E-Commerce - Chapter 1, E-commerce Chapter 2 MCQ, E-Commerce Chapter 3, E-Commerce Chapter 4, E-commerce chapter 5, Ecommerce chapter 5 quiz 1, E-commerce chapter 6, E-commerce Chapter 7, E-commerce chapter 8, Ecommerce Quiz 2- Chapter 9, Chapter 9,...

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

22) The percentage of all e-mail that is spam averaged around ________% in 2016. 1. A) 53 2. B) 63 3. C) 73 4. D) 83

A

49) Pinterest's visitors are predominantly women.

Answer: TRUE

74) What is the largest sector of the online travel services market in terms of revenue? A) hotel reservations B) car reservations C) cruise/tour reservations D) airline reservations

D

The Web runs in which layer of Internet architecture? A) Network Technology Substrate layer B) Middleware Services layer C) Transport Services and Representation Standards layer D) Applications layer

D

Which of the following is not a basic type of cloud computing service? A) IaaS B) PaaS C) SaaS D) FiOS

D

You could expect to find all of the following services in a Web server software package except: A) security services. B) FTP. C) search engine. D) an RSS aggregator.

D

34) Phishing attacks rely on browser parasites.

FALSE

62) Transaction logs are built into web server software.

true

________ is an example of an e-distributor. A) Amazon Business B) PowerSource Online C) SupplyOn D) Elemica

A) Amazon Business

46) All of the following statements about Amazon are true except: A) Amazon failed to show a profit in 2015. B) Amazon Web Services is now a major part of Amazon's business. C) eBay can be considered a competitor of Amazon. D) Amazon continues to generate revenue primarily by selling products.

A) Amazon failed to show a profit in 2015.

All of the following are forms of collaboration among businesses except: A) RFQs. B) CPFR. C) demand chain visibility. D) marketing coordination and product design.

A) RFQs.

64) In ________, all of a customer's financial (and even nonfinancial) data are pulled together at a single personalized website. A) account aggregation B) a financial portal C) integrated financial services D) EBPP systems

A) account aggregation

79) Apple's iBeacon uses which of the following technologies? 1. A) BLE 2. B) NFC 3. C) E9-1-1 4. D) QR codes

Answer: A

50) Grainger.com is an example of which of the following business models? A) B2B service provider B) exchange C) e-distributor D) industry consortia

Answer: C

79) Private industrial networks are direct descendants of: A) e-procurement Net marketplaces. B) existing EDI networks. C) independent exchanges. D) industry consortia.

B

The backbone of the Internet is formed by: A) Internet Exchange Points (IXPs). B) Tier 1 ISPs. C) Network Access Points (NAPs). D) Metropolitan Area Exchanges (MAEs).

B

Which of the following is a physical place you visit in order to transact? A) marketspace B) marketplace C) social network D) the Internet

B

Which of the following is an example of an on-demand service company? A) YouTube B) Airbnb C) Tumblr D) Facebook

B

Which of the following is not a major business trend in e-commerce in 2015-2016? A) the growth of a mobile app ecosystem B) the weakening revenues of B2B e-commerce C) the emergence of social e-commerce D) the growth of the on-demand service firms

B

Which of the following is not an element of friction-free commerce? A) Information is equally distributed. B) Transaction costs are high. C) Prices can be dynamically adjusted to reflect actual demand. D) Unfair competitive advantages are eliminated.

B

________ are the types of information systems capabilities needed to meet business objectives. A) Information requirements B) System functionalities C) System design specifications D) Physical design specifications

B

________ is another name for transorganizational business processes. A) Supply chain management B) Collaborative commerce C) B2B e-commerce D) Value chain management

B) Collaborative commerce

1) Around ________% of households in the United States have broadband access to the Internet. 1. A) 45 2. B) 55 3. C) 75 4. D) 85

C

Which of the following was the first truly large-scale digitally enabled transaction system in the B2C arena? A) Telex B) the Baxter Healthcare system C) the French Minitel D) EDI

C

Analysts predict that B2B e-commerce in the United States will grow by 2020 to approximately: A) $9 billion. B) $90 billion. C) $900 billion. D) $9 trillion.

D) $9 trillion.

33) A Trojan horse appears to be benign, but then does something other than expected.

TRUE

35) CryptoLocker is an example of ransomware.

TRUE

10) Online traffic is driven by offline brands and shopping.

true

12) Research shows that the two most important factors shaping the decision to purchase online are utility and trust.

true

37) Exploit kits are often rented or sold as a commercial product.

true

9) Which of the following categories generates the highest percentage of online retail revenue? A) computers and electronics B) apparel and accessories C) books/music/video D) automobile and automobile parts and accessories

B

During which phase of the development of the Internet was the Domain Name System (DNS) introduced? A) Commercialization phase B) Institutional phase C) Innovation phase D) Consolidation phase

B

The layer of Internet architecture that ties the applications to the communications network and includes such services as security and authentication is called the: A) Network Technology Substrate layer. B) Middleware Services layer. C) Transport Services and Representation Standards layer. D) Applications layer.

B

Which form of testing compares a control page with one that is very different? A) template test B) new concept test C) funnel test D) system test

B

Which of the following is a Web application that enables Internet users to communicate with each other, although not in real time? A) mobile messaging B) online forum C) SMS messaging D) VoIP

B

Which of the following is a standard that makes it possible to access data from any application regardless of the database and operating system software being used? A) CGI B) ODBC C) MySQL D) HTTP

B

Which of the following statements about B2B marketing is not true? A) Mobile B2B marketing consumes only 5% of B2B marketing budgets. B) B2B marketing accounts for over 25% of the total amount spent on digital marketing and advertising. C) Content marketing is one of the primary and most effective marketing tools in B2B marketing. D) The disparity between the amount spent on B2B marketing compared to B2C e-commerce reflects the different nature of much of B2B e-commerce when compared to B2C e-commerce.

B) B2B marketing accounts for over 25% of the total amount spent on digital marketing and advertising.

44) Which of the following is a subscription-based retailer using predictive marketing and Big Data? A) Macy's B) Birchbox C) Dell D) Lands' End

B) Birchbox

75) Which of the following statements is not true? A) Price competition among online travel services is difficult as comparison shopping for better prices is easy. B) Online travel services are one of the few sectors in which extensive disintermediation has occurred. C) The ability of travel products and services to be commoditized is a significant factor in the explosive growth of the online travel services industry. D) The online travel services industry has gone through a period of consolidation.

B) Online travel services are one of the few sectors in which extensive disintermediation has occurred.

15) Which of the following had the highest online sales revenue in 2015? A) Macy's B) Walmart C) Sears D) Target

B) Walmart

30) The lower the ________ compared to revenue, the higher the gross profit. A) assets B) cost of sales C) gross margin D) operating expenses

B) cost of sales

31) Gross margin is defined as gross profit: A) minus total operating expenses. B) divided by net sales revenues. C) divided by cost of sales. D) minus net income.

B) divided by net sales revenues.

Which of the following primarily deals with indirect goods? A) e-distributors and industry consortia B) e-distributors and e-procurement Net marketplaces C) exchanges and industry consortia D) exchanges and e-procurement Net marketplaces

B) e-distributors and e-procurement Net marketplaces

An ________ primarily serves businesses that buy indirect goods on a contract purchasing basis. A) e-distributor B) e-procurement Net marketplace C) exchange D) industry consortium

B) e-procurement Net marketplace

Private industrial networks are direct descendants of: A) e-procurement Net marketplaces. B) existing EDI networks. C) independent exchanges. D) industry consortia.

B) existing EDI networks.

TheSeam is an example of an ________. A) exchange B) industry consortium C) e-procurement Net marketplace D) e-distributor

B) industry consortium

17) Which of the following is the leading cause of data breaches? A) theft of a computer B) accidental disclosures C) hackers D) DDoS attacks

C

21) Which dimension(s) of security is spoofing a threat to? 1. A) integrity 2. B) availability 3. C) integrity and authenticity 4. D) availability and integrity

C

26) Which of the following is not an example of a PUP? 1. A) adware 2. B) browser parasite 3. C) drive-by download 4. D) spyware

C

26) Which of the following is not an example of a PUP? A) adware B) browser parasite C) drive-by download D) spyware

C

55) Proxy servers are also known as: 1. A) rewalls. 2. B) application gateways. 3. C) dual home systems. 4. D) packet lters.

C

Which of the following types of sites typically needs a high percentage of secure pages? A) Web services B) customer self-service C) trading D) publishing/subscription

C

39) Which of the following provides a financial snapshot of a company's assets and liabilities (debts) on a given date? A) working capital B) operating margin C) balance sheet D) gross margin

C) balance sheet

34) What is another name for pro forma earnings? A) net margin B) operating income C) earnings before income taxes, depreciation, and amortization (EBITDA) D) generally accepted accounting principles (GAAP) earnings

C) earnings before income taxes, depreciation, and amortization (EBITDA)

15) All of the following are prominent hacktivist groups except: A) Anonymous. B) LulzSec. C) Impact Team. D) Avid Life.

D

22) What is the first step in the procurement process? A) negotiate price B) qualify the seller and its products C) issue a purchase order D) search for suppliers

D

29) All of the following are strategic factors that pertain specifically to a firm and its related businesses except: A) core competencies. B) synergies. C) technology. D) power of customers.

D

47) All of the following are challenges faced by bricks-and-clicks firms except: A) coordinating prices across channels. B) handling returns of online purchases at retail outlets. C) building a credible website. D) building a brand name.

D

48) A(n) ________ supply chain is one in which the labor conditions in low-wage, underdeveloped producer countries are visible and morally acceptable to ultimate consumers in more developed industrial societies. A) sustainable B) ethical C) lean D) accountable

D

50) ________ is defined as the use of digital technologies to permit organizations to work together to design, develop, build, and manage products through their life cycles. A) SCM B) Social e-commerce C) EDI D) Collaborative commerce

D

52) Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users? 1. A) ubiquity 2. B) richness 3. C) information density 4. D) universal standards

D

63) Which of the following statements about online banking is not true? A) Top mobile banking activities include checking balances and bank statements and viewing recent transactions. B) Online and mobile banking transactions provide significant costs savings for banks. C) Millennials are adopting mobile banking at a much higher rate than those who are older. D) More people use a tablet for mobile banking than a mobile phone.

D

84) All of the following are terms used to describe on-demand service companies except: A) mesh economy. B) collaborative commerce. C) we-commerce. D) omni-channel commerce.

D

A template test is a form of which type of testing? A) unit testing B) system testing C) acceptance testing D) A/B testing

D

All of the following are characteristics of HTML5 except: A) a video element that replaces plug-ins such as Flash, QuickTime, and RealPlayer. B) use of CSS3. C) ability to access built-in functionality of mobile devices, such as GPS and swiping. D) support for digital rights management.

D

Which of the following describes the basic Web policy of large firms during the Invention period? A) Integrate social networks and the mobile platform with Web site marketing. B) Emphasize the necessity for the Web to generate profits. C) Use the Web to sell complex goods and services online. D) Maintain a basic, static Web site depicting the firm's brand.

D

Which of the following details the actual hardware components to be used in a system? A) architecture plan B) system functionalities plan C) logical design D) physical design

D

Which of the following is a utility program that allows you to track the path of a message you send from your client to a remote computer on the Internet? A) Telnet B) Ping C) IMAP D) Tracert

D

Which of the following is one of the three primary societal issues related to e-commerce? A) liability B) anonymity C) equity D) intellectual property

D

Which of the following organizations coordinates the Internet's systems of unique identifiers, such as IP addresses and top-level domain systems? A) IETF B) IAB C) W3C D) ICANN

D

Which of the following organizations involved with Internet governance has the United States recently announced it would give up control over? A) ICANN B) IGF C) NTIA D) IANA

D

Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture? A) fiber optics B) Wi-Fi C) IPv6 D) client/server computing

D

Which of the following technologies is used to separate the design and presentation of content from the content creation process? A) Apache web server B) proxy server C) shopping cart D) CMS

D

________ is a model of computing in computer processing, storage, software, and other services are provided as a shared pool of virtualized resources over the Internet. A) Client/server computing B) P2P computing C) Mobile computing D) Cloud computing

D

ll of the following are examples of Web 2.0 sites and applications except: A) photo-sharing sites. B) blogs. C) wikis. D) auction sites.

D

n IPv4 address is expressed as a: A) 32-bit number that appears as a series of four separate numbers separated by semicolons. B) 64-bit number that appears as a series of four separate numbers separated by semicolons. C) 64-bit number that appears as a series of four separate numbers separated by periods. D) 32-bit number that appears as a series of four separate numbers separated by periods.

D

82) Which of the following is not true about on-demand service firms? A) The growth of on-demand service firms is supported by the use of online reputation systems based on peer review. B) It is not likely that on-demand service firms will totally escape government regulation. C) On-demand service firms facilitate access to resources. D) On-demand service firms are a totally new phenomenon without precedent in the history of e-commerce.

D) On-demand service firms are a totally new phenomenon without precedent in the history of e-commerce.

A(n) ________ system continuously links the activities of buying, making, and moving products from suppliers to purchasing firms, as well as integrating order entry systems. A) EDI B) ERP C) CPFR D) SCM

D) SCM

7) All of the following have launched trials of Buy buttons except: A) Facebook. B) Pinterest. C) Instagram. D) Tumblr.

D) Tumblr.

74) What is the largest sector of the online travel services market in terms of revenue? A) hotel reservations B) car reservations C) cruise/tour reservations D) airline reservations

D) airline reservations

All of the following are examples of direct goods in the auto industry except: A) sheet steel. B) shatter-resistant glass. C) rubber molding. D) desktop computers.

D) desktop computers.

Which of the following primarily involves long-term sourcing? A) e-distributors and exchanges B) e-distributors and industry consortia C) e-procurement Net marketplaces and exchanges D) e-procurement Net marketplaces and industry consortia

D) e-procurement Net marketplaces and industry consortia

Walmart's global supply chain has been criticized for all of the following except: A) exploiting labor in underdeveloped countries. B) bribing officials. C) wasting energy. D) failing to be efficient.

D) failing to be efficient.

10) All of the following are advantages of online retail except: A) lower supply chain costs. B) lower cost of distribution. C) ability to change prices. D) faster delivery of goods.

D) faster delivery of goods.

58) Service industry groups are categorized generally into two groups, those that provide transaction brokering and those that involve: A) retailing goods. B) personalization. C) information brokering. D) hands-on services.

D) hands-on services.

Which of the following is an example of B2B e-commerce? A) Airbnb B) Facebook C) Groupon D) Go2Paper

D? (Said B on key but that doesn't sound right)

80) Apple Pay uses near field communication (NFC) chips.

true

82) There is a finite number of Bitcoins that can be created.

true

48) ________ is a tiered notice and response system aimed at reducing copyright infringement over P2P networks. 1. A) The CAS 2. B) FIP 3. C) Surfright 4. D) The Open Internet Order

Answer: A

60) Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time? A) global reach B) richness C) interactivity D) personalization

Answer: A

68) Megaupload's founder, Kim Dotcom, was arrested in connection with which of the following? 1. A) copyright infringement 2. B) patent infringement 3. C) trademark infringement 4. D) privacy violation

Answer: A

68) Which of the following statements about BLE is not true? 1. A) Only Apple iPhones can use BLE. 2. B) BLE uses less power than traditional Bluetooth or GPS. 3. C) BLE has a two-way, push-pull communication capability. 4. D) BLE is more accurate than targeting through Wi-Fi triangulation.

Answer: A

38) ________ measures the percentage of sales revenue a firm retains after all expenses are deducted from gross revenues. A) Gross profit B) Net margin C) Operating margin D) Working capital

B) Net margin

16) Which of the following is a history of your actions on Facebook? 1. A) News Feed 2. B) Timeline 3. C) Ticker 4. D) Open Graph

Answer: B

19) Which element of the business model examines who else occupies the firm's intended marketspace? A) value proposition B) competitive environment C) competitive advantage D) market strategy

Answer: B

41) An example of a company using the content provider model is: A) Priceline. B) Rhapsody.com. C) Dell. D) eBay.

Answer: B

Which of the following verifies that the business objectives of the system as originally conceived are in fact working? A) system testing B) acceptance testing C) unit testing D) implementation testing

B

Which of the following was the original purpose of the Internet? A) to provide a network that would allow businesses to connect with consumers B) to link large mainframe computers on different college campuses C) to develop a military communications systems that could withstand nuclear war D) to enable government agencies to track civilian communications

B

14) Ads that appear in a Facebook user's News Feeds are called: 1. A) Marketplace Ads. 2. B) Promoted Ads. 3. C) Page Post Ads. 4. D) Brand Ads.

Answer: C

22) Which of the following tools can companies use to trace user statements and views on newsgroups, chat groups, and other public forums? 1. A) cookies 2. B) digital wallets 3. C) search engines 4. D) shopping carts

Answer: C

32) ________ allow(s) you to send e-mail without a trace. 1. A) Anonymous surng 2. B) P3P 3. C) Anonymous remailers 4. D) Public key encryption

Answer: C

33) Companies are not permitted to collect personal information from children under the age of ________ without parental consent. 1. A) 8 2. B) 10 3. C) 13 4. D) 16

Answer: C

35) Organizations that provide not only funding but also an array of services to start-up companies are referred to as: A) angel investors. B) crowdfunders. C) incubators. D) venture capital investors.

Answer: C

54) Exostar is an example of a(n): A) private industrial network. B) exchange. C) industry consortium. D) e-distributor.

Answer: C

62) Which of the following handles cybersquatting cases under its Uniform Dispute Resolution procedures? 1. A) ICANN 2. B) FTC 3. C) WIPO 4. D) USPTO

Answer: C

The address used by a browser to identify the location of content on the Web is called: A) a domain name. B) a uniform resource locator. C) an IP address. D) a file path.

