ECON139 Chapter 11, E-commerce (Chapters Vary)
Malicious Code (Malware)
Includes a variety of threats such as viruses, worms, Trojan horses, and bots
Which of the following statements about Instagram is not true?
Instagram is owned by Twitter.
IP address
Internt address expressed as a 32-bit number that appears as a series of four separate numbers marked off by periods, such as 64.49.254.91
Security Audit
Involves the routine review of access logs (identifying how outsiders are using the site as well as how insiders are accessing the site's assets)
Identity Fraud
Involves the unauthorized use of another person's personal data for illegal financial benefit
Which of the following is not a characteristic of a perfect competitive market
It is highly regulated
Drive-by-download
Malware that comes with a downloaded file that a user requests
Worm
Malware that is designed to spread from computer to computer
Ransomware (scareware)
Malware that prevents you from accessing your computer or files and demands that you pay a fine
Which of the following is the most successful of Facebook's apps?
Messenger
Which of the following is a standard that makes it possible to access data from any application regardless of the database and operating system software being used?
ODBC
False
On Web sites that use the advertising-subscription revenue model, subscribers are typically subjected to much more advertising than they are on sites supported completely by advertising.
________ help you engage your customers in a conversation.
On-site blogs
The color settings on computer monitors vary widely
One problem that the Web presents for clothing retailers of all types that _____.
Maladvertising
Online advertising that contains malicious code
All of the following can be considered a direct or indirect competitor of Amazon except
Priceline
Mobile Platform
Primary Internet access Tablets Smartphones Smart watches
Which of the following is not a major business trend in e-commerce in 2016-2017?
Small businesses and entrepreneurs are hampered by the rising cost of market entry caused by increased presence of industry giants.
Which of the following statements about e-commerce in the United States in 2016 is not true?
Social e-commerce generates more revenue than mobile e-commerce
Proxy Server (proxy)
Software server that handles all communications originating from or being sent to the Internet, acting as a spokesperson or bodyguard for the organization
Zero-Day Vulnerability
Software vulnerability that has been previously unreported and for which no patch yet exists
Stickiness
The _____ of a Web site is its ability to keep visitors at the site and attract repeat visitors.
Privacy
The ability to control the use of information about oneself
Availability
The ability to ensure that an e-commerce site continues to function as intended
Nonrepudiation
The ability to ensure that e-commerce participants do not deny (i.e., repudiate) their online actions
Encryption
The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the receiver. The purpose of encryption is (a) to secure stored information and (b) to secure information transmission
Biometrics
The study of measurable biological or physical characteristics
information density
The total amount and quality of information available to all market participants
Which of the following statements illustrates the network effects that portals are subject to?
The value of the portal to advertisers and consumers increases geometrically as reach increases.
True
There has been little consensus on how to measure and charge for site visitor views, even after almost 20 years of experience with the medium.
WPA2
Wireless security standard that uses the AES algorithm for encryption and CCMP, a more advanced authentication code protocol
Cracker
Within the hacking community, a term typically used to denote a hacker with criminal intent
Which of the following is an example of a CMS?
WordPress
All of the following are major players in hosting/co-location/cloud services except:
WordPress.
Internet
Worldwide network of computer networks built on common standards
All of the following are examples of social networks except:
Y Combinator
After Google, the next portal/search engine site with the most unique visitors is:
Yahoo.
Addressable media
_____ are advertising efforts directed to a known recipient and include mail, telephone calls, and e-mail.
Usability
_____ is an important element of creating an effective Web presence.
Usability testing
_____ is the testing and evaluation of a site by its owner to ensure ease of use for site visitors.
LexisNexis
_____ offers a variety of information services for lawyers and law enforcement officials, court cases, public records, and resources for law libraries.
Digital products
_____ tend to have large up-front costs. Once those costs are incurred, additional units can be made at very low additional cost.
intranet
a TCP/IP network located within a single organization for purposes of communications and information processing
e-commerce business model
a business model that aims to use and leverage the unique qualities of the Internet and the World Wide Web
cable modem
a cable television technology that piggybacks digital access to the Internet on top of the analog video cable providing television signals to a home
sales revenue model
a company derives revenue by selling goods, information, or services
subscription revenue model
a company offers its users content or services and charges a subcription fee for access to some or all of its offerings
advertising revenue model
a company provides a forum for advertisements and receive fees from advertisers
transaction fee revenue model
a company receives a fee for enabling or executing a transaction
e-distributer
a company that supplies products and services directly to individual businesses
first mover advantage
a competitive market advantage for a firm that results from being the first into a marketplace with a serviceable product or service
Internet2
a consortium of more than 200 universities, government agencies, and private businesses that are collaborating to find ways to make the Internet more efficient
business plan
a doscument that describes a firm's business model
first mover
a firm that is first to market in a particular area and that moves quickly to gather market share
IP telephony
a general term for the technologies that use VoIP and the internet;s packet-switched network to transmit voice and other forms of audio communication over the Internet
perfect market
a market in which there are no competitive advantages or asymmetries because all forms have equal access to all the factors of production
package switching
a method of slicing digital messages into packets, sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive at their destination
client/server computing
a modlel of computing in which powerful personal computers are connected in a network togetherwith one or more servers
Internet Message Access Protocol (IMAP)
a more current e-mail protocol that allows users to search, organize, and filter their mail prior to downloading it from the server
eXtensible Markup Language (XML)
a new markup language specification developed by the W3C (World Wide Web Consortium) that is designed to describe data and information
diffserv (differentiated quality of service)
a new technology that assigns levels of priority to packets based on the type of data being transmitted
client
a powerful personal computer that is part of a network
Ping
a program that allows you to check the connection between your client and the server
Secure Sockets Layer (SSL)
a protocol that secures communications between the client and the server
Post Office Protocol 3 (POP3)
a protocol used by the client to retrieve mail from an Internet server
WAP (Wireless Application Protocol)
a realtively new protocol that can support virtually any wireless network and is supported by every operating system
GigaPop
a regional Gigabit Point of Presence, or point of access to the Internet2 network, that supports at least one gigabit (1 billion bits) per second information transfer
business model
a set of planned activites designed to result in a profit in a marketplace
business strategy
a set of plans for achieving superior long-term returns on the capital invested in a business firm
protocol
a set of rules and standards for data transfers
IP mutlicasting
a set of technologies that enables efficient delivery of data to many locations on a network
All of the following are basic functionality provided by web servers except:
a shopping cart.
commoditization
a situation where there are no differences among products or services, and the only basis of choosing products is price
The early years of e-commerce are considered
a stunning technological success
Digital Subscriber Line (DSL)
a telephone technology for delivering high-speed access through ordinary telephone lines found in homes or businesses
Telnet
a terminal emulation program that runs in TCP/IP
cookie
a tool used by websites to sotre information about a user. When a visitor enters a website, the site sends a small text file to the users computer so that info from the site can be loaded more quickly for future vists.
friction-free commerce
a vision of commerce in which information is equally distributed, transaction costs are low, prices can be dynamically adjusted to reflect actual demand, intermediaries decline, and unfair competitive advantages are eliminated
Hypertext
a way of formatting pages with embedded links that connect documents to one another, and that also link pages to other objects such as sound, video, or animation
Which of the following verifies that the business objectives of the system as originally conceived are in fact working?
acceptance testing
Stickiness is an important attribute for which of the following revenue models?
advertising revenue model
Which of the following is a community of members who self-identify with a demographic or geographic category?
affinity community
Healthboards is an example of a(n) ________ social network.
affinity-based
The early years of e-commerce were driven by all of the following factors except
an emphasis on exploiting traditional distribution channels
exchange
an independent digital electronic marketplace where suppliers and commercial purchasers can conduct transactions
Web client
any computing device attached to the Internet that is capable of making HTTP requests and displaying HTML pages, most commonly a Windows PC or Macintosh
information asymmetry
any disparity in relevant market information among parties in a transaction
second generation (2G) cellular networks
are relatively slow circuit-switched digital networks that can transmit data at about 10 Kbps
All of the following are examples of Web 2.0 sites and applications except
auction sites
Which of the following is not one of the three defining characteristics of a portal?
auctions
C2C e-commerce
consumers selling to other consumers
eBay uses all of the following business models except:
content provider.
