E-Commerce: The Final Jam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The Data Encryption Standard uses a(n) ________-bit key. 8 56 256 512

56

Which of the following is an example of an integrity violation of e-commerce security? A website is not actually operated by the entity the customer believes it to be. A customer denies that he is the person who placed the order. A merchant uses customer information in a manner not intended by the customer. An unauthorized person intercepts an online communication and changes its contents.

An unauthorized person intercepts an online communication and changes its contents.

In ________, all of a customer's financial (and even nonfinancial) data are pulled together into a single, personalized website. account aggregation EBPP systems a financial portal integrated financial services

account aggregation

Which of the following was the first step in the development of B2B e-commerce? Electronic Data Interchange (EDI) computerized inventory databases digital invoices automated order entry systems

automated order entry systems

Which of the following dimensions of e-commerce security is not provided for by encryption? confidentiality message integrity nonrepudiation availability

availability

Which of the following involves the issue of social control? information rights public safety and welfare property rights governance

governance

Which of the following is the leading cause of data breaches? hackers theft of a computer DoS attacks accidental disclosures

hackers

Disputes over federal trademarks involve establishing: intent. underlying ideas. piracy. infringement.

infringement.

Which dimensions of security is spoofing a threat to? availability and authenticity integrity and authenticity availability and integrity integrity and confidentiality

integrity and authenticity

A digital certificate contains all of the following except the: subject's private key. digital signature of the certification authority. digital certificate serial number. subject's public key.

subject's private key.

Which of the following refers to the links that connect business firms with one another to coordinate production? horizontal market B2B e-commerce supply chain vertical market

supply chain

All of the following are online communications used to support the evaluation of alternatives stages of the consumer decision process except: social networks. online catalogs. search engines. targeted banner ads.

targeted banner ads.

Consumers are primarily price-driven when shopping on the Internet. True False

False

Online gambling is now legal throughout the United States. True False

False

Online retail constitutes about 20% of the total retail market today. True False

False

The Children's Internet Protection Act (CIPA) has been struck down by the U.S. Supreme Court as unconstitutional. True False

False

________ purchasing involves the purchase of goods based on immediate needs in larger marketplaces that involve many suppliers. Indirect Spot Vertical Bulk

Spot

Which of the following was designed to cripple Iranian nuclear centrifuges? Shamoon Snake Storm Stuxnet

Stuxnet

Which of the following is not a major trend in online retail for 2020-2021? The average annual purchase of online buyers continues to increase. Buying online has become a normal, mainstream, everyday experience. The number of online buyers continues to increase. The Covid-19 pandemic is expected to create a decrease in e-commerce retail purchases.

The Covid-19 pandemic is expected to create a decrease in e-commerce retail purchases.

A Trojan horse appears to be benign, but then does something other than expected. True False

True

A roughly equal percentage of men and women in the United States use the Internet today. True False

True

Exchanges are used for spot purchasing of MRO supplies. True False

True

Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations. True False

True

Net neutrality refers to the idea that Internet service providers (ISPs), including cable Internet and wireless carriers, should treat all data on the Internet in the same manner, and not discriminate or price differentially by content, protocol, platform, hardware, or application. True False

True

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software. True False

True

Walmart is both the world's largest retailer and has the world's largest supply chain. True False

True

Which of the following situations would not qualify for the fair use exception to U.S. copyright law? A journalist quotes a paragraph from a book in a review of the book. A professor clips a newspaper article just before class and distributes copies of it to his class. Google posts thumbnail images of books in the Google Book Search Project. A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.

A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.

A ________ is a repository of customer information that records all contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer. customer service chat system transactive content system data warehouse CRM system

CRM system

Next generation firewalls provide all of the following except: the ability to identify users regardless of the device or IP address. the ability to automatically update applications on a client computer with security patches. the ability to identify applications regardless of the port, protocol, or security evasion tools used. an application-centric approach to firewall control.

the ability to automatically update applications on a client computer with security patches.