B (URL)

Which of the following is an example of an e-procurement Net marketplace? A) TheSeam B) Ariba C) Grainger D) SupplyOn

B) Ariba

11) Encouraging users to click a Like button is an example of which step in the social marketing process? 1. A) fan acquisition 2. B) brand strength 3. C) community 4. D) amplication

Answer: D

19) The ratio of impressions to fans is a measure of: 1. A) engagement. 2. B) amplication. 3. C) community. 4. D) fan acquisition.

Answer: D

70) Which of the following involves bypassing the target site's home page and going directly to a content page? 1. A) cybersquatting 2. B) metatagging 3. C) framing 4. D) deep linking

Answer: D

All of the following are weaknesses of EDI except: A) EDI is not well suited for electronic marketplaces. B) EDI lacks universal standards. C) EDI does not provide a real-time communication environment. D) EDI does not scale easily.

B) EDI lacks universal standards.

27) An example of an indirect good in the fast-food industry is: A) mustard. B) paper napkins. C) beef. D) sugar.

B

31) Gross margin is defined as gross profit: A) minus total operating expenses. B) divided by net sales revenues. C) divided by cost of sales. D) minus net income.

B

33) Which of the following involves getting customers to pass along a company's marketing message to friends, family, and colleagues? 1. A) aliate marketing 2. B) viral marketing 3. C) native advertising 4. D) lead generation marketing

B

36) Which of the following industries accounts for the highest percentage of spending on online advertising? 1. A) nancial services 2. B) retail 3. C) automotive 4. D) entertainment

B

36) Which of the following statements about B2B marketing is not true? A) Mobile B2B marketing consumes only 5% of B2B marketing budgets. B) B2B marketing accounts for over 25% of the total amount spent on digital marketing and advertising. C) Content marketing is one of the primary and most effective marketing tools in B2B marketing. D) The disparity between the amount spent on B2B marketing compared to B2C e-commerce reflects the different nature of much of B2B e-commerce when compared to B2C e-commerce.

B

47) The Data Encryption Standard uses a(n) ________-bit key. 1. A) 8 2. B) 56 3. C) 256 4. D) 512

B

47) The Data Encryption Standard uses a(n) ________-bit key. A) 8 B) 56 C) 256 D) 512

B

5) All of the following were factors that precipitated the growth of MOTO except: A) the national toll-free call system. B) the growth of the cellular phone industry. C) falling long distance telecommunications prices. D) the growth of the credit card industry.

B

50) All of the following are examples of the challenges that traditional manufacturers experience when using the Internet to sell directly to the consumer except: A) moving to a demand-pull model. B) high cost structures. C) developing a fast-response online order and fulfillment system. D) channel conflict.

B

62) Which of the following is the most common protocol for securing a digital channel of communication? 1. A) DES 2. B) SSL/TLS 3. C) VPN 4. D) HTTP

B

78) Recency refers to the: 1. A) percentage of customers who do not return during the next year after an initial purchase. 2. B) time elapsed since the last visit made by a customer. 3. C) percentage of existing customers who continue to buy on a regular basis. 4. D) percentage of customers who return to the site within a year to make additional purchases.

B

Where does TLS operate within TCP/IP? A) between the Internet Layer and the Transport Layer B) between the Transport Layer and the Application Layer C) between the Network Interface Layer and the Transport Layer D) between the Internet Layer and the Application Layer

B

________ is a method for ensuring that suppliers precisely deliver ordered parts at a specific time and to a particular location. A) Having an adaptive supply chain B) Tight coupling C) Supply-chain management D) Materials requirement planning

B) Tight coupling

The term BYOD refers to employees: A) working from home. B) being allowed or encouraged to use their own mobile devices and laptops. C) using mobile devices for work. D) bringing work devices to the home.

B) being allowed or encouraged to use their own mobile devices and laptops.

Which of the following primarily serves horizontal markets? A) e-distributors and exchanges B) e-distributors and e-procurement Net marketplaces C) e-procurement Net marketplaces and industry consortia D) exchanges and industry consortia

B) e-distributors and e-procurement Net marketplaces

1) Analysts predict that B2B e-commerce in the United States will grow by 2020 to approximately: A) $9 billion. B) $90 billion. C) $900 billion. D) $9 trillion.

D

14) Which of the following forms of online advertising is expected to grow the fastest between 2016 and 2020? 1. A) paid search 2. B) sponsorships 3. C) search engines 4. D) rich media

D

42) Which of the following is not an example of a virtual merchant? A) Overstock B) Wayfair C) Rue La La D) Dell

D

59) Approximately ________% of the United States labor force is involved in providing services. A) 50 B) 60 C) 70 D) 80

D

71) View-through rate measures the ________ response rate to an ad. 1. A) 30-minute 2. B) 24-hour 3. C) 7-day 4. D) 30-day

D

The concept behind document formatting had its roots in which of the following? A) XML B) SGML C) HTML D) GML

D

Which of the following would you use to verify that links on Web pages are valid? A) HTTP B) FTP C) data capture tools D) site management tools

D

________ is defined as the use of digital technologies to permit organizations to work together to design, develop, build, and manage products through their life cycles. A) SCM B) Social e-commerce C) EDI D) Collaborative commerce

D) Collaborative commerce

42) Which of the following is not an example of a virtual merchant? A) Overstock B) Wayfair C) Rue La La D) Dell

D) Dell

63) Which of the following statements about online banking is not true? A) Top mobile banking activities include checking balances and bank statements and viewing recent transactions. B) Online and mobile banking transactions provide significant costs savings for banks. C) Millennials are adopting mobile banking at a much higher rate than those who are older. D) More people use a tablet for mobile banking than a mobile phone.

D) More people use a tablet for mobile banking than a mobile phone.

1) Which of the following is not a major trend in online retail for 2016-2017? A) Online retail remains the fastest growing retail channel. B) The average annual purchase of online buyers continues to increase. C) Online retailers place an increased emphasis on providing an improved "shopping experience." D) The number of online buyers begins to plateau.

D) The number of online buyers begins to plateau.

A(n) ________ supply chain is one in which the labor conditions in low-wage, underdeveloped producer countries are visible and morally acceptable to ultimate consumers in more developed industrial societies. A) sustainable B) ethical C) lean D) accountable

D) accountable

47) All of the following are challenges faced by bricks-and-clicks firms except: A) coordinating prices across channels. B) handling returns of online purchases at retail outlets. C) building a credible website. D) building a brand name.

D) building a brand name.

48) All of the following are challenges for catalog merchants except: A) high costs of printing and mailing. B) building a credible website. C) the need to bring staff in or manage new technology. D) building sophisticated order entry and fulfillment systems.

D) building sophisticated order entry and fulfillment systems.

Collaborative commerce systems: A) focus on structuring intra-firm communications. B) bring customers into the product development phase. C) provide open, competitive marketplaces. D) foster sharing sensitive internal information with suppliers and purchasers.

D) foster sharing sensitive internal information with suppliers and purchasers.

84) All of the following are terms used to describe on-demand service companies except: A) mesh economy. B) collaborative commerce. C) we-commerce. D) omni-channel commerce.

D) omni-channel commerce.

Cisco estimates that by 2016, mobile traffic will represent ________% of all business Internet traffic. A) less than 5 B) around 10 C) around 15 D) over 25

D) over 25

What is the first step in the procurement process? A) negotiate price B) qualify the seller and its products C) issue a purchase order D) search for suppliers

D) search for suppliers

59) Approximately ________% of the United States labor force is involved in providing services. A) 50 B) 60 C) 70 D) 80

D)80

4) All of the following statements about the MOTO sector are true except: A) compared to general merchandisers, the transition to e-commerce has been easier for MOTO firms. B) the MOTO sector is also referred to as the specialty store sector. C) MOTO was the last technological revolution that preceded e-commerce. D) distribution of catalogs is one of MOTO retailers' biggest expenses.

B) the MOTO sector is also referred to as the specialty store sector.

5) All of the following were factors that precipitated the growth of MOTO except: A) the national toll-free call system. B) the growth of the cellular phone industry. C) falling long distance telecommunications prices. D) the growth of the credit card industry.

B) the growth of the cellular phone industry.

52) Which of the following has the highest share of online retail sales? A) omni-channel merchants B) virtual merchants C) catalog merchants D) manufacturer-direct

B) virtual merchants

10) All of the following experienced high-profile data breaches in 2015 except: A) CVS. B) Walgreens. C) Amazon. D) Experian.

C

14) Supply chain ________ refers to differentiating a firm's products or prices based on superior supply chain management. A) management B) simplification C) competition D) collaboration

C

17) Which of the following is the leading cause of data breaches? 1. A) theft of a computer 2. B) accidental disclosures 3. C) hackers D) DDos attacks

C

29) An ________ primarily serves businesses that buy direct goods on a spot purchasing basis. A) e-distributor B) e-procurement company C) exchange D) industry consortium

C

49) ________ is the current standard used to protect Wi-Fi networks. A) WEP B) TLS C) WPA2 D) WPA3

C

55) Proxy servers are also known as: A) firewalls. B) application gateways. C) dual home systems. D) packet filters

C

57) In the United States, the service sector accounts for approximately ________% of the United States GDP. A) 70 B) 75 C) 80 D) 85

C

59) Which of the following statements is not true? A) A VPN provides both confidentiality and integrity. B) A VPN uses both authentication and encryption. C) A VPN uses a dedicated secure line. D) The primary use of VPNs is to establish secure communications among business partners. `

C

60) Which of the following is not an example of a transaction broker? A) a stockbroker B) a real estate agent C) an accountant D) an employment agency

C

68) What is the first step in developing an e-commerce security plan? A) Create a security organization. B) Develop a security policy. C) Perform a risk assessment. D) Perform a security audit.

C

7) In modeling online consumer behavior, the concept of "consumer skills" refers to the: 1. A) education level of the consumer. 2. B) communication skills of the consumer. 3. C) knowledge consumers have about how to conduct online transactions. 4. D) product evaluation skills of the consumer.

C

83) ________ is an on-demand service company focused on lodging. A) Uber B) Lyft C) Airbnb D) Task Rabbit

C

Most of the time required to maintain an e-commerce site is spent on: A) debugging code. B) responding to emergency situations. C) general administration and making changes and enhancements to the system. D) changes in reports, data files, and links to backend databases.

C

Who wrote the first paper on packet switching networks? A) J.C.R. Licklider B) Ray Tomlinson C) Leonard Kleinrock D) Vint Cert

C

In 2016, the total amount of B2B e-commerce in the United States was approximately: A) $67 billion. B) $670 billion. C) $6.7 trillion. D) $67 trillion.

C) $6.7 trillion.

46) Bundling is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices.

true

The essential characteristic of ________ are they bring hundreds to thousands of suppliers into a single Internet-based environment to conduct trade. A) industry communications B) exchanges C) Net marketplaces D) horizontal markets

C) Net marketplaces

Which of the following is another name for a private industrial network? A) industry consortia B) EDI system C) PTX D) PINS

C) PTX

60) Which of the following is not an example of a transaction broker? A) a stockbroker B) a real estate agent C) an accountant D) an employment agency

C) an accountant

Which of the following is a method of inventory cost management that seeks to eliminate excess inventory? A) lean production B) sustainable production C) just-in-time production D) supply chain simplification

C) just-in-time production

All of the following are potential benefits of B2B e-commerce except: A) lower administrative costs. B) lower search costs. C) lower price transparency. D) lower transaction costs.

C) lower price transparency.

36) Which social marketing proved the most effective for ExchangeHunterJumper.com? 1. A) Facebook 2. B) YouTube 3. C) Pinterest 4. D) Instagram

Answer: A

49) What is the major reason the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law? 1. A) the ability to make perfect copies of digital works at little cost 2. B) the anonymous nature of the Internet 3. C) the support for instant peer-to-peer communication 4. D) the use of standards for le formats

Answer: A

54) All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except: 1. A) up to ten years' imprisonment for a rst offense. 2. B) nes up to $500,000 for a rst offense. 3. C) nes up to $1 million for a repeat offense. 4. D) restitution to the injured parties for any losses due to infringement.

Answer: A

55) Which of the following is an unfair competitive advantage? A) brand name B) access to global markets C) lower product prices D) superior technology

Answer: A

56) The element of a business model that is responsible for making the model work is: A) the management team. B) the organizational structure. C) the firm's key competitive advantage. D) the market strategy.

Answer: A

57) All of the following statements about patents are true except: 1. A) it is more dicult to obtain a copyright than it is to obtain a patent. 2. B) the four types of inventions protected by patent law are machines, manmade products, compositions of matter, and processing methods. 3. C) computer programs can be patented. 4. D) to be patented, an invention must be nonobvious.

Answer: A

58) Which of the following statements is not true? 1. A) Google is the leading display ad site on mobile devices. 2. B) In 2016, Google is expected to generate almost $15 billion in mobile ad revenues. 3. C) Mobile advertising is dominated by Google. 4. D) Google generates almost two-thirds of all mobile search ad spending.

Answer: A

6) Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision? 1. A) the Golden Rule 2. B) Universalism 3. C) the Collective Utilitarian principle 4. D) the Social Contract rule

Answer: A

61) Registering a domain name similar or identical to trademarks of others to extort prots from legitimate holders is an example of: 1. A) cybersquatting. 2. B) cyberpiracy. 3. C) framing. 4. D) metatagging.

Answer: A

64) If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would: A) enable individual customization of the product by consumers. B) implement a strategy of commoditization. C) adopt a strategy of cost competition. D) develop a scope strategy to compete within a narrower market segment.

Answer: A

67) Which of the following statements about the patent battle between Apple and Samsung is not true? 1. A) The courts have decided that Apple does not have a valid patent on the iPhone's user interface. 2. B) The courts have ruled that Samsung has infringed on some of Apple's patents. 3. C) Analysts believe the cost to Apple of this litigation is at least equal to the damage award it may ultimately be paid. 4. D) Over the last ve years of litigation, Samsung has changed its interface and functionality to greatly reduce its infringement.

Answer: A

77) Which of the following is not one of the issues complicating the taxation of e-commerce sales? 1. A) Taxes raised are used for different government purposes. 2. B) Sales taxes and policies vary by state and country. 3. C) Retailers legally only have to charge sales tax if they have operations located in the same state as a consumer. 4. D) Small online businesses are unable to manage sales taxes to thousands of different jurisdictions.

Answer: A

78) Which of the following statements about net neutrality is not true? 1. A) The FCC now regulates ISP pricing. 2. B) The FCC ruled that Internet broadband service providers should be viewed as public utilities similar to telephone companies. 3. C) The FCC overruled state laws that made it dicult for cities to operate their own broadband networks. 4. D) ISPs can no longer discriminate against users on the basis of protocol or amount of usage.

Answer: A

80) Which of the following is the leading location-based mobile ad format? 1. A) search ads 2. B) display ads 3. C) native/social ads 4. D) video ads

Answer: A

10) Which ethical principle tells you it's wise to assume perfect information markets? 1. A) the Golden Rule 2. B) the New York Times test 3. C) the Social Contract rule 4. D) the Collective Utilitarian principle

Answer: B

11) Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost? 1. A) the Slippery Slope 2. B) Risk Aversion 3. C) No Free Lunch 4. D) the Collective Utilitarian principle

Answer: B

13) Downloading a music track owned by a record company without paying for it is an example of a violation of: 1. A) patent law. 2. B) copyright law. 3. C) trademark law. 4. D) privacy law.

Answer: B

14) Which of the following features of e-commerce technology can result in work and shopping invading family life? 1. A) interactivity 2. B) ubiquity 3. C) information density 4. D) global reach

Answer: B

15) How many hours a month does the average Facebook user spend on Facebook? 1. A) 8 2. B) 18 3. C) 28 4. D) 38

Answer: B

16) ________ and ________ are typically the most easily identifiable aspects of a company's business model. A) Market strategy, market opportunity B) Value proposition, revenue model C) Value proposition, competitive environment D) Revenue model, market strategy

Answer: B

17) Which of the following statements is not true? 1. A) Over 90% of Facebook's monthly active users access Facebook via a mobile device at least some of the time. 2. B) The only way to access Facebook from a mobile device is to use a mobile app. 3. C) Mobile ads are displayed in users' News Feeds. 4. D) Facebook's mobile ad revenues are its fastest growing revenue stream.

Answer: B

20) Which of the following are Amazon's primary value propositions? A) personalization and customization B) selection and convenience C) reduction of price discovery cost D) management of product delivery

Answer: B

20) Which of the following provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand? 1. A) Enhanced Prole Pages 2. B) Amplify 3. C) Lead Generation Cards 4. D) Promoted Accounts

Answer: B

23) Which of the following are features of both Pinterest and Twitter? 1. A) tweets 2. B) hashtags 3. C) pins 4. D) Image Hover widget

Answer: B

26) Which of the following is an online service specically aimed at measuring the impact of Pinterest and other visual social media? 1. A) TweetDeck 2. B) Curalate 3. C) Amplify 4. D) Webtrends

Answer: B

26) Which of the following requires nancial institutions to inform consumers of their privacy policies and permits consumers some control over their records? 1. A) Freedom of Information Act 2. B) Gramm-Leach-Bliley Act 3. C) COPPA 4. D) HIPAA

Answer: B

27) Which of the following is another term for amplication? 1. A) impressions 2. B) reach 3. C) conversation rate 4. D) conversion ratio

Answer: B

28) All of the following are examples of dark social except: 1. A) e-mail. 2. B) tweets. 3. C) SMS texts. 4. D) Snapchat.

