Final exam review (1,5-7)right now

Ace your homework & exams now with Quizwiz!

Which of the following statements about the Internet's impact on marketing is not true? A) The Internet has broadened the scope of marketing communications. B) The Internet has decreased the impact of brands. C) The Internet has increased the richness of marketing communications. D) The Internet has expanded the information intensity of the marketplace.

B) The Internet has decreased the impact of brands.

Which of the following statements about the use of tablets is not true? A) About 50% of the American Internet population now uses tablets. B) The number of smartphone users is still growing faster than the number of tablet users. C) The growth rate of tablet users is expected to slow by 2015. D) Tablets are the largest source of mobile commerce revenues.

B) The number of smartphone users is still growing faster than the number of tablet users.

Facebook's marketing success on both desktop and mobile platforms is based on: A) the sale of user clickstream data. B) ads inserted into users' News Feeds. C) ads targeted through Facebook's Open Graph and Graph Search tools. D) fees for Brand Pages and other specialized business marketing tools.

B) ads inserted into users' News Feeds.

The newest and fastest growing segment of the digital marketing universe is: A) Twitter marketing. B) location-based mobile marketing. C) Pinterest marketing. D) Facebook marketing.

B) location-based mobile marketing.

Impressions are a measure of the: A) number of times an ad is clicked. B) number of times an ad is served. C) number of http requests. D) number of pages viewed.

B) number of times an ad is served.

Approximately ________ of annual offline retail sales is influenced by online browsing. A) one-quarter B) one-third C) one-half D) three-quarters

B) one-third

How long does copyright protection extend for corporate-owned works? a)50 years b)75 years c)25 years d)95 years

95 years

Which of the following statements about CAN-SPAM is not true? A) CAN-SPAM went into effect in January 2004. B) CAN-SPAM prohibits unsolicited e-mail (spam). C) CAN-SPAM prohibits the use of deceptive subject lines and false headers. D) Large spammers are among CAN-SPAM's biggest supporters.

B) CAN-SPAM prohibits unsolicited e-mail (spam).

Which of the following countries has been found to have engaged in cyberespionage against Google? A) Russia B) China C) Iran D) Iraq

B) China

Which of the following is the core communications protocol for the Internet? a)Telnet b)FTP c)TCP/IP d)SSL

TCP/IP

Research shows that the two most important factors shaping the decision to purchase online are utility and trust. True or False?

True

Smishing attacks exploit SMS messages. True or False?

True

Social network participation is one of the most common usages of the Internet. True False

True

Sponsored community sites are network sites created by government, non-profit, or for-profit organizations. True False

True

Spoofing involves attempting to hide a true identity by using someone else's e-mail or IP address. True or False?

True

Traditional desktop marketing remains the largest part of all online marketing. True or False?

True

________ and ________ are typically the most easily identifiable aspects of a company's business model. a)Market strategy; market opportunity b)Value proposition; competitive environment c)Revenue model; market strategy d)Value proposition; revenue model

Value proposition; revenue model

Where does TSL operate within TCP/IP? a)between the Internet Layer and the Application Layer b)between the Internet Layer and the Transport Layer c)between the Network Interface Layer and the Transport Layer d)between the Transport Layer and the Application Layer

between the Transport Layer and the Application Layer

Which of the following is another term for amplification? A) impressions B) reach C) conversation rate D) conversion ratio

B) reach

An interstitial ad is typically contained in a pop-up window that the user must close in order to continue. True or False?

False

Auction fraud accounts for the highest percentage of total Internet fraud reported to the Internet Crime Complaint Center. True False

False

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties. True or False?

False

Facebook does not sell display ads. True or False?

False

Facebook has more unique monthly visitors than LinkedIn, Twitter, Pinterest, Tumblr, and Instagram combined. True or False?

False

In 2013, mobile marketing grew at nearly the same rate as traditional online marketing. True or False

False

In C2C auctions, a business owns or controls assets and uses dynamic pricing to establish the price. True False

False

In a Dutch Internet auction, the highest price wins. True False

False

In the United States today, single, white, young college-educated males with high income dominate the Internet in terms of percentage of Internet usage. True or False?

False

It is expected that by 2017, mobile commerce will account for 50% of all e-commerce. True or False?

False

It is possible to opt-out of Facebook's Graph Search. True or False?

False

Mobile users spend most of their time browsing mobile Web sites. True or False?

False

Online shoppers tend to browse for available products rather than search for specific products they have determined in advance. True or False?

False

Price transparency refers to the ability of merchants to segment the market into groups willing to pay different prices. True False

False

Research has found that of all the standard formats of display ads, wide skyscraper ads are the most effective at holding a user's attention. True or False?

False

Social e-commerce is the largest type of e-commerce. True False

False

TLS does not guarantee server-side authentication. True or False?

False

Text message generates the majority of mobile marketing spending. True or False?

