ECOM3 Midterm

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A(n) _______ allows user to easily add and edit content on a web page. A) wiki B) podcast C) blog D) RSS feed

A) wiki

A Trojan horse appears to be benign, but then does something other than expected 5.2

T

Which of the following IEEE standards provide for high-speed short-range Wi-Fi? A) 802.11ad B) 802.11ay C) 802.11ah D) 802.11af

A) 802.11ad

Which of the following is the core communications protocol for the Internet? A) Telnet B) FTP C) TCP/IP D) TLS

C) TCP/IP

Which of the following is another name for a revenue model? A) business model B) business strategy C) financial model D) financial statements

C) financial model

You could expect to find all of the following services in a Web server software package except: A) Security services B) FTP C) search engine D) an RSS aggregator

D) an RSS aggregator

A strategy designed to compete within a narrow market or product segment is called ______ strategy A) scope B) differentiation C) commoditization D) focus

D) focus

Real markets are imperfect

T

SCRUM is a type of agile development

T

SSL/TLS cannot provide irrefutability. 5.3

T

SaaS and PaaS providers can typically provide services at lower costs through scale economies.

T

The Heartbleed bug is an example of a software vulnerability. 5.2

T

The Internet of Things (IoT) is based on sensors that can collect data and connect to the Internet

T

The Java Runtime Environment is a frequent target of exploit kits.

T

The Jumpstart Our Business Startups (JOBS) Act, and issuance of enabling regulations by the Securities and Exchange Commision, allows a start-up company to use crowdfunding to solicit investors to invest in small and early-stage startups.

T

The Reinvention period of e-commerce is as much a sociological phenomenon as it is a technological or business phenomenon.

T

The SDLC methodology helps developers to understand the business objectives of a system and design an appropriate solution.

T

The U.S. federal government has historically not been in favor of the development and export of strong encryption systems. 5.3

T

The creation of Bitcoins consumes a significant amount of energy.

T

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software. 5.3

T

The fact that e-commerce is conducted on the basis of universal standards increases search costs for consumers.

T

The major hubs in the United States where the Internet backbone intersects with regional and local networks are now commonly referred to as Internet Exchange Points (IXPs).

T

The term latency refers to a delay that can be experienced in packet-switched networks.

T

The term unfit fitness refers to a situation in which employees of a firm have the wrong skills for the current environment.

T

There is a finite number of Bitcoins that can be created 5.5

T

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use. 5.1

T

Upgrading a server from a single processor to multiple processors is an example of scaling a site vertically

T

Using prebuilt templates is typically one of the most expensive choices when building an e-commerce site.

T

Web services are loosely coupled reusable software components based on XML and other open protocols and standards that enable an application to communicate with another application without requiring any custom programming

T

20) Ad blockers operate in a manner similar to which of the following? A) anti-virus software B) firewalls C) Flash cookies D) anonymous browsing

b

Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time A) global reach B) richness C) interactivity D) personalization

A) global reach

Business-to-consumer (B2C) e-commerce in the United States: A) grew at double-digit rates between 2010 and 2018 B) has less revenue than C2C e-commerce C) now constitutes over 50% of the overall U.S. retail market D) is growing mores slowly as it confronts its own fundamental limitations

A) grew at double-digit rates between 2010 and 2018

Which of the following refers to any disparity in relevant market information among parties in a transaction? A) information asymmetry B) unfair competitive advantage C) imperfect competition D) dynamic pricing

A) information asymmetry

In the ________ business model, a web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products, and establish prices. A) market creator B) community provider C) e-tailer D) portal

A) market creator

Unfair competitive advantage occur when: A) one competitor has an advantage that others cannot purchase B) market middlemen are displaced C) information is equally distributed and transaction costs are low D) firms are able to gather monopoly profits.

A) one competitor has an advantage that others cannot purchase

MySQL is which of the following? A) open source database software B) a scripting language embedded in HTML documents C) Web server software D) Web site analytics software

A) open source database software

In general, the key to becoming a successful content provider is to: A) own the content being provided B) own the technology by which content is created, presented, and distributed C) provide online content for free D) provide other services as well as online content

A) own the content being provided

Which of the following is an unfair competitive advantages? A) the firm's management team B) the firm's value proposition C) the firm's market opportunity D) the firm's market strategy

A) the firm's management team

Which of the following statements about Bitcoin is not true? A) The computational power required to mine Bitcoins has increased over time. B) Bitcoins are completely secure. C) Bitcoins are illegal in some countries. D) In 2018, Bitcoin reprsented just under 40% of the full market for cryptocurrencies. 5.5

B

Which of the following statements about blockchain is NOT true? A) A blockchain system is composed of a distributed network of computers. B) A blockchain system is inherently centralized. C) A blockchain system is a transaction processing system. D) Cryptocurrencies are based on blockchain technology 5.5

B

Which of the following is not element of friction-free commerce? A) Information is equally distributed B) Transaction costs are high C) Prices can be dynamically adjusted to reflect real demand D) Unfair competitive advantages are eliminated

B) Transaction costs are high

Which of the following statements is not true? A) Apple's Touch ID stores a digital replica of a user's actual fingerprint in Apple's iCloud. B) Biometric devices reduce the opportunity for spoofing. C) A retina scan is an example of a biometric device. D) Biometric data stored on an iPhone is encrypted 5.3

A

All of the following statements about Apple Pay are true except which of the following? A) Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions. B) Apple Pay is based on Touch ID biometric fingerprint scanning. C) Apple Pay can be used for mobile payments at the point of sale at a physical store. D) Apple Pay relies on NFC chip technology. 5.5

A

All of the following statements about Apple Pay are true except which of the following? A) Apple Pay is the most popular alternative payment method in the United States. B) Apple Pay is an example of a universal proximity mobile wallet. C) Apple Pay can be used for mobile payments at the point of sale at a physical store. D) Apple Pay has more users than either Google Pay or Samsung Pay. 5.5

A

Asymmetric key cryptography is also known as: A) public key cryptography. B) secret key cryptography. C) PGP. D) PKI 5.3

A

Bitcoins are an example of: A) digital cash. B) virtual currency. C) a stored value payment system. D) an EBPP system 5.5

A

Confidentiality is sometimes confused with: A) privacy. B) authenticity. C) integrity. D) nonrepudiation 5.1

A

Face ID is an example of which of the following? A) biometrics B) encryption C) IDS D) firewall 5.3

A

In 2013, the Target retail chain experienced which of the following? A) a large-scale data breach B) a DDoS attack that shut down its Web site C) a hacktivist attack to protest its wage policies D) a browser parasite 5.2

A

In 2016, Yahoo revealed that it had experienced which of the following? A) a high-prole data breach B) a DDoS attack that shut down its website C) a hacktivist attack to protest its employment policies D) a browser parasite 5.2

A

Online bill payments are believed to cost ________ to process compared to ________ for paper bills. A) 20 to 30 cents, $3 to $7 B) $1 to $2, $10 to $20 C) 3 to $7, 20 to 30 cents D) $10 to $20, $ 1 to $2 5.5

A

The overall rate of online credit card fraud is ________ of all online card transactions. A) less than 1% B) around 5% C) around 10% D) around 15% 5.2

A

The ______ helps define the overall structure of the Internet A) IAB B) IESG C) W3C D) ITU

A) IAB

Stickness is an important attribute for which of the following revenue models? A) advertising revenue model B) subscription revenue model C) transaction fee revenue model D) affiliate revenue model

A) advertising revenue model

All of the following are business models employed in the online music industry except: A) subscription B) peer-to-peer streaming C) download-and-own D) cloud streaming

B) peer-to-peer streaming

A firm's ________ describes how a firm will produce a superior return on invested capital. A) value proposition B) revenue model C) market strategy D) competitive advantage

B) revenue model

Which of the following are central directories that list all domain names currently in use for specific domains? A) Web servers B) root servers C) client servers D) DNS servers

B) root servers

All of the following are simple steps for optimizing web page content except: A) reducing unnecessary HTML comments B) segmenting computer servers to perform dedicated functions C) using more efficient graphics D) avoiding unnecessary links to other pages on the site

B) segmenting computer servers to perform dedicated functions

Which of the following are Amazon's primary value propositions? A) personalization and customization B) selection and convenience C) reduction of price discovery cost D) management of product delivery

B) selection and convenience

Which of the following was the original purpose of the Internet? A) to provide a network that would allow businesses to connect with consumers? B) to link large mainframe computers on different college campuses C) to develop a military communications system that could withstand nuclear war D) to enable government agencies to track civilian communications

B) to link large mainframe computers on different college campuses

Which of the following involves creating a skeleton version that focuses on functionality rather than design? A) web services B) wireframing C) Scurm D) DevOps

B) wireframing

The attack on Dyn Inc. in 2016 is an example of which of the following? A) SQL injection attack B) browser parasite C) DDoS attack D) MitM attack 5.2

C

The attack on Dyn, Twitter, Amazon, and other major organizations in October 2016, is an example of which of the following? A) SQL injection attack B) browser parasite C) DDoS attack D) MitM attack 5.2

C

All of the following may lead to a competitive advantages except: A) less expensive suppliers B) better employees C) fewer products C) superior products

C) fewer products

Which of the following is not a unique feature of e-commerce technology? A) interactivity B) social technology C) information asymmetry D) richness

C) information asymmetry

Beginning the e-commerce development process with a mobile presence rather than a desktop website is referred to as which of the following? A) RWD B) AWD C) mobile first design D) RESS