Answer: B

29) Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place? 1. A) Notice/Awareness 2. B) Choice/Consent 3. C) Access/Participation 4. D) Security

Answer: B

29) Which of the following would be considered an indirect competitor of American Airlines? A) JetBlue B) Zipcar C) Orbitz D) British Airways

Answer: B

35) Which of the following is most similar to Pinterest? 1. A) LinkedIn 2. B) Instagram 3. C) YouTube 4. D) Tumblr

Answer: B

36) ________ is not a privacy advocacy group. 1. A) EPIC 2. B) Reputation.com 3. C) CDT 4. D) EFF

Answer: B

37) ________ operates the largest private personal database in the world. 1. A) Experian 2. B) Acxiom 3. C) TransUnion Corporation 4. D) Apple

Answer: B

38) Which of the following refers to those forms of social sharing that occur off the major social networks, through alternative communication tools? 1. A) social density 2. B) dark social 3. C) amplication 4. D) engagement

Answer: B

50) ________ protects original forms of expression in a tangible medium. 1. A) Trade secret law 2. B) Copyright law 3. C) Patent law 4. D) Trademark law

Answer: B

55) All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except: 1. A) the DMCA makes it illegal to circumvent technological measures to protect works. 2. B) the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting websites or providing services to infringers regardless of whether the ISP is aware of infringement. 3. C) the DMCA requires search engines to block access to infringing sites. 4. D) the DMCA allows libraries to make digital copies of works for internal use only.

Answer: B

58) Which case was instrumental in paving the way for Internet business methods patents? 1. A) Brown Bag v. Symantec 2. B) State Street Bank & Trust Co. v. Signature Financial Group, Inc. 3. C) Alice Corporation Pty. Ltd. v. CLS Bank International 4. D) Ticketmaster Corp. v. Tickets.com

Answer: B

61) All of the following are business models employed by the music industry except: A) subscription. B) peer-to-peer streaming. C) download-and-own. D) cloud streaming.

Answer: B

62) Around how many apps do users regularly use a month? 1. A) 17 2. B) 27 3. C) 37 4. D) 57

Answer: B

62) Which of the following is not a primary activity in a firm value chain? A) inbound logistics B) finance/accounting C) operations D) sales and marketing

Answer: B

63) Registering a domain name similar or identical to trademarks of others to divert web trac to their own sites is an example of: 1. A) cybersquatting. 2. B) cyberpiracy. 3. C) framing. 4. D) metatagging.

Answer: B

64) Registering the domain name Faceboik.com with the intent to divert web trac from people misspelling Facebook.com is an example of: 1. A) cybersquatting. 2. B) typosquatting. 3. C) metatagging. 4. D) linking.

Answer: B

64) Which of the following accounts for the most mobile ad spending? 1. A) display ads 2. B) search engine advertising 3. C) video ads 4. D) SMS text messages

Answer: B

66) ________ is the leading mobile retailer in the United States. 1. A) Walmart 2. B) Amazon 3. C) Google 4. D) QVC

Answer: B

67) Which of the following technologies has Apple adopted in its hardware for Apple Pay? 1. A) GPS 2. B) NFC 3. C) BLE 4. D) QR codes

Answer: B

76) Which of the following is currently a small part of the online marketing universe, but is expected to triple over the next ve years? 1. A) local marketing 2. B) location-based mobile marketing 3. C) mobile marketing 4. D) social marketing on Facebook

Answer: B

77) Macy's deployed which of the following technologies in many of its retail stores in 2014? 1. A) QR codes 2. B) iBeacon 3. C) E9-1-1 4. D) Geo-search

Answer: B

8) Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all? 1. A) Universalism 2. B) the Slippery Slope 3. C) the Social Contract rule 4. D) the Golden Rule

Answer: B

81) Google uses which of the following to build a global database of wireless access points and their geographic locations? 1. A) E9-1-1 2. B) Street View cars 3. C) iBeacons 4. D) BLE

Answer: B

9) Which of the following is a real-time bidding system that allows advertisers to target their ads to specic users based on personal information provided by Facebook? 1. A) Amplify 2. B) FBX 3. C) DoubleClick 4. D) PTAT

Answer: B

9) Which of the following is primarily known for blogs? 1. A) Facebook 2. B) Tumblr 3. C) Google 4. D) Instagram

Answer: B

1) All of the following were popular types of online marketing before 2007 except: 1. A) e-mail. 2. B) corporate websites. 3. C) mobile marketing. 4. D) display ads.

Answer: C

1) Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying? 1. A) information density 2. B) interactivity 3. C) social technology 4. D) ubiquity

Answer: C

10) Which of the following is the rst step in the social marketing process? 1. A) community 2. B) amplication 3. C) fan acquisition 4. D) engagement

Answer: C

12) A social consequence of the richness of Internet information is: 1. A) an increase in shallowness. 2. B) an increase in the ease of creating misleading information. 3. C) very persuasive messages might reduce the need for multiple independent sources of information. 4. D) an increase in vulnerability to hacking attacks.

Answer: C

13) Which of the following statements about Facebook Exchange is not true? 1. A) It competes with DoubleClick. 2. B) It allows advertisers to target ads. 3. C) It is a social search engine. 4. D) It involves cookies.

Answer: C

17) All of the following are key elements of a business model except: A) competitive environment. B) organizational development. C) information technology strategy. D) market strategy.

Answer: C

23) ________ can be used to record all keyboard activity of a user. 1. A) Shopping carts 2. B) Trusted computing environments 3. C) Spyware 4. D) DRM

Answer: C

28) Which of the following factors is not a significant influence on a company's competitive environment? A) how many competitors are active B) what the market share of each competitor is C) the availability of supportive organizational structures D) how competitors price their products

Answer: C

33) Which of the following is not true about the evolution of Facebook's privacy policies between 2005 and 2015? 1. A) The amount of information gathered and monitored by Facebook increased. 2. B) Facebook's privacy policies improved from 2005 to 2009. 3. C) Facebook's privacy policy became easier to understand. 4. D) Facebook's privacy policies have steadily declined since 2009.

Answer: C

34) According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online? 1. A) used an anonymous web browsing service 2. B) encrypted their communications 3. C) cleared web browser history and cookies 4. D) posted comments online anonymously

Answer: C

35) Which of the following statements about the E.U. General Data Protection Regulation (GDPR) is not true? 1. A) The GDPR replaces the E.U.'s existing Data Protection Directive. 2. B) The GDPR applies to any rm operating in any E.U. country. 3. C) The GDPR eliminates the right to be forgotten. 4. D) The GDPR limits the ability of companies to use data for purposes other than those for which it was collected.

Answer: C

36) Which of the following is not considered a portal? A) Yahoo B) MSN C) WSJ.com D) AOL

Answer: C

37) Horizontal or general portals primarily generate revenue in all of the following ways except: A) charging advertisers for ad placement. B) collecting transaction fees. C) sales of goods. D) charging subscription fees.

Answer: C

37) Which of the following refers to the number of interactions among members of a group and reects the "connectedness" of the group, even if these connections are forced on users? 1. A) engagement 2. B) information density 3. C) social density 4. D) amplication

Answer: C

42) Which of the following involves using the inherent strength of social networks to encourage visitors and fans to share their Likes and comments with friends? 1. A) social density 2. B) engagement 3. C) amplication 4. D) dark social

Answer: C

47) All of the following are required in order for information to be considered a trade secret except: 1. A) it must have commercial value to its owner. 2. B) the owner must have taken steps to protect it. 3. C) it must be unique. 4. D) it must be something that others do not know.

Answer: C

5) Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society? 1. A) the Golden Rule 2. B) Risk Aversion 3. C) the Collective Utilitarian principle 4. D) the Social Contract rule

Answer: C

51) ________ create and sell access to digital electronic markets. A) E-distributors B) Portals C) E-procurement firms D) Market creators

Answer: C

52) Which of the following situations would not qualify for the fair use exception to U.S. copyright law? 1. A) A professor clips a newspaper article just before class and distributes copies of it to his class. 2. B) A journalist quotes a paragraph from a book in a review of the book. 3. C) A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website. 4. D) Google posts thumbnail images of books in the Google Book Search Project.

Answer: C

56) ________ allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years. 1. A) Copyright law 2. B) Trade secret law 3. C) Patent law 4. D) Trademark law

Answer: C

57) eBay uses all of the following business models except: A) B2C market creator. B) C2C market creator. C) content provider. D) e-commerce infrastructure provider.

Answer: C

59) Amazon has a patent on: 1. A) download-based sales. 2. B) display of third-party advertisements in floating windows. 3. C) one-click purchasing. 4. D) hyperlinks.

Answer: C

59) Which of the following is the most popular use for mobile devices? 1. A) shopping 2. B) socializing 3. C) entertainment 4. D) performing tasks, such as nances

Answer: C

60) According to a recent National Federation of Retailers survey, what percentage of tablet users plan to purchase anything with their tablets? 1. A) around 75% 2. B) around 50% 3. C) around 33% 4. D) around 35%

Answer: C

61) Which of the following accounts for the most time people spend using a mobile device? 1. A) watching video 2. B) social networks 3. C) listening to music 4. D) reading news and magazines

Answer: C

63) A ________ coordinates a firm's suppliers, distributors, and delivery firms with its own production needs using an Internet-based supply chain management system. A) value chain B) value system C) value web D) business strategy

Answer: C

63) In 2016, mobile marketing will be about ________% of all online marketing. 1. A) 25 2. B) 55 3. C) 65 4. D) 75

Answer: C

65) In which of the following cases did the U.S. Supreme Court rule that basic business methods cannot be patented? 1. A) State Street Bank & Trust v. Signature Financial Group, Inc. 2. B) Bilski et al. v. Kappos 3. C) Alice Corporation Pty. Ltd. v. CLS Bank International 4. D) Brown Bag Software v. Symantec Corp.

Answer: C

66) The display of a third-party's website or page within your own website is called: 1. A) cybersquatting. 2. B) metatagging. 3. C) framing. 4. D) deep linking.

Answer: C

69) According to a recent National Federation of Retailers survey, consumers are more likely to use tablets rather than smartphones for all of the following except: 1. A) research products. 2. B) purchase products. 3. C) redeem coupons. 4. D) check for in-store availability.

Answer: C

69) Which of the following cases involved the issue of keywording? 1. A) Ticketmaster Corp. v. Tickets.com 2. B) Bernina of America, Inc. v. Fashion Fabrics Int'l, Inc. 3. C) Government Employees Insurance Company v. Google, Inc. 4. D) & J. Gallo Winery v. Spider Webs Ltd.

Answer: C

15) A(n) ________ market is one that provides expertise and products for a specific industry, such as automobiles. A) vertical B) horizontal C) indirect D) buyer-biased

A

18) Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: 1. A) spyware. 2. B) a backdoor. 3. C) browser parasite. 4. D) adware.

A

18) Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: A) spyware. B) a backdoor. C) browser parasite. D) adware.

A

18) Which of the following is not a practice that degrades the results and usefulness of search engines? 1. A) social search 2. B) link farms 3. C) content farms 4. D) click fraud

A

19) In 2016, Yahoo revealed that it had experienced which of the following? 1. A) a high-prole data breach 2. B) a DDoS attack that shut down its website 3. C) a hacktivist attack to protest its employment policies 4. D) a browser parasite

A

19) In 2016, Yahoo revealed that it had experienced which of the following? A) a high-profile data breach B) a DDoS attack that shut down its website C) a hacktivist attack to protest its employment policies D) a browser parasite

A

2) ________ refers to the ability to ensure that e-commerce participants do not deny their online actions. 1. A) Nonrepudiation 2. B) Authenticity 3. C) Availability 4. D) Integrity

A

2) ________ refers to the ability to ensure that e-commerce participants do not deny their online actions. A) Nonrepudiation B) Authenticity C) Availability D) Integrity

A

23) The last step in the procurement process is: A) sending a remittance payment. B) sending the invoice. C) shipping the goods. D) delivering the goods.

A

28) The Nike iD program is an example of which of the following marketing techniques? 1. A) customer co-production 2. B) transactive content 3. C) price discrimination 4. D) permission marketing

A

28) Which of the following is not a key industry strategic factor? A) synergies B) barriers to entry C) industry value chain D) existence of substitute products

A

3) Which of the following is not one of the seven major segments of the retail industry? A) electronics and computers B) specialty stores C) gasoline and fuel D) food and beverage

A

30) The liquidity of a market is measured by all of the following except: A) price transparency. B) number of buyers and sellers in market. C) volume of transactions. D) size of transactions.

A

33) Operating margin is defined as: A) operating income or loss divided by net sales revenues. B) operating income or loss divided by total operating expenses. C) net sales revenues divided by net income or loss. D) net assets divided by net liabilities.

A

34) Google's AdSense is an example of which of the following? 1. A) context advertising 2. B) SEO 3. C) programmatic advertising 4. D) viral marketing

A

35) Which of the following is based on the idea of complete price transparency in a perfect information marketplace? 1. A) the Law of One Price 2. B) dynamic pricing 3. C) price discrimination 4. D) versioning

A

35) Which of the following would not be considered a current asset? A) long-term investments B) cash C) accounts receivable D) marketable securities

A

37) All of the following are current major trends in B2B e-commerce, except: A) a movement toward implementing highly centralized supply chains to reduce risk. B) a growing emphasis on the use of business analytics software (business intelligence) to understand very large data sets. C) a growing emphasis on rapid-response and adaptive supply chains rather than lowest-cost supply chains. D) an increase in regional manufacturing and supply chains to attempt to combat the risks of far-flung global networks.

A

37) For a quick check of a firm's short-term financial health, examine its: A) working capital. B) gross margin. C) long-term debt. D) cost of sales.

A

4) ________ refers to the links that connect business firms with one another to coordinate production. A) Supply chain B) B2B e-commerce C) Vertical market D) Horizontal market

A

40) Which of the following statements about cloud-based B2B systems is not true? A) Much of the expense of the system is shifted from the B2B network provider to the firm. B) B2B network providers charge customers on a demand basis. C) Network effects apply, enabling the spreading of costs. D) Cloud-based B2B data networks can be implemented in short periods of time.

A

46) All of the following statements about Amazon are true except: A) Amazon failed to show a profit in 2015. B) Amazon Web Services is now a major part of Amazon's business. C) eBay can be considered a competitor of Amazon. D) Amazon continues to generate revenue primarily by selling products.

A

49) The term supply-push refers to: A) making products prior to orders being received based on estimated demand. B) waiting for orders to be received before building a product. C) channel conflict. D) multi-channel manufacturers who sell directly online to consumers.

A

5) Automated order entry systems: A) show goods from a single seller. B) increased the costs of inventory replenishment. C) are typically owned by the purchasing firm. D) no longer play an important role in B2B commerce.

A

51) A digital certicate contains all of the following except the: 1. A) subject's private key. 2. B) subject's public key. 3. C) digital signature of the certication authority. 4. D) digital certicate serial number.

A

51) A digital certificate contains all of the following except the: A) subject's private key. B) subject's public key. C) digital signature of the certification authority. D) digital certificate serial number.

A

53) Which of the following has the second-highest share of online retail sales? A) omni-channel merchants B) virtual merchants C) catalog merchants D) manufacturer-direct

A

54) A ________ is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network. A) firewall B) virtual private network C) proxy server D) PPTP

A

54) A ________ is a hardware or software component that acts as a lter to prevent unwanted packets from entering a network. 1. A) rewall 2. B) virtual private network 3. C) proxy server 4. D) PPTP

A

58) ________ is an example of an e-distributor. A) Amazon Business B) PowerSource Online C) SupplyOn D) Elemica

A

58) ________ is an industry-standard database query and manipulation language. 1. A) SQL 2. B) PHP 3. C) DBMS 4. D) JSP

A

6) All of the following were parts of the vision during the early days of e-commerce except the belief that: A) new, "first-mover" middlemen, with expertise in e-commerce, would force traditional intermediaries out of business. B) online consumers were rational and cost-driven. C) entry costs to the online retail market would be much less than those needed to establish a physical storefront. D) the cost of acquiring customers would be much lower.

A

6) Which of the following statements about EDI systems is true? A) They typically serve vertical markets. B) They are seller-side solutions. C) They evolved from private trading exchanges. D) They still play an important role in B2C commerce.

A

60) Which of the following statements is not true? 1. A) Apple's Touch ID stores a user's actual ngerprint. 2. B) Biometric devices reduce the opportunity for spoong. 3. C) A retina scan is an example of a biometric device. 4. D) Biometric data stored on an iPhone is encrypted.

A

60) Which of the following statements is not true? A) Apple's Touch ID stores a user's actual fingerprint. B) Biometric devices reduce the opportunity for spoofing. C) A retina scan is an example of a biometric device. D) Biometric data stored on an iPhone is encrypted.

A

61) A fingerprint scan is an example of which of the following? 1. A) biometrics 2. B) encryption 3. C) IDS 4. D) firewall

A

61) A fingerprint scan is an example of which of the following? A) biometrics B) encryption C) IDS D) firewall

A

61) All of the following services require extensive personalization except: A) financial services. B) legal services. C) medical services. D) accounting services.

A

61) To answer a question such as "At what time of day does our company sell the most products?" you would use ________ data mining. 1. A) query-driven 2. B) customer proling 3. C) model-driven 4. D) behavioral

A

63) An ________ provides an online catalog that represents the products of thousands of direct manufacturers. A) e-distributor B) e-procurement company C) exchange D) industry consortium

A

64) An ________ primarily serves businesses that buy indirect goods on a spot purchasing basis. A) e-distributor B) e-procurement company C) exchange D) industry consortium

A

64) In ________, all of a customer's financial (and even nonfinancial) data are pulled together at a single personalized website. A) account aggregation B) a financial portal C) integrated financial services D) EBPP systems

A

65) E-distributors: A) make money by charging a mark-up on products they distribute. B) usually operate "private" markets. C) operate in vertical markets. D) focus on selling direct products.