Analysts predict that B2B e-commerce in the United States will grow to approximately ________ by 2024. $9.8 billion $98 billion $980 billion $9.8 trillion

$9.8 trillion

What was the approximate Internet penetration rate in 2019 for individuals that have attained less than a high-school education? 81% 61% 71% 51%

71%

In the United States, the service sector accounts for approximately ________% of the United States GDP. 70 75 80 85

80

How long does copyright protection extend for corporate-owned works? 25 years 50 years 75 years 95 years

95 years

Which of the following statements about blockchain is not true? A blockchain system is a transaction processing system. A blockchain system is inherently centralized. A blockchain system is composed of a distributed network of computers. Cryptocurrencies are based on blockchain technology.

A blockchain system is inherently centralized.

________ is defined as the use of digital technologies to permit organizations to work together to design, develop, build, and manage products through their life cycles. SCM EDI Social e-commerce Collaborative commerce

Collaborative commerce

Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society? The Social Contract Rule Collective Utilitarian Principle Risk Aversion Principle The Golden Rule

Collective Utilitarian Principle

Which of the following best explains why the service sector is a natural avenue for e-commerce? Much of the value in services is based on the collection, storage, and exchange of information. It is not; services are difficult to translate to e-commerce because they all rely on face-to-face communication and barter. The service sector requires "rich" marketing messages to reach new customers. The service sector is less geographically reliant and more globally oriented.

Much of the value in services is based on the collection, storage, and exchange of information.

The essential characteristic of ________ is that they bring hundreds to thousands of suppliers into a single Internet-based environment to conduct trade. Net marketplaces industry consortia exchanges horizontal markets

Net marketplaces

________ is the ability to ensure that e-commerce participants do not deny their online actions. Authenticity Nonrepudiation Availability Integrity

Nonrepudiation

What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)? Make collection of PIl illegal. Require firms to have consumers affirmatively opt-in before PI is collected. Require firms to allow consumers to opt-out before PI is collected. Require robust notice only before PI is collected.

Require firms to have consumers affirmatively opt-in before PI is collected.

A(n) ________ system continuously links the activities of buying, making, and moving products from suppliers to purchasing firms, as well as integrating order entry systems. CPFR ERP EDI SCM

SCM

All of the following are major technology trends in B2B e-commerce in 2020-2021, except: a growing emphasis on the use of business analytics software (business intelligence) to understand very large data sets. a decrease in the use of social network platforms. a growing use of the mobile platform for B2B systems. a movement of B2B systems to cloud computing providers as a means of slowing rising technology costs.

a decrease in the use of social network platforms.

A web beacon is: an executable cookie. a cookie that carries a virus. an automated applet for performing web searches. a tiny graphics file embedded in an e-mail or web page.

a tiny graphics file embedded in an e-mail or web page.

What is the largest sector of the online travel services market in terms of revenue? cruise/tour reservations car reservations hotel reservations airline reservations

airline reservations

The term BYOD refers to employees: working from home. bringing work devices to the home. being allowed or encouraged to use their own mobile devices and laptops. using mobile devices for work.

being allowed or encouraged to use their own mobile devices and laptops.

Which of the following is a transaction database that operates on a distributed P2P network that connects all participant members in a single database and is highly secure, reliable, resilient, and inexpensive? cloud-based B2B system blockchain SCM system EDI

blockchain

Which of the following measures the percentage of e-mails that could not be delivered? bounce-back rate abandonment rate attrition rate unsubscribe rate

bounce-back rate

All of the following are challenges faced by bricks-and-clicks firms except: coordinating prices across channels. building a brand name. handling returns of online purchases at retail outlets. building a credible website.

building a brand name.

Virtual merchants face potentially large costs for all of the following except: building and maintaining a website. building an order fulfillment infrastructure. developing a brand name. building and maintaining physical stores.

building and maintaining physical stores.

Which of the following occurs when retailers of products must compete on price and currency of inventory directly against the manufacturer? channel conflict hypermediation localization disintermediation

channel conflict

According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online? used an anonymous web browsing service posted comments online anonymously encrypted their communications cleared web browser history and cookies

cleared web browser history and cookies

Accessing data without authorization on Dropbox is an example of a: cloud security issue. sniffing issue. social network security issue. mobile platform security issue.

cloud security issue.

