INSY 3330 Quizzes 1-5
By 2017, mobile commerce revenues are expected to be approximately:
$109 Billion
Search engine advertising and marketing expenditures in 2013 were approximately:
$19.5 Billion
In 2013, location-based mobile marketing accounted for how much in marketing expenditures?
$2.3 Billion
The research firm Cybersource estimated that online credit card fraud in the United States amounted to about ________ in 2012.
$3.5 Billion
In 2013, mobile commerce revenues are approximately:
$39 Billion
In 2017, the overall retail market in the United States was estimated to be about:
$5 Trillion
It is estimated that by 2021, the size of the B2B market will reach:
$7.6 Trillion
Companies are not permitted to collect personal information from children under the age of ________ without parental consent.
13
In 2017, almost ________ of Americans only used a mobile device to access the Internet.
15%
In which year can e-commerce be said to have begun?
1995
Online bill payments are believed to cost ________ to process compared to ________ for paper bills.
20 to 30 cents, $3 to $7.
In the United States, about ________ of Internet traffic now occurs over IPv6.
25%
View-through rate measures the ________ response rate to an ad.
30 day
The Data Encryption Standard uses a(n) ________-bit key.
56
"Shoppers" constitute approximately ________ % of the online Internet audience.
90
How long does copyright protection extend for corporate-owned works?
95 Years
What percentage of smartphone users have used their phones for proximity searches on information like local weather?
95%
Which of the following situations would not qualify for the fair use exception to U.S. copyright law?
A student copies a photograph oh his favorite band from a web site created by the band's record label and places it on the students personal web site.
The early years of e-commerce are considered:
A stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year.
A Web beacon is:
A tiny graphics file embedded in an e-mail or Web page.
Which of the following is a server-side technique that detects the attributes of the device making the request, and using predefined templates, loads a version of a site optimized for the device?
AWD
Which of the following statements about Pinterest is not true?
About 30% of online adults use Pinterest.
All of the following are methods of improving the processing architecture of a website except:
Adding web servers.
Facebook's marketing success on both desktop and mobile platforms is based on:
Ads inserted into users' News Feeds.
Which of the following is a community of members who self-identify with a demographic or geographic category?
Affinity community
Which of the following is an example of an on-demand service company?
AirBNB
All of the following use a social network marketing strategy except:
Amazon
Which of the following is an example of e-business?
Amazons Inventory Control System
Encouraging users to click a Like button is an example of which step in the social marketing process?
Amplification
SMS to friends, notifying friends of your location, and sharing offers with friends are ways to measure:
Amplification
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
A wealthy individual who invests personal funds in a start-up in exchange for an equity share in the business is referred to as a(n):
Angel Investor
Which of the following is a prominent hacktivist group?
Anonymous
Which of the following technologies allows you to send e-mail without a trace?
Anonymous re-mailers
Which of the following is not one of the three defining characteristics of a portal?
Auctions
Snapchat's Lenses feature is an example of which of the following?
Augmented reality
Which of the following dimensions of e-commerce security is not provided for by encryption?
Availability
Which of the following statements about CAN-SPAM is not true?
CAN-SPAM Prohibits unsolicited e-mail (spam).
________ provides a set of standards for communicating between a browser and a program running on a server that allows for interaction between the user and server.
CGI
Which of the following countries has been found to have engaged in cyberespionage against Google?
China
Which of the following is a core Fair Information Practices (FIP) principle?
Choice/Consent
Advantages of dynamic page generation include all of the following except:
Client-side execution of programming.
The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:
Confidentiality
All of the following are limitations of the existing online credit card payment system except:
Cost to consumers
Which of the following is an example of C2C e-commerce?
Craigslist
In the United States, the primary form of online payment is:
Credit cards
Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?
Curalate
The Nike iD program is an example of which of the following marketing techniques?
Customer co-production
Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:
Cybersquatting
All of the following are benefits of auctions except:
Decrease price transparency
Which of the following is not one of the four stages of e-commerce governance?
