IST test 2 – Flashcards

Unlock all answers in this set

Unlock answers
question
Electronic commerce is used to conduct business with professional partners such as suppliers and intermediaries. This form of EC is commonly referred to as ________ electronic commerce.
answer
business-to-business
question
Which of the following statements is true about electronic commerce? A) Business-to-business is by far the largest form of electronic commerce in terms of revenues. B) Electronic commerce is limited to transactions between businesses and consumers. C) Electronic commerce between businesses and their employees is impossible. D) All forms of electronic commerce involve business firms. E) Consumer-to-consumer electronic commerce is a complete reversal of the traditional business-to-consumer electronic commerce.
answer
A
question
Which of the following is an example of business-to-consumer electronic commerce? A) Brenda files her income tax online. B) Kobbler, a shoe manufacturer, conducts business over the Web with its retailers. C) Juan buys Kevin's guitar on eBay.com. D) Reuben buys a pair of shoes on Yebhi.com. E) Sandra, an employee, uses the Web to make a change in her health benefits.
answer
D
question
The auction site eBay.com is an example of ________ electronic commerce. A) business-to-business B) consumer-to-consumer C) business-to-consumer D) consumer-to-business E) government-to-business
answer
B
question
Which of the following is an example of consumer-to-consumer electronic commerce? A) Niobi makes an online deposit of $5,000 into her friend Carla's account as she needs financial help. B) Heath buys a gift for Vannessa from Amazon.com. C) Blanco, a manufacturer, conducts business over the Web with its retailers. D) Ted files his income tax online. E) Marty buys Lobsang's mountaineering equipment from eBay.com.
answer
E
question
Ben buys an Olympus E-PL2 from Sony which starts malfunctioning. When he opts for an exchange, the customer representative says that an exchange or repair is not possible because the damage was of a physical nature and not covered under warranty. Which of the following consequences, if true, would be an example of consumer-to-consumer electronic commerce? A) Ben sells the Olympus E-PL2 to Balvinder Singh in India through eBay.com. B) Ben files an online suit against Sony. C) Ben files a complaint on Sony's Web site asking for an escalation. D) Ben buys a Canon G 12 from Sony's online store. E) Ben sells the Olympus E-PL2 to the world's largest used camera dealer KEH.com.
answer
A
question
A state agency reporting birth and death information to the U.S. Social Security Administration using the Internet is an example of ________ electronic commerce. A) business-to-consumer B) government-to-citizen C) government-to-business D) government-to-government E) business-to-business
answer
D
question
Which of the following is a result of global information dissemination? A) Firms link Web sites to corporate databases to provide real-time access to personalized information. B) Firms tailor their products and services to meet a customer's particular needs on a large scale. C) Firms market their products and services over vast distances. D) Firms provide immediate communication and feedback to and from customers. E) Firms provide ways for clients and firms to conduct business online without human assistance.
answer
C
question
Which of the following actions explains mass customization? A) Firms tailor their products and services to meet a customer's particular needs on a large scale. B) Firms provide immediate communication and feedback to and from customers. C) Firms provide ways for clients and firms to conduct business online without human assistance. D) Firms market their products and services over vast distances. E) Firms link Web sites to corporate databases to provide real-time access to personalized information.
answer
A
question
The phenomenon of cutting out the "middleman" and reaching customers more directly and efficiently is known as ________. A) gentrification B) demutualization C) defalcation D) dissemination E) disintermediation
answer
E
question
Which of the following is an example of disintermediation? A) Land Rover markets most of its four-wheel drives in high altitude regions where vehicles require more power. B) Dunkin' Donuts expanded its menu beyond breakfasts by adding hearty snacks that substitute for meals, consisting of items like Dunkin' Dawgs, hot dogs wrapped in dough. C) Gatorade Thirst Quencher is a market leader in sports drinks. It is now planning to market its drinks to working women in urban areas. D) OakTeak, a furniture manufacturing firm, started selling directly to its customers after it experienced a dip in sales due to channel conflicts between retailers. E) A luxury car company creates a hybrid line of automobiles for consumers who are concerned about the environment.