Which of the following is the most important tool in establishing a relationship with the customer? company CRM system company website search engine display ads Facebook

company website

Downloading a music track owned by a record company without paying for it is an example of a violation of: patent law. copyright law. privacy law. trademark law.

copyright law.

The lower the ________ compared to revenue, the higher the gross profit. operating expenses assets gross margin cost of sales

cost of sales

All of the following are limitations of the existing online credit card payment system except: cost to merchant. social equity. cost to consumers. poor security.

cost to consumers.

Which of the following uses software installed at the ISP level to track user clickstream behavior? deep packet inspection shopping carts DRM trusted computing environments

deep packet inspection

All of the following are examples of direct goods in the auto industry except: sheet steel. desktop computers. rubber molding. shatter-resistant glass.

desktop computers.

Which of the following online advertising formats attracted the least amount of spending in 2020? classifieds search e-mail rich media

e-mail

What is another name for pro forma earnings? earnings before income taxes, depreciation, and amortization (EBITDA) generally accepted accounting principles (GAP) earnings net margin operating income

earnings before income taxes, depreciation, and amortization (EBITDA)

Which of the following primarily deal with direct goods? e-procurement Net marketplaces and industry consortia exchanges and e-procurement Net marketplaces e-distributors and independent exchanges exchanges and industry consortia

exchanges and industry consortia

All of the following are advantages of online retail except: faster delivery of goods. lower supply chain costs. ability to change prices. lower cost of distribution.

faster delivery of goods.

Which of the following features of e-commerce technology enables marketers to engage customers in a dialog and dynamically adjust the experience to the consumer? interactivity ubiquity richness information density

interactivity

All of the following are required for information to be considered a trade secret except: the owner must have taken steps to protect it. it must be something that others do not know. it must have commercial value to its owner. it must be unique.

it must be unique.

Which of the following is a method of inventory cost management that seeks to eliminate excess inventory? sustainable production lean production just-in-time production supply chain simplification

just-in-time production

The marketing technique known as ________ involves merchants offering many products for which there is little demand. flash marketing bait-and-switch yield management long tail marketing

long tail marketing

Which of the following is not considered a current asset? cash accounts receivable long-term investments marketable securities

long-term investments

The online retail sector of the retail industry is most similar to the ________ sector. mail order/telephone order (MOTO) consumer durables specialty stores general merchandise

mail order/telephone order (MOTO)

E-distributors: usually operate "private" markets. make money by charging a mark-up on products they distribute. operate in vertical markets. focus on selling direct products.

make money by charging a mark-up on products they distribute.

The incremental cost of building the next unit of a good is called the: marginal cost. fixed cost. Law of One Price. variable cost.

marginal cost.

All of the following were parts of the vision during the early days of e-commerce except the belief that: the cost of acquiring customers would be much lower. online consumers were rational and cost-driven. entry costs to the online retail market would be much less than those needed to establish a physical storefront. new, "first-mover" middlemen, with expertise in e-commerce, would force traditional intermediaries out of business.

new, "first-mover" middlemen, with expertise in e-commerce, would force traditional intermediaries out of business.

Apart from Amazon, the top online retail firms in terms of online sales are all primarily ________ firms. manufacturer-direct omni-channel catalog merchant web-only

omni-channel

All of the following are terms used to describe on-demand service companies except: collaborative commerce. we-commerce. omni-channel commerce. mesh economy.

omni-channel commerce.

PayPal is an example of which of the following types of payment system? digital checking system digital credit card system online stored value payment system accumulating balance system

online stored value payment system

Automatically redirecting a web link to a different address is an example of which of the following? pharming sniffing DoS attack social engineering

pharming

The liquidity of a market is measured by all of the following except: size of transactions. price transparency. volume of transactions. number of buyers and sellers in market.

price transparency.

Asymmetric key cryptography is also known as: PKI. secret key cryptography. public key cryptography. PGP.

public key cryptography.

Which of the following is not an e-commerce public safety and welfare issue? regulation of cigarette sales regulation of pornography regulation of taxation regulation of gambling

regulation of taxation

What is the first step in the procurement process? negotiate price qualify the seller and its products search for suppliers issue a purchase order

search for suppliers

All of the following are "traditional" online marketing tools except: affiliate marketing. sponsorship marketing. e-mail and permission marketing. social marketing.

social marketing.

Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying? social technology interactivity ubiquity information density

social technology

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: a backdoor. spyware. a browser parasite. adware.

spyware.

Which of the following measures the average length of stay at a website? retention rate stickiness loyalty page views

stickiness

Uber has been criticized for using which of the following? flash marketing malware bundling surge pricing

surge pricing

All of the following statements about the online real estate services market are true except: the Internet and e-commerce have created a revolution in the real estate value chain. the primary service offered by real estate sites is a listing of houses available. the major impact of Internet real estate sites has been in influencing offline decisions. the first step in the home buying process for nearly all ages of home buyers is to look online.

the Internet and e-commerce have created a revolution in the real estate value chain.

What is the major reason why the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law? the support for instant peer-to-peer communication the use of standards for file formats the anonymous nature of the Internet the ability to make perfect copies of digital works at little cost

the ability to make perfect copies of digital works at little cost

Which of the following enabled MOTO firms to make an easier transition to e-commerce? falling long distance telecommunications prices the national toll-free call system the growth of the credit card industry the fact that they already had efficient customer order fulfillment processes

the fact that they already had efficient customer order fulfillment processes

Recency refers to the: percentage of customers who do not return during the next year after an initial purchase. percentage of existing customers who continue to buy on a regular basis. percentage of customers who return to the site within a year to make additional purchases. time elapsed since the last visit made by a customer.

time elapsed since the last visit made by a customer.

Trans-organizational business processes require ________ to perform. two independent firms three independent firms one firm at least ten firms

two independent firms

Registering the domain name Faceboik.com with the intent to divert web traffic from people misspelling Facebook.com is an example of: keywording. deep linking. typosquatting. metatagging.

typosquatting.

Which of the following features of e-commerce technology can result in work and shopping invading family life? ubiquity interactivity global reach information density

ubiquity

If you want to determine the size of your website's audience, the metric you will use for the most accurate measurement will be: hits. unique visitors. page views. reach.

unique visitors.

Creating multiple variations of information goods and selling these to different market segments at different prices is called: versioning. bundling. customization. dynamic pricing.

versioning.

A(n) ________ market is one that provides expertise and products for a specific industry (i.e., automobiles). indirect buyer-biased horizontal vertical

vertical

Pinterest's Lens is an example of which of the following? visual search voice search SEO keyword advertising

visual search

The Spokeo case involved a claim for damages based on which of the following? Defend Trade Secrets Act Digital Millennium Copyright Act Fair Credit Reporting Act Anticybersquatting Consumer Protection Act

Fair Credit Reporting Act

________ typically attack governments, organizations, and sometimes individuals for political purposes. Tiger teams Hacktivists Crackers Bounty hunters

Hacktivists

The richness made possible by e-commerce technologies does which of the following? It allows consumers to become co-producers of the goods and services being sold. It enables worldwide customer service and marketing communications. It reduces the cost of delivering marketing messages and receiving feedback from users. It allows video, audio, and text to be integrated into a single marketing message and consuming experience.

It allows video, audio, and text to be integrated into a single marketing message and consuming experience.

What is the first step in developing an e-commerce security plan? Perform a security audit. Create a security organization. Perform a risk assessment. Develop a security policy.

Perform a risk assessment.

Which of the following statements about a free pricing strategy is not true? It is difficult to convert free customers into paying customers. The free pricing strategy was born in the early days of the Web. Free products and services can knock out potential and actual competitors. Free products and services can help build market awareness.

The free pricing strategy was born in the early days of the Web.


Set pelajaran terkait

Psychology 2 test also on march 10th :[

View Set

Foundations Level 1 Chapter 9.2 Vegetables

View Set

Chapter 20 - Macroeconomics Quiz

View Set

Peds Ch. 31 The Infant and Family

View Set

Chapter 7: Real Estate Appraisal TEST

View Set

Populations in Research Requiring Additional Considerations and/or Protections

View Set

Chapter 8 team leadership and self-managed teams

View Set