A

66) All of the following statements about the online insurance industry are true except: A) the Internet has dramatically changed the insurance industry's value chain. B) websites of almost all the major firms provide the ability to obtain an online quote. C) Internet usage has led to a decline in term life insurance prices industry-wide. D) the industry has been very successful in attracting visitors searching for information

A

72) All of the following statements about Apple Pay are true except which of the following? 1. A) Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions. 2. B) Apple Pay is based on Touch ID biometric ngerprint scanning. 3. C) Apple Pay can be used for mobile payments at the point of sale at a physical store. 4. D) Apple Pay relies on NFC chip technology

A

73) PayPal is an example of a(n): 1. A) online stored value payment system. 2. B) digital checking system. 3. C) accumulating balance system. 4. D) digital credit card system.

A

73) Which of the following has introduced a tool known as Consumer Alerts to inform readers when a review is likely to be fraudulent? A) Yelp B) TripAdvisor C) Angie's List D) TripExpert

A

75) Which of the following is not a major trend in e-commerce payments in 2016-2017? 1. A) Mobile retail payment volume decreases. 2. B) PayPal remains the most popular alternative payment method. 3. C) Google refocuses Google Wallet solely on sending and receiving money. 4. D) Payment by credit and/or debit card remains the dominant form of online payment.

A

75) Which of the following is not a major trend in e-commerce payments in 2016-2017? A) Mobile retail payment volume decreases. B) PayPal remains the most popular alternative payment method. C) Google refocuses Google Wallet solely on sending and receiving money. D) Payment by credit and/or debit card remains the dominant form of online payment.

A

77) Acquisition rate is a measure of the: 1. A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages. 2. B) percentage of visitors who become customers. 3. C) percentage of existing customers who continue to buy on a regular basis. 4. D) percentage of shoppers who do not return within a year after their initial purchase.

A

79) Which of the following is not a major trend in the online recruitment services industry? A) disintermediation B) Millennials and GenX primarily use mobile devices to search for jobs. C) social recruiting D) hiring by algorithm

A

80) All of the following are forms of collaboration among businesses except: A) RFQs. B) CPFR. C) demand chain visibility. D) marketing coordination and product design.

A

A(n) ________ is a Web application that allows users to easily add and edit content on a Web page. A) wiki B) podcast C) blog D) RSS feed

A

In order from beginning to end, the major steps in the SDLC are: A) systems analysis/planning; systems design; building the system; testing; and implementation. B) systems design; testing; building the system; and implementation. C) systems analysis/planning; systems design; building the system; implementation; and testing. D) systems analysis/planning; implementation; building the system; and testing.

A

In the address http://www.company.com/clients.html, which of the following is the top-level domain? A) .com B) company.com C) www D) http

A

MySQL is which of the following? A) open source database software B) a scripting language embedded in HTML documents C) Web server software D) Web site analytics software

A

The early years of e-commerce were driven by all of the following factors except: A) an emphasis on exploiting traditional distribution channels. B) a huge infusion of venture capital funds. C) an emphasis on quickly achieving very high market visibility. D) visions of profiting from new technology.

A

The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called: A) VoIP. B) IPTP. C) VTP. D) IP.

A

What are the two most important management challenges in building a successful e-commerce presence? A) developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives B) having an accurate understanding of your business environment and an achievable business plan C) building a team with the right skill sets and closely managing the development process D) identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site

A

Which of the following are specialized computers that interconnect the thousands of computers that make up the Internet in order to transmit message parcels along available communication paths and on to their destinations? A) routers B) Web servers C) IP servers D) packet servers

A

Which of the following are the two main components of a systems design? A) logical design and physical design B) behavioral design and technological design C) business objectives and technology requirements D) front-end systems and back-end systems

A

Which of the following statements about cloud computing is not true? A) A public cloud is typically used by companies with stringent privacy and security requirements. B) Dropbox is an example of a public cloud. C) Hybrid clouds offer both public and private cloud options. D) A private cloud hosted internally or externally.

A

Which of the following type of application server monitors and controls access to a main Web server and implements firewall protection? A) proxy server B) list server C) groupware server D) mail server

A

________ is a utility program that allows you to check the connection between your client and a TCP/IP network. A) Ping B) Telnet C) Tracert D) Finger

A

________ is used to allow remote login on another computer. A) Telnet B) FTP C) HTTP D) SSL

A

25) The Spokeo case involved a claim for damages based on which of the following? 1. A) Fair Credit Reporting Act 2. B) Digital Millennium Copyright Act 3. C) Anticybersquatting Consumer Protection Act 4. D) Defend Trade Secrets Act

Answer: A

27) Which of the following is a core Fair Information Practices (FIP) principle? 1. A) Choice/Consent 2. B) Access/Participation 3. C) Security 4. D) Enforcement

Answer: A

28) Which of the FTC's Fair Information Practices (FIP) principles requires identication of the collector of data? 1. A) Notice/Awareness 2. B) Choice/Consent 3. C) Access/Participation 4. D) Security

Answer: A

30) What is the FTC recommendation regarding choice as it relates to personally identiable information (PII)? 1. A) Require rms to have consumers armatively opt-in before PII is collected. 2. B) Require rms to allow consumers to opt-out before PII is collected. 3. C) Make collection of PII illegal. 4. D) Require robust notice only before PII is collected.

Answer: A

Which of the following is not an advantage of client/server computing over centralized mainframe computing? A) It is easy to expand capacity by adding servers and clients. B) Each client added to the network increases the network's overall capacity and transmission speeds. C) Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer. D) There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down.

B

Which of the following is not one of the basic technological foundations of the Internet? A) client/server computing B) FTP C) TCP/IP D) packet switching

B

Which of the following is used to process certificates and private/public key information? A) HTTP B) Secure Sockets Layer/Transport Layer Security C) File Transfer Protocol D) data capture tools

B

Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers? A) network effect B) disintermediation C) friction-free commerce D) first mover advantage

B

Which of the following statements is not true? A) No one academic perspective dominates research about e-commerce. B) Economists take a purely technical approach to e-commerce. C) There are two primary approaches to e-commerce: behavioral and technical. D) Management scientists are interested in e-commerce as an opportunity to study how business firms can exploit the Internet to achieve more efficient business operations.

B

Which of the following terms can be considered synonymous with the term e-commerce? A) e-business B) digital commerce C) the Internet D) the Web

B

Which of the following typically includes a data flow diagram to describe the flow of information for an e-commerce site? A) physical design B) logical design C) testing plan D) co-location plan

B

Which of the following was the original "killer app" that made the Internet commercially interesting and extraordinarily popular? A) e-commerce B) The World Wide Web C) social networks D) mobile apps

B

Which of the following is not a typical barrier to the implementation of a private industrial network? A) It requires participating firms to share sensitive data. B) It requires the large network owners to give up some of its independence. C) It requires a significant investment of time and money. D) It requires a change of mindset and behavior of employees.

B) It requires the large network owners to give up some of its independence.

75) Which of the following statements is not true? A) Price competition among online travel services is difficult as comparison shopping for better prices is easy. B) Online travel services are one of the few sectors in which extensive disintermediation has occurred. C) The ability of travel products and services to be commoditized is a significant factor in the explosive growth of the online travel services industry. D) The online travel services industry has gone through a period of consolidation

B

76) Which of the following measures the average length of stay at a website? 1. A) loyalty 2. B) stickiness 3. C) page views 4. D) retention rate

B

77) Linden Dollars, created for use in Second Life, are an example of: A) digital cash. B) virtual currency. C) EBPP. D) peer-to-peer payment systems.

B

79) Conversion rate is a measure of the: 1. A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages. 2. B) percentage of visitors who become customers. 3. C) percentage of existing customers who continue to buy on a regular basis. 4. D) percentage of shoppers who do not return within a year after their initial purchase.

B

81) Which of the following is not a typical barrier to the implementation of a private industrial network? A) It requires participating firms to share sensitive data. B) It requires the large network owners to give up some of its independence. C) It requires a significant investment of time and money. D) It requires a change of mindset and behavior of employees.

B

83) Which of the following measures the percentage of customers who purchase once, but never return within a year? 1. A) retention rate 2. B) attrition rate 3. C) loyalty rate 4. D) conversion rate

B

All of the following are basic functionality provided by e-commerce merchant server software except: A) a product catalog. B) marketing software. C) a shopping cart. D) credit card processing.

B

All of the following are major players in hosting/co-location/cloud services except: A) GoDaddy. B) WordPress. C) Rackspace. D) CenturyLink.

B

All of the following are simple steps for optimizing Web page content that can reduce response times except: A) reducing unnecessary HTML comments. B) segmenting computer servers to perform dedicated functions. C) using more efficient graphics. D) avoiding unnecessary links to other pages on the site.

B

The Internet Layer of TCP/IP is responsible for which of the following? A) placing packets on and receiving them from the network medium B) addressing, packaging, and routing messages C) providing communication with the application by acknowledging and sequencing the packets to and from the application D) providing a variety of applications with the ability to access the services of the lower layers

B

The term stateless refers to the fact that: A) no one government entity controls the Internet. B) the server does not have to maintain an ongoing dedicated interaction with the client computer. C) system performance degrades as more simultaneous users require service. D) Web servers may maintain multiple instances of server software to handle requests.

B

Which of the following are central directories that list all domain names currently in use for specific domains? A) Web servers B) root servers C) client servers D) DNS servers

B

12) Facebook News Feeds include all of the following except: 1. A) status updates. 2. B) app activity. 3. C) Likes. 4. D) tweets.

Answer: D

18) Which element of the business model addresses the question of why a customer should buy from the firm? A) revenue model B) competitive advantage C) market strategy D) value proposition

Answer: D

21) Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge? 1. A) USA PATRIOT Act 2. B) Homeland Security Act 3. C) Communications Assistance for Law Enforcement Act 4. D) USA Freedom Act

Answer: D

22) Which of the following statements about Pinterest is not true? 1. A) Pinned photos and photo boards are available to all Pinterest users. 2. B) Pinterest users are overwhelmingly female. 3. C) Pinterest enables users to integrate their pins into their Facebook News Feeds and Twitter streams. 4. D) Pinterest is the only one of the major social networks that does not accept paid advertising.

Answer: D

24) All of the following are Pinterest marketing tools except: 1. A) Brand pages. 2. B) Rich Pins. 3. C) Promoted Pins. 4. D) Promoted Accounts.

Answer: D

24) Which of the following statements about industry self-regulation regarding privacy is not true? 1. A) OPA members are required to implement the OPA's privacy guidelines. 2. B) The primary focus of industry efforts has been the use of online "seals" that attest to the site's policies. 3. C) Industry efforts have not so far succeeded in reducing American fears of privacy invasion. 4. D) The NAI's privacy policies have established the TRUSTe seal.

Answer: D

53) All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the: 1. A) nature of the work used. 2. B) amount of the work used. 3. C) market effect of the use. 4. D) free availability of the work on the Web.

Answer: D

55) Which of the following is not true about mobile marketing? 1. A) Mobile marketing is the fastest growing form of online marketing. 2. B) In 2016, spending on mobile marketing will comprise over 60% of the amount spent on all types of online marketing. 3. C) A substantial part of mobile marketing should be counted as social marketing. 4. D) People use most of their mobile minutes while they are on the go.

Answer: D

58) Your startup firm has developed Web-based note-taking software that allows participants to create and share virtual notes attached to existing Web pages. You anticipate marketing your online application to Web development and design companies. Which of the following revenue models is the most appropriate for your new company? A) advertising B) transaction fee C) affiliate D) subscription

Answer: D

59) Which type of investor typically becomes interested in a start-up company after it has begun generating revenue? A) incubators B) angel investors C) crowdfunders D) venture capital investors

Answer: D

60) Disputes over federal trademarks involve establishing: 1. A) underlying ideas. 2. B) intent. 3. C) piracy. 4. D) infringement.

Answer: D

65) A strategy designed to compete within a narrow market or product segment is called a ________ strategy. A) scope B) differentiation C) cost D) focus

Answer: D

65) Which of the following is not a major provider of mobile display advertising? 1. A) MoPub 2. B) iAd 3. C) AdMob 4. D) Webtrends

Answer: D

7) Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specic declaration otherwise? 1. A) the Golden Rule 2. B) the Slippery Slope 3. C) the Social Contract rule 4. D) No Free Lunch

Answer: D

9) Facebook's share price fell dramatically after its IPO because investors feared that: 1. A) Facebook's new marketing solutions would be dicult to monetize. 2. B) new social networks such as Instagram were cannibalizing Facebook's audience. 3. C) privacy concerns were driving users away. 4. D) Facebook would be unable to increase advertising revenues fast enough to justify its price.

Answer: D

9) Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society? 1. A) the Golden Rule 2. B) Risk Aversion 3. C) the Slippery Slope 4. D) the Social Contract rule

Answer: D

83) ________ is an on-demand service company focused on lodging. A) Uber B) Lyft C) Airbnb D) Task Rabbit

C) Airbnb

62) Which of the following best explains why the service sector is a natural avenue for e-commerce? A) The service sector is less geographically reliant and more globally oriented. B) The service sector has historically been more technology-reliant. C) Much of the value in services is based on the collection, storage, and exchange of information. D) It is not; services are difficult to translate to e-commerce because they rely on face-to-face communication and barter.

C) Much of the value in services is based on the collection, storage, and exchange of information.

51) Which of the following occurs when retailers of products must compete on price and currency of inventory directly against the manufacturer? A) disintermediation B) localization C) channel conflict D) hypermediation

C) channel conflict

Supply chain ________ refers to differentiating a firm's products or prices based on superior supply chain management. A) management B) simplification C) competition D) collaboration

C) competition

All of the following have led to the development of outsourcing of manufacturing around the world except: A) technology. B) globalization of trade. C) environmental concerns. D) high levels of wage disparity between the developed and undeveloped worlds.

C) environmental concerns.

1) Which of the following is not a major trend in online retail for 2016-2017? A) Online retail remains the fastest growing retail channel. B) The average annual purchase of online buyers continues to increase. C) Online retailers place an increased emphasis on providing an improved "shopping experience." D) The number of online buyers begins to plateau.

D

10) All of the following are advantages of online retail except: A) lower supply chain costs. B) lower cost of distribution. C) ability to change prices. D) faster delivery of goods.

D

15) All of the following are prominent hacktivist groups except: 1. A) Anonymous. 2. B) LulzSec. 3. C) Impact Team. 4. D) Avid Life

D

17) Which of the following is not true about search engine advertising? 1. A) Spending on search engine advertising constitutes over 45% of all online advertising spending. 2. B) The top three search engine providers supply over 95% of all online searches. 3. C) The click-through rate for search engine marketing has been steady over the years. 4. D) Search engine advertising is the fastest growing type of online advertising.

D

2) Which of the following online advertising formats involved the least amount of spending in 2016? 1. A) search 2. B) classfieds 3. C) rich media 4. D) e-mail

D

21) Which of the following is not a primary source of ad fraud? 1. A) browser extensions that insert ads into a premium publisher's website and then list the ads as available on a programmatic ad exchange 2. B) ad targeting rms that create bots that imitate the behavior of real shoppers and then charge advertisers 3. C) botnets hired by publishers to click on web pages to create phony trac 4. D) native advertising that is displayed on a social media site

D

22) ________ is not an example of malicious code A) Scareware B) A Trojan horse C) A bot D) A sniffer

D

22) ________ is not an example of malicious code. 1. A) Scareware 2. B) A Trojan horse 3. C) A bot 4. D) A sniffer

D

23) All of the following offer Web site building tools except: A) Weebly. B) Google Sites. C) WordPress. D) Apache.

D

26) All of the following are examples of direct goods in the auto industry except: A) sheet steel. B) shatter-resistant glass. C) rubber molding. D) desktop computers.

D

27) All of the following are among those most frequently affected by ad-blocking except: 1. A) gaming sites. 2. B) newsgroup/forums. 3. C) social network sites. 4. D) online retailers

D

3) Which of the following is not one of the main stages of the online purchasing process? 1. A) post-purchase service and loyalty 2. B) awareness 3. C) engagement 4. D) conversation

D

30) According to Ponemon Institute's 2015 survey, which of the following was not among the causes of the costliest cybercrimes? 1. A) malicious insiders 2. B) malicious code 3. C) denial of service 4. D) botnets

D

30) According to Ponemon Institute's 2015 survey, which of the following was not among the causes of the costliest cybercrimes? A) malicious insiders B) malicious code C) denial of service D) botnets

D

31) ________ typically attack governments, organizations, and sometimes individuals for political purposes. A) Crackers B) White hats C) Grey hats D) Hacktivists

D

32) All of the following are xed price strategies except: 1. A) bundling. 2. B) versioning. 3. C) free pricing. 4. D) yield management.

D

4) Which of the following is an example of an integrity violation of e-commerce security? 1. A) A website is not actually operated by the entity the customer believes it to be. 2. B) A merchant uses customer information in a manner not intended by the customer. 3. C) A customer denies that he or she is the person who placed the order. 4. D) An unauthorized person intercepts an online communication and changes its contents

D

4) Which of the following is an example of an integrity violation of e-commerce security? A) A website is not actually operated by the entity the customer believes it to be. B) A merchant uses customer information in a manner not intended by the customer. C) A customer denies that he or she is the person who placed the order. D) An unauthorized person intercepts an online communication and changes its contents.

D

42) Cisco estimates that by 2016, mobile traffic will represent ________% of all business Internet traffic. A) less than 5 B) around 10 C) around 15 D) over 25

D

43) A(n) ________ system continuously links the activities of buying, making, and moving products from suppliers to purchasing firms, as well as integrating order entry systems. A) EDI B) ERP C) CPFR D) SCM

D

44) Collaborative commerce systems: A) focus on structuring intra-firm communications. B) bring customers into the product development phase. C) provide open, competitive marketplaces. D) foster sharing sensitive internal information with suppliers and purchasers.