Which system functionality must your website have in order to be able to personalize or customize a product for a client?
customer on-site tracking
The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade.
decreased dramatically
latency
delays in messages caused by the uneven flow of information packets through the network
revenue model
describes how the firm will earn revenue, produce profits, and provide a superior return on invested capital
GENI Initiative
develop new core functionality for internet
What are the two most important management challenges in building a successful e-commerce presence?
developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives
Which of the following basic system functionalities is used to display goods on a website?
digital catalog
Instant Messaging
display words on computer instantly
Innovative entrepreneurs and their business firms that destroy existing business models are referred to as ________.
disruptors
content provider
distributes information content, such as digital news, music, photos, video, and artwork over the Web
Mobile Apps
explode in 2012 - 20% of mobile owners research products, 35% made purchase
XML
extensible Markup language designed to describe data and information tags used are defined by user
Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service?
freemium strategy
Most of the time required to maintain an e-commerce site is spent on
general administration and making changes and enhancements to the system.
Instagram is an example of a(n):
general community/social network
campus area network (CAN)
generally, a local area network operating within a single organization that leases access to the Web directly from regional national carriers
Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?
global reach
Business-to-consumer (B2C) e-commerce in the United States:
has grown at double-digit rates between 2010 and 2016
WiFI
high speed, fixed broadband wireless lan. different versions for home and business market. Limited range
backbone
high-bandwith fiber-optic cable that transports data across the Internet
All of the following are basic functionality provided by e-commerce merchant server software except:
marketing analytics.
marketspace
marketplace extended beyond traditional boundaries and removed from a temporal and geographic location
bandwidth
measures how much data can be transferred over a communications medium within a fixed period of time; is usually expressed in bits per second (bps), kilobits per second (Kbps), or megabits per second (Mbps)
The costs incurred by merchants changing product prices (such as the costs of reentering prices into computer systems) are referred to as:
menu costs
GSM (Global System for Mobile Communications)
mobile communications system widely used in Europe and Asia that uses narrowband Time Division Multiple Access (TDMA)
server
network computer dedicated to common functions that the client computers on the network need
The term ________ refers to the advantages conferred as an auction site becomes larger in terms of visitors and products for sale.
network effects
value web
networked trans-business system that coordinates the value chains of several firms
Which form of testing compares a control page with one that is very different?
new concept test
Third generation (3G) cellular network
new generation of cellular phone standards that can connect users to the Web at 2.4 Mbps
Bluetooth
new technology standard for short-range wireless communication under 100 meters
Which social network functionality allows users to view a list of updates from friends as well as advertisements and notifications in chronological order?
newsfeed
GPRS (General Packet Radio Services)
next generation technology carries data in packets, just like the Internet, but over radio frwquencies that make wireless communication possible
unfair competitve advantage
occurs when one firm develops an advantage based on a factor that other firms cannot purchase
network effect
occurs where users receive value from the fact everyone else uses the same tool or product
portal
offers users powerful Web search tolls as well as an integrated package of content and services all in one place
B2C e-commerce
online businesses selling to individual consumers
B2B e-commerce
online businesses selling to other businesses
e-tailer
online retail store
Web 2.0
online social networks - services that support communication among networks of friends and peers - blogs - really simple syndication - allows to have digital content automatically send to their computers over the internet - podcasting -wikis -music and video services - VOIP - IPTV - video conferencing and telepresence
broadband
refers to any communications technology that permits clients to play streaming audio and video files at acceptable speeds-generally anything above 100 Kbps
market opportunity
refers to the company's intended marketspace and the overall potential financial opportunities available to the firm in that marketspace
industry structure
refers to the nature of the players in an industry and their relative bargaining power
competitive environment
refers to the other companies operating in the same marketspace selling similar products
All of the following are steps one can take to right-size a website's hardware platform and meet demands for service except:
replacing static pages with dynamically generated pages.
complimentary resources
resources and assets not directly involved in the production of the product but required for success, such as marketing, management, financial assets, reputation
Internet Layer
responsible for addressing, packing, and routing messages on the Internet
Network Interface Layer
responsible for placing packets on and receiving them from the network medium
Transport Layer
responsible for providing communication with the application by acknowledging and sequencing the packets to and from the application
A firm's ________ describes how a firm will produce a return on invested capital.
revenue model
Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text?
richness
Which of the following refers to the complexity and content of a message?
richness
What is the primary revenue model for an e-distributor?
sales
Portals primarily generate revenue in all of the following ways except:
sales of goods
All of the following are simple steps for optimizing web page content that can reduce response times except:
segmenting computer servers to perform dedicated functions.
Which of the following represent Amazon's primary value proposition(s)?
selection and convenience
All of the following are solutions to the problem of high monitoring costs except:
seller rating systems.
Which of the following involves a concern that one will never know how much the ultimate winner might have paid, or the true value to the final winner?
seller's lament
B2B service provider
sells business services to other firms
HyperText Transfer Protocol (HTTP)
the Internet protocol used for transferring Web pages
Simple Mail Transfer Protocol
the Internet protocol used to send mail to a server
Uniform Resource Locator (URL)
the address used by a Web browser to identify the location of content on the Web
marketspace
the area of actual or potential commercial value in which a company intends to operate
All of the following are major social trends in e-commerce in 2016-2017 except for:
the refusal of online retailers to accept taxation of Internet sales.
The term stateless refers to the fact that:
the server does not have to maintain an ongoing dedicated interaction with the client computer.
firm value chain
the set of activities a firm engages in to create final products from raw inputs
value chain
the set of activities performed in an industry or in a firm that transforms raw inputs into final products and services
universal computing
the sharing of files, information, graphics, sound, video, and other object across all computer platforms in thw rolds, regardless of operating systems
photonics
the study of communicating with light waves
personalization
the targeting of marketing messages to specific individuals by adjusting the message to a person's name, interests, and past purchases
barriers to entry
the total cost of entering a new marketplace
reach
the total number of users or customers an e-commerce business can obtain
narrowband
the traditional telephone modem connection, now operating at 56.6 Kbps
e-commerce
the use of the Internet and the Web to transact business. More formally, digitally enabled commercial transactions between and among organizations and individuals
E-commerce can be defined as
the use of the Internet, the Web, and mobile apps to transact business
Which of the following is not a major business trend in e-commerce in 2016-2017?
the weakening revenues of B2B e-commerce
A perfect market is one in which
there are no competitive advantages or asymmetries
mobile commerce
use of wireless digital devices to enable transactions on the web
Which element of the business model addresses what a firm provides that other firms cannot?
value proposition
A ________ is a networked business ecosystem that coordinates a firm's suppliers, distributors, and delivery firms with its own production needs using an Internet-based supply chain management system.
value web
Which type of investor typically becomes interested in a start-up company after it has begun generating revenue?
venture capital investors
A ________ marketplace supplies products and services of interest to particular industries.
vertical
IP Address: IP version 4
32 bit number can handle up to 4 billion addresses four sets of integer numbers marked off by periods 201.61.186.227 Class C address: Network identified by first three sets, computer identified by last set
Internet 2 Project
350+ institutions collaborate to facilitate revolutionary Internet technologies Goals is to create leading edge very high speed network for national research communication Enable revolutionary Internet applications
Hourglass Model of the Internet
4 layers that looks like a hourglass Applications layer is growing most
The size of the B2B market in 2017 was estimated at
6.7 trillion
In 2015, which age group has the fastest growing rate of Facebook usage?