answer
D
question
________ refers to the design of business models that reintroduce middlemen in order to reduce the challenges brought on by dealing directly with customers. A) Reintermediation B) Remutualization C) Gentrification D) Defalcation E) Reaffirmation
answer
A
question
Which of the following is an example of reintermediation? A) The black Centurian card is issued by invitation only to customers who spend more than $250,000 a year on other American Express cards. B) P&G acquires a list of parents-to-be and showers them with samples of Pampers and other baby products to capture a share of their future purchases. C) Kambo, a fashion apparel company that deals directly with customers to sell its products, added retailers to its supply chain to cater to its target audience in remote geographic locations. D) OakTeak, a furniture manufacturing firm, started selling directly to its customers after it experienced a dip in sales due to channel conflicts between retailers. E) Dunkin' Donuts expanded its menu beyond breakfasts by adding hearty snacks that substitute for meals, consisting of items like Dunkin' Dawgs, hot dogs wrapped in dough.
answer
C
question
Companies following a ________ business strategy choose to operate solely in the traditional physical markets, approaching business activities in a traditional manner. A) click-only B) click-and-mortar C) bricks-and-clicks D) click-and-flip E) brick-and-mortar
answer
E
question
Which of the following statements is true about firms pursuing a brick-and-mortar business strategy? A) These firms avoid indulgence in physical store locations. B) These firms avoid indulgence in electronic commerce. C) These firms are only involved in export business activities. D) These firms indulge in rafter bidding activities. E) These firms operate in both physical and virtual arenas.
answer
B
question
Which of the following statements is true about companies pursuing a click-only business strategy? A) These companies approach business activities by operating physical locations. B) These companies operate in both physical and virtual arenas. C) These companies conduct business electronically in cyberspace. D) These companies are only involved in export business activities. E) These companies choose to operate their business activities solely in the traditional manner.
answer
C
question
Without middlemen like Travelocity.com, Orbitz.com, and other travel Web sites, a consumer would have to check all airline Web sites in order to find the flight with the best connection or lowest price. This introduction of middlemen in business models is an example of ________. A) reintermediation B) remutualization C) gentrification D) disintermediation E) defalcation
answer
A
question
Companies using a ________ business strategy are also called virtual companies. A) click-and-flip B) click-only C) brick-and-mortar D) bricks-and-clicks E) click-and-mortar
answer
B
question
Online retailer Amazon.com is an example of a ________ company. A) click-and-mortar B) click-and-flip C) bricks-and-clicks D) click-only E) brick-and-mortar
answer
D
question
In e-business terminology, ________ companies are sometimes called "pure play companies." A) bricks-and-clicks B) click-and-mortar C) brick-and-mortar D) click-and-flip E) click-only
answer
E
question
Bookseller Barnes & Noble is an example of a ________ company. A) flip-only B) click-only C) click-and-mortar D) click-and-flip E) brick-and-mortar
answer
C
question
A click-and-mortar business strategy is also referred to as a ________ business strategy. A) click-and-flip B) brick-and-mortar C) click-only D) bricks-and-clicks E) brick-and-flip
answer
D
question
Which of the following statements is true about firms pursuing a click-and-mortar business strategy? A) These firms are only involved in export business activities B) These firms operate in both physical and virtual arenas. C) These firms are involved in rafter bidding activities. D) These firms conduct business only electronically in cyberspace. E) These firms avoid indulgence in physical store locations.
answer
B
question
EZBiz, the brainchild of three college friends, is a startup venture which plans to produce and market sports gear. They are currently trying to decide between a bricks-and-clicks strategy and a click-only strategy. Which of the following, if true, would most undermine the decision to adopt a click-only strategy? A) The company has limited access to funds and is looking to keep its costs low. B) The public is wary of sharing confidential information after a recent spate of credit card scandals. C) A competitor is facing severe backlash after inadvertently releasing sensitive data into the public domain. D) Several companies who have switched from brick-and-mortar strategy to a click-only are experiencing severe channel conflicts. E) Some click-only companies have been unable to achieve economies of scale and subsequently are unable to offer lower prices.