D

45) Which of the following is not a characteristic of the use of social networks in B2B e-commerce? A) It is typically unstructured. B) It helps develop a more personal relationship between participants in the supply chain. C) It enables participants to make decisions based on current conditions. D) They are always private.

D

48) All of the following are challenges for catalog merchants except: A) high costs of printing and mailing. B) building a credible website. C) the need to bring staff in or manage new technology. D) building sophisticated order entry and fulfillment systems.

D

5) All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except: 1. A) search engines. 2. B) online catalogs. 3. C) social networks. 4. D) targeted banner ads.

D

53) All of the following are methods of securing channels of communication except: 1. A) SSL/TLS. 2. B) certicates. C) VPN D)FTP

D

53) All of the following are methods of securing channels of communication except: A) SSL/TLS. B) certificates. C) VPN. D) FTP.

D

56) All of the following are used for authentication except: 1. A) digital signatures. 2. B) certificates of authority. 3. C) biometric devices. 4. D) packet filters.

D

56) All of the following are used for authentication except: A) digital signatures. B) certificates of authority. C) biometric devices. D) packet filters.

D

57) A web beacon is: 1. A) a cookie that carries a virus. 2. B) an executable cookie. 3. C) an automated applet for performing web searches. 4. D) a tiny graphics le embedded in an e-mail or web page.

D

57) An intrusion detection system can perform all of the following functions except: 1. A) examining network traffic. 2. B) setting off an alarm when suspicious activity is detected. 3. C) checking network traffic to see if it matches certain patterns or preconfigured rules. 4. D) blocking suspicious activity.

D

57) An intrusion detection system can perform all of the following functions except: A) examining network traffic. B) setting off an alarm when suspicious activity is detected. C) checking network traffic to see if it matches certain patterns or preconfigured rules. D) blocking suspicious activity.

D

58) Service industry groups are categorized generally into two groups, those that provide transaction brokering and those that involve: A) retailing goods. B) personalization. C) information brokering. D) hands-on services.

D

62) Which of the following primarily involves long-term sourcing? A) e-distributors and exchanges B) e-distributors and industry consortia C) e-procurement Net marketplaces and exchanges D) e-procurement Net marketplaces and industry consortia

D

10) All of the following experienced high-prole data breaches in 2015 except: 1. A) CVS. 2. B) Walgreens. 3. C) Amazon. 4. D) Experian.

C

12) Which of the following is not one of the methods used by traditional retailers to develop omni-channel integration? A) online catalog B) online order, in-store pickup C) online supply-push D) online promotions for offline purchases

C

13) All of the following have led to the development of outsourcing of manufacturing around the world except: A) technology. B) globalization of trade. C) environmental concerns. D) high levels of wage disparity between the developed and undeveloped worlds.

C

13) Google introduced ________ to its search algorithm to weed out low-quality sites from search results. 1. A) Penguin 2. B) Hummingbird 3. C) Panda 4. D) Knowledge Graph

C

13) Which of the following has the Internet Advertising Bureau urged advertisers to abandon? 1. A) HTML 2. B) HTML5 3. C) Adobe Flash 4. D) Adobe Acrobat

C

16) The essential characteristic of ________ are they bring hundreds to thousands of suppliers into a single Internet-based environment to conduct trade. A) industry communications B) exchanges C) Net marketplaces D) horizontal markets

C

16) Which of the following search engine algorithm updates enables Google's search engine to evaluate an entire sentence rather than just a key word? 1. A) Panda 2. B) Penguin 3. C) Hummingbird 4. D) Graph Search

C

19) Amazon's Associates program is an example of which of the following? 1. A) viral marketing 2. B) local marketing 3. C) aliate marketing 4. D) lead generation marketing

C

21) Which dimension(s) of security is spoofing a threat to? A) integrity B) availability C) integrity and authenticity D) availability and integrity

C

23) The attack on Dyn, Twitter, Amazon, and other major organizations in October 2016, is an example of which of the following? 1. A) SQL injection attack 2. B) browser parasite 3. C) DDoS attack 4. D) MitM attack

C

23) The attack on Dyn, Twitter, Amazon, and other major organizations in October 2016, is an example of which of the following? A) SQL injection attack B) browser parasite C) DDoS attack D) MitM attack

C

25) Malware that comes with a downloaded file requested by a user is called a: A) Trojan horse. B) backdoor. C) drive-by download. D) PUP

C

25) Malware that comes with a downloaded le requested by a user is called a: 1. A) Trojan horse. 2. B) backdoor. 3. C) drive-by download. 4. D) PUP .

C

26) All of the following are "traditional" online marketing tools except: 1. A) aliate marketing. 2. B) e-mail and permission marketing. 3. C) social marketing. 4. D) sponsorship marketing.

C

28) Automatically redirecting a web link to a different address is an example of: 1. A) sning. 2. B) social engineering. 3. C) pharming. 4. D) DDoS attack.

C

28) Automatically redirecting a web link to a different address is an example of: A) sniffing. B) social engineering. C) pharming. D) DDoS attack.

C

29) The incremental cost of building the next unit of a good is called the: 1. A) Law of One Price. 2. B) variable cost. 3. C) marginal cost.4. D) fixed cost.

C

34) What is another name for pro forma earnings? A) net margin B) operating income C) earnings before income taxes, depreciation, and amortization (EBITDA) D) generally accepted accounting principles (GAAP) earnings

C

39) Which of the following provides a financial snapshot of a company's assets and liabilities (debts) on a given date? A) working capital B) operating margin C) balance sheet D) gross margin

C

4) In 2016, what was the approximate Internet penetration rate for individuals with less than a high-school education? 1. A) 25% 2. B) 33% 3. C) 66% 4. D) 75%

C

44) Next generation firewalls provide all of the following except: A) an application-centric approach to firewall control. B) the ability to identify applications regardless of the port, protocol, or security evasion tools used. C) the ability to automatically update applications with security patches. D) the ability to identify users regardless of the device or IP address.

C

44) Next generation rewalls provide all of the following except: 1. A) an application-centric approach to rewall control. 2. B) the ability to identify applications regardless of the port, protocol, or security evasion tools used. 3. C) the ability to automatically update applications with security patches. 4. D) the ability to identify users regardless of the device or IP address.

C

46) All the following statements about symmetric key cryptography are true except: 1. A) in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message. 2. B) the Data Encryption Standard is a symmetric key encryption system. 3. C) symmetric key cryptography is computationally slower. 4. D) symmetric key cryptography is a key element in digital envelopes.

C

46) All the following statements about symmetric key cryptography are true except: A) in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message. B) the Data Encryption Standard is a symmetric key encryption system. C) symmetric key cryptography is computationally slower. D) symmetric key cryptography is a key element in digital envelopes.

C

47) EDI document structures are defined by: A) a single international standards body. B) individual suppliers and buyers. C) industry committees. D) each purchaser.

C

49) ________ is the current standard used to protect Wi-Fi networks. 1. A) WEP 2. B) TLS 3. C) WPA2 4. D) WPA3

C

49) ________ production is a set of production methods that focuses on the elimination of waste throughout the customer value chain. A) Green B) Sustainable C) Lean D) Just-in-time

C

5) ________ refers to the ability to ensure that an e-commerce site continues to function as intended. 1. A) Nonrepudiation 2. B) Authenticity 3. C) Availability 4. D) Integrity

C

5) ________ refers to the ability to ensure that an e-commerce site continues to function as intended. A) Nonrepudiation B) Authenticity C) Availability D) Integrity

C

50) All of the following statements about PKI are true except: 1. A) the term PKI refers to the certication authorities and digital certicate procedures that are accepted by all parties. 2. B) PKI is not effective against insiders who have a legitimate access to corporate systems including customer information. 3. C) PKI guarantees that the verifying computer of the merchant is secure. 4. D) the acronym PKI stands for public key infrastructure

C

50) All of the following statements about PKI are true except: A) the term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties. B) PKI is not effective against insiders who have a legitimate access to corporate systems including customer information. C) PKI guarantees that the verifying computer of the merchant is secure. D) the acronym PKI stands for public key infrastructure.

C

54) The richness made possible by e-commerce technologies does which of the following? 1. A) It reduces the cost of delivering marketing messages and receiving feedback from users. 2. B) It allows consumers to become co-producers of the goods and services being sold. 3. C) It allows video, audio, and text to be integrated into a single marketing message and consuming experience. 4. D) It enables worldwide customer service and marketing communications.

C

55) For a website that has 1 million visitors a month, and where, on average, a visitor makes ve page requests per visit, there will be ________ entries in the transaction log each month. 1. A) 50,000 2. B) 500,000 3. C) 5 million 4. D) 50 million

C

58) Which of the following is not an example of an access control? 1. A) rewalls 2. B) proxy servers 3. C) digital signatures 4. D) login passwords

C

58) Which of the following is not an example of an access control? A) firewalls B) proxy servers C) digital signatures D) login passwords

C

59) Which of the following statements is not true? 1. A) A VPN provides both condentiality and integrity. 2. B) A VPN uses both authentication and encryption. 3. C) A VPN uses a dedicated secure line. 4. D) The primary use of VPNs is to establish secure communications among business partners.

C

61) Which of the following primarily deals with direct goods? A) e-distributors and independent exchanges B) exchanges and e-procurement Net marketplaces C) exchanges and industry consortia D) e-procurement Net marketplaces and industry consortia

C

62) Which of the following best explains why the service sector is a natural avenue for e-commerce? A) The service sector is less geographically reliant and more globally oriented. B) The service sector has historically been more technology-reliant. C) Much of the value in services is based on the collection, storage, and exchange of information. D) It is not; services are difficult to translate to e-commerce because they rely on face-to-face communication and barter.

C

68) What is the first step in developing an e-commerce security plan? 1. A) Create a security organization. 2. B) Develop a security policy. 3. C) Perform a risk assessment. 4. D) Perform a security audit.

C

70) Which of the following statements is not true? 1. A) Most states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred. 2. B) The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers. 3. C) The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates. 4. D) The Federal Trade Commission has asserted that it has authority over corporations' data security practices

C

70) Which of the following statements is not true? A) Most states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred. B) The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers. C) The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates. D) The Federal Trade Commission has asserted that it has authority over corporations' data security practices.

C

72) Uber has been criticized for using which of the following? 1. A) ash marketing 2. B) bundling 3. C) surge pricing 4. D) freemium

C

73) Hits are a measure of the: 1. A) number of times an ad is clicked. 2. B) number of times an ad is served. 3. C) number of HTTP requests. 4. D) number of pages viewed.

C

74) Purchasing an online ad on a CPA basis means that the advertiser: 1. A) pays for impressions in 1,000 unit lots. 2. B) pays a pre-negotiated fee for each click an ad receives. 3. C) pays only for those users who perform a specic action, such as registering, purchasing, etc. 4. D) exchanges something of equal value for the ad space.

C

75) eCPM measures the ROI of an ad by dividing the total earnings of the ad by which of the following? 1. A) the total number of impressions 2. B) the total number of impressions in hundreds 3. C) the total number of impressions in thousands 4. D) the total number of impressions in millions

C

8) In 2016, approximately what percentage of Internet users over the age of 14 made a purchase at an online retail store? A) 37% B) 57% C) 77% D) 97%

C

8) Which of the following is another name for a private industrial network? A) industry consortia B) EDI system C) PTX D) PINS

C

80) Which of the following measures the ratio of items purchased to product views? 1. A) conversion rate 2. B) cart conversion rate 3. C) browse-to-buy ratio 4. D) view-to-cart ratio

C

81) Which of the following measures the percentage of e-mails that could not be delivered? 1. A) abandonment rate 2. B) unsubscribe rate 3. C) bounce-back rate 4. D) attrition rate

C

82) Which of the following is the most meaningful metric for video ads? 1. A) view time 2. B) click-through rate 3. C) completion rate 4. D) skip rate

C

84) In 2015, online bill payment accounted for ________ of all bill payments, while paper checks accounted for ________. 1. A) less than 10%; less than 25% 2. B) about 25%; about 10% 3. C) more than 50%; less than 20% 4. D) 100%; 0%

C

84) In 2015, online bill payment accounted for ________ of all bill payments, while paper checks accounted for ________. A) less than 10%; less than 25% B) about 25%; about 10% C) more than 50%; less than 20% D) 100%; 0%

C

9) ________ are the fastest growing form of B2B e-commerce. A) R-distributors B) Exchanges C) Private industrial networks D) Industry consortiums

C

All of the following are basic information requirements for a product database except: A) product descriptions. B) stock numbers. C) customer ID numbers. D) inventory levels.

C

All of the following are examples of social networks except: A) Instagram. B) Twitter. C) Y Combinator. D) Pinterest.

C

During which period of time did the Institutionalization phase of Internet development take place? A) 1950-1960 B) 1961-1974 C) 1975-1995 D) 1995-through the present

C

E-commerce is available just about everywhere and anytime. This is known as ________. A) richness B) information density C) ubiquity D) reach

C

In 2015, roughly ________ million people in the United States accessed the Internet via tablets. A) 59 B) 94 C) 159 D) 194

C

Internet traffic is predicted to do which of the following over the next five years? A) decrease B) double C) triple D) quadruple

C

The Transport Layer of TCP/IP is responsible for which of the following? A) placing packets on and receiving them from the network medium B) addressing, packaging, and routing messages C) providing communication with the application by acknowledging and sequencing the packets to and from the application D) providing a variety of applications with the ability to access the services of the lower layers

C

The ________ allows a natural language expression, such as Google.com to represent a numeric IP address. A) uniform resource locator system B) Internet protocol addressing schema C) domain name system D) assigned numbers and names (ANN) system

C

The process of comparing a Web site with that of its competitors in terms of response speed, quality of layout, and design is known as: A) split testing. B) funnel testing. C) benchmarking. D) system testing.

C

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called: A) routing. B) the Transmission Control Protocol. C) packet switching. D) the File Transfer Protocol.

C

The total number of users or customers an e-commerce business can obtain is a measure of which of the following? A) ubiquity B) interactivity C) reach D) information density

C

Which of the following helps you engage your customers in a conversation? A) shopping cart B) product database C) on-site blog D) site tracking and reporting system

C

Which of the following involves testing a site program's modules one at a time? A) system testing B) acceptance testing C) unit testing D) implementation testing

C

9) Which of the following categories generates the highest percentage of online retail revenue? A) computers and electronics B) apparel and accessories C) books/music/video D) automobile and automobile parts and accessories

B) apparel and accessories

Which of the following is a characteristic of the Consolidation phase of e-commerce? A) predominance of pure online strategies B) emphasis on revenue growth versus profits C) brand extension and strengthening becomes more important than creating new brands D) shift to a technology-driven approach

C

Which of the following is an example of C2C e-commerce? A) Amazon B) Groupon C) Craigslist D) Go2Paper

C

Which of the following is the core communications protocol for the Internet? A) Telnet B) FTP C) TCP/IP D) TLS

C

14) Approximately ________ retailers generate 90% of all retail e-commerce sales. A) 10 B) 100 C) 1,000 D) 10,000

C) 1,000

8) In 2016, approximately what percentage of Internet users over the age of 14 made a purchase at an online retail store? A) 37% B) 57% C) 77% D) 97%

C) 77%

57) In the United States, the service sector accounts for approximately ________% of the United States GDP. A) 70 B) 75 C) 80 D) 85

C) 80

All of the following are potential benefits of B2B e-commerce except: A) increased production flexibility. B) increased product cycle time. C) increased opportunities to collaborate with suppliers and distributors. D) increased visibility and real-time information sharing among all participants in the supply chain network.

B) increased product cycle time.

67) All of the following statements about the online real estate services market are true except: A) most people use the Internet to search for a home, but still use the services of a real estate agent to complete the purchase. B) real estate differs from other types of online financial services because it is impossible to complete a property transaction online. C) the primary service offered by real estate sites is a listing of houses available. D) the Internet and e-commerce have created significant disintermediation in the real estate marketplace.

D

68) An ________ serves businesses that primarily buy direct goods on a contract purchasing basis. A) e-distributor B) e-procurement company C) exchange D) industry consortium

D

7) All of the following have launched trials of Buy buttons except: A) Facebook. B) Pinterest. C) Instagram. D) Tumblr.

D

77) Walmart's global supply chain has been criticized for all of the following except: A) exploiting labor in underdeveloped countries. B) bribing officials. C) wasting energy. D) failing to be efficient.

D

82) Which of the following is not true about on-demand service firms? A) The growth of on-demand service firms is supported by the use of online reputation systems based on peer review. B) It is not likely that on-demand service firms will totally escape government regulation. C) On-demand service firms facilitate access to resources. D) On-demand service firms are a totally new phenomenon without precedent in the history of e-commerce

D

All of the following are methods of improving the processing architecture of a Web site except: A) separating static content from dynamic content. B) optimizing ASP code. C) optimizing the database schema. D) adding Web servers.

D

The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices. A) Internet Engineering Steering Group (IESG) B) World Wide Web Consortium (W3C) C) Internet Engineering Task Force (IETF) D) Internet Society (ISOC)

D

The size of the B2B market in 2015 was estimated to be around: A) $630 million. B) $6.3 billion. C) $630 billion. D) $6.3 trillion.

D

When talking about the physical elements of the Internet, the term redundancy refers to: A) transmitting multiple copies of a single packet to safeguard against data loss. B) the use of tiered high-speed switching computers to connect the backbone to regional and local networks. C) delays in messages caused by the uneven flow of information through the network. D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

D

Which of the following is a characteristic of the Reinvention phase of e-commerce? A) massive proliferation of dot-com start-ups B) widespread adoption of broadband networks C) rapid growth of search engine advertising D) expansion of e-commerce to include services as well as goods

D

Which of the following occurred during the Commercialization phase of Internet development? A) The fundamental building blocks of the Internet were realized in actual hardware and software. B) Mosaic was invented. C) The Domain Name System was introduced. D) NSF privatized the operation of the Internet's backbone.

