ECON139 Chapter 11, E-commerce (Chapters Vary)

Ace your homework & exams now with Quizwiz!

Malicious Code (Malware)

Includes a variety of threats such as viruses, worms, Trojan horses, and bots

Which of the following statements about Instagram is not true?

Instagram is owned by Twitter.

IP address

Internt address expressed as a 32-bit number that appears as a series of four separate numbers marked off by periods, such as 64.49.254.91

Security Audit

Involves the routine review of access logs (identifying how outsiders are using the site as well as how insiders are accessing the site's assets)

Identity Fraud

Involves the unauthorized use of another person's personal data for illegal financial benefit

Which of the following is not a characteristic of a perfect competitive market

It is highly regulated

Drive-by-download

Malware that comes with a downloaded file that a user requests

Worm

Malware that is designed to spread from computer to computer

Ransomware (scareware)

Malware that prevents you from accessing your computer or files and demands that you pay a fine

Which of the following is the most successful of Facebook's apps?

Messenger

Which of the following is a standard that makes it possible to access data from any application regardless of the database and operating system software being used?

ODBC

False

On Web sites that use the advertising-subscription revenue model, subscribers are typically subjected to much more advertising than they are on sites supported completely by advertising.

________ help you engage your customers in a conversation.

On-site blogs

The color settings on computer monitors vary widely

One problem that the Web presents for clothing retailers of all types that _____.

Maladvertising

Online advertising that contains malicious code

All of the following can be considered a direct or indirect competitor of Amazon except

Priceline

Mobile Platform

Primary Internet access Tablets Smartphones Smart watches

Which of the following is not a major business trend in e-commerce in 2016-2017?

Small businesses and entrepreneurs are hampered by the rising cost of market entry caused by increased presence of industry giants.

Which of the following statements about e-commerce in the United States in 2016 is not true?

Social e-commerce generates more revenue than mobile e-commerce

Proxy Server (proxy)

Software server that handles all communications originating from or being sent to the Internet, acting as a spokesperson or bodyguard for the organization

Zero-Day Vulnerability

Software vulnerability that has been previously unreported and for which no patch yet exists

Stickiness

The _____ of a Web site is its ability to keep visitors at the site and attract repeat visitors.

Privacy

The ability to control the use of information about oneself

Availability

The ability to ensure that an e-commerce site continues to function as intended

Nonrepudiation

The ability to ensure that e-commerce participants do not deny (i.e., repudiate) their online actions

Encryption

The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the receiver. The purpose of encryption is (a) to secure stored information and (b) to secure information transmission

Biometrics

The study of measurable biological or physical characteristics

information density

The total amount and quality of information available to all market participants

Which of the following statements illustrates the network effects that portals are subject to?

The value of the portal to advertisers and consumers increases geometrically as reach increases.

True

There has been little consensus on how to measure and charge for site visitor views, even after almost 20 years of experience with the medium.

WPA2

Wireless security standard that uses the AES algorithm for encryption and CCMP, a more advanced authentication code protocol

Cracker

Within the hacking community, a term typically used to denote a hacker with criminal intent

Which of the following is an example of a CMS?

WordPress

All of the following are major players in hosting/co-location/cloud services except:

WordPress.

Internet

Worldwide network of computer networks built on common standards

All of the following are examples of social networks except:

Y Combinator

After Google, the next portal/search engine site with the most unique visitors is:

Yahoo.

Addressable media

_____ are advertising efforts directed to a known recipient and include mail, telephone calls, and e-mail.

Usability

_____ is an important element of creating an effective Web presence.

Usability testing

_____ is the testing and evaluation of a site by its owner to ensure ease of use for site visitors.

LexisNexis

_____ offers a variety of information services for lawyers and law enforcement officials, court cases, public records, and resources for law libraries.

Digital products

_____ tend to have large up-front costs. Once those costs are incurred, additional units can be made at very low additional cost.

intranet

a TCP/IP network located within a single organization for purposes of communications and information processing

e-commerce business model

a business model that aims to use and leverage the unique qualities of the Internet and the World Wide Web

cable modem

a cable television technology that piggybacks digital access to the Internet on top of the analog video cable providing television signals to a home

sales revenue model

a company derives revenue by selling goods, information, or services

subscription revenue model

a company offers its users content or services and charges a subcription fee for access to some or all of its offerings

advertising revenue model

a company provides a forum for advertisements and receive fees from advertisers

transaction fee revenue model

a company receives a fee for enabling or executing a transaction

e-distributer

a company that supplies products and services directly to individual businesses

first mover advantage

a competitive market advantage for a firm that results from being the first into a marketplace with a serviceable product or service

Internet2

a consortium of more than 200 universities, government agencies, and private businesses that are collaborating to find ways to make the Internet more efficient

business plan

a doscument that describes a firm's business model

first mover

a firm that is first to market in a particular area and that moves quickly to gather market share

IP telephony

a general term for the technologies that use VoIP and the internet;s packet-switched network to transmit voice and other forms of audio communication over the Internet

perfect market

a market in which there are no competitive advantages or asymmetries because all forms have equal access to all the factors of production

package switching

a method of slicing digital messages into packets, sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive at their destination

client/server computing

a modlel of computing in which powerful personal computers are connected in a network togetherwith one or more servers

Internet Message Access Protocol (IMAP)

a more current e-mail protocol that allows users to search, organize, and filter their mail prior to downloading it from the server

eXtensible Markup Language (XML)

a new markup language specification developed by the W3C (World Wide Web Consortium) that is designed to describe data and information

diffserv (differentiated quality of service)

a new technology that assigns levels of priority to packets based on the type of data being transmitted

client

a powerful personal computer that is part of a network

Ping

a program that allows you to check the connection between your client and the server

Secure Sockets Layer (SSL)

a protocol that secures communications between the client and the server

Post Office Protocol 3 (POP3)

a protocol used by the client to retrieve mail from an Internet server

WAP (Wireless Application Protocol)

a realtively new protocol that can support virtually any wireless network and is supported by every operating system

GigaPop

a regional Gigabit Point of Presence, or point of access to the Internet2 network, that supports at least one gigabit (1 billion bits) per second information transfer

business model

a set of planned activites designed to result in a profit in a marketplace

business strategy

a set of plans for achieving superior long-term returns on the capital invested in a business firm

protocol

a set of rules and standards for data transfers

IP mutlicasting

a set of technologies that enables efficient delivery of data to many locations on a network

All of the following are basic functionality provided by web servers except:

a shopping cart.

commoditization

a situation where there are no differences among products or services, and the only basis of choosing products is price

The early years of e-commerce are considered

a stunning technological success

Digital Subscriber Line (DSL)

a telephone technology for delivering high-speed access through ordinary telephone lines found in homes or businesses

Telnet

a terminal emulation program that runs in TCP/IP

cookie

a tool used by websites to sotre information about a user. When a visitor enters a website, the site sends a small text file to the users computer so that info from the site can be loaded more quickly for future vists.

friction-free commerce

a vision of commerce in which information is equally distributed, transaction costs are low, prices can be dynamically adjusted to reflect actual demand, intermediaries decline, and unfair competitive advantages are eliminated

Hypertext

a way of formatting pages with embedded links that connect documents to one another, and that also link pages to other objects such as sound, video, or animation

Which of the following verifies that the business objectives of the system as originally conceived are in fact working?

acceptance testing

Stickiness is an important attribute for which of the following revenue models?

advertising revenue model

Which of the following is a community of members who self-identify with a demographic or geographic category?

affinity community

Healthboards is an example of a(n) ________ social network.

affinity-based

The early years of e-commerce were driven by all of the following factors except

an emphasis on exploiting traditional distribution channels

exchange

an independent digital electronic marketplace where suppliers and commercial purchasers can conduct transactions

Web client

any computing device attached to the Internet that is capable of making HTTP requests and displaying HTML pages, most commonly a Windows PC or Macintosh

information asymmetry

any disparity in relevant market information among parties in a transaction

second generation (2G) cellular networks

are relatively slow circuit-switched digital networks that can transmit data at about 10 Kbps

All of the following are examples of Web 2.0 sites and applications except

auction sites

Which of the following is not one of the three defining characteristics of a portal?

auctions

C2C e-commerce

consumers selling to other consumers

eBay uses all of the following business models except:

content provider.

