ECON 139 - Chapter 5, ECON139 Chapter 11, E-commerce (Chapters Vary)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Adware

A PUP that serves pop-up ads to your computer

Merchant Account

A bank account that allows companies to process credit card payments and receive funds from those transactions

Secure Negotiated Session

A client-server session in which the URL of the requested document, along with the contents, contents of forms, and the cookies exchanged, are encrypted

Virus

A computer program that has the ability to replicate or make copies of itself, and spread to other files

Pretty Good Privacy (PGP)

A widely used e-mail public key encryption software program

Bill presentment

A(n) _____ service provides an electronic version of an invoice with all of the details that would appear in the printed document.

Which of the following statements is not true? A) Apple's Touch ID stores a user's actual fingerprint B) Biometric devices reduce the opportunity for spoofing C) A retina scan is an example of a biometric device D) Biometric data stored on an iPhone is encrypted

A) Apple's Touch ID stores a user's actual fingerprint

A template test is a form of which type of testing?

A/B testing

False

Advertisers pay less to have their ad appear near a discussion of a technology related to their product or on a page that reviews the product.

White Hats

"Good" hackers who help organizations locate and fix security flaws

In 2016, there were more than ________ Internet hosts

1 billion

Telephone based wireless Internet

3 G: GSM & CDMA

In 2016, the world's online population was estimated to be around:

3.3 billion.

Pinterest visitors spend ________ a month on Facebook.

6.5 minutes

The size of the B2B market in 2017 was estimated at

6.7 trillion

In 2015, which age group has the fastest growing rate of Facebook usage?

64 and older

Around what percentage of Internet users in the United States use social networks on a regular basis?

85%

In 2016, almost ________ of Americans who access the Internet use a mobile device at least some of the time.

93%

False

All electronic commerce initiatives have the goal of providing revenue.

Virtual Private Network (VPN)

Allows remote users to securely access internal networks via the Internet, using the Point-to-Point Tunneling Protocol (PPTP)

The leading web server software is:

Apache.

When sellers agree informally or formally to set floor prices below which they will not sell on auction items, this is known as: A) discriminatory pricing. B) price matching. C) bid rigging. D) distress pricing.

B) price matching

All of the following statements about public key cryptography are true except: A) public key cryptography uses two mathematically related digital keys. B) public key cryptography ensures authentication of the sender. C) public key cryptography is does not ensure message integrity. D) public key cryptography is based on the idea of irreversible mathematical functions.

B) public key cryptography ensures authentication of the sender.

D) entertainment

B) retail

Shellshock is an example of which of the following? A) mobile malware B) software vulnerability C) denial of service D) botnets

B) software vulnerability

Which of the following measures the average length of stay at a website?

B) stickiness

D) the Internet has expanded the information intensity of the marketplace

B) the Internet has decreased the impact of brands

D) the more cookies are deleted, the less accurate ad server metrics become

B) the data typically stored in cookies includes a unique ID and email address

D) lead generation marketing

B) viral marketing

All of the following experienced high-profile data breaches in 2015 except: A) CVS B) Walgreens C) Amazon D) Experian

C) Amazon

___________ refers to the ability to ensure that an e-commerce site continues to function as intended. A) Non-repudiation B) Authenticity C) Availability D) Integrity

C) Availability

Which of the following is the most meaningful metric for video ads?

C) Completion rate

D) Graph Search

C) Hummingbird

D) Knowledge Graph

C) Panda

D) 30-day

D) 30-day

In 2015, which age group has the fastest growing rate of Facebook usage? A) 12-34 B) 35-45 C) 46-65 D) Adults over 65

D) Adults over 65

The technology used by early communities was limited to mostly: A) instant messaging B) FTP C) email D) bulletin boards

D) bulletin boards

D) yield management

D) yield managment

Which of the following companies use a transaction fee revenue model?

E*Trade

24x7 Service Availability

E-Commerce automates business of enterprises and services provided by them to customers are available anytime, anywhere

Non-Cash Payment

E-Commerce enables use of credit cards, debit cards, smart cards, electronic fund transfer via bank's website and other modes of electronics payment

________ create and sell access to digital markets.

E-procurement firms

Which of the following is an example of B2B e-commerce?

Go2Paper

Internet Protocols

HTTP Email: SMTP (typically used), POP3 (office), IMAP (enables access to email on server) FTP: transport files over internet Telnet: enable communication SSL/ TLS - secure communication

Data Breach

Occurs when an organization loses control over its information to outsiders

False

On Web sites that use the advertising-subscription revenue model, subscribers are typically subjected to much more advertising than they are on sites supported completely by advertising.

________ help you engage your customers in a conversation.

On-site blogs

IP - Internet Protocol

Provides Internet's addressing scheme

Firewall

Refers to either hardware or software that filters communication packets and prevents some packets from entering the network based on a security policy

EDI

Replaces postal mail, fax, and email

Inventory Management

Reports get generated instantly when required

An example of a company using the content provider model is

Rhapsody

Which of the following is an example of a CMS?

WordPress

business plan

a doscument that describes a firm's business model

Which of the following verifies that the business objectives of the system as originally conceived are in fact working?

acceptance testing

All of the following are methods of improving the processing architecture of a website except:

adding web servers.

Web client

any computing device attached to the Internet that is capable of making HTTP requests and displaying HTML pages, most commonly a Windows PC or Macintosh

The process of comparing a website with that of its competitors in terms of response speed, quality of layout, and design is known as:

benchmarking.

Which of the following involves e-mailing another seller's bidders and offering the same product for less?

bid siphoning

Which of the following is a characteristic of the Consolidation phase of e-commerce?

brand extension and strengthening becomes more important than creating new brands

Which of the following is an unfair competitive advantage?

brand name

market creator

builds a digital environment where buyers and sellers can meet, display products, search for products, and establish a price for products

GENI Initiative

develop new core functionality for internet

What are the two most important management challenges in building a successful e-commerce presence?

developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

Which of the following basic system functionalities is used to display goods on a website?

digital catalog

Which of the following terms is synonymous with e-commerce?

digital commerce

Features on which foundations of e-commerce are built

email instant messaging search engines online chat streaming media cookies

asymmetry

exists whenever one participant in a market has more resources than other participants

Business-to-consumer (B2C) e-commerce in the United States:

has grown at double-digit rates between 2010 and 2016

Email

most used app of the internet

All of the following are website design features that annoy customers except:

multi-browser functionality.

redundancy

multiple duplicate devices and paths in a network

server

network computer dedicated to common functions that the client computers on the network need

The term ________ refers to the advantages conferred as an auction site becomes larger in terms of visitors and products for sale.

network effects

Internet Today

recently exploded without disruption

photonics

the study of communicating with light waves

Web server

web server software or physical server

iMode

wireless standards that is a proprietary service of the Japanese company NTT DoCoMo

IP Address: IP version 6

128 bit, able to handle 1 quadrillion address

Internet Phase 1 - Innovation Phase

1964-1974 - building blocks

Internet Phase 2 - Institutionalization

1975-1995 - large institutions provide funding and legitimization

Web - a service that operates on the internet

1989-1991 web invented by Tim Berners 1993 - Mosaic Web browner 1994 - first commercial web browsers Netscape Navigator

In which year was e-commerce said to have begun

1995

Internet Phase 3 - Commercialization

1995 - Present - private corporations take over, expand internet backbone and local service

Internet 2 Project

350+ institutions collaborate to facilitate revolutionary Internet technologies Goals is to create leading edge very high speed network for national research communication Enable revolutionary Internet applications

Hourglass Model of the Internet

4 layers that looks like a hourglass Applications layer is growing most

When using multivariate testing, if you wish to test two different versions of an image, a button, and a piece of text, how many combinations will you need to test?

8

Which business strategy involves implementing a new, more efficient set of business processes that other firms cannot yet obtain?

strategy of cost competition

Domain Name System (DNS)

system for expressing numeric IP addresses in natural language

In order from beginning to end, the major steps in the SDLC are:

systems analysis/planning; systems design; building the system; testing; and implementation.

