insy ecomerce
a tiny graphics file embedded in an email or we page
A Web beacon is: - a tiny graphics file embedded in an e-mail or Web page. -a cookie that carries a virus. -an executable cookie. -an automated applet for performing Web searches.
false
A cell phone's GPS is accurate to within 5 feet of the actual location of the phone TRUE/FALSE
true
Bundling is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices. -true/false
false
By 2012, social marketing had overtaken mobile marketing TRUE/FALSE
109 BILLION
By 2017, mobile commerce revenues are expected to be approximately: $109 million. $1.09 billion. $10.9 billion. $109 billion.
TRUE
Google provides the leading location-based marketing platform. TRUE/FALSE
CREDIT CRADS
In the United States, the primary form of online payment is: -PayPal. -debit cards. -credit cards. -Google Wallet.
true
PayPal requires the recipient of a payment to have a PayPal account to receive funds. TRUE/FALSE
RANSOMEWARE
Reventon is an example of: - a macro virus. -a backdoor. - ransomware. -a bot program.
social networks
Surveys have found that the least influential online marketing format for driving consumers to purchase is: -social networks. -the retailer's Web site. -display ad campaigns. -e-mail campaigns.
Lead Generation Card
Which of the following involves a coupon or other promotional offer that appears in users' Twitter timeline? -Promoted Trend -Lead Generation Card -Promoted Account -Promoted Tweet
DRIVE BY DOWNLOAD
Which of the following is not an example of a PUP? -drive-by download -spyware -adware -browser parasite
The number of smartphone users is still growing faster than the number of tablet users.
Which of the following statements about the use of tablets is not true? - The number of smartphone users is still growing faster than the number of tablet users. -Tablets are the largest source of mobile commerce revenues. -The growth rate of tablet users is expected to slow by 2015. -About 50% of the American Internet population now uses tablets.
confidiality
________ refers to the ability to ensure that messages and data are only available to those authorized to view them. - availabilty -confidentiality -privacy -integrity
percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.
cquisition rate is a measure of the: -percentage of visitors who become customers. -percentage of existing customers who continue to buy on a regular basis. -percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages. - percentage of shoppers who do not return within a year after their initial purchase.
marketplace ads
facebook's display ads are called: -Sponsored Ads. -Brand Ads. - Marketplace Ads. -Promoted Ads.
google analytics
hich analytics tool did Fairmont Hotel use to measure the effectiveness of its online marketing and advertising? -IBM Digital Analytics -A custom Hadoop solution -WebTrends -Google Analytics
AMPLIFICATION
Encouraging users to click a Like button is an example of which step in the social marketing process? -community -fan acquisition -amplification -brand strength
20 to 30 cents, $3 to $7
Online bill payments are believed to cost ________ to process compared to ________ for paper bills. $1 to $2, $10 to $20 3 to $7, 20 to 30 cents $10 to $20, $ 1 to $2 $20 to 30 cents, $3 to $7
TRUE
Pinterest's visitors are predominantly women. TRUE /FALSE
TRUE
Promoted Tweets are Twitter's version of Google's Ad Words. TRUE/FALSE
false
Research has found that of all the standard formats of display ads, wide skyscraper ads are the most effective at holding a user's attention. -TRUE/ FALCE
spyware
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: -spyware. -a backdoor. -pupware. -adware.
perform a risk asesment
What is the first step in developing an e-commerce security plan? -Perform a risk assessment. -Create a security organization. -Perform a security audit. -Develop a security policy.
disney playdom
Which children's Web site was fined $3 million in 2011 for collecting and sharing children's personal information without consent of their parents? -Nick Jr. -NeoPets -Disney's Playdom -Emily's Dress Up
Which of the following earns the most location-based marketing revenue? -Google -Facebook -Apple -Twitter
information density
Which of the following features of e-commerce technology allows fine-grained, highly detailed information on consumers' real-time behavior to be gathered and analyzed? -social technology -information density -personalization/cust mization -interactivity
VIDEO
Which of the following forms of online advertising is growing the fastest? -sponsorships -video -rich media -paid search
curalate
Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media? -Webtrends -Amplify -Curalate -TweetDeck
afilliate programs
Which of the following is not a feature that is driving the growth of social marketing and advertising? -network notification -affiliate programs -collaborative -shopping -social sign-on
fan aquisition
Which of the following is the first step in the social marketing process? amplification fan acquisition community engagement
Women are more active purchasers on smartphones than men.
Which of the following statements is not true? -Men are more likely than women to buy digital content with a mobile device. -Younger consumers are more likely to research products and prices on mobile devices than older consumers. -Women are more active purchasers on smartphones than men. -Mobile shoppers and buyers are more affluent than the online population in general.
Desktop search revenues are increasing for Google.
Which of the following statements is not true? -Mobile ads account for only 16% of Google's overall ad revenue. -Google charges more for desktop ads than it charges for mobile ads. -Desktop search revenues are increasing for Google. -Mobile search ads generate about $8 billion a year for Google.
tweets
Your Facebook News Feed includes all of the following except: -app activity -tweets. -status updates. -Likes.
13
Companies are not permitted to collect personal information from children under the age of ________ without parental consent. -16 -13 -10 -8
Percentage of visitors who become customers.
Conversion rate is a measure of the: -percentage of shoppers who do not return within a year after their initial purchase. -percentage of existing customers who continue to buy on a regular basis. -percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages. -percentage of visitors who become customers.
versioning
Creating multiple variations of information goods and selling these to different market segments at different prices is called: - customization -bundling -dynamic pricig -versioning
56
The Data Encryption Standard uses a(n) ________-bit key. -8 -56 -512 -256
china
Which of the following countries has been found to have engaged in cyberespionage against Google? -China -Russia -Iraq -Iran
Which of the following dominates mobile advertising? -Facebook -Apple -Google -Twitter
location bases mobil marketing
The newest and fastest growing segment of the digital marketing universe is: - location-based -mobile marketing. -Facebook marketing. -Pinterest marketing. -Twitter marketing.
FAN AQUISITION
The number of people exposed to pins is a measure of which of the following? -fan acquisition -brand strength -community -engagement
less tan 1
The overall rate of online credit card fraud is ________ % of all online card transactions. around 5 around 1 around 10 less than 1
subj. private key
A digital certificate contains all of the following except the: -digital certificate serial number - subjects public key -subjects private key -digital signiture of the certification authority
true
About 25% of all search engine requests originate from mobile devices TRUE/FALSE
COST TO CONSUMERS
All of the following are limitations of the existing online credit card payment system except: -poor security. -cost to consumers. -cost to merchant. -social equity
your online purchasing history being sold to other merchants without your consent
An example of a privacy violation of e-commerce security is: -your online purchasing history being sold to other merchants without your consent. -your e-mail being altered by a hacker. -your computer being used as part of a botnet. -your e-mail being read by a hacker.
Facebook would be unable to increase advertising revenues enough.
Facebook's share price fell dramatically after its IPO because investors feared that: -Facebook's new marketing solutions would be difficult to monetize. -Facebook would be unable to increase advertising revenues enough. -New social networks such as Instagram were cannibalizing -Facebook's audience. privacy concerns were driving users away.
TRUE
In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution. TRUE/FALSE
FALSE
In the United States today, single, white, young college-educated males with high income dominate the Internet in terms of percentage of Internet usage TRUE/FALSE