Which system functionality must your website have in order to be able to personalize or customize a product for a client?

customer on-site tracking

The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade.

decreased dramatically

latency

delays in messages caused by the uneven flow of information packets through the network

revenue model

describes how the firm will earn revenue, produce profits, and provide a superior return on invested capital

GENI Initiative

develop new core functionality for internet

What are the two most important management challenges in building a successful e-commerce presence?

developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

Which of the following basic system functionalities is used to display goods on a website?

digital catalog

Instant Messaging

display words on computer instantly

Innovative entrepreneurs and their business firms that destroy existing business models are referred to as ________.

disruptors

content provider

distributes information content, such as digital news, music, photos, video, and artwork over the Web

Mobile Apps

explode in 2012 - 20% of mobile owners research products, 35% made purchase

XML

extensible Markup language designed to describe data and information tags used are defined by user

Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service?

freemium strategy

Most of the time required to maintain an e-commerce site is spent on

general administration and making changes and enhancements to the system.

Instagram is an example of a(n):

general community/social network

campus area network (CAN)

generally, a local area network operating within a single organization that leases access to the Web directly from regional national carriers

Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?

global reach

Business-to-consumer (B2C) e-commerce in the United States:

has grown at double-digit rates between 2010 and 2016

WiFI

high speed, fixed broadband wireless lan. different versions for home and business market. Limited range

backbone

high-bandwith fiber-optic cable that transports data across the Internet

All of the following are basic functionality provided by e-commerce merchant server software except:

marketing analytics.

marketspace

marketplace extended beyond traditional boundaries and removed from a temporal and geographic location

bandwidth

measures how much data can be transferred over a communications medium within a fixed period of time; is usually expressed in bits per second (bps), kilobits per second (Kbps), or megabits per second (Mbps)

The costs incurred by merchants changing product prices (such as the costs of reentering prices into computer systems) are referred to as:

menu costs

GSM (Global System for Mobile Communications)

mobile communications system widely used in Europe and Asia that uses narrowband Time Division Multiple Access (TDMA)

server

network computer dedicated to common functions that the client computers on the network need

The term ________ refers to the advantages conferred as an auction site becomes larger in terms of visitors and products for sale.

network effects

value web

networked trans-business system that coordinates the value chains of several firms

Which form of testing compares a control page with one that is very different?

new concept test

Third generation (3G) cellular network

new generation of cellular phone standards that can connect users to the Web at 2.4 Mbps

Bluetooth

new technology standard for short-range wireless communication under 100 meters

Which social network functionality allows users to view a list of updates from friends as well as advertisements and notifications in chronological order?

newsfeed

GPRS (General Packet Radio Services)

next generation technology carries data in packets, just like the Internet, but over radio frwquencies that make wireless communication possible

unfair competitve advantage

occurs when one firm develops an advantage based on a factor that other firms cannot purchase

network effect

occurs where users receive value from the fact everyone else uses the same tool or product

portal

offers users powerful Web search tolls as well as an integrated package of content and services all in one place

B2C e-commerce

online businesses selling to individual consumers

B2B e-commerce

online businesses selling to other businesses

e-tailer

online retail store

Web 2.0

online social networks - services that support communication among networks of friends and peers - blogs - really simple syndication - allows to have digital content automatically send to their computers over the internet - podcasting -wikis -music and video services - VOIP - IPTV - video conferencing and telepresence

broadband

refers to any communications technology that permits clients to play streaming audio and video files at acceptable speeds-generally anything above 100 Kbps

market opportunity

refers to the company's intended marketspace and the overall potential financial opportunities available to the firm in that marketspace

industry structure

refers to the nature of the players in an industry and their relative bargaining power

competitive environment

refers to the other companies operating in the same marketspace selling similar products

All of the following are steps one can take to right-size a website's hardware platform and meet demands for service except:

replacing static pages with dynamically generated pages.

complimentary resources

resources and assets not directly involved in the production of the product but required for success, such as marketing, management, financial assets, reputation

Internet Layer

responsible for addressing, packing, and routing messages on the Internet

Network Interface Layer

responsible for placing packets on and receiving them from the network medium

Transport Layer

responsible for providing communication with the application by acknowledging and sequencing the packets to and from the application

A firm's ________ describes how a firm will produce a return on invested capital.

revenue model

Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text?

richness

Which of the following refers to the complexity and content of a message?

richness

What is the primary revenue model for an e-distributor?

sales

Portals primarily generate revenue in all of the following ways except:

sales of goods

All of the following are simple steps for optimizing web page content that can reduce response times except:

segmenting computer servers to perform dedicated functions.

Which of the following represent Amazon's primary value proposition(s)?

selection and convenience

All of the following are solutions to the problem of high monitoring costs except:

seller rating systems.

Which of the following involves a concern that one will never know how much the ultimate winner might have paid, or the true value to the final winner?

seller's lament

B2B service provider

sells business services to other firms

HyperText Transfer Protocol (HTTP)

the Internet protocol used for transferring Web pages

Simple Mail Transfer Protocol

the Internet protocol used to send mail to a server

Uniform Resource Locator (URL)

the address used by a Web browser to identify the location of content on the Web

marketspace

the area of actual or potential commercial value in which a company intends to operate

All of the following are major social trends in e-commerce in 2016-2017 except for:

the refusal of online retailers to accept taxation of Internet sales.

The term stateless refers to the fact that:

the server does not have to maintain an ongoing dedicated interaction with the client computer.

firm value chain

the set of activities a firm engages in to create final products from raw inputs

value chain

the set of activities performed in an industry or in a firm that transforms raw inputs into final products and services

universal computing

the sharing of files, information, graphics, sound, video, and other object across all computer platforms in thw rolds, regardless of operating systems

photonics

the study of communicating with light waves

personalization

the targeting of marketing messages to specific individuals by adjusting the message to a person's name, interests, and past purchases

barriers to entry

the total cost of entering a new marketplace

reach

the total number of users or customers an e-commerce business can obtain

narrowband

the traditional telephone modem connection, now operating at 56.6 Kbps

e-commerce

the use of the Internet and the Web to transact business. More formally, digitally enabled commercial transactions between and among organizations and individuals

E-commerce can be defined as

the use of the Internet, the Web, and mobile apps to transact business

Which of the following is not a major business trend in e-commerce in 2016-2017?

the weakening revenues of B2B e-commerce

A perfect market is one in which

there are no competitive advantages or asymmetries

mobile commerce

use of wireless digital devices to enable transactions on the web

Which element of the business model addresses what a firm provides that other firms cannot?

value proposition

A ________ is a networked business ecosystem that coordinates a firm's suppliers, distributors, and delivery firms with its own production needs using an Internet-based supply chain management system.

value web

Which type of investor typically becomes interested in a start-up company after it has begun generating revenue?

venture capital investors

A ________ marketplace supplies products and services of interest to particular industries.

vertical

IP Address: IP version 4

32 bit number can handle up to 4 billion addresses four sets of integer numbers marked off by periods 201.61.186.227 Class C address: Network identified by first three sets, computer identified by last set

Internet 2 Project

350+ institutions collaborate to facilitate revolutionary Internet technologies Goals is to create leading edge very high speed network for national research communication Enable revolutionary Internet applications

Hourglass Model of the Internet

4 layers that looks like a hourglass Applications layer is growing most

The size of the B2B market in 2017 was estimated at

6.7 trillion

In 2015, which age group has the fastest growing rate of Facebook usage?

