Ecommerce exam 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

percentage of visitors who become customers

Conversion rate is measure of the:

versioning

Creating multiple variations of information goods and selling these to different market segments at different prices is called.

Keylogger

Critics have pointed out the Chrome web browser suggest button which suggests queries based on searched terms entered by the user is in fact a type of

88

*Shoppers* constitute approximately ____ percent of the online internet audience.

sponsorship

A Crayola arts-and-craft column on a parenting Web site is an example of what form of advertising?

a tiny graphics file embedded in an email or Web page.

A Web beacon is:

firewall

A ____ is hardware or software that acts as a filter to prevent unwanted packets from entering a network

CRM system

A _____ is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.

subject private key

A digital certificate contains all of the following except the:

direct reference group

A person's profession or occupation is part of their:

$5

A typical banner ad might cost ____ per 1,0000 impressions.

5

A typical response rate for an email campaign would be ____ percent

psychological

A(n) ____ profile describes an individual's set of needs, drives, motivations, perception, and learned behaviors.

envelope

If you used a symmetric key encryption for large documents, with public key encryption to encrypt and send the symmetric key, you would be using a digital envelope

unique visitors

If you want to determine the size of your Web site's audience, the metric you will use for the most accounts measure will be:

number of time and ad is served

Impressions are a measure of the:

60 percent

In 2012, what was the approximate internet penetration rate for individuals that have attained less than a high school education?

network keyword

In ____ advertising, companies pay for ads to be placed dynamically on any participating Web site that the search engine determines is appropriate.

knowledge consumer have about how to conduct online transactions

In modeling online consumer behavior, consumer skills refers to the:

True

Interest-based advertising is another name for behavioral targeting.

$5 to $10

Legitimate email addresses based on a high-quality commercial opt in email list might cost ____ per thousand.

virtual currency

Linden Dollars, created for use in Second Life, are an example of:

drive-by download

Malware that comes with a downloaded file that a user requests is called a:

botnets

Most of the world's spam is delivered through which of the following:

True

Net neutrality refers to internet backbone owners reading all internet traffic equally

first mover

Netflix entered the market with a(n) ____ strategy.

Trojan horse/ worm

Netsky. P, which spreads by sending e-mails from an infected computer to all of the e-mail addresses found on that Infected computer, is an example of:

stored value/ debit card

None of the following payment systems offers immediate monetary value except:

82

On a typical day, approximately ____ percent of adult users in the United States logs on to the Internet.

checking the weather

On average, which of the following activities was most frequently engaged in by Internet users in 2012?

stored value payment system

P2P payment systems are a variation of what type of payment system?

is a component of email marketing

Permission marketing

social network advertising

Promoted Trends is an example of which of the following types of online advertising?

dual home systems

Proxy servers are also known as:

pays only for those users who do perform a specific action, such as registering, purchasing, etc.

Purchaisng an online ad n a CPA basis mean that the advertiser

time elapsed since the last action taken by a cusotmer.

Recency refers to the:

Cyber piracy

Registering a domain name some are identical to trademarks of others to divert web traffic to their own sites is an example of

Typo squatting

Registering the domain name google.com with the internet to divert web traffic from people misspelling google.com is an example of

In an "F" shaped pattern with a greater attention to the left side of the page.

Research studies have shown that viewers scan search engine result pages.

$1.7 million

Search engine advertising expenditure in 2012 were approximately:

True

Sending email marketing messages is typically less costly than sending Direct Mail marketing messages

Margins were low

Small ticket item sales outnumbered large ticket item sales during the early days of e-commerce for all of the following reasons except:

Very persuasive messages might reduce the need of multiple independent sources of information

Social consequence of the richness of internet formation is

spyware

Software that is used to obbtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

the less that individuals is influenced by friend's; purchases

Studies of the effects of social "connectedness" on Internet purchases indicate that the more "connected" an individual:

secret key encryption

Symmetric key encryption is also known as

True

T or F the optic model for informed consent requires an affirmative action by the consumer before a company can collect and use information

True

T or F: A Trojan Horse appears to be benign but then does something other than expected.

True

T or F: A majority of states in the United State have laws regulating or prohibiting spam.

True

T or F: A worm that does not need to be activated by a user in order for it to replicate itself.

True

T or F: Bundline is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices

True

T or F: Cookies, when combined with Web beacons, can be used to create cross-site profiles.

False

T or F: Credit cards are the dominant form of online payment throughout the world.

False

T or F: Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.

False

T or F: Display ads produced the highest click-through rates.

True

T or F: Drive-by downloads are now the most common method of infecting computers.

True

T or F: Ecommerce is a major conduct and generator of offline commerce.