C) mobile first design

The Transport Layer of TCP/IP is responsible for which of the following? A) placing packets on and receiving them from the network medium B) addressing, packaging, and routing messages C) providing communication with the application by acknowledging and sequencing the packets to and from the application D) providing a variety of applications with the ability to access the services of the lower layers

C) providing communication with the application by acknowledging and sequencing the packets to and from the application

The total number of users or customers an e-commerce business can obtain is a measure of which of the following? A) ubiquity B) interactivity C) reach D) information density

C) reach

Where does TLS operate within TCP/IP? A) between the Internet Layer and the Transport Layer B) between the Transport Layer and the Application Layer C) between the Network Interface Layer and the Transport Layer D) between the Internet Layer and the Application Layer

B) between the Transport Layer and the Application Layer

Which of the following can be considered synonymous with the term e-commerce? A) e-business B) digital commerce C) the Internet D) the Web

B) digital commerce

Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers? A) network effect B) disintermediation C) friction-free commerce D) first mover advantage

B) disintermediation

Which of the following is an example of an e-commerce first mover that failed? A) Etsy B) eToys C) eBay D) E*Trade

B) eToys

Which of the following is not a primary activity in a firm value chain? A) outbound logistics B) finance accounting C) operations D) after-sales service

B) finance accounting

During which phase of the development of the Internet was the Domain Name System (DNS) introduced? A) commercialization phase B) institutional phase C) innovation phase D) consolidation phase

B) institutional phase

Interactivity in the context of the e-commerce provides which of the following functionalities? A) the ability to physically touch and manipulate a product B) complexity and content of a message C) the ability of consumers to create and distribute content D) the enabling of two-way communication between consumer and merchant

D) the enabling of two-way communication between consumer and merchant

Which element of the business model addresses what a firm provides that other firms do not and cannot? A) competitive environment B) competitive advantage C) market strategy D) value proposition

D) value proposition

Which type of investor typically becomes interested in a startup company after it has begun generating revenue? A) incubators B) angel investors C) crowdfunders D) venture capital investors

D) venture capital investors

A ______ marketplace supplies products and services of interest to particular industries A) perfect B) differentiated C) horizontal D) vertical

D) vertical

Zelle is an example of a P2P mobile payment app. 5.5

T

22) The percentage of all e-mail that is spam averaged around ________ in 2017. A) 55% B) 65% C) 75% D) 85%

a

33) Which of the following involves getting customers to pass along a company's marketing message to friends, family, and colleagues? A) affiliate marketing B) viral marketing C) native advertising D) lead generation marketing

b

36) Which of the following industries accounts for the highest percentage of spending on online advertising? A) financial services B) retail C) automotive D) entertainment

b

59) A ________ is a repository of customer information that records all contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer. A) customer service chat system B) CRM system C) data warehouse D) transactive content system

b

6) Approximately ________ of U.S. Internet users do not shop or buy online. A) 7% B) 8% C) 9% D) 11%

b

61) Which of the following provides web marketers with a very quick means of identifying a customer and understanding his or her behavior at a site? A) transaction logs B) cookies C) registration forms D) data warehouses

b

1) In 2017, almost ________ of the U.S. population regularly used the Internet. A) 45% B) 55% C) 75% D) 85%

d

14) Which of the following forms of online advertising is expected to grow the fastest between 2017 and 2021? A) paid search B) sponsorships C) search engines D) rich media

d

5) All of the following are online communications that are used to support the evaluation of alternatives stages of the consumer decision process except: A) search engines. B) online catalogs. C) social networks. D) targeted banner ads

d

52) Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users? A) ubiquity B) richness C) information density D) universal standards

d

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use: A) a firewall. B) an authorization management system. C) security tokens. D) an authorization policy 5.4

B

Which of the following dimensions of e-commerce security is not provided for by encryption? A) confidentiality B) availability C) message integrity D) nonrepudiation 5.3

B

Which of the following is an example of an online privacy violation? A) your e-mail being read by a hacker B) your online purchasing history being sold to other merchants without your consent C) your computer being used as part of a botnet D) your e-mail being altered by a hacker 5.1

B

Which of the following is the most common protocol for securing a digital channel of communication? A) DES B) SSL/TLS C) VPN D) HTTP 5.3

B

________ is the ability to identify the person or entity with whom you are dealing on the Internet. A) Nonrepudiation B) Authenticity C) Availability D) Integrity 5.1

B

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other? A) DES B) NFC C) IM D) text messaging 5.5

B near field communication

In 2018, the overall retail market in the United States was estimated to be about A) $53 trillion B) $5.3 trillion C) $530 billion D) $53 billion

B) $5.3 trillion

In order from beginning to end, the major steps in the SDLC are: A) systems analysis/planning; systems design; building the system; testing; and implementation. B) systems design; testing; building the system; and implementation. C) systems analysis/planning; systems design; building the system; implementation; and testing. D) systems analysis/planning; implementation; building the system; and testing.

A) systems analysis/planning; systems design; building the system; testing; and implementation.

Above all, e-commerce is a ________ phenomenon. A) technology driven B) finance-driven C) sociological D) government-driven

A) technology driven

All of the following can be considered a precursor to e-commerce except A) the development of the smartphone B) Baxter Healthcare's PC-based remote order entry system C) the French Minitel D) the development of Electronic Data Interchange standards

A) the development of the smartphone

Which of the following is not concern about IoT? A) the falling cost of sensors B) interoperability C) security D) privacy

A) the falling cost of sensors

Which of the following is NOT a key factor for establishing e-commerce security? A) data integrity B) technology C) organizational policies D) laws and industry standards 5.1

A

Which of the following is a prominent hacktivist group? A) Anonymous B) Anti-Phishing Working Group C) IC3 D) Symantec 5.2

A

Which of the following is not a major trend in e-commerce payments in 2014-2015? A) Mobile retail payment volume decreases. B) PayPal remains the most popular alternative payment method. C) Apple introduces Apple Pay. D) Payment by credit and/or debit card remains the dominant form of online payment. 5.1

A

________ is the ability to ensure that e-commerce participants do not deny their online actions. A) Nonrepudiation B) Authenticity C) Availability D) Integrity 5.1

A

The leading Web server software is: A) Apache. B) Microsoft Internet Information Server. C) Sun Solaris D) Google Enterprise Server.

A) Apache.

______ are a kind of middleware software that provides the glue connecting traditional corporate systems to the customer as well as all the functionally needed to conduct e-commerce A) Application servers B) Web page servers C) Database servers D) Content management servers

A) Application servers

Which of the following is not true about the mobile platform? A) Most smartphones use Intel chips. B) Smartphones and tablet computers are the primary means to access the Internet, both in the United States and worldwide. C) Most smartphones use either Google's Android or Apple's iOS operating systems. D) Smartphones use flash memory chips.

A) Most smartphones use Intel chips.

______ is a utility program that allows you to check the connection between your client and a TCP/IP network A) Ping B) Telnet C) Tracert D) Finger

A) Ping

Which of the following statements about responsive web design (RWD) is not true? A) RWD works best for sites that have complex functionality B) RWD tools include HTML5 and CSS3 C) RWD makes it possible to design a website that automatically adjusts its layout and display D) RWD can be costly

A) RWD works best for sites that have complex functionality

Which of the following protocols is used to send mail to a server? A) SMTP B) FTP C) HTTP D) SSL

A) SMTP

__________ is used to allow remote login on another computer A) Telnet B) FTP C) TTP D) SSL

A) Telnet

Which of the following statements about the Web is not true? A) The Web is the technology upon which the Internet is based. B) The Web was the original "killer app" C) The Web provides access to pages written in Hypertext Markup Language D) The Web is both a communications infrastructure and an information storage system.

A) The Web is the technology upon which the Internet is based.

Which of technologies used with wireless local area networks are: A) Wi-Fi and Bluetooth B) Wi-Fi and WiMax C) Bluetooth and 3G D) WiMax and 3G

A) Wi-Fi and Bluetooth

Which of the following organizations monitor Internet polices and practices? A) IETF B) ISOC C) W3C D) ICANN

B) ISOC

Applications for Android operating system-based smartphones are typically written in which of the following? A) Swift B) Java C) ActiveX D) ColdFusion

B) Java

The layer of Internet architecture that ties the applications to the communications network and includes such services as security and authentication is called the: A) Network Technology Substrate layer B) Middleware Services layer C) Transport Services and Representation layer D) Applications layer

B) Middleware Services layer

The first web browser to make it possible to view documents on the Web with colored background, images, and animations was: A) Netscape Navigator B) Mosaic C) Mozilla D) Internet Explorer

B) Mosaic

Cortana is a type of: A) intelligent digital assistant B) widget C) gadget D) social network

A) intelligent digital assistant

Which of the following monitors and controls access to a main web server, and implements firewall protection? A) proxy server B) list server C) groupware server D) mail server

A) proxy server

Which of the following refers to the complexity and content of a message? A) richness B) reach C) information density D) interactivity

A) richness

Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations? A) routers B) web servers C) IP servers D) packet servers

A) routers

What is the primary revenue model for an e-distributor? A) sales B) transaction fee C) advertising D) subscription

A) sales

________ technologies are technologies that enable the incremental improvement of products and services. A) sustaining B) Differentiating C) Disruptive D) Commodity

A) sustaining

Accessing data without authorization on Dropbox is an example of a: A) social network security issue. B) cloud security issue. C) mobile platform security issue. D) sniffing issue. 5.2

B

All of the following are examples of social/mobile peer-to-peer payment systems except: A) Venmo. B) Bill Me Later. C) Square Cash. D) Google Wallet. 5.5

