E-Commerce CHAPTERS 5,6,7 Mixed
A typical response rate for an e-mail campaign would be ________ %. 5 25 2 50
5
For a website that has 5 million visitors a month, and where on average, a visitor makes 10 page requests per visit, there will be ___ entries in the transaction log each month
5 million x 10 pages = 50 million
A typical response rate for an e-mail campaign would be?
5%
For a Web site that has 5 million visitors a month, and where on average, a visitor makes 10 page requests per visit, there will be ________ entries in the transaction log each month. 50 50 million 500,000 5 million
50 million
On a typical day, approximately ____ % of adult users in the United States logs on to the internet.
80%
"Shoppers" constitute approximately ________ % of the online Internet audience. 90 70 80 60
90
Shoppers constitute approximately___ % of the online internet audience.
90%
Conversion rate is a measure of the: A) percentage of visitors who become customers. B) percentage of existing customers who continue to buy on a regular basis. C) percentage of shoppers who do not return within a year after their initial purchase. D) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.
A
Creating multiple variations of information goods and selling these to different market segments at different prices is called: A) versioning. B) dynamic pricing. C) bundling. D) customization
A
Facebook's share price fell dramatically after its IPO because investors feared that: A) Facebook would be unable to increase advertising revenues enough. B) privacy concerns were driving users away. C) Facebook's new marketing solutions would be difficult to monetize. D) new social networks such as Instagram were cannibalizing Facebook's audience.
A
Which of the following statements about Pinterest is not true? A) About 30% of online adults use Pinterest. B) Pinned photos and photo boards are available to all Pinterest users. C) Pinterest users are overwhelmingly female. D) Pinterest enables users to integrate their pins into their Facebook News Feeds and Twitter streams.
A
Which of the following is an example of an integrity violation of e- commerce security?
An unauthorized person intercepts an online communication and changes its contents
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
Which of the following is a prominent hacktivist group?
Anonymous
Which of the following statements is not true? A) Mobile shoppers and buyers are more affluent than the online population in general. B) Women are more active purchasers on smartphones than men. C) Younger consumers are more likely to research products and prices on mobile devices than older consumers. D) Men are more likely than women to buy digital content with a mobile device.
B
Purchasing an online ad on a CPA basis means that the advertiser: A) pays a prenegotiated fee for each click an ad receives. B) pays for impressions in 1,000 unit lots. C) pays only for those users who perform a specific action, such as registering, purchasing, etc. D) exchanges something of equal value for the ad space
C
The Data Encryption Standard uses a(n) ________-bit key. A) 256 B) 8 C) 56 D) 512
C
The incremental cost of building the next unit of a good is called the: A) variable cost. B) demand curve. C) marginal cost. D) fixed cost.
C
The number of people exposed to pins is a measure of which of the following? A) engagement B) community C) fan acquisition D) brand strength
C
The ratio of impressions to fans is a measure of: A) amplification. B) engagement. C) fan acquisition. D) community.
C
Which of the following is not one of the main elements of a comprehensive multi-channel marketing plan? A) mobile marketing B) social marketing C) local marketing D) offline marketing
C
A Crayola arts-and-crafts column on a parenting Web site is an example of what form of advertising? A) banner swapping B) public relations C) affiliate relationship D) sponsorship
D
By 2017, mobile commerce revenues are expected to be approximately: A) $109 million. B) $1.09 billion. C) $10.9 billion. D) $109 billion.
D
Which of the following dimensions of e-commerce security is not provided for by encryption? A) nonrepudiation B) confidentiality C) message integrity D) availability
D
Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media? A) Amplify B) TweetDeck C) Webtrends D) Curalate
D
Which of the following is not true about search engine advertising? A) Spending on search engine advertising constitutes almost half of all online advertising spending. B) The click-through rate for search engine marketing has been fairly steady over the years. C) The top three search engine providers supply over 95% of all online searches. D) Search engine advertising is the fastest growing type of online advertising.
D
Which of the following is the leading display ad site on mobile devices? A) Twitter B) Yahoo C) Google D) Facebook
D
Which of the following measures the ratio of items purchased to product views? A) cart conversion rate B) conversion rate C) view-to-cart ratio D) browse-to-buy ratio
D
Which of the following most helped Dagny Aslin of ExchangeHunterJumper.com in establishing her brand in the niche area of selling high-end competition horses? A) integrating online and offline marketing techniques to establish a consistent brand B) adapting marketing techniques to keep up with new Internet technologies C) valuing quality over quantity at each stage in the Web site development process D) establishing customer needs and habits as the top priority in all marketing decisions
D
Which of the following statements is not true? A) Mobile ads account for only 16% of Google's overall ad revenue. B) Mobile search ads generate about $8 billion a year for Google. C) Google charges more for desktop ads than it charges for mobile ads. D) Desktop search revenues are increasing for Google.