64 and older
When using multivariate testing, if you wish to test two different versions of an image, a button, and a piece of text, how many combinations will you need to test?
8
Around what percentage of Internet users in the United States use social networks on a regular basis?
85%
In 2016, almost ________ of Americans who access the Internet use a mobile device at least some of the time.
93%
Catalog
A revenue model where the seller establishes a brand image, and then uses the strength of that image to sell through printed information mailed to prospective buyers, who place orders by mail or telephone is called the _____ model.
Security Policy
A set of statements prioritizing the information risks, identifying acceptable risk targets, and identifying the mechanisms for achieving these targets
Bill presentment
A(n) _____ service provides an electronic version of an invoice with all of the details that would appear in the printed document.
Threatening negative feedback in return for a benefit is an example of: A) feedback extortion. B) offensive shill feedback. C) defensive shill feedback. D) sending spam.
A) feedback extortion
Hash Function
An algorithm that produces a fixed-length number called a hash or message digest
Digital Cash
An alternative payment system in which unique, authenticated tokens represent cash value
Paywall
An approach where free content is available up to a point at which fees begin, is called a _____.
Risk Assessment
An assessment of the risks and points of vulnerability
Hacker
An individual who intends to gain unauthorized access to a computer system
False
An organization's Web presence is of lesser importance than its presence in the physical world.
The leading web server software is:
Apache.
Trojan Horse
Appears o be benign, but then does something other than expected. Often a way for viruses or other malicious code to be introduced into a computer system
Man-in-the-middle Attack (MitM)
Attack in which the attacker is able to intercept communications between two parties who believe they are directly communication with one another, when in fact the attacker is controlling the communications
Pharming
Automatically redirecting a Web link to an address different from the intended one, with the site masquerading as the intended destination
D) consumers look at native ads much more frequently than display ads
B) native advertising is a new form advertising found only online
Internet Network Architecture
Backbone: high bandwidth fiber optic cable networks Private Networks owned by a variety of NSP Bandwidth 155 Mbps - 2.5 Gbps (bits)
Which of the following was not able to successfully implement a freemium business model?
Baremetrics
Ruby on Rails is based on which of the following philosophies?
CoC
Exploit Kit
Collection of exploits bundled together and rented or sold as a commercial product
Which of the following is not a major technology trend in e-commerce in 2016-2017?
Computing and networking component prices increase dramatically.
IP Address: IP version 6
128 bit, able to handle 1 quadrillion address
Internet Phase 1 - Innovation Phase
1964-1974 - building blocks
Telephone based wireless Internet
3 G: GSM & CDMA
Pinterest visitors spend ________ a month on Facebook.
6.5 minutes
Adware
A PUP that serves pop-up ads to your computer
Merchant Account
A bank account that allows companies to process credit card payments and receive funds from those transactions
Secure Negotiated Session
A client-server session in which the URL of the requested document, along with the contents, contents of forms, and the cookies exchanged, are encrypted
Virus
A computer program that has the ability to replicate or make copies of itself, and spread to other files
Digital Certificate
A digital document issued by a certification authority that contains a variety of identifying information
False
A disadvantage of the Web catalog revenue model is that the products sold in physical stores cannot be sold on the web.
True
A good Web site design can provide many image-creation and image-enhancing features very effectively - it can serve as a sales brochure, a product showroom, a financial report, and employment ad, and a customer contact point.
Information dissemination
A key goal for the Web sites of many not-for-profit organizations is _____.
E-Commerce
A methodology of modern business which addresses the need of business organizations, vendors, and customers to reduce cost and improve the quality of goods and services while increasing the speed of delivery
Browser Parasite
A program that can monitor and change the settings of a user's browser
Spyware
A program used to obtain information such as a user's keystrokes, e-mail, instant messages, and so on
Near Field Communication (NFC)
A set of short-range wireless technologies used to share information among devices
Digital Envelope
A technique that uses symmetric encryption for large documents, but public key cryptography to encrypt and send the symmetric key
Certification Authority (CA)
A trusted third party that issues digital certificates
Sniffer
A type of eavesdropping program that monitors information traveling over a network
Session Key
A unique symmetric encryption key chosen for a single secure session
Pretty Good Privacy (PGP)
A widely used e-mail public key encryption software program
One of the first online virtual communities was: A) The Well B) Myspace C) AOL D) Salon.com
A) The Well
The fact that participating in an Internet auction means that you will need to purchase a computer, learn to use it, and pay for Internet access, is an example of ____________ costs. A) equipment B) fulfillment C) delayed consumption D) monitoring
A) equipment
One partial solution to high monitoring costs is ________ pricing. A) fixed B) dynamic C) allocated D) distress
A) fixed
A website designed to give horse enthusiasts a common discussion area would be classified as a(n): A) interest-based social network B) affinity community C) practice network D) sponsored community
A) interest-based social network
Acquisition rate is a measure of the:
A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages
A(n) ________ offers members focused discussion groups, help, information, and knowledge related to an area of shared practice. A) practice network B) general community C) affinity community D) interest-based social network
A) practice network
D) behavioral
A) query-driven
All of the following are solutions to the problem of high monitoring costs except: A) seller rating systems. B) watch lists. C) proxy bidding. D) fixed pricing.
A) seller rating systems
D) click fraud
A) social search
D) versioning
A) the Law of One Price
E-mailing buyers to warn them away from a seller is a type of auction fraud known as ________. A) transaction interference B) bid siphoning C) bid rigging D) shill bidding
A) transaction interference
A template test is a form of which type of testing?
A/B testing
False
Advertisers pay less to have their ad appear near a discussion of a technology related to their product or on a page that reviews the product.
Which of the following is an example of an on-demand service company?
Airbnb
False
All electronic commerce initiatives have the goal of providing revenue.
Virtual Private Network (VPN)
Allows remote users to securely access internal networks via the Internet, using the Point-to-Point Tunneling Protocol (PPTP)
Spam (junk) Web Sites
Also referred to as link farms; promise to offer products or services, but in fact are just collections of advertisements
True
Although online banks let customers pay their bills electronically, most customers still receive their bills in the mail.
All of the following use a social network marketing strategy except:
Amazon
Which of the following is not considered a portal
Amazon
______ is an example of e-business
Amazon's inventory control system
All of the following use an advertising revenue model except:
Amazon.
All of the following types of auctions generally involve single units except: A) English auction. B) Dutch Internet. C) Name Your Own Price auction. D) penny auction.
B) Dutch Internet
D) profiling
B) Hadoop
______________ is the second leading social network in the United States in terms of monthly unique visitors. A) Twitter B) LinkedIn C) Instagram D) Pinterest
B) LinkedIn
Each of the following is a top six social network site in the United States except: A) Tumblr B) Myspace C) Instagram D) Pinterest
B) Myspace
Which of the following early leaders in social networking has been reinvented as a music-oriented social network? A) Vevo B) Myspace C) Polyvore D) Tumblr
B) Myspace
Which of the following types of auctions "shields the brand" of the seller? A) English auction B) Name Your Own Price auction C) Dutch auction D) penny auction
B) Name Your Own Price auction
Conversion rate is a measure of the:
B) Percentage of visitors who become customers
________ allows the consumer to enter a maximum price and the auction software automatically places incremental bids up to that maximum price as their original bid is surpassed. A) A watch list B) Proxy bidding C) Sealed bidding D) Price matching
B) Proxy bidding
D) The law applies to email, texts, and social media messaging
B) The law has no impact on companies located within the United States
Which of the following statements illustrates the network effects that portals are subject to? A) Specialized vertical market portals attract only a small percentage of the audience, while a few large megaportals garner most of the market. B) The value of the portal to advertisers and consumers increases geometrically as reach increases. C) The greater the amount of content provided by a portal, the greater its value to the community. D) The greater number of portals available, the greater the potential audience for each.