64 and older

When using multivariate testing, if you wish to test two different versions of an image, a button, and a piece of text, how many combinations will you need to test?

8

Around what percentage of Internet users in the United States use social networks on a regular basis?

85%

In 2016, almost ________ of Americans who access the Internet use a mobile device at least some of the time.

93%

Catalog

A revenue model where the seller establishes a brand image, and then uses the strength of that image to sell through printed information mailed to prospective buyers, who place orders by mail or telephone is called the _____ model.

Security Policy

A set of statements prioritizing the information risks, identifying acceptable risk targets, and identifying the mechanisms for achieving these targets

Bill presentment

A(n) _____ service provides an electronic version of an invoice with all of the details that would appear in the printed document.

Threatening negative feedback in return for a benefit is an example of: A) feedback extortion. B) offensive shill feedback. C) defensive shill feedback. D) sending spam.

A) feedback extortion

Hash Function

An algorithm that produces a fixed-length number called a hash or message digest

Digital Cash

An alternative payment system in which unique, authenticated tokens represent cash value

Paywall

An approach where free content is available up to a point at which fees begin, is called a _____.

Risk Assessment

An assessment of the risks and points of vulnerability

Hacker

An individual who intends to gain unauthorized access to a computer system

False

An organization's Web presence is of lesser importance than its presence in the physical world.

The leading web server software is:

Apache.

Trojan Horse

Appears o be benign, but then does something other than expected. Often a way for viruses or other malicious code to be introduced into a computer system

Man-in-the-middle Attack (MitM)

Attack in which the attacker is able to intercept communications between two parties who believe they are directly communication with one another, when in fact the attacker is controlling the communications

Pharming

Automatically redirecting a Web link to an address different from the intended one, with the site masquerading as the intended destination

D) consumers look at native ads much more frequently than display ads

B) native advertising is a new form advertising found only online

Internet Network Architecture

Backbone: high bandwidth fiber optic cable networks Private Networks owned by a variety of NSP Bandwidth 155 Mbps - 2.5 Gbps (bits)

Which of the following was not able to successfully implement a freemium business model?

Baremetrics

Ruby on Rails is based on which of the following philosophies?

CoC

Exploit Kit

Collection of exploits bundled together and rented or sold as a commercial product

Which of the following is not a major technology trend in e-commerce in 2016-2017?

Computing and networking component prices increase dramatically.

IP Address: IP version 6

128 bit, able to handle 1 quadrillion address

Internet Phase 1 - Innovation Phase

1964-1974 - building blocks

Telephone based wireless Internet

3 G: GSM & CDMA

Pinterest visitors spend ________ a month on Facebook.

6.5 minutes

Adware

A PUP that serves pop-up ads to your computer

Merchant Account

A bank account that allows companies to process credit card payments and receive funds from those transactions

Secure Negotiated Session

A client-server session in which the URL of the requested document, along with the contents, contents of forms, and the cookies exchanged, are encrypted

Virus

A computer program that has the ability to replicate or make copies of itself, and spread to other files

Digital Certificate

A digital document issued by a certification authority that contains a variety of identifying information

False

A disadvantage of the Web catalog revenue model is that the products sold in physical stores cannot be sold on the web.

True

A good Web site design can provide many image-creation and image-enhancing features very effectively - it can serve as a sales brochure, a product showroom, a financial report, and employment ad, and a customer contact point.

Information dissemination

A key goal for the Web sites of many not-for-profit organizations is _____.

E-Commerce

A methodology of modern business which addresses the need of business organizations, vendors, and customers to reduce cost and improve the quality of goods and services while increasing the speed of delivery

Browser Parasite

A program that can monitor and change the settings of a user's browser

Spyware

A program used to obtain information such as a user's keystrokes, e-mail, instant messages, and so on

Near Field Communication (NFC)

A set of short-range wireless technologies used to share information among devices

Digital Envelope

A technique that uses symmetric encryption for large documents, but public key cryptography to encrypt and send the symmetric key

Certification Authority (CA)

A trusted third party that issues digital certificates

Sniffer

A type of eavesdropping program that monitors information traveling over a network

Session Key

A unique symmetric encryption key chosen for a single secure session

Pretty Good Privacy (PGP)

A widely used e-mail public key encryption software program

One of the first online virtual communities was: A) The Well B) Myspace C) AOL D) Salon.com

A) The Well

The fact that participating in an Internet auction means that you will need to purchase a computer, learn to use it, and pay for Internet access, is an example of ____________ costs. A) equipment B) fulfillment C) delayed consumption D) monitoring

A) equipment

One partial solution to high monitoring costs is ________ pricing. A) fixed B) dynamic C) allocated D) distress

A) fixed

A website designed to give horse enthusiasts a common discussion area would be classified as a(n): A) interest-based social network B) affinity community C) practice network D) sponsored community

A) interest-based social network

Acquisition rate is a measure of the:

A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages

A(n) ________ offers members focused discussion groups, help, information, and knowledge related to an area of shared practice. A) practice network B) general community C) affinity community D) interest-based social network

A) practice network

D) behavioral

A) query-driven

All of the following are solutions to the problem of high monitoring costs except: A) seller rating systems. B) watch lists. C) proxy bidding. D) fixed pricing.

A) seller rating systems

D) click fraud

A) social search

D) versioning

A) the Law of One Price

E-mailing buyers to warn them away from a seller is a type of auction fraud known as ________. A) transaction interference B) bid siphoning C) bid rigging D) shill bidding

A) transaction interference

A template test is a form of which type of testing?

A/B testing

False

Advertisers pay less to have their ad appear near a discussion of a technology related to their product or on a page that reviews the product.

Which of the following is an example of an on-demand service company?

Airbnb

False

All electronic commerce initiatives have the goal of providing revenue.

Virtual Private Network (VPN)

Allows remote users to securely access internal networks via the Internet, using the Point-to-Point Tunneling Protocol (PPTP)

Spam (junk) Web Sites

Also referred to as link farms; promise to offer products or services, but in fact are just collections of advertisements

True

Although online banks let customers pay their bills electronically, most customers still receive their bills in the mail.

All of the following use a social network marketing strategy except:

Amazon

Which of the following is not considered a portal

Amazon

______ is an example of e-business

Amazon's inventory control system

All of the following use an advertising revenue model except:

Amazon.

All of the following types of auctions generally involve single units except: A) English auction. B) Dutch Internet. C) Name Your Own Price auction. D) penny auction.

B) Dutch Internet

D) profiling

B) Hadoop

______________ is the second leading social network in the United States in terms of monthly unique visitors. A) Twitter B) LinkedIn C) Instagram D) Pinterest

B) LinkedIn

Each of the following is a top six social network site in the United States except: A) Tumblr B) Myspace C) Instagram D) Pinterest

B) Myspace

Which of the following early leaders in social networking has been reinvented as a music-oriented social network? A) Vevo B) Myspace C) Polyvore D) Tumblr

B) Myspace

Which of the following types of auctions "shields the brand" of the seller? A) English auction B) Name Your Own Price auction C) Dutch auction D) penny auction

B) Name Your Own Price auction

Conversion rate is a measure of the:

B) Percentage of visitors who become customers

________ allows the consumer to enter a maximum price and the auction software automatically places incremental bids up to that maximum price as their original bid is surpassed. A) A watch list B) Proxy bidding C) Sealed bidding D) Price matching

B) Proxy bidding

D) The law applies to email, texts, and social media messaging

B) The law has no impact on companies located within the United States

Which of the following statements illustrates the network effects that portals are subject to? A) Specialized vertical market portals attract only a small percentage of the audience, while a few large megaportals garner most of the market. B) The value of the portal to advertisers and consumers increases geometrically as reach increases. C) The greater the amount of content provided by a portal, the greater its value to the community. D) The greater number of portals available, the greater the potential audience for each.

B) The value of the portal to advertisers and consumers increases geometrically as reach increases.

