E-Commerce: The Final Jam
The Data Encryption Standard uses a(n) ________-bit key. 8 56 256 512
56
Which of the following is an example of an integrity violation of e-commerce security? A website is not actually operated by the entity the customer believes it to be. A customer denies that he is the person who placed the order. A merchant uses customer information in a manner not intended by the customer. An unauthorized person intercepts an online communication and changes its contents.
An unauthorized person intercepts an online communication and changes its contents.
In ________, all of a customer's financial (and even nonfinancial) data are pulled together into a single, personalized website. account aggregation EBPP systems a financial portal integrated financial services
account aggregation
Which of the following was the first step in the development of B2B e-commerce? Electronic Data Interchange (EDI) computerized inventory databases digital invoices automated order entry systems
automated order entry systems
Which of the following dimensions of e-commerce security is not provided for by encryption? confidentiality message integrity nonrepudiation availability
availability
Which of the following involves the issue of social control? information rights public safety and welfare property rights governance
governance
Which of the following is the leading cause of data breaches? hackers theft of a computer DoS attacks accidental disclosures
hackers
Disputes over federal trademarks involve establishing: intent. underlying ideas. piracy. infringement.
infringement.
Which dimensions of security is spoofing a threat to? availability and authenticity integrity and authenticity availability and integrity integrity and confidentiality
integrity and authenticity
A digital certificate contains all of the following except the: subject's private key. digital signature of the certification authority. digital certificate serial number. subject's public key.
subject's private key.
Which of the following refers to the links that connect business firms with one another to coordinate production? horizontal market B2B e-commerce supply chain vertical market
supply chain
All of the following are online communications used to support the evaluation of alternatives stages of the consumer decision process except: social networks. online catalogs. search engines. targeted banner ads.
targeted banner ads.
Consumers are primarily price-driven when shopping on the Internet. True False
False
Online gambling is now legal throughout the United States. True False
False
Online retail constitutes about 20% of the total retail market today. True False
False
The Children's Internet Protection Act (CIPA) has been struck down by the U.S. Supreme Court as unconstitutional. True False
False
________ purchasing involves the purchase of goods based on immediate needs in larger marketplaces that involve many suppliers. Indirect Spot Vertical Bulk
Spot
Which of the following was designed to cripple Iranian nuclear centrifuges? Shamoon Snake Storm Stuxnet
Stuxnet
Which of the following is not a major trend in online retail for 2020-2021? The average annual purchase of online buyers continues to increase. Buying online has become a normal, mainstream, everyday experience. The number of online buyers continues to increase. The Covid-19 pandemic is expected to create a decrease in e-commerce retail purchases.
The Covid-19 pandemic is expected to create a decrease in e-commerce retail purchases.
A Trojan horse appears to be benign, but then does something other than expected. True False
True
A roughly equal percentage of men and women in the United States use the Internet today. True False
True
Exchanges are used for spot purchasing of MRO supplies. True False
True
Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations. True False
True
Net neutrality refers to the idea that Internet service providers (ISPs), including cable Internet and wireless carriers, should treat all data on the Internet in the same manner, and not discriminate or price differentially by content, protocol, platform, hardware, or application. True False
True
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software. True False
True
Walmart is both the world's largest retailer and has the world's largest supply chain. True False
True
Which of the following situations would not qualify for the fair use exception to U.S. copyright law? A journalist quotes a paragraph from a book in a review of the book. A professor clips a newspaper article just before class and distributes copies of it to his class. Google posts thumbnail images of books in the Google Book Search Project. A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.
A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.
A ________ is a repository of customer information that records all contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer. customer service chat system transactive content system data warehouse CRM system
CRM system
Next generation firewalls provide all of the following except: the ability to identify users regardless of the device or IP address. the ability to automatically update applications on a client computer with security patches. the ability to identify applications regardless of the port, protocol, or security evasion tools used. an application-centric approach to firewall control.
the ability to automatically update applications on a client computer with security patches.
