E-marketing Mid-term

question

In 2013, the world’s online population was roughly: A.) 250 billion. B.) 250 million. C.) 2.5 billion D.) 25 billion.
answer

2.5 billion.
question

Which business application is associated with the technological development of local area networks and client/server computing? A.) transaction automation (e.g., payroll) B.) industrial system automation (e.g., supply chain management) C.) desktop automation (e.g., word processing) D.) workgroup automation (e.g., document sharing)
answer

workgroup automation (e.g., document sharing)
question

Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship? A.) mobile e-commerce B.) social e-commerce C.) consumer-to-consumer (C2C) D.) business-to-business (B2B)
answer

mobile e-commerce
question

Which of the following is not true about the use of apps? A.) Google can use Web crawlers to index apps. B.) Users spend more time using apps than they do using desktops or mobile Web sites. C.) The average U.S. consumer spends about 2 hours a day using apps. D.) Apps are easier to control and monetize than Web sites.
answer

Google can use Web crawlers to index apps.
question

Which of the following statements is not true? A.) Information systems researchers take a purely technical approach to e-commerce. B.) There are two primary approaches to e-commerce: behavioral and technical. C.) Management scientists are interested in e-commerce as an opportunity to study how business firms can exploit the Internet to achieve more efficient business operations. D.) No one academic perspective dominates research about e-commerce.
answer

Information systems researchers take a purely technical approach to e-commerce.
question

Above all, e-commerce is a ________ phenomenon. A.) finance-driven B.) sociological C.) technology-driven D.) government-driven
answer

technology-driven
question

The early years of e-commerce were driven by all of the following factors except: A.) a huge infusion of venture capital funds. B.) an emphasis on quickly achieving a very high market visibility. C.) visions of profiting from new technology. D.) an emphasis on exploiting traditional distribution channels.
answer

an emphasis on exploiting traditional distribution channels.
question

All of the following are issues facing Pinterest except: A.) spam. B.) competition. C.) copyright infringement. D.) inability to attract users.
answer

inability to attract users
question

E-commerce can be said to have begun in: A.) 1985. B.) 2001. C.) 1995. D.) 1983.
answer

1995
question

Which of the following is not a major business trend in e-commerce in 2013-2014? A.) Small businesses and entrepreneurs are hampered by the rising cost of market entry caused by increased presence of industry giants. B.) Social and mobile advertising begins to challenge search engine marketing. C.) Social e-commerce continues to grow. D.) Facebook grows to more than 1.1 billion users.
answer

Small businesses and entrepreneurs are hampered by the rising cost of market entry caused by increased presence of industry giants.
question

Which of the following is one of the three primary societal issues related to e-commerce? A.) individual privacy B.) equity C.) liability D.) anonymity
answer

individual privacy
question

Unfair competitive advantages occur when: A.) market middlemen are displaced. B .) information is equally distributed and transaction costs are low. C.) one competitor has an advantage others cannot purchase. D.) firms are able to gather monopoly profits.
answer

one competitor has an advantage others cannot purchase.
question

In the B2C arena, ________ was the first truly large-scale digitally enabled transaction system. A.) the French Minitel B.) EDI C.) the Baxter Healthcare system D.) Telex
answer

the French Minitel
question

In 2013, there were an estimated ________ Internet hosts. A.) 100 million B.) 1 billion C.) 1 million D.) 10 million
answer

1 billion
question

Which of the following is a characteristic of the Consolidation phase of e-commerce? A.) predominance of pure online strategies B.) first mover advantages C.) shift to a business-driven approach D.) emphasis on revenue growth versus profits
answer

shift to a business-driven approach
question

Which of the following is a characteristic of the Reinvention phase of e-commerce? A.) widespread adoption of consumer mobile devices B.) rapid growth of search engine advertising C.) widespread adoption of broadband networks D.) massive proliferation of dot-com start-ups
answer

widespread adoption of consumer mobile devices
question

Which of the following is the top-selling online retail category? A.) computers/electronics B.) mass merchant/department stores C.) office supplies D.) apparel/accessories
answer

computers/electronics
question

Which of the following is not an example of a social network? A.) Wikipedia B.) Tumblr C.) Twitter D.) Pinterest
answer