B

All of the following are factors in contributing to the increase in cybercrime except: A) the ability to remotely access the Internet. B) the Internet's similarity to telephone networks. C) the ability to anonymously access the Internet. D) the Internet is an open, vulnerable design. 5.1

B

Shellshock is an example of which of the following? A) mobile malware B) software vulnerability C) botnet D) Trojan horse 5.2

B

Symmetric key encryption is also known as: A) public key encryption. B) secret key encryption. C) PGP. D) PKI. 5.3

B

The Data Encryption Standard uses a(n) ________-bit key. A) 8 B) 56 C) 256 D) 512 5.3

B

82) Which of the following is the most meaningful metric for video ads? A) view time B) CTR C) completion rate D) skip rate

c

In which year can e-commerce be said to have begun? A) 1983 B) 1985 C) 1995 D) 2001

c) 1995

Amazon Business is an example of which of the following business models? A) B2B service provider B) exchange c) e-distributor D) industry consortia

c) e-distributor

71) VTR measures the ________ response rate to an ad. A) 30-minute B) 24-hour C) 7-day D) 30-day

d

73) What kinds of ads have the lowest CTR? A) video ads B) e-mails to an in-house list C) social network display ads D) banner display ads

d

What type of Internet access technology are Google and Facebook hoping to use to provide Internet access to remote parts of the worlds? A) Bluetooth B) drones C) WLANs D) EDI

B) drones

All of the following statements about mobile apps are true except: A) mobile apps have usurped television as the most popular entertainment medium B) iOS apps are cross-platform, open-source applications C) over 200 billion apps have been downloaded from the Apple App store D) almost all the top 100 brands have a presence in at least on of the major app stores

B) iOS apps are cross-platform, open-source applications

The research firm Cybersource estimated that online credit card fraud in the United States amounted to about ________ in 2012. A) $35 million B) $350 million C) $3.5 billion D) $35 billion 5.5

C

Today, online bill payment accounts for ________ of all bill payments, while paper checks account for ________. A) less than 10%; less than 25% B) about 25%; about 10% C) more than 55%; less than 20% D) about 95%; about 5%

C

What is the first step in developing an e-commerce security plan? A) Create a security organization. B) Develop a security policy. C) Perform a risk assessment. D) Perform a security audit. 5.4

C

Which dimension(s) of security is spoofing a threat to? A) integrity B) availability C) integrity and authenticity D) availability and integrity 5.2

C

Which of the following countries has been found to have engaged in cyberespionage against Google? A) Russia B) China C) Iran D) Iraq 5.1

C

Which of the following did the Internet Advertising Bureau urge advertisers to abandon? A) HTML B) HTML5 C) Adobe Flash D) Adobe Acrobat 5.2

C

Which of the following is NOT an example of an access control? A) firewalls B) proxy servers C) digital signatures D) login passwords 5.3

C

Which of the following is the leading cause of data breaches? A) theft of a computer B) accidental disclosures C) hackers D) DDoS attacks 5.2

C

Which of the following left the WikiLeaks Web site effectively inoperable in August 2012? A) SQL injection attack B) browser parasite C) DDoS attack D) botnet 5.2

C

Which of the following statements about data breaches in 2017 is not true? A) According to the Identity Theft Resource Center, the number of breaches in 2017 increased by almost 45% from 2016. B) According to the Identity Theft Resource Center, over 50% of data breaches involved social security numbers. C) According to the Identity Theft Resource Center, employee error was the leading cause of data breaches. D) According to the Identity Theft Resource Center, data breaches involving the business sector represented over 55% of all breaches 5.2

C

All of the following are steps one can take to right-size a website's hardware platform and meet demands for service except: A) scaling hardware vertically B) scaling hardware horizontally C) replacing static pages with dynamically generated pages D) improving processing architecture

C) replacing static pages with dynamically generated pages

Portals primarily generate revenue in all of the following ways except: A) charging advertisers for ad placement B) collecting transaction fees C) sales of goods D) charging subscription fees

C) sales of goods

Which of following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers? A) website B) e-mail C) social media D) offline media

C) social media

A _______ is networked business ecosystem that coordinates a firm's suppliers, distributors, and delivery firms with its own production needs using an internet-based supply chain management system. A) value chain B) value system C) value web D) business strategy

C) value web

According to Ponemon Institute's 2017 survey, which of the following was not among the causes of the most costly cybercrimes? A) malicious insiders B) malicious code C) denial of service D) botnets 5.2

D

All of the following are examples of malicious code except: A) viruses. B) bots. C) worms. D) sniffers. 5.2

D

All of the following are methods of securing channels of communication except: A) SSL/TLS. B) digital certificates. C) VPN. D) FTP. 5.

D

All of the following are prominent hacktivist groups except: A) Anonymous. B) LulzSec. C) Impact Team. D) Avid Life 5.2

D

All of the following are used for authentication except: A) digital signatures. B) certificates of authority. C) biometric devices. D) packet filters. 5.3

D

An intrusion detection system can perform all of the following functions except: A) examining network traffic. B) setting off an alarm when suspicious activity is detected. C) checking network traffic to see if it matches certain patterns or preconfigured rules. D) blocking suspicious activity. 5.3

D

Most of the world's spam is delivered via which of the following? A) viruses B) worms C) Trojan horses D) botnets 5.2

D

Which of the following is NOT a key point of vulnerability when dealing with e-commerce? A) the client computer B) the server C) the communications pipeline D) the credit card companies 5.2

D

________ typically attack governments, organizations, and sometimes individuals for political purposes. A) Crackers B) White hats C) Grey hats D) Hacktivists 5.2

D

It is estimated that by 2022, the size of the B2B market will reach: A) $730 million B) &7.3 billion C) $730 billion D) 7.3 trillion

D) $7.3 trillion

In 2018, there were more than ________ Internet hosts. A) 1 million B) 10 million C) 100 million D) 1 billion

D) 1 billion

An IPv4 address is expressed as a: A) 32-bit number that appears as a serious of four separate numbers separated by semicolons B) 64-bit number that appears as a serious of four separate numbers separated by semicolons C) 64-bit number that appears as a serious of four separate numbers separated by periods D) 32-bit number that appears as a serious of four separate numbers separated by periods

D) 32-bit number that appears as a serious of four separate numbers separated by periods

Which of the following is not a mobile message application? A) Kik B) WhatsApp C) Viber D) Feedly

D) Feedly

Which of the following is not a basic type of cloud computing service? A) IaaS B) PaaS C) SaaS D) FiOS

D) FiOS

The concept behind document formatting had its roots in which of the following? A) XML B) SGML C) HTML D) GML

D) GML

Which of the following is a platform of B2B e-commerce? A) Airbnb B) Facebook C) Groupon D) Go2Paper

D) Go2Paper

Which of the following cannot be used to retrieve objects from a database? A) CGI B) ASP C) JSP D) HTML

D) HTML

The ________ is a consortium of coporations, government agencies, and nonprofit organization that monitors Internet polices and practices. A) Internet Engineering Steering Group (IESG) B) World Wide Web Consortium (W3C) C) Internet Engineering Task Force (IETF) D) Internet Society (ISOC)

D) Internet Society (ISOC)

Which of the following is not a characteristic of a perfect competitive market? A) Price, cost and quality information are equally distributed B) A nearly infinite set of suppliers compete against one another C) Customers have access to all relevant information worldwide D) It is highly regulated

D) It is highly regulated

_______ is a programming language invented by Netscape used to control the objects on an HTML page and handle interactions with the browser A) VBScript B) ActiveX C) ColdFusion D) JavaScript

D) JavaScript

Which of the following describes the basic web policy of large firms during the Invention period? A) Integrate social networks and the mobile platform with website marketing B) Emphasize the necessity for the Web to generate profits. C) Use the Web to sell complex goods and service online. D) Maintain a basic, static website depicting the firm's brand.

D) Maintain a basic, static website depicting the firm's brand.

Which of the following is an example of the affiliate revenue model? A) Scribd B) eBay C) L.L. Bean D) MyPoints

D) MyPoints

Which of the following occurred during the Commercialization phase of Internet development? A) The fundamental building blocks of the internet were realized in actual hardware and software B) Personal computers were invented C) The Domain Name system was introduced D) NSF privatized the operation of the internet

D) NSF privatized the operation of the internet

Which of the following is a programming language introduced by Apple specifically for developing iOS applications? A) Objective-C B) C C) C++ D) Swift

D) Swift

Which of the following is not true regrading e-commerce today? A) Economists' visions of a friction-free market have not been realized B) Consumers are less price-sensitive than expected C) There remains considerable persistent price dispersion D) The market middlemen disappeared

D) The market middlemen disappeared

Which of the following is a utility program that allows you to track the path of a message A) Telnet B) Ping C) IMAP D) Tracert

D) Tracert

All of the following can be considered examples of the market creator business model except: A) eBay B) Priceline C) Uber D) Twitter

D) Twitter

Which of the following does not use a subscription revenue model? A) Apple Music B) eHarmony C) Ancestry D) Twitter

D) Twitter

All of the following use an advertising revenue model except: A) Facebook B) Yahoo C) Google D) Walmart

D) Walmart

Scale economies are efficiencies that result from increasing the size of the business

T

Slow followers are sometimes more successful than first movers.

T

Smishing attacks exploit SMS messages.

T

Spoofing involves attempting to hide a true identity by using someone else's e-mail or IP address. 5.2

T

Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address 5.2

T

T1 and T3 refer to international telephone standards for digital Internet

T

The Internet is a worldwide system of computer networks.