Above all, e-commerce is a ________ phenomenon

technology driven

interactivity

technology that allows for two-way communication between merchant and consumer

Midleware Services layer

the "glue" that ties the applications to the communications networks, and includes such services as security, authentication, addresses, and storage repositories

When did the first online communities form?

the 1980s

Which of the following was the first large-scale digitally enabled transaction system in the B2C arena?

the French Minitel

HyperText Transfer Protocol (HTTP)

the Internet protocol used for transferring Web pages

Simple Mail Transfer Protocol

the Internet protocol used to send mail to a server

Uniform Resource Locator (URL)

the address used by a Web browser to identify the location of content on the Web

marketspace

the area of actual or potential commercial value in which a company intends to operate

Which of the following is not a significant influence on a company's competitive environment?

the availability of supportive organizational structures

richness

the complexity and content of a message

Transmission Control Protocol/Internet Protocol (TCP/IP)

the core communications protocol for the Internet

Which of the following is the best definition of transaction cost?

the cost of participating in a market

All of the following are considered a precursor to e-commerce except

the development of the smartphone

profit

the difference between the price a firm is able to charge for its products and the cost of producing and distributing goods

e-business

the digital enablement of transactions and processes within a firm, involving information systems under the control of a firm

packet

the discrete units into which digital message are sliced for transmission over the Internet

Interactivity in the context of e-commerce provides which of the following functionalities?

the enabling of two-way communication between consumer and merchant

Which of the following gives a business model the most credibility with outside investors?

the firm's management team

The existence of many competitors in any one market segment may indicate

the market is saturated

World Wide Web

the most popular service that runs on the Internet; provides easy access to over 8 billion web pages

electronic mail (e-mail)

the most used application of the Internet. Uses a series of protocols to enable messages containing text, images, sound, and video clips to be transferred from one internet user to another.

market strategy

the plan you put together tha details exactly how you intend to enter a new market and attract new customers

All of the following are major social trends in e-commerce in 2016-2017 except for:

the refusal of online retailers to accept taxation of Internet sales.

The term stateless refers to the fact that:

the server does not have to maintain an ongoing dedicated interaction with the client computer.

firm value chain

the set of activities a firm engages in to create final products from raw inputs

value chain

the set of activities performed in an industry or in a firm that transforms raw inputs into final products and services

universal computing

the sharing of files, information, graphics, sound, video, and other object across all computer platforms in thw rolds, regardless of operating systems

personalization

the targeting of marketing messages to specific individuals by adjusting the message to a person's name, interests, and past purchases

barriers to entry

the total cost of entering a new marketplace

reach

the total number of users or customers an e-commerce business can obtain

narrowband

the traditional telephone modem connection, now operating at 56.6 Kbps

D) search engine display ads

A) company website

D) viral marketing

A) context advertising

D) permission marketing

A) customer co-production

e-commerce

the use of the Internet and the Web to transact business. More formally, digitally enabled commercial transactions between and among organizations and individuals

E-commerce can be defined as

the use of the Internet, the Web, and mobile apps to transact business

Which of the following is not a major business trend in e-commerce in 2016-2017?

the weakening revenues of B2B e-commerce

A perfect market is one in which

there are no competitive advantages or asymmetries

The basic value proposition of community providers is:

they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.

Which of the following types of sites typically needs a high percentage of secure pages?

trading

The financial services, travel services, and job placement services industries typically use the ________ business model

transaction broker

E-mailing buyers to warn them away from a seller is a type of auction fraud known as ________.

transaction interference

Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders?

two-tier architecture

E-commerce is available just about everywhere and anytime. This is known as ________.

ubiquity

seven unique features of e-commerce technology

ubiquity, global reach, universal standards, richness, interactivity, information density, personalization/customization

Which of the following involves testing a site program's modules one at a time?

unit testing

Which of the following features of e-commerce technology is related to the concept of network externalities?

universal standards

P2P e-commerce

use of peer-to-peer technology, which enables Internet users to share files and computer resources directly without having to go through a central Web server, in e-commerce

mobile commerce

use of wireless digital devices to enable transactions on the web

Which element of the business model addresses what a firm provides that other firms cannot?

value proposition

A ________ is a networked business ecosystem that coordinates a firm's suppliers, distributors, and delivery firms with its own production needs using an Internet-based supply chain management system.

value web

Which type of investor typically becomes interested in a start-up company after it has begun generating revenue?

venture capital investors

A ________ marketplace supplies products and services of interest to particular industries.

vertical

Howard Rheingold, one of The Well's early participants, coined the term ________ to refer to "cultural aggregations that emerge when enough people bump into each other often enough in cyberspace."

virtual communities

One partial solution to high monitoring costs is ________ pricing. A) fixed B) dynamic C) allocated D) distress

A) fixed

Acquisition rate is a measure of the:

A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages

D) behavioral

A) query-driven

D) click fraud

A) social search

D) versioning

A) the Law of One Price

Which of the following is an example of an on-demand service company?

Airbnb

Spam (junk) Web Sites

Also referred to as link farms; promise to offer products or services, but in fact are just collections of advertisements

True

Although online banks let customers pay their bills electronically, most customers still receive their bills in the mail.

All of the following use a social network marketing strategy except:

Amazon

Which of the following is not considered a portal

Amazon

______ is an example of e-business

Amazon's inventory control system

All of the following use an advertising revenue model except:

Amazon.

Hash Function

An algorithm that produces a fixed-length number called a hash or message digest

Digital Cash

An alternative payment system in which unique, authenticated tokens represent cash value

Paywall

An approach where free content is available up to a point at which fees begin, is called a _____.

Risk Assessment

An assessment of the risks and points of vulnerability

Hacker

An individual who intends to gain unauthorized access to a computer system

False

An organization's Web presence is of lesser importance than its presence in the physical world.

Phishing

Any deceptive, online attempt by a third party to obtain confidential information for financial gain

Web Server software

Apache, Microsoft IIS basic capabilities: security services, FTP, search engine, data capture

All of the following offer website building tools except:

Apache.

Trojan Horse

Appears o be benign, but then does something other than expected. Often a way for viruses or other malicious code to be introduced into a computer system

Man-in-the-middle Attack (MitM)

Attack in which the attacker is able to intercept communications between two parties who believe they are directly communication with one another, when in fact the attacker is controlling the communications

Pharming

Automatically redirecting a Web link to an address different from the intended one, with the site masquerading as the intended destination

D) The law applies to email, texts, and social media messaging

B) The law has no impact on companies located within the United States

Which of the following statements illustrates the network effects that portals are subject to? A) Specialized vertical market portals attract only a small percentage of the audience, while a few large megaportals garner most of the market. B) The value of the portal to advertisers and consumers increases geometrically as reach increases. C) The greater the amount of content provided by a portal, the greater its value to the community. D) The greater number of portals available, the greater the potential audience for each.

B) The value of the portal to advertisers and consumers increases geometrically as reach increases.

Recency refers to the:

B) Time elapsed since the last visit made by a customer

Which of the following measures the percentage of customers who purchase once, but never return within a year?

B) attrition rate

D) anonymous browsing

B) firewalls

D) bait-and-switch

B) flash marketing

D) interactivity

B) information density

PCI-DSS is a standard established by which of the following? A) the banking industry B) the credit card industry C) the federal government D) the retail industry

B) the credit card industry

D) Free products and services can help build market awareness.

B) the free pricing strategy was born in the early days of the Web

D) reach

B) unique visitors

Internet Network Architecture

Backbone: high bandwidth fiber optic cable networks Private Networks owned by a variety of NSP Bandwidth 155 Mbps - 2.5 Gbps (bits)

Which of the following was not able to successfully implement a freemium business model?

Baremetrics

Which of the following is not a community provider?

Blue Nile

Which of the following is not an example of the bricks-and-clicks e-tailing business model?

Bluefly

Business Models for E-Commerce

Business-to-Business Business-to-Consumer Consumer-to-Business Business-to-Government Government-to-Business Government-to-Citizen

False

Business-to-business sellers are passive adopters of the Web catalog model.

A ________ permits the consumer to monitor specific auctions of interest, requiring the consumer to pay close attention only in the last few minutes of bidding.

watch list

The profit a seller makes at auction is a function of all of the following except:

watch lists.

Online forum & chat

web apps that enables internet users to communicate with each other.

Which of the following refers to the practice of researching a product online before purchasing it at a physical store?

webrooming

leverage

when a company uses its competitive advantages to achieve more advantage in surrounding markets

Which business application is associated with the technological development of local area networks and client/server computing?

workgroup automation

Which of the following has the Internet Advertising Bureau urged advertisers to abandon? A) HTML B) HTML5 C) Adobe Flash D) Adobe Acrobat

C) Adobe Flash

The attack on Dyn, Twitter, Amazon, and other major organizations in October 2016, is an example of which of the following? A) SQL injection attack B) browser parasite C) DDoS attack D) MitM attack

C) DDoS attack

D) It enables worldwide customer service and marketing communications.

C) It allows video, audio, and text to be integrated into a single marketing message and consuming experience.

D) lead generation marketing

C) affiliate marketing

Which of the following is not one of the three defining characteristics of a portal? A) commerce B) content C) auctions D) navigation of the Web

C) auctions

Which of the following measures the percentage of emails that could not be delivered?

C) bounce-back rate

Which of the following measures the ratio of items purchased to product views?

C) browse-to-by ratio

All of the following are benefits of auctions except: A) more efficient price discovery. B) lower transaction costs. C) decreased price transparency. D) increased market efficiency.