When sellers agree informally or formally to set floor prices below which they will not sell on auction items, this is known as: A) discriminatory pricing. B) price matching. C) bid rigging. D) distress pricing.

B) price matching

D) entertainment

B) retail

Which of the following measures the average length of stay at a website?

B) stickiness

When did the first online communities form? A) the 1970s B) the 1980s C) the 1990s D) the 2000s

B) the 1980s

D) the Internet has expanded the information intensity of the marketplace

B) the Internet has decreased the impact of brands

D) the more cookies are deleted, the less accurate ad server metrics become

B) the data typically stored in cookies includes a unique ID and email address

D) Free products and services can help build market awareness.

B) the free pricing strategy was born in the early days of the Web

D) reach

B) unique visitors

D) lead generation marketing

B) viral marketing

Howard Rheingold, one of The Well's early participants, coined the term ____________, to refer to "cultural aggregations that emerge when enough people bump into each other often enough in cyberspace." A) social networks B) virtual communities C) community portals D) social forums

B) virtual communities

Which of the following is not a community provider?

Blue Nile

Which of the following is not an example of the bricks-and-clicks e-tailing business model?

Bluefly

Business Models for E-Commerce

Business-to-Business Business-to-Consumer Consumer-to-Business Business-to-Government Government-to-Business Government-to-Citizen

False

Business-to-business sellers are passive adopters of the Web catalog model.

Which of the following is the most meaningful metric for video ads?

C) Completion rate

Which of the following types of auctions is most often associated with sellers that have many identical items to sell? A) English auctions B) Name Your Own Price auctions C) Dutch Internet auctions D) group buying auctions

C) Dutch Internet auctions

A(n) ________, in which the highest bidder wins, is the most common form of auction. A) Dutch Internet auction B) Japanese auction C) English auction D) reverse auction

C) English auction

________ is the tendency to gravitate toward, and bid for, auction listings with one or more existing bids. A) Group buying B) Winner's regret C) Herd behavior D) Bid rigging

C) Herd behavior

D) Graph Search

C) Hummingbird

D) It enables worldwide customer service and marketing communications.

C) It allows video, audio, and text to be integrated into a single marketing message and consuming experience.

In 2015, Fortune 500 companies used _____________ more than Facebook. A) no other social networks B) Tumblr C) LinkedIn D) Pinterest

C) LinkedIn

On which of the following do users spend the least amount of time per month? A) Snapchat B) Tumblr C) LinkedIn D) Pinterest

C) LinkedIn

____________ was an early investor in Facebook. A) Google B) Apple C) Microsoft D) LinkedIn

C) Micosoft

_____________ recently acquired LinkedIn. A) Facebook B) Google C) Microsoft D) Verizon

C) Microsoft

D) Knowledge Graph

C) Panda

Facebook owns _______________. A) Pinterest B) Snapchat C) WhatsApp D) Tumblr

C) WhatsApp

D) lead generation marketing

C) affiliate marketing

Which of the following is a community of members who self-identify with a demographic or geographic category? A) practice network B) sponsored community C) affinity community D) interest-based social network

C) affinity community

Healthboards is an example of a(n) ___________ social network. A) practice-based B) interest-based C) affinity-based D) general

C) affinity-based

Which of the following is not one of the three defining characteristics of a portal? A) commerce B) content C) auctions D) navigation of the Web

C) auctions

Which of the following measures the percentage of emails that could not be delivered?

C) bounce-back rate

Which of the following measures the ratio of items purchased to product views?

C) browse-to-by ratio

All of the following are benefits of auctions except: A) more efficient price discovery. B) lower transaction costs. C) decreased price transparency. D) increased market efficiency.

C) decreased price transparency

Instagram is an example of a(n): A) interest-based social network B) affinity community/social network C) general community D) practice network

C) general community

D) product evaluation skills of the consumer

C) knowledge consumers have about how to conduct online transactions

Which of the following is not one of the top factors a business should consider when planning an Internet auction? A) type of product B) type of auction C) location of auction D) bid increments

C) location of auction

D) fixed cost

C) marginal cost

The term ________ refer(s) to the advantages conferred as an auction site becomes larger in terms of visitors and products for sale. A) siphoning B) herd behavior C) network effects D) channel expansion

C) network effects

Which social network functionality allows users to view a list of updates from friends as well as advertisements and notification in chronological order? A) message board B) timeline C) newsfeed D) friends' network

C) newsfeed

D) number of pages viewed

C) number of HTTP requests

__________ of procurement officers use auctions to purchase goods. A) Eighty per cent (80%) B) Less than a quarter C) Over one third D) Twenty-five per cent (25%)

C) over one third

Which of the following is not a risk or cost of Internet auctions? A) delayed consumption costs B) equipment costs C) price transparency D) trust risks

C) price transparency

D) keyword advertising

C) programmatic advertising

Which of the following involves a concern that one will never know how much the ultimate winner might have paid, or the true value to the final winner? A) herd behavior B) winner's regret C) seller's lament D) loser's lament

C) seller's lament

________ refers to the use of secondary user IDs or bidders who have no actual intention to buy to artificially raise the price of an item. A) Bid manipulation B) Shill feedback C) Shill bidding D) Bid rigging

C) shill bidding

D) sponsorship marketing

C) social marketing

D) freemium

C) surge pricing

A ________ permits the consumer to monitor specific auctions of interest, requiring the consumer to pay close attention only in the last few minutes of bidding. A) bidding fee auction B) channel manager C) watch list D) rating system

C) watch list

Public Key Infrastructure (PKI)

CAs and digital certificate procedures hat are accepted by all parties

________ provides a set of standards for communicating between a browser and a program running on a server that allows for interaction between the user and server.

CGI

Which of the following technologies is used to separate the design and presentation of content from the content creation process?

CMS

Cannibalization

Channel conflict is also referred to as _____.

Botnet

Collection of captured bot computers

True

Companies can adapt their catalog revenue model online by replacing or supplementing their print catalogs with information on their Web sites.

True

Companies change their revenue models to meet the needs of the new changing Web users.

True

Companies that have existing sales outlets and distribution networks often worry that their Web sites will take away sales from those outlets and networks.

Fee-for-service

Companies using _____ revenue model charge a fee based on the value of the service provided on the Web.

True

Companies using a digital content revenue model sell rights to access the information they own.

Cloud Computing

Computing power and software over the internet (Google Apps) Fastest growing form of computing Radically reduces cost of building and operating web sites, infrastructure, IT support, hardware and software

Which of the following is an example of C2C e-commerce?

Craigslist

Hacktivism

Cybervandalism and data theft for political purposes

D) 30-day

D) 30-day

In 2015, which age group has the fastest growing rate of Facebook usage? A) 12-34 B) 35-45 C) 46-65 D) Adults over 65

D) Adults over 65

_______________ is an example of a practice network? A) PredictWallstreet B) Instagram C) Debater D) Doximity

D) Doximity

Yahoo owns all of the following except: A) Tumblr. B) Flickr. C) Aviate. D) Instagram.

D) Instagram

Priceline is an example of a(n): A) English auction. B) Dutch auction. C) penny auction. D) Name Your Own Price auction

D) Name Your Own Price auction

D) Search engine advertising is the fastest growing type of online advertising.

D) Search engine advertising is the fasted growing type of online advertising.

Facebook was the leader in U.S. ad spending revenues on social networks in 2016. What company earned the second most amount of ad spending revenue? A) Snapchat B) LinkedIn C) Pinterest D) Twitter

D) Twitter

________ has tentatively agreed to purchase Yahoo. A) AT&T B) Microsoft C) AOL D) Verizon

D) Verizon

________ refers to the feeling that one has paid too high a price for an item won at auction. A) Seller's lament B) Winner's lament C) Loser's regret D) Winner's regret

D) Winner's regret

D) a tiny graphics file embedded in an email or web page

D) a tiny graphics file embedded in an email or web page

The technology used by early communities was limited to mostly: A) instant messaging B) FTP C) email D) bulletin boards

D) bulletin boards

D) conversation

D) conversation

D) email

D) email

The amount of time visitors spend on a site is a measure of ________. A) reach B) loyalty C) conversation D) engagement

D) engagement

ESPN.com is an example of a: A) general purpose portal. B) vertical market portal based on affinity group. C) vertical market portal based on focused content. D) focused content portal.

