CH. 9 CSC220 Exam questions

Ace your homework & exams now with Quizwiz!

Which of the following statements is true of retargeting? a. It is targeted at approximately 50% of Web site visitors who shop using smartphone applications. b. It employs personalized ads to direct shoppers back to a retailer's Web site that they previously abandoned. c. It attempts to change the buying habits of Web shoppers by inducing them to consider products they have never considered purchasing before. d. It attempts to change the buying habits of Web shoppers by directing them to Web sites they have not visited before.

It employs personalized ads to direct shoppers back to a retailer's Web site that they previously abandoned.

Why was it necessary for companies to reengineer their e-commerce Web sites for m-commerce? a. Smartphones and tablets use highly advanced browsers. b. Mobile devices provide small user interfaces. c. Consumers prefer accessing e-commerce using laptops. d. Today's wireless technologies have poor data transfer speeds.

Mobile devices provide small user interfaces.

How can a business best increase traffic to its e-commerce site? a. fill a single Web page on the site with search engine keywords b. avoid obtaining "sponsored" ad status with search engines c. acquire links to its site on popular, related sites d. advertise in local newspapers

acquire links to its site on popular, related sites

. Through e-government, _____. a. only government agencies can interact with one another b. only businesses can interact with the government c. only individual citizens can interact with the government d. any government unit, business, or individual can interact with the government

any government unit, business, or individual can interact with the government

Which of the following is NOT one of the three basic components of most successful e-commerce models? a. content b. capital c. community d. commerce

capital

The ______ technique is a security technique associated with the use of credit cards at the time of purchase that checks additional digits printed on the back or front of the credit cards. a. Address Verification System b. Advanced Authorization c. Payment Card Industry security standard d. Card Verification Number

card verification number

A trusted third-party organization that issues attachments to emails or embedded Web site data to verify the identity of a sender or Web site is known as a(n) _____. a. certificate authority b. certifying association c. PCI vendor d. advanced authenticator

certificate authority

E-commerce purchases are often made with various types of cards. Which of these card types does not carry a preset spending limit but must be paid off by the cardholder at the end of each billing period? a. bank card b. debit card c. credit card d. charge card

charge card

_____ is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process. a. Business-to-business (B2B) e-commerce b. Business-to-consumer (B2C) e-commerce c. Consumer-to-business (C2B) e-commerce d. Consumer-to-consumer (C2C) e-commerce

consumer-to-consumer (C2C) e-commerce

Which component of an e-commerce technology infrastructure most directly supports the following core tasks: catalog management, product configuration, shopping cart facilities, transaction processing, and Web traffic data analysis? a. Web server operating system software b. Web server software c. e-commerce software d. m-commerce hardware

e-commerce software

An approach to building customer profiles that captures user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online, relies on _____. a. search engine optimization b. implicit personalization techniques c. explicit personalization techniques d. phishing

explicit personalization techniques

One reason for the growth in business-to-consumer (B2C) e-commerce is that online B2C shoppers have the ability to design a _____ product. a. standardized b. universal c. generic d. personalized

personalized

A successful e-commerce system must address the stages experienced by customers as they approach and complete a purchasing transaction, known as the _____. a. sales life cycle b. electronic exchange c. omnichannel model d. market segmentation

sale life cycle

What is the first stage of the multistage model for B2B and B2C e-commerce? a. selection and negotiation b. purchasing c. search and identification d. purchase anticipation

selection and negotiation

What must Web site operators constantly monitor to provide a good experience to their Internet shoppers? a. search engine optimization b. traffic and response times experienced by visitors c. new trends and developments d. implicit and explicit personalization techniques

traffic and response times experienced by visitors

The communications protocol that is currently used to prevent identity theft because it ensures privacy between communicating applications and their users on the Internet is called _____. a. the PCI security standard b. Advanced Authorization Protocol c. Transport Layer Security d. Secure Sockets Layer

transport layer security

Which component of an e-commerce technology infrastructure performs several fundamental services including security and identification, retrieval and sending of Web pages, Web site tracking, and Web site development? a. Web server software b. e-commerce software c. Web server server operating system d. virtual private network

web server software


Related study sets

RT Micro Ch. 21 Parasite Infections

View Set

Management Info Systems Chapter 2

View Set

Quoting vs Paraphrasing vs Summarizing

View Set