T

WannaCry is an example of ransomware 5.2

T

4) What is the approximate Internet penetration rate for individuals that have attained less than a high-school education? A) 58% B) 68% C) 78% D) 88%

b

13) Google introduced which of the following changes to its search algorithm to weed out low quality sites from search results? A) Penguin B) Hummingbird C) Panda D) Knowledge Graph

c

19) Amazon's Associates program is an example of which of the following? A) viral marketing B) local marketing C) affiliate marketing D) lead generation marketing

c

58) ________ is an open source database that can store and analyze both structured and unstructured data. A) ASP B) PHP C) Hadoop D) JSP

c

A private cloud is operated for the benefit of a multiple firms.

F

A security hole known as Shellshock enabled hackers to target JavaScript running on Apache web servers

F

A value proposition defines how a company's product or service will generate revenue for the firm.

F

A worm needs to be activated by a user in order for it to replicate itself. 5.2

F

An HTML5 app is one designed to specifically operate using a mobile device's hardware and operating system.

F

Bluetooth is a high-speed, fixed broadband wireless local area network for commercial and residential use.

F

Bluetooth is the primary enabling technology for mobile wallets. 5.5

F

Credit cards are the dominant form of online payment throughout the world. 5.5

F

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties. 5.5

F

IMAP is the Internet protocol used by a browser to transfer web pages.

F

In the subscription revenue, a company primarily generates income from display of ads.

F

On-demand service companies are characterized by the free sharing of resources between the company and consumers.

F

Price dispersion has been eliminated in e-commerce

F

Social technologies change industry structure by weakening powerful sales channels and shifts bargaining power to consumers.

F

Storing HTML pages in RAM rather than on a server's hard drive is an expensive way to fine-tune the processing architecture of a website.

F

TLS does not guarantee server-side authentication. 5.3

F

The Internet has shown similar growth patterns as other electronic technologies of the past.

F

The Internet's universal standard have changed industry structure by increasing barriers to entry and decreasing competition withing an industry

F

The United States has the world's highest average Internet connection speed.

F

The emergence of mobile, social, and local e-commerce occurred during the Consolidation period of e-commerce.

F

Ubiquity increases the cognitive energy required to transact in a marketspace.

F

Universal standards make price discovery more costly, slower, and less accurate.

F

WLAN-based Internet access derives from the same technological foundations as telephone-based wireless Internet access

F

81) Which of the following measures the percentage of e-mails that could not be delivered? A) abandonment rate B) unsubscribe rate C) bounce-back rate D) attrition rate

c

Google Cardboard is an example of which of the following? A) virtual reality B) artificial intelligence C) augmented reality D) chatbot

A) virtual reality

Which of the following is not one of the basic business objectives for an e-commerce site? A) display goods B) execute a transaction C) provide production and supplier links D) optimize system architecture

D) optimize system architecture

In the address http://www.company.com/clients.html, which of the following is the top-level domain? A) .com B) company.com C) www D) http

A) .com

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network. A) firewall B) virtual private network C) proxy server D) PPTP 5.3

A

A digital certificate contains all of the following except the: A) subject's private key. B) subject's public key. C) digital signature of the certification authority. D) digital certificate serial number 5.3

A

All of the following statements about Apple Pay are true except which of the following? A) Apple Pay is available for both iPhone 5s and iPhone 6s. B) Apple Pay is based on Touch ID biometric fingerprint scanning. C) Apple Pay can be used for mobile payments at the point of sale at a physical store. D) Apple Pay relies on the consumer having a credit card on file with Apple's iTunes. 5.5

A

P2P payment systems are a variation on what type of payment system? A) stored value payment system B) digital checking system C) accumulating balance system D) digital credit card system 5.5

A

PayPal is an example of what type of payment system? A) online stored value payment system B) digital checking system C) accumulating balance system D) digital credit card system 5.5

A

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: A) spyware. B) a backdoor. C) browser parasite D) adware. 5.2

A

The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and: A) confidentiality. B) usability. C) functionality. D) viability. 5.1

A

Which of the following is not a major trend in e-commerce payments in 2018-2019? A) Mobile retail payment volume decreases. B) PayPal remains the most popular alternative payment method. C) Large banks enter the mobile wallet and P2P payments market. D) Payment by credit and/or debit card remains the dominant form of online payment. 5.5

A

Which of the following was designed to cripple Iranian nuclear centrifuges? A) Stuxnet B) Shamoon C) Snake D) Storm 5.2

A

________ is the ability to ensure that messages and data are only available to those authorized to view them. A) Confidentiality B) Integrity C) Privacy D) Availability 5.1

A

Which of the following statements about cloud computing is not true? A) A public cloud is typically used by companies with stringent privacy and security requirements B) Dropbox is an example of a public cloud C) Hybrid clouds offer both public and private cloud options D) A private cloud may be hosted internally or externally

A) A public cloud is typically used by companies with stringent privacy and security requirements

Which of the following is an example of a e-business? A) Amazon's inventory control system B) the Amazon.com website C) an Amazon mobile app D) Amazon's Pinterest page

A) Amazon's inventory control system

_______ provides a set of standards for communicating between browser and a program running on a server that allows for interaction between user and server A) CGI B) ColdFusion C) JavaScript D) VBScript

A) CGI

Which of the following best describes the early years of e-commerce? A) They were a technological success but a mixed business success. B) They were a technological success but a business failure. C) They were a technological failure but a business success. D) They were a mixed technological and business success.

A) They were a technological success but a mixed business success.

The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called: A) VoIP B) IPTP C) VTP D) IP

A) VoIP

All of the following are platforms for C2C e-commerce except: A) Walmart B) Facebook Marketplace C) Craigslist D) Etsy

A) Walmart

The early years of e-commerce were driven by all of the following factors except: A) an emphasis on exploiting traditional distribution channels. B) a huge infusion of venture capital funds. C) an emphasis on quickly achieving very high market visibility D) visions of profiting from new technology

A) an emphasis on exploiting traditional distribution channels.

What are the two most important management challenges in building a successful e-commerce presence? A) developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives B) having an accurate understanding of your business environment and an achievable business plan C) building a team with the right skill sets and closely managing the development process D) identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site

A) developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

E-commerce can be defined as: A) digitally enabled commercial transactions between and among organizations and individuals. B) the use of digital technologies in a firm's daily activities. C) the digital enablement of transactions and processes within an organization. D) any electronically based organizational activity that supports a firm's market exchanges.

A) digitally enabled commercial transactions between among

If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would: A) enable individual customization of the product by consumers B) implement a strategy of commoditization C) adopt a strategy of cost competition D) develop a scope strategy to compete within a narrower market segment

A) enable individual customization of the product by consumers

Which of the following is not a main factor in determining the overall demand on all e-commerce site? A) file sizes of web pages being served B) number of simultaneous users in peak periods C) speed of legacy applications that are needed to supply data to web pages D) whether content is dynamic or static

A) file sizes of web pages being served

Which of the following are the two main components of a systems design? A) logical design and physical design B) behavioral design and technological design C) business objectives and technology requirements D) front-end systems and back-end systems

A) logical design and physical design

Which of the following is a set of rules for transferring data? A) protocol B) packet C) router D) IP address

A) protocol

Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text? A) richness B) ubiquity C) information density D) personalization

A) richness

All of the following statements about e-commerce in the United States in 2018 are true except: A) social e-commerce generated more revenue than mobile e-commerce B) mobile advertising accounted for over 70% of all digital advertising spending C) on-demand service firms fueled the growth of local e-commerce D) growth rates for retail e-commerce were higher in the Middle East than in the United States

A) social e-commerce generated more revenue than mobile e-commerce

A _____ refers to a competitive strategy in which firms attempt to achieve lower business process costs A) strategy of cost competition B) scope strategy C)customer intimacy strategy D) focus/market niche strategy

A) strategy of cost competition

Which of the following gives a business model the most credibility with outside investors? A) the firm's management team B) the firm's value proposition C) the firm's market opportunity D) the firm's market strategy

A) the firm's management team

A perfect market is one in which: A) there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production B) one firm develops an advantages based on a factor of production that other firms cannot purchase C) one participant in the market has more resources than the others D) competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage.

A) there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production

The basic value proposition of community providers is: A) they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests. B) they offer consumers valuable, convenient, time-saving, and low cost alternatives to traditional service providers. C) they create a digital electronic environment for buyers and sellers to meet, agree on a price, and transact. D) they increase customers' productivity by helping them get things done faster and more cheaply.

A) they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.