Deregulation
Which of the following statements is not true?
Desktop search revenues are increasing for Google.
What are the two most important management challenges in building a successful e-commerce presence?
Developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives.
Which of the following can be considered synonymous with the term e-commerce?
Digital Commerce
Bitcoins are an example of:
Digital cash
Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers?
Disintermediation
Which of the following uses a subscription-based sales revenue model?
Dollar Shave Club
Which of the following types of auctions offers a neutral marketplace, without buyer or seller bias?
Double auction
Malware that comes with a downloaded file that a user requests is called a:
Drive-by download
Which of the following is not an example of a PUP?
Drive-by download
Which of the following is an example of a CMS?
Drupal
Which of the following basic ethical concepts plays an important role in defining privacy?
Due process
Amazon Business is an example of which of the following business models?
E-Distributor
Which of the following statements is not true?
Economists take a purely technical approach to e-commerce.
Which children's Web site was fined $3 million in 2011 for collecting and sharing children's personal information without consent of their parents?
Emily's Dress Up
All of the following types of auctions have a buyer bias except:
English auction
All of the following are methods of securing channels of communication except:
FTP
Which of the following is not one of the basic technological foundations of the Internet?
FTP
Which of the following is the leading display ad site on mobile devices?
Which social marketing proved the most effective for ExchangeHunterJumper.com?
Which of the following statements is not true?
Facebook Home is Facebook's app for iOS devices.
All of the following marketing tools on Facebook require payment except:
Facebook Offers
Amazon Web Services is an example of a private cloud.
False
An HTML5 app is one designed to specifically operate using a mobile device's hardware and operating system.
False
Auction prices are always lower than prices in fixed priced markets.
False
By 2012, social marketing had overtaken mobile marketing.
False
Credit cards are the dominant form of online payment throughout the world.
False
In C2C auctions, a business owns or controls assets and uses dynamic pricing to establish the price.
False
It is possible to opt-out of Facebook's Graph Search.
False
Mobile users spend most of their time browsing mobile Web sites.
False
Most adult social network participants do not have any expectation of personal privacy when using a social network.
False
Online shoppers tend to browse for available products rather than search for specific products they have determined in advance.
False
Research has found that of all the standard formats of display ads, wide skyscraper ads are the most effective at holding a user's attention.
False
Social technologies change industry structure by weakening powerful sales channels and shifts bargaining power to consumers.
False
Storing HTML pages in RAM rather than on a server's hard drive is an expensive way to fine-tune the processing architecture of a website.
False
TLS does not guarantee server-side authentication.
False
Text message generates the majority of mobile marketing spending.
False
The Internet has shown similar growth patterns as other electronic technologies of the past.
False
The concept of "customer satisfaction" is broader than the concept of "customer experience."
False
The term e-commerce refers to the digital enabling of business processes both inside and outside the firm.
False
All of the following are data elements that are often gathered by e-commerce sites except:
Family member identities
Which of the following is the first step in the social marketing process?
Fan acquisition
The display of a third-party's Web site or page within your own Web site is called:
Farming
All of the following were visions of e-commerce expressed during the early years of e-commerce except:
Fast Follower Advantage
Which of the following is not a mobile messaging application?
Feedly
Which of the following is not a primary activity in a firm value chain?
Finance/Accounting
The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.
Internet Society (ISOC)
A Web site designed to give parents of home-schooled children a common discussion area would be classified as a(n):
Internet-based social network
The richness made possible by e-commerce technologies does which of the following?
It allows video, audio, and text to be integrated into a single marketing message and consuming experience.
Which of the following is not a characteristic of a perfect competitive market?
It is highly regulated
All of the following statements about patents are true except:
It is more difficult to obtain a copyright that it is to obtain a patent.
Which of the following statements about Graph Search is not true?
It relies on Google to supplement its search results.
Critics have pointed out that the Chrome browser's Suggest button, which suggests queries based on search terms entered by the user, is in fact, a type of:
Key logger
In modeling online consumer behavior, the concept of "consumer skills" refers to the:
Knowledge consumers have about how to conduct online transactions.
