E-Commerce Exam 2 Review
Most of the world's spam is delivered via which of the following?
Botnets
It is expected that by 2017, mobile commerce will account for 50% of all e-commerce.
False
Which character is used to indicate an end tag?
/
Online bill payments are believed to cost ________ to process compared to ________ for paper bills.
20 to 30 cents, $3 to $7
On a typical day, approximately ________ % of adult users in the United States logs on to the Internet.
80
What is the correct HTML for creating a hyperlink?
<a href="http://www.w3schools.com">W3Schools</a>
What is the correct HTML element for inserting a line break?
<br/>
Choose the correct HTML element for the largest heading:
<h1>
Choose the correct HTML element for the smallest heading:
<h6>
Choose the correct HTML element to define italicized text?
<i>
What is the correct HTML for making a checkbox?
<input type="checkbox">
What would you use to make a numbered list?
<ol>
Choose the correct HTML element to define "important" text that should be bold.
<strong>
Which of the following would be valid for creating a table row with one data value?
<table><tr><td>Data</td></tr></table>
What would you use to make a bulleted list?
<ul>
Transaction Log
A feature used by the DBMS to keep track of all transaction operations that update the database. The information stored in this log is used by the DBMS for recovery purposes.
Which of the following is not a feature that is driving the growth of social marketing and advertising?
Affiliate Programs
Which of the following dimensions of e-commerce security is not provided for by encryption?
Availability
All of the following are limitations of the existing online credit card payment system except:
Cost to Consumers
All of the following are methods of securing channels of communication except:
FTP
Which social marketing proved the most effective for ExchangeHunterJumper.com?
Which of the following is the leading display ad site on mobile devices?
Which of the following statements is not true?
Facebook Home is Facebook's app for iOS devices
All of the following marketing tools on Facebook require payment except:
Facebook Offers
Facebook does not sell display ads.
False
What does HTML stand for?
Hypertext Markup Language
The richness made possible by e-commerce technologies does which of the following?
It allows video, audio, and text to be integrated into a single marketing message and consuming experience.
Which of the following statements about Graph Search is not true?
It relies on Google to supplement its search results.
Which of the following do Facebook users spend the most time on?
News Feed
Reventon is an example of
Ransomware
All of the following are examples of malicious code except:
Sniffers
Surveys have found that the least influential online marketing format for driving consumers to purchase is:
Social Networks
How can a smartphone's gyroscope and accelerometer be used in product marketing?
To enhance user interaction with mobile multimedia
Drive-by downloads are now the most common method of infecting computers.
True
Google provides the leading location-based marketing platform.
True
HTML5 is the current standard markup language for web programming.
True
In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.
True
Symmetric key encryption is also known as:
secret key encryption
__________ allows the programmer to describe or specify the style and presentation of a web page separate from its content.
CSS
________ refers to the ability to ensure that messages and data are only available to those authorized to view them.
Confidentiality
Facebook's share price fell dramatically after its IPO because investors feared that:
Facebook would be unable to increase advertising revenues enough.
HTML is a procedural programming language.
False
It is possible to opt-out of Facebook's Graph Search.
False
Mobile users spend most of their time browsing mobile Web sites.
False
The concept of "customer satisfaction" is broader than the concept of "customer experience."
False
The ratio of impressions to fans is a measure of:
Fan Acquisition
Miller Coors used which of the following techniques to alert Blue Moon beer fans as to where it could be purchased?
Geo-Fencing
Which analytics tool did Fairmont Hotel use to measure the effectiveness of its online marketing and advertising?
Google Analytics
All of the following are used for authentication except:
Packet Filters
Botnets are typically used for all of the following except:
Phishing Attacks
All of the following are Pinterest marketing tools except:
Promoted Accounts
Which of the following statements about the Internet's impact on marketing is not true?
The Internet has decreased the impact of brands
Who sets standards for the Web?
The World Wide Web Consortium
All of the following statements about cookies are true except:
The data typically stored in cookies includes a unique ID and e-mail address.
What is the most frequent cause of stolen credit cards and card information today?
The hacking and looting of corporate servers storing credit card information
Which of the following statements about the use of tablets is not true?
The number of smartphone users is still growing faster than the number of tablet users.
Inline elements are normally displayed without starting a new line.
True
JavaScript and other scripting languages can be used with HTML to add more functionality to the web page.
True
Pinterest's visitors are predominantly women.
True
Promoted Tweets are Twitter's version of Google's Ad Words.
True
Smishing attacks exploit SMS messages.
True
The U.S. federal government has historically not been in favor of the development and export of strong encryption systems.
True
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
True
If you want to determine the size of your Web site's audience, the metric you will use for the most accurate measurement will be:
Unique Visitors
Which of the following statements is not true?
Women are more active purchasers on smartphones than men.
An example of a privacy violation of e-commerce security is:
Your online purchasing history being sold to other merchants without your consent.