In 2018, about __________ of Americans accessed the Internet solely via a mobile device. A) 8% B) 16% C) 28% D) 34%

B) 16%

The world's online population was estimated to be around ________ in 2018. A) 360 million B) 3.6 billion C) 36 billion D) 360 billion

B) 3.6 billion

Which of the following is a server-side technique that detects the attributes of the device making the request, and using predefined templates, loads a version of a site optimized for the device? A) LAMP B) AWD C) mobile first design D) RoR

B) AWD

Which of the following is an example of an on-demand service company? A) Youtube B) Airbnb C) Tumblr D) Facebook

B) Airbnb

Which of the following uses a subscription revenue model for books? A) Spotify B) Amazon kindle Unlimited C) Rhapsody D) Pandora

B) Amazon kindle Unlimited

All of the following are features of WPA3 except: A) it implements a more robust key exchange protocol. B) it enables the creation of a VPN. C) it provides a more secure way to connect IoT devices. D) it features expanded encryption for public networks 5.3

B

All of the following are limitations of the existing online credit card payment system except: A) poor security. B) cost to consumers. C) cost to merchant. D) social equity 5.5

B

All of the following statements about public key cryptography are true except: A) public key cryptography uses two mathematically related digital keys B) public key cryptography ensures authentication of the sender. C) public key cryptography does not ensure message integrity. D) public key cryptography is based on the idea of irreversible mathematical functions 5.3

B

Angler is an example of: A) a worm. B) an exploit kit. C) phishing. D) hacktivism 5.2

B

Beebone is an example of which of the following? A) worm B) botnet C) phishing D) hacktivism 5.2

B

Botnets are typically used for all of the following except: A) DDoS attacks. B) phishing attacks. C) storing network traffic for analysis. D) stealing information from computers. 5.2

B

Conficker is an example of a: A) virus. B) worm. C) Trojan horse. D) botnet 5.2

B

In May 2014, the U.S. Department of Justice indicted five army members from which of the following countries for conducting industrial espionage against U.S. Steel and Westinghouse? A) Russia B) China C) Iran D) Iraq 5.1

B

In the United States, the primary form of online payment is: A) PayPal. B) credit cards. C) debit cards. D) Google Wallet. 5.5

B

Linden Dollars, created for use in Second Life, are an example of: A) digital cash. B) virtual currency. C) EBPP. D) peer-to-peer payment systems. 5.5

B

PCI-DSS is a standard established by which of the following? A) the banking industry B) the credit card industry C) the federal government D) the retail industry 5.5

B

Reventon is an example of: A) a macro virus. B) ransomware. C) a backdoor. D) a bot program. 5.2

B

Rustock is an example of which of the following? A) worm B) botnet C) phishing D) hacktivism 5.2

B

What is the most frequent cause of stolen credit cards and card information today? A) lost cards B) the hacking and looting of corporate servers storing credit card information C) sniffing programs D) phishing attacks 5.2

B

Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012? A) anti-virus software B) two-factor authentication C) SSL/TLS D) firewall 5.2

B

Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet? A) HTTP B) BGP C) FTP D) SMTP

B) BGP

Ruby on Rails is based on which of the following philosophies? A) SLDC B) CoC C) LAMP D) Ajax

B) CoC

Which of the following companies uses a transaction fee revenue model? A) Yahoo B) E*Trade C) Twitter D) Birchbox

B) E*Trade

Which of the following is not an advantage of client/server computing over centralized mainframe computing? A) It is easy to expand capacity by adding servers and clients B) Each client added to the network increases the network's overall capacity and transmission speed C) Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer D) There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down

B) Each client added to the network increases the network's overall capacity and transmission speed

Which of the following statement is not true? A) No single academic perspective dominates research about e-commerce? B) Economists take a purely technical approach to e-commerce. C) There are two primary approaches to e-commerce: behavioral and technical. D) Management scientists are interested in e-commerce as an opportunity to study how business firms can exploit the Internet to achieve more efficient business operations.

B) Economists take a purely technical approach to e-commerce.

Which of the following is not one of the basic technological foundations of the Internet? A) client/server computing B) FTP C) TCP/IP D) packet switching

B) FTP

Which of the following is an example of a company using the content provider model? A) Priceline B) Netflix C) Dell D) eBay

B) Netflix

Which of the following is a standard that makes it possible to access data from any application regardless of the database and operating system software being used? A) CGI B) ODBC C) MYSQL D) HTTP

B) ODBC

Which of the following statements about the mobile platform is not true? A) Over 91% of Americans used a mobile device to access the Internet at least some of the time in 2018. B) Over 220 Americans used table computer apps in 2018. C) M-commerce purchases were expected to reach almost $280 billion in 2018 D) The time U.S. adults spend using mobile apps accounts for over 60% of total digital minutes spent.

B) Over 220 Americans used tablet computer apps in 2018

Django is based on which of the following? A) PHP B) Python C) Perl D) Ruby on Rails

B) Python

Which of the following is not a major business trend in e-commerce in 2018-2019? A) Mobile e-commerce continues to grow. B) Retail e-commerce revenues exceed B2B e-commerce revenues for the first time. C) On-demand service companies garner multibillion-dollar valuations. D) Social e-commerce continues to grow.

B) Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.

The concept of a "sprint" is related to which of the following development methodologies? A) prototyping B) Scrum C) component-based development D) DevOps Apache

B) Scrum

Which of the following is used to process certificates and private/public key information? A) HTTP B) Secure Sockets Layer/Transport Layer Security C) File Transfer Protocol D) data capture tools

B) Secure Sockets Layer/Transport Layer Security

__________ are the types of information systems capabilities needed to meet business objectives A) Information requirements B) System functionalities C) System design specifications D) Physical design specifications

B) System functionalities

Which of the following was the original "killer app" that made the Internet commercially interesting and extraordinarily popular? A) e-commerce B) The Web C) social networks D) mobile apps

B) The Web

The address used by a browser to identify the location of content on the Web is called: A) a domain name B) a uniform resource locator C) an IP address D) a file path

B) a uniform resource locator

The backbone of the Internet is formed by: A) Internet Exchange Points (IXPs) B) Tier 1 ISPs C) Network Access Points (NAPs) D) Metropolitan Area Exchanges (MAEs)

B) Tier 1 ISPs

Which of the following is not true about the use of apps? A) Users spend nearly 90% of their smartphone app minutes using their top five apps. B) Users still spend less time using apps than they do using desktops or mobile websites. C) Apps are easier to control and monetize than websites. D) Users typically use about 20 different apps per month.

B) Users still spend less time using apps than they do using desktops or mobile websites.

______ and _____ are typically the most easily identifiable aspects of a company's business model. A) market strategy; market opportunity B) Value proposition; revenue model C) Competitive advantages; competitive environment D) Revenue model; market opportunity

B) Value proposition; revenue model

Which of the following verifies that the business objectives of the system are in fact working? A) system testing B) acceptance testing C) unit testing D) implementation testing

B) acceptance testing

The Internet Layer of TCP/IP is responsible for which of the following? A) placing packets on and receiving them from the network medium B) addressing, packaging, and routing messages C) providing communication with the application by acknowledging and sequencing the packets to and from the application D) providing a variety of applications with the ability to access the services of the lower layers

B) addressing, packaging, and routing messages

A wealthy individual who invests personal funds in a startup in exchange for an equity share in the business is referred to as a(n)" A) incubator B) angel investor C) venture capital investor D) crowdfunder

B) angel investor

Which element of the business model refers to the presence of substitute products in the market? A) value proposition B) competitive environment C) competitive advantage D) market opportunity

B) competitive environment

The primary way a website is able to personalize the content presented to a visitor is through the use of: A) privacy polices B) cookies C) accessibility rules D) site management tools

B) cookies

Which of the following basic system functionalities is used to display goods on a website? A) product database B) digital catalog C) shopping cart system D) customer database system

B) digital catalog

Over the past decade, the number of exchanges has: A) greatly increased B) diminished sharply C) stayed about the same D) increased slowly but steadily

B) diminished sharply

Which of the following may offer its customers value chain management software? A) e-distributors B) e-procurement companies C) exchanges D) community providers

B) e-procurement companies

All of the following are issues facing Pinterest except A) copyright infringement B) inability to retain users C) spam D) scams

B) inability to retain users

Which of the following typically includes a data flow diagram (DFD) to describe the flow of information for an e-commerce site? A) physical design B) logical design C) testing plan D) co-location plan

B) logical design

All of the following are basic functionality provided by e-commerce merchant server software except: A) a product catalog B) marketing analytics C) a shopping cart D) credit card processing

B) marketing analytics

Which of the following is a physical place you visit in order to transact? A) marketspace B) marketplace C) social network D) the Internet

B) marketplace

Building which of the following is the least expensive path to creating a mobile presence? A) native app B) mobile website C) mobile web app D) hybrid HTTP

B) mobile website

Which form of testing compares a control page with one that is very different? A) template test B) new concept test C) funnel test D) system test

B) new concept test

Which of the following enables Internet users to communicate with each other, although not in real time? A) mobile messaging B) online forum C) SMS messaging D) VoIP

B) online forum

Which of the following is the best definition of transaction cost? A) the expense of changing national or regional prices B) the cost of participating in a market C) the cost of finding suitable products in the market D) the cost merchants pay to bring their goods to market

B) the cost of participating in a market

The existence of many competitors in any one market segment may indicate: A) an untapped market niche B) the market is saturated C) no one firm has differentiated itself within that market D) a market that has already been tried without success

B) the market is saturated

The term stateless refers to the fact that: A) no one government entity controls the Internet B) the server does not have to maintain an ongoing dedicated interaction with the client computer C) system performance degrades as more simultaneous users require service D) web servers may maintain multiple instances of server software to handle requests

B) the server does not have to maintain an ongoing dedicated interaction with the client computer

First movers often fail because: A) their competitive advantage is unfair B) they lack complementary resources needed to sustain their advantages C) they are operating in a perfect market D) they fail to leverage their competitive assets

B) they lack complementary resources needed to sustain their advantages

The financial services, travel services, and job placement services industries typically use the ______ business model. A) community provider B) transaction broker C) market creator D) e-tailer

B) transaction broker

Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders? A) single-tier architecture B) two-tier architecture C) three-tier architecture D) multi-tier architecture

B) two-tier architecture

Which of the following is a simple but powerful method for strategizing about a business? A) benchmarking B) SLDC C) SWOT analysis D) DevOps