Which of the following is the top concern of Internet users about purchasing online?
Lack of trust in the purchase process
Which of the following refers to delays in messages caused by the uneven flow of information packets through the network?
Latency
Which of the following involves a coupon or other promotional offer that appears in users' Twitter timeline?
Lead Generation Card
The sharing of a user's stored cookie information between Web sites and without the user's knowledge is:
Legal in the USA but illegal in Europe.
Which of the following is not one of the main elements of a comprehensive multi-channel marketing plan?
Local marketing
Which of the following is not one of the top factors a business should consider when planning an Internet auction?
Location of auction
The newest and fastest growing segment of the digital marketing universe is:
Location-based mobile marketing
In the ________ business model, a web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products, and establish prices.
Market creator
The layer of Internet architecture that ties the applications to the communications network and includes security and authentication services is called the:
Middleware Services layer
Beginning the e-commerce development process with a mobile presence rather than a desktop website is referred to as which of the following?
Mobile first design
Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?
NFC
All of the following are situations in which markets fail to produce socially desirable outcomes except:
Network effects
Which of the following is a real-time feed showing a friend's activities, chats, and music listening on Facebook?
News feed
Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?
No Free Lunch
Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?
Notice/Awareness
Impressions are a measure of the:
Number of times an ad is served.
Unfair competitive advantages occur when:
One competitor has an advantage others cannot purchase.
Amazon has a patent on:
One-click purchasing.
Approximately ________ of annual offline retail sales is influenced by online browsing.
One-third
MySQL is which of the following?
Open source database software
Which of the following statements is not true?
Overall transaction costs have dropped dramatically.
________ is collected data that can be used to identify and locate an individual.
PII
All of the following are used for authentication except:
Packet filters
Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?
Patent law
Purchasing an online ad on a CPA basis means that the advertiser:
Pays only for those users who perform a specific action, such as registering, purchasing, etc.
Conversion rate is a measure of the:
Percentage of visitors who become customers.
Acquisition rate is a measure of the:
Percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.
What is the first step in developing an e-commerce security plan?
Perform a risk assessment
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
Spyware
Which case was instrumental in paving the way for Internet business methods patents?
State Street Bank & Trust Co. v. Signature Financial Group, Inc.
None of the following payment systems offers immediate monetary value except:
Stored value/Debit cards
A ________ refers to a competitive strategy in which firms attempt to achieve lower business process costs.
Strategy of cost competition
A digital certificate contains all of the following except the:
Subject's private key
All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except:
Targeted banner ads
Which of the following is not one of the issues complicating the taxation of e-commerce sales?
Taxes raised are used for different government purposes.
Above all, e-commerce is a ________ phenomenon.
Technology driven
________ was the first truly large-scale digitally enabled transaction system in the B2C arena.
The French Minitel
Which of the following statements about industry self-regulation regarding privacy is not true?
The NAI's privacy policies have established a TRUSTe seal.
Which ethical principle tells you that it is wise to assume perfect information markets?
The New York Times Test
Which of the following statements about the Web is not true?
The Web is the technology upon which the Internet is based.
Which of the following is not a key point of vulnerability when dealing with e-commerce?
The credit card companies
Which of the following statements about a free pricing strategy is false?
The free pricing strategy was born in the early days of the Web.
What is the most frequent cause of stolen credit cards and card information today?
The hacking and looting of corporate servers storing credit card information
Studies of the effects of social "connectedness" on Internet purchases indicate that the more "connected" an individual:
The less that individual is influenced by friends' purchases.
Which of the following statements about the use of tablets is not true?
The number of smartphone users is still growing faster than the number of tablet users.
Which of the following statements about the mobile platform is not true?
The size of the mobile app audience greatly exceeds that of the mobile web audience.
First movers often fail because:
They lack complementary resources needed to sustain their advantages.
Recency refers to the:
Time elapsed since the last action taken by a customer.