D) focused content portal

D) native advertising that is displayed on a social media site

D) native advertising that is displayed on a social media site

D) online retailers

D) online retailers

Which of the following is not one of the typical portal revenue sources? A) commissions on sales B) subscription fees C) tenancy deals D) referral fees

D) referral fees

D) rich media

D) rich media

D) targeted banner ads

D) targeted banner ads

D) universal standards

D) universal standards

D) versioning

D) versioning

The profit a seller makes at auction is a function of all of the following except: A) initial pricing B) auction length. C) the number of units for auction. D) watch lists

D) watch lists

D) yield management

D) yield managment

PDI-DSS (Payment Card Industry-Data Security Standards)

Data security standards instituted by the five major credit card companies

Improved Sales

Dependencies to buy a products reduce at large and sales increases

Authorization Policies

Determine differing levels of access to information assets for differing levels of users

Access Controls

Determine who can gain legitimate access to a network

Data Encryption Standard (DES)

Developed by the National Security Agency (NSA) and IBM. Uses a 56-bit encryption key

US-CERT

Division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses across government and private sectors

Which of the following types of auctions is perfect for sellers that have many identical items to sell?

Dutch Internet auctions

All of the following types of auctions involve single units except:

Dutch Internet.

Which of the following companies use a transaction fee revenue model?

E*Trade

24x7 Service Availability

E-Commerce automates business of enterprises and services provided by them to customers are available anytime, anywhere

Non-Cash Payment

E-Commerce enables use of credit cards, debit cards, smart cards, electronic fund transfer via bank's website and other modes of electronics payment

Advertising / Marketing

E-Commerce increases the reach of advertising of products and services of businesses

Support

E-Commerce provides various ways to provide pre sales and post sales assistance to provide better services to customers

Communication Improvement

E-Commerce provides ways for faster, efficient, reliable communication with customers and partners

________ create and sell access to digital markets.

E-procurement firms

All of the following would be considered a direct competitor of Priceline except

ESPN

Which of the following statements is not true?

Economists take a purely technical approach to e-commerce.

Security Organization

Educates and trains users, keeps management aware of security threats and breakdowns, and maintains the tools chosen to implement security

EDI

Electronic Data Interchange

False

Electronic books are rapidly replacing physical books.

E-Commerce

Electronics Commerce

A(n) ________, in which the highest bidder wins, is the most common form of auction.

English auction

Authorization Management System

Establishes where and when a user is permitted to access certain parts of a Web site

Intrusion Detection System (IDS)

Examines network traffic, watching to see if it matches certain patterns or preconfigured rules indicative of an attack

Social Engineering

Exploitation of human fallibility and gullibility to distribute malware

Which of the following is an example of social e-commerce?

Facebook

Backdoor

Feature of viruses, worms, and Trojans that allows attacker to remotely access a compromised computer

Most significant private initiatives

Fiber optics and Mobile wireless internet services

Heartbleed Bug

Flaw in OpenSSL encryption system that allowed hackers to decrypt an SSL session and discover user names, passwords, and other user data

Denial of Service Attack (DoS)

Flooding a Web site with useless traffic to inundate and overwhelm the network

Electronic Billing Presentment and Payment System (EBPP)

Form of online payment system for monthly bills

Extranet

Formed when firms permit outsiders to access their internal TCP/IP networks

Which of the following is an example of B2B e-commerce?

Go2Paper

Which of the following cannot be used to retrieve objects from a database?

HTML

Internet Protocols

HTTP Email: SMTP (typically used), POP3 (office), IMAP (enables access to email on server) FTP: transport files over internet Telnet: enable communication SSL/ TLS - secure communication

TCP/IP Protocol Suite:

HTTP: Hyper Text Transfer Telnet: Communicating for remote access FTP: File Transfer Protocol SMTP: Simple Mail Transfer

Black Hats

Hackers who act with the intention of causing harm

Grey Hats

Hackers who believe they are pursuing some greater good by breaking in and revealing system flaws

Intrusion Prevention System (IPS)

Has all the functionality of an IDS, with the additional ability to take steps to prevent and block suspicious activities

________ is the tendency to gravitate toward, and bid for, auction listings with one or more existing bids.

Herd behavior

WiMax

High speed, medium range broadband wireless metropolitan area network

HTML

Hypertext Markup Langauge - most used for websites HTML5 is newest version

Who Governs the Internet

IAB ICANN IESG IETF ISOC W3C ITU

domain name

IP address expressed in natural language

Domain name

IP addresses expressed in natual language 1 IP number can have multiple domain names

The laws of the state

Identify the force preventing U.S. professionals from extending their practices on the Web.

Search Engines

Identify webpage that match queries based on keywords, page ranking Also serve as shopping tools most common internet activity

Which of the following statements about Foursquare is not true?

In 2016, Foursquare decided to refocus its effort on developing a subscription-based revenue model.

Mass media

In the _____ approach, firms prepare advertising and promotional materials about the firm and its products or services and broadcast them to potential customers.

Flexibility

In the context of accessibility, one of the best ways to accommodate a broad range of visitor needs is to build _____ into the Web site's interface.

Cope Today

In the context of professional services using a fee-for-service revenue model, _____ was a pioneer in offering online therapy to patients in the United States.

False

In the fee-for-service model, the fee is based on the number or size of transactions the service providers process.

Authentication Procedures

Include the use of digital signatures, certificates of authority, and public key infrastructure

Yahoo owns all of the following except:

Instagram.

Cybervandalism

Intentionally disrupting, defacing, or even destroying a site

2.5G network

Interim cellular network that provides speeds of 60-144 Kbps using General Packet Radio Switching

IXP

Internet X-change points: hubs where backbone interests with regional and local networks and backbone owners connect with one another

IP

Internet protocol - language in which networks communicate

Spoofing

Involves attempting to hide a true identity by using someone else's e-mail or IP address

Electronic Bulletin Boards

It is the electronic transfer of money from one bank account to another, either within a single financial institution or across multiple institutions, via computer-based systems, without the direct intervention of the bank staff

CANs

LANs operating within a single organization that leases Internet access directly from regional or national carrier

Future Internet

Latency solutions - differentiated quality of service - Guaranteeing service levels and lower error rates -declining cost - Internet of Things - objects connected via sensors / RFID to internet

An example of a practice network is:

Linux.org.

________ typically include a data flow diagram to describe the flow of information for an e-commerce site.

Logical designs

True

Many classified advertising sites generate substantial revenue, replacing newspapers' historical role as the primary carrier of classified ads.

Fitting Rooms

Many clothing Web sites offer virtual models on which customers can try clothes, such services are referred to as virtual _____.

Electronic Email

Method of exchanging messages between people using electronics

Which of the following companies was an early investor in Facebook?

Microsoft

CERT Coordination Center

Monitors and tracks online criminal activity reported to it by private corporations and government agencies that seek out its help

True

Most successful advertising on the Web is targeted at specific groups.

Streaming Media

Music, video, other large files sent to users in chunks so that when received and played, file comes through uninterrupted

Which of the following is an example of the affiliate revenue model?

MyPoints

Which of the following early leaders in social networking has been reinvented as a music-oriented social network?

Myspace

Which of the following types of auctions "shields the brand" of the seller?

Name Your Own Price auction

Priceline is an example of a(n):

Name Your Own Price auction.

Cons of Cloud Computing

Need internet all the time that is reliable Sensitive information is stored somewhere out there

Four TCP/IP layers

Network interface layer Internet layer Transport layer Application layer

Internet

Network of networks, links businesses, educational institutions, gov agencies, and individuals

Which of the following has the highest penetration of social network usage among the general population?