Analysts predict that B2B e-commerce in the United States will grow to approximately ________ by 2024. $9.8 billion $98 billion $980 billion $9.8 trillion
$9.8 trillion
What was the approximate Internet penetration rate in 2019 for individuals that have attained less than a high-school education? 81% 61% 71% 51%
71%
In the United States, the service sector accounts for approximately ________% of the United States GDP. 70 75 80 85
80
How long does copyright protection extend for corporate-owned works? 25 years 50 years 75 years 95 years
95 years
Which of the following statements about blockchain is not true? A blockchain system is a transaction processing system. A blockchain system is inherently centralized. A blockchain system is composed of a distributed network of computers. Cryptocurrencies are based on blockchain technology.
A blockchain system is inherently centralized.
________ is defined as the use of digital technologies to permit organizations to work together to design, develop, build, and manage products through their life cycles. SCM EDI Social e-commerce Collaborative commerce
Collaborative commerce
Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society? The Social Contract Rule Collective Utilitarian Principle Risk Aversion Principle The Golden Rule
Collective Utilitarian Principle
Which of the following best explains why the service sector is a natural avenue for e-commerce? Much of the value in services is based on the collection, storage, and exchange of information. It is not; services are difficult to translate to e-commerce because they all rely on face-to-face communication and barter. The service sector requires "rich" marketing messages to reach new customers. The service sector is less geographically reliant and more globally oriented.
Much of the value in services is based on the collection, storage, and exchange of information.
The essential characteristic of ________ is that they bring hundreds to thousands of suppliers into a single Internet-based environment to conduct trade. Net marketplaces industry consortia exchanges horizontal markets
Net marketplaces
________ is the ability to ensure that e-commerce participants do not deny their online actions. Authenticity Nonrepudiation Availability Integrity
Nonrepudiation
What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)? Make collection of PIl illegal. Require firms to have consumers affirmatively opt-in before PI is collected. Require firms to allow consumers to opt-out before PI is collected. Require robust notice only before PI is collected.
Require firms to have consumers affirmatively opt-in before PI is collected.
A(n) ________ system continuously links the activities of buying, making, and moving products from suppliers to purchasing firms, as well as integrating order entry systems. CPFR ERP EDI SCM
SCM
All of the following are major technology trends in B2B e-commerce in 2020-2021, except: a growing emphasis on the use of business analytics software (business intelligence) to understand very large data sets. a decrease in the use of social network platforms. a growing use of the mobile platform for B2B systems. a movement of B2B systems to cloud computing providers as a means of slowing rising technology costs.
a decrease in the use of social network platforms.
A web beacon is: an executable cookie. a cookie that carries a virus. an automated applet for performing web searches. a tiny graphics file embedded in an e-mail or web page.
a tiny graphics file embedded in an e-mail or web page.
What is the largest sector of the online travel services market in terms of revenue? cruise/tour reservations car reservations hotel reservations airline reservations
airline reservations
The term BYOD refers to employees: working from home. bringing work devices to the home. being allowed or encouraged to use their own mobile devices and laptops. using mobile devices for work.
being allowed or encouraged to use their own mobile devices and laptops.
Which of the following is a transaction database that operates on a distributed P2P network that connects all participant members in a single database and is highly secure, reliable, resilient, and inexpensive? cloud-based B2B system blockchain SCM system EDI
blockchain
Which of the following measures the percentage of e-mails that could not be delivered? bounce-back rate abandonment rate attrition rate unsubscribe rate
bounce-back rate
All of the following are challenges faced by bricks-and-clicks firms except: coordinating prices across channels. building a brand name. handling returns of online purchases at retail outlets. building a credible website.
building a brand name.
Virtual merchants face potentially large costs for all of the following except: building and maintaining a website. building an order fulfillment infrastructure. developing a brand name. building and maintaining physical stores.
building and maintaining physical stores.
Which of the following occurs when retailers of products must compete on price and currency of inventory directly against the manufacturer? channel conflict hypermediation localization disintermediation
channel conflict
According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online? used an anonymous web browsing service posted comments online anonymously encrypted their communications cleared web browser history and cookies
cleared web browser history and cookies
Accessing data without authorization on Dropbox is an example of a: cloud security issue. sniffing issue. social network security issue. mobile platform security issue.
cloud security issue.
