INSY 3330: Ch. 5-6, INSY 3330: Ch. 7

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Disney's Playdom

Which children's Web site was fined $3 million in 2011 for collecting and sharing children's personal information without consent of their parents?

hashtags

Which of the following are features of both Pinterest and Twitter?

China

Which of the following countries has been found to have engaged in cyberespionage against Google?

Google

Which of the following dominates mobile advertising?

An unauthorized person intercepts an online communication and changes its contents.

Which of the following is an example of an integrity violation of e-commerce security?

affiliate programs

Which of the following is not a feature that is driving the growth of social marketing and advertising?

The number of smartphone users is still growing faster than the number of tablet users.

Which of the following statements about the use of tablets is not true?

Women are more active purchasers on smartphones than men.

Which of the following statements is not true?

Hadoop

Which of the following would you implement to collect and analyze your company's big data?

NOT game and entertainment apps

Which type of apps account for the most user time?

tweets

Your Facebook News Feed includes all of the following except:

Availibility

________ refers to the ability to ensure that an e-commerce site continues to function as intended.

nonrepudiation

________ refers to the ability to ensure that e-commerce participants do not deny their online actions.

5

A typical response rate for an e-mail campaign would be ________ %.

universal standards

Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?

NOT Ticker MAYBE News Feed

Which of the following is a real-time feed showing a friend's activities, chats, and music listening on Facebook?

CRM system

A ________ is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.

subject's private key

A digital certificate contains all of the following except the:

false

Credit cards are the dominant form of online payment throughout the world.

availibility

Which of the following dimensions of e-commerce security is not provided for by encryption?

NFC

Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?

Authenticity

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

Facebook would be unable to increase advertising revenues enough.

Facebook's share price fell dramatically after its IPO because investors feared that:

3.5 billion

The research firm Cybersource estimated that online credit card fraud in the United States amounted to about ________ in 2012.

90

"Shoppers" constitute approximately ________ % of the online Internet audience.

true

Drive-by downloads are now the most common method of infecting computers.

true

Evidence suggests that real-time customer chat increases sales.

Marketplace Ads

Facebook's display ads are called:

50 million

For a Web site that has 5 million visitors a month, and where on average, a visitor makes 10 page requests per visit, there will be ________ entries in the transaction log each month.

true

Google provides the leading location-based marketing platform.

number of http requests

Hits are a measure of the:

2.3 Billion

In 2013, location-based mobile marketing accounted for how much in marketing expenditures?

$39 billion

In 2013, mobile commerce revenues are approximately:

true

In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.

false

In the United States today, single, white, young college-educated males with high income dominate the Internet in terms of percentage of Internet usage.

credit cards

In the United States, the primary form of online payment is:

Geo-fencing

Miller Coors used which of the following techniques to alert Blue Moon beer fans as to where it could be purchased?

Botnets

Most of the world's spam is delivered via which of the following?

pays only for those users who perform a specific action, such as registering, purchasing, etc.

Purchasing an online ad on a CPA basis means that the advertiser:

false

Research has found that of all the standard formats of display ads, wide skyscraper ads are the most effective at holding a user's attention.

botnet

Rustock is an example of which of the following?

19.5 billion

Search engine advertising and marketing expenditures in 2013 were approximately:

56

The Data Encryption Standard uses a(n) ________-bit key.

customer co-production

The Nike iD program is an example of which of the following marketing techniques?

flash marketing

The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time.

location-based mobile marketing

The newest and fastest growing segment of the digital marketing universe is:

less than 1%

The overall rate of online credit card fraud is ________ % of all online card transactions.

true

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

30-day

View-through rate measures the ________ response rate to an ad.

the hacking and looting of corporate servers storing credit card information

What is the most frequent cause of stolen credit cards and card information today?

Google Analytics

Which analytics tool did Fairmont Hotel use to measure the effectiveness of its online marketing and advertising?

Search engine advertising

Which of the following accounts for the most mobile ad spending?

local marketing

Which of the following is not one of the main elements of a comprehensive multi-channel marketing plan?

browsing

Which of the following is not one of the main stages of the online purchasing process?

By 2015, it is estimated that spending on social marketing will exceed the amount spent on mobile marketing.

Which of the following is not true about mobile marketing?

In 2013, marketers will spend almost twice as much on social marketing as they do on mobile marketing.

Which of the following is not true about social marketing?

company Web site

Which of the following is the most important tool in establishing a relationship with the customer?

lack of trust in the purchase process

Which of the following is the top concern of Internet users about purchasing online?

e-mail

Which of the following online advertising formats attracted the least amount of spending in 2013?

one-third

Approximately ________ of annual offline retail sales is influenced by online browsing.

phishing attacks

Botnets are typically used for all of the following except:

true

Brand pages on Facebook typically attract more visitors than a brand's Web site.

versioning

Creating multiple variations of information goods and selling these to different market segments at different prices is called:

targeted banner ads

All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except:

the data typically stored in cookies includes a unique ID and e-mail address.

All of the following statements about cookies are true except:

NOT mobile marketing MAYBE corporate Web sites

All of the following were popular types of online marketing before 2007 except:

blocking suspicious activity

An intrusion detection system can perform all of the following functions except:

13

Companies are not permitted to collect personal information from children under the age of ________ without parental consent.

true

About 25% of all search engine requests originate from mobile devices.

false

It is possible to opt-out of Facebook's Graph Search.

stored value/debit card

None of the following payment systems offers immediate monetary value except:

confidentiality

The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:

two-factor authentication

Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?

cost to consumers

All of the following are limitations of the existing online credit card payment system except:

false

It is expected that by 2017, mobile commerce will account for 50% of all e-commerce.


संबंधित स्टडी सेट्स

Chp 41 Musculoskeletal Care Modalities P 1103

View Set

NCLEX Study Questions-Health Assessment

View Set

LIFE INSURANCE, POLICY PROVISIONS, OPTIONS AND RIDERS

View Set

Starting Out with Python, 3e Ch 5

View Set

AZ-800: Administering Windows Server Hybrid Core Infrastructure

View Set