answer
B
question
Paying businesses that bring or refer customers to another business is known as ________. A) affiliate marketing B) subscription marketing C) viral marketing D) stealth marketing E) buzz marketing
answer
A
question
With respect to typical revenue models for electronic commerce businesses, Symantec and Norton are using a(n) ________ revenue model. A) subscription B) licensing C) affiliate marketing D) brokerage E) traditional sales
answer
B
question
With respect to typical revenue models for electronic commerce businesses, Nordstrom.com and iTunes.com are using a(n) ________ revenue model. A) brokerage B) subscription C) affiliate marketing D) traditional sales E) licensing
answer
D
question
With respect to typical revenue models for electronic commerce businesses, Netflix.com is using a(n) ________ revenue model. A) licensing B) affiliate marketing C) traditional sales D) subscription E) transaction fees
answer
D
question
With respect to typical revenue models for electronic commerce businesses, PayPal.com, eBay.com, and Groupon.com are using a(n) ________ revenue model. A) transaction fees B) licensing C) affiliate marketing D) traditional sales E) subscription
answer
A
question
In the ________ stage of business-to-consumer electronic commerce, dissemination of promotional and marketing material like providing electronic brochures takes place. A) e-transaction B) e-information C) e-subscription D) e-integration E) e-reintermediation
answer
B
question
The ________ stage of business-to-consumer electronic commerce provides customers with the ability to obtain personalized information by querying corporate databases and other information sources. A) e-reintermediation B) e-transaction C) e-integration D) e-information E) e-subscription
answer
C
question
The ________ stage of business-to-consumer electronic commerce allows customers to place orders and make payments. A) e-integration B) e-reintermediation C) e-subscription D) e-information E) e-transaction
answer
E
question
Which of the following provides customers with the ability to obtain personalized information by querying corporate databases and other information sources? A) e-filing B) e-integration C) e-information D) e-transaction E) e-tailing
answer
B
question
Walmart.com is an example of a ________ retailer. A) brick-and-mortar B) click-only C) bricks-and-clicks D) click-and-flip E) brick-and-flip
answer
C
question
In ________ pricing, companies set the prices that consumers pay for products. A) viral B) top-up C) menu-driven D) reverse E) rafter bid
answer
C
question
The online sales of goods and services is known as ________. A) e-information B) e-integration C) e-tailing D) e-collaboration E) e-filing
answer
C
question
Which of the following occurs in a reverse pricing model? A) Customers specify the product they are looking for and how much they are willing to pay for it. B) Companies set the prices that customers pay for products. C) Companies conduct an online auction for all products available for sale. D) Customers specify the product they are looking for and the company provides the product with a price. E) Companies negotiate special volume discounts with local businesses and offer them to their customers.
answer
A
question
How do comparison shopping sites generate revenue? A) by charging a commission on transactions B) by selling their products in physical stores also C) by charging a virtual shelf-space fee to manufacturers D) by increasing the click-count on their site E) by charging distribution fees to consumers
answer
A
question
The concept of the Long Tail refers to a focus on ________. A) brand evangelism B) broad markets C) generic brands D) brand dilution E) niche markets
answer
E
question
Which of the following is a disadvantage of e-tailing? A) It is limited by physical store and shelf space restrictions. B) It requires additional time for products to be delivered. C) It complicates the process of comparison shopping. D) It restricts companies to effectively compete on price. E) It reduces a company's inventory turnover time.