Which of the following is the most important tool in establishing a relationship with the customer? company CRM system company website search engine display ads Facebook
company website
Downloading a music track owned by a record company without paying for it is an example of a violation of: patent law. copyright law. privacy law. trademark law.
copyright law.
The lower the ________ compared to revenue, the higher the gross profit. operating expenses assets gross margin cost of sales
cost of sales
All of the following are limitations of the existing online credit card payment system except: cost to merchant. social equity. cost to consumers. poor security.
cost to consumers.
Which of the following uses software installed at the ISP level to track user clickstream behavior? deep packet inspection shopping carts DRM trusted computing environments
deep packet inspection
All of the following are examples of direct goods in the auto industry except: sheet steel. desktop computers. rubber molding. shatter-resistant glass.
desktop computers.
Which of the following online advertising formats attracted the least amount of spending in 2020? classifieds search e-mail rich media
What is another name for pro forma earnings? earnings before income taxes, depreciation, and amortization (EBITDA) generally accepted accounting principles (GAP) earnings net margin operating income
earnings before income taxes, depreciation, and amortization (EBITDA)
Which of the following primarily deal with direct goods? e-procurement Net marketplaces and industry consortia exchanges and e-procurement Net marketplaces e-distributors and independent exchanges exchanges and industry consortia
exchanges and industry consortia
All of the following are advantages of online retail except: faster delivery of goods. lower supply chain costs. ability to change prices. lower cost of distribution.
faster delivery of goods.
Which of the following features of e-commerce technology enables marketers to engage customers in a dialog and dynamically adjust the experience to the consumer? interactivity ubiquity richness information density
interactivity
All of the following are required for information to be considered a trade secret except: the owner must have taken steps to protect it. it must be something that others do not know. it must have commercial value to its owner. it must be unique.
it must be unique.
Which of the following is a method of inventory cost management that seeks to eliminate excess inventory? sustainable production lean production just-in-time production supply chain simplification
just-in-time production
The marketing technique known as ________ involves merchants offering many products for which there is little demand. flash marketing bait-and-switch yield management long tail marketing
long tail marketing
Which of the following is not considered a current asset? cash accounts receivable long-term investments marketable securities
long-term investments
The online retail sector of the retail industry is most similar to the ________ sector. mail order/telephone order (MOTO) consumer durables specialty stores general merchandise
mail order/telephone order (MOTO)
E-distributors: usually operate "private" markets. make money by charging a mark-up on products they distribute. operate in vertical markets. focus on selling direct products.
make money by charging a mark-up on products they distribute.
The incremental cost of building the next unit of a good is called the: marginal cost. fixed cost. Law of One Price. variable cost.
marginal cost.
All of the following were parts of the vision during the early days of e-commerce except the belief that: the cost of acquiring customers would be much lower. online consumers were rational and cost-driven. entry costs to the online retail market would be much less than those needed to establish a physical storefront. new, "first-mover" middlemen, with expertise in e-commerce, would force traditional intermediaries out of business.
new, "first-mover" middlemen, with expertise in e-commerce, would force traditional intermediaries out of business.
Apart from Amazon, the top online retail firms in terms of online sales are all primarily ________ firms. manufacturer-direct omni-channel catalog merchant web-only
omni-channel
All of the following are terms used to describe on-demand service companies except: collaborative commerce. we-commerce. omni-channel commerce. mesh economy.
omni-channel commerce.
PayPal is an example of which of the following types of payment system? digital checking system digital credit card system online stored value payment system accumulating balance system
online stored value payment system
Automatically redirecting a web link to a different address is an example of which of the following? pharming sniffing DoS attack social engineering
pharming
The liquidity of a market is measured by all of the following except: size of transactions. price transparency. volume of transactions. number of buyers and sellers in market.
price transparency.
