Exam 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Google's Gmail advertising has raised concerns about which of the following issues? A) privacy B) copyright C) trademark D) patents

A

If you used a symmetric key encryption for large documents, with public key encryption to encrypt and send the symmetric key, you would be using a digital______: A) envelope. B) signature C) certificate. D) hash

A

The six key dimensions to e-commercesecurity are nonrepudiation, authenticity,availability, integrity, privacy, and: A) confidentiality. B) usability. C) functionality. D) viability

A

Which of the following do Facebook users spend the mosttime on? A) News Feed B) Photos C) Profiles D) Graph Search

A

Which of the following is the top concern ofInternet users about purchasing online? A) inability to see and touch before buying B) difficulty of returning products C) shipping costs D) inability to speak to sales assistant in person

A

Which of the following statements is not true? A) Desktop search revenues are increasing forGoogle. B) Mobile ads account for only 16% of Google's overall ad revenue. C) Mobile search ads generate about $8 billion a year for Google. D) Google charges more for desktop ads than it charges for mobile ads

A

______ refers to the ability to ensure that e-commerce participants do not deny their online actions A) Nonrepudiation B) Authenticity C) Availability D) Integrity

A

________ is an industry-standard databasequery and manipulation language A) SQL B) PHP C) DBMS D) JSP

A

A person's profession or occupation is part of their: A) indirect reference group. B) direct reference group C) lifestyle group. D) subculture

B

All of the following are examples of stored value payment systems except: A) smart chip cards. B) credit cards. C) gift certificates. D) prepaid cards

B

All of the following are factors in contributing to the increase in cybercrime except: A) the ability to remotely access the Internet. B) the Internet's similarity to telephone networks. C) the ability to anonymously access the Internet. D) the Internet is an open, vulnerable design

B

Downloading music tracks owned by record companies without paying for them is an example of a violation of: A) patent law. B) copyright law. C) trademark law. D) privacy law

B

In Western culture, the basic principles shared by ethical schools of thought are: A) information rights, property rights, and public safety and welfare. B) responsibility, liability, and accountability. C) ubiquity, global reach, and privacy. D) the Golden Rule and Universalism.

B

Which of the following are features of both Pinterest and Twitter? A) tweets B) hashtags C) pins D) Image Hover widge

B

Which of the following statements about theInternet's impact on marketing is not true A) The Internet has broadened the scope of marketing communications. B) The Internet has decreased the impact of brands. C) The Internet has increased the richness of marketing communications. D) The Internet has expanded the information intensity of themarketplace.

B

All the following statements about symmetric key encryption are true except: A) In symmetric key encryption, both the sender and the receiver use the same key to encrypt and decrypt a message. B) The Data Encryption Standard is a symmetric key encryption system. C) Symmetric key encryption is computationally slower. D) Symmetric key encryption is a key element in digital envelopes

C

The richness made possible by e-commercetechnologies does which of the following? A) It reduces the cost of delivering marketing messages and receiving feedback from users. B) It allows consumers to become co-producers of the goods and services being sold. C) It allows video, audio, and text to be integrated into a singlemarketing message and consuming experience. D) It enables worldwide customer service and marketingcommunications.

C

What is the first step in developing an e-commerce security plan? A) Create a security organization. B) Develop a security policy. C) Perform a risk assessment. D) Perform a security audit.

C

Which ethical principle states that, when confronted with an ethicaldilemma, individuals should take the action that achieves the greatervalue for all of society? A) the Golden Rule B) Universalism C) the Collective Utilitarian principle D) the Social Contract rule

C

Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years? A) copyright law B) trade secret law C) patent law D) trademark law

C

Which of the following can be used to record all keyboard activity of a user? A) shopping carts B) trusted computing environments C) spyware D) DRM

C

Which of the following e-commerce technology dimensions createsgreater opportunities for cyberbullying? A) richness B) interactivity C) social technology D) ubiquity

C

Which of the following is the first step in the social marketingprocess? A) community B) amplification C) fan acquisition D) engagement

C

Which type of apps account for the most user time? A) social network apps B) brand apps C) game and entertainment apps D) search apps

C

All of the following are examples of malicious code except: A) viruses. B) bots. C) worms. D) sniffers

D

All of the following are important clickstreambehavior factors except: A) the number of days since last visit. B) the speed of clickstream behavior. C) the amount of personal information supplied. D) the number of advertisements viewed.