D
________ refers to the ability to ensure that e-commerce participants do not deny their online actions. A) Availability B) Integrity C) Authenticity D) Nonrepudiation
D
TLS does not guarantee server-side authentication.
FALSE
Text message generates the majority of mobile marketing spending.
FALSE
All of the following are methods of securing channels of communication except:
FTP
Which of the following is the leading display ad site on mobile devices?
Contrary to predictions of analysts made during the early days of e-commerce, the Internet has let to both disintermediation and hypermediation on a widespread basis.
False
Credit cards are the dominant form of online payment throughout the world.
False
Credit cards are the dominant form of online payment throughout the world?
False
Deep packet inspection uses software installed on client computers to collect and analyze detailed information on page content viewed by users.
False
Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties. True False
False
Facebook has more unique monthly visitors than LinkedIn, Twitter, Pinterest, Tumblr, and Instagram combined.
False
In 2013, mobile marketing grew at nearly the same rate as traditional online marketing.
False
In the United States today, single, white, young college-educated males with high income dominate the Internet in terms of percentage of Internet usage
False
It is expected that by 2017, mobile commerce will account for 50% of all e-commerce.
False
Mobile users spend most of their time browsing mobile Web sites.
False
Most adult social network participants do not have any expectation of personal privacy when using a social network.
False
Online retailing is one of the largest segments of the retail industry.
False
Online shoppers tend to browse for available products rather than search for specific products they have determined in advance.
False
Phishing attacks rely on browser parasites. True False
False
Research has found that of all the standard formats of display ads, wide skyscaper ads are most effective at holding a user's attention.
False
Research has found that of all the standard formats of display ads, wide skyscraper ads are the most effective at holding a user's attention.
False
Research has found that of all the standard formats of display ads, wide skyscraper ads are the most effective at holding a user's attention?
False
Social network sites have become major locations from which consumers directly purchase products.
False
T or F: Credit cards are the dominant form of online payment throughout the world.
False
T or F: Phishing attacks rely on browser parasites.
False
T or F: Price is more important than convenience as a factor in online purchase decisions.
False
T or F: Research has found that of all the standard formats of display ads, wide skyscraper ads are the most effective at holding a user's attention.
False
T or F: The concept of "customer satisfaction" is broader than the concept of "customer experience."
False
The retail industry is the largest investor in information technology.
False
rice is more important that convenience as a factor in online purchase decisions.
False
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network. firewall proxy server virtual private network PPTP
Firewall
The marketing technique known as_____ involves merchants offering products or services for a very low price for a short period of time.
Flash Marketing
The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time?
Flash marketing
Which of the following dominates mobile advertising?
Which of the following would you implement to collect and analyze your company's big data?
Hadoop
refers to the ability to ensure that e- commerce participants do not deny their online actions?
Nonrepudiation
Which of the following examples illustrates the "Long Tail" phenomenon?
Over 50% of Netflix's 100,000 titles are rented at least once a day by someone.
All of the following are examples of malicious code except?
Sniffers
All of the following are traditional online marketing tools except?
Social marketing
Software that is used to obtain private user information such as a user's keystrokes or copies of e- mail is referred to as?
Spyware
Drive-by downloads are now the most common method of infecting computers.
TRUE
Google provides the leading location-based marketing platform.
TRUE
Insiders present a greater security threat to e-commerce sites than outsiders.
TRUE
About 25% of all search engine requests originate from mobile devices
True
Approximately two-thirds of U.S. Internet users use online banking.
True
Bundling is the process of selling of selling two or more product's individual prices
True
Bundling is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices.
True
By 2015, it is estimated that mobile marketing spending will account for around $16 billion annually.
True
Cookies, when combined with Web beacons, can be used to create cross- site profiles?
True
Cookies, when combined with Web beacons, can be used to create cross-site profiles.
True
Drive- by downloads are now the most common method of infecting computers?
True
E-commerce is a major conduit and generator of offline commerce.
True
Evidence suggests that real-time customer chat increases sales.
True
Evidence suggests that real-time customer chat increases sales. True False
True
Google defends its Library Project on the grounds of fair use.
True
Google provides the leading location-based marketing platform.
True
Groupon is an example of local commerce.
True
In 2013, the number of online buyers was over 150 million.
True
In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.
True
In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution. True False
True
In the United States, the service sector accounts for about 75% of all economic activity.
True
It is not necessarily illegal to use someone else's trademark in a metatag.
True
It is possible to opt-out of FB typically attract more visitors than a brand's Web site.
True
Online retailing provides an example of the powerful role that intermediaries continue to play in retail trade.
True
PayPal requires the recipient of a payment to have a PayPal account to receive funds.
True
Pinterest's visitors are predominantly women.