C) decreased price transparency

Proxy servers are also known as: A) firewalls B) application gateways C) dual home systems D) packet filters

C) dual home systems

Instagram is an example of a(n): A) interest-based social network B) affinity community/social network C) general community D) practice network

C) general community

D) product evaluation skills of the consumer

C) knowledge consumers have about how to conduct online transactions

D) fixed cost

C) marginal cost

D) number of pages viewed

C) number of HTTP requests

D) keyword advertising

C) programmatic advertising

________ refers to the use of secondary user IDs or bidders who have no actual intention to buy to artificially raise the price of an item. A) Bid manipulation B) Shill feedback C) Shill bidding D) Bid rigging

C) shill bidding

D) sponsorship marketing

C) social marketing

D) freemium

C) surge pricing

Public Key Infrastructure (PKI)

CAs and digital certificate procedures hat are accepted by all parties

________ provides a set of standards for communicating between a browser and a program running on a server that allows for interaction between the user and server.

CGI

Which of the following technologies is used to separate the design and presentation of content from the content creation process?

CMS

Cannibalization

Channel conflict is also referred to as _____.

Ruby on Rails is based on which of the following philosophies?

CoC

Botnet

Collection of captured bot computers

Exploit Kit

Collection of exploits bundled together and rented or sold as a commercial product

True

Companies can adapt their catalog revenue model online by replacing or supplementing their print catalogs with information on their Web sites.

True

Companies change their revenue models to meet the needs of the new changing Web users.

True

Companies that have existing sales outlets and distribution networks often worry that their Web sites will take away sales from those outlets and networks.

Fee-for-service

Companies using _____ revenue model charge a fee based on the value of the service provided on the Web.

True

Companies using a digital content revenue model sell rights to access the information they own.

Which of the following is not a major technology trend in e-commerce in 2016-2017?

Computing and networking component prices increase dramatically.

Cloud Computing

Computing power and software over the internet (Google Apps) Fastest growing form of computing Radically reduces cost of building and operating web sites, infrastructure, IT support, hardware and software

Which of the following is an example of C2C e-commerce?

Craigslist

Hacktivism

Cybervandalism and data theft for political purposes

All of the following are prominent hacktivist groups except: A) Anonymous B) LulzSec C) Impact Team D) Avid Life

D) Avid Life

___________ typically attack governments, organizations, and sometimes individuals for political purposes. A) Crackers B) White hats C) Grey hats D) Hacktivists

D) Hacktivists

Yahoo owns all of the following except: A) Tumblr. B) Flickr. C) Aviate. D) Instagram.

D) Instagram

Priceline is an example of a(n): A) English auction. B) Dutch auction. C) penny auction. D) Name Your Own Price auction

D) Name Your Own Price auction

D) Search engine advertising is the fastest growing type of online advertising.

D) Search engine advertising is the fasted growing type of online advertising.

________ has tentatively agreed to purchase Yahoo. A) AT&T B) Microsoft C) AOL D) Verizon

D) Verizon

D) a tiny graphics file embedded in an email or web page

D) a tiny graphics file embedded in an email or web page

D) conversation

D) conversation

D) email

D) email

ESPN.com is an example of a: A) general purpose portal. B) vertical market portal based on affinity group. C) vertical market portal based on focused content. D) focused content portal.

D) focused content portal

D) native advertising that is displayed on a social media site

D) native advertising that is displayed on a social media site

D) online retailers

D) online retailers

Which of the following is not one of the typical portal revenue sources? A) commissions on sales B) subscription fees C) tenancy deals D) referral fees

D) referral fees

D) rich media

D) rich media

D) targeted banner ads

D) targeted banner ads

D) universal standards

D) universal standards

D) versioning

D) versioning

PDI-DSS (Payment Card Industry-Data Security Standards)

Data security standards instituted by the five major credit card companies

Improved Sales

Dependencies to buy a products reduce at large and sales increases

Authorization Policies

Determine differing levels of access to information assets for differing levels of users

Access Controls

Determine who can gain legitimate access to a network

Data Encryption Standard (DES)

Developed by the National Security Agency (NSA) and IBM. Uses a 56-bit encryption key

US-CERT

Division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses across government and private sectors

Which of the following types of auctions is perfect for sellers that have many identical items to sell?

Dutch Internet auctions

All of the following types of auctions involve single units except:

Dutch Internet.

Advertising / Marketing

E-Commerce increases the reach of advertising of products and services of businesses

Support

E-Commerce provides various ways to provide pre sales and post sales assistance to provide better services to customers

Communication Improvement

E-Commerce provides ways for faster, efficient, reliable communication with customers and partners

All of the following would be considered a direct competitor of Priceline except

ESPN

Which of the following statements is not true?

Economists take a purely technical approach to e-commerce.

Security Organization

Educates and trains users, keeps management aware of security threats and breakdowns, and maintains the tools chosen to implement security

EDI

Electronic Data Interchange

False

Electronic books are rapidly replacing physical books.

E-Commerce

Electronics Commerce

A(n) ________, in which the highest bidder wins, is the most common form of auction.

English auction

Authorization Management System

Establishes where and when a user is permitted to access certain parts of a Web site

Intrusion Detection System (IDS)

Examines network traffic, watching to see if it matches certain patterns or preconfigured rules indicative of an attack

Social Engineering

Exploitation of human fallibility and gullibility to distribute malware

Which of the following is an example of social e-commerce?

Facebook

Backdoor

Feature of viruses, worms, and Trojans that allows attacker to remotely access a compromised computer

Most significant private initiatives

Fiber optics and Mobile wireless internet services

Heartbleed Bug

Flaw in OpenSSL encryption system that allowed hackers to decrypt an SSL session and discover user names, passwords, and other user data

Denial of Service Attack (DoS)

Flooding a Web site with useless traffic to inundate and overwhelm the network

Electronic Billing Presentment and Payment System (EBPP)

Form of online payment system for monthly bills

Extranet

Formed when firms permit outsiders to access their internal TCP/IP networks

Which of the following cannot be used to retrieve objects from a database?

HTML

TCP/IP Protocol Suite:

HTTP: Hyper Text Transfer Telnet: Communicating for remote access FTP: File Transfer Protocol SMTP: Simple Mail Transfer

Black Hats

Hackers who act with the intention of causing harm

Grey Hats

Hackers who believe they are pursuing some greater good by breaking in and revealing system flaws

Intrusion Prevention System (IPS)

Has all the functionality of an IDS, with the additional ability to take steps to prevent and block suspicious activities

________ is the tendency to gravitate toward, and bid for, auction listings with one or more existing bids.

Herd behavior

WiMax

High speed, medium range broadband wireless metropolitan area network

HTML

Hypertext Markup Langauge - most used for websites HTML5 is newest version

Who Governs the Internet

IAB ICANN IESG IETF ISOC W3C ITU

domain name

IP address expressed in natural language

Domain name

IP addresses expressed in natual language 1 IP number can have multiple domain names

The laws of the state

Identify the force preventing U.S. professionals from extending their practices on the Web.

Search Engines

Identify webpage that match queries based on keywords, page ranking Also serve as shopping tools most common internet activity

Which of the following statements about Foursquare is not true?

In 2016, Foursquare decided to refocus its effort on developing a subscription-based revenue model.

Mass media

In the _____ approach, firms prepare advertising and promotional materials about the firm and its products or services and broadcast them to potential customers.

Flexibility

In the context of accessibility, one of the best ways to accommodate a broad range of visitor needs is to build _____ into the Web site's interface.

Cope Today

In the context of professional services using a fee-for-service revenue model, _____ was a pioneer in offering online therapy to patients in the United States.

False

In the fee-for-service model, the fee is based on the number or size of transactions the service providers process.

Authentication Procedures

Include the use of digital signatures, certificates of authority, and public key infrastructure

Malicious Code (Malware)

Includes a variety of threats such as viruses, worms, Trojan horses, and bots

Which of the following statements about Instagram is not true?

Instagram is owned by Twitter.

Yahoo owns all of the following except:

Instagram.

Cybervandalism

Intentionally disrupting, defacing, or even destroying a site

2.5G network

Interim cellular network that provides speeds of 60-144 Kbps using General Packet Radio Switching

IXP

Internet X-change points: hubs where backbone interests with regional and local networks and backbone owners connect with one another

IP

Internet protocol - language in which networks communicate

IP address

Internt address expressed as a 32-bit number that appears as a series of four separate numbers marked off by periods, such as 64.49.254.91

Spoofing

Involves attempting to hide a true identity by using someone else's e-mail or IP address

Security Audit

Involves the routine review of access logs (identifying how outsiders are using the site as well as how insiders are accessing the site's assets)

Identity Fraud

Involves the unauthorized use of another person's personal data for illegal financial benefit

Which of the following is not a characteristic of a perfect competitive market

It is highly regulated

Electronic Bulletin Boards

It is the electronic transfer of money from one bank account to another, either within a single financial institution or across multiple institutions, via computer-based systems, without the direct intervention of the bank staff

CANs

LANs operating within a single organization that leases Internet access directly from regional or national carrier

Future Internet

Latency solutions - differentiated quality of service - Guaranteeing service levels and lower error rates -declining cost - Internet of Things - objects connected via sensors / RFID to internet

An example of a practice network is:

Linux.org.

