insy 3303 quiz 2 & 3 ch 5, 6, 7

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The concept of "customer satisfaction" is broader than the concept of "customer experience." T/F

F

Which social marketing proved the most effective for ExchangeHunterJumper.com?

Facebook

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

Authenticity

Text message generates the majority of mobile marketing spending. T/F

F

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties. True/False

False

Which analytics tool did Fairmont Hotel use to measure the effectiveness of its online marketing and advertising?

Google Analytics

The U.S. federal government has historically not been in favor of the development and export of strong encryption systems. True/False

True

Transaction logs are built into Web server software. True/False

True

Display ads constitute about ________ % of mobile ad spending. a. 33 b. 20 c. 15 d. 66

a. 33

Surveys have found that the least influential online marketing format for driving consumers to purchase is: a. e-mail campaigns. b. social networks. c. display ad campaigns. d. the retailer's Web site.

b. social networks.

Which of the following is the leading display ad site on mobile devices? a. Yahoo b. Google c. Facebook d. Twitter

c. Facebook

Which of the following earns the most location-based marketing revenue? a. Facebook b. Twitter c. Google d. Apple

c. Google

In 2013, what was the approximate Internet penetration rate for individuals that have attained less than a high-school education? a. 75% b. 90% c. 45% d. 60%

d. 60%

Which of the following involves a coupon or other promotional offer that appears in users' Twitter timeline? a. Promoted Account b. Promoted Trend c. Promoted Tweet d. Lead Generation Card

d. Lead Generation Card

Most of the world's spam is delivered via which of the following? a. worms b. Trojan horses c. viruses d. botnets

d. botnets

By 2012, social marketing had overtaken mobile marketing. True/False

false

It is expected that by 2017, mobile commerce will account for 50% of all e-commerce. True/False

false

The ratio of impressions to fans is a measure of:

fan acquisition

All of the following are methods of securing channels of communication except: a. FTP. b. SSL/TLS. c. VPN. d. certificates.

a. FTP.

Which of the following dominates mobile advertising? a. Google b. Apple c. Facebook d. Twitter

a. Google

Which of the following is not a feature that is driving the growth of social marketing and advertising? a. network notification b. social sign-on c. collaborative shopping d. affiliate programs

d. affiliate programs

Which of the following is not an example of an access control? a. login passwords b. digital signatures c. firewalls d. proxy servers

b. digital signatures

Google provides the leading location-based marketing platform. True/False

True

Insiders present a greater security threat to e-commerce sites than outsiders. True/False

True

Which of the following statements about a free pricing strategy is false? a. The free pricing strategy was born in the early days of the Web. b. Free products and services can knock out potential and actual competitors. c. Free products and services can help build market awareness. d. It is difficult to convert free customers into paying customers.

a. The free pricing strategy was born in the early days of the Web.

Which of the following purchased Tumblr in May 2013? a. Yahoo b. Google c. Facebook d. Twitter

a. Yahoo

Which of the following are features of both Pinterest and Twitter? a. hashtags b. tweets c. Image Hover widget d. pins

a. hashtags

Facebook's share price fell dramatically after its IPO because investors feared that: a. privacy concerns were driving users away. b. Facebook would be unable to increase advertising revenues enough. c. Facebook's new marketing solutions would be difficult to monetize. d. new social networks such as Instagram were cannibalizing Facebook's audience.

b. Facebook would be unable to increase advertising revenues enough.

Which of the following do Facebook users spend the most time on? a. Photos b. News Feed c. Profiles d. Graph Search

b. News Feed

Which of the following statements is not true? a. Younger consumers are more likely to research products and prices on mobile devices than older consumers. b. Women are more active purchasers on smartphones than men. c. Men are more likely than women to buy digital content with a mobile device. d. Mobile shoppers and buyers are more affluent than the online population in general.

b. Women are more active purchasers on smartphones than men.

All of the following were popular types of online marketing before 2007 except: a. display ads. b. corporate Web sites. c. mobile marketing. d. e-mail.

b. corporate Web sites.

All of the following are Pinterest marketing tools except: a. Follow button. b. Promoted Accounts. c. Brand pages. d. Retail Pins.

b. promoted accounts

View-through rate measures the ________ response rate to an ad. a. 30-minute b. 24-hour c. 30-day d. 7-day

c. 30-day

Which of the following left the WikiLeaks Web site effectively inoperable in August 2012? a. botnet b. browser parasite c. DDoS attack d. SQL injection attack

c. DDoS attack

Which of the following is not true about social marketing? a. More than 25% of Facebook visits originate from a mobile device. b. By 2015, it is estimated that social marketing spending will be just over $6 billion dollars. c. In 2013, marketers will spend almost twice as much on social marketing as they do on mobile marketing. d. Social marketing is growing at around 30% a year.

c. In 2013, marketers will spend almost twice as much on social marketing as they do on mobile marketing.

________ is an industry-standard database query and manipulation language. a. JSP b. DBMS c. SQL d. PHP

c. SQL

Bitcoins are an example of: a. an EBPP system. b. virtual currency. c. digital cash. d. a stored value payment system.

c. digital cash.

All of the following are factors in contributing to the increase in cybercrime except: a. the Internet is an open, vulnerable design. b. the ability to anonymously access the Internet. c. the Internet's similarity to telephone networks. d. the ability to remotely access the Internet.

c. the Internet's similarity to telephone networks.

Recency refers to the: a. percentage of customers who return to the site within a year to make additional purchases. b. percentage of customers who do not return during the next year after an initial purchase. c. time elapsed since the last action taken by a customer. d. percentage of existing customers who continue to buy on a regular basis.

c. time elapsed since the last action taken by a customer.

Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media? a. Amplify b. Webtrends c. TweetDeck d. Curalate

d. Curalate

Which of the following statements about Graph Search is not true? a. It is a social search engine. b. It is a semantic search engine. c. It includes photos. d. It relies on Google to supplement its search results.

d. It relies on Google to supplement its search results.

SMS to friends, notifying friends of your location, and sharing offers with friends are ways to measure: a. fan acquisition. b. community. c. engagement. d. amplification.

d. amplification.

Purchasing an online ad on a CPA basis means that the advertiser: a. pays a prenegotiated fee for each click an ad receives. b. exchanges something of equal value for the ad space. c. pays for impressions in 1,000 unit lots. d. pays only for those users who perform a specific action, such as registering, purchasing, etc.

d. pays only for those users who perform a specific action, such as registering, purchasing, etc.

Botnets are typically used for all of the following except: a. DDoS attacks. b. stealing information from computers. c. storing network traffic for analysis. d. phishing attacks.

d. phishing attacks

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: a. pupware. b. adware. c. a backdoor. d. spyware.

d. spyware.

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network. a. virtual private network b. PPTP c. firewall d. proxy server

firewall

A Crayola arts-and-crafts column on a parenting Web site is an example of what form of advertising?

sponsorship

Studies of the effects of social "connectedness" on Internet purchases indicate that the more "connected" an individual:

the less that individual is influenced by friends' purchases.

How can a smartphone's gyroscope and accelerometer be used in product marketing?

to enhance user interaction with mobile multimedia

Research shows that the two most important factors shaping the decision to purchase online are utility and trust. True/False

true


संबंधित स्टडी सेट्स

MOC EXAM Questions for Child Neurology From Practice Test 1

View Set

Nursing Care of the Adult with Common Health Problems. EXAM 1- chapter 1 & 2

View Set

Florida statutes, rules, and regulations (all lines)

View Set

MICROECON: CHAPTER 12 "LABOR MARKET"

View Set

Organizational Motivation and Leadership Final Exam

View Set