True
Promoted Tweets are Twitter's version of Google's Ad Words.
True
Research shows that the two most important factors shaping the decision to purchase online are utility and trust.
True
Research shows that the two most important factors shaping the decision to purchase online are utility and trust. True False
True
Smishing attacks exploit SMS messages. True False
True
Spoofing involves attempting to hide a true identity by using someone else's e-mail or IP address?
True
T or F: Drive-by downloads are now the most common method of infecting computers.
True
T or F: In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.
True
T or F: Insiders present a greater security threat to e-commerce sites than outsiders.
True
T or F: Smishing attacks exploit SMS messages.
True
T or F: The U.S. federal government has historically not been in favor of the development and export of strong encryption systems.
True
T or F: The digital divide still persists along age, income, ethnic, and education dimensions.
True
T or F: Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.
True
The Children's Online Privacy Protection Act (COPPA prohibits Web sites from collecting information on children under the age of 13
True
The Children's Protection Act (CIPA) requires schools and libraries in the United States to install technology protection measures in an effort to shield children from pornography.
True
The European Data Protection Directive prohibits the transfer of PII to organizations or countries that do not have similar privacy protection policies.
True
The FTC's privacy approach is now focused on targeting practices that are likely to cause harm or unwarranted intrusion into consumers' daily lives.
True
The cost of sending 10,000 e-mails in an advertising campaign is about the same as sending 5,000.
True
The digital divide still persists along age, income, ethnic, and education dimensions.
True
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software. True False
True
The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.
True
The power of suppliers is a key industry strategic factor.
True
Traditional desktop marketing remains the largest part of all online marketing.
True
Transaction logs are built into Web server software.
True
Transaction logs are built into Web server software. True False
True
Which of the following online advertising formats attracted the least amount of spending in 2013? classifieds e-mail search rich media
Which of the following most helped Dagny Aslin of ExchangeHunterJumper.com in establishing her brand in the niche area of selling high end competition horses?
establishing customer needs and habits as the top priority in all marketing decisions.
In 2013, mobile marketing grew at nearly the same rate as traditional online marketing?
false
TLS does not guarantee server- side authentication?
false
Which of the following is the first step in the social marketing process?
fan aquisition
Which of the following features of e-commerce technology allows fine-grained, highly detailed information on consumers' real-time behavior to be gathered and analyzed? information density interactivity social technology personalization/customization
information density
Which of the following statements about Graph Search is not true?
it relies on google to supplement its search results
In modeling online consumer behavior, the concept of "consumer skills" refers to the:
knowledge consumers have about how to conduct online transactions.
In modeling online consumer behavior, the concept of "consumer skills" refers to the: education level of the consumer. product evaluation skills of the consumer. knowledge consumers have about how to conduct online transactions. communication skills of the consumer.
knowledge consumers have about how to conduct online transactions.
Which of the following is not one of the main elements of a comprehensive multi-channel marketing plan?
local marketing
Search engine advertising and marketing expenditures in 2013 were approximately: $19 million. $1.95 billion. $19.5 billion. $195 million.
$1.95 billion.
Approximately____ of the annual offline retail sales is influenced by online browsing.
1/3
By 2017 mobile commerce revenues are expected to be approximately
109 Billion
Companies are not permitting to collect personal information from children under the age of _____without parental consent.
13
Search engine advertising and marketing expenditures in 2013 were approximately:
19.5 Billion
Search engine advertising and marketing expenditures in 2013 were approximately?
19.5 billion
In 2013 location-based mobile marketing accounted for how much in marketing expenditures?
2.3 Billion
Online bill payments are believed to cost ________ to process compared to ________ for paper bills?
20 to 30 cents, 3 to 7
View- through rate measures the ________ response rate to an ad?
30 days
In 2013, mobile commerce revenues are approximately :
39 Billion
The Data Encryption Standard uses a(n) ________- bit key?
56
On a typical day, approximately ________ % of adult users in the United States logs on to the Internet.
80
A typical response rate for an e-mail campaign would be ________ %. A) 5 B) 2 C) 50 D) 25
A
All of the following are Pinterest marketing tools except: A) Promoted Accounts. B) Brand pages. C) Retail Pins. D) Follow button.
A
All of the following are factors in contributing to the increase in cybercrime except: A) the Internet's similarity to telephone networks. B) the Internet is an open, vulnerable design. C) the ability to remotely access the Internet. D) the ability to anonymously access the Internet.
A
All of the following marketing tools on Facebook require payment except: A) Facebook Offers. B) Marketplace Ads. C) Sponsored Stories. D) Promoted Posts.
A
All of the following marketing tools on Facebook require payment except: A) Facebook Offers. B) Promoted Posts. C) Sponsored Stories. D) Marketplace Ads.
