Chapter 1 and 5

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

How many years has it taken the Internet to achieve a share of greater than 50% of U.S. households? a. 10 b. 17 c. 38 d. 60

a. 10

In 1984, the number of devices connected to Internet were ___________ a. 1000 b. 17,000,000,000 c. 26,000,000,000 d. 50,000,000,000

a. 1000

_____uses the software to create videos that offer a detailed explanation of each customer's bill , thus reducing call center volume. a. AT&T b. T Mobile c. Sprint d. Verizon

a. AT&T

What does end-to-end visibility mean? a. Being able to see what's happening at any stage across the entire supply chain b. Being able to see what's happening at the initial stage of the supply chain c. Being able to see what's happening at the end stage of the supply chain d. None of these

a. Being able to see what's happening at any stage across the entire supply chain

_____ refers to the ability to ensure that e-commerce participants do not deny their online actions. a. Nonrepudiation b. Authenticity c. Availability d. Integrity

a. Nonrepudiation

How will the devices be aware of the real time conditions? a. Sensors b. Internet c. Ships d. Refrigerators

a. Sensors

Which of the following best describes the early years of e-commerce? a. They were a technological success but a mixed business success. b. They were a technological success but a business failure. c. They were a technological failure but a business success. d. They were a mixed technological and business success.

a. They were a technological success but a mixed business success.

"Every business needs a good partnership between IT and ____Management in order to use these types of tools effectively," -Ashley Smith a. business b. data c. customer d. Brand

a. business

The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and: a. confidentiality. b. usability. c. functionality. d. viability.

a. confidentiality.

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network. a. firewall b. virtual private network c. proxy server d. PPTP

a. firewall

According to the Computer Security Institute's 2011 Computer Crime and Security Survey, which of the following was the most commonly reported type of attack? a. malware infection b. laptop theft c. Web site defacement d. insider abuse

a. malware infection

The integration of video, audio, and text marketing messages into a single marketing message and consuming experience is an example of: a. richness. b. ubiquity. c. information density. d. personalization.

a. richness.

A digital certificate contains all of the following except the: a. subject's private key. b. subject's public key. c. digital signature of the certification authority. d. digital certificate serial number.

a. subject's private key.

Above all, e-commerce is a ________ phenomenon. a. technology-driven b. finance-driven c. sociological d. government-driven

a. technology-driven

T or F: Phishing attacks rely on browser parasites.

False

T or F: The last step towards agility is visibility.

False

T or F: Ubiquity increases cognitive energy outlays.

False

T or F: A Trojan horse appears to be benign, but then does something other than expected

True

T or F: Customization involves changing a delivered product or service based upon a consumer's preferences or past purchasing behavior.

True

T or F: Market trends like omni channel, fast fashion and smart manufacturing are forcing supply chain to satisfy a growing customer demand for quicker, cheaper, more reliable, more easily delivered, highly configurable goods.

True

T or F: The fact that e-commerce is conducted on the basis of universal standards decreases market entry costs for merchants.

True

T or F: Web 2.0 describes a set of applications and technologies that encourage and rely on user- and consumer-generated interactivity and content.

True

E-commerce can be defined as: a. the use of the Internet and the Web to transact business. b. the use of any Internet technologies in a firm's daily activities. c. the digital enablement of transactions and processes within an organization. d. any digitally enabled transactions among individuals and organizations.

a. the use of the Internet and the Web to transact business.

The Computer Security Institute reported in its 2011 survey that approximately ________ percent of responding organizations experienced a computer security incident within the previous 12 months. a. 25 b. 45 c. 75 d. 95

b. 45

General Electric(GE) used to only make stand-alone physical engineering equipment like a. Refrigerator b. Airplane engines c. Internet routers d. All of the above

b. Airplane engines

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. a. Nonrepudiation b. Authenticity c. Availability d. Integrity

b. Authenticity

Which of the following dimensions of e-commerce security is not provided for by encryption? a. confidentiality b. availability c. message integrity d. nonrepudiation

b. availability

It's not enough to have just a ton of good data. the data needs to be in the hands of ____who are making key decisions"-Tannone. a. customers b. business managers c. developers d. sales representatives

b. business managers

The data you can tap into on sites such as Facebook and Twitter constitutes ______what's being said about your company or products in word-of-mouth forums as a whole a. a majority of b. only a fraction of c. none of d. only 5%

b. only a fraction of

Which of the following is the best definition of transaction cost? a. the cost of changing prices b. the cost of participating in a market c. the cost of finding suitable products d. the cost merchants pay to bring their goods to market

b. the cost of participating in a market

According to Harvard Business Review (HBR), what will create second-order effects beyond just improving processes? a. Data aggregation b. Analytics c. Both a) and b) d. None of these

c. Both a) and b)

