache
________ refers to the ability to ensure that messages and data are only available to those authorized to view them.
Confidentiality
Which of the following is not an example of the bricks-and-clicks e-tailing business model?
Dell.com
Which of the following is not a type of application server?
FTP server
Apache HTTP Web server software is based on Microsoft's Windows operating system.
False
Copyright protection protects against others copying the underlying ideas in a work.
False
One of the most important challenges in developing an e-commerce presence is understanding that the technology must drive the business.
False
Online shoppers tend to browse for available products rather than search for specific products they have determined in advance.
False
Phishing attacks rely on browser parasites.
False
Which of the following statements about the Web is not true?
It is the technology upon which the Internet is based.
Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?
No Free Lunch
All of the following can be considered a direct or indirect competitor of Amazon.com except:
Starbucks.
A Trojan horse appears to be benign, but then does something other than expected.
True
A majority of states in the United States have laws regulating or prohibiting spam.
True
A worm does not need to be activated by a user in order for it to replicate itself.
True
All firms need an organization to efficiently implement their business plans and strategies.
True
Customization involves changing a delivered product or service based upon a consumer's preferences or past purchasing behavior.
True
E-commerce as we know it today would not exist without the Internet.
True
E-commerce is a major conduit and generator of offline commerce.
True
In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.
True
Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.
True
Net neutrality refers to Internet backbone owners treating all Internet traffic equally.
True
Price is the top factor in online purchase decisions.
True
Search engine marketing saves consumers cognitive energy and reduces search costs.
True
Social technologies change industry structure by shifting programming and editorial decisions to consumers.
True
Spending on social advertising is less than 10 percent of spending on all online advertising.
True
The Children's Online Privacy Protection Act (COPPA) prohibits Web sites from collecting information on children under the age of 13.
True
The annual maintenance cost for a Web site is likely to be as high as its development cost.
True
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
True
The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.
True
The systems development life cycle methodology is useful when creating an e-commerce Web site.
True
The terms revenue model and financial model can be used interchangeably.
True
Web 2.0 describes a set of applications and technologies that encourage and rely on user- and consumer-generated interactivity and content.
True
Which of the following is not an example of a social network?
Wikipedia
Which of the following is an example of a CMS?
WordPress
The early years of e-commerce are considered:
a stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year
Most of the world's spam is delivered via which of the following?
botnet
Which element of the business model examines who else occupies the firm's intended marketspace?
competitive environment
The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:
confidentiality.
Downloading music tracks owned by record companies without paying for them is an example of a violation of:
copyright law.
In the United States, the primary form of online payment is:
credit cards.
All of the following are basic information requirements for a product database except:
customer ID numbers.
Which system functionality must your Web site have in order to be able to personalize or customize a product for a client?
customer on-site tracking
Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:
cybersquatting.
Over which of the following does ICANN have authority?
domain name system
Which of the following basic ethical concepts plays an important role in defining privacy?
due process
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
firewall
The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time.
flash marketing
The display of a third-party's Web site or page within your own Web site is called:
framing.
Which of the following is the top concern of Internet users about purchasing online?
inability to see and touch before buying
All of the following are key elements of a business model except:
information technology strategy
The placing of a cookie on a user's hard drive by one site that is then used by another site to sell that user related products without the knowledge of the user is:
legal in the United States but illegal in Europe.
A system design has two main components:
logical design and physical design
Which of the following describes the basic Web policy of large firms during the period of invention?
maintain a basic, static Web site
A business document that specifically details how you plan on selling your product and find new customers is called a:
market strategy.
Hits are a measure of the:
number of http requests
Unfair competitive advantages occur when:
one competitor has an advantage others cannot purchase.
Amazon has a patent on:
one-click purchasing.
All of the following are business models employed by the music industry except:
peer-to-peer streaming.
Conversion rate is a measure of the:
percentage of visitors who become customers
All of the following are assets of Twitter except:
retail inventory.
What is the primary revenue model for an e-distributor?
sales
Which of the following are Amazon's primary value propositions?
selection and convenience
Which of the following would you use to identify orphan files?
site management tools
Which of the following helps you understand the marketing effectiveness of your e-commerce site?
site tracking and reporting system
Which of the following is used to collect and analyze detailed information on page content viewed by users?
site transaction logs
Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?
social technology
Which of the following tools can companies use to track users' social and political views and activities?
spyware
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
spyware.
Which of the following measures the average length of stay at a Web site?
stickiness
Your startup firm has developed Web-based note-taking software that allows participants to create and share virtual notes attached to existing Web pages. You anticipate marketing your online application to Web development and design companies. Which of the following revenue models is the most appropriate for your new company?
subscription
In order from beginning to end, the major steps in the SDLC, are:
systems analysis/planning; systems design; building the system; testing; and implementation.
All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except:
targeted banner ads.
Above all, e-commerce is a ________ phenomenon.
technology-driven
In a SWOT analysis, you describe all of the following except the business's:
technology.
Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?
the Golden Rule
All of the following are factors in contributing to the increase in cybercrime except:
the Internet's similarity to telephone networks.
Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all?
the Slippery Slope
What is the major reason that the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?
the ability to make perfect copies of digital works at little cost
What is the most frequent cause of stolen credit cards and card information today?
the hacking and looting of corporate servers storing credit card information
The basic value proposition of community providers is:
they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.
If you want to determine the size of your Web site's audience, the metric you will use for the most accurate measurement will be:
unique visitors.
E-commerce can be defined as:
use of the internet and web to transact business
Which of the following activities is the one engaged in by the highest percentage of online users?
using e-mail
Which of the following forms of online advertising is growing the fastest?
video
Which of the following online advertising formats is the most effective?
video ads
A program which spreads by sending e-mails from an infected computer to all of the e-mail addresses found on that infected computer is an example of a:
worm/Trojan horse.
An example of a privacy violation of e-commerce security is:
your online purchasing history being sold to other merchants without your consent.