A
All of the following statements about public key encryption are true except: A) public key encryption ensures authentication of the sender. B) public key encryption uses two mathematically related digital keys. C) public key encryption does not ensure message integrity. D) public key encryption is based on the idea of irreversible mathematical functions.
A
Approximately ________ of annual offline retail sales is influenced by online browsing. A) one-third B) three-quarters C) one-half D) one-quarter
A
By 2017, mobile commerce revenues are expected to be approximately: A)$109 billion. B)$109 million. C)$1.09 billion. D)$10.9 billion.
A
Symmetric key encryption is also known as: A) secret key encryption. B) public key encryption. C) PGP. D) PKI.
A
The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and: A) confidentiality. B) usability. C) functionality. D) viability.
A
What is the most frequent cause of stolen credit cards and card information today? A) the hacking and looting of corporate servers storing credit card information B) lost cards C) sniffing programs D) phishing attacks
A
Which of the following do Facebook users spend the most time on? A) News Feed B) Profiles C) Photos D) Graph Search
A
Which of the following is not a key point of vulnerability when dealing with e-commerce? A) the credit card companies B) the communications pipeline C) the client computer D) the server
A
Which of the following is not one of the main stages of the online purchasing process? A) browsing B) post-purchase service and loyalty C) interaction D) awareness
A
Which of the following measures the average length of stay at a Web site? A) stickiness B) loyalty C) recency D) retention rate
A
Encouraging users to click a Like button is an example of which step in the social marketing process? A) brand strength B) community C) fan acquisition D) amplification
D
P2P payment systems are a variation on what type of payment system? A) accumulating balance system B) digital credit card system C) digital checking system D) stored value payment system
D
Reventon is an example of: A) a macro virus. B) a bot program. C) a backdoor. D) ransomware.
D
SMS to friends, notifying friends of your location, and sharing offers with friends are ways to measure: A) fan acquisition. B) engagement. C) community. D) amplification.
D
The ratio of impressions to fans is a measure of: A) engagement. B) amplification. C) community. D) fan acquisition
D
Which of the following purchased Tumblr in May 2013? A) Facebook B) Google C) Twitter D) Yahoo
D
Which of the following left the WikiLeaks Web site effectively inoperable in August 2012?
DDoS attack
By 2012, social marketing had overtaken mobile marketing. (T/F)
F
Facebook does not sell display ads. (T/F)
F
Mobile users spend most of their time browsing mobile Web sites. (T/F)
F
T or F: A cell phone's GPS is accurate to within 5 feet of the actual location of the phone.
F
T or F: Traditional desktop marketing remains the largest part of all online marketing.
F
Digital Cash is legal tender that is instantly convertible into other forms of value without the inter mediation of any third parties.
FALSE
In the United States today, single, white, young , college educated males with high income donate the internet in terms of percentage of internet usage.
FALSE
Phising attacks rely on browser parasites.
FALSE
Which social marketing proved the most effective for ExchnageHunterJumper.com?
All of the following marketing tools on Facebook require payment except:
Facebook offers
A cell phone's GPS is accurate to within 5 feet of the actual location of the phone.
False
An interstitial ad is typically contained in a pop- up window that the user must close in order to continue?
False
An interstitial ad is typically contained in a pop-up window that the user must close in order to continue
False
By 2012, social marketing had overtaken mobile marketing.
False
Consumers are primarily price-driven when shopping on the Internet.
False
Copyright protection protects against others copying the underlying ideas in a work.
False
Text message generates the majority of mobile marketing spending.
False
The Unlawful Internet Gambling Enforcement Act has eliminated all online gambling in the United States.
False
The concept of "customer satisfaction" is broader than the concept of "customer experience."
False
The concept of "customer satisfaction" is broader than the concept of "customer experience." True False
False
The concept of "customer satisfaction" is broader than the concept of "customer experience."?
False
The major impact of Internet real estate sites is in enabling online-only property transactions.
False
The online mortgage industry has transformed the process of obtaining a mortgage.
False
The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.
False
Which of the following is not true about social marketing?
In 2013 marketers will spend almost twice as much on social marketing as they do on mobile marketing.
Which of the following features of e- commerce technology allows fine- grained, highly detailed information on consumers' real- time behavior to be gathered and analyzed?
Information density
The richness made possible by e-commerce technologies does which of the following?
It allows video, audio, and text to be integrated into a single marketing message and consuming experience.
The richness made possible by e-commerce technologies does which of the following? It enables worldwide customer service and marketing communications. It reduces the cost of delivering marketing messages and receiving feedback from users. It allows consumers to become co-producers of the goods and services being sold. It allows video, audio, and text to be integrated into a single marketing message and consuming experience.
It allows video, audio, and text to be integrated into a single marketing message and consuming experience.
Which of the following is not one of the main elements of a comprehensive multi- channel marketing plan?