________ typically include a data flow diagram to describe the flow of information for an e-commerce site.

Logical designs

Drive-by-download

Malware that comes with a downloaded file that a user requests

Worm

Malware that is designed to spread from computer to computer

Ransomware (scareware)

Malware that prevents you from accessing your computer or files and demands that you pay a fine

True

Many classified advertising sites generate substantial revenue, replacing newspapers' historical role as the primary carrier of classified ads.

Fitting Rooms

Many clothing Web sites offer virtual models on which customers can try clothes, such services are referred to as virtual _____.

Which of the following is the most successful of Facebook's apps?

Messenger

Electronic Email

Method of exchanging messages between people using electronics

Which of the following companies was an early investor in Facebook?

Microsoft

CERT Coordination Center

Monitors and tracks online criminal activity reported to it by private corporations and government agencies that seek out its help

True

Most successful advertising on the Web is targeted at specific groups.

Streaming Media

Music, video, other large files sent to users in chunks so that when received and played, file comes through uninterrupted

Which of the following is an example of the affiliate revenue model?

MyPoints

Which of the following early leaders in social networking has been reinvented as a music-oriented social network?

Myspace

Which of the following types of auctions "shields the brand" of the seller?

Name Your Own Price auction

Priceline is an example of a(n):

Name Your Own Price auction.

Cons of Cloud Computing

Need internet all the time that is reliable Sensitive information is stored somewhere out there

Four TCP/IP layers

Network interface layer Internet layer Transport layer Application layer

Internet

Network of networks, links businesses, educational institutions, gov agencies, and individuals

Which of the following has the highest penetration of social network usage among the general population?

North America

Which of the following is a standard that makes it possible to access data from any application regardless of the database and operating system software being used?

ODBC

The color settings on computer monitors vary widely

One problem that the Web presents for clothing retailers of all types that _____.

Maladvertising

Online advertising that contains malicious code

Fee-for-transaction

Online stock brokerage firms use a(n) _____ revenue model, which allows them to charge their customers a commission for each trade executed.

Improved Sales

Orders for the products can be generated anytime, anywhere without any human intervention

Packet Switching Process

Original text message --> digitized into bits --> broken into packets --> header info added to each packet indicating destination, and other control information such as how many bits are in the total message and how many packets

Which of the following statements is not true?

Overall transaction costs have dropped dramatically.

Which of the following is the most commonly used server-side scripting language?

PHP

False

People spend less time at a sticky Web site and are thus, exposed to very little advertising.

Online Stored Value Payment System

Permits consumers to make instant, online payments to merchants and other individuals based on value stored in an online account

Communication modes

Personal contact and mass media approaches are often called _____.

Security Token

Physical device or software that generates an identifier that can be used in addition to or in place of a password

Utility Programs

Ping: Tracert: how packet traveled

All of the following can be considered a direct or indirect competitor of Amazon except

Priceline

Mobile Platform

Primary Internet access Tablets Smartphones Smart watches

Potentially Unwanted Program (PUP)

Program that installs itself on a computer, typically without the user's informed consent

False

Publishers do not experience sales losses as a result of online distribution.

Django is based on which of the following?

Python

Which of the following is an example of the subscription revenue model?

Scribd

________ is used to process certificates and private/public key information.

Secure Sockets Layer/Transport Layer Security

Routing Internet Messages: TCP/IP and Packet Switching

Sending prepares address, TCP/IP breaks data into packets, packets travel router to router, reassembled at destination point

______ refers to the use of secondary user IDs or bidders who have no actual intention to buy to artificially raise the price of an item.

Shill bidding

Which of the following is not a major business trend in e-commerce in 2016-2017?

Small businesses and entrepreneurs are hampered by the rising cost of market entry caused by increased presence of industry giants.

Each of the following is one of the top six social network sites in the United States except:

Snapchat.

Which of the following statements about e-commerce in the United States in 2016 is not true?

Social e-commerce generates more revenue than mobile e-commerce

Proxy Server (proxy)

Software server that handles all communications originating from or being sent to the Internet, acting as a spokesperson or bodyguard for the organization

Zero-Day Vulnerability

Software vulnerability that has been previously unreported and for which no patch yet exists

________ technologies are technologies that enable the incremental improvement of products and services.

Sustaining

________ are the types of information systems capabilities needed to meet business objectives.

System functionalities

Intranet

TCP/IP network located within a single organization for communications and processing (protected from being access from external)

SQL Injection Attack

Takes advantage of poorly coded Web application software that fails to properly validate or filter data entered by a user on a Web page

Cipher Text

Text that has been encrypted and thus cannot be read by anyone other than the sender and the receiver

True

The Internet is not a mass medium, even though a large number of people now use it and many companies seem to view their Web sites as billboards or broadcasts.

Advertising-subscription mixed

The New York Times and The Wall Street Journal use the _____ revenue model.

Which of the following was the original "killer app" that made the Internet commercially interesting and extraordinarily popular?

The Web

Which of the following statements about the Web is not true?

The Web is the technology upon which the Internet is based.

True

The Web provides a way for technical content developers to reach retail customers.

One of the first online virtual communities was:

The Well.

Personal Shopper

The _____ is an intelligent agent program that learns the customer's preferences and makes suggestions.

Stickiness

The _____ of a Web site is its ability to keep visitors at the site and attract repeat visitors.

Privacy

The ability to control the use of information about oneself

Availability

The ability to ensure that an e-commerce site continues to function as intended

Nonrepudiation

The ability to ensure that e-commerce participants do not deny (i.e., repudiate) their online actions

Integrity

The ability to ensure that information being displayed on a Web site or transmitted or received over the Internet has not been altered in any way by an unauthorized party

Confidentiality

The ability to ensure that messages and data are available only to those who are authorized to view them

Authenticity

The ability to identify the identify of a person or entity with whom you are dealing on the Internet

Implementation Plan

The action steps you will take to achieve the security plan goals

True

The advertising-support revenue model is the one used by broadcast network television in the United States.

True

The defining characteristic of the mass media promotion process is that the seller is active and the buyer is passive

Reintermediation

The introduction of a new intermediary, such as a fee-for-transaction Web site, into a value chain is called _____.

Which of the following statements is true about the traditional tradeoff between the richness and reach of a marketing message prior to the development of the Web?

The larger the audience reached, the less rich the message.

Which of the following is not true regarding e-commerce today?

The market middlemen disappeared.

Advanced Encryption Standard (AES)

The most widely used symmetric key algorithm offering 128-, 192-, and 256-bit keys

Encryption

The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the receiver. The purpose of encryption is (a) to secure stored information and (b) to secure information transmission

Biometrics

The study of measurable biological or physical characteristics

information density

The total amount and quality of information available to all market participants

Which of the following statements illustrates the network effects that portals are subject to?

The value of the portal to advertisers and consumers increases geometrically as reach increases.

True

There has been little consensus on how to measure and charge for site visitor views, even after almost 20 years of experience with the medium.

Which of the following best describes the early years of e-commerce?

They were a technological success but a mixed business success

Which of the following is not an element of friction-free commerce?

Transaction costs are high.

TCP

Transmission Control Protocol - establishes connection among sending and receiving Web computers Handles assembly of packets at point of transmission and reassembly at receiving

Facebook was the leader in U.S. ad spending revenues on social networks in 2015. What company earned the second most amount of ad spending revenue?

Twitter

In 2015, Fortune 500 companies used ________ more than Facebook.

Twitter

Which of the following is the second leading social network in the United States in terms of number of members?

Twitter

Public Key Cryptography

Two mathematically related digital keys are used: a public key and a private key. The private key is kept secret by the owner, and the public key is widely disseminated. Both keys can be used to encrypt and decrypt a message. However, once the keys are used to encrypt a message, that same key cannot by used to unencrypt the message

Ben Shneiderman

Two pioneers of usability testing are _____ and Jakob Nielsen.

Paperless

Type of exchange of business information in E-Commerce

Bot

Type of malicious code that can be covertly installed on a computer when connected to the Internet. Once installed, the bot responds to external commands sent by the attacker

Virtual Currency

Typically circulates within an internal virtual world community or is issued by a specific corporate entity, and used to purchase virtual goods

Which of the following is not true about the use of apps?

Users still spend less time using apps than they do using desktops or mobile websites.

Distributed Denial of Service Attack (DDoS)

Using numerous computers to attack the target network from numerous launch points

Which of the following is a leading social network in Russia?

VK

________ and ________ are typically the most easily identifiable aspects of a company's business model.

Value proposition, revenue model

False

Web catalog retailers typically refrain from having return policies on unused merchandise.

False

Web companies with unprofitable growth phases for long durations retained their revenue models to grow successfully.