Wikipedia
question

Which of the following is a characteristic of e-commerce during the Invention period? A.) distintermediation B.) extensive government surveillance C.) mobile technology D.) earnings and profit emphasis
answer

distintermediation
question

Which of the following is the top online retailer ranked by online sales? A.) Walmart B.) Staples C.) Apple D.) Amazon
answer

Amazon
question

Which of the following is not true regarding e-commerce today? A.) The market middlemen disappeared. B.) There remains considerable persistent price dispersion. C.) Economists’ visions of a friction-free market have not been realized. D.) Consumers are less price-sensitive than expected.
answer

The market middlemen disappeared.
question

The early years of e-commerce were driven by all of the following factors except: A.) an emphasis on quickly achieving a very high market visibility. B.) an emphasis on exploiting traditional distribution channels. C.) visions of profiting from new technology. D.) a huge infusion of venture capital funds.
answer

an emphasis on exploiting traditional distribution channels.
question

All of the following are major business trends in e-commerce in 2013-2014 except for: A.) the expansion of the localization of e-commerce. B.) the emergence of a new social e-commerce platform. C.) the growth of a new app-based online economy. D.) the eclipse of search engine marketing by the mobile advertising platform.
answer

the eclipse of search engine marketing by the mobile advertising platform.
question

All of the following can be considered a precursor to e-commerce except: A.) Electronic Data Interchange. B.) Baxter Healthcare’s remote order entry system. C.) the French Minitel. D.) DNS.
answer

DNS.
question

Interactivity in the context of e-commerce can be described as the: A.) ability to physically touch and manipulate a product. B.) enabling of two-way communication between consumer and merchant. C.) complexity and content of a message. D.) ability of consumers to create and distribute content.
answer

enabling of two-way communication between consumer and merchant.
question

Business-to-consumer (B2C) e-commerce in the United States: A.) constitutes over 30% of the overall U.S. retail market. B.) is growing more slowly as it confronts its own fundamental limitations. C.) is expected to account for about $40 billion in total sales in 2013. D.) has grown at double-digit rates between 2010 and 2013.
answer

has grown at double-digit rates between 2010 and 2013.
question

All of the following are characteristics of Web 2.0 sites and applications except: A.) they rely on mobile access to the Web. B.) they present marketers with extraordinary opportunities for targeted marketing and advertising. C.) they are inherently highly interactive. D.) they tend to rely on user-generated content.
answer

they rely on mobile access to the Web.
question

The size of the B2B market in 2013 is estimated to be around: A.) $470 billion. B.) $4.7 billion. C.) $470 million. D.) $4.7 trillion.
answer

$4.7 trillion.
question

The early years of e-commerce are considered: A.) an economist’s dream come true, where for a brief time consumers had access to all relevant market information and transaction costs plummeted. B.) a stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year. C.) a dramatic business success as 85% of dot-coms formed since 1995 became flourishing businesses. D.) the most promising time in history for the successful implementation of first mover advantages.
answer

a stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year.
question

Which of the following is a mobile photo-sharing application? A.) Wikipedia B.) WordPress C.) Tumblr D.) Instagram
answer

Instagram
question

Which of the following are Amazon’s primary value propositions? A.) personalization and customization B.) management of product delivery C.) selection and convenience D.) reduction of price discovery cost
answer

selection and convenience
question

Your startup firm has developed Web-based note-taking software that allows participants to create and share virtual notes attached to existing Web pages. You anticipate marketing your online application to Web development and design companies. Which of the following revenue models is the most appropriate for your new company? A.) subscription B.) affiliate C.) transaction fee D.) advertising
answer

subscription
question

Which of the following is an example of the affiliate revenue model? A.) Gap.com B.) eBay C.) MyPoints D.) Yahoo
answer

MyPoints
question

________ and ________ are typically the most easily identifiable aspects of a company’s business model. A.) Value proposition; revenue model B.) Market strategy; market opportunity C.) Value proposition; competitive environment D.) Revenue model; market strategy
answer

Value proposition; revenue model
question

All of the following use an advertising revenue model except: A.) Google. B.) Yahoo. C.) Facebook. D.) Amazon.
answer