Local marketing
Online bill payment now accounts for ________ of all bill payments?
More than 50 %
Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?
NFC
Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other? DES text messaging NFC IM
NFC
Which of the following is not one of the 4 main methods advertisers use to behaviorally target ads:
Nielsen ratings
Which of the following is not one of the four main methods advertisers use to behaviorally target ads?
Nielsen ratings
Refers to the ability to ensure that e-commerce participants do not deny their online actions
Nonrepudiation
________ refers to the ability to ensure that e-commerce participants do not deny their online actions. Authenticity Integrity Availability Nonrepudiation
Nonrepudiation
Which of the following examples illustrates the "Long Tail" phenomenon? Over 50% of Netflix's 100,000 titles are rented at least once a day by someone. Rhapsody music streaming service reported that its no play rate had increased to over 20%. The number of blockbuster "winner take all" video titles is declining. The average blog has a readership of slightly more than 1.
Over 50% of Netflix's 100,000 titles are rented at least once a day by someone.
All of the following statements about PKI are true except?
PKI guarantees that the verifying computer of the merchant is secure
All of the following methods about PKI are true except:
PKI guarantees that the verifying computer of the merchant is secure.
All of the following statements about PKI are true except:
PKI guarantees that the verifying computer of the merchant is secure.
What is the first step in developing an e-commerce security plan? Create a security organization. Perform a security audit. Perform a risk assessment. Develop a security policy.
Perform a risk assessment.
Botnets are typically use for all of the following except:
Phishing attacks
Reventon is an example of?
Ransomware
Which of the following is not true about search engine advertising?
Search engine advertising is the fastest growing type of online advertising.
Which of the following is not true about search engine advertising? Search engine advertising is the fastest growing type of online advertising. The top three search engine providers supply over 95% of all online searches. Spending on search engine advertising constitutes almost half of all online advertising spending. The click-through rate for search engine marketing has been fairly steady over the years.
Search engine advertising is the fastest growing type of online advertising.
P2P payment systems are a variation on what type of payment system?
Stored value payment
Brand pages on Facebook typically attract more visitors than a brand's Web site. (T/F)
T
Pinterest's visitors are predominantly women. (T/F)
T
T or F: About 25% of all search engine requests originate from mobile devices.
T
T or F: Brand pages on Facebook typically attract more visitors than a brand's Web site.
T
T or F: Google provides the leading location-based marketing platform.
T
A Trojan horse appears to be benign but then does something other than expected.
TRUE
Brand pages on facebook typically attract more visitors than a brand's website.
TRUE
Cookies when combined with web beacons, can be used to create cross-site profiles
TRUE
Pinterest visitors are predominantly women
TRUE
Spoofing involves attempting to hide a true identity by using someone else's e-mail or IP address.
TRUE
The cost of sending 10,000 emails in an advertising campaign is about the same as sending 5,000.
TRUE
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
TRUE
Which of the following statements about the Internet's impact on marketing is not true?
The Internet has decreased the impact of brands
Which of the following statements about the Internet's impact on marketing is not true?
The Internet has decreased the impact of brands.
Which of the following statements about a free pricing strategy is false?
The free pricing strategy was born in the early days of the Web
Which of the following statements about a free pricing strategy is false?
The free pricing strategy was born in the early days of the Web.
Which of the following statements about the use of tablets is not true?
The number of smart phone users is still growing faster than the number of tablet users.
Impressions are a measure of the?
The number of times an ad is served
A Trojan horse appears to be benign, but then does something other than expected. True False
True
A worm does not need to be activated by a user in order for it to replicate itself.
True
A worm does not need to be activated by a user in order for it to replicate itself. True False
True
A worm does not need to be activated by a user in order for it to replicate itself?
True
Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.
True
Mobile commerce currently accounts for more retail goods sold than social commerce.
True
Net neutrality refers to Internet backbone owners treating all Internet traffic equally.
True
Online career sites are being threatened by both job search engines and aggregators.
True
Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use. True False
True
e-commerce is a major conduit and generator of offline commerce
True
Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?
Two-factor authentification
If you want to determine the side of your website's audience, the metric you would use for the most accurate measurement will be:
Unique Visitors
If you want to determine the size of your Web site's audience, the metric you will use for the most accurate measurement will be?
Unique visitors
Which of the following features of e- commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?
Universal standards
Which of the following forms of online advertising is growing the fastest? video rich media sponsorships paid search
Video
Which of the following online advertising formats is the most effective?
Video ads
A Web beacon is: an automated applet for performing Web searches. a cookie that carries a virus. a tiny graphics file embedded in an e-mail or Web page. an executable cookie.
a tiny graphics file embedded in an e-mail or Web page.
