Assignment 2
sponsorship
A Crayola arts-and-crafts column on a parenting Web site is an example of what form of advertising?
CRM system
A ____________ is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.
firewall
A _______________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
subject's private key
A digital certificate contains all of the following except the __________________.
5
A typical response rate for an email campaign would be ______%
packet filters
All of the following are used for authentication except:
online purchase history being sold to other merchants without consent
An example of a privacy violation of e-commerce security is:
blocking suspicious activity
An intrusion detection system can perform all of the following functions except:
90
"Shoppers" constitute approximately ______% of the online Internet audience.
one-third
Approximately _________ of annual offline retail sales is influence by online browsing.
digital cash
Bitcoins are an example of:
60%
In 2013, what was the approximate Internet penetration rate for individuals that have obtained less than a high school education?
conduct online transactions
In modeling online behavior, the concept of "consumer skills" refers to the knowledge consumers have about how to ______________.
virtual currency
Linden Dollars, created for use in Second Life, are an example of ____________ ___________
browse-to-buy ratio
Measures the ratio of items purchased to product views.
80
On a typical day, approximately _____% of adult users in the United States logs on to the Internet.
20 to 30 cents $3 to $7
Online bill payments are believed to cost __________ to process compared to __________ for paper bills.
perform a specific action, such as registering, purchasing, etc.
Purchasing an online ad on a CPA basis means that the advertiser pays only for those users who:
$19.5 billion
Search advertising and marketing expenditures in 2013 were approximately:
target banner ads
Search engines, social networks, and online catalogs are used to support the evaluation of alternatives stage of the consumer decision process but _______________ are not.
spyware
Software that is used to obtain private user information such as a user's keystrokes or copies of email is referred to as:
WPA2
Which of the following is the current standard used to protect Wi-Fi?
company Web site
Which of the following is the most important tool in establishing a relationship with the customer?
stickiness
Which of the following measures the average length of stay at a website?
video ads
Which of the following online advertising formats is the most effective?
sniffers
Worms, bots, and viruses are examples of malicious code. ____________ are not.
confidentiality
_____________ refers to the ability to ensure that messages and data are only available to those authorized to view them.
recency
______________ refers to the time elapsed since the last action taken by a customer.
True
True or False The click through rate for search engine advertising is the fastest growing type of online advertising.
True
True or False The cost of sending 10,000 emails in an advertising campaign is about the same as sending 5,000
False
True or False The data typically stored in cookies includes a unique ID and email address.
True
True or False The digital divide still persists along age, income, ethnic, and educational dimensions.
True
True or False The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
True
True or False The richness made possible by e-commerce technologies allows video, audio, and text to be integrated into a single marketing message and consuming experience.
True
True or False The top three search engine providers supply over 95% of all online searches.
False
True or False Online shoppers tend to browse for available products rather than search for specific products they have determined in advance.
login walls passwords proxy servers
What are examples of an access control?
ensure authentication of the sender
What does public key encryption not do?
digital signatures
What is an example of something that is not access control?
prohibit unsolicited email (spam)
What is it that CAN-SPAM cannot do?
affiliate programs
What is not a feature that is driving the growth of social marketing and advertising?
China
Which country has been found to engage in cyber espionage against Google?
Nielsen ratings
Which is not one of the four main methods advertisers use to behaviorally target ads?
56
The Data Encryption Standard uses a(n) _______-bit key.
False
True or False The Internet has decreased the impact of brands.
True
True or False The U.S. federal government has historically not been in favor of the development and export of strong encryption systems.
flash marketing
The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time.
1
The overall rate of online credit card fraud is _______% of all online card transactions.
authorization management system
To allow lower level employees access to the corporate network
True
True or False Bundling is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices.
False
True or False Price is more important than convenience as a factor in online purchase decisions.
True
True or False Research shows that the two most important factors shaping the decision to purchase online are utility and trust.
False
True or False Search engine advertising is the fastest growing type of online advertising.
True
True or False Spending on search engine advertising constitutes almost half of all online spending on advertising.