What type of analytics involves drilling into customer data to make smarter business decisions? a. SCM b. ERP c. CRM d. SaaS

c. CRM

Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship? a. Consumer-to-consumer (C2C) b.Social e-commerce c. Mobile e-commerce d. Business-to-business (B2B)

c. Mobile e-commerce

Malware that comes with a downloaded file that a user requests is called a: a. Trojan horse. b. backdoor. c. drive-by download. d. PUP.

c. drive-by download.

Proxy servers are also known as: a. firewalls. b. application gateways. c. dual home systems. d. packet filters.

c. dual home systems.

The "big pipe" of data from the two major social networking websites Facebook and Twitter is _____ to social media analysts a. becoming confusing b. becoming more available c. no longer available d. none of the above

c. no longer available

Network externalities are related to which of the following features of e-commerce technology? a. richness b. interactivity c. universal standards d. information density

c. universal standards

By being agile, supply chains are respond to volatile conditions and do things like a. Reroute inventory at will b. Support servicing parts on-demand c. Accommodate painless and profitable returns d. All of the above

d. All of the above

The cloud technology is: a. Massively scalable b. Hardware independent c. Always available d. All of the above

d. All of the above

What is IoT all about? a. Smart devices b. Producing big data c. Yielding business insight of decision makers d. All of the above

d. All of the above

Which of the following is an example of an integrity violation of e-commerce security? a. A Web site is not actually operated by the entity the customer believes it to be. b. A merchant uses customer information in a manner not intended by the customer. c. A customer denies that he or she is the person who placed the order. d. An unauthorized person intercepts an online communication and changes its contents.

d. An unauthorized person intercepts an online communication and changes its contents.

All of the following are methods of securing channels of communication except: a. SSL/TLS. b. certificates. c. VPN. d. FTP.

d. FTP

Businesses that have established____are able to use this higher-level reference to connect business names or objects in multiple data sources. a. CRM b. ERP c. SSL d. MDM

d. MDM

All of the following were visions of e-commerce expressed during the early years of e-commerce except: a. a nearly perfect competitive market. b. friction-free commerce. c. disintermediation. d. fast follower advantage.

d. fast follower advantage.

Interactivity in the context of e-commerce can be described as: a. the ability to physically touch and manipulate a product. b. the complexity and content of a message. c. the ability of consumers to create and distribute content. d. the enabling of two-way communication between consumer and merchant.

d. the enabling of two-way communication between consumer and merchant.

Which of the following is a characteristic of the Reinvention phase of e-commerce? a. massive proliferation of dot-com start-ups b. widespread adoption of broadband networks c. rapid growth of search engine advertising d. widespread adoption of consumer mobile devices

d. widespread adoption of consumer mobile devices


Set pelajaran terkait

Chapter 12 - State and Local Taxes

View Set

Chapter 1: Impact of Technology in a Changing World, Chapter 9 - Power, Politics, and Influence, Chapter 25 Managing Personal and Personnel problems, Chapter 26: Role Transition, 31) Thriving for the Future, Chapter 22: Person-centered Care, Chapter...

View Set

Makanan dan Minuman (Minta satu) - Kindy/G1

View Set

AOT 256 - Office management FINAL

View Set

Chapter 1: Introduction, Acquiring Knowledge, and the Scientific Method

View Set

Digital Marketing Chapter 7 - Mobile Marketing

View Set

Maternity: Chapter 14 Practice Questions

View Set

Chapter 18: Sterilization and Disinfection

View Set

Chapter 5 - Confusion, Dementia, and Alzheimer's Disease

View Set