Asymmetric key cryptography is also known as: PKI. secret key cryptography. public key cryptography. PGP.
public key cryptography.
Which of the following is not an e-commerce public safety and welfare issue? regulation of cigarette sales regulation of pornography regulation of taxation regulation of gambling
regulation of taxation
What is the first step in the procurement process? negotiate price qualify the seller and its products search for suppliers issue a purchase order
search for suppliers
All of the following are "traditional" online marketing tools except: affiliate marketing. sponsorship marketing. e-mail and permission marketing. social marketing.
social marketing.
Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying? social technology interactivity ubiquity information density
social technology
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: a backdoor. spyware. a browser parasite. adware.
spyware.
Which of the following measures the average length of stay at a website? retention rate stickiness loyalty page views
stickiness
Uber has been criticized for using which of the following? flash marketing malware bundling surge pricing
surge pricing
All of the following statements about the online real estate services market are true except: the Internet and e-commerce have created a revolution in the real estate value chain. the primary service offered by real estate sites is a listing of houses available. the major impact of Internet real estate sites has been in influencing offline decisions. the first step in the home buying process for nearly all ages of home buyers is to look online.
the Internet and e-commerce have created a revolution in the real estate value chain.
What is the major reason why the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law? the support for instant peer-to-peer communication the use of standards for file formats the anonymous nature of the Internet the ability to make perfect copies of digital works at little cost
the ability to make perfect copies of digital works at little cost
Which of the following enabled MOTO firms to make an easier transition to e-commerce? falling long distance telecommunications prices the national toll-free call system the growth of the credit card industry the fact that they already had efficient customer order fulfillment processes
the fact that they already had efficient customer order fulfillment processes
Recency refers to the: percentage of customers who do not return during the next year after an initial purchase. percentage of existing customers who continue to buy on a regular basis. percentage of customers who return to the site within a year to make additional purchases. time elapsed since the last visit made by a customer.
time elapsed since the last visit made by a customer.
Trans-organizational business processes require ________ to perform. two independent firms three independent firms one firm at least ten firms
two independent firms
Registering the domain name Faceboik.com with the intent to divert web traffic from people misspelling Facebook.com is an example of: keywording. deep linking. typosquatting. metatagging.
typosquatting.
Which of the following features of e-commerce technology can result in work and shopping invading family life? ubiquity interactivity global reach information density
ubiquity
If you want to determine the size of your website's audience, the metric you will use for the most accurate measurement will be: hits. unique visitors. page views. reach.
unique visitors.
Creating multiple variations of information goods and selling these to different market segments at different prices is called: versioning. bundling. customization. dynamic pricing.
versioning.
A(n) ________ market is one that provides expertise and products for a specific industry (i.e., automobiles). indirect buyer-biased horizontal vertical
vertical
Pinterest's Lens is an example of which of the following? visual search voice search SEO keyword advertising
visual search
The Spokeo case involved a claim for damages based on which of the following? Defend Trade Secrets Act Digital Millennium Copyright Act Fair Credit Reporting Act Anticybersquatting Consumer Protection Act
Fair Credit Reporting Act
________ typically attack governments, organizations, and sometimes individuals for political purposes. Tiger teams Hacktivists Crackers Bounty hunters
Hacktivists
The richness made possible by e-commerce technologies does which of the following? It allows consumers to become co-producers of the goods and services being sold. It enables worldwide customer service and marketing communications. It reduces the cost of delivering marketing messages and receiving feedback from users. It allows video, audio, and text to be integrated into a single marketing message and consuming experience.
It allows video, audio, and text to be integrated into a single marketing message and consuming experience.
What is the first step in developing an e-commerce security plan? Perform a security audit. Create a security organization. Perform a risk assessment. Develop a security policy.
Perform a risk assessment.
Which of the following statements about a free pricing strategy is not true? It is difficult to convert free customers into paying customers. The free pricing strategy was born in the early days of the Web. Free products and services can knock out potential and actual competitors. Free products and services can help build market awareness.
The free pricing strategy was born in the early days of the Web.