North America

Data Breach

Occurs when an organization loses control over its information to outsiders

Fee-for-transaction

Online stock brokerage firms use a(n) _____ revenue model, which allows them to charge their customers a commission for each trade executed.

Improved Sales

Orders for the products can be generated anytime, anywhere without any human intervention

Packet Switching Process

Original text message --> digitized into bits --> broken into packets --> header info added to each packet indicating destination, and other control information such as how many bits are in the total message and how many packets

Which of the following statements is not true?

Overall transaction costs have dropped dramatically.

Which of the following is the most commonly used server-side scripting language?

PHP

False

People spend less time at a sticky Web site and are thus, exposed to very little advertising.

Online Stored Value Payment System

Permits consumers to make instant, online payments to merchants and other individuals based on value stored in an online account

Communication modes

Personal contact and mass media approaches are often called _____.

Security Token

Physical device or software that generates an identifier that can be used in addition to or in place of a password

Utility Programs

Ping: Tracert: how packet traveled

Potentially Unwanted Program (PUP)

Program that installs itself on a computer, typically without the user's informed consent

IP - Internet Protocol

Provides Internet's addressing scheme

False

Publishers do not experience sales losses as a result of online distribution.

Django is based on which of the following?

Python

Firewall

Refers to either hardware or software that filters communication packets and prevents some packets from entering the network based on a security policy

EDI

Replaces postal mail, fax, and email

Inventory Management

Reports get generated instantly when required

An example of a company using the content provider model is

Rhapsody

Which of the following is an example of the subscription revenue model?

Scribd

________ is used to process certificates and private/public key information.

Secure Sockets Layer/Transport Layer Security

Routing Internet Messages: TCP/IP and Packet Switching

Sending prepares address, TCP/IP breaks data into packets, packets travel router to router, reassembled at destination point

______ refers to the use of secondary user IDs or bidders who have no actual intention to buy to artificially raise the price of an item.

Shill bidding

Each of the following is one of the top six social network sites in the United States except:

Snapchat.

________ technologies are technologies that enable the incremental improvement of products and services.

Sustaining

________ are the types of information systems capabilities needed to meet business objectives.

System functionalities

Intranet

TCP/IP network located within a single organization for communications and processing (protected from being access from external)

SQL Injection Attack

Takes advantage of poorly coded Web application software that fails to properly validate or filter data entered by a user on a Web page

Cipher Text

Text that has been encrypted and thus cannot be read by anyone other than the sender and the receiver

True

The Internet is not a mass medium, even though a large number of people now use it and many companies seem to view their Web sites as billboards or broadcasts.

Advertising-subscription mixed

The New York Times and The Wall Street Journal use the _____ revenue model.

Which of the following was the original "killer app" that made the Internet commercially interesting and extraordinarily popular?

The Web

Which of the following statements about the Web is not true?

The Web is the technology upon which the Internet is based.

True

The Web provides a way for technical content developers to reach retail customers.

One of the first online virtual communities was:

The Well.

Personal Shopper

The _____ is an intelligent agent program that learns the customer's preferences and makes suggestions.

Integrity

The ability to ensure that information being displayed on a Web site or transmitted or received over the Internet has not been altered in any way by an unauthorized party

Confidentiality

The ability to ensure that messages and data are available only to those who are authorized to view them

Authenticity

The ability to identify the identify of a person or entity with whom you are dealing on the Internet

Implementation Plan

The action steps you will take to achieve the security plan goals

True

The advertising-support revenue model is the one used by broadcast network television in the United States.

True

The defining characteristic of the mass media promotion process is that the seller is active and the buyer is passive

Reintermediation

The introduction of a new intermediary, such as a fee-for-transaction Web site, into a value chain is called _____.

Which of the following statements is true about the traditional tradeoff between the richness and reach of a marketing message prior to the development of the Web?

The larger the audience reached, the less rich the message.

Which of the following is not true regarding e-commerce today?

The market middlemen disappeared.

Advanced Encryption Standard (AES)

The most widely used symmetric key algorithm offering 128-, 192-, and 256-bit keys

Which of the following best describes the early years of e-commerce?

They were a technological success but a mixed business success

Which of the following is not an element of friction-free commerce?

Transaction costs are high.

TCP

Transmission Control Protocol - establishes connection among sending and receiving Web computers Handles assembly of packets at point of transmission and reassembly at receiving

Facebook was the leader in U.S. ad spending revenues on social networks in 2015. What company earned the second most amount of ad spending revenue?

Twitter

In 2015, Fortune 500 companies used ________ more than Facebook.

Twitter

Which of the following is the second leading social network in the United States in terms of number of members?

Twitter

Public Key Cryptography

Two mathematically related digital keys are used: a public key and a private key. The private key is kept secret by the owner, and the public key is widely disseminated. Both keys can be used to encrypt and decrypt a message. However, once the keys are used to encrypt a message, that same key cannot by used to unencrypt the message

Ben Shneiderman

Two pioneers of usability testing are _____ and Jakob Nielsen.

Paperless

Type of exchange of business information in E-Commerce

Bot

Type of malicious code that can be covertly installed on a computer when connected to the Internet. Once installed, the bot responds to external commands sent by the attacker

Virtual Currency

Typically circulates within an internal virtual world community or is issued by a specific corporate entity, and used to purchase virtual goods

Which of the following is not true about the use of apps?

Users still spend less time using apps than they do using desktops or mobile websites.

Distributed Denial of Service Attack (DDoS)

Using numerous computers to attack the target network from numerous launch points

Which of the following is a leading social network in Russia?

VK

________ and ________ are typically the most easily identifiable aspects of a company's business model.

Value proposition, revenue model

False

Web catalog retailers typically refrain from having return policies on unused merchandise.

False

Web companies with unprofitable growth phases for long durations retained their revenue models to grow successfully.

______ is not an open source software tool.

WebSphere

Facebook purchased which of the following for $22 billion?

WhatsApp

True

When customers buy a product, they are also buying the service element included with that product.

_______ refers to the feeling that one has paid too high a price for an item won at auction.

Winner's regret

affiliate revenue model

a company steers business to an affiliate and receives a referral fee or percentage of the revenues from any resulting sales

application services provider (ASP)

a company that sells access to Internet-based software applications to other companies

competitive advantage

achieved by a firm when it can produce a superior product a superior product and/or bring the product to market at a lower price than most, or all, of its competitors

All of the following are methods of improving the processing architecture of a website except:

adding web servers.

All of the following are important factors in search engine optimization except:

adhering to privacy policies.

NaturallyCurly is an example of a(n):

affinity community.

T1

an international teleport standards for digital communication that offers guaranteed delivery at 1.54 Mbps

T3

an international teleport standards for digital communication that offers guaranteed delivery at 45 Mbps

A wealthy individual who invests personal funds in a start-up in exchange for an equity share in the business is referred to as a(n) ________.

angel investor

ubiquity

available just about everywhere, at all times

Which of the following describes the basic web policy of large firms during the Invention period?

basic, static website depicting firm's brand

AOL is focusing its strategy on all of the following except:

being an ISP.

The process of comparing a website with that of its competitors in terms of response speed, quality of layout, and design is known as:

benchmarking.

Which of the following involves e-mailing another seller's bidders and offering the same product for less?

bid siphoning

Which of the following is a characteristic of the Consolidation phase of e-commerce?

brand extension and strengthening becomes more important than creating new brands

Which of the following is an unfair competitive advantage?

brand name

market creator

builds a digital environment where buyers and sellers can meet, display products, search for products, and establish a price for products

The technology used by early online communities was limited to mostly:

bulletin boards.