Which of the following is not a feature that is driving the growth of social marketing and advertising?
affiliate programs
Encouraging users to click a like button is an example of which step in the social marketing process:
amplification
To allow lower- level employees access to the corporate network while preventing them from accessing private human resources documents, you would use?
an authorization management system.
An intrusion detection system can perform all of the following functions except:
blocking suspicious activity.
Rustock is an example of which of the following?
botnet
Most of the world's spam is delivered via which of the following?
botnets
Which of the following measures the ratio of items purchased to product views?
browse-to-buy ratio
Which of the following measures the ratio of items purchased to product views? view-to-cart ratio conversion rate cart conversion rate browse-to-buy ratio
browse-to-buy ratio
Which of the following is the most important tool in establishing a relationship with the customer? company Web site Facebook search engine display ads company CRM system
company Web site
The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:
confidentiality.
All of the following are limitations of the existing online credit card payment system except:
cost to consumers
In the United States the primary form of online payment is:
credit cards
In the United States, the primary form of online payment is:
credit cards.
Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?
curalate
The Nike iD program is an example of which of the following marketing techniques?
customer co-production
Which of the following is not an example of an access control?
digital signatures
Proxy servers are also known as:
dual home systems
Which of the following advertising formats attracted the least amount of spending in 2013?
Which of the following is the most popular use for mobile devices?
entertainment
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
firewall
The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time.
flash marketing
Which analytics tool did Fairmont Hotel use to measure the effectiveness of its online marketing and advertising ?
google analytics
Which of the following is the top concern of Internet users about purchasing online? lack of trust in the purchase process shipping costs difficulty of returning products inability to see and touch before buying
inability to see and touch before buying
Which of the following is the top concern for internet users about purchasing online?
inability to see or touch before buying
Which dimensions of security is spoofing a threat to?
integrity and authenticity
The incremental cost of building the next unit of a good is called the:
marginal cost
Hits are a measure of the:
number of http requests.
Impressions are a measure of the: number of pages viewed. number of times an ad is clicked. number of times an ad is served. number of http requests.
number of times an ad is clicked.
Impressions are a measure of the :
number of times an ad is served.
Impressions are a measure of the:
number of times an ad is served.
Approximately ________ of annual offline retail sales is influenced by online browsing. one-half three-quarters one-quarter one-third
one-third
Which of the following examples illustrates the "Long Tail" phenomenon?
over 50% of Netflix 100,000 titles are rented at least once per day by someone.
All of the following are used for authentication except: packet filters. certificates of authority. biometric devices. digital signatures.
packet filters.
Conversion Rate is a measure of the:
percentage of visitors who became customers.
Acquisition rate is a measure of the: percentage of shoppers who do not return within a year after their initial purchase. percentage of visitors who become customers. percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages. percentage of existing customers who continue to buy on a regular basis.
percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.
Reventon is an example of:
ransomware
Symmetric key encryption is also known as :
secret key encription
Symmetric key encryption is also known as: public key encryption. secret key encryption. PGP. PKI.
secret key encryption.
All of the following are examples of malicious code except:
sniffers.
All of the following are traditional online marketing tools except: e-mail and permission marketing. sponsorship marketing. affiliate marketing. social marketing.
social marketing.
Surveys have found that the least influential online marketing format for driving consumers to purchase is:
social networks
Which of the following measures the average length of stay at a Web site?
stickiness
Which of the following measures the average length of stay at a web site?
stickiness
None of the following payment systems offers immediate monetary value except:
store value/ debit card
None of the following payment systems offers immediate monetary value except: credit cards. personal checks. stored value/debit card. accumulating balance.
stored value/debit card.
A digital certificate contains all of the following except the:
subject's private key.
A digital certificate contains all of the following except the: digital signature of the certification authority. subject's private key. digital certificate serial number. subject's public key.
subject's private key.
Studies of the effects of social "connectedness" on Internet purchases indicate that the more "connected" an individual: the more that individual shares purchasing decisions with friends. the less that individual is influenced by friends' purchases. the less purchasing that individual does. the more purchasing that individual does.
the less that individual is influenced by friends' purchases.
Which of the following is a real time feed showing a friends activities, chats, and music listening on facebook?
ticker
A Web beacon is?
tiny graphics file embedded in an e-mail or Web page
Smishing attacks exploit SMS messages.
true
Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?
two-factor authentication
If you want to determine the size of your Web site's audience, the metric you will use for the most accurate measurement will be: reach. hits. unique visitors. page views.
unique visitors.
Which of the following online advertising formats is the most effective?
video ads
Linden Dollars, created for use in Second life, are an example of :
virtual currency
Bitcoins are an example of:
virtual currency.
Linden Dollars, created for use in Second Life, are an example of:
virtual currency.
Which of the following statements about a free pricing strategy is false?
was born in the early days of the web
Refers to the ability to identify the person or entity with whom you are dealing on the Internet?