D

Which system functionality must your Web site have in order to be able to personalize or customize a product for a client? A) an ad server B) a site tracking and reporting system C) an inventory management system D) customer on-site tracking

D

Which of the following is not a characteristic of the use of social networks in B2B e-commerce? A) It is typically unstructured. B) It helps develop a more personal relationship between participants in the supply chain. C) It enables participants to make decisions based on current conditions. D) They are always private.

D) They are always private.

29) All of the following are strategic factors that pertain specifically to a firm and its related businesses except: A) core competencies. B) synergies. C) technology. D) power of customers.

D) power of customers.

11) Bitcoins are an example of: 1. A) digital cash. 2. B) virtual currency. 3. C) a stored value payment system. 4. D) an EBPP system.

A

11) Bitcoins are an example of: A) digital cash. B) virtual currency. C) a stored value payment system. D) an EBPP system.

A

11) Electronic Data Interchange (EDI) began as a(n) ________ system. A) document automation B) document exchange C) invoice generation D) MRP

A

12) The overall rate of online credit card fraud is ________ of all online card transactions. 1. A) less than 1% 2. B) around 5% 3. C) around 10% 4. D) around 15%

A

12) The overall rate of online credit card fraud is ________ of all online card transactions. A) less than 1% B) around 5% C) around 10% D) around 15%

A

15) Which of the following is not one of the four main methods advertisers use to behaviorally target ads? 1. A) Nielsen ratings 2. B) data collected from social networks 3. C) integration of online data with oine data 4. D) clickstream data

A

25) Which of the following is the most important tool in establishing a relationship with the customer? 1. A) company website 2. B) company CRM system 3. C) Facebook 4. D) search engine display ads

A

27) Which of the following was designed to cripple Iranian nuclear centrifuges? 1. A) Stuxnet 2. B) Flame 3. C) Snake 4. D) Storm

A

27) Which of the following was designed to cripple Iranian nuclear centrifuges? A) Stuxnet B) Flame C) Snake D) Storm

A

28) An ________ is an independently owned, online marketplace that connects hundreds to potentially thousands of suppliers and buyers in a dynamic, real-time environment. A) exchange B) e-distributor C) e-procurement company D) industry consortium

A

31) ________ purchasing involves the purchase of goods based on immediate needs in larger marketplaces that involve many suppliers. A) Spot B) Indirect C) Vertical D) Bulk

A

32) Which of the following is not categorized as an operating expense? A) the cost of products being sold B) marketing costs C) administrative overhead D) amortization of goodwill

A

Which of the following is currently the most popular Web browser? A) Internet Explorer B) Safari C) Chrome D) Firefox

A

Which of the following is not an open source software tool? A) WebSphere B) Apache C) MySQL D) PHP

A

Which of the following is not true about the mobile platform? A) Most smartphones use Intel chips. B) The number of cell phones worldwide exceeds the number of PCs. C) Over a third of the world's cell phones are smartphones. D) Smartphones use flash memory chips.

A

________ purchasing involves the purchase of goods based on immediate needs in larger marketplaces that involve many suppliers. A) Spot B) Indirect C) Vertical D) Bulk

A) Spot

E-distributors: A) make money by charging a mark-up on products they distribute. B) usually operate "private" markets. C) operate in vertical markets. D) focus on selling direct products

A) make money by charging a mark-up on products they distribute.

28) Which of the following is not a key industry strategic factor? A) synergies B) barriers to entry C) industry value chain D) existence of substitute products

A) synergies

65) The Internet has resulted in lower search costs, increased price comparison, and lower prices to consumers for which insurance product line? A) term life insurance B) automobile insurance C) health insurance D) property and casualty insurance

A) term life insurance

71) All of the following cases involved the doctrine of fair use except: 1. A) Brown Bag Software vs. Symantec Corp. 2. B) Perfect 10, Inc. v. Amazon.com, Inc. et al. 3. C) Field v. Google, Inc. 4. D) Kelly v. Arriba Soft.

Answer: A

53) Over the past decade, the number of exchanges has: A) greatly increased. B) diminished sharply. C) stayed about the same. D) increased slowly but steadily.

Answer: B

2) Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products? 1. A) ubiquity 2. B) interactivity 3. C) information density 4. D) global reach

Answer: D

20) Which of the following basic ethical concepts plays an important role in dening privacy? 1. A) responsibility 2. B) accountability 3. C) liability 4. D) due process

Answer: D

21) Which of the following involves a coupon or other promotional offer that appears in users' Twitter timeline? 1. A) Promoted Tweet 2. B) Promoted Trend 3. C) Promoted Account 4. D) Lead Generation Card

Answer: D

6) By 2016, it is expected that spending on mobile marketing will surpass the amount spent on local online marketing.

Answer: TRUE

7) Over 80% of Facebook's ad revenue is generated by its mobile audience.

Answer: TRUE

82) Eddystone is an open-source standard for beacon technology.

Answer: TRUE

83) Section 230 of the Communications Decency Act (CDA) provides immunity for providers and users of interactive computer services (such as ISPs and websites) from being considered a publisher that might be liable for harmful content posted by others.

Answer: TRUE

24) Office supplies are an example of: A) direct goods. B) indirect goods. C) MRO goods. D) distributed goods.

B

78) Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other? 1. A) DES 2. B) NFC 3. C) IM 4. D) text messaging

B

78) Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other? A) DES B) NFC C) IM D) text messaging

B

78) Which of these job recruitment sites is not a job listing aggregator? A) Indeed B) SimplyHired C) Glassdoor D) CareerBuilder

B

78) ________ is another name for transorganizational business processes. A) Supply chain management B) Collaborative commerce C) B2B e-commerce D) Value chain management

B

________ was/were the first step in the development of B2B e-commerce. A) Electronic Data Interchange (EDI) B) Automated order entry systems C) Computerized inventory databases D) Digital invoices

B) Automated order entry systems

B2B e-commerce websites: A) are a predecessor of industry consortia. B) tend to serve horizontal markets. C) are buyer-side solutions. D) are considered a type of EDI system.

B) tend to serve horizontal markets.

31) Creating multiple variations of information goods and selling these to different market segments at different prices is called: 1. A) bundling. 2. B) customization. 3. C) dynamic pricing. 4. D) versioning.

D

31) ________ typically attack governments, organizations, and sometimes individuals for political purposes. 1. A) Crackers 2. B) White hats 3. C) Grey hats 4. D) Hacktivists

D

An ________ serves businesses that primarily buy direct goods on a contract purchasing basis. A) e-distributor B) e-procurement company C) exchange D) industry consortium

D) industry consortium

67) All of the following statements about the online real estate services market are true except: A) most people use the Internet to search for a home, but still use the services of a real estate agent to complete the purchase. B) real estate differs from other types of online financial services because it is impossible to complete a property transaction online. C) the primary service offered by real estate sites is a listing of houses available. D) the Internet and e-commerce have created significant disintermediation in the real estate marketplace.

D) the Internet and e-commerce have created significant disintermediation in the real estate marketplace.

13) Which of the following has the Internet Advertising Bureau urged advertisers to abandon? A) HTML B) HTML5 C) Adobe Flash D) Adobe Acrobat

C

25) Most inter-firm trade involves: A) spot purchasing of direct goods. B) contract purchasing of indirect goods. C) contract purchasing of direct goods. D) spot purchasing of indirect goods.

C

39) Which of the following is a method of inventory cost management that seeks to eliminate excess inventory? A) lean production B) sustainable production C) just-in-time production D) supply chain simplification

C

________ production is a set of production methods that focuses on the elimination of waste throughout the customer value chain. A) Green B) Sustainable C) Lean D) Just-in-time

C) Lean

11) The majority of online shoppers nd vendors by clicking on display ads.

false

38) Vishing attacks exploit SMS messages.

false

40) The highest amount of online advertising spending is for online video ads.

false

44) An ad is considered viewable if half of the ad can be viewed for at least ve consecutive seconds.

false

9) Consumers choose online channels (e.g., e-mail) primarily due to social media inuence.

false

2) The MOTO sector of the retail industry is most like the ________ sector. A) specialty stores B) general merchandise C) online retail sales D) consumer durables

C) online retail sales

12) Which of the following is not one of the methods used by traditional retailers to develop omni-channel integration? A) online catalog B) online order, in-store pickup C) online supply-push D) online promotions for offline purchases

C) online supply-push

3) Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture? 1. A) accountability 2. B) privacy 3. C) responsibility 4. D) liability

Answer: B

30) The existence of a large number of competitors in any one market segment may indicate: A) an untapped market niche. B) the market is saturated. C) no one firm has differentiated itself within that market. D) a market that has already been tried without success.

Answer: B

30) Which of the following allows Facebook to track user behavior on other sites and then sell the information to marketers? 1. A) Open Graph 2. B) Like button 3. C) hashtags 4. D) Whatsapp

Answer: B

31) "Do Not Track" falls under which of the following principles in the FTC's new privacy framework? 1. A) Privacy by Design 2. B) Simplied Choice 3. C) Greater Transparency 4. D) Scope

Answer: B

32) Which of the following is a micro-blogging social network site that allows users to send and receive 140-character messages? 1. A) Facebook 2. B) Twitter 3. C) Pinterest 4. D) Instagram

Answer: B

34) Which of the following was the object of the FTC's highest penalty for a COPPA violation to date? 1. A) Disney's Playdom 2. B) W3 Innovation 3. C) Snapchat 4. D) Yelp

Answer: B

41) Which of the following involves using a variety of tools to encourage users to interact with content and brand? 1. A) social density 2. B) engagement 3. C) amplication 4. D) dark social

Answer: B

51) Which of the following occurs when retailers of products must compete on price and currency of inventory directly against the manufacturer? A) disintermediation B) localization C) channel conflict D) hypermediation

C

31) Which of the following is not true about Facebook News Feed Page Post Ads? 1. A) They have a tiny tag indicating that they are sponsored. 2. B) They can be liked, shared, and commented on, just like any News Feed post. 3. C) They cannot contain links. 4. D) They have social context.

Answer: C

39) Which of the following is not a community provider? A) LinkedIn B) Facebook C) Priceline D) Pinterest

Answer: C

40) Which of the following allows a user to buy products directly on its site and pay with Apple Pay? 1. A) Twitter 2. B) LinkedIn 3. C) Pinterest 4. D) Snapchat

Answer: C

25) The number of people exposed to pins is a measure of which of the following? 1. A) engagement 2. B) community 3. C) brand strength 4. D) fan acquisition

Answer: D

3) The second most popular social network in terms of average minutes per visitor is: 1. A) Instagram. 2. B) Pinterest. 3. C) LinkedIn. 4. D) Tumblr.

Answer: D

31) All of the following can be considered a direct or indirect competitor of Amazon.com except: A) eBay. B) Apple's iTunes Store. C) Barnesandnoble.com. D) Starbucks.

Answer: D

34) All of the following use an advertising revenue model except: A) Facebook. B) Yahoo. C) Google. D) Amazon.

Answer: D

38) A business document that specifically details how you plan on selling your product and find new customers is called a: A) sales analysis. B) business plan. C) competitive strategy. D) market strategy.

Answer: D

4) By 2018, it is estimated that advertisers will be spending ________ on mobile marketing. 1. A) $70 million 2. B) $700 million 3. C) $7 billion 4. D) $70 billion

Answer: D

4) What is the rst step in analyzing an ethical dilemma? 1. A) Dene the conict or dilemma and identify the higher-order values involved. 2. B) Identify the potential consequences of your opinions. 3. C) Identify the options you can reasonably take. 4. D) Identify and describe the facts.

Answer: D

43) Which of the following is a Facebook feature that allows app developers to integrate their apps into the Facebook pages of users who sign up for the app? 1. A) Whatsapp 2. B) Like button 3. C) Messenger 4. D) Open Graph

Answer: D

45) Which of the following was not able to successfully implement a freemium business model? A) Pandora B) MailChimp C) Evernote D) Ning

Answer: D

51) How long does copyright protection extend for corporate-owned works? 1. A) 25 years 2. B) 50 years 3. C) 75 years 4. D) 95 years

Answer: D

56) Which of the following is the top app in terms of both audience size and share of time spent? 1. A) YouTube 2. B) iTunes 3. C) Twitter 4. D) Facebook

Answer: D

57) How many retail-oriented apps are among the top 25 apps? 1. A) 1 2. B) 2 3. C) 3 4. D) 4

Answer: D

78) Which of the following is the leading location-based marketer? 1. A) Twitter 2. B) Apple 3. C) Facebook 4. D) Google

Answer: D

81) Which of the following is not a major e-commerce public safety and welfare issue? 1. A) regulation of gambling 2. B) regulation of cigarette sales 3. C) regulation of pornography 4. D) regulation of taxation

Answer: D

16) The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.

Answer: FALSE

38) In the United States, Google is not required to remove results from its search engine if requested.

Answer: TRUE

40) The opt-in model for informed consent requires an armative action by the consumer before a company can collect and use information.

Answer: TRUE

47) Brand pages on Facebook typically attract more visitors than a brand's website.

Answer: TRUE

50) In 2016. Millennials represent 70% of Snapchat's monthly active U.S. users.

Answer: TRUE

79) Net neutrality refers to the idea that Internet service providers (ISPs), including cable Internet and wireless carriers, should treat all data on the Internet in the same manner, and not discriminate or price differentially by content, protocol, platform, hardware, or application.

Answer: TRUE

15) Which of the following had the highest online sales revenue in 2015? A) Macy's B) Walmart C) Sears D) Target

B

16) Concker is an example of a: 1. A) virus. 2. B) worm. 3. C) Trojan horse. 4. D) botnet.

B

20) What is the most frequent cause of stolen credit cards and card information today? 1. A) lost cards 2. B) the hacking and looting of corporate servers storing credit card information 3. C) sning programs 4. D) phishing attacks

B

70) Impressions are a measure of the: 1. A) number of times an ad is clicked. 2. B) number of times an ad is served. 3. C) number of http requests. 4. D) number of pages viewed.

B

71) All of the following are examples of social/mobile peer-to-peer payment systems except: 1. A) Venmo. 2. B) Bill Me Later. 3. C) Square Cash. 4. D) Google Wallet.

B

76) All of the following are limitations of the existing online credit card payment system except: 1. A) poor security. 2. B) cost to consumers. 3. C) cost to merchant. 4. D) social equity.

B

76) All of the following are limitations of the existing online credit card payment system except: A) poor security. B) cost to consumers. C) cost to merchant. D) social equity.

B

77) Linden Dollars, created for use in Second Life, are an example of: 1. A) digital cash. 2. B) virtual currency. 3. C) EBPP . 4. D) peer-to-peer payment systems.

B

The first Web browser to make it possible to view documents on the Web with colored background, images, and animations was: A) Netscape Navigator. B) Mosaic. C) Mozilla. D) Internet Explorer.

B

Which of the following basic system functionalities is used to display goods on a Web site? A) product database B) digital catalog C) shopping cart system D) customer database system

B

Which of the following is the minimum system architecture requirement for an e-commerce Web site that processes orders? A) single-tier architecture B) two-tier architecture C) three-tier architecture D) multi-tier architecture

B

78) Which of these job recruitment sites is not a job listing aggregator? A) Indeed B) SimplyHired C) Glassdoor D) CareerBuilder

B) SimplyHired

All of the following are steps one can take to right-size a Web site's hardware platform and meet demands for service except: A) scaling hardware vertically. B) scaling hardware horizontally. C) replacing static pages with dynamically generated pages. D) improving processing architecture.

C

________ are the fastest growing form of B2B e-commerce. A) R-distributors B) Exchanges C) Private industrial networks D) Industry consortiums

C) Private industrial networks

76) Expedia owns all of the following except: A) Travelocity. B) Orbitz. C) TripAdvisor. D) CheapTickets.

C) TripAdvisor.

43) Omni-channel merchants are also referred to as: A) virtual merchants. B) bricks-and-clicks companies. C) catalog merchants. D) manufacturer-direct firms.

B) bricks-and-clicks companies.

45) Virtual merchants face potentially large costs for all of the following except: A) building and maintaining a website. B) building and maintaining physical stores. C) building an order fulfillment infrastructure. D) developing a brand name.

B) building and maintaining physical stores.

14) Approximately ________ retailers generate 90% of all retail e-commerce sales. A) 10 B) 100 C) 1,000 D) 10,000

C

2) In 2016, the total amount of B2B e-commerce in the United States was approximately: A) $67 billion. B) $670 billion. C) $6.7 trillion. D) $67 trillion.

C

2) The MOTO sector of the retail industry is most like the ________ sector. A) specialty stores B) general merchandise C) online retail sales D) consumer durables

C

36) Current liabilities are debts of the firm that will be due within: A) three months. B) six months. C) one year. D) two years.

C

38) TCP/IP operates in which layer of Internet architecture? A) Network Technology Substrate layer B) Middleware Services layer C) Transport Services and Representation Standards layer D) Applications layer

C

38) Which of the following is an automated, auction-based method for matching supply and demand for online display ads? 1. A) retargeting 2. B) behavioral targeting 3. C) programmatic advertising 4. D) keyword advertising

C

Most inter-firm trade involves: A) spot purchasing of direct goods. B) contract purchasing of indirect goods. C) contract purchasing of direct goods. D) spot purchasing of indirect goods.

C) contract purchasing of direct goods.

An ________ primarily serves businesses that buy direct goods on a spot purchasing basis. A) e-distributor B) e-procurement company C) exchange D) industry consortium

C) exchange

36) Current liabilities are debts of the firm that will be due within: A) three months. B) six months. C) one year. D) two years.

C) one year.

45) The concept of "customer satisfaction" is broader than the concept of "customer experience."

false

81) Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.

false

1) Confidentiality is sometimes confused with: A) privacy. B) authenticity. C) integrity. D) nonrepudiation.