______ is not an open source software tool.

WebSphere

Facebook purchased which of the following for $22 billion?

WhatsApp

True

When customers buy a product, they are also buying the service element included with that product.

_______ refers to the feeling that one has paid too high a price for an item won at auction.

Winner's regret

WPA2

Wireless security standard that uses the AES algorithm for encryption and CCMP, a more advanced authentication code protocol

Cracker

Within the hacking community, a term typically used to denote a hacker with criminal intent

All of the following are major players in hosting/co-location/cloud services except:

WordPress.

Internet

Worldwide network of computer networks built on common standards

All of the following are examples of social networks except:

Y Combinator

After Google, the next portal/search engine site with the most unique visitors is:

Yahoo.

Addressable media

_____ are advertising efforts directed to a known recipient and include mail, telephone calls, and e-mail.

Usability

_____ is an important element of creating an effective Web presence.

Usability testing

_____ is the testing and evaluation of a site by its owner to ensure ease of use for site visitors.

LexisNexis

_____ offers a variety of information services for lawyers and law enforcement officials, court cases, public records, and resources for law libraries.

Digital products

_____ tend to have large up-front costs. Once those costs are incurred, additional units can be made at very low additional cost.

intranet

a TCP/IP network located within a single organization for purposes of communications and information processing

e-commerce business model

a business model that aims to use and leverage the unique qualities of the Internet and the World Wide Web

cable modem

a cable television technology that piggybacks digital access to the Internet on top of the analog video cable providing television signals to a home

sales revenue model

a company derives revenue by selling goods, information, or services

subscription revenue model

a company offers its users content or services and charges a subcription fee for access to some or all of its offerings

advertising revenue model

a company provides a forum for advertisements and receive fees from advertisers

transaction fee revenue model

a company receives a fee for enabling or executing a transaction

affiliate revenue model

a company steers business to an affiliate and receives a referral fee or percentage of the revenues from any resulting sales

application services provider (ASP)

a company that sells access to Internet-based software applications to other companies

e-distributer

a company that supplies products and services directly to individual businesses

first mover advantage

a competitive market advantage for a firm that results from being the first into a marketplace with a serviceable product or service

Internet2

a consortium of more than 200 universities, government agencies, and private businesses that are collaborating to find ways to make the Internet more efficient

first mover

a firm that is first to market in a particular area and that moves quickly to gather market share

IP telephony

a general term for the technologies that use VoIP and the internet;s packet-switched network to transmit voice and other forms of audio communication over the Internet

perfect market

a market in which there are no competitive advantages or asymmetries because all forms have equal access to all the factors of production

package switching

a method of slicing digital messages into packets, sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive at their destination

client/server computing

a modlel of computing in which powerful personal computers are connected in a network togetherwith one or more servers

Internet Message Access Protocol (IMAP)

a more current e-mail protocol that allows users to search, organize, and filter their mail prior to downloading it from the server

eXtensible Markup Language (XML)

a new markup language specification developed by the W3C (World Wide Web Consortium) that is designed to describe data and information

diffserv (differentiated quality of service)

a new technology that assigns levels of priority to packets based on the type of data being transmitted

client

a powerful personal computer that is part of a network

Ping

a program that allows you to check the connection between your client and the server

Secure Sockets Layer (SSL)

a protocol that secures communications between the client and the server

Post Office Protocol 3 (POP3)

a protocol used by the client to retrieve mail from an Internet server

WAP (Wireless Application Protocol)

a realtively new protocol that can support virtually any wireless network and is supported by every operating system

GigaPop

a regional Gigabit Point of Presence, or point of access to the Internet2 network, that supports at least one gigabit (1 billion bits) per second information transfer

business model

a set of planned activites designed to result in a profit in a marketplace

business strategy

a set of plans for achieving superior long-term returns on the capital invested in a business firm

protocol

a set of rules and standards for data transfers

IP mutlicasting

a set of technologies that enables efficient delivery of data to many locations on a network

All of the following are basic functionality provided by web servers except:

a shopping cart.

commoditization

a situation where there are no differences among products or services, and the only basis of choosing products is price

The early years of e-commerce are considered

a stunning technological success

Digital Subscriber Line (DSL)

a telephone technology for delivering high-speed access through ordinary telephone lines found in homes or businesses

Telnet

a terminal emulation program that runs in TCP/IP

cookie

a tool used by websites to sotre information about a user. When a visitor enters a website, the site sends a small text file to the users computer so that info from the site can be loaded more quickly for future vists.

friction-free commerce

a vision of commerce in which information is equally distributed, transaction costs are low, prices can be dynamically adjusted to reflect actual demand, intermediaries decline, and unfair competitive advantages are eliminated

Hypertext

a way of formatting pages with embedded links that connect documents to one another, and that also link pages to other objects such as sound, video, or animation

competitive advantage

achieved by a firm when it can produce a superior product a superior product and/or bring the product to market at a lower price than most, or all, of its competitors

All of the following are important factors in search engine optimization except:

adhering to privacy policies.

Stickiness is an important attribute for which of the following revenue models?

advertising revenue model

Which of the following is a community of members who self-identify with a demographic or geographic category?

affinity community

NaturallyCurly is an example of a(n):

affinity community.

Healthboards is an example of a(n) ________ social network.

affinity-based

The early years of e-commerce were driven by all of the following factors except

an emphasis on exploiting traditional distribution channels

exchange

an independent digital electronic marketplace where suppliers and commercial purchasers can conduct transactions

T1

an international teleport standards for digital communication that offers guaranteed delivery at 1.54 Mbps

T3

an international teleport standards for digital communication that offers guaranteed delivery at 45 Mbps

A wealthy individual who invests personal funds in a start-up in exchange for an equity share in the business is referred to as a(n) ________.

angel investor

information asymmetry

any disparity in relevant market information among parties in a transaction

second generation (2G) cellular networks

are relatively slow circuit-switched digital networks that can transmit data at about 10 Kbps

All of the following are examples of Web 2.0 sites and applications except

auction sites

Which of the following is not one of the three defining characteristics of a portal?

auctions

ubiquity

available just about everywhere, at all times

Which of the following describes the basic web policy of large firms during the Invention period?

basic, static website depicting firm's brand

AOL is focusing its strategy on all of the following except:

being an ISP.

The technology used by early online communities was limited to mostly:

bulletin boards.

Big Band

can accommodate

Advantages of dynamic page generation include all of the following except:

client-side execution of programming

Pathping

combines the functionality offered by Ping and Tracert

Which element of the business model refers to the presence of substitute products in the market?

competitive environment

routing algorithm

computer program that ensures that packets take the best available path toward their destination

Last Mile

connection from user's device to internet 2 basic types of wireless - telephone - computer network based

fiber-optic cable

consists of up to hundreds of strands of glass or plastic that use light to transmit data

C2C e-commerce

consumers selling to other consumers

eBay uses all of the following business models except:

content provider.

Offline media is typically used for all of the following marketing activities except:

conversation

The primary way a website personalizes the content presented to a visitor is through the use of:

cookies

e-procurement firm

creates and sells acces to digital electronic markets

All of the following are basic information requirements for a product database except

customer ID numbers.

Which system functionality must your website have in order to be able to personalize or customize a product for a client?

customer on-site tracking

The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade.

decreased dramatically

value proposition

defines how a company's product or serive fulfills the needs of customers

latency

delays in messages caused by the uneven flow of information packets through the network

revenue model

describes how the firm will earn revenue, produce profits, and provide a superior return on invested capital

private indistrial network

digital network designed to coordinate the flow of communictions among firms engaged in business together

Over the past decade, the number of exchanges has:

diminished sharply.

Which of the following is a characteristic of e-commerce during the Invention period

disintermediation

Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers?

disintermediation

disintermediation

displacement of market middlmen who trasitionally are intermediaries between producers and consumers by a new direct relationship between manufacturers and content originators with their costomer

Instant Messaging

display words on computer instantly

Innovative entrepreneurs and their business firms that destroy existing business models are referred to as ________.

disruptors

content provider

distributes information content, such as digital news, music, photos, video, and artwork over the Web

Amazon is an example of which of the following business models?

e-distributor

The business model of e-tailers is similar to that of

e-distributors

Which of the following may offer its customers value chain management software?

e-procurement companies

Which of the following is the market leader in C2C auctions?

eBay

Which of the following is an example of an e-commerce first mover that failed?

eToys

scale economics

efficiencies that arise from increasing the size of a business

management team

employees of the company responsible for making the business model work

If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:

enable individual customization of the product by consumers.

TCP/IP

enable services similar to telephone

Web server software

enables a computer to deliver web pages to clients on network, responds to request by sending HTTP request

The amount of time visitors spend on a site is a measure of ________.

engagement

The fact that participating in an Internet auction means that you will need to purchase a computer, learn to use it, and pay for Internet access, is an example of ________ costs.

equipment

Which of the following is a characteristic of the Reinvention phase of e-commerce?

expansion of e-commerce to include services as well as goods

Mobile Apps

explode in 2012 - 20% of mobile owners research products, 35% made purchase

XML

extensible Markup language designed to describe data and information tags used are defined by user

All of the following were visions expressed during the early years of e-commerce except

fast follower advantage

Threatening negative feedback in return for a benefit is an example of:

feedback extortion.