C) SWOT analysis

According to Symantec, almost half of the e-mail addresses involved in business e-mail compromise (BEC) phishing that it analyzed had an IP address originating in: A) China. B) Russia. C) Nigeria. D) North Korea. 5.2

C

According to the Identity Theft Resource Center, the number of data breaches in 2017 increased by ________ compared to 2016. A) 15% B) 45% C) 55% D) 75% 5.1

C

All of the following are examples of cryptocurrencies except: A) Ethereum. B) Ripple. C) Zelle. D) Monero. 5.5

C

All of the following experienced high-profile data breaches in 2015 except: A) CVS. B) Walgreens. C) Amazon. D) Experian. 5.2

C

All of the following statements about PKI are true except: A) the term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties. B) PKI is not effective against insiders who have a legitimate access to corporate systems including customer information. C) PKI guarantees that the verifying computer of the merchant is secure. D) the acronym PKI stands for public key infrastructure. 5.3

C

All the following statements about symmetric key cryptography are true except: A) in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message. B) the Data Encryption Standard is a symmetric key encryption system. C) symmetric key cryptography is computationally slower. D) symmetric key cryptography is a key element in digital envelopes. 5.3

C

Automatically redirecting a web link to a different address is an example of which of the following? A) sniffing B) social engineering C) pharming D) DDoS attack 5.2

C

In 2015, online bill payment accounted for ________ of all bill payments, while paper checks accounted for ________. A) less than 10%; less than 25% B) about 25%; about 10% C) more than 50%; less than 20% D) 100%; 0% 5.5

C

Malware that comes with a downloaded file that a user requests is called a: A) Trojan horse. B) backdoor. C) drive-by download. D) PUP 5.2

C

Malware that comes with a downloaded file that a user requests is called a: A) Trojan horse. B) backdoor. C) drive-by download. D) PUP. 5.2

C

Most of the world's malware is delivered via which of the following? A) viruses B) worms C) Trojan horses D) botnets 5.2

C

Next generation firewalls provide all of the following except: A) an application-centric approach to firewall control. B) the ability to identify applications regardless of the port, protocol, or security evasion tools used. C) the ability to automatically update applications with security patches. D) the ability to identify users regardless of the device or IP address. 5.3

C

None of the following payment systems offers immediate monetary value except: A) personal checks. B) credit cards. C) stored value/debit card. D) accumulating balance 5.5

C

Online bill payment now accounts for ________ of all bill payments. A) 10% B) 25% C) 50% D) 100% 5.5

C

Proxy servers are also known as: A) firewalls. B) application gateways. C) dual home systems. D) packet filters. 5.3

C

Which of the following is not an example of a potentially unwanted program (PUP)? A) adware B) browser parasite C) drive-by download D) spyware 5.2

C

Which of the following is the current standard used to protect Wi-Fi networks? A) WEP B) TLS C) WPA2 D) WPA3 5.3

C

Which of the following statements is NOT true? A) A majority of states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred. B) The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers. C) The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates. D) The Federal Trade Commission has asserted that it has authority over corporations' data security practices. 5.4

C

Which of the following statements is not true? A) A VPN provides both confidentiality and integrity. B) A VPN uses both authentication and encryption. C) A VPN uses a dedicated secure line. D) The primary use of VPNs is to establish secure communications among business partners 5.3

C

________ is the ability to ensure that an e-commerce site continues to function as intended. A) Nonrepudiation B) Authenticity C) Availability D) Integrity 5.1

C

During which period of time did the Institutionalization phase of Internet development take place? A) 1950-1960 B) 1961-1974 C) 1975-1995 D) 1995-through the present

C) 1975-1995

Which of the following is not considered a portal? A) Yahoo B) MSN C) Amazon D) AOL

C) Amazon

Which of the following is not a community provider? A) LinkedIn B) Facebook C) Blue Nile D) Pinterest

C) Blue Nile

Which of the following is not an example of the bricks-and-clicks e-tailing business model? A) Walmart B) Target C) Bluefly D) Staples

C) Bluefly

Which of the following was the most popular web browser as of August 2018? A) Internet Explorer B) Safari C) Chrome D) Firefox

C) Chrome

Django follows the ________ programming principle. A) CoC B) WYSIWYG C) DRY D) LAMP

C) DRY

All of the following are examples of open source CMSs except: A) Joomla B) Drupal C) Dreamweaver CC D) WordPress

C) Dreamweaver CC

Which of the following statements about mobile websites is not true? A) Mobile websites run on a firm's servers, just like a traditional website B) Mobile websites can be built using standard web tools such as server-side HTML, Linux, PHP and SQL C) Generally, mobile websites operate more quickly than traditional websites viewed on a desktop computer connected to a broadband office network D) Most large firms today have mobile websites

C) Generally, mobile websites operate more quickly than traditional websites viewed on a desktop computer connected to a broadband office network

______ is defined by company using its competitive advantages to gain in surrounding markets. A) Market strategy B) Differentiation C) Leverage D) Focus

C) Leverage

All of the following either currently, or have plans to, offer Internet access via satellite except: A) Facebook B) Dish C) Microsoft D) Boeing

C) Microsoft

Which of the following is not part of the LAMP open source web development model? A) Linux B) Apache C) Microsoft IIS D) PHP

C) Microsoft IIS

Which of the following statement is not true? A) Information asymmetries are continually being introduced by merchants and marketers. B) Intermediaries have not disappeared. C) Overall transaction costs have dropped dramatically. D) Brands remain very important in e-commerce.

C) Overall transaction costs have dropped dramatically.

Which of the following is the most commonly used server-side scripting language A) Ruby on Rails B) Django C) PHP D) Perl

C) PHP

___________ was the first truly large-scale digitally enabled transaction system in the B2C arena. A) Telex B) The Baxter Healthcare system C) The French Minitel D) Eelectronic Data Interchange (EDI)

C) The French Minitel

Which of the following statements about Foursquare is not true? A) Foursquare combines a social network business model with location-based technology B) Foursquare initially struggled to find profitability C) The growth in Foursquare's revenue since 2015 has been driven primarily by significant increases in the numbers of users of its Swarm app D) Foursquare's users are typically amenable to having their location tracked and their data collected, since tracking users' location is the express purpose of the app.

C) The growth in Foursquare's revenue since 2015 has been driven primarily by significant increases in the numbers of users of its Swarm app

Which of the following statements is true about the traditional tradeoff between the richness and reach of a marketing message prior to the development of the Web? A) Marketing messages had little richness B) The smaller the audience reached, the less rich the message C) The lager the audience reached, the less rich the message D) Richness was unrelated to reach

C) The lager the audience reached, the less rich the message

TCP/IP operates in which layer of Internet architecture? A) Network Technology Substrate layer B) Middleware Services layer C) Transport Services and Representation Standards layer D) Applications layer

C) Transport Services and Representation Standards layer

All of the following are examples of social networks except: A) Instagram B) Twitter C) Y Combinator D) Pinterest

C) Y Combinator

All of the following are key design principles of responsive web design except: A) flexible grid-based layouts B) media queries C) coding by convention D) flexible images and media

C) coding by convention

The early years of e-commerce are considered: A) the most promising time in history for the successful implementation of first mover advantages. B) an economist's dream come true, where for a brief time consumers had access to all relevant market information and transaction costs plummeted. C) a stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year. D) a dramatic business success as 85% of dot-coms formed since 1995 became flourishing businesses.

C) a stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year.

Which system functionality must your website have to able to personalize or customize a product for a client? A) an ad server B) a site tracking and reporting system C) an inventory management system D) customer on-site tracking

C) an inventory management system

The process of comparing a website with that of its competitors in terms of response speed, quality of layout, and design is known as: A) split testing B) funnel testing C) benchmarking D) system testing

C) benchmarking

Which of the following is a characteristic of Consolidation phase of e-commerce? A) predominance of pure online strategies B) emphasis on revenue growth versus profits C) brand extension and strengthening becomes more important than creating new brands D) shift to a technology-driven approach

C) brand extension and strengthening becomes more important than creating new brands

All of the following are major social trends in e-commerce in 2018-2019 except for: A) concerns about the flood of temporary, poorly paid jobs without benefits being generated by on-demand service companies. B) concerns over commercial and governmental privacy invasion. C) concerns about the U.S. supreme Court ruling that online business do not need to collect state sales tax. D) concerns about the increasing market dominance of Facebook, Amazon, and Google.

C) concerns about the U.S. supreme Court ruling that online business do not need to collect state sales tax.

eBay uses all of the following business models except: A) B2C market creator B) C2C market creator C) content provider D) e-commerce infrastructure provider

C) content provider

All of the following are basic information requirements for a product database except: A) product descriptions B) stock numbers C) customer ID numbers D) inventory levels

C) customer ID numbers

The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade. A) increased dramatically B) increased moderately C) decreased dramatically D) decreased slightly

C) decreased dramatically

Which of the following is a characteristic of e-commerce during the Invention period? A) mobile technology B) earnings and profit emphasis C) disintermediation D) extensive government surveilance

C) disintermediation

Innovative enterpreneurs and their business firms that destroy existing business models are referred to as: A) crowdfunders B) venture capitalists C) disruptors D) angel investors

C) disruptors

The ________ allows a natural language expression, such as Google.com to represent a numeric IP address. A) uniform resource locator system B) Internet protocol addressing schema C) domain name system D) assigned numbers and names (ANN) system

C) domain name system

Ariba is an example of a e-procurement firm A) e-distributor B) portal C) e-procurement firm D) Industry consortium

C) e-procurement firm

Which of the following involves a company giving away a certain level of product or service without charge, but then charging a fee for premium levels of product or service? A) advertising revenue model B) subscription revenue model C) freemium strategy D) premium strategy

C) freemium strategy

Most of the time required to maintain an e-commerce site is spent on: A) debugging code B) responding to emergency situations C) general administration and making changes and enhancements to the system D) changes in reports, data files, and links to backend databases.