True

T or F: Evidence suggests that real-time customer chat increases sales

True

T or F: Google defends its Library project on the grounds of

True

T or F: Households with income of below $75,000 are obtaining Internet access at faster rates than households with incomes above that level

False

T or F: In 2012, mobile marketing grew nearly the same rate as traditional online marketing.

False

T or F: In general, the costs for offline customer acquisition are lower than online, but more effective.

True

T or F: In order to accept payments by credit card, online merchants typically must have a merchant account with a bank or financial institution.

False

T or F: In the United States today, single, white, young college educated males with high income dominate the Internet of internet usage.

True

T or F: Insiders present a greater security threat to ecommerce sites than outsiders

True

T or F: Online advertising methods include sponsorship, email marketing, and referrals.

False

T or F: Online banking is more popular with men than with women.

False

T or F: Online video advertising now accounts for the largest amount of the Internet advertising spending.

True

T or F: Paypal requires the recipient of a payment to have a PayPal account to receive funds

False

T or F: Phishing attacks rely on browser parasites.

True

T or F: Price is the top factor in online purchase decisions

True

T or F: Research indicates that social network influences may not extend to distant friends

True

T or F: Research shows that the two most important factors shaping the decision to purchase online are utility and trust.

True

T or F: Search engines marketing saves consumers cognitive energy and reduces research cost

True

T or F: Smishing attacks exploit SMS messages

False

T or F: TLS does not guarantee server-side authentication

True

T or F: The United States federal government has historically not been in favor of the development and export of strong encryption systems.

False

T or F: The amount spent on online advertising in 2012 accounts for approximately 10% of the total amount spent on all advertising

True

T or F: The easiset and least expensive way to prevent threats to system integrity is to install anti-virus software

True

T or F: The marginal cost of production of information goods distributed over the Internet is zero or near zero

False

T or F: The sole purpose of marketing communications is sales.

True

T or F: The use of the digital signature helots tto ensure uintegriity , authenticitym and nonrepudiation.

True

T or F: Transaction logs are built into Web server software

True

T or F: Typically, the more security measures added to a Web site, the slower and more difficult it becomes to use.

False

T or F: Versioning involves selling the same products at different prices

True

T or F: spending on social advertising is less than 10% of spending on all online advertising

False

T or F: students have shown that the most successful marketing campaigns concentrate efforts along a single marketing channel

False

T or False: The four generic market entry strategies are first mover, fast follower, and pure play.

7% - 8%

THe typical dwell rate for rich media and video ads is:

True

TRL the children's online privacy protection act Coppa prohibits the websites from collecting information on children under the age of 13

45

The Computer Security Institute reported in its 2011 survey that approximately ____ percent of responding organizations experience a computer security incident within the previous 12 months.

Microsoft operating systems

The Conficker worm targeted:

56

The Data Encryption Standard uses a(n) _____ -bit key.

True

The European data protection directive prevents the transfer of pii to organizations are countries that do not have similar privacy protection policies

customer cooperation

The Nike ID program is an example of which of the following marketing merchant techniques?

$37.3 billion

The amount spent on online advertising in 2012 was approximately:

culture

The broadest factor in consumer behavior is:

less intensely involved with the Internet than

The dial-up audience us ____ the broadband audience.

Framing

The display of a third party's website or page within your own website is called

True

The fdic's Privacy approach is now focused on targeting practices that are likely to cause harm or unwanted intrusion into consumers daily life

marginal cost

The incremental cost of building the next unit of a good is called the:

flash marketing

The marketing techniques known as ____ involves merchants offering products or services for a very low price for a short periods of time.

Exclusive sponsor arrangement

The most expensive form of online advertising on a per thousand views basis is a

less than 1

The overall rate of online credit card fraud is _____ percent of all online card transactions

70

The percentage of all email that is spam was approximately ____ percent in 2012.

False

The principle of responsibility means that individuals organizations why you should be held accountable to other for the consequences of their actions

It allows video, audio, and text to be integrated into a single marketing message and consuming experience

The richness made possible by ecommerce technologies does which of the following?

Legal in the United States but illegal in Europe

The sharing of users stored cookie information between web sites and without the user's knowledge is

confidentiality

The six key dimensions to e-commerce security are nonrepudiation authenticity, availability, integrity, privacy, and:

728 x 90 pixels

The size of a leader board is:

False

The unlawful internet gambling Enforcement Act has eliminated all online gambling in the United States

an authorization management system

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents , you would use:

subculture

Toyota's use of the Internet to the larger Hispanic customers is an example of targeting a specific:

False

Trf Deep packet inspection uses software installed on client computers to collect and analyze detailed information on page content viewed by users

True

Trf colon the growth rate of search engine advertising is slowing compared to other formats

False

Trf copyright protection protects against others come copying the underlying ideas in a work

True

Trf ethical principle of universalism states that if an action is not right for all situations then it is not right for any situation