All of the following may lead to a competitive advantage except:

fewer products

Which of the following is not a main factor in determining the overall demand on an e-commerce site?

file sizes of web pages being served

Which of the following is not a primary activity in a firm value chain?

finance/accounting

Which of the following is another name for a revenue model?

financial model

Internet Services Provider (ISP)

firm that provides the lowest level of service in the multi-tiered Internet architecture by leasing Internet access to home owners, small businesses, and some large institutions

One partial solution to high monitoring costs is ________ pricing.

fixed

A strategy designed to compete within a narrow market or product segment is called a ________ strategy.

focus

ESPN.com is an example of a:

focused content portal.

Hypertext

formatted with embedded links - links connect documents to one another

extranet

formed when firms permit outsiders to access their internal TCP/IP networks

Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service?

freemium strategy

Most of the time required to maintain an e-commerce site is spent on

general administration and making changes and enhancements to the system.

Instagram is an example of a(n):

general community/social network

campus area network (CAN)

generally, a local area network operating within a single organization that leases access to the Web directly from regional national carriers

Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?

global reach

WiFI

high speed, fixed broadband wireless lan. different versions for home and business market. Limited range

backbone

high-bandwith fiber-optic cable that transports data across the Internet

All of the following are issues facing Pinterest except

inability to retain users

Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as

incubators

TheSeam is an example of a(n):

industry consortium.

industry consortia

industry-owned vertical marketplace that serve specific industries

Which of the following is not a unique feature of e-commerce technology?

information asymmetry

Which of the following refers to any disparity in relevant market information among parties in a transaction?

information asymmetry

Which of the following is one of the three primary societal issues related to e-commerce?

intellectual property

A Web site designed to give yachting enthusiasts a common discussion area would be classified as a(n):

interest-based social network.

First Mile

internet services that carry bulk traffic over distances older lines replaced with fiber optics

Applications layer

layer of Internet architecture that contains alient applications

Transport Services and Representation Standards layer

layer of Internet architecture that houses the TCP/IP protocol

Network Technology Substrate layer

layer of Internet technology that is composed of telecommunications networks and protocols

All of the following might be part of a website's middle-tier layer except:

legacy corporate applications

Which of the following is not a key element of an elevator pitch?

legal structure

The use of a company's competitive advantage to penetrate surrounding markets is known as ________.

leverage

Which of the following is not one of the top factors a business should consider when planning an Internet auction?

location of auction

Which of the following are the two main components of a systems design?

logical design and physical design

Ultra-wideband (UWB)

low power, short range high bandwidth network

Bluetooth

low speed, short range connection

In the ________ business model, a web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products, and establish prices.

market creator

Which of the following is not a variation of the e-tailer business model?

market creator

A ________ specifically details how you plan to find customers and sell your product.

market strategy

All of the following are basic functionality provided by e-commerce merchant server software except:

marketing analytics.

Which of the following is a physical place you visit to conduct business?

marketplace

marketspace

marketplace extended beyond traditional boundaries and removed from a temporal and geographic location

bandwidth

measures how much data can be transferred over a communications medium within a fixed period of time; is usually expressed in bits per second (bps), kilobits per second (Kbps), or megabits per second (Mbps)

The costs incurred by merchants changing product prices (such as the costs of reentering prices into computer systems) are referred to as:

menu costs

GSM (Global System for Mobile Communications)

mobile communications system widely used in Europe and Asia that uses narrowband Time Division Multiple Access (TDMA)

CDMA (Code Division Multiple Access)

mobile communications system widely used in the United States that used in the United States that uses the full spectrum of radio frequencies and digitally encrypts each call

Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship?

mobile e-commerce

The time spent watching and reviewing auction bids is a part of ________ costs.

monitoring

value web

networked trans-business system that coordinates the value chains of several firms

Which form of testing compares a control page with one that is very different?

new concept test

Third generation (3G) cellular network

new generation of cellular phone standards that can connect users to the Web at 2.4 Mbps

Bluetooth

new technology standard for short-range wireless communication under 100 meters

Which social network functionality allows users to view a list of updates from friends as well as advertisements and notifications in chronological order?

newsfeed

GPRS (General Packet Radio Services)

next generation technology carries data in packets, just like the Internet, but over radio frwquencies that make wireless communication possible

unfair competitve advantage

occurs when one firm develops an advantage based on a factor that other firms cannot purchase

network effect

occurs where users receive value from the fact everyone else uses the same tool or product

service provider

offers services online

portal

offers users powerful Web search tolls as well as an integrated package of content and services all in one place

Unfair competitive advantages occur when

one competitor has an advantage others cannot purchase

WWW

one of internet's most popular services, trillions of webpages

Tracert

one of several route-tracing utilities that allow you to follow the path of a message you send from your client to a remote computer on the Internet

HyperText Markup Language (HTML)

one of the next generation of GMLs that is relatively easy to use in Web page design. HTML provides Web page designers with a fixed set of markups "tags" are used to format a Web page

File Transfer Protocol (FTP)

one of the original Internet services. Part of the TCP/IP protocol that permits users to transfer files from the server to their client computer, and vice versa

B2C e-commerce

online businesses selling to individual consumers

B2B e-commerce

online businesses selling to other businesses

e-tailer

online retail store

Web 2.0

online social networks - services that support communication among networks of friends and peers - blogs - really simple syndication - allows to have digital content automatically send to their computers over the internet - podcasting -wikis -music and video services - VOIP - IPTV - video conferencing and telepresence

MySQL is which of the following?

open source database software

Which of the following is not one of the basic business objectives for an e-commerce site?

optimize system architecture

In general, the key to becoming a successful content provider is to:

own the content being provided

Network Service Provider (NSP)

owns and controls one of the major networks comprising the Internet's backbone

All of the following are business models employed in the online music industry except

peer-to-peer streaming

Which of the following details the actual hardware components to be used in a system?

physical design

marketplace

physical space you visit in order to transact

organizational development

plan describes how the company will organize the work that needs to be accomplished

Client/Server Computing

powerful personal computers (clients) connected in network with one or more servers Offer resources: storing files software applications access to printers

A(n) ________ offers members focused discussion groups, help, information, and knowledge related to an area of shared practice.

practice network

When sellers agree informally or formally to set floor prices below which they will not sell on auction items, this is known as:

price matching.

Which of the following is not a risk or cost of Internet auctions?

price transparency

web browers

primary purpose to display web pages internet explorer: 49% of market mozilla firefox - 18% - open source browser

Really Simple Syndication (RSS)

program that allows users to have digital content, including text, articles, blogs and podcast audio files, automatically sent to their computers over the internet

Wireless markup Language (WML)

programming language for devices using WAP

TCP

protocol that establishes the connections among sending and receiving Web computers and handles the assembly of packets at the point of trasmission, and their reassembly at the receiving end

IP

protocol that provides the Internet's addressing scheme and is responsible for the actual delivery of the packets

ISP (Internet Service Providers)

provide lowest level of service to individuals, small business, and some instititions Types of Services: Narrowband Broadband

Application Layer

provides a wide variety of applications with the ability to access the services of the lower layers

Which of the following allows the consumer to enter a maximum price and the auction software automatically places incremental bids up to that maximum price as their original bid is surpassed?

proxy bidding

Which of the following types of application server monitors and controls access to a main web server and implements firewall protection?

proxy server

The total number of users or customers an e-commerce business can obtain is called:

reach

Which of the following is not one of the typical portal revenue sources?

referral fees

intellectual property

refers to all forms of human expression that can be put into a tangible medium such as text, CDs, or the Web

differentiation

refers to all the ways producers can make their products unique and different to distinguish them from those of competitors

broadband

refers to any communications technology that permits clients to play streaming audio and video files at acceptable speeds-generally anything above 100 Kbps

market opportunity

refers to the company's intended marketspace and the overall potential financial opportunities available to the firm in that marketspace

industry structure

refers to the nature of the players in an industry and their relative bargaining power

competitive environment

refers to the other companies operating in the same marketspace selling similar products

All of the following are steps one can take to right-size a website's hardware platform and meet demands for service except:

replacing static pages with dynamically generated pages.

complimentary resources

resources and assets not directly involved in the production of the product but required for success, such as marketing, management, financial assets, reputation

Internet Layer

responsible for addressing, packing, and routing messages on the Internet

Network Interface Layer

responsible for placing packets on and receiving them from the network medium

Transport Layer

responsible for providing communication with the application by acknowledging and sequencing the packets to and from the application

A firm's ________ describes how a firm will produce a return on invested capital.

revenue model

Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text?

richness

Which of the following refers to the complexity and content of a message?

richness

What is the primary revenue model for an e-distributor?

sales

Portals primarily generate revenue in all of the following ways except:

sales of goods

All of the following are simple steps for optimizing web page content that can reduce response times except:

segmenting computer servers to perform dedicated functions.