False

The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions. True False

False

Transmission Control Protocol is the protocol that provides the Internet addressing scheme. True False

False

Which of the following types of auctions offers a neutral marketplace, without buyer or seller bias? a)English auction b)sealed bid market c)name your own price auction d)double auction

double auction

All of the following types of auctions have a seller bias except: a)double auction. b)Yankee auction-Internet. c)Dutch Internet. d)Dutch-traditional.

double auction.

The stock market is an example of a(n): a)Dutch auction. b)English auction. c)Group buying auction. d)double auction.

double auction.

Which of the following is the market leader in C2C auctions? a)Craigslist b)Amazon c)eBay d)Yahoo

eBay

The display of a third-party's Web site or page within your own Web site is called: a)deep linking. b)metatagging. c)framing. d)cybersquatting.

framing.

All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the: a)market effect of the use. b)nature of the work used. c)free availability of the work on the Web. d)amount of the work used.

free availability of the work on the Web.

Which pricing plan charges fees to e-commerce firms based on the amount of traffic they generate? a)cap pricing b)congestion pricing c)highway pricing d)usage-based billing

highway pricing

All of the following statements are true except: a)auctions constituted a significant part of B2B e-commerce in 2013. b)in auctions, prices may be variable or fixed. c)over a third of procurement officers use auctions to procure goods. d)online retail sites are adding auctions to their sites.

in auctions, prices may be variable or fixed.

All of the following are key elements of a business model except: a)organizational development. b)information technology strategy. c)competitive environment. d)market strategy.

information technology strategy.

A Web site designed to give parents of home-schooled children a common discussion area would be classified as a(n): a)practice network. b)sponsored community. c)interest-based social network. d)affinity community.

interest-based social network.

A business document that specifically details how you plan on selling your product and find new customers is called a: a)market strategy. b)sales analysis. c)competitive strategy. d)business plan.

market strategy.

Which social network functionality allows users to easily post messages to the entire community? a)chat b)e-mail c)message board d)instant messaging

message board

Amazon has a patent on: a)display of third-party advertisements in floating windows. b)download-based sales. c)one-click purchasing. d)hyperlinks.

one-click purchasing.

Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years? a)copyright law b)trademark law c)patent law d)trade secret law

patent law

Which of the following types of dynamic pricing adjusts prices based on the merchant's estimate of how much the customer truly values the product? a)fixed b)personalization c)utilization d)trigger

personalization

Elance.com is an example of a(n): a)professional service auction. b)auction solution provider. c)auction aggregator. d)demand aggregator.

professional service auction.

Which of the following is not one of the typical portal revenue sources? a)referral fees b)subscription fees c)tenancy deals d)commissions on sales

referral fees

A firm's ________ describes how a firm will produce a superior return on invested capital. a)value proposition b)revenue model c)market strategy d)competitive advantage

revenue model

All of the following are solutions to the problem of high monitoring costs except: a)seller rating systems. b)fixed pricing. c)watch lists. d)proxy bidding.

seller rating systems.

Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying? a)interactivity b)social technology c)ubiquity d)richness

social technology

Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society? a)the Golden Rule b)Universalism c)the Collective Utilitarian principle d)the Social Contract rule

the Collective Utilitarian principle

The overall rate of online credit card fraud is ________ % of all online card transactions. A) less than 1 B) around 1 C) around 5 D) around 10

A) less than 1

Which of the following is not one of the main elements of a comprehensive multi-channel marketing plan? A) local marketing B) offline marketing C) social marketing D) mobile marketing

A) local marketing

An Internet-enabled media player would run in which layer of Internet architecture? a)Network Technology Substrate layer b)Middleware Services layer c)Transport Services and Representation Standards layer d)Applications layer

Applications layer

A typical response rate for an e-mail campaign would be ________ %. A) 2 B) 5 C) 25 D) 50

B) 5

The Data Encryption Standard uses a(n) ________-bit key. A) 8 B) 56 C) 256 D) 512

B) 56

In 2013, what was the approximate Internet penetration rate for individuals that have attained less than a high-school education? A) 45% B) 60% C) 75% D) 90%

B) 60%

Which of the following provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand? A) Enhanced Profile Pages B) Amplify C) Lead Generation Cards D) Promoted Accounts

B) Amplify

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. A) Nonrepudiation B) Authenticity C) Availability D) Integrity

B) Authenticity

Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media? A) TweetDeck B) Curalate C) Amplify D) Webtrends

B) Curalate

Which children's Web site was fined $3 million in 2011 for collecting and sharing children's personal information without consent of their parents? A) Disney's Playdom B) Emily's Dress Up C) Nick Jr. D) NeoPets

B) Emily's Dress Up

Which of the following statements is not true? A) About 30% of Facebook's ad revenue is 2013 is expected to come from its mobile ad platform. B) Facebook Home is Facebook's app for iOS devices. C) Mobile ads are displayed in users' News Feeds. D) Facebook's mobile ad revenues are growing at an estimated 40% in 2013.