Amazon.
question

All of the following are business models employed by the music industry except: A.) cloud streaming. B.) download-and-own. C.) subscription. D.) peer-to-peer streaming.
answer

peer-to-peer streaming
question

An example of a company using the content provider model is: A.) eBay. B.) Dell. C.) Rhapsody.com. D.) Priceline.
answer

Rhapsody.com.
question

Which type of investor typically becomes interested in a start-up company after it has begun generating revenue? A.) venture capital investors B.) crowdfunders C.) incubators D.) angel investors
answer

venture capital investors
question

Which of the following is an unfair competitive advantage? A.) superior technology B.) access to global markets C.) lower product prices D.) brand name
answer

brand name
question

In general, the key to becoming a successful content provider is to: A.) own the content being provided. B.) own the technology by which content is created, presented, and distributed. C.) provide other services as well as online content. D.) provide online content for free.
answer

own the content being provided.
question

Which of the following is not a variation of the e-tailer business model? A.) bricks-and-clicks B.) market creator C.) manufacturer-direct D.) virtual merchant
answer

market creator
question

The overall retail market in the United States in 2013 was estimated at about: A.) $390 billion. B.) $39 trillion. C.) $3.9 trillion. D.) $39 billion.
answer

$3.9 trillion.
question

eBay uses all of the following business models except: A.) e-commerce infrastructure provider. B.) content provider. C.) B2C market creator. D.) C2C market creator.
answer

content provider.
question

Which of the following factors is not a significant influence on a company’s competitive environment? A.) the availability of supportive organizational structures B.) how competitors price their products C.) what the market share of each competitor is D.) how many competitors are active
answer

the availability of supportive organizational structures
question

Which of the following companies utilizes a transaction fee revenue model? A.) E*Trade B.) Twitter C.) WSJ.com D.) Sears.com
answer

E*Trade
question

The existence of a large number of competitors in any one market segment may indicate: A.) no one firm has differentiated itself within that market. B.) an untapped market niche. C.) a market that has already been tried without success. D.) the market is saturated.
answer

the market is saturated.
question

Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time? A.) personalization B.) global reach C.) interactivity D.) richness
answer

global reach
question

Which of the following is an example of the subscription revenue model? A.) Ancestry.com B.) Twitter C.) Amazon D.) eBay
answer

Ancestry.com
question

A business document that specifically details how you plan on selling your product and find new customers is called a: A.) business plan. B.) sales analysis. C.) market strategy. D.) competitive strategy.
answer

market strategy.
question

Exostar is an example of a(n): A.) private industrial network. B.) industry consortium. C.) e-distributor. D.) exchange.
answer

industry consortium.
question

One of the competitive advantages of a B2B service provider is that it can spread the cost of an expensive software system over many users, achieving efficiencies referred to as: A.) network externalities. B.) network efficiencies. C.) application efficiencies. D.) scale economies.
answer

scale economies.
question

What is the primary revenue model for an e-distributor? sales subscription advertising transaction fee
answer

sales
question

All of the following may lead to a competitive advantage except: better employees. fewer products. superior products. less expensive supplier
answer

fewer products.
question

Which of the following is not a primary activity in a firm value chain? finance/accounting inbound logistics operations sales and marketing
answer

finance/accounting
question

All of the following can be considered a direct or indirect competitor of Amazon.com except: Apple’s iTunes Store. eBay. Barnesandnoble.com. Starbucks.
answer

Starbucks.
question

_______ create and sell access to digital electronic markets. E-procurement firms Market creators E-distributors Portals
answer

E-procurement firms
question

Over the past decade, the number of exchanges has: greatly increased. stayed about the same. diminished sharply. increased slowly but steadily.
answer

diminished sharply.
question

Which of the following is not a community provider? Facebook Pinterest Priceline LinkedIn
answer

Priceline
question

ssume you are analyzing the market opportunity of a distance learning company, Learnmore.com, that creates education courses delivered over the Internet for the Fortune 1000 corporate market. Assume that the overall size of the distance learning market is $25 billion. The overall market can be broken down into three major market segments: Corporate, College, and Elementary/High School, each of which accounts for a third of the market. Within the Corporate market, there are two market niches: Fortune 1000, which accounts for 60% of the market, and all others, which together account for 40% of the market. What is Learnmore.com’s realistic market opportunity, approximately? $6.6 billion $25 billion $165 billion $5 billion
answer