Which of the following represent Amazon's primary value proposition(s)?

selection and convenience

All of the following are solutions to the problem of high monitoring costs except:

seller rating systems.

Which of the following involves a concern that one will never know how much the ultimate winner might have paid, or the true value to the final winner?

seller's lament

B2B service provider

sells business services to other firms

database server

server designed to access specific information with a database

ad server

server designed to deliver targeted banner ads

mail server

server that provides e-mail messages

video server

server that serves video clips

Zigbee

short range, low power wireless network for remotely controlling digital devices

Which of the following would you use to verify that links on web pages are valid?

site management tools

transaction broker

site that processes transaction for cosumers that are normally handled in person, by phone, or mail

community provider

sites that create a digital online environment where people with similar interests can transact (buy and sell goods), communicate with like-minded people, and receive interest-related information

Cookies

small text files deposited by web site on user's computer to store information about user, accessed when user next visits web sites - can help personalize web site experience - can pose privacy threat

Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?

social media

Digital Signature (e-signature)

"signed" cipher text that can be sent over the Internet

The overall retail market in the United States in 2016 was estimated at about

$4.8 trillion.

Packet Switching

-divides messages into packets -sent along different communication paths -reassembles packages once they arrive at destination - algorithmic can learn to choose the best possible paths - less expensive than circuit switching

Which of the following features of e-commerce technology allows users to participate in the creation of online content?

social technology

intelligent agent

software program that gathers and/or filters information ona specific topic and the provides a list of results for the user

Web server software

software that enables a computer to deliver Web pages written in HTML to client computers on a network that request this service by sending an HTTP request

router

special-purpose computer that interconnects the computer networks that make up the Internet and routes packets to their ultimate destination as they travel the Internet

universal standards

standards that are shared by all nations around the world

Which of the following is a leading social network in Russia? A) VK B) Tuenti C) Orkut D) Mixi

A) VK

After Google, the next portal/search engine site with the most unique visitors is: A) Yahoo. B) Microsoft. C) AOL. D) Facebook

A) Yahoo

D) consumers look at native ads much more frequently than display ads

B) native advertising is a new form advertising found only online

D) number of pages viewed

B) number of times an ad is served

D) transactive content system

B) CRM system

IP Address: IP version 4

32 bit number can handle up to 4 billion addresses four sets of integer numbers marked off by periods 201.61.186.227 Class C address: Network identified by first three sets, computer identified by last set

Digital Certificate

A digital document issued by a certification authority that contains a variety of identifying information

False

A disadvantage of the Web catalog revenue model is that the products sold in physical stores cannot be sold on the web.

True

A good Web site design can provide many image-creation and image-enhancing features very effectively - it can serve as a sales brochure, a product showroom, a financial report, and employment ad, and a customer contact point.

Information dissemination

A key goal for the Web sites of many not-for-profit organizations is _____.

E-Commerce

A methodology of modern business which addresses the need of business organizations, vendors, and customers to reduce cost and improve the quality of goods and services while increasing the speed of delivery

Browser Parasite

A program that can monitor and change the settings of a user's browser

Spyware

A program used to obtain information such as a user's keystrokes, e-mail, instant messages, and so on

Catalog

A revenue model where the seller establishes a brand image, and then uses the strength of that image to sell through printed information mailed to prospective buyers, who place orders by mail or telephone is called the _____ model.

Near Field Communication (NFC)

A set of short-range wireless technologies used to share information among devices

Security Policy

A set of statements prioritizing the information risks, identifying acceptable risk targets, and identifying the mechanisms for achieving these targets

Digital Envelope

A technique that uses symmetric encryption for large documents, but public key cryptography to encrypt and send the symmetric key

Certification Authority (CA)

A trusted third party that issues digital certificates

Sniffer

A type of eavesdropping program that monitors information traveling over a network

Session Key

A unique symmetric encryption key chosen for a single secure session

D) clickstream data

A) Nielsen ratings

D) Large spammers area among CAN-SPAM's biggest supporters

B) CAN-SPAM prohibits unsolicited email (spam)

D) profiling

B) Hadoop

Conversion rate is a measure of the:

B) Percentage of visitors who become customers

All of the following statements about Apple Pay are true except which of the following? A) Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions B) Apple Pay is based on Touch ID biometric fingerprint scanning C) Apple Pay can be used for mobile payments at the point of sale at a physical store D) Apple Pay relied on NFC chip technology

A) Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions

__________ refers to the ability to ensure that messages and data are only available to those authorized to view them. A) Confidentiality B) Integrity C) Privacy D) Availability

A) Confidentiality

Which of the following statements about Instagram is not true? A) Instagram is owned by Twitter. B) Instagram is a photo-sharing app. C) Instagram is growing more quickly than Facebook. D) In terms of time spent per month by users, Instagram is second only to Facebook.

A) Instagram is owned by Twitter.

Which of the following is not a major trend in e-commerce payments in 2016-2017? A) mobile retail payment volume decreases B) PayPal remains the most popular alternative payment method C) Google refocuses Google Wallet solely on sending and receiving money D) Payment by credit and/or debit card remains the dominant form of online payment

A) Mobile retail payment volume decreases

____________ refers to the ability to ensure that e-commerce participants do not deny their online actions. A) Non-repudiation B) Authenticity C) Availability D) Integrity

A) Non-repudiation

_____________ has the highest penetration of social network usage among the general population. A) North America B) Latin America C) Europe D) Asia-Pacific

A) North America

Confidentiality is sometimes confused with: A) Privacy B) Authenticity C) Integrity D) Non-repudiation

A) Privacy

Which of the following was designed to cripple Iranian nuclear centrifuges? A) Stuxnet B) Flame C) Snake D) Storm

A) Stuxnetd

One of the first online virtual communities was: A) The Well B) Myspace C) AOL D) Salon.com

A) The Well

In 2016, Yahoo revealed that it had experienced which of the following? A) a high profile data breach B) a DDoS attach that shut down its website C) a hacktivist attack to protest its employment policies D) a browser parasite

A) a high profile data breach

A fingerprint scan is an example of which of the following? A) biometrics B) encryption C) IDS D) firewall

A) biometrics

Bitcoins are an example of: A) digital cash B) virtual currency C) a store value payment system D) an EBPP system

A) digital cash

The fact that participating in an Internet auction means that you will need to purchase a computer, learn to use it, and pay for Internet access, is an example of ____________ costs. A) equipment B) fulfillment C) delayed consumption D) monitoring

A) equipment

Threatening negative feedback in return for a benefit is an example of: A) feedback extortion. B) offensive shill feedback. C) defensive shill feedback. D) sending spam.

A) feedback extortion

A ___________ is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network. A) firewall B) virtual private network C) proxy server D) PPTP

A) firewall

A website designed to give horse enthusiasts a common discussion area would be classified as a(n): A) interest-based social network B) affinity community C) practice network D) sponsored community

A) interest-based social network

PayPal is an example of a(n): A) online stored value payment system B) digital checking system C) accumulating balance system D) digital credit card system

A) online stored value payment system

A(n) ________ offers members focused discussion groups, help, information, and knowledge related to an area of shared practice. A) practice network B) general community C) affinity community D) interest-based social network

A) practice network

All of the following are solutions to the problem of high monitoring costs except: A) seller rating systems. B) watch lists. C) proxy bidding. D) fixed pricing.

A) seller rating systems

Software that is used to obtain private user information such as a user's keystrokes or copies of email is referred to as: A) spyware B) a backdoor C) browser parasite D) adware

A) spyware

A digital certificate contains all of the following except the: A) subject's private key B) subjects' public key C) digital signature of the certification authority D) digital certificate serial number

A) subject's private key

E-mailing buyers to warn them away from a seller is a type of auction fraud known as ________. A) transaction interference B) bid siphoning C) bid rigging D) shill bidding

A) transaction interference

___________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. A) Non-repudiation B) Authenticity C) Availability D) Integrity

B) Authenticity

All of the following are examples of social/mobile peer-to-peer payment systems except: A) Venmo B) Bill Me Later C) Square Cash D) Google Wallet

B) Bill Me Later

All of the following types of auctions generally involve single units except: A) English auction. B) Dutch Internet. C) Name Your Own Price auction. D) penny auction.