B) Facebook Home is Facebook's app for iOS devices.

Miller Coors used which of the following techniques to alert Blue Moon beer fans as to where it could be purchased? A) Geo-social based services B) Geo-fencing C) E9-1-1 D) Geo-search

B) Geo-fencing

Which of the following would you implement to collect and analyze your company's big data? A) data warehouse B) Hadoop C) SQL D) profiling

B) Hadoop

Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other? A) DES B) NFC C) IM D) text messaging

B) NFC

Which of the following statements about a free pricing strategy is false? A) Free products and services can knock out potential and actual competitors. B) The free pricing strategy was born in the early days of the Web. C) It is difficult to convert free customers into paying customers. D) Free products and services can help build market awareness.

B) The free pricing strategy was born in the early days of the Web.

Which of the following purchased Tumblr in May 2013? A) Facebook B) Yahoo C) Google D) Twitter

B) Yahoo

Online bill payments are believed to cost ________ to process compared to ________ for paper bills. A) 20 to 30 cents, $3 to $7 B) $1 to $2, $10 to $20 C) 3 to $7, 20 to 30 cents D) $10 to $20, $ 1 to $2

A) 20 to 30 cents, $3 to $7

________ refers to the ability to ensure that messages and data are only available to those authorized to view them. A) Confidentiality B) Integrity C) Privacy D) Availability

A) Confidentiality

Which of the following is the leading display ad site on mobile devices? A) Facebook B) Yahoo C) Google D) Twitter

A) Facebook

Which social marketing proved the most effective for ExchangeHunterJumper.com? A) Facebook B) YouTube C) Pinterest D) Instagram

A) Facebook

All of the following marketing tools on Facebook require payment except: A) Facebook Offers. B) Sponsored Stories. C) Promoted Posts. D) Marketplace Ads.

A) Facebook Offers.

Which of the following is not true about social marketing? A) In 2013, marketers will spend almost twice as much on social marketing as they do on mobile marketing. B) Social marketing is growing at around 30% a year. C) By 2015, it is estimated that social marketing spending will be just over $6 billion dollars. D) More than 25% of Facebook visits originate from a mobile device.

A) In 2013, marketers will spend almost twice as much on social marketing as they do on mobile marketing.

Which of the following statements about Graph Search is not true? A) It relies on Google to supplement its search results. B) It is a semantic search engine. C) It is a social search engine. D) It includes photos.

A) It relies on Google to supplement its search results.

The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and: A) confidentiality. B) usability. C) functionality. D) viability

A) confidentiality.

The Nike iD program is an example of which of the following marketing techniques? A) customer co-production B) transactive content C) price discrimination D) permission marketing

A) customer co-production

Bitcoins are an example of: A) digital cash. B) virtual currency. C) a stored value payment system. D) an EBPP system

A) digital cash.

Botnets are typically used for all of the following except: A) DDoS attacks. B) phishing attacks. C) storing network traffic for analysis. D) stealing information from computers.

B) phishing attacks.

All of the following statements about public key encryption are true except: A) public key encryption uses two mathematically related digital keys. B) public key encryption ensures authentication of the sender. C) public key encryption does not ensure message integrity. D) public key encryption is based on the idea of irreversible mathematical functions.

B) public key encryption ensures authentication of the sender.

Reventon is an example of: A) a macro virus. B) ransomware. C) a backdoor. D) a bot program.

B) ransomware.

Which of the following accounts for the most mobile ad spending? A) display ads B) search engine advertising C) video ads D) SMS text messages

B) search engine advertising

Symmetric key encryption is also known as: A) public key encryption. B) secret key encryption. C) PGP. D) PKI

B) secret key encryption.

Which of the following measures the average length of stay at a Web site? A) loyalty B) stickiness C) recency D) retention rate

B) stickiness

All of the following are factors in contributing to the increase in cybercrime except: A) the ability to remotely access the Internet. B) the Internet's similarity to telephone networks. C) the ability to anonymously access the Internet. D) the Internet is an open, vulnerable design

B) the Internet's similarity to telephone networks.

All of the following statements about cookies are true except: A) cookies can be used with Web bugs to create cross-site profiles of users. B) the data typically stored in cookies includes a unique ID and e-mail address. C) cookies make shopping carts possible by allowing a site to keep track of a user's actions. D) the more cookies are deleted, the less accurate ad server metrics become.

B) the data typically stored in cookies includes a unique ID and e-mail address.

Studies of the effects of social "connectedness" on Internet purchases indicate that the more "connected" an individual: A) the less purchasing that individual does. B) the less that individual is influenced by friends' purchases. C) the more that individual shares purchasing decisions with friends. D) the more purchasing that individual does.