$5 billion
question

The element of a business model that is responsible for making the model work is: the market strategy. the firm’s key competitive advantage. the organizational structure. the management team.
answer

the management team.
question

________ is a utility program that allows you to check the connection between your client and a TCP/IP network. Finger Ping Tracert Telnet
answer

Ping
question

Which of the following is not one of the basic technological foundations of the Internet? client/server computing packet-switching hardware TCP/IP communications protocol Tracert
answer

Tracert
question

During which phase of the development of the Internet was ARPANET invented? Innovation phase Institutional phase Consolidation phase Commercialization phase
answer

Institutional phase
question

During which period of time did the Institutionalization phase of Internet development take place? 1975-1995 1995-through the present 1950-1960 1961-1974
answer

1975-1995
question

Where does TSL operate within TCP/IP? between the Network Interface Layer and the Transport Layer between the Internet Layer and the Application Layer between the Internet Layer and the Transport Layer between the Transport Layer and the Application Layer
answer

between the Transport Layer and the Application Layer
question

Which of the following is not true about the mobile platform? The number of cell phones worldwide exceeds the number of PCs. About a third of the world’s cell phones are smartphones. Most smartphones use Microsoft’s operating system, Windows Mobile. Unlike PCs, smartphones do not need fans.
answer

Most smartphones use Microsoft’s operating system, Windows Mobile.
question

The Internet Layer of TCP/IP is responsible for which of the following? addressing, packaging, and routing messages providing a variety of applications with the ability to access the services of the lower layers providing communication with the application by acknowledging and sequencing the packets to and from the application placing packets on and receiving them from the network medium
answer

addressing, packaging, and routing messages
question

Which of the following is the core communications protocol for the Internet? SSL FTP TCP/IP Telnet
answer

TCP/IP
question

In the address http://www.company.com/clients.html, which of the following is the top-level domain? http company.com .com www
answer

.com
question

The Transport Layer of TCP/IP is responsible for which of the following? placing packets on and receiving them from the network medium addressing, packaging, and routing messages providing a variety of applications with the ability to access the services of the lower layers providing communication with the application by acknowledging and sequencing the packets to and from the application
answer

providing communication with the application by acknowledging and sequencing the packets to and from the application
question

________ is a unique virtual laboratory for exploring future internets at scale, to promote innovations in network science and technologies. Internet2 Internet of Things GENI ARPANET
answer

GENI
question

Which of the following is a Web 2.0 service or application? e-mail IM online forums wikis
answer

wikis
question

The backbone of the Internet is formed by: Network Service Providers (NSPs). Internet Service Providers (ISPs). Internet Exchange Points (IXPs). Metropolitan Area Exchanges (MAEs).
answer

Network Service Providers (NSPs).
question

The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called: VoIP. IP. IPTP. VTP.
answer

VoIP.
question

________ is a model of computing in which firms and individuals obtain computing power and software applications over the Internet, rather than purchasing and installing it on their own computers. Mobile computing Client/server computing Cloud computing P2P computing
answer

Cloud computing
question

The concept behind document formatting had its roots in which of the following? GML XML HTML SGML
answer

GML
question

Siri is a type of: social network. gadget. intelligent personal assistant. widget.
answer

intelligent personal assistant.
question

You could expect to find all of the following services in a Web server software package except: an RSS aggregator. security services. data capture. FTP.
answer

an RSS aggregator.
question

The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices. Internet Engineering Steering Group (IESG) Internet Engineering Task Force (IETF) World Wide Web Consortium (W3C) Internet Society (ISOC)
answer

Internet Society (ISOC)
question

Which of the following is not a limitation of the current Internet? limited bandwidth, which causes congestion and cannot adequately handle video and voice traffic the continued reliance on cables and wires for connectivity architectural restrictions, which stipulate that numerous requests for the same file must each be answered individually, slowing network performance the difficulty in expanding capacity by adding servers and clients
answer

the difficulty in expanding capacity by adding servers and clients
question

Which of the following is currently the most popular Web browser? Firefox Internet Explorer Chrome Netscape
answer

