E-Com Final study guide

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following age groups has the highest percentage of Internet access?

18-29

E-commerce can be said to have begun in:

1995

On a typical day, approximately ________ percent of adult users in the United States logs on to the Internet.

82

"Shoppers" constitute approximately ________ percent of the online Internet audience.

88

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

The leading Web server software is:

Apache

________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

Confidentiality

Which of the following is not an example of the bricks-and-clicks e-tailing business model?

Dell.com

Which of the following is not a type of application server?

FTP server

Apache HTTP Web server software is based on Microsoft's Windows operating system.

False

Copyright protection protects against others copying the underlying ideas in a work.

False

One of the most important challenges in developing an e-commerce presence is understanding that the technology must drive the business.

False

Online shoppers tend to browse for available products rather than search for specific products they have determined in advance.

False

Phishing attacks rely on browser parasites.

False

Which of the following statements about the Web is not true?

It is the technology upon which the Internet is based.

Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?

No Free Lunch

All of the following can be considered a direct or indirect competitor of Amazon.com except:

Starbucks.

A Trojan horse appears to be benign, but then does something other than expected.

True

A majority of states in the United States have laws regulating or prohibiting spam.

True

A worm does not need to be activated by a user in order for it to replicate itself.

True

All firms need an organization to efficiently implement their business plans and strategies.

True

Customization involves changing a delivered product or service based upon a consumer's preferences or past purchasing behavior.

True

E-commerce as we know it today would not exist without the Internet.

True

E-commerce is a major conduit and generator of offline commerce.

True

In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.

True

Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.

True

Net neutrality refers to Internet backbone owners treating all Internet traffic equally.

True

Price is the top factor in online purchase decisions.

True

Search engine marketing saves consumers cognitive energy and reduces search costs.

True

Social technologies change industry structure by shifting programming and editorial decisions to consumers.

True

Spending on social advertising is less than 10 percent of spending on all online advertising.

True

The Children's Online Privacy Protection Act (COPPA) prohibits Web sites from collecting information on children under the age of 13.

True

The annual maintenance cost for a Web site is likely to be as high as its development cost.

True

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

True

The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.

True

The systems development life cycle methodology is useful when creating an e-commerce Web site.

True

The terms revenue model and financial model can be used interchangeably.

True

Web 2.0 describes a set of applications and technologies that encourage and rely on user- and consumer-generated interactivity and content.

True

Which of the following is not an example of a social network?

Wikipedia

Which of the following is an example of a CMS?

WordPress

The early years of e-commerce are considered:

a stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year

Most of the world's spam is delivered via which of the following?

botnet

Which element of the business model examines who else occupies the firm's intended marketspace?

competitive environment

The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:

confidentiality.

Downloading music tracks owned by record companies without paying for them is an example of a violation of:

copyright law.

In the United States, the primary form of online payment is:

credit cards.

All of the following are basic information requirements for a product database except:

customer ID numbers.

Which system functionality must your Web site have in order to be able to personalize or customize a product for a client?

customer on-site tracking

Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:

cybersquatting.

Over which of the following does ICANN have authority?

domain name system

Which of the following basic ethical concepts plays an important role in defining privacy?

due process

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

firewall

The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time.

flash marketing

The display of a third-party's Web site or page within your own Web site is called:

framing.

Which of the following is the top concern of Internet users about purchasing online?

inability to see and touch before buying

All of the following are key elements of a business model except:

information technology strategy

The placing of a cookie on a user's hard drive by one site that is then used by another site to sell that user related products without the knowledge of the user is:

legal in the United States but illegal in Europe.

A system design has two main components:

logical design and physical design

Which of the following describes the basic Web policy of large firms during the period of invention?

maintain a basic, static Web site

A business document that specifically details how you plan on selling your product and find new customers is called a:

market strategy.

Hits are a measure of the:

number of http requests

Unfair competitive advantages occur when:

one competitor has an advantage others cannot purchase.

Amazon has a patent on:

one-click purchasing.

All of the following are business models employed by the music industry except:

peer-to-peer streaming.

Conversion rate is a measure of the:

percentage of visitors who become customers

All of the following are assets of Twitter except:

retail inventory.

What is the primary revenue model for an e-distributor?

sales

Which of the following are Amazon's primary value propositions?

selection and convenience

Which of the following would you use to identify orphan files?

site management tools

Which of the following helps you understand the marketing effectiveness of your e-commerce site?

site tracking and reporting system

Which of the following is used to collect and analyze detailed information on page content viewed by users?

site transaction logs

Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?

social technology

Which of the following tools can companies use to track users' social and political views and activities?

spyware

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

spyware.

Which of the following measures the average length of stay at a Web site?

stickiness

Your startup firm has developed Web-based note-taking software that allows participants to create and share virtual notes attached to existing Web pages. You anticipate marketing your online application to Web development and design companies. Which of the following revenue models is the most appropriate for your new company?

subscription

In order from beginning to end, the major steps in the SDLC, are:

systems analysis/planning; systems design; building the system; testing; and implementation.

All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except:

targeted banner ads.

Above all, e-commerce is a ________ phenomenon.

technology-driven

In a SWOT analysis, you describe all of the following except the business's:

technology.

Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?

the Golden Rule

All of the following are factors in contributing to the increase in cybercrime except:

the Internet's similarity to telephone networks.

Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all?

the Slippery Slope

What is the major reason that the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?

the ability to make perfect copies of digital works at little cost

What is the most frequent cause of stolen credit cards and card information today?

the hacking and looting of corporate servers storing credit card information

The basic value proposition of community providers is:

they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.

If you want to determine the size of your Web site's audience, the metric you will use for the most accurate measurement will be:

unique visitors.

E-commerce can be defined as:

use of the internet and web to transact business

Which of the following activities is the one engaged in by the highest percentage of online users?

using e-mail

Which of the following forms of online advertising is growing the fastest?

video

Which of the following online advertising formats is the most effective?

video ads

A program which spreads by sending e-mails from an infected computer to all of the e-mail addresses found on that infected computer is an example of a:

worm/Trojan horse.

An example of a privacy violation of e-commerce security is:

your online purchasing history being sold to other merchants without your consent.


Set pelajaran terkait

Chapter 10- Managing Conflict and Negotiation

View Set

Principles of Real Estate Exam 2

View Set

Introduction to Biotechnology 1 - Exam 1

View Set

OTS3 Chapter 32(Degenerative Diseases) & Chapter 27(Bariatric Factors) &tidbits

View Set