E-Commerce Final
Which of the following is the leading mobile retailer in the United States?
Amazon
Encouraging users to click a Like button is an example of which step in the social marketing process?
Amplification
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents
The leading web server software is:
Apache
All of the following statements about Apple Pay are true except which of the following?
Apple Pay is the most popular alternative payment method in the United States
The process of comparing a website with that of its competitors in terms of response speed, quality of layout, and design is known as:
Benchmarking
Face ID is an example of which of the following?
Biometrics
Which of the following is the most important tool in establishing a relationship with the customer?
Company Website
________ is the ability to ensure that messages and data are only available to those authorized to view them
Confidentiality
Which of the following provides web marketers with a very quick means of identifying a customer and understanding his or her behavior at a site?
Cookies
Which of the following involves using a variety of tools to encourage users to interact with content and brand?
Engagement
Which of the following is a leading platform for social e-commerce?
Which of the following is not an example of an on-demand service company?
In the subscription revenue model, a company primarily generates income from the display of ads
False
The Internet has shown similar growth patterns as other electronic technologies of the past
False
The majority of online shoppers find vendors by clicking on display ads.
False
The term e-commerce refers to the digital enabling of business processes both inside and outside the firm
False
Which of the following is another name for a revenue model?
Financial Model
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network
Firewall
Ad blockers operate in a manner similar to which of the following?
Firewalls
Which of the following is the leading cause of data breaches?
Hackers
During which phase of the development of the Internet was the Domain Name System (DNS) introduced?
Institutional phase
Which of the following attracts a highly educated, professional, managerial audience?
Which of the following is a physical place you visit in order to transact?
Marketplace
The first web browser to make it possible to view documents on the Web with colored background, images, and animations was:
Mosaic
Which of the following has not been the subject of concern about its increasing market dominance in 2020-2021?
Netflix
Which of the following is the most commonly used server-side scripting language?
PHP
All of the following can be considered a direct or indirect competitor of Amazon except:
Priceline
Confidentiality is sometimes confused with:
Privacy
Which of the following is an automated, auction-based method for matching demand and supply for online display ads?
Programmatic advertising
Which of the following is a set of rules for transferring data?
Protocol
________ represents the total number of users or customers an e-commerce business can obtain.
Reach
Which of the following industries accounted for the highest percentage of spending on online advertising in 2019?
Retail
Which of the following is not a major business trend in e-commerce in 2020-2021?
Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.
Which of the following is a simple but powerful method for describing a firm's strengths and weaknesses?
SWOT analysis
Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers
Social Media
All of the following statements about e-commerce in the United States in 2020 are true except:
Social e-commerce generated more revenue than mobile e-commerce
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
Spyware
________ are the types of information systems capabilities needed to meet business objectives.
System functionalities
Which of the following is the core communications protocol for the Internet?
TCP/IP
All of the following are online communications used to support the evaluation of alternatives stages of the consumer decision process except:
Targeted banner ads
A Trojan horse appears to be benign, but then does something other than expected.
True
Bundling is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices
True
E-commerce has increased price competition in many markets.
True
E-commerce technologies provide a unique, many-to-many model of mass communication
True
HTML defines the structure of a web page.
True
It is likely that e-commerce will eventually impact nearly all commerce.
True
Most computers and mobile devices today have built-in encryption software that users can enable
True
Real markets are imperfect
True
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
True
The term latency refers to a delay that can be experienced in packet-switched networks.
True
Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.
True
Using prebuilt templates is typically one of the most inexpensive options when building an e-commerce site.
True
Which of the following does not use a subscription revenue model?
The address used by a browser to identify the location of content on the Web is called:
Uniform Resource locator
Which of the following involves creating a skeleton version that focuses on functionality rather than design?
Wireframing
All of the following are basic functionality provided by web servers except:
a shopping cart.
Stickiness is an important attribute for which of the following revenue models?
advertising revenue model
Snapchat's Lenses feature is an example of which of the following?
augmented reality
Which element of the business model refers to the presence of substitute products in the market?
competitive environment
All of the following are basic information requirements for a product database except:
customer ID numbers
Which system functionality must your website have to be able to personalize or customize a product for a client?
customer on-site tracking
Which of the following can be considered synonymous with the term e-commerce?
digital commerce
Which of the following best defines e-commerce?
digitally enabled commercial transactions between and among organizations and individuals.
The ________ allows a natural language expression, such as Google.com to represent a numeric IP address.
domain name system
Most of the time required to maintain an e-commerce site is spent on:
general administration and making changes and enhancements to the system
Which of the following are features of both Pinterest and Twitter?
hashtags
In modeling online consumer behavior, the concept of "consumer skills" refers to the:
knowledge consumers have about how to conduct online transactions.
Which of the following are the two main components of a systems design?
logical design and physical design.
A ________ specifically details how you plan to find customers and to sell your product
market strategy
Unfair competitive advantages occur when:
one competitor has an advantage that others cannot purchase
MySQL is which of the following?
open source database software
In general, the key to becoming a successful content provider is to:
own the content being provided.
Which of the following details the actual hardware components to be used in a system?
physical design
Which of the following are Amazon's primary value propositions?
selection and convenience
Which of the following features of e-commerce technology allows users to participate in the creation of online content?
social technology
Above all, e-commerce is a ________ phenomenon
technology driven
Which of the following is the best definition of transaction cost?
the cost of participating in a market
Interactivity in the context of e-commerce provides which of the following functionalities?
the enabling of two-way communication between consumer and merchant
What is the most frequent cause of stolen credit cards and card information today?
the hacking and looting of corporate servers storing credit card information
The existence of many competitors in any one market segment may indicate:
the market is saturated
A perfect market is one in which:
there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production
A roughly equal percentage of men and women in the United States use the Internet today.
true
Brand pages on Facebook typically attract more visitors than a brand's Web site.
true
Influencer marketing is a method of generating customer engagement.
true
Online traffic is partially driven by offline brands and traditional shopping.
true
Research shows the two key factors shaping the decision to purchase online are utility and trust.
true
Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.
true
Pinterest's Lens is an example of which of the following?
visual search
Which of the following is an example of an online privacy violation?
your online purchasing history being sold to other merchants without your consent