Chapter 2,5,11

Ace your homework & exams now with Quizwiz!

________ is another name for transorganizational business processes.

Collaborative commerce

T or F: Phishing attacks rely on browser parasites.

False

An ________ primarily serves businesses that primarily buy direct goods on a spot purchasing basis.

exchange

Private industrial networks are direct descendants of:

existing EDI networks.

Exostar is an example of a(n):

industry consortium.

All of the following use an advertising revenue model except:

Amazon (Facebook, yahoo, google do)

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

Which of the following is an example of an e-procurement Net marketplace?

Ariba

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

Authenticity

Which of the following companies utilizes a transaction fee revenue model?

E*Trade

All of the following are methods of securing channels of communication except:

FTP

T or F: Virtually all firms, both large and small, now use Electronic Data Interchange (EDI) systems.

False

Which of the following is another name for a private industrial network?

PTX

A(n) ________ system continuously links the activities of buying, making, and moving products from suppliers to purchasing firms, as well as integrating order entry systems.

SCM

All of the following can be considered a direct or indirect competitor of Amazon.com except:

Starbucks

T or F: A Trojan horse appears to be benign, but then does something other than expected.

True

T or F: Collaborative commerce is primarily concerned with the development of a rich communications environment.

True

T or F: MRO goods are also known as indirect goods.

True

A ________ coordinates a firm's suppliers, distributors, and delivery firms with its own production needs using an Internet-based supply chain management system.

Value Web

Which of the following was the first step in the development of B2B commerce?

automated order entry systems

Which of the following dimensions of e-commerce security is not provided for by encryption?

availability

Which element of the business model examines who else occupies the firm's intended marketspace?

competitive environment

The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:

confidentiality.

EDI began as a(n) ________ system.

document automation

Proxy servers are also known as:

dual home systems

An ________ provides electronic catalogs that represent the products of thousands of direct manufacturers.

e-distributor

Which of the following primarily deal with indirect goods?

e-distributors and e-procurement Net marketplaces

The business model of e-distributors is quite similar to that of:

e-tailers.

If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:

enable individual customization of the product by consumers.

Which of the following primarily deal with direct goods?

exchanges and industry consortia

An example of an indirect good in the fast-food industry is:

fax paper.

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

firewall

A strategy designed to compete within a narrow market or product segment is called a ________ strategy.

focus

Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?

global reach

An ________ primarily serves businesses that primarily buy direct goods on a contract purchasing basis.

industry consortium

All of the following are key elements of a business model except:

information technology strategy.

Which of the following is a method of inventory cost management that seeks to eliminate excess inventory?

just-in-time production

According to the Computer Security Institute's 2011 Computer Crime and Security Survey, which of the following was the most commonly reported type of attack?

malware infection

A business document that specifically details how you plan on selling your product and find new customers is called a:

market strategy.

Which of the following is the fastest growing form of online B2B e-commerce?

private industrial networks

What is the first step in the procurement process?

search for suppliers

Which of the following are Amazon's primary value propositions?

selection and convenience

A digital certificate contains all of the following except the:

subject's private key.

Which of the following terms refers to the total flow of value among firms?

total inter-firm trade

Expedia is an example of a:

transaction broker.

Analysts predict that B2B e-commerce in the United States will grow by 2016 to approximately:

$5.6 trillion

Which of the following statements about Groupon is not true?

Groupon has yet to show a profit.

________ refers to the ability to ensure that e-commerce participants do not deny their online actions

Nonrepudiation

Horizontal or general portals primarily generate revenue in all of the following ways except:

sales of goods.

The existence of a large number of competitors in any one market segment may indicate:

the market is saturated.

Malware that comes with a downloaded file that a user requests is called a:

drive-by download

An ________ is an independently owned, online marketplace that connects hundreds to potentially thousands of suppliers and buyers in a dynamic, real-time environment.

exchange

Stickiness is an important attribute for which revenue model?

advertising revenue model

________ is a method for ensuring that suppliers precisely deliver ordered parts at a specific time and to a particular location.

Tight coupling

Your solar-panel manufacturing firm has developed a unique and patented process for creating high-efficiency solar panels at a fraction of current costs. This will enable your firm to adopt a strategy of:

cost competition.

The Computer Security Institute reported in its 2011 survey that approximately ________ percent of responding organizations experienced a computer security incident within the previous 12 months.

45

The last step in the procurement process is:

sending a remittance payment.

Which element of the business model addresses the question of why a customer should buy from the firm?

value proposition


Related study sets

The Movement III: Painting, Art History: The Movement III: Painting, Art History: The Movement II: People, The Movement I: Renaissance Architecture, Art History: The Movement I: Renaissance Architecture, Art I B Cumulative Exam Notes

View Set

Chapter 19: Transcriptional Regulation in Eukaryotes

View Set

Economics of corporate finance exam 2 study guide

View Set

POL 271- Ch. 9: International Political Economy

View Set