B) the less that individual is influenced by friends' purchases.

Recency refers to the: A) percentage of customers who do not return during the next year after an initial purchase. B) time elapsed since the last action taken by a customer. C) percentage of existing customers who continue to buy on a regular basis. D) percentage of customers who return to the site within a year to make additional purchases

B) time elapsed since the last action taken by a customer.

Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012? A) anti-virus software B) two-factor authentication C) SSL/TLS D) firewall

B) two-factor authentication

If you want to determine the size of your Web site's audience, the metric you will use for the most accurate measurement will be: A) page views. B) unique visitors. C) hits. D) reach

B) unique visitors

An example of a privacy violation of e-commerce security is: A) your e-mail being read by a hacker. B) your online purchasing history being sold to other merchants without your consent. C) your computer being used as part of a botnet. D) your e-mail being altered by a hacker

B) your online purchasing history being sold to other merchants without your consent.

Which type of apps account for the most user time? A) social network apps B) brand apps C) game and entertainment apps D) search apps

C) game and entertainment apps

Which dimension(s) of security is spoofing a threat to? A) integrity B) availability C) integrity and authenticity D) availability and integrity

C) integrity and authenticity

In modeling online consumer behavior, the concept of "consumer skills" refers to the: A) education level of the consumer. B) communication skills of the consumer. C) knowledge consumers have about how to conduct online transactions. D) product evaluation skills of the consumer.

C) knowledge consumers have about how to conduct online transactions.

The incremental cost of building the next unit of a good is called the: A) demand curve. B) variable cost. C) marginal cost. D) fixed cost.

C) marginal cost.

Hits are a measure of the: A) number of times an ad is clicked. B) number of times an ad is served. C) number of http requests. D) number of pages viewed.

C) number of http requests.

Purchasing an online ad on a CPA basis means that the advertiser: A) pays for impressions in 1,000 unit lots. B) pays a prenegotiated fee for each click an ad receives. C) pays only for those users who perform a specific action, such as registering, purchasing, etc. D) exchanges something of equal value for the ad space.

C) pays only for those users who perform a specific action, such as registering, purchasing, etc.

All of the following are traditional online marketing tools except: A) affiliate marketing. B) e-mail and permission marketing. C) social marketing. D) sponsorship marketing.

C) social marketing.

Surveys have found that the least influential online marketing format for driving consumers to purchase is: A) the retailer's Web site. B) display ad campaigns. C) social networks. D) e-mail campaigns.

C) social networks.

All the following statements about symmetric key encryption are true except: A) in symmetric key encryption, both the sender and the receiver use the same key to encrypt and decrypt a message. B) the Data Encryption Standard is a symmetric key encryption system. C) symmetric key encryption is computationally slower. D) symmetric key encryption is a key element in digital envelopes.

C) symmetric key encryption is computationally slower.

How can a smartphone's gyroscope and accelerometer be used in product marketing? A) to speed up delivery of large multimedia files B) to locate the user's geographical position C) to enhance user interaction with mobile multimedia D) to provide accurate data on the user's destination and speed

C) to enhance user interaction with mobile multimedia

Which of the following forms of online advertising is growing the fastest? A) paid search B) sponsorships C) video D) rich media

C) video

Which of the following online advertising formats is the most effective? A) banner ads B) rich media ads C) video ads D) e-mail

C) video ads

Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place? a)Notice/Awareness b)Choice/Consent c)Security d)Access/Participation

Choice/Consent

Which of the following dimensions of e-commerce security is not provided for by encryption? A) confidentiality B) availability C) message integrity D) nonrepudiation

B) availability

How does Google Analytics track user behavior at a participating Web site? A) cookies B) beacons C) server logs D) super cookies

B) beacons

Rustock is an example of which of the following? A) worm B) botnet C) phishing D) hacktivism

B) botnet

All of the following were popular types of online marketing before 2007 except: A) e-mail. B) corporate Web sites. C) mobile marketing. D) display ads.

B) corporate Web sites.

All of the following are limitations of the existing online credit card payment system except: A) poor security. B) cost to consumers. C) cost to merchant. D) social equity.

B) cost to consumers.

In the United States, the primary form of online payment is: A) PayPal. B) credit cards. C) debit cards. D) Google Wallet.

B) credit cards.

The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time. A) search engine marketing B) flash marketing C) yield management D) bait-and-switch

B) flash marketing

Which of the following are features of both Pinterest and Twitter? A) tweets B) hashtags C) pins D) Image Hover widget

B) hashtags

Which of the following features of e-commerce technology allows fine-grained, highly detailed information on consumers' real-time behavior to be gathered and analyzed? A) personalization/customization B) information density C) social technology D) interactivity

B) information density

All of the following are Pinterest marketing tools except: A) Brand pages. B) Follow button. C) Retail Pins. D) Promoted Accounts.

