E-Commerce Assignment 2 & 3

Ace your homework & exams now with Quizwiz!

All of the following are examples of malicious code except: A) worms. B) sniffers. C) viruses. D) bots.

B

Display ads constitute about ________ % of mobile ad spending. A) 15 B) 33 C) 20 D) 66

B

In 2013, location-based mobile marketing accounted for how much in marketing expenditures? A) $23 billion B) $2.3 billion C) $23 million D) $230 million

B

Online bill payments are believed to cost ________ to process compared to ________ for paper bills. A) $1 to $2, $10 to $20 B) 20 to 30 cents, $3 to $7 C) 3 to $7, 20 to 30 cents D) $10 to $20, $ 1 to $2

B

Which of the following is not true about search engine advertising? A) Spending on search engine advertising constitutes almost half of all online advertising spending. B) The click-through rate for search engine marketing has been fairly steady over the years. C) The top three search engine providers supply over 95% of all online searches. D) Search engine advertising is the fastest growing type of online advertising.

D

Which of the following measures the ratio of items purchased to product views? A) cart conversion rate B) conversion rate C) view-to-cart ratio D) browse-to-buy ratio

D

Which of the following purchased Tumblr in May 2013? A) Facebook B) Google C) Twitter D) Yahoo

D

________ refers to the ability to ensure that e-commerce participants do not deny their online actions. A) Availability B) Integrity C) Authenticity D) Nonrepudiation

D

T or F: A cell phone's GPS is accurate to within 5 feet of the actual location of the phone.

F

T or F: Traditional desktop marketing remains the largest part of all online marketing.

F

T or F: Credit cards are the dominant form of online payment throughout the world.

False

T or F: Phishing attacks rely on browser parasites.

False

T or F: Price is more important than convenience as a factor in online purchase decisions.

False

T or F: Research has found that of all the standard formats of display ads, wide skyscraper ads are the most effective at holding a user's attention.

False

T or F: The concept of "customer satisfaction" is broader than the concept of "customer experience."

False

T or F: About 25% of all search engine requests originate from mobile devices.

T

T or F: Brand pages on Facebook typically attract more visitors than a brand's Web site.

T

T or F: Google provides the leading location-based marketing platform.

T

T or F: Drive-by downloads are now the most common method of infecting computers.

True

T or F: In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.

True

T or F: Insiders present a greater security threat to e-commerce sites than outsiders.

True

T or F: Smishing attacks exploit SMS messages.

True

T or F: The U.S. federal government has historically not been in favor of the development and export of strong encryption systems.

True

T or F: The digital divide still persists along age, income, ethnic, and education dimensions.

True

T or F: Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

True

The richness made possible by e-commerce technologies does which of the following? A) It reduces the cost of delivering marketing messages and receiving feedback from users. B) It allows video, audio, and text to be integrated into a single marketing message and consuming experience. C) It enables worldwide customer service and marketing communications. D) It allows consumers to become co-producers of the goods and services being sold.

B

Which of the following countries has been found to have engaged in cyberespionage against Google? A) Iraq B) China C) Russia D) Iran

B

Which of the following is not one of the four main methods advertisers use to behaviorally target ads? A) clickstream data B) Nielsen ratings C) data collected from social networks D) integration of offline data

B

Which of the following statements about CAN-SPAM is not true? A) CAN-SPAM prohibits the use of deceptive subject lines and false headers. B) CAN-SPAM prohibits unsolicited e-mail (spam). C) CAN-SPAM went into effect in January 2004. D) Large spammers are among CAN-SPAM's biggest supporters.

B

Which of the following statements about the Internet's impact on marketing is not true? A) The Internet has increased the richness of marketing communications. B) The Internet has decreased the impact of brands. C) The Internet has broadened the scope of marketing communications. D) The Internet has expanded the information intensity of the marketplace.

B

Which of the following statements is not true? A) Mobile shoppers and buyers are more affluent than the online population in general. B) Women are more active purchasers on smartphones than men. C) Younger consumers are more likely to research products and prices on mobile devices than older consumers. D) Men are more likely than women to buy digital content with a mobile device.

B

________ refers to the ability to ensure that an e-commerce site continues to function as intended. A) Authenticity B) Availability C) Nonrepudiation D) Integrity

B

Reventon is an example of: A) a macro virus. B) a bot program. C) a backdoor. D) ransomware.

D

Which of the following dimensions of e-commerce security is not provided for by encryption? A) nonrepudiation B) confidentiality C) message integrity D) availability

D

Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media? A) Amplify B) TweetDeck C) Webtrends D) Curalate

D

A typical response rate for an e-mail campaign would be ________ %. A) 5 B) 2 C) 50 D) 25

A

All of the following are Pinterest marketing tools except: A) Promoted Accounts. B) Brand pages. C) Retail Pins. D) Follow button.

A

All of the following are factors in contributing to the increase in cybercrime except: A) the Internet's similarity to telephone networks. B) the Internet is an open, vulnerable design. C) the ability to remotely access the Internet. D) the ability to anonymously access the Internet.

A

All of the following marketing tools on Facebook require payment except: A) Facebook Offers. B) Marketplace Ads. C) Sponsored Stories. D) Promoted Posts.

A

All of the following statements about public key encryption are true except: A) public key encryption ensures authentication of the sender. B) public key encryption uses two mathematically related digital keys. C) public key encryption does not ensure message integrity. D) public key encryption is based on the idea of irreversible mathematical functions.

A

Approximately ________ of annual offline retail sales is influenced by online browsing. A) one-third B) three-quarters C) one-half D) one-quarter

A

By 2017, mobile commerce revenues are expected to be approximately: A)$109 billion. B)$109 million. C)$1.09 billion. D)$10.9 billion.