Internet Explorer
question

TCP/IP operates in which layer of Internet architecture? Network Technology Substrate layer Middleware Services layer Transport Services and Representation Standards layer Applications layer
answer

Transport Services and Representation Standards layer
question

Which of the following organizations coordinates the Internet’s systems of unique identifiers, such as IP addresses and top-level domain systems? ICANN W3C IAB IETF
answer

W3C
question

The major technologies used with wireless local area networks are: Bluetooth and 3G. Wi-Fi and Bluetooth. Wi-Fi and WiMax. WiMax and 3G.
answer

Wi-Fi and Bluetooth
question

Which of the following occurred during the Commercialization phase of Internet development? NSF privatized the operation of the Internet’s backbone. The Domain Name System was introduced. The fundamental building blocks of the Internet were realized in actual hardware and software Large mainframes on different college campuses were linked.
answer

NSF privatized the operation of the Internet’s backbone.
question

Which of the following is a Web application that enables Internet users to communicate with each other, although not in real time? IM VoIP online chat online forum
answer

online forum
question

Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture? Wi-Fi IPv6 client/server networking fiber optics
answer

client/server networking
question

A(n) ________ is a Web application that allows users to easily add and edit content on a Web page. RSS feed wiki podcast blog
answer

wiki
question

The natural language convention used to represent IP addresses is called the: Internet protocol addressing schema. domain name system. assigned numbers and names (ANN) system. uniform resource locator system.
answer

domain name system.
question

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called: routing. the Transmission Control Protocol. the File Transfer Protocol. packet switching.
answer

packet switching.
question

Which of the following is an example of a CMS? Oracle WebTrends Analytics WordPress Apache
answer

WordPress
question

Which of the following would you use to identify orphan files? data capture tools HTTP site management tools FTP
answer

site management tools
question

________ involves testing a site program’s modules one at a time. Unit testing Implementation testing System testing Acceptance testing
answer

Unit testing
question

Which of the following is an example of dynamic content? home page graphic product descriptions blog posts product photographs
answer

blog posts
question

What are the two most important management challenges in building a successful e-commerce presence? developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives having an accurate understanding of your business environment and an achievable business plan identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site building a team with the right skill sets and closely managing the development process
answer

developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives
question

Which of the following types of sites typically needs a high percentage of secure pages? publishing/subscription customer self-service trading Web services
answer

trading
question

The term stateless refers to the fact that: the server does not have to maintain an ongoing dedicated interaction with the client computer. no one government entity controls the Internet. Web servers may maintain multiple instances of server software to handle requests. system performance degrades as more simultaneous users require service.
answer

the server does not have to maintain an ongoing dedicated interaction with the client computer.
question

Which of the following types of servers monitors and controls access to a main Web server and implements firewall protection? list server mail server groupware server proxy server
answer

proxy server
question

All of the following are basic functionality provided by Web servers except: data capture tools. a shopping cart. security services. site management tools.
answer

a shopping cart.
question

The primary way a Web site is able to personalize the content presented to a visitor is through the use of: privacy policies. accessibility rules. cookies. site management tools.
answer

cookies.
question

Which system functionality must your Web site have in order to be able to personalize or customize a product for a client? an ad server customer on-site tracking a site tracking and reporting system an inventory management system
answer

customer on-site tracking
question

In order from beginning to end, the major steps in the SDLC, are: systems analysis/planning; systems design; building the system; testing; and implementation. systems analysis/planning; systems design; building the system; implementation; and testing. systems design; testing; building the system; and implementation. systems analysis/planning; implementation; building the system; and testing
answer

systems analysis/planning; systems design; building the system; testing; and implementation.
question

Which of the following types of sites typically tends to have high to very high page views (hits)? trading customer self-service Web services publishing/subscription
answer

publishing/subscription
question

Which of the following is the least expensive path to creating a mobile Internet presence? building a mobile Web app using Java resizing an existing Web site for mobile use developing a native app building a mobile Web app using HTML
answer

resizing an existing Web site for mobile use
question

All of the following are important factors in Web site optimization except: selecting keywords and page titles. adhering to accessibility guidelines. buying search engine ads. identifying market niches for your services or products.
answer

adhering to accessibility guidelines.
question

Which of the following is not a main factor in determining overall demand for an e-commerce site? number of items in inventory type of content static file sizes security required
answer

static file sizes
question

________ are the types of information systems capabilities needed to meet business objectives. Physical design specifications System functionalities System design specifications Information requirements
answer