A

11) Which of the following is not one of the central challenges facing the online retail industry? A) lack of physical store presence B) consumer concerns about the privacy of personal information C) inconvenience in returning goods D) delivery delays

A

65) The Internet has resulted in lower search costs, increased price comparison, and lower prices to consumers for which insurance product line? A) term life insurance B) automobile insurance C) health insurance D) property and casualty insurance

A

68) Craigslist is a player in which of the following online services markets? A) real estate services and career services B) insurance services and brokerage services C) travel services D) online accounting services

A

7) ________ refers to the ability to ensure that messages and data are only available to those authorized to view them. 1. A) Condentiality 2. B) Integrity 3. C) Privacy 4. D) Availability

A

7) ________ refers to the ability to ensure that messages and data are only available to those authorized to view them. A) Confidentiality B) Integrity C) Privacy D) Availability

A

70) NeweggBusiness is an example of a(n) ________. A) e-distributor B) exchange C) private industrial network D) e-procurement Net marketplace

A

72) All of the following statements about Apple Pay are true except which of the following? A) Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions. B) Apple Pay is based on Touch ID biometric fingerprint scanning. C) Apple Pay can be used for mobile payments at the point of sale at a physical store. D) Apple Pay relies on NFC chip technology.

A

73) PayPal is an example of a(n): A) online stored value payment system. B) digital checking system. C) accumulating balance system. D) digital credit card system.

A

The ________ helps define the overall structure of the Internet. A) IAB B) IESG C) W3C D) ITU

A

13) Which of the following statements is not true about the automobile and automobile parts and accessories online retail category? A) Most of the revenue in this category is generated from the sales of automobiles. B) Automobile manufacturers use the Internet to deliver branding advertising. C) U.S. franchising law prohibits automobile manufacturers from selling cars directly to consumers. D) Automobile retailing is dominated by dealership networks.

A) Most of the revenue in this category is generated from the sales of automobiles.

32) Which of the following is not categorized as an operating expense? A) the cost of products being sold B) marketing costs C) administrative overhead D) amortization of goodwill

A) the cost of products being sold

Which of the following is a set of rules for transferring data? A) protocol B) packet C) router D) IP address

A

When using multivariate testing, if you wish to test two different versions of an image, a button, and a piece of text, how many combinations will you need to test? A) 2 B) 4 C) 6 D) 8

D

Cortana is a type of: A) intelligent personal assistant. B) widget. C) gadget. D) social network.

A

Which of the following statements about cloud-based B2B systems is not true? A) Much of the expense of the system is shifted from the B2B network provider to the firm. B) B2B network providers charge customers on a demand basis. C) Network effects apply, enabling the spreading of costs. D) Cloud-based B2B data networks can be implemented in short periods of time.

A) Much of the expense of the system is shifted from the B2B network provider to the firm.

All of the following are current major trends in B2B e-commerce, except: A) a movement toward implementing highly centralized supply chains to reduce risk. B) a growing emphasis on the use of business analytics software (business intelligence) to understand very large data sets. C) a growing emphasis on rapid-response and adaptive supply chains rather than lowest-cost supply chains. D) an increase in regional manufacturing and supply chains to attempt to combat the risks of far-flung global networks.

A) a movement toward implementing highly centralized supply chains to reduce risk.

79) Which of the following is not a major trend in the online recruitment services industry? A) disintermediation B) Millennials and GenX primarily use mobile devices to search for jobs. C) social recruiting D) hiring by algorithm

A) disintermediation

Electronic Data Interchange (EDI) began as a(n) ________ system. A) document automation B) document exchange C) invoice generation D) MRP

A) document automation

49) The term supply-push refers to: A) making products prior to orders being received based on estimated demand. B) waiting for orders to be received before building a product. C) channel conflict. D) multi-channel manufacturers who sell directly online to consumers.

A) making products prior to orders being received based on estimated demand.

53) Which of the following has the second-highest share of online retail sales? A) omni-channel merchants B) virtual merchants C) catalog merchants D) manufacturer-direct

A) omni-channel merchants

The liquidity of a market is measured by all of the following except: A) price transparency. B) number of buyers and sellers in market. C) volume of transactions. D) size of transactions.

A) price transparency.

All of the following are important trends in B2B e-commerce in 2016-2017, except: A) the growing emphasis on obtaining real-time data. B) growing emphasis on lowest cost supply chains. C) generation and management of huge big data repositories. D) an increase in regional manufacturing and supply chains.

B) growing emphasis on lowest cost supply chains.

50) All of the following are examples of the challenges that traditional manufacturers experience when using the Internet to sell directly to the consumer except: A) moving to a demand-pull model. B) high cost structures. C) developing a fast-response online order and fulfillment system. D) channel conflict.

B) high cost structures.

Office supplies are an example of: A) direct goods. B) indirect goods. C) MRO goods. D) distributed goods.

B) indirect goods.

An example of an indirect good in the fast-food industry is: A) mustard. B) paper napkins. C) beef. D) sugar.

B) paper napkins.

10) All of the following are potential benefits of B2B e-commerce except: A) lower administrative costs. B) lower search costs. C) lower price transparency. D) lower transaction costs.

C

76) Expedia owns all of the following except: A) Travelocity. B) Orbitz. C) TripAdvisor. D) CheapTickets.

C

Which of the following statements is true about the traditional tradeoff between the richness and reach of a marketing message prior to the development of the Web? A) Marketing messages had little richness. B) The smaller the audience reached, the less rich the message. C) The larger the audience reached, the less rich the message. D) Richness was unrelated to reach.

C

Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship? A) consumer-to-consumer (C2C) B) social e-commerce C) mobile e-commerce D) business-to-business (B2B)

C

Which of the following primarily deals with direct goods? A) e-distributors and independent exchanges B) exchanges and e-procurement Net marketplaces C) exchanges and industry consortia D) e-procurement Net marketplaces and industry consortia

C) exchanges and industry consortia

EDI document structures are defined by: A) a single international standards body. B) individual suppliers and buyers. C) industry committees. D) each purchaser.

C) industry committees.

Which of the following is not a limitation of the current Internet? A) the continued reliance on cables and wires for connectivity B) limited bandwidth, which causes congestion and cannot adequately handle video and voice traffic C) architectural restrictions, which stipulate that numerous requests for the same file must each be answered individually, slowing network performance D) the difficulty in expanding capacity by adding servers and clients

D

Which of the following is not a mobile messaging application? A) KakaoTalk B) WhatsApp C) Viber D) Feedly

D

Which of the following is not one of the basic business objectives for an e-commerce site? A) display goods B) execute a transaction C) provide production and supplier links D) optimize system architecture

D

32) A worm does not need to be activated by a user for it to replicate itself.

TRUE

36) Spoofing a website is a threat to the integrity of the website.

TRUE

8) Typically, the more security measures added to an e-commerce site, the slower and more dicult it becomes to use.

TRUE

39) Factoring Attack on RSA-Export Keys (FREAK) is an example of a software vulnerability.

true

39) Research has found that most ad impressions served across display advertising platforms are not viewable.

true

41) Evidence suggests real-time customer chat increases the dollar value of transactions.

true

42) Consumers tend to look at native ads more frequently than display ads.

true

43) Lead generation marketing rms specialize in inbound marketing

true

63) SLS/TLS cannot provide irrefutability.

true

64) The easiest and least expensive way to prevent threats to system integrity is to install antivirus software.

true

79) PayPal is the most popular alternative payment method in the United States.

true

8) In the early years of e-commerce, prior to 2000, single, white, young college-educated males with high income dominated the Internet in terms of percentage of Internet usage.

true

13) Which of the following statements is not true about the automobile and automobile parts and accessories online retail category? A) Most of the revenue in this category is generated from the sales of automobiles. B) Automobile manufacturers use the Internet to deliver branding advertising. C) U.S. franchising law prohibits automobile manufacturers from selling cars directly to consumers. D) Automobile retailing is dominated by dealership networks.

A

Above all, e-commerce is a ________ phenomenon. A) technology driven B) finance-driven C) sociological D) government-driven

A

Which of the following is not a concern about IoT? A) the high cost of sensors B) interoperability C) security D) privacy

A

Which of the following is not a main factor in determining the overall demand on an e-commerce site? A) file sizes of Web pages being served B) number of simultaneous users in peak periods C) speed of legacy applications that are needed to supply data to Web pages D) whether content is dynamic or static

A

Which of the following protocols is used to send mail to a server? A) IMAP B) FTP C) HTTP D) SSL

A

________ refers to the links that connect business firms with one another to coordinate production. A) Supply chain B) B2B e-commerce C) Vertical market D) Horizontal market

A) Supply chain

Which of the following statements about EDI systems is true? A) They typically serve vertical markets. B) They are seller-side solutions. C) They evolved from private trading exchanges. D) They still play an important role in B2C commerce.

A) They typically serve vertical markets.

73) Which of the following has introduced a tool known as Consumer Alerts to inform readers when a review is likely to be fraudulent? A) Yelp B) TripAdvisor C) Angie's List D) TripExpert

A) Yelp

An ________ primarily serves businesses that buy indirect goods on a spot purchasing basis. A) e-distributor B) e-procurement company C) exchange D) industry consortium

A) e-distributor

An ________ provides an online catalog that represents the products of thousands of direct manufacturers. A) e-distributor B) e-procurement company C) exchange D) industry consortium

A) e-distributor

NeweggBusiness is an example of a(n) ________. A) e-distributor B) exchange C) private industrial network D) e-procurement Net marketplace

A) e-distributor

3) Which of the following is not one of the seven major segments of the retail industry? A) electronics and computers B) specialty stores C) gasoline and fuel D) food and beverage

A) electronics and computers

An ________ is an independently owned, online marketplace that connects hundreds to potentially thousands of suppliers and buyers in a dynamic, real-time environment. A) exchange B) e-distributor C) e-procurement company D) industry consortium

A) exchange

61) All of the following services require extensive personalization except: A) financial services. B) legal services. C) medical services. D) accounting services.

A) financial services.

11) Which of the following is not one of the central challenges facing the online retail industry? A) lack of physical store presence B) consumer concerns about the privacy of personal information C) inconvenience in returning goods D) delivery delays

A) lack of physical store presence

LO: 9.2: Explain how to analyze the economic viability of an online firm. 35) Which of the following would not be considered a current asset? A) long-term investments B) cash C) accounts receivable D) marketable securities

A) long-term investments

6) All of the following were parts of the vision during the early days of e-commerce except the belief that: A) new, "first-mover" middlemen, with expertise in e-commerce, would force traditional intermediaries out of business. B) online consumers were rational and cost-driven. C) entry costs to the online retail market would be much less than those needed to establish a physical storefront. D) the cost of acquiring customers would be much lower.

A) new, "first-mover" middlemen, with expertise in e-commerce, would force traditional intermediaries out of business.

33) Operating margin is defined as: A) operating income or loss divided by net sales revenues. B) operating income or loss divided by total operating expenses. C) net sales revenues divided by net income or loss. D) net assets divided by net liabilities.

A) operating income or loss divided by net sales revenues.

68) Craigslist is a player in which of the following online services markets? A) real estate services and career services B) insurance services and brokerage services C) travel services D) online accounting services

A) real estate services and career services

The last step in the procurement process is: A) sending a remittance payment. B) sending the invoice. C) shipping the goods. D) delivering the goods.

A) sending a remittance payment.

Automated order entry systems: A) show goods from a single seller. B) increased the costs of inventory replenishment. C) are typically owned by the purchasing firm. D) no longer play an important role in B2B commerce.

A) show goods from a single seller.

66) All of the following statements about the online insurance industry are true except: A) the Internet has dramatically changed the insurance industry's value chain. B) websites of almost all the major firms provide the ability to obtain an online quote. C) Internet usage has led to a decline in term life insurance prices industry-wide. D) the industry has been very successful in attracting visitors searching for information

A) the Internet has dramatically changed the insurance industry's value chain.

A(n) ________ market is one that provides expertise and products for a specific industry, such as automobiles. A) vertical B) horizontal C) indirect D) buyer-biased

A) vertical

37) For a quick check of a firm's short-term financial health, examine its: A) working capital. B) gross margin. C) long-term debt. D) cost of sales.

A) working capital.

30) The lower the ________ compared to revenue, the higher the gross profit. A) assets B) cost of sales C) gross margin D) operating expenses

B

30) Which of the following statements about a free pricing strategy is false? 1. A) Free products and services can knock out potential and actual competitors. 2. B) The free pricing strategy was born in the early days of the Web. 3. C) It is dicult to convert free customers into paying customers. 4. D) Free products and services can help build market awareness.

B

37) Which of the following statements about native advertising is not true? 1. A) Native advertising is controversial. 2. B) Native advertising is a new form of advertising found only online. 3. C) Native advertising is growing rapidly, especially on social networks. 4. D) Consumers look at native ads much more frequently than display ads.

B

38) All of the following are weaknesses of EDI except: A) EDI is not well suited for electronic marketplaces. B) EDI lacks universal standards. C) EDI does not provide a real-time communication environment. D) EDI does not scale easily.

B

38) ________ measures the percentage of sales revenue a firm retains after all expenses are deducted from gross revenues. A) Gross profit B) Net margin C) Operating margin D) Working capital

B

4) All of the following statements about the MOTO sector are true except: A) compared to general merchandisers, the transition to e-commerce has been easier for MOTO firms. B) the MOTO sector is also referred to as the specialty store sector. C) MOTO was the last technological revolution that preceded e-commerce. D) distribution of catalogs is one of MOTO retailers' biggest expenses.

B

41) ________ is a method for ensuring that suppliers precisely deliver ordered parts at a specific time and to a particular location. A) Having an adaptive supply chain B) Tight coupling C) Supply-chain management D) Materials requirement planning

B

43) Omni-channel merchants are also referred to as: A) virtual merchants. B) bricks-and-clicks companies. C) catalog merchants. D) manufacturer-direct firms.

B

44) Which of the following is a subscription-based retailer using predictive marketing and Big Data? A) Macy's B) Birchbox C) Dell D) Lands' End

B

45) Symmetric key cryptography is also known as: 1. A) public key cryptography. 2. B) secret key cryptography. 3. C) PGP . 4. D) PKI.

B

45) Symmetric key cryptography is also known as: A) public key cryptography. B) secret key cryptography. C) PGP. D) PKI.

B

45) Virtual merchants face potentially large costs for all of the following except: A) building and maintaining a website. B) building and maintaining physical stores. C) building an order fulfillment infrastructure. D) developing a brand name.

B

46) All of the following are important trends in B2B e-commerce in 2016-2017, except: A) the growing emphasis on obtaining real-time data. B) growing emphasis on lowest cost supply chains. C) generation and management of huge big data repositories. D) an increase in regional manufacturing and supply chains.

B

48) All of the following statements about public key cryptography are true except: 1. A) public key cryptography uses two mathematically related digital keys. 2. B) public key cryptography ensures authentication of the sender. 3. C) public key cryptography does not ensure message integrity. 4. D) public key cryptography is based on the idea of irreversible mathematical functions.

B

48) All of the following statements about public key cryptography are true except: A) public key cryptography uses two mathematically related digital keys. B) public key cryptography ensures authentication of the sender. C) public key cryptography does not ensure message integrity. D) public key cryptography is based on the idea of irreversible mathematical functions

B

50) Which of the following would you use as a framework for working with your company's big data sets? 1. A) data warehouse 2. B) Hadoop 3. C) SQL 4. D) proling

B

18) All of the following marketing tools on Facebook require payment except: 1. A) Brand Pages. 2. B) Right-Hand Sidebar Ads. 3. C) News Feed Page Post Ads. 4. D) Mobile Ads.

Answer: A

2) Which of the following is not true about social marketing? 1. A) More than 50% of Twitter's ad revenues are generated by desktop users. 2. B) The top seven social networks account for over 90% of all visits. 3. C) Social marketing differs markedly from traditional online marketing. 4. D) In social marketing, business cannot tightly control their brand messaging.

Answer: A

39) Most adult social network participants do not have any expectation of personal privacy when using a social network.

Answer: FALSE

41) The Federal Communications Commission's new privacy rules apply to both broadband ISPs and websites.

Answer: FALSE

46) Facebook does not sell display ads.

Answer: FALSE

48) Promoted Trends is Twitter's version of Google's Ad Words.

Answer: FALSE

5) In 2016, spending on social marketing will almost triple the amount spent on mobile marketing.

Answer: FALSE

72) Copyright protection protects against others copying the underlying ideas in a work.

Answer: FALSE

72) SMS text messaging generates most mobile marketing spending.

Answer: FALSE

82) The Children's Internet Protection Act (CIPA) has been struck down by the U.S. Supreme Court as unconstitutional.

Answer: FALSE

83) A cell phone's GPS is accurate to within ve feet of the actual location of the phone.

Answer: FALSE

84) Online gambling is now legal throughout the United States.

Answer: FALSE

15) Liability is a feature of political systems in which a body of law is in place allowing individuals to recover damages done to them by other actors, systems, or organizations.

Answer: TRUE

17) The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.

Answer: TRUE

42) The AdChoices program is an industry-sponsored initiative to encourage websites to be more transparent about how they use personal information and to make it more likely that appropriate ads are shown to users.

Answer: TRUE

44) Visitors spend more time on Facebook than any other social network site.

Answer: TRUE

45) Facebook's Search functionality includes everyone's public posts, Likes, photos, and interests, and makes them available to all users of Facebook, even those who are not friends.

Answer: TRUE

70) It is expected that by 2020, m-commerce will account for almost 50% of all e-commerce in the retail and travel industries.

Answer: TRUE

71) Smartphones are the fastest growing and largest source of m-commerce revenues.

Answer: TRUE

73) The expansion of generic top-level domains recently authorized by ICANN is likely to be very disruptive in terms of trademark protection.