D) Promoted Accounts.

Which of the following is not true about search engine advertising? A) Spending on search engine advertising constitutes almost half of all online advertising spending. B) The top three search engine providers supply over 95% of all online searches. C) The click-through rate for search engine marketing has been fairly steady over the years. D) Search engine advertising is the fastest growing type of online advertising.

D) Search engine advertising is the fastest growing type of online advertising.

The second most popular social network in terms of average minutes per visitor is: A) Google+. B) Pinterest. C) LinkedIn. D) Tumblr.

D) Tumblr.

A Web beacon is: A) a cookie that carries a virus. B) an executable cookie. C) an automated applet for performing Web searches. D) a tiny graphics file embedded in an e-mail or Web page.

D) a tiny graphics file embedded in an e-mail or Web page.

Which of the following is not a feature that is driving the growth of social marketing and advertising? A) social sign-on B) network notification C) collaborative shopping D) affiliate programs

D) affiliate programs

Encouraging users to click a Like button is an example of which step in the social marketing process? A) fan acquisition B) brand strength C) community D) amplification

D) amplification

SMS to friends, notifying friends of your location, and sharing offers with friends are ways to measure: A) fan acquisition. B) engagement. C) community. D) amplification

D) amplification

Most of the world's spam is delivered via which of the following? A) viruses B) worms C) Trojan horses D) botnets

D) botnets

Which of the following is not one of the main stages of the online purchasing process? A) post-purchase service and loyalty B) awareness C) interaction D) browsing

D) browsing

Which of the following online advertising formats attracted the least amount of spending in 2013? A) search B) classifieds C) rich media D) e-mail

D) e-mail

Which of the following most helped Dagny Aslin of ExchangeHunterJumper.com in establishing her brand in the niche area of selling high-end competition horses? A) integrating online and offline marketing techniques to establish a consistent brand B) adapting marketing techniques to keep up with new Internet technologies C) valuing quality over quantity at each stage in the Web site development process D) establishing customer needs and habits as the top priority in all marketing decisions

D) establishing customer needs and habits as the top priority in all marketing decisions

The number of people exposed to pins is a measure of which of the following? A) engagement B) community C) brand strength D) fan acquisition

D) fan acquisition

The ratio of impressions to fans is a measure of: A) engagement. B) amplification. C) community. D) fan acquisition.

D) fan acquisition.

Which of the following is the top concern of Internet users about purchasing online? A) inability to see and touch before buying B) difficulty of returning products C) shipping costs D) lack of trust in the purchase process

D) lack of trust in the purchase process

All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except: A) search engines. B) online catalogs. C) social networks. D) targeted banner ads

D) targeted banner ads

Which of the following is not a key point of vulnerability when dealing with e-commerce? A) the client computer B) the server C) the communications pipeline D) the credit card companies

D) the credit card companies

Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users? A) ubiquity B) richness C) interactivity D) universal standards

D) universal standards

Creating multiple variations of information goods and selling these to different market segments at different prices is called: A) bundling. B) customization. C) dynamic pricing. D) versioning.

D) versioning.

All of the following are fixed price strategies except: A) bundling. B) versioning. C) free pricing. D) yield management.

D) yield management.

A cell phone's GPS is accurate to within 5 feet of the actual location of the phone. True or False?

False

By 2012, social marketing had overtaken mobile marketing. True or False?

False

Credit cards are the dominant form of online payment throughout the world. True or False?

False

Phishing attacks rely on browser parasites. True or False?

False

The concept of "customer satisfaction" is broader than the concept of "customer experience." True or False?

False

The world's leading portal/search engine site, in terms of unique visitors, is: a)Google. b)AOL. c)MSN/Bing. d)Yahoo.

Google.

What is the first step in analyzing an ethical dilemma? a)Identify and describe the facts. b)Identify the options you can reasonably take. c)Define the conflict or dilemma and identify the higher-order values involved. d)Identify the potential consequences of your opinions.

Identify and describe the facts.

The richness made possible by e-commerce technologies does which of the following? A) It reduces the cost of delivering marketing messages and receiving feedback from users. B) It allows consumers to become co-producers of the goods and services being sold. C) It allows video, audio, and text to be integrated into a single marketing message and consuming experience. D) It enables worldwide customer service and marketing communications.

It allows video, audio, and text to be integrated into a single marketing message and consuming experience.

The layer of Internet architecture that ties the applications to the communications network and includes such services as security and authentication is called the: a)Network Technology Substrate layer. b)Middleware Services layer. c)Transport Services and Representation Standards layer. d)Applications layer.

Middleware Services layer.

Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise? a)No Free Lunch b)the Social Contract rule c)the Golden Rule d)the Slippery Slope

No Free Lunch

________ is a utility program that allows you to check the connection between your client and a TCP/IP network. a)Telnet b)Finger c)Tracert d)Ping

Ping

Which of the following protocols is used to send mail to a server? a)SMTP b)SSL c)HTTP d)FTP

SMTP

The Children's Online Privacy Protection Act (COPPA) prohibits Web sites from collecting information on children under the age of 13. True False

True

The FTC's privacy approach is now focused on targeting practices that are likely to cause harm or unwarranted intrusion into consumers' daily lives. True False

True

The U.S. federal government has historically not been in favor of the development and export of strong encryption systems. True or False?

True

The cost of sending 10,000 e-mails in an advertising campaign is about the same as sending 5,000. True or False?

True

The digital divide still persists along age, income, ethnic, and education dimensions. True or False?

True

The fact that e-commerce is conducted on the basis of universal standards decreases market entry costs for merchants. True False

True

Transaction logs are built into Web server software. True or False?

True

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use. True or False?

True

E-commerce can be defined as: a)the use of any Internet technologies in a firm's daily activities. b)the use of the Internet, the Web, and mobile apps to transact business. c)the digital enablement of transactions and processes within an organization. d)any digitally enabled transactions among individuals and organizations.

any digitally enabled transactions among individuals and organizations.

Which of the following is not one of the three defining characteristics of a portal? a)commerce b)content c)auctions d)navigation of the Web

auctions

Which element of the business model examines who else occupies the firm's intended marketspace? a)competitive advantage b)value proposition c)market strategy d)competitive environment

competitive environment

Which of the following protects original forms of expression in a tangible medium? a)trademark law b)patent law c)copyright law d)trade secret law

copyright law

Downloading music tracks owned by record companies without paying for them is an example of a violation of: a)patent law. b)privacy law. c)copyright law. d)trademark law

copyright law.

Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of: a)framing. b)cybersquatting. c)metatagging. d)cyberpiracy.

cybersquatting.

When sellers agree informally or formally to set floor prices below which they will not sell on auction items, this is known as: a)the uniform pricing rule. b)price matching. c)discriminatory pricing. d)bid rigging.

price matching.

Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all? a)the Social Contract rule b)the Golden Rule c)Universalism d)the Slippery Slope

the Slippery Slope

Registering the domain name goggle.com with the intent to divert Web traffic from people misspelling google.com is an example of: a)metatagging. b)typosquatting. c)cybersquatting. d)linking.

typosquatting.

Adjusting the annual cost of automobile insurance based on mileage driven is an example of ________ pricing. a)personalization b)trigger c)utilization d)fixed

utilization

Which of the following is not an example of an access control? A) firewalls B) proxy servers C) digital signatures D) login passwords

C) digital signatures

Which of the following is not an example of a PUP? A) adware B) browser parasite C) drive-by download D) spyware

C) drive-by download

Malware that comes with a downloaded file that a user requests is called a: A) Trojan horse. B) backdoor. C) drive-by download. D) PUP.

C) drive-by download.

Proxy servers are also known as: A) firewalls. B) application gateways. C) dual home systems. D) packet filters.

C) dual home systems

Which of the following is the most popular use for mobile devices? A) shopping B) socializing C) entertainment D) performing tasks, such as finances

C) entertainment

Which of the following is the first step in the social marketing process? A) community B) amplification C) fan acquisition D) engagement

C) fan acquisition

By 2017, mobile commerce revenues are expected to be approximately: A) $109 million. B) $1.09 billion. C) $10.9 billion. D) $109 billion.

D) $109 billion.

Search engine advertising and marketing expenditures in 2013 were approximately: A) $19 million. B) $195 million. C) $1.95 billion. D) $19.5 billion.

D) $19.5 billion.

In 2013, mobile commerce revenues are approximately: A) $39 million. B) $390 million. C) $3.9 billion. D) $39 billion.

D) $39 billion.

View-through rate measures the ________ response rate to an ad. A) 30-minute B) 24-hour C) 7-day D) 30-day

D) 30-day

For a Web site that has 5 million visitors a month, and where on average, a visitor makes 10 page requests per visit, there will be ________ entries in the transaction log each month. A) 50 B) 500,000 C) 5 million D) 50 million

D) 50 million

On a typical day, approximately ________ % of adult users in the United States logs on to the Internet. A) 50 B) 60 C) 70 D) 80

D) 80

"Shoppers" constitute approximately ________ % of the online Internet audience. A) 60 B) 70 C) 80 D) 90

D) 90

What percentage of smartphone users have used their phones for proximity searches on information like local weather? A) 33% B) 50% C) 75% D) 95%

D) 95%

Which of the following statements about Pinterest is not true? A) Pinned photos and photo boards are available to all Pinterest users. B) Pinterest users are overwhelmingly female. C) Pinterest enables users to integrate their pins into their Facebook News Feeds and Twitter streams. D) About 30% of online adults use Pinterest.