D

Creating multiple variations of informationgoods and selling these to different marketsegments at different prices is called: A) bundling B) customization. C) dynamic pricing. D) versioning

D

SMS to friends, notifying friends of your location, and sharing offers with friends are ways to measure A) fan acquisition. B) engagement. C) community. D) amplification.

D

View-through rate measures the ________response rate to an ad. A) 30-minute B) 24-hour C) 7-day D) 30-day

D

Which of the following is an example of an integrity violation of e-commerce security? A) A Web site is not actually operated by the entity the customer believes it to be. B) A merchant uses customer information in a manner not intended by the customer. C) A customer denies that he or she is the person who placed the order. D) An unauthorized person intercepts an online communicationand changes its contents

D

Which of the following is not a feature thatis driving social e-commerce growth? A) social sign-on• B) network notification• C) collaborative shopping D) personal intelligent agents

D

Which of the following is not true about mobile marketing? A) Mobile marketing is the fastest growing form of online marketing. B) Mobile marketing is growing at around 50% a year. C) A substantial part of mobile marketing should be counted as social marketing. D) By 2015, it is estimated that spending on social marketing will exceed the amount spent on mobile marketing

D

By 2012, social marketing had overtaken mobilemarketing true or False

False

Copyright protection protects against others copying the underlying ideas in a work. True or False

False

Copyright protection protects against others copying the underlyingideas in a work True or False

False

Credit cards are the dominant form of payment throughout the world True or False

False

Facebook has more unique monthly visitors thanLinkedIn, Twitter, Pinterest, Tumblr, and Instagram combined True or False

False

Mobile users spend most of their timebrowsing mobile Web sites. True or false

False

Most adult social network participants do not have any expectation of personal privacy when using a social network. True or False

False

Most adult social network participants do not have any expectation of personal privacy when using a social network. True or False

False

Online shoppers tend to browse for availableproducts rather than search for specific productsthey have determined in advance True or False

False

Text message generates the majority ofmobile marketing spending True or False

False

The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions True or False

False

Versioning involves selling the same product atdifferent prices. True or False

False

A worm does not need to be activatedby a user in order for it to replicateitself. True or False

True

Bundling is the process of selling two or moreproducts together for a price that is less than thesum of the two product's individual prices True or False

True

Drive-by downloads are now the most common method of infecting computers. True or False

True

Google provides the leading location-basedmarketing platform. True or False

True

In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution True or False

True

It is not necessarily illegal to use someone else's trademark in a metatag True or False

True

Net neutrality refers to Internet backbone owners treating all Internettraffic equally

True

Promoted Tweets are Twitter's version of Google's AdWords. True or false

True

Research shows that the two most importantfactors shaping the decision to purchase online areutility and trust. True or False

True

The European Data Protection Directive prohibits the transfer of PII to organizations or countries that do not have similar privacy protection policies

True

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software. True or False

True

The marginal cost of the production of information goods distributed over the Internet is zero or near zero. True or False

True

Transaction logs are built into Web server software True or False

True

Typically, the more security measuresadded to a Web site, the slower andmore difficult it becomes to use. true or false

True

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network A) firewall B) virtual private network C) proxy server D) PPTP

A

A digital certificate contains all of the following except the:• A) subject's private key. B) subject's public key. C) digital signature of the certification authority. D) digital certificate serial number

A


Set pelajaran terkait

Magoosh GRE words combined USE THIS!

View Set

Chapter 6. Nursing Process: Planning Interventions

View Set

Chapter 12 Raceways Installation

View Set