How can a smartphone's gyroscope and accelerometer be used in product marketing?
To enhance user interaction with mobile multimedia.
Which of the following is a utility program that allows you to track the path of a message sent from a client computer to a remote computer on the Internet?
Tracert
Which of the following is not an element of friction-free commerce?
Transaction costs are high.
________ pricing adjusts prices based on the location of the consumer.
Trigger
A worm does not need to be activated by a user in order for it to replicate itself.
True
B2B e-commerce is the largest type of e-commerce.
True
Brand pages on Facebook typically attract more visitors than a brand's Web site.
True
Bundling is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices.
True
By 2015, it is estimated that mobile marketing spending will account for around $16 billion annually.
True
Cookies, when combined with Web beacons, can be used to create cross-site profiles.
True
E-commerce and e-business systems blur together at the business firm boundary, where internal business systems link up with suppliers or customers.
True
E-commerce is a major conduit and generator of offline commerce.
True
E-commerce technologies provide a unique, many-to-many model of mass communication.
True
Evidence suggests that real-time customer chat increases sales.
True
Google provides the leading location-based marketing platform.
True
In general, the annual system maintenance cost will roughly parallel the development cost.
True
In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.
True
Insiders present a greater security threat to e-commerce sites than outsiders.
True
Keeping bid increments low increases the number of bidders and the frequency of their bids.
True
Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.
True
Most of today's well-known portals began as search engines.
True
PayPal requires the recipient of a payment to have a PayPal account to receive funds.
True
Pinterest's visitors are predominantly women.
True
Prior to the development of e-commerce, websites primarily delivered static HTML pages.
True
Promoted Tweets are Twitter's version of Google's Ad Words.
True
Research shows that the two most important factors shaping the decision to purchase online are utility and trust.
True
Smishing attacks exploit SMS messages.
True
Social network participation is one of the most common usages of the Internet.
True
Sponsored community sites are network sites created by government, non-profit, or for-profit organizations.
True
The Children's Internet Protection Act (CIPA) requires schools and libraries in the United States to install technology protection measures in an effort to shield children from pornography.
True
The European Data Protection Directive prohibits the transfer of PII to organizations or countries that do not have similar privacy protection policies.
True
The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.
True
The major hubs in the United States where the Internet backbone intersects with regional and local networks are now commonly referred to as Internet Exchange Points (IXPs).
True
The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.
True
The value of portals to advertisers and content owners is primarily a function of the size of the audience the portal reaches and the length of time visitors stay on the site.
True
Traditional desktop marketing remains the largest part of all online marketing.
True
Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.
True
Ubiquity lowers the cognitive energy required to transact in a marketspace.
True
Facebook was the leader in U.S. ad spending revenues on social networks in 2013. What company received the second most amount of ad spending revenue?
Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?
Two-factor authentication
Registering the domain name goggle.com with the intent to divert Web traffic from people misspelling google.com is an example of:
Typosquatting
If you want to determine the size of your Web site's audience, the metric you will use for the most accurate measurement will be:
Unique visitors
Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?
Universal standards
Which of the following features of e-commerce technology is related to the concept of network externalities?
Universal standards
All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except:
Up to 10 years imprisonment for a first offense.
Creating multiple variations of information goods and selling these to different market segments at different prices is called:
Versioning
Which of the following forms of online advertising is growing the fastest?
Video
Which of the following online advertising formats is the most effective?
Video ads
Linden Dollars, created for use in Second Life, are an example of:
Virtual currency
All of the following are involved in the effort to create standards for IoT except:
W3C
Which of the following is the current standard used to protect Wi-Fi networks?
WPA2
Which of the following refers to the practice of researching a product online before purchasing it at a physical store?
Webrooming
Which of the following statements is not true?
Women are more active purchasers on smartphones than men.
Which of the following purchased Tumblr in May 2013?
Yahoo
All of the following statements about social networks are true except:
Yahoo visitors spend more than twice as much time on Yahoo as Facebook visitors spend on Facebook.
