E-Commerce Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is the leading mobile retailer in the United States?

Amazon

Encouraging users to click a Like button is an example of which step in the social marketing process?

Amplification

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents

The leading web server software is:

Apache

All of the following statements about Apple Pay are true except which of the following?

Apple Pay is the most popular alternative payment method in the United States

The process of comparing a website with that of its competitors in terms of response speed, quality of layout, and design is known as:

Benchmarking

Face ID is an example of which of the following?

Biometrics

Which of the following is the most important tool in establishing a relationship with the customer?

Company Website

________ is the ability to ensure that messages and data are only available to those authorized to view them

Confidentiality

Which of the following provides web marketers with a very quick means of identifying a customer and understanding his or her behavior at a site?

Cookies

Which of the following involves using a variety of tools to encourage users to interact with content and brand?

Engagement

Which of the following is a leading platform for social e-commerce?

Facebook

Which of the following is not an example of an on-demand service company?

Facebook

In the subscription revenue model, a company primarily generates income from the display of ads

False

The Internet has shown similar growth patterns as other electronic technologies of the past

False

The majority of online shoppers find vendors by clicking on display ads.

False

The term e-commerce refers to the digital enabling of business processes both inside and outside the firm

False

Which of the following is another name for a revenue model?

Financial Model

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network

Firewall

Ad blockers operate in a manner similar to which of the following?

Firewalls

Which of the following is the leading cause of data breaches?

Hackers

During which phase of the development of the Internet was the Domain Name System (DNS) introduced?

Institutional phase

Which of the following attracts a highly educated, professional, managerial audience?

LinkedIn

Which of the following is a physical place you visit in order to transact?

Marketplace

The first web browser to make it possible to view documents on the Web with colored background, images, and animations was:

Mosaic

Which of the following has not been the subject of concern about its increasing market dominance in 2020-2021?

Netflix

Which of the following is the most commonly used server-side scripting language?

PHP

All of the following can be considered a direct or indirect competitor of Amazon except:

Priceline

Confidentiality is sometimes confused with:

Privacy

Which of the following is an automated, auction-based method for matching demand and supply for online display ads?

Programmatic advertising

Which of the following is a set of rules for transferring data?

Protocol

________ represents the total number of users or customers an e-commerce business can obtain.

Reach

Which of the following industries accounted for the highest percentage of spending on online advertising in 2019?

Retail

Which of the following is not a major business trend in e-commerce in 2020-2021?

Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.

Which of the following is a simple but powerful method for describing a firm's strengths and weaknesses?

SWOT analysis

Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers

Social Media

All of the following statements about e-commerce in the United States in 2020 are true except:

Social e-commerce generated more revenue than mobile e-commerce

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

Spyware

________ are the types of information systems capabilities needed to meet business objectives.

System functionalities

Which of the following is the core communications protocol for the Internet?

TCP/IP

All of the following are online communications used to support the evaluation of alternatives stages of the consumer decision process except:

Targeted banner ads

A Trojan horse appears to be benign, but then does something other than expected.

True

Bundling is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices

True

E-commerce has increased price competition in many markets.

True

E-commerce technologies provide a unique, many-to-many model of mass communication

True

HTML defines the structure of a web page.

True

It is likely that e-commerce will eventually impact nearly all commerce.

True

Most computers and mobile devices today have built-in encryption software that users can enable

True

Real markets are imperfect

True

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

True

The term latency refers to a delay that can be experienced in packet-switched networks.

True

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

True

Using prebuilt templates is typically one of the most inexpensive options when building an e-commerce site.

True

Which of the following does not use a subscription revenue model?

Twitter

The address used by a browser to identify the location of content on the Web is called:

Uniform Resource locator

Which of the following involves creating a skeleton version that focuses on functionality rather than design?

Wireframing

All of the following are basic functionality provided by web servers except:

a shopping cart.

Stickiness is an important attribute for which of the following revenue models?

advertising revenue model

Snapchat's Lenses feature is an example of which of the following?

augmented reality

Which element of the business model refers to the presence of substitute products in the market?

competitive environment

All of the following are basic information requirements for a product database except:

customer ID numbers

Which system functionality must your website have to be able to personalize or customize a product for a client?

customer on-site tracking

Which of the following can be considered synonymous with the term e-commerce?

digital commerce

Which of the following best defines e-commerce?

digitally enabled commercial transactions between and among organizations and individuals.

The ________ allows a natural language expression, such as Google.com to represent a numeric IP address.

domain name system

Most of the time required to maintain an e-commerce site is spent on:

general administration and making changes and enhancements to the system

Which of the following are features of both Pinterest and Twitter?

hashtags

In modeling online consumer behavior, the concept of "consumer skills" refers to the:

knowledge consumers have about how to conduct online transactions.

Which of the following are the two main components of a systems design?

logical design and physical design.

A ________ specifically details how you plan to find customers and to sell your product

market strategy

Unfair competitive advantages occur when:

one competitor has an advantage that others cannot purchase

MySQL is which of the following?

open source database software

In general, the key to becoming a successful content provider is to:

own the content being provided.

Which of the following details the actual hardware components to be used in a system?

physical design

Which of the following are Amazon's primary value propositions?

selection and convenience

Which of the following features of e-commerce technology allows users to participate in the creation of online content?

social technology

Above all, e-commerce is a ________ phenomenon

technology driven

Which of the following is the best definition of transaction cost?

the cost of participating in a market

Interactivity in the context of e-commerce provides which of the following functionalities?

the enabling of two-way communication between consumer and merchant

What is the most frequent cause of stolen credit cards and card information today?

the hacking and looting of corporate servers storing credit card information

The existence of many competitors in any one market segment may indicate:

the market is saturated

A perfect market is one in which:

there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production

A roughly equal percentage of men and women in the United States use the Internet today.

true

Brand pages on Facebook typically attract more visitors than a brand's Web site.

true

Influencer marketing is a method of generating customer engagement.

true

Online traffic is partially driven by offline brands and traditional shopping.

true

Research shows the two key factors shaping the decision to purchase online are utility and trust.

true

Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.

true

Pinterest's Lens is an example of which of the following?

visual search

Which of the following is an example of an online privacy violation?

your online purchasing history being sold to other merchants without your consent


संबंधित स्टडी सेट्स

Series 63 Simulated Exam Missed Questions

View Set

ITSY-2400 Chapter 1, ITSY-2400 Chapter 2, ITSY-2400 Chapter 3, ITSY-2400 Chapter 4, ITSY-2400 Chapter 5, ITSY-2400 Chapter 6

View Set

Chapter 5: Security Assessment and Testing

View Set

MGT 370: Chapter 04 Assignment: Managing Ethics and Social Responsibility

View Set

NCLEX Prep: Client Needs: Basic Care & Comfort

View Set

Lesson 18 - Equipment Grounding & Bonding

View Set