A

Conversion rate is a measure of the: A) percentage of visitors who become customers. B) percentage of existing customers who continue to buy on a regular basis. C) percentage of shoppers who do not return within a year after their initial purchase. D) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

A

Creating multiple variations of information goods and selling these to different market segments at different prices is called: A) versioning. B) dynamic pricing. C) bundling. D) customization

A

Symmetric key encryption is also known as: A) secret key encryption. B) public key encryption. C) PGP. D) PKI.

A

The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and: A) confidentiality. B) usability. C) functionality. D) viability.

A

What is the most frequent cause of stolen credit cards and card information today? A) the hacking and looting of corporate servers storing credit card information B) lost cards C) sniffing programs D) phishing attacks

A

Which of the following do Facebook users spend the most time on? A) News Feed B) Profiles C) Photos D) Graph Search

A

Which of the following is not a key point of vulnerability when dealing with e-commerce? A) the credit card companies B) the communications pipeline C) the client computer D) the server

A

Which of the following is not one of the main stages of the online purchasing process? A) browsing B) post-purchase service and loyalty C) interaction D) awareness

A

Which of the following measures the average length of stay at a Web site? A) stickiness B) loyalty C) recency D) retention rate

A

Which of the following most helped Dagny Aslin of ExchangeHunterJumper.com in establishing her brand in the niche area of selling high-end competition horses? A) valuing quality over quantity at each stage in the Web site development process B) establishing customer needs and habits as the top priority in all marketing decisions C) adapting marketing techniques to keep up with new Internet technologies D) integrating online and offline marketing techniques to establish a consistent brand

A

Which of the following online advertising formats attracted the least amount of spending in 2013? A) e-mail B) classifieds C) rich media D) search

A

Which of the following statements about Pinterest is not true? A) About 30% of online adults use Pinterest. B) Pinned photos and photo boards are available to all Pinterest users. C) Pinterest users are overwhelmingly female. D) Pinterest enables users to integrate their pins into their Facebook News Feeds and Twitter streams.

A

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. A) Authenticity B) Availability C) Integrity D) Nonrepudiation

A

P2P payment systems are a variation on what type of payment system? A) accumulating balance system B) digital credit card system C) digital checking system D) stored value payment system

D

A Web beacon is: A) an automated applet for performing Web searches. B) an executable cookie. C) a tiny graphics file embedded in an e-mail or Web page. D) a cookie that carries a virus.

C

A digital certificate contains all of the following except the: A) subject's public key. B) digital certificate serial number. C) subject's private key. D) digital signature of the certification authority.

C

An intrusion detection system can perform all of the following functions except: A) checking network traffic to see if it matches certain patterns or preconfigured rules. B) setting off an alarm when suspicious activity is detected. C) blocking suspicious activity. D) examining network traffic.

C

In 2013, what was the approximate Internet penetration rate for individuals that have attained less than a high-school education? A) 90% B) 45% C) 60% D) 75%

C

Purchasing an online ad on a CPA basis means that the advertiser: A) pays a prenegotiated fee for each click an ad receives. B) pays for impressions in 1,000 unit lots. C) pays only for those users who perform a specific action, such as registering, purchasing, etc. D) exchanges something of equal value for the ad space

C

The Data Encryption Standard uses a(n) ________-bit key. A) 256 B) 8 C) 56 D) 512

C

The incremental cost of building the next unit of a good is called the: A) variable cost. B) demand curve. C) marginal cost. D) fixed cost.

C

The number of people exposed to pins is a measure of which of the following? A) engagement B) community C) fan acquisition D) brand strength

C

The ratio of impressions to fans is a measure of: A) amplification. B) engagement. C) fan acquisition. D) community.

C

Which children's Web site was fined $3 million in 2011 for collecting and sharing children's personal information without consent of their parents? A) NeoPets B) Nick Jr. C) Disney's Playdom D) Emily's Dress Up

C

Which dimension(s) of security is spoofing a threat to? A) availability and integrity B) availability C) integrity and authenticity D) integrity

C

Which of the following involves a coupon or other promotional offer that appears in users' Twitter timeline? A) Promoted Trend B) Promoted Account C) Lead Generation Card D) Promoted Tweet

C

Which of the following is a real-time feed showing a friend's activities, chats, and music listening on Facebook? A) Social Graph B) Timeline C) Ticker D) News Feed

C

Which of the following is not one of the main elements of a comprehensive multi-channel marketing plan? A) mobile marketing B) social marketing C) local marketing D) offline marketing

C

Which of the following is the leading display ad site on mobile devices? A) Google B) Twitter C) Facebook D) Yahoo

C

Which of the following is the most popular use for mobile devices? A) socializing B) shopping C) entertainment D) performing tasks, such as finances

C

Which social marketing proved the most effective for ExchangeHunterJumper.com? A) YouTube B) Pinterest C) Facebook D) Instagram

C

A Crayola arts-and-crafts column on a parenting Web site is an example of what form of advertising? A) banner swapping B) public relations C) affiliate relationship D) sponsorship

D

Encouraging users to click a Like button is an example of which step in the social marketing process? A) brand strength B) community C) fan acquisition D) amplification

D


Related study sets

Crim 174 Quizzes (Class, Race, Gender, and Crime)

View Set

Top 50 Management Interview Questions and Answers

View Set

ATI med surg content mastery practice

View Set

Leadership Succession and Creating a Motivating Climate

View Set

Vietnamese 1-1 - Tiếng Việt (personal pronouns)

View Set