B) The value of the portal to advertisers and consumers increases geometrically as reach increases.
When sellers agree informally or formally to set floor prices below which they will not sell on auction items, this is known as: A) discriminatory pricing. B) price matching. C) bid rigging. D) distress pricing.
B) price matching
D) entertainment
B) retail
Which of the following measures the average length of stay at a website?
B) stickiness
When did the first online communities form? A) the 1970s B) the 1980s C) the 1990s D) the 2000s
B) the 1980s
D) the Internet has expanded the information intensity of the marketplace
B) the Internet has decreased the impact of brands
D) the more cookies are deleted, the less accurate ad server metrics become
B) the data typically stored in cookies includes a unique ID and email address
D) Free products and services can help build market awareness.
B) the free pricing strategy was born in the early days of the Web
D) reach
B) unique visitors
D) lead generation marketing
B) viral marketing
Howard Rheingold, one of The Well's early participants, coined the term ____________, to refer to "cultural aggregations that emerge when enough people bump into each other often enough in cyberspace." A) social networks B) virtual communities C) community portals D) social forums
B) virtual communities
Which of the following is not a community provider?
Blue Nile
Which of the following is not an example of the bricks-and-clicks e-tailing business model?
Bluefly
Business Models for E-Commerce
Business-to-Business Business-to-Consumer Consumer-to-Business Business-to-Government Government-to-Business Government-to-Citizen
False
Business-to-business sellers are passive adopters of the Web catalog model.
Which of the following is the most meaningful metric for video ads?
C) Completion rate
Which of the following types of auctions is most often associated with sellers that have many identical items to sell? A) English auctions B) Name Your Own Price auctions C) Dutch Internet auctions D) group buying auctions
C) Dutch Internet auctions
A(n) ________, in which the highest bidder wins, is the most common form of auction. A) Dutch Internet auction B) Japanese auction C) English auction D) reverse auction
C) English auction
________ is the tendency to gravitate toward, and bid for, auction listings with one or more existing bids. A) Group buying B) Winner's regret C) Herd behavior D) Bid rigging
C) Herd behavior
D) Graph Search
C) Hummingbird
D) It enables worldwide customer service and marketing communications.
C) It allows video, audio, and text to be integrated into a single marketing message and consuming experience.
In 2015, Fortune 500 companies used _____________ more than Facebook. A) no other social networks B) Tumblr C) LinkedIn D) Pinterest
C) LinkedIn
On which of the following do users spend the least amount of time per month? A) Snapchat B) Tumblr C) LinkedIn D) Pinterest
C) LinkedIn
____________ was an early investor in Facebook. A) Google B) Apple C) Microsoft D) LinkedIn
C) Micosoft
_____________ recently acquired LinkedIn. A) Facebook B) Google C) Microsoft D) Verizon
C) Microsoft
D) Knowledge Graph
C) Panda
Facebook owns _______________. A) Pinterest B) Snapchat C) WhatsApp D) Tumblr
C) WhatsApp
D) lead generation marketing
C) affiliate marketing
Which of the following is a community of members who self-identify with a demographic or geographic category? A) practice network B) sponsored community C) affinity community D) interest-based social network
C) affinity community
Healthboards is an example of a(n) ___________ social network. A) practice-based B) interest-based C) affinity-based D) general
C) affinity-based
Which of the following is not one of the three defining characteristics of a portal? A) commerce B) content C) auctions D) navigation of the Web
C) auctions
Which of the following measures the percentage of emails that could not be delivered?
C) bounce-back rate
Which of the following measures the ratio of items purchased to product views?
C) browse-to-by ratio
All of the following are benefits of auctions except: A) more efficient price discovery. B) lower transaction costs. C) decreased price transparency. D) increased market efficiency.
C) decreased price transparency
Instagram is an example of a(n): A) interest-based social network B) affinity community/social network C) general community D) practice network
C) general community
D) product evaluation skills of the consumer
C) knowledge consumers have about how to conduct online transactions
Which of the following is not one of the top factors a business should consider when planning an Internet auction? A) type of product B) type of auction C) location of auction D) bid increments
C) location of auction
D) fixed cost
C) marginal cost
The term ________ refer(s) to the advantages conferred as an auction site becomes larger in terms of visitors and products for sale. A) siphoning B) herd behavior C) network effects D) channel expansion
C) network effects
Which social network functionality allows users to view a list of updates from friends as well as advertisements and notification in chronological order? A) message board B) timeline C) newsfeed D) friends' network
C) newsfeed
D) number of pages viewed
C) number of HTTP requests
__________ of procurement officers use auctions to purchase goods. A) Eighty per cent (80%) B) Less than a quarter C) Over one third D) Twenty-five per cent (25%)
C) over one third
Which of the following is not a risk or cost of Internet auctions? A) delayed consumption costs B) equipment costs C) price transparency D) trust risks
C) price transparency
D) keyword advertising
C) programmatic advertising
Which of the following involves a concern that one will never know how much the ultimate winner might have paid, or the true value to the final winner? A) herd behavior B) winner's regret C) seller's lament D) loser's lament
C) seller's lament
________ refers to the use of secondary user IDs or bidders who have no actual intention to buy to artificially raise the price of an item. A) Bid manipulation B) Shill feedback C) Shill bidding D) Bid rigging
C) shill bidding
D) sponsorship marketing
C) social marketing
D) freemium
C) surge pricing
A ________ permits the consumer to monitor specific auctions of interest, requiring the consumer to pay close attention only in the last few minutes of bidding. A) bidding fee auction B) channel manager C) watch list D) rating system
C) watch list
Public Key Infrastructure (PKI)
CAs and digital certificate procedures hat are accepted by all parties
________ provides a set of standards for communicating between a browser and a program running on a server that allows for interaction between the user and server.
CGI
Which of the following technologies is used to separate the design and presentation of content from the content creation process?
CMS
Cannibalization
Channel conflict is also referred to as _____.
Botnet
Collection of captured bot computers
True
Companies can adapt their catalog revenue model online by replacing or supplementing their print catalogs with information on their Web sites.
True
Companies change their revenue models to meet the needs of the new changing Web users.
True
Companies that have existing sales outlets and distribution networks often worry that their Web sites will take away sales from those outlets and networks.
Fee-for-service
Companies using _____ revenue model charge a fee based on the value of the service provided on the Web.
True
Companies using a digital content revenue model sell rights to access the information they own.
Cloud Computing
Computing power and software over the internet (Google Apps) Fastest growing form of computing Radically reduces cost of building and operating web sites, infrastructure, IT support, hardware and software
Which of the following is an example of C2C e-commerce?
Craigslist
Hacktivism
Cybervandalism and data theft for political purposes
D) 30-day
D) 30-day
In 2015, which age group has the fastest growing rate of Facebook usage? A) 12-34 B) 35-45 C) 46-65 D) Adults over 65
D) Adults over 65
_______________ is an example of a practice network? A) PredictWallstreet B) Instagram C) Debater D) Doximity
D) Doximity
Yahoo owns all of the following except: A) Tumblr. B) Flickr. C) Aviate. D) Instagram.
D) Instagram
Priceline is an example of a(n): A) English auction. B) Dutch auction. C) penny auction. D) Name Your Own Price auction
D) Name Your Own Price auction
D) Search engine advertising is the fastest growing type of online advertising.
D) Search engine advertising is the fasted growing type of online advertising.