System functionalities
question

Which of the following is not an open source software tool? WebSphere MySQL PHP Apache
answer

WebSphere
question

Which of the following is used to process certificates and private/public key information? FTP data capture tools SSL HTTP
answer

SSL
question

________ verifies that the business objectives of the system as originally conceived are in fact working. Acceptance testing Unit testing Implementation testing System testing
answer

Acceptance testing
question

All of the following are steps one can take to right-size a Web site’s hardware platform and meet demands for service except: scaling hardware horizontally. replacing static pages with dynamically generated pages. improving processing architecture. scaling hardware vertically.
answer

replacing static pages with dynamically generated pages.
question

An e-commerce site that cost $25,000 to develop is likely to require a yearly maintenance budget of approximately: You Answered $10,000. $50,000. $25,000. $5,000.
answer

$25,000
question

Which of the following technologies could you use to place the content of your Web site in a database so that you can then dynamically generate requests for pages? Apache web server CMS shopping cart proxy server
answer

CMS
question

The cost of hardware, software, and telecommunications services needed to build a Web site have ________ over the last decade. decreased slightly decreased dramatically increased moderately increased dramatically
answer

decreased dramatically
question

The leading Web server software is: Apache. Microsoft Internet Information Server. Google Enterprise Server. Linux.
answer

Apache.
question

All of the following are Web site design features that annoy customers except: slow-loading pages. redundant navigation. pop-under ads. splash pages.
answer

redundant navigation.
question

Which of the following is not a type of application server? mail server FTP server ad server proxy server
answer

FTP server
question

Advantages of dynamic page generation include all of the following except: lowered menu costs. nearly cost-free price discrimination. market segmentation. client-side execution of programming.
answer

client-side execution of programming
question

All of the following are basic functionality provided by e-commerce merchant server software except: marketing software. a product catalog. credit card processing. a shopping cart.
answer

marketing software.
question

Which of the following is not one of the basic business objectives for an e-commerce site? provide production and supplier links display goods execute a transaction optimize system architecture
answer

optimize system architecture
question

Which of the following dimensions of e-commerce security is not provided for by encryption? nonrepudiation confidentiality availability message integrity
answer

availability
question

All of the following are methods of securing channels of communication except: certificates. SSL/TLS. FTP. VPN.
answer

FTP.
question

None of the following payment systems offers immediate monetary value except: accumulating balance. stored value/debit card. credit cards. personal checks.
answer

stored value/debit card.
question

What is the most frequent cause of stolen credit cards and card information today? sniffing programs lost cards the hacking and looting of corporate servers storing credit card information phishing attacks
answer

the hacking and looting of corporate servers
question

________ refers to the ability to ensure that e-commerce participants do not deny their online actions. Availability Authenticity Integrity Nonrepudiation
answer

Nonrepudiation
question

Which of the following is not an example of a PUP? You Answered adware drive-by download browser parasite spyware
answer

drive-by download
question

Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other? DES text messaging IM NFC
answer

NFC
question

All the following statements about symmetric key encryption are true except: the Data Encryption Standard is a symmetric key encryption system. in symmetric key encryption, both the sender and the receiver use the same key to encrypt and decrypt a message. symmetric key encryption is computationally slower. symmetric key encryption is a key element in digital envelopes.
answer

symmetric key encryption is computationally slower.
question

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. Nonrepudiation Availability Authenticity Integrity
answer

Authenticity
question

All of the following statements about PKI are true except: The term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties. PKI guarantees that the verifying computer of the merchant is secure. The acronym PKI stands for public key infrastructure. PKI is not effective against insiders who have a legitimate access to corporate systems including customer information.
answer

PKI guarantees that the verifying computer of the merchant is secure.
question

All of the following statements about public key encryption are true except: public key encryption uses two mathematically related digital keys. public key encryption is based on the idea of irreversible mathematical functions. public key encryption ensures authentication of the sender. public key encryption does not ensure message integrity.
answer

public key encryption ensures authentication of the sender.
question

Which of the following countries has been found to have engaged in cyberespionage against Google? Russia China Iraq Iran
answer