D) About 30% of online adults use Pinterest.

In 2012, the total worth of goods sold on eBay was approximately: a)$7.5 billion. b)$750 billion. c)$75 million. d)$75 billion.

$75 billion.

Acquisition rate is a measure of the: A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages. B) percentage of visitors who become customers. C) percentage of existing customers who continue to buy on a regular basis. D) percentage of shoppers who do not return within a year after their initial purchase.

A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

Which of the following is not a practice that degrades the results and usefulness of search engines? A) social search B) link farms C) content farms D) click fraud

A) social search

A Crayola arts-and-crafts column on a parenting Web site is an example of what form of advertising? A) sponsorship B) banner swapping C) affiliate relationship D) public relations

A) sponsorship

P2P payment systems are a variation on what type of payment system? A) stored value payment system B) digital checking system C) accumulating balance system D) digital credit card system

A) stored value payment system

A digital certificate contains all of the following except the: A) subject's private key. B) subject's public key. C) digital signature of the certification authority. D) digital certificate serial number.

A) subject's private key.

In 2013, location-based mobile marketing accounted for how much in marketing expenditures? A) $23 million B) $230 million C) $2.3 billion D) $23 billion

C) $2.3 billion

The research firm Cybersource estimated that online credit card fraud in the United States amounted to about ________ in 2012. A) $35 million B) $350 million C) $3.5 billion D) $35 billion

C) $3.5 billion

Companies are not permitted to collect personal information from children under the age of ________ without parental consent. A) 8 B) 10 C) 13 D) 16

C) 13

Display ads constitute about ________ % of mobile ad spending. A) 15 B) 20 C) 33 D) 66

C) 33

Online bill payment now accounts for ________ of all bill payments. A) 10% B) 25% C) 50% D) 100%

C) 50%

_______ refers to the ability to ensure that an e-commerce site continues to function as intended. A) Nonrepudiation B) Authenticity C) Availability D) Integrity

C) Availability

Which of the following left the WikiLeaks Web site effectively inoperable in August 2012? A) SQL injection attack B) browser parasite C) DDoS attack D) botnet

C) DDoS attack

Which analytics tool did Fairmont Hotel use to measure the effectiveness of its online marketing and advertising? A) WebTrends B) IBM Digital Analytics C) Google Analytics D) A custom Hadoop solution

C) Google Analytics

Which of the following examples illustrates the "Long Tail" phenomenon? A) Rhapsody music streaming service reported that its no play rate had increased to over 20%. B) The number of blockbuster "winner take all" video titles is declining. C) Over 50% of Netflix's 100,000 titles are rented at least once a day by someone. D) The average blog has a readership of slightly more than 1.

C) Over 50% of Netflix's 100,000 titles are rented at least once a day by someone.

All of the following statements about PKI are true except: A) The term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties. B) PKI is not effective against insiders who have a legitimate access to corporate systems including customer information. C) PKI guarantees that the verifying computer of the merchant is secure. D) The acronym PKI stands for public key infrastructure.

C) PKI guarantees that the verifying computer of the merchant is secure.

Which of the following is a real-time feed showing a friend's activities, chats, and music listening on Facebook? A) News Feed B) Timeline C) Ticker D) Social Graph

C) Ticker

Which of the following statements is not true? A) Mobile shoppers and buyers are more affluent than the online population in general. B) Men are more likely than women to buy digital content with a mobile device. C) Women are more active purchasers on smartphones than men. D) Younger consumers are more likely to research products and prices on mobile devices than older consumers

C) Women are more active purchasers on smartphones than men.

Which of the following is not true about mobile marketing? A) Mobile marketing is the fastest growing form of online marketing. B) Mobile marketing is growing at around 50% a year. C) A substantial part of mobile marketing should be counted as social marketing. D) By 2015, it is estimated that spending on social marketing will exceed the amount spent on mobile marketing.

D) By 2015, it is estimated that spending on social marketing will exceed the amount spent on mobile marketing.

All of the following are methods of securing channels of communication except: A) SSL/TLS. B) certificates. C) VPN. D) FTP.

D) FTP.

Facebook's share price fell dramatically after its IPO because investors feared that: A) Facebook's new marketing solutions would be difficult to monetize. B) new social networks such as Instagram were cannibalizing Facebook's audience. C) privacy concerns were driving users away. D) Facebook would be unable to increase advertising revenues enough.

D) Facebook would be unable to increase advertising revenues enough.

Which of the following dominates mobile advertising? A) Facebook B) Apple C) Twitter D) Google

D) Google

Which of the following earns the most location-based marketing revenue? A) Twitter B) Apple C) Facebook D) Google

D) Google

Which of the following involves a coupon or other promotional offer that appears in users' Twitter timeline? A) Promoted Tweet B) Promoted Trend C) Promoted Account D) Lead Generation Card

D) Lead Generation Card

Which of the following is not an advantage of client/server computing over centralized mainframe computing? a)It is easy to expand capacity by adding servers and clients. b)Each client added to the network increases the network's overall capacity and transmission speeds. c)There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down. d)Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer.