Facebook was the leader in U.S. ad spending revenues on social networks in 2016. What company earned the second most amount of ad spending revenue? A) Snapchat B) LinkedIn C) Pinterest D) Twitter
D) Twitter
________ has tentatively agreed to purchase Yahoo. A) AT&T B) Microsoft C) AOL D) Verizon
D) Verizon
________ refers to the feeling that one has paid too high a price for an item won at auction. A) Seller's lament B) Winner's lament C) Loser's regret D) Winner's regret
D) Winner's regret
D) a tiny graphics file embedded in an email or web page
D) a tiny graphics file embedded in an email or web page
The technology used by early communities was limited to mostly: A) instant messaging B) FTP C) email D) bulletin boards
D) bulletin boards
D) conversation
D) conversation
D) email
D) email
The amount of time visitors spend on a site is a measure of ________. A) reach B) loyalty C) conversation D) engagement
D) engagement
ESPN.com is an example of a: A) general purpose portal. B) vertical market portal based on affinity group. C) vertical market portal based on focused content. D) focused content portal.
D) focused content portal
D) native advertising that is displayed on a social media site
D) native advertising that is displayed on a social media site
D) online retailers
D) online retailers
Which of the following is not one of the typical portal revenue sources? A) commissions on sales B) subscription fees C) tenancy deals D) referral fees
D) referral fees
D) rich media
D) rich media
D) targeted banner ads
D) targeted banner ads
D) universal standards
D) universal standards
D) versioning
D) versioning
The profit a seller makes at auction is a function of all of the following except: A) initial pricing B) auction length. C) the number of units for auction. D) watch lists
D) watch lists
D) yield management
D) yield managment
PDI-DSS (Payment Card Industry-Data Security Standards)
Data security standards instituted by the five major credit card companies
Improved Sales
Dependencies to buy a products reduce at large and sales increases
Authorization Policies
Determine differing levels of access to information assets for differing levels of users
Access Controls
Determine who can gain legitimate access to a network
Data Encryption Standard (DES)
Developed by the National Security Agency (NSA) and IBM. Uses a 56-bit encryption key
US-CERT
Division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses across government and private sectors
Which of the following types of auctions is perfect for sellers that have many identical items to sell?
Dutch Internet auctions
All of the following types of auctions involve single units except:
Dutch Internet.
Which of the following companies use a transaction fee revenue model?
E*Trade
24x7 Service Availability
E-Commerce automates business of enterprises and services provided by them to customers are available anytime, anywhere
Non-Cash Payment
E-Commerce enables use of credit cards, debit cards, smart cards, electronic fund transfer via bank's website and other modes of electronics payment
Advertising / Marketing
E-Commerce increases the reach of advertising of products and services of businesses
Support
E-Commerce provides various ways to provide pre sales and post sales assistance to provide better services to customers
Communication Improvement
E-Commerce provides ways for faster, efficient, reliable communication with customers and partners
________ create and sell access to digital markets.
E-procurement firms
All of the following would be considered a direct competitor of Priceline except
ESPN
Which of the following statements is not true?
Economists take a purely technical approach to e-commerce.
Security Organization
Educates and trains users, keeps management aware of security threats and breakdowns, and maintains the tools chosen to implement security
EDI
Electronic Data Interchange
False
Electronic books are rapidly replacing physical books.
E-Commerce
Electronics Commerce
A(n) ________, in which the highest bidder wins, is the most common form of auction.
English auction
Authorization Management System
Establishes where and when a user is permitted to access certain parts of a Web site
Intrusion Detection System (IDS)
Examines network traffic, watching to see if it matches certain patterns or preconfigured rules indicative of an attack
Social Engineering
Exploitation of human fallibility and gullibility to distribute malware
Which of the following is an example of social e-commerce?
Backdoor
Feature of viruses, worms, and Trojans that allows attacker to remotely access a compromised computer
Most significant private initiatives
Fiber optics and Mobile wireless internet services
Heartbleed Bug
Flaw in OpenSSL encryption system that allowed hackers to decrypt an SSL session and discover user names, passwords, and other user data
Denial of Service Attack (DoS)
Flooding a Web site with useless traffic to inundate and overwhelm the network
Electronic Billing Presentment and Payment System (EBPP)
Form of online payment system for monthly bills
Extranet
Formed when firms permit outsiders to access their internal TCP/IP networks
Which of the following is an example of B2B e-commerce?
Go2Paper
Which of the following cannot be used to retrieve objects from a database?
HTML
Internet Protocols
HTTP Email: SMTP (typically used), POP3 (office), IMAP (enables access to email on server) FTP: transport files over internet Telnet: enable communication SSL/ TLS - secure communication
TCP/IP Protocol Suite:
HTTP: Hyper Text Transfer Telnet: Communicating for remote access FTP: File Transfer Protocol SMTP: Simple Mail Transfer
Black Hats
Hackers who act with the intention of causing harm
Grey Hats
Hackers who believe they are pursuing some greater good by breaking in and revealing system flaws
Intrusion Prevention System (IPS)
Has all the functionality of an IDS, with the additional ability to take steps to prevent and block suspicious activities
________ is the tendency to gravitate toward, and bid for, auction listings with one or more existing bids.
Herd behavior
WiMax
High speed, medium range broadband wireless metropolitan area network
HTML
Hypertext Markup Langauge - most used for websites HTML5 is newest version
Who Governs the Internet
IAB ICANN IESG IETF ISOC W3C ITU
domain name
IP address expressed in natural language
Domain name
IP addresses expressed in natual language 1 IP number can have multiple domain names
The laws of the state
Identify the force preventing U.S. professionals from extending their practices on the Web.
Search Engines
Identify webpage that match queries based on keywords, page ranking Also serve as shopping tools most common internet activity
Which of the following statements about Foursquare is not true?
In 2016, Foursquare decided to refocus its effort on developing a subscription-based revenue model.
Mass media
In the _____ approach, firms prepare advertising and promotional materials about the firm and its products or services and broadcast them to potential customers.
Flexibility
In the context of accessibility, one of the best ways to accommodate a broad range of visitor needs is to build _____ into the Web site's interface.
Cope Today
In the context of professional services using a fee-for-service revenue model, _____ was a pioneer in offering online therapy to patients in the United States.
False
In the fee-for-service model, the fee is based on the number or size of transactions the service providers process.
Authentication Procedures
Include the use of digital signatures, certificates of authority, and public key infrastructure
Yahoo owns all of the following except:
Instagram.
Cybervandalism
Intentionally disrupting, defacing, or even destroying a site
2.5G network
Interim cellular network that provides speeds of 60-144 Kbps using General Packet Radio Switching
IXP
Internet X-change points: hubs where backbone interests with regional and local networks and backbone owners connect with one another
IP
Internet protocol - language in which networks communicate
Spoofing
Involves attempting to hide a true identity by using someone else's e-mail or IP address
Electronic Bulletin Boards
It is the electronic transfer of money from one bank account to another, either within a single financial institution or across multiple institutions, via computer-based systems, without the direct intervention of the bank staff
CANs
LANs operating within a single organization that leases Internet access directly from regional or national carrier
Future Internet
Latency solutions - differentiated quality of service - Guaranteeing service levels and lower error rates -declining cost - Internet of Things - objects connected via sensors / RFID to internet
An example of a practice network is:
Linux.org.
________ typically include a data flow diagram to describe the flow of information for an e-commerce site.
Logical designs
True
Many classified advertising sites generate substantial revenue, replacing newspapers' historical role as the primary carrier of classified ads.
Fitting Rooms
Many clothing Web sites offer virtual models on which customers can try clothes, such services are referred to as virtual _____.
Electronic Email
Method of exchanging messages between people using electronics
Which of the following companies was an early investor in Facebook?
Microsoft
CERT Coordination Center
Monitors and tracks online criminal activity reported to it by private corporations and government agencies that seek out its help
True
Most successful advertising on the Web is targeted at specific groups.
Streaming Media
Music, video, other large files sent to users in chunks so that when received and played, file comes through uninterrupted
Which of the following is an example of the affiliate revenue model?
MyPoints
Which of the following early leaders in social networking has been reinvented as a music-oriented social network?
Myspace
Which of the following types of auctions "shields the brand" of the seller?
Name Your Own Price auction
Priceline is an example of a(n):
Name Your Own Price auction.