C) general administration and making changes and enhancements to the system

Organizations that typically provide an array of services to startup companies along with a small amount of funding are referred to as: A) angel investors B) crowdfunders C) incubators D) venture capital investors

C) incubators

The Seam is an example of a(n): A) private industrial network B) exchange C) industry consortium D) e-distributor

C) industry consortium

All of the following might be part of a website's middle-tier layer except A) a database server B) an add server C) legacy corporate applications D) a mail server

C) legacy corporate applications

Which of the following is not a key element of an elevator pitch? A) exit strategy B) growth metrics C) legal structure D) market opportunity

C) legal structure

Which of the following is not a variation of the e-tailer business model? A) bricks-and-clicks B) virtual merchant C) market creator D) manufacturer-direct

C) market creator

The costs incurred by merchants in having to change product prices (such as the costs of reentering prices into computer systems) are referred to as which of the following? A) subscription costs B) fixed costs C) menu costs D) variable costs

C) menu costs

Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship? A) consumer-to-consumer B) social e-commerce C) mobile e-commerce D) business-to-business

C) mobile e-commerce

Which of the following helps you engage your customers in a conversation? A) shopping cart B) product cart C) on-site blog D) site tracking and reporting system

C) on-site blog

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called: A) routing B) the Transmission Control Protocol C) packet switching D) the File Transfer Protocol

C) packet switching

Which of the following factors is not a significant influence on a company's competitive environment? A) how many competitors are active B) what the market share of each competitor is C) the availability of supportive organizational structures D) how competitors price their products

C) the availability of supportive organizational structures

Which of the following types of sites typically require a high percentage of secure page? A) web services B) customer self-service C) trading D) publishing/subscription

C) trading

E-commerce is available just about everywhere and anytime. This is known as ________. A) richness B) information density C) ubiquity C) reach

C) ubiquity

Which of the following involves testing a site's program modules one at a time? A) system testing B) acceptance testing C) unit testing D) implementation testing

C) unit testing

Which of the following features of e-commerce technology is related to the concept of network externalities? A) richness B) interactivity C) universal standards D) information density

C) universal standards

Microsoft's pilot program to provide broadband Internet access to rural areas uses which of the following technologies? A) satellites B) drones C) unused, low-powered television channels D) high altitude balloons

C) unused, low-powered television channels

Which of the following is an example of an integrity violation of e-commerce security? A) A website is not actually operated by the entity the customer believes it to be. B) A merchant uses customer information in a manner not intended by the customer. C) A customer denies that he is the person who placed the order. D) An unauthorized person intercepts an online communication and changes its contents. 5.1

D

Which of the following is not an example of malicious code? A) scareware B) Trojan horse C) bot D) sniffer 5.2

D

Zeus is an example of which of the following? A) SQL injection attack B) browser parasite C) DDoS attack D) Trojan horse 5.2

D

In the United States, about ________ of Internet traffic now occurs over Internet Protocol version 6 (IPv6) A) 10% B) 15% C) 25% D) 40%

D) 40%

When using multivariate testing, if you wish to test two different versions of an image, a button, and a piece of text, how many combinations will you need to test? A) 2 B) 4 C) 6 D) 8

D) 8

A template test is a form of which type of testing? A) unit testing B) system testing C) acceptance testing D) A/B testing

D) A/B testing

The Web runs in which layer of Internet architecture? A) Network Technology Substrate layer B) Middleware Services layer C) Transport Services and Representation Standards layer D) Applications layer

D) Applications layer

Which of the following technologies is used to separate the design and presentation of content from the content creation process? A) CGI B) proxy server C) shopping cart D) CMS

D) CMS

_________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared pool of virtualized resources over the Internet A) Client/server computing B) P2P computing C) Mobile computing D) Cloud computing

D) Cloud computing

Which of the following uses a subscription-based sales revenue model? A) Yahoo B) eBay C) MyPoints D) Dollar Shave Club

D) Dollar Shave Club

All of the following can be considered a direct competitor of Priceline except: A) Travelocity B) Expedia C) Orbitiz D) ESPN

D) ESPN

Which of the following is a leading platform for social e-commerce? A) Amazon B) eBay C) Wikipedia D) Facebook

D) Facebook

Which of the following is not a major technology trend in e-commerce in 2018-2019? A) Mobile messaging services are now used by almost two-thirds of smartphone users. B) Firms are turning to business analytics to make sense out of big data. C) Smart speakers provide an additional platform for e-commerce. D) Growth of the Internet of Things slows down.

D) Growth of the Internet of Things slows down.

All of the following statements about HTML5 are true except A) HTML5 has become the de facto page web page development standard B) HTML5 is an important tool for both response web design and adaptive web delivery C) HTML5 apps work just like web pages D) HTML5 stores page content into mobile device hardware rather loading into the browser from a web server

D) HTML5 stores page content into mobile device hardware rather loading into the browser from a web server

Which of the following organizations involved with Internet governance has the United States recently given up control over? A) ICANN B) IGF C) NTIA D) IANA

D) IANA

All of the following are involved in the effort to create standards for IoT execpt A) AllSeen Aliance B) Industrial Interent Consortium C) Open Connectivity Foundation D) W3C

D) W3C

All of the following are basic functionality provided by web servers except: A) site management tools B) data capture tools C) security services D) a shopping cart

D) a shopping cart

All of the following are the methods of improving the processing architecture of a website except A) separating static content from dynamic content B) optimizing ASP code C) optimizing database schema D) adding web servers

D) adding web servers

All of the following are important factors in search engine optimization except: A) selecting keywords and page titles B) encouraging other sites to link to your site C) buying search engine ads D) adhering to privacy polices

D) adhering to privacy polices

All of the following are examples of Web 2.0 sites and applications except: A) photo-sharing sites B) blogs C) wikis D) auction sites

D) auction sites

Advantages of dynamic page generation include all of the following except: A) lowered menu costs. B) market segmentation C) nearly cost-free price discrimination D) client-side execution of programming

D) client-side execution of programming

Which of the followings technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture? A) fiver optics B) Wi-Fi C) IPv6 D) client/server computing

D) client/server computing

Which of the following is a characteristic of the Reinvention phase of e-commerce? A) massive proliferation of dot-com start-ups B) widespread adoption of broadband networks C) rapid growth of search engine advertising D) expansion of e-commerce to include services as well as goods

D) expansion of e-commerce to include services as well as goods

All of the following were visions of e-commerce expressed during the early years of e-commerce except: A) a nearly perfect information marketspace B) friction-free commerce C) disintermediation D) fast follower advantage

D) fast follower advantage

Which of the following is an important societal issue related to e-commerce? A) consumer behavior B) value webs C) cloud computing D) intellectual property

D) intellectual property

A ______ specifically details how you plan to find customers and to sell your product A) sales analysis B) business plan C) competitive strategy D) market strategy

D) market strategy

All of the following are website design features that annoy customers except: A) slow-loading pages B) pop-under ads C) splash pages D) multi-browser functionally

D) multi-browser functionally

When talking about the physical elements of the Internet, the term redundancy refers to: A) transmitting multiple copies of a single packet to safeguard against data loss. B) the use of tiered high-speed switching computers to connect the backbone to regional and local networks C) delays in messages caused by the uneven flow of information through the network D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs

D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs

Which of the following details the actual hardware components to be used in a system? A) architecture plan B) system functionalities plan C) logical design D) physical design

D) physical design

All of the following are examples of business-to-business(B2B) business model except: A) e-distributors B) e-procurement C) exchanges D) portals

D) portals

All of the following can be considered a direct or indirect competitor of Amazon except A) eBay B) Apple's iTunes Store C) Walmart D) priceline

D) priceline

Which of the following would you use to verify that links on web pages are valid? A) HTTP B) FTP C) data capture tools D) site management tools

D) site management tools

Which of the following features of e-commerce technology allows users to participate in the creation of online content? A) ubiquity B) global reach C) information density D) social technology

D) social technology

Which of the following refers to the practice of researching a product online before purchasing it at a physical store? A) zooming B) grazing C) showrooming D) webroooming

D) webrooming

Which business application is associated with the technological development of local area networks and client/server computing? A) transaction automation (e.g., payroll) B) desktop automation (e.g., word processing) C) industrial system automation (e.g., supply chain management) D) workgroup automation (e.g., document sharing)

D) workgroup automation (e.g., document sharing)

A multi-tier architecture typically includes only a web server and a database server

F

Amazon Web Services is an example of a private cloud

F

DHMTL is used to generate dynamic web pages

F

Exploit kits can be purchased by users to protect their computers from malware 5.2

F

Phishing attacks rely on browser parasites. 5.2

F

Price transparency refers to the ability of consumers to discover what merchants actually pay for products.

F

Retail e-commerce in the United States is not expected to continue growing at double-digit growth rates in 2018-2019.

F

The term e-commerce refers to digital enabling of business processes both inside and outside the firm.

F

The web server software used has a significant impact on how a website's web pages look on a user's computer.

F

Tier 1 ISPs provide Internet access to consumers and businesses.

F

A company's strong linkages with its customers increase switching costs.