True

Trf it is not necessary it legal to use someone else's trademark in meta tag

True

Trf liability is a feature of political systems in which a body of laws in place that permits individuals to recover Damage Done to them but other actions systems or organizations

False

Trf most adult social network participants do not have any expectation of personal privacy when using a social network

False

Trf the 2003 can - spam act required at the Federal Trade Commission established do not email registry

True

Trf the children's internet protection act cipa requires schools and libraries in the United States to install technology protection measures in an effort to Shield children from pornography

.03%-.30%

Typical click-through rates for an onlien display ad are:

30- day

View through rate measures the ____ response rate to an ad.

brand extender

Walmart used which of the following market entry strategies

Requires firms to have a consumer affirmatively opt-in before pii is collected

What is the FTC recommendation regarding Choice as it relates to personal identifiable information pii?

Perform a risk assessment

What is the first step in developing an ecommerce security plan?

Perform a security audit

What is the last step in developing an e-commerce security plan?

the hacking and looting of corporate servers storing credit card information

What is the most frequent cause of stolen credit card and card information today?

universal standards

Which if the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users>

The free pricing strategy was born in the early days of the Web

Which if the following statements about a free pricing strategic is false?

using email

Which of the following activities is the one engaged in by the highest percentage of online users?

Barnesandnoble.com the Best place to buy textbooks

Which of the following advertising messages is a branding communication?

65+

Which of the following age groups had the lowest percentage of Internet access in 2012?

18-29

Which of the following age groups has the l highest percentage of Internet access?

Black, non-Hispanice

Which of the following demographic groups had the greatest increase in Internet access between 2002 and 2012?

integrity and authenticity

Which of the following dimension(s) of security is spoofing a threat to

availability

Which of the following dimensions of ecommerce security is not provided for by encryption?

over 50 percent of Netflix's 100,000 titles are rented at lease once a day by someone

Which of the following examples illustrates the"long Tall" phenomenon?

informational density

Which of the following features of ecommerce technology allows fine-grained, highly detailed information on consumers real-time behavior to be gathered and analyzed?

Video

Which of the following forms of online advertising is growing the fastest?

Search engine keywords purchase

Which of the following forms of online advertising typically has the highest click-through rate?

Facebook

Which of the following generated the most social advertising revenues in 2012?

Anonymous

Which of the following is a prominent hacktivist group?

NFC

Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?

social class

Which of the following is an example of an indirect reference group?

An unauthorized person intercepts an online communication and changes its contents

Which of the following is an example of integrity violation of ecommerce today?

Search engine ads

Which of the following is an example of pull advertising?

personal intelligent agents

Which of the following is not a feature that is driving social ecommerce growth?

the credit card companies

Which of the following is not a key point of vulnerability when dealing with ecommerce?

Promoted Shopping

Which of the following is not a kind of Twitter marketing product?

Redundant navigation

Which of the following is not a major web design features that impact online purchasing?

Social search

Which of the following is not a practice that degrades the results and usefulness of search engines?

app marketing

Which of the following is not a social marketing technique

drive-by dowload

Which of the following is not an example of a PUP?

digital signature

Which of the following is not an example of an access control?

Online cost forces benefits are well-established and understood

Which of the following is not one of the advantages of online advertising?

Spending on search engine advertising is overtaken by video ad

Which of the following is not one of the current trends in Internet advertising?

Nielsen ratings

Which of the following is not one of the four main methods advertisers use to behaviourally Target ads?

local marketing

Which of the following is not one of the main elements of a comprehensive multi- channel marketing plan?

Search engine advertising is the fastest growing type of online advertising

Which of the following is not true about search engine advertising?

Computer fraud and Abuse Act

Which of the following is the primary federal statue used to combat computer crime?

inability to see and touch before buying.

Which of the following is the top concern of internet users about purchasing online?

Stickiness

Which of the following measures the average length of stay at a website?

Checkout conversion rate

Which of the following measures the ratio of actual orders to check out started

Browse to buy ratio

Which of the following measures the ratio of items purchased to product views?

Email

Which of the following online advertising format attracted the least amount of spending in 2012?

Video ads

Which of the following online advertising format is the most effective?

The internet has decreased the impact of brands

Which of the following statements about the internet's impact on marketing is not true ?

Wide skyscraper

Which of the following types of display ads is 160 x 600 pixels?

behavioral

Which of the following types of online marketing segmentation and targeting involves tracking the action users take on a Web site?

denigraohic

Which of the following types of online marketing segmentation and targeting involves using age, ethnic, religion, etc.?

search

Which of the following types of online marketing segmentation and targeting involves using consumers explicitly expressed interest to segment and target?