Cons of Cloud Computing
Need internet all the time that is reliable Sensitive information is stored somewhere out there
Four TCP/IP layers
Network interface layer Internet layer Transport layer Application layer
Internet
Network of networks, links businesses, educational institutions, gov agencies, and individuals
Which of the following has the highest penetration of social network usage among the general population?
North America
Data Breach
Occurs when an organization loses control over its information to outsiders
Fee-for-transaction
Online stock brokerage firms use a(n) _____ revenue model, which allows them to charge their customers a commission for each trade executed.
Improved Sales
Orders for the products can be generated anytime, anywhere without any human intervention
Packet Switching Process
Original text message --> digitized into bits --> broken into packets --> header info added to each packet indicating destination, and other control information such as how many bits are in the total message and how many packets
Which of the following statements is not true?
Overall transaction costs have dropped dramatically.
Which of the following is the most commonly used server-side scripting language?
PHP
False
People spend less time at a sticky Web site and are thus, exposed to very little advertising.
Online Stored Value Payment System
Permits consumers to make instant, online payments to merchants and other individuals based on value stored in an online account
Communication modes
Personal contact and mass media approaches are often called _____.
Security Token
Physical device or software that generates an identifier that can be used in addition to or in place of a password
Utility Programs
Ping: Tracert: how packet traveled
Potentially Unwanted Program (PUP)
Program that installs itself on a computer, typically without the user's informed consent
IP - Internet Protocol
Provides Internet's addressing scheme
False
Publishers do not experience sales losses as a result of online distribution.
Django is based on which of the following?
Python
Firewall
Refers to either hardware or software that filters communication packets and prevents some packets from entering the network based on a security policy
EDI
Replaces postal mail, fax, and email
Inventory Management
Reports get generated instantly when required
An example of a company using the content provider model is
Rhapsody
Which of the following is an example of the subscription revenue model?
Scribd
________ is used to process certificates and private/public key information.
Secure Sockets Layer/Transport Layer Security
Routing Internet Messages: TCP/IP and Packet Switching
Sending prepares address, TCP/IP breaks data into packets, packets travel router to router, reassembled at destination point
______ refers to the use of secondary user IDs or bidders who have no actual intention to buy to artificially raise the price of an item.
Shill bidding
Each of the following is one of the top six social network sites in the United States except:
Snapchat.
________ technologies are technologies that enable the incremental improvement of products and services.
Sustaining
________ are the types of information systems capabilities needed to meet business objectives.
System functionalities
Intranet
TCP/IP network located within a single organization for communications and processing (protected from being access from external)
SQL Injection Attack
Takes advantage of poorly coded Web application software that fails to properly validate or filter data entered by a user on a Web page
Cipher Text
Text that has been encrypted and thus cannot be read by anyone other than the sender and the receiver
True
The Internet is not a mass medium, even though a large number of people now use it and many companies seem to view their Web sites as billboards or broadcasts.
Advertising-subscription mixed
The New York Times and The Wall Street Journal use the _____ revenue model.
Which of the following was the original "killer app" that made the Internet commercially interesting and extraordinarily popular?
The Web
Which of the following statements about the Web is not true?
The Web is the technology upon which the Internet is based.
True
The Web provides a way for technical content developers to reach retail customers.
One of the first online virtual communities was:
The Well.
Personal Shopper
The _____ is an intelligent agent program that learns the customer's preferences and makes suggestions.
Integrity
The ability to ensure that information being displayed on a Web site or transmitted or received over the Internet has not been altered in any way by an unauthorized party
Confidentiality
The ability to ensure that messages and data are available only to those who are authorized to view them
Authenticity
The ability to identify the identify of a person or entity with whom you are dealing on the Internet
Implementation Plan
The action steps you will take to achieve the security plan goals
True
The advertising-support revenue model is the one used by broadcast network television in the United States.
True
The defining characteristic of the mass media promotion process is that the seller is active and the buyer is passive
Reintermediation
The introduction of a new intermediary, such as a fee-for-transaction Web site, into a value chain is called _____.
Which of the following statements is true about the traditional tradeoff between the richness and reach of a marketing message prior to the development of the Web?
The larger the audience reached, the less rich the message.
Which of the following is not true regarding e-commerce today?
The market middlemen disappeared.
Advanced Encryption Standard (AES)
The most widely used symmetric key algorithm offering 128-, 192-, and 256-bit keys
Which of the following best describes the early years of e-commerce?
They were a technological success but a mixed business success
Which of the following is not an element of friction-free commerce?
Transaction costs are high.
TCP
Transmission Control Protocol - establishes connection among sending and receiving Web computers Handles assembly of packets at point of transmission and reassembly at receiving
Facebook was the leader in U.S. ad spending revenues on social networks in 2015. What company earned the second most amount of ad spending revenue?
In 2015, Fortune 500 companies used ________ more than Facebook.
Which of the following is the second leading social network in the United States in terms of number of members?
Public Key Cryptography
Two mathematically related digital keys are used: a public key and a private key. The private key is kept secret by the owner, and the public key is widely disseminated. Both keys can be used to encrypt and decrypt a message. However, once the keys are used to encrypt a message, that same key cannot by used to unencrypt the message
Ben Shneiderman
Two pioneers of usability testing are _____ and Jakob Nielsen.
Paperless
Type of exchange of business information in E-Commerce
Bot
Type of malicious code that can be covertly installed on a computer when connected to the Internet. Once installed, the bot responds to external commands sent by the attacker
Virtual Currency
Typically circulates within an internal virtual world community or is issued by a specific corporate entity, and used to purchase virtual goods
Which of the following is not true about the use of apps?
Users still spend less time using apps than they do using desktops or mobile websites.
Distributed Denial of Service Attack (DDoS)
Using numerous computers to attack the target network from numerous launch points
Which of the following is a leading social network in Russia?
VK
________ and ________ are typically the most easily identifiable aspects of a company's business model.
Value proposition, revenue model
False
Web catalog retailers typically refrain from having return policies on unused merchandise.
False
Web companies with unprofitable growth phases for long durations retained their revenue models to grow successfully.
______ is not an open source software tool.
WebSphere
Facebook purchased which of the following for $22 billion?
True
When customers buy a product, they are also buying the service element included with that product.
_______ refers to the feeling that one has paid too high a price for an item won at auction.
Winner's regret
affiliate revenue model
a company steers business to an affiliate and receives a referral fee or percentage of the revenues from any resulting sales
application services provider (ASP)
a company that sells access to Internet-based software applications to other companies
competitive advantage
achieved by a firm when it can produce a superior product a superior product and/or bring the product to market at a lower price than most, or all, of its competitors
All of the following are methods of improving the processing architecture of a website except:
adding web servers.
All of the following are important factors in search engine optimization except:
adhering to privacy policies.
NaturallyCurly is an example of a(n):
affinity community.
T1
an international teleport standards for digital communication that offers guaranteed delivery at 1.54 Mbps
T3
an international teleport standards for digital communication that offers guaranteed delivery at 45 Mbps
A wealthy individual who invests personal funds in a start-up in exchange for an equity share in the business is referred to as a(n) ________.
angel investor
ubiquity
available just about everywhere, at all times
Which of the following describes the basic web policy of large firms during the Invention period?
basic, static website depicting firm's brand
AOL is focusing its strategy on all of the following except:
being an ISP.
The process of comparing a website with that of its competitors in terms of response speed, quality of layout, and design is known as:
benchmarking.
Which of the following involves e-mailing another seller's bidders and offering the same product for less?
bid siphoning
Which of the following is a characteristic of the Consolidation phase of e-commerce?
brand extension and strengthening becomes more important than creating new brands
Which of the following is an unfair competitive advantage?
brand name
market creator
builds a digital environment where buyers and sellers can meet, display products, search for products, and establish a price for products
The technology used by early online communities was limited to mostly:
bulletin boards.
