CH. 9 CSC220 Exam questions
Which of the following statements is true of retargeting? a. It is targeted at approximately 50% of Web site visitors who shop using smartphone applications. b. It employs personalized ads to direct shoppers back to a retailer's Web site that they previously abandoned. c. It attempts to change the buying habits of Web shoppers by inducing them to consider products they have never considered purchasing before. d. It attempts to change the buying habits of Web shoppers by directing them to Web sites they have not visited before.
It employs personalized ads to direct shoppers back to a retailer's Web site that they previously abandoned.
Why was it necessary for companies to reengineer their e-commerce Web sites for m-commerce? a. Smartphones and tablets use highly advanced browsers. b. Mobile devices provide small user interfaces. c. Consumers prefer accessing e-commerce using laptops. d. Today's wireless technologies have poor data transfer speeds.
Mobile devices provide small user interfaces.
How can a business best increase traffic to its e-commerce site? a. fill a single Web page on the site with search engine keywords b. avoid obtaining "sponsored" ad status with search engines c. acquire links to its site on popular, related sites d. advertise in local newspapers
acquire links to its site on popular, related sites
. Through e-government, _____. a. only government agencies can interact with one another b. only businesses can interact with the government c. only individual citizens can interact with the government d. any government unit, business, or individual can interact with the government
any government unit, business, or individual can interact with the government
Which of the following is NOT one of the three basic components of most successful e-commerce models? a. content b. capital c. community d. commerce
capital
The ______ technique is a security technique associated with the use of credit cards at the time of purchase that checks additional digits printed on the back or front of the credit cards. a. Address Verification System b. Advanced Authorization c. Payment Card Industry security standard d. Card Verification Number
card verification number
A trusted third-party organization that issues attachments to emails or embedded Web site data to verify the identity of a sender or Web site is known as a(n) _____. a. certificate authority b. certifying association c. PCI vendor d. advanced authenticator
certificate authority
E-commerce purchases are often made with various types of cards. Which of these card types does not carry a preset spending limit but must be paid off by the cardholder at the end of each billing period? a. bank card b. debit card c. credit card d. charge card
charge card
_____ is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process. a. Business-to-business (B2B) e-commerce b. Business-to-consumer (B2C) e-commerce c. Consumer-to-business (C2B) e-commerce d. Consumer-to-consumer (C2C) e-commerce
consumer-to-consumer (C2C) e-commerce
Which component of an e-commerce technology infrastructure most directly supports the following core tasks: catalog management, product configuration, shopping cart facilities, transaction processing, and Web traffic data analysis? a. Web server operating system software b. Web server software c. e-commerce software d. m-commerce hardware
e-commerce software
An approach to building customer profiles that captures user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online, relies on _____. a. search engine optimization b. implicit personalization techniques c. explicit personalization techniques d. phishing
explicit personalization techniques
One reason for the growth in business-to-consumer (B2C) e-commerce is that online B2C shoppers have the ability to design a _____ product. a. standardized b. universal c. generic d. personalized
personalized
A successful e-commerce system must address the stages experienced by customers as they approach and complete a purchasing transaction, known as the _____. a. sales life cycle b. electronic exchange c. omnichannel model d. market segmentation
sale life cycle
What is the first stage of the multistage model for B2B and B2C e-commerce? a. selection and negotiation b. purchasing c. search and identification d. purchase anticipation
selection and negotiation
What must Web site operators constantly monitor to provide a good experience to their Internet shoppers? a. search engine optimization b. traffic and response times experienced by visitors c. new trends and developments d. implicit and explicit personalization techniques
traffic and response times experienced by visitors
The communications protocol that is currently used to prevent identity theft because it ensures privacy between communicating applications and their users on the Internet is called _____. a. the PCI security standard b. Advanced Authorization Protocol c. Transport Layer Security d. Secure Sockets Layer
transport layer security
Which component of an e-commerce technology infrastructure performs several fundamental services including security and identification, retrieval and sending of Web pages, Web site tracking, and Web site development? a. Web server software b. e-commerce software c. Web server server operating system d. virtual private network
web server software