Big Band

can accommodate

Advantages of dynamic page generation include all of the following except:

client-side execution of programming

Pathping

combines the functionality offered by Ping and Tracert

Which element of the business model refers to the presence of substitute products in the market?

competitive environment

routing algorithm

computer program that ensures that packets take the best available path toward their destination

Last Mile

connection from user's device to internet 2 basic types of wireless - telephone - computer network based

fiber-optic cable

consists of up to hundreds of strands of glass or plastic that use light to transmit data

Offline media is typically used for all of the following marketing activities except:

conversation

The primary way a website personalizes the content presented to a visitor is through the use of:

cookies

e-procurement firm

creates and sells acces to digital electronic markets

All of the following are basic information requirements for a product database except

customer ID numbers.

value proposition

defines how a company's product or serive fulfills the needs of customers

Which of the following terms is synonymous with e-commerce?

digital commerce

private indistrial network

digital network designed to coordinate the flow of communictions among firms engaged in business together

Over the past decade, the number of exchanges has:

diminished sharply.

Which of the following is a characteristic of e-commerce during the Invention period

disintermediation

Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers?

disintermediation

disintermediation

displacement of market middlmen who trasitionally are intermediaries between producers and consumers by a new direct relationship between manufacturers and content originators with their costomer

Amazon is an example of which of the following business models?

e-distributor

The business model of e-tailers is similar to that of

e-distributors

Which of the following may offer its customers value chain management software?

e-procurement companies

Which of the following is the market leader in C2C auctions?

eBay

Which of the following is an example of an e-commerce first mover that failed?

eToys

scale economics

efficiencies that arise from increasing the size of a business

Features on which foundations of e-commerce are built

email instant messaging search engines online chat streaming media cookies

management team

employees of the company responsible for making the business model work

If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:

enable individual customization of the product by consumers.

TCP/IP

enable services similar to telephone

Web server software

enables a computer to deliver web pages to clients on network, responds to request by sending HTTP request

The amount of time visitors spend on a site is a measure of ________.

engagement

The fact that participating in an Internet auction means that you will need to purchase a computer, learn to use it, and pay for Internet access, is an example of ________ costs.

equipment

asymmetry

exists whenever one participant in a market has more resources than other participants

Which of the following is a characteristic of the Reinvention phase of e-commerce?

expansion of e-commerce to include services as well as goods

All of the following were visions expressed during the early years of e-commerce except

fast follower advantage

Threatening negative feedback in return for a benefit is an example of:

feedback extortion.

All of the following may lead to a competitive advantage except:

fewer products

Which of the following is not a main factor in determining the overall demand on an e-commerce site?

file sizes of web pages being served

Which of the following is not a primary activity in a firm value chain?

finance/accounting

Which of the following is another name for a revenue model?

financial model

Internet Services Provider (ISP)

firm that provides the lowest level of service in the multi-tiered Internet architecture by leasing Internet access to home owners, small businesses, and some large institutions

One partial solution to high monitoring costs is ________ pricing.

fixed

A strategy designed to compete within a narrow market or product segment is called a ________ strategy.

focus

ESPN.com is an example of a:

focused content portal.

Hypertext

formatted with embedded links - links connect documents to one another

extranet

formed when firms permit outsiders to access their internal TCP/IP networks

All of the following are issues facing Pinterest except

inability to retain users

Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as

incubators

TheSeam is an example of a(n):

industry consortium.

industry consortia

industry-owned vertical marketplace that serve specific industries

Which of the following is not a unique feature of e-commerce technology?

information asymmetry

Which of the following refers to any disparity in relevant market information among parties in a transaction?

information asymmetry

Which of the following is one of the three primary societal issues related to e-commerce?

intellectual property

A Web site designed to give yachting enthusiasts a common discussion area would be classified as a(n):

interest-based social network.

First Mile

internet services that carry bulk traffic over distances older lines replaced with fiber optics

Applications layer

layer of Internet architecture that contains alient applications

Transport Services and Representation Standards layer

layer of Internet architecture that houses the TCP/IP protocol

Network Technology Substrate layer

layer of Internet technology that is composed of telecommunications networks and protocols

All of the following might be part of a website's middle-tier layer except:

legacy corporate applications

Which of the following is not a key element of an elevator pitch?

legal structure

The use of a company's competitive advantage to penetrate surrounding markets is known as ________.

leverage

Which of the following is not one of the top factors a business should consider when planning an Internet auction?

location of auction

Which of the following are the two main components of a systems design?

logical design and physical design

Ultra-wideband (UWB)

low power, short range high bandwidth network

Bluetooth

low speed, short range connection

In the ________ business model, a web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products, and establish prices.

market creator

Which of the following is not a variation of the e-tailer business model?

market creator

A ________ specifically details how you plan to find customers and sell your product.

market strategy

Which of the following is a physical place you visit to conduct business?

marketplace

CDMA (Code Division Multiple Access)

mobile communications system widely used in the United States that used in the United States that uses the full spectrum of radio frequencies and digitally encrypts each call

Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship?

mobile e-commerce

The time spent watching and reviewing auction bids is a part of ________ costs.

monitoring

Email

most used app of the internet

All of the following are website design features that annoy customers except:

multi-browser functionality.

redundancy

multiple duplicate devices and paths in a network

service provider

offers services online

Unfair competitive advantages occur when

one competitor has an advantage others cannot purchase

WWW

one of internet's most popular services, trillions of webpages

Tracert

one of several route-tracing utilities that allow you to follow the path of a message you send from your client to a remote computer on the Internet

HyperText Markup Language (HTML)

one of the next generation of GMLs that is relatively easy to use in Web page design. HTML provides Web page designers with a fixed set of markups "tags" are used to format a Web page

File Transfer Protocol (FTP)

one of the original Internet services. Part of the TCP/IP protocol that permits users to transfer files from the server to their client computer, and vice versa

MySQL is which of the following?

open source database software

Which of the following is not one of the basic business objectives for an e-commerce site?

optimize system architecture

In general, the key to becoming a successful content provider is to:

own the content being provided

Network Service Provider (NSP)

owns and controls one of the major networks comprising the Internet's backbone

All of the following are business models employed in the online music industry except

peer-to-peer streaming

Which of the following details the actual hardware components to be used in a system?

physical design

marketplace

physical space you visit in order to transact

organizational development

plan describes how the company will organize the work that needs to be accomplished

Client/Server Computing

powerful personal computers (clients) connected in network with one or more servers Offer resources: storing files software applications access to printers

A(n) ________ offers members focused discussion groups, help, information, and knowledge related to an area of shared practice.

practice network

When sellers agree informally or formally to set floor prices below which they will not sell on auction items, this is known as:

price matching.

Which of the following is not a risk or cost of Internet auctions?

price transparency

web browers

primary purpose to display web pages internet explorer: 49% of market mozilla firefox - 18% - open source browser

Really Simple Syndication (RSS)

program that allows users to have digital content, including text, articles, blogs and podcast audio files, automatically sent to their computers over the internet

Wireless markup Language (WML)

programming language for devices using WAP

TCP

protocol that establishes the connections among sending and receiving Web computers and handles the assembly of packets at the point of trasmission, and their reassembly at the receiving end

IP

protocol that provides the Internet's addressing scheme and is responsible for the actual delivery of the packets

ISP (Internet Service Providers)

provide lowest level of service to individuals, small business, and some instititions Types of Services: Narrowband Broadband

Application Layer

provides a wide variety of applications with the ability to access the services of the lower layers

Which of the following allows the consumer to enter a maximum price and the auction software automatically places incremental bids up to that maximum price as their original bid is surpassed?

proxy bidding

Which of the following types of application server monitors and controls access to a main web server and implements firewall protection?

proxy server

The total number of users or customers an e-commerce business can obtain is called:

reach

Internet Today

recently exploded without disruption

Which of the following is not one of the typical portal revenue sources?