Big Band
can accommodate
Advantages of dynamic page generation include all of the following except:
client-side execution of programming
Pathping
combines the functionality offered by Ping and Tracert
Which element of the business model refers to the presence of substitute products in the market?
competitive environment
routing algorithm
computer program that ensures that packets take the best available path toward their destination
Last Mile
connection from user's device to internet 2 basic types of wireless - telephone - computer network based
fiber-optic cable
consists of up to hundreds of strands of glass or plastic that use light to transmit data
Offline media is typically used for all of the following marketing activities except:
conversation
The primary way a website personalizes the content presented to a visitor is through the use of:
cookies
e-procurement firm
creates and sells acces to digital electronic markets
All of the following are basic information requirements for a product database except
customer ID numbers.
value proposition
defines how a company's product or serive fulfills the needs of customers
Which of the following terms is synonymous with e-commerce?
digital commerce
private indistrial network
digital network designed to coordinate the flow of communictions among firms engaged in business together
Over the past decade, the number of exchanges has:
diminished sharply.
Which of the following is a characteristic of e-commerce during the Invention period
disintermediation
Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers?
disintermediation
disintermediation
displacement of market middlmen who trasitionally are intermediaries between producers and consumers by a new direct relationship between manufacturers and content originators with their costomer
Amazon is an example of which of the following business models?
e-distributor
The business model of e-tailers is similar to that of
e-distributors
Which of the following may offer its customers value chain management software?
e-procurement companies
Which of the following is the market leader in C2C auctions?
eBay
Which of the following is an example of an e-commerce first mover that failed?
eToys
scale economics
efficiencies that arise from increasing the size of a business
Features on which foundations of e-commerce are built
email instant messaging search engines online chat streaming media cookies
management team
employees of the company responsible for making the business model work
If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:
enable individual customization of the product by consumers.
TCP/IP
enable services similar to telephone
Web server software
enables a computer to deliver web pages to clients on network, responds to request by sending HTTP request
The amount of time visitors spend on a site is a measure of ________.
engagement
The fact that participating in an Internet auction means that you will need to purchase a computer, learn to use it, and pay for Internet access, is an example of ________ costs.
equipment
asymmetry
exists whenever one participant in a market has more resources than other participants
Which of the following is a characteristic of the Reinvention phase of e-commerce?
expansion of e-commerce to include services as well as goods
All of the following were visions expressed during the early years of e-commerce except
fast follower advantage
Threatening negative feedback in return for a benefit is an example of:
feedback extortion.
All of the following may lead to a competitive advantage except:
fewer products
Which of the following is not a main factor in determining the overall demand on an e-commerce site?
file sizes of web pages being served
Which of the following is not a primary activity in a firm value chain?
finance/accounting
Which of the following is another name for a revenue model?
financial model
Internet Services Provider (ISP)
firm that provides the lowest level of service in the multi-tiered Internet architecture by leasing Internet access to home owners, small businesses, and some large institutions
One partial solution to high monitoring costs is ________ pricing.
fixed
A strategy designed to compete within a narrow market or product segment is called a ________ strategy.
focus
ESPN.com is an example of a:
focused content portal.
Hypertext
formatted with embedded links - links connect documents to one another
extranet
formed when firms permit outsiders to access their internal TCP/IP networks
All of the following are issues facing Pinterest except
inability to retain users
Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as
incubators
TheSeam is an example of a(n):
industry consortium.
industry consortia
industry-owned vertical marketplace that serve specific industries
Which of the following is not a unique feature of e-commerce technology?
information asymmetry
Which of the following refers to any disparity in relevant market information among parties in a transaction?
information asymmetry
Which of the following is one of the three primary societal issues related to e-commerce?
intellectual property
A Web site designed to give yachting enthusiasts a common discussion area would be classified as a(n):
interest-based social network.
First Mile
internet services that carry bulk traffic over distances older lines replaced with fiber optics
Applications layer
layer of Internet architecture that contains alient applications
Transport Services and Representation Standards layer
layer of Internet architecture that houses the TCP/IP protocol
Network Technology Substrate layer
layer of Internet technology that is composed of telecommunications networks and protocols
All of the following might be part of a website's middle-tier layer except:
legacy corporate applications
Which of the following is not a key element of an elevator pitch?
legal structure
The use of a company's competitive advantage to penetrate surrounding markets is known as ________.
leverage
Which of the following is not one of the top factors a business should consider when planning an Internet auction?
location of auction
Which of the following are the two main components of a systems design?
logical design and physical design
Ultra-wideband (UWB)
low power, short range high bandwidth network
Bluetooth
low speed, short range connection
In the ________ business model, a web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products, and establish prices.
market creator
Which of the following is not a variation of the e-tailer business model?
market creator
A ________ specifically details how you plan to find customers and sell your product.
market strategy
Which of the following is a physical place you visit to conduct business?
marketplace
CDMA (Code Division Multiple Access)
mobile communications system widely used in the United States that used in the United States that uses the full spectrum of radio frequencies and digitally encrypts each call
Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship?
mobile e-commerce
The time spent watching and reviewing auction bids is a part of ________ costs.
monitoring
most used app of the internet
All of the following are website design features that annoy customers except:
multi-browser functionality.
redundancy
multiple duplicate devices and paths in a network
service provider
offers services online
Unfair competitive advantages occur when
one competitor has an advantage others cannot purchase
WWW
one of internet's most popular services, trillions of webpages
Tracert
one of several route-tracing utilities that allow you to follow the path of a message you send from your client to a remote computer on the Internet
HyperText Markup Language (HTML)
one of the next generation of GMLs that is relatively easy to use in Web page design. HTML provides Web page designers with a fixed set of markups "tags" are used to format a Web page
File Transfer Protocol (FTP)
one of the original Internet services. Part of the TCP/IP protocol that permits users to transfer files from the server to their client computer, and vice versa
MySQL is which of the following?
open source database software
Which of the following is not one of the basic business objectives for an e-commerce site?
optimize system architecture
In general, the key to becoming a successful content provider is to:
own the content being provided
Network Service Provider (NSP)
owns and controls one of the major networks comprising the Internet's backbone
All of the following are business models employed in the online music industry except
peer-to-peer streaming
Which of the following details the actual hardware components to be used in a system?
physical design
marketplace
physical space you visit in order to transact
organizational development
plan describes how the company will organize the work that needs to be accomplished
Client/Server Computing
powerful personal computers (clients) connected in network with one or more servers Offer resources: storing files software applications access to printers
A(n) ________ offers members focused discussion groups, help, information, and knowledge related to an area of shared practice.
practice network
When sellers agree informally or formally to set floor prices below which they will not sell on auction items, this is known as:
price matching.