Each client added to the network increases the network's overall capacity and transmission speeds.

TCP/IP operates in which layer of Internet architecture? a)Network Technology Substrate layer b)Middleware Services layer c)Transport Services and Representation Standards layer d)Applications layer

Transport Services and Representation Standards

________ pricing adjusts prices based on the location of the consumer. a)Utilization b)Trigger c)Personalization d)Fixed

Trigger

A value proposition defines how a company's product or service fulfills the needs of a customer. True False

True

A worm does not need to be activated by a user in order for it to replicate itself. True or False?

True

Which of the following statements is not true? A) Desktop search revenues are increasing for Google. B) Mobile ads account for only 16% of Google's overall ad revenue. C) Mobile search ads generate about $8 billion a year for Google. D) Google charges more for desktop ads than it charges for mobile ads.

A) Desktop search revenues are increasing for Google.

Facebook's display ads are called: A) Marketplace Ads. B) Promoted Ads. C) Sponsored Ads. D) Brand Ads.

A) Marketplace Ads.

Which of the following is not one of the four main methods advertisers use to behaviorally target ads? A) Nielsen ratings B) data collected from social networks C) integration of offline data D) clickstream data

A) Nielsen ratings

________ refers to the ability to ensure that e-commerce participants do not deny their online actions. A) Nonrepudiation B) Authenticity C) Availability D) Integrity

A) Nonrepudiation

________ is an industry-standard database query and manipulation language. A) SQL B) PHP C) DBMS D) JSP

A) SQL

Which of the following is an example of an integrity violation of e-commerce security? A) A Web site is not actually operated by the entity the customer believes it to be. B) A merchant uses customer information in a manner not intended by the customer. C) A customer denies that he or she is the person who placed the order. D) An unauthorized person intercepts an online communication and changes its contents.

D) An unauthorized person intercepts an online communication and changes its contents.

Which of the following statements about social, local, and mobile privacy is not true? a)To date, there is no legal prohibition of the collection and sharing of personal data sent through mobile phones. b)A single Facebook photograph can be used to identify the subject's social security number with the use of facial recognition software. c)iOS and Android apps funnel personal location information, photos, and address books to mobile advertisers. d)Google and Apple track and record how users interact with the apps on users' smartphones.

Google and Apple track and record how users interact with the apps on users' smartphones.

Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records? a)HIPAA b)Freedom of Information Act c)Gramm-Leach-Bliley Act d)COPPA

Gramm-Leach-Bliley Act

About 25% of all search engine requests originate from mobile devices. True or False?

True

Brand pages on Facebook typically attract more visitors than a brand's Web site. True or False?

True

By 2015, it is estimated that mobile marketing spending will account for around $16 billion annually. True or False?

True

Cookies, when combined with Web beacons, can be used to create cross-site profiles. True or False?

True

Cost transparency refers to the ability of consumers to discover the actual costs merchants pay for products. True False

True

Drive-by downloads are now the most common method of infecting computers. True or False?

True

E-commerce is a major conduit and generator of offline commerce. True or False?

True

Every device connecting to the Internet must have a unique address. True False

True

Evidence suggests that real-time customer chat increases sales. True or False?

True

FTP is a protocol used to transfer files to and from a server. True False

True

Google provides the leading location-based marketing platform. True or False?

True

In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution. True or False?

True

Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations. True False

True

Most of today's well-known portals began as search engines. True False

True

Net neutrality refers to Internet backbone owners treating all Internet traffic equally. True False

True

Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision? a)the Golden Rule b)Universalism c)the Collective Utilitarian principle d)the Social Contract rule

the Golden Rule

What is the major reason that the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law? a)the anonymous nature of the Internet b)the use of standards for file formats c)the ability to make perfect copies of digital works at little cost d)the support for instant peer-to-peer communication

the ability to make perfect copies of digital works at little cost

Which of the following is the best definition of transaction cost? a)the cost of participating in a market b)the cost of finding suitable products c)the cost of changing prices d)the cost merchants pay to bring their goods to market

the cost of participating in a market

The addresses used by browsers to identify the location of content on the Web are called: a)domain names. b)file paths. c)uniform resource locators. d)IP addresses.

uniform resource locators.


Related study sets

Business accounting midterm Jinglin Jiang

View Set

Data Mining Chapter 7 - K-Nearest-Neighbor

View Set

CYBR 4323 (Privitera) - Chapter 3 - Introduction to Physical Layer

View Set

Chapters 1-8 Organizational Behavior

View Set

CHAPTER 4 Communicating For Success

View Set

Florida Real Estate Exam Practice Exam Qestions

View Set