China
question

Which of the following left the WikiLeaks Web site effectively inoperable in August 2012? DDoS attack botnet SQL injection attack browser parasite
answer

DDoS attack
question

Linden Dollars, created for use in Second Life, are an example of: virtual currency. digital cash. EBPP. peer-to-peer payment systems.
answer

virtual currency.
question

Malware that comes with a downloaded file that a user requests is called a: PUP. Trojan horse. backdoor. drive-by download.
answer

drive-by download.
question

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use: an authorization management system. access controls. security tokens. an authorization policy.
answer

an authorization management system.
question

Which of the following is a prominent hacktivist group? Anti-Phishing Working Group IC3 Symantec Anonymous
answer

Anonymous
question

All of the following are factors in contributing to the increase in cybercrime except: the ability to remotely access the Internet. the Internet is an open, vulnerable design. the ability to anonymously access the Internet. the Internet’s similarity to telephone networks.
answer

the Internet’s similarity to telephone networks.
question

Proxy servers are also known as: application gateways. firewalls. packet filters. dual home systems.
answer

dual home systems.
question

What is the first step in developing an e-commerce security plan? Perform a risk assessment. Perform a security audit. Develop a security policy. Create a security organization.
answer

Perform a risk assessment.
question

The research firm Cybersource estimated that online credit card fraud in the United States amounted to about ________ in 2012. $3.5 billion $35 million $35 billion $350 million
answer

$3.5 billion
question

Bitcoins are an example of: digital cash. virtual currency. an EBPP system. a stored value payment system.
answer

digital cash.
question

Online bill payments are believed to cost ________ to process compared to ________ for paper bills. 20 to 30 cents, $3 to $7 $10 to $20, $ 1 to $2 3 to $7, 20 to 30 cents $1 to $2, $10 to $20
answer

20 to 30 cents, $3 to $7
question

Most of the world’s spam is delivered via which of the following? botnets worms viruses Trojan horses
answer

botnets
question

Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012? SSL/TLS two-factor authentication anti-virus software firewall
answer

two-factor authentication
question

In the United States, the primary form of online payment is: debit cards. PayPal. Google Wallet. credit cards.
answer

credit cards.
question

An intrusion detection system can perform all of the following functions except: setting off an alarm when suspicious activity is detected. checking network traffic to see if it matches certain patterns or preconfigured rules. blocking suspicious activity. examining network traffic.
answer

blocking suspicious activity.
question

All of the following are examples of malicious code except: bots. sniffers. worms. viruses.
answer

sniffers.
question

Which of the following is not an example of an access control? proxy servers login passwords digital signatures firewalls
answer

digital signatures
question

Which of the following is an example of an integrity violation of e-commerce security? A customer denies that he or she is the person who placed the order. An unauthorized person intercepts an online communication and changes its contents. A merchant uses customer information in a manner not intended by the customer. A Web site is not actually operated by the entity the customer believes it to be.
answer

An unauthorized person intercepts an online communication and changes its contents.
question

Conversion rate is a measure of the: percentage of visitors who indicate an interest in a site’s products by registering or visiting a product’s pages. percentage of shoppers who do not return within a year after their initiall percentage of visitors who become customers. percentage of existing customers who continue to buy on a regular basis.
answer

percentage of visitors who become customers
question

Which of the following measures the ratio of items purchased to product views? conversion rate browse-to-buy ratio view-to-cart ratio cart conversion rate
answer

browse-to-buy ratio
question

Search engine advertising and marketing expenditures in 2013 were approximately: $1.95 billion. $195 million. $19.5 billion. $19 million.
answer

$19.5 billion.
question

Which of the following is not one of the four main methods advertisers use to behaviorally target ads? integration of offline data clickstream data data collected from social networks Nielsen ratings
answer