Answer: TRUE

1) Condentiality is sometimes confused with: 1. A) privacy. 2. B) authenticity. 3. C) integrity. 4. D) nonrepudiation.

B

12) All of the following are potential benefits of B2B e-commerce except: A) increased production flexibility. B) increased product cycle time. C) increased opportunities to collaborate with suppliers and distributors. D) increased visibility and real-time information sharing among all participants in the supply chain network.

B

14) Accessing data without authorization on Dropbox is an example of which of the following? 1. A) social network security issue 2. B) cloud security issue 3. C) mobile platform security issue 4. D) sning

B

14) Accessing data without authorization on Dropbox is an example of which of the following? A) social network security issue B) cloud security issue C) mobile platform security issue D) sniffing

B

16) Conficker is an example of a: A) virus B) worm C) Trojan horse D) botnet

B

20) Ad blockers operate in a manner similar to which of the following? 1. A) anti-virus software 2. B) rewalls 3. C) Flash cookies 4. D) anonymous browsing

B

20) What is the most frequent cause of stolen credit cards and card information today? A) lost cards B) the hacking and looting of corporate servers storing credit card information C) sniffing programs D) phishing attacks

B

23) Which of the following statements about CAN-SPAM is not true? 2004. A) CAN-SPAM went into effect in January 2004. 2005. B) CAN-SPAM prohibits unsolicited e-mail (spam). 2006. C) CAN-SPAM prohibits the use of deceptive subject lines and false headers. 2007. D) Large spammers are among CAN-SPAM's biggest supporters.

B

24) Angler is an example of: 1. A) a worm. 2. B) an exploit kit. 3. C) phishing. 4. D) hacktivism

B

24) Angler is an example of: A) a worm. B) an exploit kit. C) phishing. D) hacktivism.

B

51) The term BYOD refers to employees: A) working from home. B) being allowed or encouraged to use their own mobile devices and laptops. C) using mobile devices for work. D) bringing work devices to the home

B

51) Which of the following statements about the Internet's impact on marketing is not true? 1. A) The Internet has broadened the scope of marketing communications. 2. B) The Internet has decreased the impact of brands. 3. C) The Internet has increased the richness of marketing communications. 4. D) The Internet has expanded the information intensity of the marketplace.

B

52) Which of the following dimensions of e-commerce security does not involve encryption? 1. A) condentiality 2. B) availability 3. C) message integrity 4. D) nonrepudiation

B

52) Which of the following dimensions of e-commerce security does not involve encryption? A) confidentiality B) availability C) message integrity D) nonrepudiation

B

52) Which of the following has the highest share of online retail sales? A) omni-channel merchants B) virtual merchants C) catalog merchants D) manufacturer-direct

B

53) Which of the following features of e-commerce technology allows ne-grained, highly detailed information on consumers' real-time behavior to be gathered and analyzed? 1. A) personalization/customization 2. B) information density 3. C) ubiquity 4. D) interactivity

B

56) All of the following statements about cookies are true except: 1. A) cookies can be used to create cross-site proles of users. 2. B) the data typically stored in cookies includes a unique ID and e-mail address. 3. C) cookies make shopping carts possible by allowing a site to keep track of a user's actions. 4. D) the more cookies are deleted, the less accurate ad server metrics become.

B

59) A ________ is a repository of customer information that records all of the contacts a customer has with a rm, and generates a customer prole that is available to appropriate individuals in the rm. 1. A) customer service chat system 2. B) CRM system 3. C) data warehouse 4. D) transactive content system

B

59) Which of the following primarily serves horizontal markets? A) e-distributors and exchanges B) e-distributors and e-procurement Net marketplaces C) e-procurement Net marketplaces and industry consortia D) exchanges and industry consortia

B

6) Online buyers constitute approximately ________% of the online Internet audience. 1. A) 67 2. B) 77 3. C) 87 4. D) 97

B

6) Which of the following is an example of an online privacy violation? 1. A) your e-mail being read by a hacker 2. B) your online purchasing history being sold to other merchants without your consent 3. C) your computer being used as part of a botnet 4. D) your e-mail being altered by a hacker

B

6) Which of the following is an example of an online privacy violation? A) your e-mail being read by a hacker B) your online purchasing history being sold to other merchants without your consent C) your computer being used as part of a botnet D) your e-mail being altered by a hacker

B

60) The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time. 1. A) long tail marketing 2. B) ash marketing 3. C) yield management 4. D) bait-and-switch

B

60) Which of the following primarily deals with indirect goods? A) e-distributors and industry consortia B) e-distributors and e-procurement Net marketplaces C) exchanges and industry consortia D) exchanges and e-procurement Net marketplaces

B

62) Which of the following is the most common protocol for securing a digital channel of communication? A) DES B) SSL/TLS C) VPN D) HTTP

B

66) An ________ primarily serves businesses that buy indirect goods on a contract purchasing basis. A) e-distributor B) e-procurement Net marketplace C) exchange D) industry consortium

B

67) Which of the following is an example of an e-procurement Net marketplace? A) TheSeam B) Ariba C) Grainger D) SupplyOn

B

69) If you want to determine the size of your website's audience, the metric you will use for the most accurate measurement will be: 1. A) page views. 2. B) unique visitors. 3. C) hits. 4. D) reach

B

69) TheSeam is an example of an ________. A) exchange B) industry consortium C) e-procurement Net marketplace D) e-distributor

B

69) To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use: 1. A) access controls. 2. B) an authorization management system. 3. C) security tokens. 4. D) an authorization policy.

B

69) To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use: A) access controls. B) an authorization management system. C) security tokens. D) an authorization policy.

B

7) B2B e-commerce websites: A) are a predecessor of industry consortia. B) tend to serve horizontal markets. C) are buyer-side solutions. D) are considered a type of EDI system.

B

71) All of the following are examples of social/mobile peer-to-peer payment systems except: A) Venmo. B) Bill Me Later. C) Square Cash. D) Google Wallet.

B

74) PCI-DSS is a standard established by which of the following? 1. A) the banking industry 2. B) the credit card industry 3. C) the federal government 4. D) the retail industry

B

74) PCI-DSS is a standard established by which of the following? A) the banking industry B) the credit card industry C) the federal government D) the retail industry

B

74) Google defended its Library Project on the grounds of fair use.

Answer: TRUE

24) Which of the following statements about Canada's anti-spam law is not true? 1. A) Canada's law is based on an opt-in model. 2. B) The law has no impact on companies located within the United States. 3. C) The rst phase of the law went into effect in 2014. 4. D) The law applies to e-mail, texts, and social media messaging.

B

29) Shellshock is an example of which of the following? 1. A) mobile malware 2. B) software vulnerability 3. C) botnet 4. D) Trojan horse

B

29) Shellshock is an example of which of the following? A) mobile malware B) software vulnerability C) botnet D) Trojan horse

B

3) ________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. 1. A) Nonrepudiation 2. B) Authenticity 3. C) Availability 4. D) Integrity

B

3) ________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. A) Nonrepudiation B) Authenticity C) Availability D) Integrity

B

3) ________ was/were the first step in the development of B2B e-commerce. A) Electronic Data Interchange (EDI) B) Automated order entry systems C) Computerized inventory databases D) Digital invoices

B

All of the following can be considered a precursor to e-commerce except: A) the development of the smartphone. B) Baxter Healthcare's PC-based remote order entry system. C) the French Minitel. D) the development of Electronic Data Interchange standards.

A

Business-to-consumer (B2C) e-commerce in the United States: A) has grown at double-digit rates between 2010 and 2015. B) has less revenue than C2C e-commerce. C) now constitutes over 50% of the overall U.S. retail market. D) is growing more slowly as it confronts its own fundamental limitations.

A

E-commerce can be defined as: A) the use of the Internet, the Web, and mobile apps to transact business. B) the use of any Internet technologies in a firm's daily activities. C) the digital enablement of transactions and processes within an organization. D) any digitally enabled transactions among individuals and organizations.

A

Which of the following refers to the complexity and content of a message? A) richness B) reach C) information density D) interactivity

A

Unfair competitive advantages occur when: A) one competitor has an advantage others cannot purchase. B) market middlemen are displaced. C) information is equally distributed and transaction costs are low. D) firms are able to gather monopoly profits.

A

Which of the following best describes the early years of e-commerce? A) They were a technological success but a mixed business success. B) They were a technological success but a business failure. C) They were a technological failure but a business success. D) They were a mixed technological and business success.

A

Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text? A) richness B) ubiquity C) information density D) personalization

A

Which of the following is an example of e-business? A) Amazon's inventory control system B) the Amazon.com Web site C) an Amazon mobile app D) Amazon's Pinterest page

A

Which of the following refers to any disparity in relevant market information among parties in a transaction? A) information asymmetry B) unfair competitive advantage C) imperfect competition D) dynamic pricing

A

Which of the following statements about e-commerce in the United States in 2015 is not true? A) Social e-commerce generates more revenue than mobile e-commerce. B) About 200 million U.S. consumers use mobile apps. C) On-demand service firms are fueling the growth of local e-commerce. D) Growth rates for retail e-commerce are higher in Europe than in the United States.

A

Which of the following statements about the Web is not true? A) The Web is the technology upon which the Internet is based. B) The Web was the original "killer app." C) The Web provides access to pages written in HyperText Markup Language. D) The Web is both a communications infrastructure and an information storage system.

A

40) Which of the following is not a variation of the e-tailer business model? A) bricks-and-clicks B) virtual merchant C) market creator D) manufacturer-direct

Answer: C

42) Which of the following is not an example of the bricks-and-clicks e-tailing business model? A) Walmart.com B) JCPenney.com C) Dell.com D) Staples.com

Answer: C

46) All of the following may lead to a competitive advantage except: A) less expensive suppliers. B) better employees. C) fewer products. D) superior products.

Answer: C

52) One of the competitive advantages of a B2B service provider is that it can spread the cost of an expensive software system over many users, achieving efficiencies referred to as: A) application efficiencies. B) network efficiencies. C) scale economies. D) network externalities.

Answer: C

26) Which of the following is an example of the affiliate revenue model? A) Yahoo B) eBay C) Gap.com D) MyPoints

Answer: D

48) All of the following are examples of business-to-business (B2B) business models except: A) e-distributors. B) e-procurement. C) private industrial networks. D) e-tailers.

Answer: D

All of the following were visions of e-commerce expressed during the early years of e-commerce except: A) a nearly perfect information marketspace. B) friction-free commerce. C) disintermediation. D) fast follower advantage.

D

In 2015, there were an estimated ________ Internet hosts. A) 1 million B) 10 million C) 100 million D) 1 billion

D

Interactivity in the context of e-commerce provides which of the following functionalities? A) the ability to physically touch and manipulate a product B) complexity and content of a message C) the ability of consumers to create and distribute content D) the enabling of two-way communication between consumer and merchant

D

Which business application is associated with the technological development of local area networks and client/server computing? A) transaction automation (e.g., payroll) B) desktop automation (e.g., word processing) C) industrial system automation (e.g., supply chain management) D) workgroup automation (e.g., document sharing)

D

Which of the following features of e-commerce technology allows users to participate in the creation of online content? A) ubiquity B) global reach C) information density D) social technology

D

Which of the following is an example of social e-commerce? A) Amazon B) eBay C) Wikipedia D) Facebook

D

Which of the following is not a characteristic of a perfect competitive market? A) Price, cost, and quality information are equally distributed. B) A nearly infinite set of suppliers compete against one another. C) Customers have access to all relevant information worldwide. D) It is highly regulated.

D

21) Your solar-panel manufacturing firm has developed a unique and patented process for creating high-efficiency solar panels at a fraction of current costs. This will enable your firm to adopt a strategy of: A) cost competition. B) scope. C) scale. D) focus.

Answer: A

23) Which of the following is an example of the subscription revenue model? A) Ancestry.com B) eBay C) Amazon D) Twitter

Answer: A

24) Stickiness is an important attribute for which revenue model? A) advertising revenue model B) subscription revenue model C) transaction fee revenue model D) sales revenue model

Answer: A

27) Assume you are analyzing the market opportunity of a distance learning company, Learnmore.com, that creates education courses delivered over the Internet for the Fortune 1000 corporate market. Assume that the overall size of the distance learning market is $25 billion. The overall market can be broken down into three major market segments: Corporate, College, and Elementary/High School, each of which accounts for a third of the market. Within the Corporate market, there are two market niches: Fortune 1000, which accounts for 60% of the market, and all others, which together account for 40% of the market. What is Learnmore.com's realistic market opportunity, approximately? A) $5 billion B) $6.6 billion C) $165 billion D) $25 billion

Answer: A

32) A perfect market is one in which: A) there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production. B) one firm develops an advantage based on a factor of production that other firms cannot purchase. C) one participant in the market has more resources than the others. D) competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage.

Answer: A

33) The business model of e-distributors is quite similar to that of: A) e-tailers. B) transaction brokers. C) exchanges. D) service providers.

Answer: A

44) In general, the key to becoming a successful content provider is to: A) own the content being provided. B) own the technology by which content is created, presented, and distributed. C) provide online content for free. D) provide other services as well as online content.

Answer: A

47) The basic value proposition of community providers is: A) they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests. B) they offer consumers valuable, convenient, time-saving, and low cost alternatives to traditional service providers. C) they create a digital electronic environment for buyers and sellers to meet, agree on a price, and transact. D) they increase customers' productivity by helping them get things done faster and more cheaply.

Answer: A

49) What is the primary revenue model for an e-distributor? A) sales B) transaction fee C) advertising D) subscription

Answer: A

22) A firm's ________ describes how a firm will produce a superior return on invested capital. A) value proposition B) revenue model C) market strategy D) competitive advantage

Answer: B

25) Which of the following companies utilizes a transaction fee revenue model? A) WSJ.com B) E*Trade C) Twitter D) Sears.com

Answer: B

43) The overall retail market in the United States in 2013 was estimated at about: A) $39 trillion. B) $3.9 trillion. C) $390 billion. D) $39 billion.

Answer: B

All of the following are issues facing Pinterest except: A) copyright infringement. B) inability to retain users. C) spam. D) scams.

B

In 2015, the world's online population was estimated to be around: A) 310 million. B) 3.1 billion. C) 31 billion. D) 310 billion.

B

Which of the following is an example of an e-commerce first mover that failed? A) Etsy B) eToys C) eBay D) E*Trade

B

Which of the following is not a major business trend in e-commerce in 2015-2016? A) Mobile e-commerce continues to grow. B) Small businesses and entrepreneurs are hampered by the rising cost of market entry caused by increased presence of industry giants. C) On demand service companies garner multi-billion dollar valuations. D) Mobile and social advertising platforms begin to challenge search engine marketing.

B

Which of the following is not true about the use of apps? A) The average U.S. consumer spends over two hours a day using apps. B) Users still spend less time using apps than they do using desktops or mobile Web sites. C) Apps are easier to control and monetize than Web sites. D) Around 280 million people worldwide launch a smartphone app more than 60 times a day.

B

Which of the following is the best definition of transaction cost? A) the expense of changing national or regional prices B) the cost of participating in a market C) the cost of finding suitable products in the market D) the cost merchants pay to bring their goods to market

B

All of the following are major social trends in e-commerce in 2015-2016 except for: A) concerns about the flood of temporary, poorly paid jobs without benefits being generated by on-demand service companies. B) the continuing conflict over copyright management and control. C) the refusal of online retailers to accept taxation of Internet sales. D) the growth of government surveillance of Internet communications.

C

In which year can e-commerce be said to have begun? A) 1983 B) 1985 C) 1995 D) 2001

C

The costs incurred by merchants in having to change product prices (such as the costs of reentering prices into computer systems) are referred to as which of the following? A) subscription costs B) fixed costs C) menu costs D) variable costs

C

The early years of e-commerce are considered: A) the most promising time in history for the successful implementation of first mover advantages. B) an economist's dream come true, where for a brief time consumers had access to all relevant market information and transaction costs plummeted. C) a stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year. D) a dramatic business success as 85% of dot-coms formed since 1995 became flourishing businesses.

C

Which of the following features of e-commerce technology is related to the concept of network externalities? A) richness B) interactivity C) universal standards D) information density

C

Which of the following is a characteristic of e-commerce during the Invention period? A) mobile technology B) earnings and profit emphasis C) disintermediation D) extensive government surveillance

C

Which of the following is not a unique feature of e-commerce technology? A) interactivity B) social technology C) information asymmetry D) richness

C

Which of the following statements is not true? A) Information asymmetries are continually being introduced by merchants and marketers. B) Intermediaries have not disappeared. C) Overall transaction costs have dropped dramatically. D) Brands remain very important in e-commerce.

C

Which of the following is not a major technology trend in e-commerce in 2015-2016? A) Mobile messaging services become popular with smartphone users. B) Firms are turning to business analytics to make sense out of Big Data. C) The mobile computing and communications platform creates an alternative platform for online transactions, marketing, advertising, and media viewing. D) Computing and networking component prices increase dramatically.

D

Which of the following is not true regarding e-commerce today? A) Economists' visions of a friction-free market have not been realized. B) Consumers are less price-sensitive than expected. C) There remains considerable persistent price dispersion. D) The market middlemen disappeared.

D

Which of the following refers to the practice of researching a product online before purchasing it at a physical store? A) zooming B) grazing C) showrooming D) webrooming

D


संबंधित स्टडी सेट्स

Ch8 Comprehensive Medical Eye Examination

View Set

NUR 2144 Pharmacology II Chapter 55: Drugs Acting on the Lower Respiratory Tract

View Set

Advance Accounting Study Guide Chapter 17

View Set

Nursing Process (PREPU Questions) CHP. 17 - IMPLEMENTING

View Set

18 Regulation of Gene Expression

View Set

NC - Policy Provisions, Options, and Other Features

View Set