B) Dutch Internet

______________ is the second leading social network in the United States in terms of monthly unique visitors. A) Twitter B) LinkedIn C) Instagram D) Pinterest

B) LinkedIn

Each of the following is a top six social network site in the United States except: A) Tumblr B) Myspace C) Instagram D) Pinterest

B) Myspace

Which of the following early leaders in social networking has been reinvented as a music-oriented social network? A) Vevo B) Myspace C) Polyvore D) Tumblr

B) Myspace

Which of the following types of auctions "shields the brand" of the seller? A) English auction B) Name Your Own Price auction C) Dutch auction D) penny auction

B) Name Your Own Price auction

________ allows the consumer to enter a maximum price and the auction software automatically places incremental bids up to that maximum price as their original bid is surpassed. A) A watch list B) Proxy bidding C) Sealed bidding D) Price matching

B) Proxy bidding

Which of the following is an example of an online privacy violation? A) Your email being read by a hacker. B) Your online purchasing history being sold to other merchants without your consent. C) Your computer being used as part of a botnet. D) Your email being altered by a hacker.

B) Your online purchasing history being sold to other merchants without your consent.

Bloom is an example of a(n): A) interest-based social network B) affinity community C) sponsored community D) practice network

B) affinity community

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use: A) access controls B) an authorization management system C) security tokens D) an authorization policy

B) an authorization management system

Angler is an example of : A) a worm B) an exploit kit C) phishing D) hacktivisim

B) an exploit kit

Which of the following dimensions of e-commerce security does not involve encryption? A) confidentiality B) availability C) message integrity D) non-repudiation

B) availability

Which of the following involves e-mailing another seller's bidders and offering the same product for less? A) transaction interception B) bid siphoning C) shill bidding D) persistent bidding

B) bid siphoning

Accessing data without authorization on Dropbox is an example of which of the following? A) social network security issue B) cloud security issue C) mobile platform security issue D) sniffing

B) cloud security issue

All of the following are limitations of the existing online credit card payment system except: A) poor security B) cost to consumers C) cost to merchant D) social equity

B) cost to consumers

Which of the following is the market leader in C2C auctions? A) Amazon B) eBay C) uBid D) eBid

B) eBay

The time spent watching and reviewing auction bids is a part of ________ costs. A) pricing B) monitoring C) delayed consumption D) fulfillment

B) monitoring

When did the first online communities form? A) the 1970s B) the 1980s C) the 1990s D) the 2000s

B) the 1980s

What is the most frequent cause of stolen credit cards and card information today? A) lost cards B) the hacking and looting of corporate servers storing credit card information C) sniffing programs D) phishing attacks

B) the hacking and looting of corporate servers storing credit card information

Howard Rheingold, one of The Well's early participants, coined the term ____________, to refer to "cultural aggregations that emerge when enough people bump into each other often enough in cyberspace." A) social networks B) virtual communities C) community portals D) social forums

B) virtual communities

Linden Dollars, created for use in Second Life, are an example of: A) digital cash B) virtual currency C) EBPP D) peer-to-peer payment systems

B) virtual currency

Conficket is an example of a: A) virus B) worm C) Trojan horse D) botnet

B) worm

Which of the following types of auctions is most often associated with sellers that have many identical items to sell? A) English auctions B) Name Your Own Price auctions C) Dutch Internet auctions D) group buying auctions

C) Dutch Internet auctions

A(n) ________, in which the highest bidder wins, is the most common form of auction. A) Dutch Internet auction B) Japanese auction C) English auction D) reverse auction

C) English auction

________ is the tendency to gravitate toward, and bid for, auction listings with one or more existing bids. A) Group buying B) Winner's regret C) Herd behavior D) Bid rigging

C) Herd behavior

In 2015, Fortune 500 companies used _____________ more than Facebook. A) no other social networks B) Tumblr C) LinkedIn D) Pinterest

C) LinkedIn

On which of the following do users spend the least amount of time per month? A) Snapchat B) Tumblr C) LinkedIn D) Pinterest

C) LinkedIn

____________ was an early investor in Facebook. A) Google B) Apple C) Microsoft D) LinkedIn

C) Micosoft

_____________ recently acquired LinkedIn. A) Facebook B) Google C) Microsoft D) Verizon

C) Microsoft

Which of the following statements is not true? A) Most states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred. B) The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers. C) The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates. D) The Federal Trade Commission has asserted that it has authority over corporations' data security practices.

C) The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.

Facebook owns _______________. A) Pinterest B) Snapchat C) WhatsApp D) Tumblr

C) WhatsApp

Which of the following is a community of members who self-identify with a demographic or geographic category? A) practice network B) sponsored community C) affinity community D) interest-based social network

C) affinity community

Healthboards is an example of a(n) ___________ social network. A) practice-based B) interest-based C) affinity-based D) general

C) affinity-based

Which of the following is not an example of an access control? A) firewalls B) proxy servers C) digital signatures D) login passwords

C) digital signatures

26) Which of the following is not an example of a PUP? A) adware B) browser parasite C) drive-by download D) spyware

C) drive-by download

Malware that comes with a downloaded file requested by a user is called a: A) Trojan horse B) backdoor C) drive-by download D) PUP

C) drive-by download

Which of the following is the leading cause of data breaches? A) theft of a computer B) accidental disclosures C) hackers D) DDoS attacks

C) hackers

Which dimension(s) of security is spoofing a threat to? A) integrity B) availability C) integrity and authenticity D) availability and integrity

C) integrity and authenticity

Which of the following is not one of the top factors a business should consider when planning an Internet auction? A) type of product B) type of auction C) location of auction D) bid increments

C) location of auction

The term ________ refer(s) to the advantages conferred as an auction site becomes larger in terms of visitors and products for sale. A) siphoning B) herd behavior C) network effects D) channel expansion

C) network effects

Which social network functionality allows users to view a list of updates from friends as well as advertisements and notification in chronological order? A) message board B) timeline C) newsfeed D) friends' network

C) newsfeed

__________ of procurement officers use auctions to purchase goods. A) Eighty per cent (80%) B) Less than a quarter C) Over one third D) Twenty-five per cent (25%)

C) over one third

What is the first step in developing an e-commerce security plan? A) create a security organization B) develop a security policy C) perform a risk assessment D) perform a security audit

C) perform a risk assessment

Automatically redirecting a web link to a different address is an example of: A) sniffing B) social engineering C) pharming D) DDoS attack

C) pharming

Which of the following is not a risk or cost of Internet auctions? A) delayed consumption costs B) equipment costs C) price transparency D) trust risks

C) price transparency

Which of the following involves a concern that one will never know how much the ultimate winner might have paid, or the true value to the final winner? A) herd behavior B) winner's regret C) seller's lament D) loser's lament

C) seller's lament

Next generation firewalls provide all of the following except: A) an application-centric approach to firewall control. B) the ability to identify applications regardless of the port, protocol, or security evasion tools used. C) the ability to automatically update applications with security patches. D) the ability to identify users regardless of the device or IP address.

C) the ability to automatically update applications with security patches.

A ________ permits the consumer to monitor specific auctions of interest, requiring the consumer to pay close attention only in the last few minutes of bidding. A) bidding fee auction B) channel manager C) watch list D) rating system

C) watch list

Which of the following is an example of an integrity violation of e-commerce security? A) A website is not actually operated by the entity the customer believes it to be. B) A merchant uses customer information in a manner not intended by the customer. C) A customer denies that he or she is the person who placed the order. D) An unauthorized person intercepts an online communication and changes its contents.

D) An unauthorized person intercepts an online communication and changes its contents.

_______________ is an example of a practice network? A) PredictWallstreet B) Instagram C) Debater D) Doximity

D) Doximity

Facebook was the leader in U.S. ad spending revenues on social networks in 2016. What company earned the second most amount of ad spending revenue? A) Snapchat B) LinkedIn C) Pinterest D) Twitter

D) Twitter

________ refers to the feeling that one has paid too high a price for an item won at auction. A) Seller's lament B) Winner's lament C) Loser's regret D) Winner's regret

D) Winner's regret

____________ is not an example of malicious code. A) Scareware B) a Trojan horse C) a bot D) a sniffer

D) a sniffer

An intrusion detection system can perform all of the following functions except: A) examining network traffic B) setting off an alarm when suspicious activity is detected C) checking network traffic to see if it matches certain patterns or preconfigured rules D) blocking suspicious activity

D) blocking suspicious activity

According to Ponemon Institute;s 2015 survey, which of the following was not among the causes of the costliest cybercrimes? A) malicious insiders B) malicious code C) denial of service D) botnets

D) botnets

The amount of time visitors spend on a site is a measure of ________. A) reach B) loyalty C) conversation D) engagement

D) engagement

All of the following are used for authentication except: A) digital signatures B) certificates of authority C) biometric devices D) packet filters

D) packet filters

The profit a seller makes at auction is a function of all of the following except: A) initial pricing B) auction length. C) the number of units for auction. D) watch lists

D) watch lists


Set pelajaran terkait

Chapter 36: Management of Patients With Immune Deficiency Disorders

View Set

Anthro 170: Human Dental Formula

View Set

Ch. 23 - Suicidal Thoughts and Behavior

View Set

CIS 285 final exam study guide part 1

View Set