referral fees

intellectual property

refers to all forms of human expression that can be put into a tangible medium such as text, CDs, or the Web

differentiation

refers to all the ways producers can make their products unique and different to distinguish them from those of competitors

database server

server designed to access specific information with a database

ad server

server designed to deliver targeted banner ads

mail server

server that provides e-mail messages

video server

server that serves video clips

Zigbee

short range, low power wireless network for remotely controlling digital devices

Which of the following would you use to verify that links on web pages are valid?

site management tools

transaction broker

site that processes transaction for cosumers that are normally handled in person, by phone, or mail

community provider

sites that create a digital online environment where people with similar interests can transact (buy and sell goods), communicate with like-minded people, and receive interest-related information

Cookies

small text files deposited by web site on user's computer to store information about user, accessed when user next visits web sites - can help personalize web site experience - can pose privacy threat

Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?

social media

Which of the following features of e-commerce technology allows users to participate in the creation of online content?

social technology

intelligent agent

software program that gathers and/or filters information ona specific topic and the provides a list of results for the user

Web server software

software that enables a computer to deliver Web pages written in HTML to client computers on a network that request this service by sending an HTTP request

router

special-purpose computer that interconnects the computer networks that make up the Internet and routes packets to their ultimate destination as they travel the Internet

universal standards

standards that are shared by all nations around the world

Which business strategy involves implementing a new, more efficient set of business processes that other firms cannot yet obtain?

strategy of cost competition

Domain Name System (DNS)

system for expressing numeric IP addresses in natural language

In order from beginning to end, the major steps in the SDLC are:

systems analysis/planning; systems design; building the system; testing; and implementation.

Above all, e-commerce is a ________ phenomenon

technology driven

interactivity

technology that allows for two-way communication between merchant and consumer

Midleware Services layer

the "glue" that ties the applications to the communications networks, and includes such services as security, authentication, addresses, and storage repositories

When did the first online communities form?

the 1980s

Which of the following was the first large-scale digitally enabled transaction system in the B2C arena?

the French Minitel

Which of the following is not a significant influence on a company's competitive environment?

the availability of supportive organizational structures

richness

the complexity and content of a message

Transmission Control Protocol/Internet Protocol (TCP/IP)

the core communications protocol for the Internet

Which of the following is the best definition of transaction cost?

the cost of participating in a market

All of the following are considered a precursor to e-commerce except

the development of the smartphone

profit

the difference between the price a firm is able to charge for its products and the cost of producing and distributing goods

e-business

the digital enablement of transactions and processes within a firm, involving information systems under the control of a firm

packet

the discrete units into which digital message are sliced for transmission over the Internet

Interactivity in the context of e-commerce provides which of the following functionalities?

the enabling of two-way communication between consumer and merchant

Which of the following gives a business model the most credibility with outside investors?

the firm's management team

The existence of many competitors in any one market segment may indicate

the market is saturated

World Wide Web

the most popular service that runs on the Internet; provides easy access to over 8 billion web pages

electronic mail (e-mail)

the most used application of the Internet. Uses a series of protocols to enable messages containing text, images, sound, and video clips to be transferred from one internet user to another.

market strategy

the plan you put together tha details exactly how you intend to enter a new market and attract new customers

The basic value proposition of community providers is:

they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.

Which of the following types of sites typically needs a high percentage of secure pages?

trading

The financial services, travel services, and job placement services industries typically use the ________ business model

transaction broker

E-mailing buyers to warn them away from a seller is a type of auction fraud known as ________.

transaction interference

Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders?

two-tier architecture

E-commerce is available just about everywhere and anytime. This is known as ________.

ubiquity

seven unique features of e-commerce technology

ubiquity, global reach, universal standards, richness, interactivity, information density, personalization/customization

Which of the following involves testing a site program's modules one at a time?

unit testing

Which of the following features of e-commerce technology is related to the concept of network externalities?

universal standards

P2P e-commerce

use of peer-to-peer technology, which enables Internet users to share files and computer resources directly without having to go through a central Web server, in e-commerce

Howard Rheingold, one of The Well's early participants, coined the term ________ to refer to "cultural aggregations that emerge when enough people bump into each other often enough in cyberspace."

virtual communities

A ________ permits the consumer to monitor specific auctions of interest, requiring the consumer to pay close attention only in the last few minutes of bidding.

watch list

The profit a seller makes at auction is a function of all of the following except:

watch lists.

Online forum & chat

web apps that enables internet users to communicate with each other.

Web server

web server software or physical server

Which of the following refers to the practice of researching a product online before purchasing it at a physical store?

webrooming

leverage

when a company uses its competitive advantages to achieve more advantage in surrounding markets

iMode

wireless standards that is a proprietary service of the Japanese company NTT DoCoMo

Which business application is associated with the technological development of local area networks and client/server computing?

workgroup automation

In 2016, there were more than ________ Internet hosts

1 billion

D) number of pages viewed

B) number of times an ad is served

White Hats

"Good" hackers who help organizations locate and fix security flaws

Digital Signature (e-signature)

"signed" cipher text that can be sent over the Internet

The overall retail market in the United States in 2016 was estimated at about

$4.8 trillion.

Which of the following statements about Instagram is not true? A) Instagram is owned by Twitter. B) Instagram is a photo-sharing app. C) Instagram is growing more quickly than Facebook. D) In terms of time spent per month by users, Instagram is second only to Facebook.

A) Instagram is owned by Twitter.

D) clickstream data

A) Nielsen ratings

_____________ has the highest penetration of social network usage among the general population. A) North America B) Latin America C) Europe D) Asia-Pacific

A) North America

Which of the following is a leading social network in Russia? A) VK B) Tuenti C) Orkut D) Mixi

A) VK

After Google, the next portal/search engine site with the most unique visitors is: A) Yahoo. B) Microsoft. C) AOL. D) Facebook

A) Yahoo

D) search engine display ads

A) company website

D) viral marketing

A) context advertising

D) permission marketing

A) customer co-production

Phishing

Any deceptive, online attempt by a third party to obtain confidential information for financial gain

Web Server software

Apache, Microsoft IIS basic capabilities: security services, FTP, search engine, data capture

All of the following offer website building tools except:

Apache.

Recency refers to the:

B) Time elapsed since the last visit made by a customer

Bloom is an example of a(n): A) interest-based social network B) affinity community C) sponsored community D) practice network

B) affinity community

Which of the following measures the percentage of customers who purchase once, but never return within a year?

B) attrition rate

Which of the following involves e-mailing another seller's bidders and offering the same product for less? A) transaction interception B) bid siphoning C) shill bidding D) persistent bidding

B) bid siphoning

Which of the following is the market leader in C2C auctions? A) Amazon B) eBay C) uBid D) eBid

B) eBay

D) anonymous browsing

B) firewalls

D) bait-and-switch

B) flash marketing

D) interactivity

B) information density

The time spent watching and reviewing auction bids is a part of ________ costs. A) pricing B) monitoring C) delayed consumption D) fulfillment

B) monitoring

In 2016, the world's online population was estimated to be around:

3.3 billion.

Packet Switching

-divides messages into packets -sent along different communication paths -reassembles packages once they arrive at destination - algorithmic can learn to choose the best possible paths - less expensive than circuit switching

Internet Phase 2 - Institutionalization

1975-1995 - large institutions provide funding and legitimization

Web - a service that operates on the internet

1989-1991 web invented by Tim Berners 1993 - Mosaic Web browner 1994 - first commercial web browsers Netscape Navigator

In which year was e-commerce said to have begun

1995

Internet Phase 3 - Commercialization

1995 - Present - private corporations take over, expand internet backbone and local service

D) Large spammers area among CAN-SPAM's biggest supporters

B) CAN-SPAM prohibits unsolicited email (spam)

D) transactive content system

B) CRM system


Related study sets

Chapter 9 Minerals Nutrition test 5

View Set

Chapter 13: Endocrine System (Objectives) - A&PII

View Set

Chemistry Chapter 1: Homework Helpers

View Set

Intro to Social Work Final Exam Study Guide

View Set

Political Science 116A Final Studying

View Set