Authenticity
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. Nonrepudiation Availability Integrity Authenticity
Authenticity
________ refers to the ability to identify the person or entity with whom you are dealing on the internet.
Authenticity
______ refers to the ability to ensure that an e-commerce site continues to function as intended.
Availability
______refers to the ability to ensure that an e- commerce site continues to function as intended?
Availability
All of the following are examples of malicious code except: A) worms. B) sniffers. C) viruses. D) bots.
B
Display ads constitute about ________ % of mobile ad spending. A) 15 B) 33 C) 20 D) 66
B
How does Google Analytics track user behavior at a participating Web site? A) cookies B) beacons C) server logs D) super cookies
B
In 2013, location-based mobile marketing accounted for how much in marketing expenditures? A) $23 billion B) $2.3 billion C) $23 million D) $230 million
B
Miller Coors used which of the following techniques to alert Blue Moon beer fans as to where it could be purchased? A) Geo-social based services B) Geo-fencing C) E9-1-1 D) Geo-search
B
Online bill payments are believed to cost ________ to process compared to ________ for paper bills. A) $1 to $2, $10 to $20 B) 20 to 30 cents, $3 to $7 C) 3 to $7, 20 to 30 cents D) $10 to $20, $ 1 to $2
B
The newest and fastest growing segment of the digital marketing universe is: A) Twitter marketing. B) location-based mobile marketing. C) Pinterest marketing. D) Facebook marketing.
B
The richness made possible by e-commerce technologies does which of the following? A) It reduces the cost of delivering marketing messages and receiving feedback from users. B) It allows video, audio, and text to be integrated into a single marketing message and consuming experience. C) It enables worldwide customer service and marketing communications. D) It allows consumers to become co-producers of the goods and services being sold.
B
Which of the following countries has been found to have engaged in cyberespionage against Google? A) Iraq B) China C) Russia D) Iran
B
Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media? A) TweetDeck B) Curalate C) Amplify D) Webtrends
B
Which of the following is not one of the four main methods advertisers use to behaviorally target ads? A) clickstream data B) Nielsen ratings C) data collected from social networks D) integration of offline data
B
Which of the following provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand? A) Enhanced Profile Pages B) Amplify C) Lead Generation Cards D) Promoted Accounts
B
Which of the following purchased Tumblr in May 2013? A) Facebook B) Yahoo C) Google D) Twitter
B
Which of the following statements about CAN-SPAM is not true? A) CAN-SPAM prohibits the use of deceptive subject lines and false headers. B) CAN-SPAM prohibits unsolicited e-mail (spam). C) CAN-SPAM went into effect in January 2004. D) Large spammers are among CAN-SPAM's biggest supporters.
B
Which of the following statements about the Internet's impact on marketing is not true? A) The Internet has increased the richness of marketing communications. B) The Internet has decreased the impact of brands. C) The Internet has broadened the scope of marketing communications. D) The Internet has expanded the information intensity of the marketplace.
B
________ refers to the ability to ensure that an e-commerce site continues to function as intended. A) Authenticity B) Availability C) Nonrepudiation D) Integrity
B
Most of the world's spam is delivered via which of the following? worms botnets viruses Trojan horses
Bonet
Most of the world's spam is delivered via which of the following?
Botnets
Which of the following is not one of the main stages of the online purchasing process?
Browsing
Which children's Web site was fined $3 million in 2011 for collecting and sharing children's personal information without consent of their parents? A) NeoPets B) Nick Jr. C) Disney's Playdom D) Emily's Dress Up
C
Which dimension(s) of security is spoofing a threat to? A) availability and integrity B) availability C) integrity and authenticity D) integrity
C
Which of the following involves a coupon or other promotional offer that appears in users' Twitter timeline? A) Promoted Trend B) Promoted Account C) Lead Generation Card D) Promoted Tweet
C
Which of the following is a real-time feed showing a friend's activities, chats, and music listening on Facebook? A) Social Graph B) Timeline C) Ticker D) News Feed
C
Which of the following is a real-time feed showing a friend's activities, chats, and music listening on Facebook? A) News Feed B) Timeline C) Ticker D) Social Graph
C
Which of the following is the leading display ad site on mobile devices? A) Google B) Twitter C) Facebook D) Yahoo
C
Which of the following is the most popular use for mobile devices? A) socializing B) shopping C) entertainment D) performing tasks, such as finances
C
Which of the following most helped Dagny Aslin of ExchangeHunterJumper.com in establishing her brand in the niche area of selling high-end competition horses? A) valuing quality over quantity at each stage in the Web site development process B) establishing customer needs and habits as the top priority in all marketing decisions C) adapting marketing techniques to keep up with new Internet technologies D) integrating online and offline marketing techniques to establish a consistent brand
A
Which of the following online advertising formats attracted the least amount of spending in 2013? A) e-mail B) classifieds C) rich media D) search
A
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. A) Authenticity B) Availability C) Integrity D) Nonrepudiation
A
Which of the following is not a feature that is driving the growth of social marketing and advertising?