Which of the following is not a risk or cost of Internet auctions?
price transparency
web browers
primary purpose to display web pages internet explorer: 49% of market mozilla firefox - 18% - open source browser
Really Simple Syndication (RSS)
program that allows users to have digital content, including text, articles, blogs and podcast audio files, automatically sent to their computers over the internet
Wireless markup Language (WML)
programming language for devices using WAP
TCP
protocol that establishes the connections among sending and receiving Web computers and handles the assembly of packets at the point of trasmission, and their reassembly at the receiving end
IP
protocol that provides the Internet's addressing scheme and is responsible for the actual delivery of the packets
ISP (Internet Service Providers)
provide lowest level of service to individuals, small business, and some instititions Types of Services: Narrowband Broadband
Application Layer
provides a wide variety of applications with the ability to access the services of the lower layers
Which of the following allows the consumer to enter a maximum price and the auction software automatically places incremental bids up to that maximum price as their original bid is surpassed?
proxy bidding
Which of the following types of application server monitors and controls access to a main web server and implements firewall protection?
proxy server
The total number of users or customers an e-commerce business can obtain is called:
reach
Internet Today
recently exploded without disruption
Which of the following is not one of the typical portal revenue sources?
referral fees
intellectual property
refers to all forms of human expression that can be put into a tangible medium such as text, CDs, or the Web
differentiation
refers to all the ways producers can make their products unique and different to distinguish them from those of competitors
database server
server designed to access specific information with a database
ad server
server designed to deliver targeted banner ads
mail server
server that provides e-mail messages
video server
server that serves video clips
Zigbee
short range, low power wireless network for remotely controlling digital devices
Which of the following would you use to verify that links on web pages are valid?
site management tools
transaction broker
site that processes transaction for cosumers that are normally handled in person, by phone, or mail
community provider
sites that create a digital online environment where people with similar interests can transact (buy and sell goods), communicate with like-minded people, and receive interest-related information
Cookies
small text files deposited by web site on user's computer to store information about user, accessed when user next visits web sites - can help personalize web site experience - can pose privacy threat
Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?
social media
Which of the following features of e-commerce technology allows users to participate in the creation of online content?
social technology
intelligent agent
software program that gathers and/or filters information ona specific topic and the provides a list of results for the user
Web server software
software that enables a computer to deliver Web pages written in HTML to client computers on a network that request this service by sending an HTTP request
router
special-purpose computer that interconnects the computer networks that make up the Internet and routes packets to their ultimate destination as they travel the Internet
universal standards
standards that are shared by all nations around the world
Which business strategy involves implementing a new, more efficient set of business processes that other firms cannot yet obtain?
strategy of cost competition
Domain Name System (DNS)
system for expressing numeric IP addresses in natural language
In order from beginning to end, the major steps in the SDLC are:
systems analysis/planning; systems design; building the system; testing; and implementation.
Above all, e-commerce is a ________ phenomenon
technology driven
interactivity
technology that allows for two-way communication between merchant and consumer
Midleware Services layer
the "glue" that ties the applications to the communications networks, and includes such services as security, authentication, addresses, and storage repositories
When did the first online communities form?
the 1980s
Which of the following was the first large-scale digitally enabled transaction system in the B2C arena?
the French Minitel
Which of the following is not a significant influence on a company's competitive environment?
the availability of supportive organizational structures
richness
the complexity and content of a message
Transmission Control Protocol/Internet Protocol (TCP/IP)
the core communications protocol for the Internet
Which of the following is the best definition of transaction cost?
the cost of participating in a market
All of the following are considered a precursor to e-commerce except
the development of the smartphone
profit
the difference between the price a firm is able to charge for its products and the cost of producing and distributing goods
e-business
the digital enablement of transactions and processes within a firm, involving information systems under the control of a firm
packet
the discrete units into which digital message are sliced for transmission over the Internet
Interactivity in the context of e-commerce provides which of the following functionalities?
the enabling of two-way communication between consumer and merchant
Which of the following gives a business model the most credibility with outside investors?
the firm's management team
The existence of many competitors in any one market segment may indicate
the market is saturated
World Wide Web
the most popular service that runs on the Internet; provides easy access to over 8 billion web pages
electronic mail (e-mail)
the most used application of the Internet. Uses a series of protocols to enable messages containing text, images, sound, and video clips to be transferred from one internet user to another.
market strategy
the plan you put together tha details exactly how you intend to enter a new market and attract new customers
The basic value proposition of community providers is:
they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.
Which of the following types of sites typically needs a high percentage of secure pages?
trading
The financial services, travel services, and job placement services industries typically use the ________ business model
transaction broker
E-mailing buyers to warn them away from a seller is a type of auction fraud known as ________.
transaction interference
Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders?
two-tier architecture
E-commerce is available just about everywhere and anytime. This is known as ________.
ubiquity
seven unique features of e-commerce technology
ubiquity, global reach, universal standards, richness, interactivity, information density, personalization/customization
Which of the following involves testing a site program's modules one at a time?
unit testing
Which of the following features of e-commerce technology is related to the concept of network externalities?
universal standards
P2P e-commerce
use of peer-to-peer technology, which enables Internet users to share files and computer resources directly without having to go through a central Web server, in e-commerce
Howard Rheingold, one of The Well's early participants, coined the term ________ to refer to "cultural aggregations that emerge when enough people bump into each other often enough in cyberspace."
virtual communities
A ________ permits the consumer to monitor specific auctions of interest, requiring the consumer to pay close attention only in the last few minutes of bidding.
watch list
The profit a seller makes at auction is a function of all of the following except:
watch lists.
Online forum & chat
web apps that enables internet users to communicate with each other.
Web server
web server software or physical server
Which of the following refers to the practice of researching a product online before purchasing it at a physical store?
webrooming
leverage
when a company uses its competitive advantages to achieve more advantage in surrounding markets
iMode
wireless standards that is a proprietary service of the Japanese company NTT DoCoMo
Which business application is associated with the technological development of local area networks and client/server computing?
workgroup automation
In 2016, there were more than ________ Internet hosts
1 billion
D) number of pages viewed
B) number of times an ad is served
White Hats
"Good" hackers who help organizations locate and fix security flaws
Digital Signature (e-signature)
"signed" cipher text that can be sent over the Internet
The overall retail market in the United States in 2016 was estimated at about
$4.8 trillion.
Which of the following statements about Instagram is not true? A) Instagram is owned by Twitter. B) Instagram is a photo-sharing app. C) Instagram is growing more quickly than Facebook. D) In terms of time spent per month by users, Instagram is second only to Facebook.
A) Instagram is owned by Twitter.
D) clickstream data
A) Nielsen ratings
_____________ has the highest penetration of social network usage among the general population. A) North America B) Latin America C) Europe D) Asia-Pacific
A) North America
Which of the following is a leading social network in Russia? A) VK B) Tuenti C) Orkut D) Mixi
A) VK
After Google, the next portal/search engine site with the most unique visitors is: A) Yahoo. B) Microsoft. C) AOL. D) Facebook
A) Yahoo
D) search engine display ads
A) company website
D) viral marketing
A) context advertising
D) permission marketing
A) customer co-production
Phishing
Any deceptive, online attempt by a third party to obtain confidential information for financial gain
Web Server software
Apache, Microsoft IIS basic capabilities: security services, FTP, search engine, data capture
All of the following offer website building tools except:
Apache.
Recency refers to the:
B) Time elapsed since the last visit made by a customer
Bloom is an example of a(n): A) interest-based social network B) affinity community C) sponsored community D) practice network
B) affinity community
Which of the following measures the percentage of customers who purchase once, but never return within a year?
B) attrition rate
Which of the following involves e-mailing another seller's bidders and offering the same product for less? A) transaction interception B) bid siphoning C) shill bidding D) persistent bidding
B) bid siphoning
Which of the following is the market leader in C2C auctions? A) Amazon B) eBay C) uBid D) eBid
B) eBay
D) anonymous browsing
B) firewalls
D) bait-and-switch
B) flash marketing
D) interactivity
B) information density
The time spent watching and reviewing auction bids is a part of ________ costs. A) pricing B) monitoring C) delayed consumption D) fulfillment
B) monitoring
In 2016, the world's online population was estimated to be around:
3.3 billion.
Packet Switching
-divides messages into packets -sent along different communication paths -reassembles packages once they arrive at destination - algorithmic can learn to choose the best possible paths - less expensive than circuit switching
Internet Phase 2 - Institutionalization
1975-1995 - large institutions provide funding and legitimization
Web - a service that operates on the internet
1989-1991 web invented by Tim Berners 1993 - Mosaic Web browner 1994 - first commercial web browsers Netscape Navigator
In which year was e-commerce said to have begun
1995
Internet Phase 3 - Commercialization
1995 - Present - private corporations take over, expand internet backbone and local service
D) Large spammers area among CAN-SPAM's biggest supporters
B) CAN-SPAM prohibits unsolicited email (spam)
D) transactive content system
B) CRM system