T

A drive-by download is malware that comes with a downloaded file that a user intentionally or unintentionally requests. 5.2

T

Apple Pay uses near field communication (NFC) chips 5.5

T

B2B e-commerce is the largest type of e-commerce

T

CryptoLocker is an example of ransomware. 5.2

T

Drive-by downloads are now the most common method of infecting computers. 5.2

T

Dynamic page generation enables price discrimination

T

E-commerce and e-business systems blur together at the business firm boundary, at the point at which internal business systems link up with suppliers or customers.

T

E-commerce has increased price competition in many markets.

T

E-commerce technologies provide a unique, many-to-many model of mass communication.

T

FREAK is an example of a software vulnerability. 5.2

T

FTP is the protocol that permits users to transfer files from a server to their client computer, and vice versa.

T

HTML defines the structure of a web page

T

HTTP/2 is supported by almost all the leading web browsers.

T

In a hybrid cloud computing model, firms use their own infrastructure for their most essential core activities.

T

In general, the annual system maintenance cost will roughly parallel the development cost.

T

In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution. 5.5

T

Information asymmetries enable some firms to have an edge over others.

T

Insiders present a greater security threat to e-commerce sites than outsiders. 5.2

T

Interactivity that enables product customization alters industry structured by decreasing the threat of substitutes.

T

IoT botnets became the preferred platform for launching DDoS attacks in 2017. 5.2

T

Native web apps need to be developed for different mobile platforms.

T

Objects can be retrieved from the database using Java Server Pages

T

PayPal requires the recipient of a payment to have a PayPal account to receive funds. 5.5

T

Personalization invoves targeting marketing messages to specific individuals by adjusting the message based upon a consumer's preferences or past purchasing behavior.

T

15) Which of the following is not one of the four main methods advertisers use to behaviorally target ads? A) Nielsen ratings B) data collected from social networks C) integration of online data with offline data D) clickstream data

a

18) Which of the following is not a practice that degrades the results and usefulness of search engines? A) social search B) link farms C) content farms D) click fraud

a

25) Which of the following is the most important tool in establishing a relationship with the customer? A) company website B) company CRM system C) Facebook D) search engine display ads

a

28) The Nike iD program is an example of which of the following marketing techniques? A) customer co-production B) transactive content C) price discrimination D) permission marketing

a

34) Google's AdSense is an example of which of the following? A) context advertising B) SEO C) programmatic advertising D) viral marketing

a

35) Which of the following is based on the idea of complete price transparency in a perfect information marketplace? A) the Law of One Price B) dynamic pricing C) price discrimination D) versioning

a

60) The marketing technique known as ________ involves merchants offering many products for which there is little demand. A) long tail marketing B) flash marketing C) yield management D) bait-and-switch

a

70) Cross-platform attribution refers to: A) how to assign credit to different marketing initiatives. B) understanding why visitors to a website purchase a product. C) understanding how impressions lead to visits. D) understanding why people click on ads

a

77) Acquisition rate is a measure of the: A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages. B) percentage of visitors who become customers. C) percentage of existing customers who continue to buy on a regular basis. D) percentage of shoppers who do not return within a year after their initial purchase

a

23) Which of the following statements about CAN-SPAM is not true? A) CAN-SPAM went into effect in January 2004. B) CAN-SPAM prohibits unsolicited e-mail (spam). C) CAN-SPAM prohibits the use of deceptive subject lines and false headers. D) Large spammers are among CAN-SPAM's biggest supporters.

b

24) Which of the following statements about Canada's anti-spam law is not true? A) Canada's law is based on an opt-in model. B) The law has no impact on companies located within the United States. C) The first phase of the law went into effect in 2014. D) The law applies to e-mail, texts, and social media messaging.

b

30) Which of the following statements about a free pricing strategy is false? A) Free products and services can knock out potential and actual competitors. B) The free pricing strategy was born in the early days of the Web. C) It is difficult to convert free customers into paying customers. D) Free products and services can help build market awareness.

b

37) Which of the following statements about native advertising is not true? A) Native advertising is controversial. B) Native advertising is a new form of advertising found only online. C) Native advertising is growing rapidly, especially on social networks. D) Consumers look at native ads much more frequently than display ads.

b

50) Which of the following would you implement to collect and analyze your company's big data? A) data warehouse B) Hadoop C) SQL D) profiling

b

51) Which of the following statements about the Internet's impact on marketing is not true? A) The Internet has broadened the scope of marketing communications. B) The Internet has decreased the impact of brands. C) The Internet has increased the richness of marketing communications. D) The Internet has expanded the information intensity of the marketplace

b

53) Which feature of e-commerce technology decreases the cost of delivering marketing messages and receiving feedback from users? A)personalization/customization B) universal standards C) ubiquity D) interactivity

b

56) All of the following statements about cookies are true except: A) cookies can be used to create cross-site profiles of users. B) the data typically stored in cookies includes a unique ID and e-mail address. C) cookies make shopping carts possible by allowing a site to keep track of a user's actions. D) the more cookies are deleted, the less accurate ad server metrics become.

b

69) If you want to determine the size of your website's audience, the metric you will use for the most accurate measurement will be: A) page views. B) unique visitors. C) hits. D) reach.

b

76) Which of the following measures the average length of stay at a website? A) loyalty B) stickiness C) page views D) retention rate

b

78) Recency refers to the: A) percentage of customers who do not return during the next year after an initial purchase. B) time elapsed since the last visit made by a customer. C) percentage of existing customers who continue to buy on a regular basis. D) percentage of customers who return to the site within a year to make additional purchases.

b

79) View-to-cart ratio is a measure of the: A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages. B) percentage of views that lead to an add-to-cart action. C) percentage of existing customers who continue to buy on a regular basis. D) percentage of shoppers who do not return within a year after their initial purchase.

b

83) Which of the following measures the percentage of times an ad is clicked? A) retention rate B) CTR C) loyalty rate D) conversion rate

b

16) Which of the following search engine algorithm updates enables Google's search engine to evaluate an entire sentence rather than just a key word? A) Panda B) Penguin C) Hummingbird D) Graph Search

c

26) All of the following are "traditional" online marketing tools except: A) affiliate marketing. B) e-mail and permission marketing. C) social marketing. D) sponsorship marketing.

c

29) The incremental cost of building the next unit of a good is called the: A) Law of One Price. B) variable cost. C) marginal cost. D) fixed cost

c

38) Which of the following is an automated, auction-based method for matching demand and supply for online display ads? A) retargeting B) behavioral targeting C) programmatic advertising D) keyword advertising

c

54) The richness made possible by e-commerce technologies does which of the following? A) It reduces the cost of delivering marketing messages and receiving feedback from users. B) It allows consumers to become co-producers of the goods and services being sold. C) It allows video, audio, and text to be integrated into a single marketing message and consuming experience. D) It enables worldwide customer service and marketing communications

c

7) In modeling online consumer behavior, the concept of "consumer skills" refers to the: A) education level of the consumer. B) communication skills of the consumer. C) knowledge consumers have about how to conduct online transactions. D) product evaluation skills of the consumer

c

72) Uber has been criticized for using which of the following? A) flash marketing B) bundling C) surge pricing D) freemium

c

74) Purchasing an online ad on a CPA basis means that the advertiser: A) pays for impressions in 1,000 unit lots. B) pays a pre-negotiated fee for each click an ad receives. C) pays only for those users who perform a specific action, such as registering, purchasing, etc. D) exchanges something of equal value for the ad space.

c

75) eCPM measures the ROI of an ad by dividing the total earnings of the ad by which of the following? A) the total number of impressions B) the total number of impressions in hundreds C) the total number of impressions in thousands D) the total number of impressions in millions

c

80) Which of the following measures the ratio of items purchased to product views? A) conversion rate B) cart conversion rate C) browse-to-buy ratio D) view-to-cart ratio

c

17) Which of the following is not true about search engine advertising? A) Spending on search engine advertising constitutes over 45% of all online advertising spending. B) The top three search engine providers supply over 95% of all online searches. C) The click-through rate for search engine marketing has been fairly steady over the years. D) Search engine advertising is the fastest growing type of online advertising

d

2) Which of the following online advertising formats attracted the least amount of spending in 2017? A) search B) classifieds C) rich media D) e-mail

d

21) Which of the following is not a primary source of ad fraud? A) browser extensions that insert ads into a premium publisher's website and then list the ads as available on a programmatic ad exchange B) ad targeting firms that create bots that imitate the behavior of real shoppers and then charge advertisers C) botnets hired by publishers to click on web pages to create phony traffic D) native advertising that is displayed on a social media site

d

27) All of the following are among those most frequently affected by ad-blocking except: A) gaming sites. B) newsgroup/forums. C) social network sites. D) online retailers

d

3) Which of the following is not one of the main stages of the online purchasing process? A) post-purchase service and loyalty B) awareness C) engagement D) conversation

d

31) Creating multiple variations of information goods and selling these to different market segments at different prices is called: A) bundling. B) customization. C) dynamic pricing. D) versioning

d

32) All of the following are fixed price strategies except: A) bundling. B) versioning. C) free pricing. D) yield management

d

55) Which of the following is a Google algorithm update related to local search? A) Penguin B) Hummingbird C) Panda D) Possum

d

57) A web beacon is: A) a cookie that carries a virus. B) an executable cookie. C) an automated applet for performing web searches. D) a tiny graphics file embedded in an e-mail or web page

d


Set pelajaran terkait

Chapter 15: Christianity and the Formation of Europe

View Set

Types of reasoning, fallacies, and tactics

View Set

TEPC 5800: EC-12 PRACTICE TEST #2

View Set