Nielsen ratings
question

Recency refers to the: percentage of customers who do not return during the next year after an initial purchase. percentage of existing customers who continue to buy on a regular basis. time elapsed since the last action taken by a customer. percentage of customers who return to the site within a year to make additional purchases.
answer

time elapsed since the last action taken by a customer.
question

If you want to determine the size of your Web site’s audience, the metric you will use for the most accurate measurement will be: unique visitors. page views. hits. reach.
answer

unique visitors.
question

All of the following are traditional online marketing tools except: e-mail and permission marketing. sponsorship marketing. affiliate marketing. social marketing.
answer

social marketing.
question

Hits are a measure of the: number of times an ad is served. number of http requests. number of pages viewed. number of times an ad is clicked
answer

number of http requests.
question

Which of the following is not one of the main stages of the online purchasing process? browsing interaction awareness post-purchase service and loyalty
answer

browsing
question

A Crayola arts-and-crafts column on a parenting Web site is an example of what form of advertising? public relations affiliate relationship banner swapping sponsorship
answer

sponsorship
question

Acquisition rate is a measure of the: percentage of visitors who become customers. percentage of visitors who indicate an interest in a site’s products by registering or visiting a product’s pages. percentage of existing customers who continue to buy on a regular basis. percentage of shoppers who do not return within a year after their initial purchase.
answer

percentage of visitors who indicate an interest in a site’s products by registering or visiting a product’s pages.
question

Which of the following statements about the Internet’s impact on marketing is not true? The Internet has increased the richness of marketing communications. The Internet has decreased the impact of brands. The Internet has expanded the information intensity of the marketplace. The Internet has broadened the scope of marketing communications.
answer

The Internet has decreased the impact of brands.
question

Creating multiple variations of information goods and selling these to different market segments at different prices is called: versioning. dynamic pricing. bundling. customization.
answer

versioning.
question

Studies of the effects of social “connectedness” on Internet purchases indicate that the more “connected” an individual: the less purchasing that individual does. the less that individual is influenced by friends’ purchases. the more purchasing that individual does. the more that individual shares purchasing decisions with friends.
answer

the less that individual is influenced by friends’ purchases.
question

A ________ is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customr customer service chat system transactive content system data warehouse CRM system
answer

CRM system
question

The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time. bait-and-switch search engine marketing flash marketing yield management
answer

flash marketing
question

The Nike iD program is an example of which of the following marketing techniques? customer co-production price discrimination permission marketing transactive content
answer

customer co-production
question

Approximately ________ of annual offline retail sales is influenced by online browsing. one-quarter one-half three-quarters one-third
answer

one-third
question

View-through rate measures the ________ response rate to an ad. 30-minute 7-day 24-hour 30-day
answer

30-day
question

Which of the following online advertising formats attracted the least amount of spending in 2013? classifieds search rich media e-mail
answer

e-mail
question

All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except: search engines. targeted banner ads. social networks. online catalogs.
answer

targeted banner ads.
question

All of the following are fixed price strategies except: free pricing. versioning. bundling. yield management.
answer

yield management.
question

The incremental cost of building the next unit of a good is called the: fixed cost. marginal cost. demand curve. variable cost
answer

marginal cost.
question

________ is an industry-standard database query and manipulation language. JSP PHP SQL DBMS
answer

SQL
question

Which of the following is the top concern of Internet users about purchasing online? difficulty of returning products shipping costs lack of trust in the purchase process inability to see and touch before buying
answer

lack of trust in the purchase process
question

Which of the following is the most important tool in establishing a relationship with the customer? company Web site search engine display ads company CRM system Facebook
answer

company Web site
question

Which of the following examples illustrates the “Long Tail” phenomenon? The number of blockbuster “winner take all” video titles is declining. Over 50% of Netflix’s 100,000 titles are rented at least once a day by someone. Rhapsody music streaming service reported that its no play rate had increased to over 20%. The average blog has a readership of slightly more than 1.
answer

Over 50% of Netflix’s 100,000 titles are rented at least once a day by someone.
question

Which of the following online advertising formats is the most effective? banner ads video ads rich media ads e-mail
answer

video ads
question

Which of the following forms of online advertising is growing the fastest? rich media paid search sponsorships video
answer

video
question

All of the following statements about cookies are true except: the more cookies are deleted, the less accurate ad server metrics become. cookies make shopping carts possible by allowing a site to keep track of a user’s actions. cookies can be used with Web bugs to create cross-site profiles of users. the data typically stored in cookies includes a unique ID and e-mail address.
answer

the data typically stored in cookies includes a unique ID and e-mail address.

Get instant access to
all materials

Become a Member