MIS 395 Midterm

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

It is estimated that by 2022, the size of the B2B market will reach:

$7.3 trillion.

In the address, which of the following is the top-level domain?

.com

During which period of time did the Institutionalization phase of Internet development take place?

1975-1995

In which year can e-commerce be said to have begun?

1995

VTR measures the ________ response rate to an ad.

30-day

An IPv4 address is expressed as a:

32-bit number that appears as a series of four separate numbers separated by periods.

The Data Encryption Standard uses a(n) ________-bit key.

56

A template test is a form of which type of testing?

A/B testing

________ are a kind of middleware software that provides the glue connecting traditional corporate systems to the customer as well as all the functionality needed to conduct e-commerce.

Application servers

A ________ is a repository of customer information that records all contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.

CRM system

________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared pool of virtualized resources over the Internet.

Cloud computing

The concept behind document formatting had its roots in which of the following?

GML

________ typically attack governments, organizations, and sometimes individuals for political purposes.

Hacktivists

________ is an open source database that can store and analyze both structured and unstructured data.

Hadoop

The richness made possible by e-commerce technologies does which of the following?

It allows video, audio, and text to be integrated into a single marketing message and consuming experience.

________ is defined by company using its competitive advantage to gain in surrounding markets.

Leverage

According to Symantec, almost half of the e-mail addresses involved in business e-mail compromise (BEC) phishing that it analyzed had an IP address originating in:

Nigeria.

Which of the following protocols is used to send mail to a server?

SMTP

Which of the following is a simple but powerful method for strategizing about a business?

SWOT analysis

________ technologies are technologies that enable the incremental improvement of products and services.

Sustaining

________ are the types of information systems capabilities needed to meet business objectives.

System functionalities

________ was the first truly large-scale digitally enabled transaction system in the B2C arena.

The French Minitel

Which of the following statements about Foursquare is not true?

The growth in Foursquare's revenue since 2015 has been driven primarily by significant increases in the numbers of users of its Swarm app.

TCP/IP operates in which layer of Internet architecture?

Transport Services and Representation Standards layer

HTTP/2 is supported by almost all the leading web browsers.

True

The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:

VoIP

All of the following are involved in the effort to create standards for IoT except:

W3C.

A web beacon is:

a tiny graphics file embedded in an e-mail or web page.

Which of the following verifies that the business objectives of the system are in fact working?

acceptance testing

The Internet Layer of TCP/IP is responsible for which of the following?

addressing, packaging, and routing messages

Stickiness is an important attribute for which of the following revenue models?

advertising revenue model

You could expect to find all of the following services in a web server software package except:

an RSS aggregator.

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:

an authorization management system

Beebone is an example of which of the following?

botnet

eBay uses all of the following business models except:

content provider.

The primary way a website is able to personalize the content presented to a visitor is through the use of:

cookies

The Nike iD program is an example of which of the following marketing techniques?

customer co-production

Which system functionality must your website have to be able to personalize or customize a product for a client?

customer on-site tracking

E-commerce can be defined as:

digitally enabled commercial transactions between and among organizations and individuals.

Innovative entrepreneurs and their business firms that destroy existing business models are referred to as:

disruptors

Malware that comes with a downloaded file that a user requests is called a:

drive-by download.

What type of Internet access technology are Google and Facebook hoping to use to provide Internet access to remote parts of the world?

drones

Proxy servers are also known as:

dual home systems.

Amazon Business is an example of which of the following business models?

e-distributor

Ariba is an example of a(n):

e-procurement firm.

If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:

enable individual customization of the product by consumers.

Which of the following is not a primary activity in a firm value chain?

finance/accounting

Most of the time required to maintain an e-commerce site is spent on:

general administration and making changes and enhancements to the system.

Business-to-consumer (B2C) e-commerce in the United States:

grew at double-digit rates between 2010 and 2018.

The Seam is an example of a(n):

industry consortium.

During which phase of the development of the Internet was the Domain Name System (DNS) introduced?

institutional phase

Which dimension(s) of security is spoofing a threat to?

integrity and authenticity

In modeling online consumer behavior, the concept of "consumer skills" refers to the:

knowledge consumers have about how to conduct online transactions.

All of the following might be part of a website's middle-tier layer except:

legacy corporate applications.

The incremental cost of building the next unit of a good is called the:

marginal cost.

In the ________ business model, a web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products, and establish prices.

market creator

A ________ specifically details how you plan to find customers and to sell your product.

market strategy

The costs incurred by merchants in having to change product prices (such as the costs of reentering prices into computer systems) are referred to as which of the following?

menu costs

Unfair competitive advantages occur when:

one competitor has an advantage that others cannot purchase.

PayPal is an example of what type of payment system?

online stored value payment system

MySQL is which of the following?

open source database software

In general, the key to becoming a successful content provider is to:

own the content being provided.

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

packet switching.

Acquisition rate is a measure of the:

percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

Confidentiality is sometimes confused with:

privacy

The Transport Layer of TCP/IP is responsible for which of the following?

providing communication with the application by acknowledging and sequencing the packets to and from the application

Asymmetric key cryptography is also known as:

public key cryptography

The total number of users or customers an e-commerce business can obtain is a measure of which of the following?

reach

A firm's ________ describes how a firm will produce a superior return on invested capital.

revenue model

What is the primary revenue model for an e-distributor?

sales

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

spyware.

Uber has been criticized for using which of the following?

surge pricing

Above all, e-commerce is a ________ phenomenon.

technology driven

Interactivity in the context of e-commerce provides which of the following functionalities?

the enabling of two-way communication between consumer and merchant

The existence of many competitors in any one market segment may indicate:

the market is saturated.

The term stateless refers to the fact that:

the server does not have to maintain an ongoing dedicated interaction with the client computer.

Recency refers to the:

time elapsed since the last visit made by a customer.

The financial services, travel services, and job placement services industries typically use the ________ business model.

transaction broker

If you want to determine the size of your website's audience, the metric you will use for the most accurate measurement will be:

unique visitors.

A ________ marketplace supplies products and services of interest to particular industries.

vertical

Which business application is associated with the technological development of local area networks and client/server computing?

workgroup automation (e.g., document sharing)


Set pelajaran terkait

Insurance for senior citizens (disability)

View Set

Meteorology Final (Chapters 8 - 15)

View Set

OB practice questions 13,14,21 and prep u

View Set

Quiz 5 Material [Tumor Invasion and Metastasis]

View Set

Chapter 30: Abdominal and Genitourinary injuries.

View Set

EXERCISE 5. STRUCTURE OF THE RIB CAGE

View Set

anesthesia monitoring-VET CLIN TECH

View Set

Human Body Systems and Health 1-1

View Set