SQL

____ is an industry-standard database query and manipulation language.

confidentiality

____ refers to the ability to ensure that messages and data are only available to those authorized to view them

nonrepudiation

_____ refers to the ability that the ecommerce participates do not deny their online actions

authenticity

_____ refers to the ability the person or entity with whom you are dealing on the Internet.

availability

_____ refers to the ability to ensure that an ecommerce site continues to function as inteneded

95 years

How long does copyright protection extend to corporate owned works?

malware infection

According to the Computer Security Institute 2011's Computer Crime and Security Survey, which of the following was the most commonly reported type of attack?

design look

According to the Fogg et al. 2003 study, which of the following is the most important factor in the credibility of a Web site?

percentage of visitors who indicate an interest in a site's products by registering or visiting a product;s pages.

Acquisition rate is a measure of the:

use of mass media

All of the following are attributes of personalized marketing except:

Family member identities

All of the following are data elements that are often gathered by eCommerce sites except

sniffers

All of the following are example of malicious code except:

credit cards

All of the following are examples of stored value payment systems except:

the internet's similarity to telephone networks

All of the following are factors in contributing to the increase in cybercrime except:

Availability of the work on the web

All of the following are factors that will be considered in determining whether use of copyrighted material is fair use except the

it provides float

All of the following are features of cash except:

yield management

All of the following are fixed price strategies except:

the number of advertisements viewed

All of the following are important clickstream behavior factors except:

cost to consumers

All of the following are limitations of the existing online credit card payment system except:

FTP

All of the following are method of securing channels of communication except:

targeted banner ads

All of the following are online communications that are used to support the evaluation of alternative stage of the consumer decision

targeted banner ads

All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except:

ISPs

All of the following are stakeholders in payment systems except:

social marketing

All of the following are traditional online marketing tools except:

Having a dot-com domain is no longer considered preferable, especially in the United States.

All of the following are true statements about the choice of a domain except:

packet filters

All of the following are used for authentication except:

Interstitials typically last 30 seconds

All of the following statement about interstitials are true except:

CAN_SPAM prohibits unsolicited email (spam)

All of the following statements about CAN-SPAM are true except:

The dmca makes Intranet service providers isps responsible and accountable for hosting websites or providing services to in French regardless of whether the ISP is aware of infringement

All of the following statements about Digital Millennium Copyright Act dmca are true except

PKI guarantee that the verifying computer of the merchant is secure

All of the following statements about PKI are true except:

The data typically stored in cookies includes a unique ID and email address

All of the following statements about cookies are true except:

Debit cards enable consumers to make purchases even if they do not have sufficient funds at the time of the purchase.

All of the following statements about debit cards are true except:

It is more difficult to obtain a copyright than it is to obtain a patent

All of the following statements about patents are true except

Public key encryption ensures authentication of the sender

All of the following statements about public key encryption are true except:

Symmetric key encryption is computationally slower

All of the following statements about symmetric key encryption are true except:

Relative dispersion of process for online goods have decreased.

All of the following statements are true except:

Melissa worm spreads through Microsoft Word spreads

All of the following were computer crimes committed in 2011- 2012 except:

Up to 10 years imprisonment for a first offense

All the following are possible penalties for violating the Digital Millennium Copyright Act except

One-click purchasing

Amazon has a patent on

Web site functionality

Amazon's "one click" purchase capability is an example of using ____ to enhance sales.

your online purchasing history being sold to other merchants without your consent

An example of a privacy violation of e-commerce security is:

1.2 trillion

Approximately _____ in annual offline retail sales is influenced by online browsing.

viral marketing

Axe's posting of video ads online that were subsequently forwarded and shared by millions of internet users is an example of:

phishing attacks

Botnets are typically used for all of the following except:

$10

CAN- SPAM imposes fines of ____ for each unsolicited pornographic email.

percentage of times an ad is clicked

CTR is a measure of the:

number of http request

Hits are a measure of the:

recipient who have expressed an interest in receiving messages from the advertiser:

Direct email marketing refers to marketing emails sent to:

Infringement

Disputes over Federal trademarks involves establishing

Simplified choice

Do not track falls under which of the following principles in the FTC new privacy framework?

Copyright law

Downloading music tracks on bike record companies without paying for them

50 million

For a Web site that has 5 million visitors a month, and where on average, a visitor makes 10 page requests per visit, there will be entries in the transaction log for each month.

content quality

Frequency of Web sites use is a function of four independent variables : Web site organization, perceived ease of use, perceived usefulness of the Web sites, and:

Privacy

Google Gmail advertising has raised concerns about which of the following issues?


संबंधित स्टडी सेट्स

Chapter 14 What's the Significance

View Set

MICRO-CHAPTER 6 SMARTBOOK QUESTIONS

View Set

Data Analysis: Terms/HW/Practice (Exam 2)

View Set

Fundamentals of Corporate Finance final

View Set