Affiliate Programs
A Web beacon is: A) an automated applet for performing Web searches. B) an executable cookie. C) a tiny graphics file embedded in an e-mail or Web page. D) a cookie that carries a virus.
C
A digital certificate contains all of the following except the: A) subject's public key. B) digital certificate serial number. C) subject's private key. D) digital signature of the certification authority.
C
All of the following were popular types of online marketing before 2007 except: A) e-mail. B) corporate Web sites. C) mobile marketing. D) display ads.
C
An intrusion detection system can perform all of the following functions except: A) checking network traffic to see if it matches certain patterns or preconfigured rules. B) setting off an alarm when suspicious activity is detected. C) blocking suspicious activity. D) examining network traffic.
C
Companies are not permitted to collect personal information from children under the age of ________ without parental consent. A) 8 B) 10 C) 13 D) 16
C
Encouraging users to click a Like button is an example of which step in the social marketing process? A) brand strength B) community C) amplification D) fan acquisition
C
Facebook's marketing success on both desktop and mobile platforms is based on: A) fees for Brand Pages and other specialized business marketing tools. B) the sale of user clickstream data. C) ads inserted into users' News Feeds. D) ads targeted through Facebook's Open Graph and Graph Search tools.
C
How can a smartphone's gyroscope and accelerometer be used in product marketing? A) to speed up delivery of large multimedia files B) to locate the user's geographical position C) to enhance user interaction with mobile multimedia D) to provide accurate data on the user's destination and speed
C
In 2013, what was the approximate Internet penetration rate for individuals that have attained less than a high-school education? A) 90% B) 45% C) 60% D) 75%
C
Which social marketing proved the most effective for ExchangeHunterJumper.com? A) YouTube B) Pinterest C) Facebook D) Instagram
C
Which of the following countries has been found to have engaged in cyber espionage against google?
CHINA
A ______ is a depository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.
CRM
A ________ is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.
CRM system
Which of the following countries has been found to have engaged in cyber espionage against Google?
China
Which of the following countries has been found to have engaged in cyberespionage against Google?
China
Which of the following is the most important tool in establishing a relationship with the customer?
Company website
The six key dimensions to e- commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and?
Confidentiality
________ refers to the ability to ensure that messages and data are only available to those authorized to view them. Privacy Integrity Confidentiality Availability
Confidentiality
Cookies, when combined with Web beacons, can be used to create cross-site profiles. True False
Cookies, when combined with Web beacons, can be used to create cross-site profiles. True False
All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except: social networks. online catalogs. targeted banner ads. search engines.
targeted banner ads.
All of the following are factors in contributing to the increase in cybercrime except?
the Internet's similarity to telephone networks
All of the following are factors in contributing to the increase in cybercrime except: the ability to remotely access the Internet. the Internet is an open, vulnerable design. the ability to anonymously access the Internet. the Internet's similarity to telephone networks.
the Internet's similarity to telephone networks.
Which of the following is not a key point of vulnerability when dealing with e- commerce?
the credit card companies
Conversion rate is a measure of the: percentage of shoppers who do not return within a year after their initial purchase. percentage of visitors who become customers. percentage of existing customers who continue to buy on a regular basis. percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.
percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.
All the following statements about symmetric key encryption are true except?
symmetric key cryptography is computationally slower
All of the following statements about symmetric key encryption are true except;
symmetric key encryption is computationally slower.
All the following statements about symmetric key encryption are true except: symmetric key encryption is a key element in digital envelopes. in symmetric key encryption, both the sender and the receiver use the same key to encrypt and decrypt a message. the Data Encryption Standard is a symmetric key encryption system. symmetric key encryption is computationally slower.
symmetric key encryption is computationally slower.
All of the following statements about cookies are true except:
the data typically stored in cookies includes a unique ID and e-mail address.
What is the most frequent cause of stolen credit cards and card information today?
the hacking and looting of corporate servers storing credit card information
How can a smart phone's gyroscope and accelerometer be used in product marketing?
to enhance user interaction with mobile multimedia
Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?
universal standards
Creating multiple variations of information goods and selling these to different market segments at different prices is called: bundling. versioning. dynamic pricing. customization.
versioning
Which of the following forms of online advertising is growing the fastest?
video
Facebook's share price fell dramatically after its IPO because investors feared that :
would be unable to increase advertising revenues enough.
All of the following are fixed price strategies except:
yield management.
An example of a privacy violation of e-commerce security is:
your online purchasing history being sold to other merchants without your consent.