All of the following are fixed price strategies except:
Yield management
An example of a privacy violation of e-commerce security is:
Your online purchasing history being sold to other merchants without your consent.
Which of the following is the market leader in C2C auctions?
eBay
Which of the following is an example of the subscription revenue model?
eHarmony
Which dimension(s) of security is spoofing a threat to?
Integrity and authenticity
Which of the following is a common problem in sealed bid markets?
Bid rigging
Which of the following involves e-mailing another seller's bidders and offering the same product for less?
Bid siphoning
Which of the following is not a community provider?
Blue Nile
Rustock is an example of which of the following?
Botnet
Most of the world's spam is delivered via which of the following?
Botnets
Which of the following is a characteristic of the Consolidation phase of e-commerce?
Brand extension and strengthening becomes more important than creating new brands.
Which of the following is an unfair competitive advantage?
Brand name
Which of the following is not one of the main stages of the online purchasing process?
Browsing
Which of the following is not true about mobile marketing?
By 2015, it is estimated that spending on social marketing will exceed the amount spent on mobile marketing.
The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time.
Flash marketing
Which of the following statements about Foursquare is not true?.
Foursquare has decided to refocus its effort on developing a subscription-based revenue model
Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service?
Freemium strategy
Facebook is an example of a(n):
General community/Social network
Miller Coors used which of the following techniques to alert Blue Moon beer fans as to where it could be purchased?
Geo-fencing
The world's leading portal/search engine site, in terms of unique visitors, is:
Which of the following dominates mobile advertising?
Which of the following statements about social, local, and mobile privacy is not true?
Google and Apple track and record how users interact with the apps on users smartphones.
Which of the following statements about e-commerce surveillance is not true?
Google discards search information after 12 months.
Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?
Gramm-Leach-Bliley Act
Business-to-consumer (B2C) e-commerce in the United States:
Has grown at double-digit rates between 2010 and 2017.
________ is the tendency to gravitate toward, and bid for, auction listings with one or more existing bids.
Herd behavior
Which pricing plan charges fees to e-commerce firms based on the amount of traffic they generate?
Highway pricing
What is the first step in analyzing an ethical dilemma?
Identify and describe the facts.
Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as:
Incubators
The Seam is an example of a(n):
Industry consortium
Which of the following is not a unique feature of e-commerce technology?
Information asymmetry
Botnets are typically used for all of the following except:
Phishing attacks
When sellers agree informally or formally to set floor prices below which they will not sell on auction items, this is known as:
Price matching
Which of the following is not a risk or cost of Internet auctions?
Price transparency
Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?
Privacy
Elance.com is an example of a(n):
Professional service auction
Django is based on which of the following?
Python
The total number of users or customers an e-commerce business can obtain is a measure of which of the following?
Reach
Which of the following is another term for amplification?
Reach
Which of the following is not one of the typical portal revenue sources?
Referral fees
An example of a company using the content provider model is:
Rhapsody
Which of the following refers to the complexity and content of a message?
Richness
Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations?
Routers
Which of the following uses a subscription revenue model for books?
Scrib'd
Which of the following accounts for the most mobile ad spending?
Search engine advertising
Which of the following is not true about search engine advertising?
Search engine advertising is the fastest growing type of online advertising.
Which of the following are Amazon's primary value propositions?
Selection and convenience
Which of the following involves a concern that one will never know how much the ultimate winner might have paid, or the true value to the final winner?
Seller's lament
When there are few sellers but many buyers, a market will typically be:
Seller-biased
"Do Not Track" falls under which of the following principles in the FTC's new privacy framework?
Simplified choice
All of the following are examples of malicious code except:
Sniffers
Which of the following statements about e-commerce, in the United States in 2017, is not true?
Social e-commerce generates more revenue than mobile e-commerce.
Surveys have found that the least influential online marketing format for driving consumers to purchase is:
Social networks
Which of the following is not a practice that degrades the results and usefulness of search engines?
Social search
A Crayola arts-and-crafts column on a parenting Web site is an example of what form of advertising?
Sponsorship