answer
B
question
Within the context of e-tailing, ________ are two-dimensional barcodes with a high storage capacity which are typically used to point the consumer to a particular Web page when he or she scans the barcode with a mobile device's camera. A) viral codes B) QR codes C) MSI barcodes D) maxicodes E) CPC binary barcodes
answer
B
question
With respect to e-tailing, ________ codes can initiate certain actions, such as make a phone call to a sales representative, or send a text message to a pre-specified number. A) maxi B) CPC binary C) viral D) MSI E) QR
answer
E
question
Which of the following characteristics of the Web influences the Web site's security and performance? A) structural firmness B) functional convenience C) cost compliance D) representational delight E) disintermediation capacity
answer
A
question
Which of the following characteristics of the Web deals with making the interaction with the Web site easier or more convenient? A) representational delight B) cost compliance C) structural firmness D) disintermediation capacity E) functional convenience
answer
E
question
Which of the following characteristics of the Web deals with stimulating a consumer's senses? A) functional convenience B) cost compliance C) representational delight D) structural firmness E) disintermediation capacity
answer
C
question
Which of the following explains Web analytics? A) conducting online marketing research to improve product quality B) analyzing Web sites in order to find the best one in its category C) tracking all online purchasers to try and increase their frequency of visit to a particular Web site D) analyzing Web surfers' behavior in order to improve Web site performance E) analyzing Web sites in order to find the best online business practices
answer
D
question
A way to ensure that a company's site is on the first page users see when looking for a specific term is using ________ advertising. A) stealth B) viral C) buzz D) search E) affiliate
answer
D
question
Companies use ________ in an attempt to move up their Web sites in the organic search engine results. A) search engine image protection B) search engine optimization C) search engine keyword insertion D) search-oriented architecture E) domain stacking
answer
B
question
If a company's Web site is listed in the sponsored list of a search engine, the search engine receives revenue on a ________ basis. A) pay-per-click B) pay-per-sale C) click-through D) pay-per-conversion E) click-per-visit
answer
A
question
A recent trend in display advertising has been ________ advertising, where the ads placed on a page are in some way related to the content of that page. A) contextual B) buzz C) viral D) affiliate E) stealth
answer
A
question
The performance of a pay-per-click advertising model can be assessed by ________, which reflects the percentage of visitors who actually perform the marketer's desired action such as making a purchase. A) click fraud rate B) contextual search rate C) pop-up rate D) click-through rate E) conversion rate
answer
E
question
With respect to pay-per-click models, inflating the revenue to a host or increasing costs for the advertiser by repeatedly clicking on a link is called ________ fraud. A) link B) affiliate C) click D) conversion E) disintermediation
answer
C
question
Under the ________ pricing model, the firm running the advertisement pays only when a Web surfer actually clicks on the advertisement. A) pay-per-refresh B) pay-per-sale C) pay-per-click D) pay-per-conversion E) click-per-visit
answer
C
question
Click-through rate reflects ________. A) the ratio of surfers who visit a Web site divided by the number of surfers who clicked on an ad B) the ratio of surfers who click on an ad divided by the number of times it was displayed C) the percentage of visitors who actually perform the marketer's desired action D) the ratio of surfers who click on an ad divided by the number of people who make a purchase E) the ratio of surfers who visit a Web site divided by the number of people who make a purchase
answer
B
question
) ________ allows individual Web site owners to post companies' ads on their pages. A) Reverse marketing B) Stealth marketing C) Viral marketing D) Buzz marketing E) Affiliate marketing
answer
E
question
In ________, a site hosting an advertisement creates fake clicks in order to get money from the advertiser. A) competitive click fraud B) irate click fraud C) network click fraud D) shill click fraud E) rafter click fraud
answer
C
question
MakeYourClick is an online ad agency, which is known for its ability to create ads that lure customers to purchase. Brenda, an ex-employee of the firm, was fired from the agency on baseless grounds. An angry Brenda inflates MakeYourClick's online advertising cost by repeatedly clicking on the advertiser's link. Brenda has committed ________. A) competitive click fraud B) irate click fraud C) network click fraud D) shill click fraud E) rafter click fraud
answer
A
question
With respect to GPS-enabled location-based services, capturing specific locations to be viewed on the phone is an example of ________ service. A) location B) mapping C) navigation D) tracking E) disintegration
answer
B
question
With respect to GPS-enabled location-based services, the ability to give route directions from one point to another is an example of ________ service. A) mapping B) disintegration C) navigation D) reintegration E) tracking
answer
C
question
With respect to GPS-enabled location-based services, the ability to see another person's location is an example of ________ service. A) reintegration B) navigation C) mapping D) disintegration E) tracking
answer
E
question
A ________ is a form of e-auction in which the highest bid wins. A) reverse auction B) mystery auction C) top-up D) forward auction E) rafter bid
answer
D
question
A ________ is a form of e-auction where buyers post a request for quote. A) reverse auction B) rafter bid C) mystery auction D) forward auction E) top-up
answer
A
question
Which of the following forms of e-auction typically takes place on a business-to-business level? A) reverse auctions B) bartering C) exchanges D) forward auctions E) rafter bids
answer
C
question
Which of the following is a mechanism for consumer-to-consumer transactions? A) e-tailing B) e-integration C) e-filing D) e-tendering E) e-auctions
answer
E
question
Within the context of different types of e-auction fraud, bid shielding is sometimes called ________. A) bid skimming B) bid luring C) reverse bidding D) shill bidding E) rafter bidding
answer
D
question
Doug is a frequent visitor of online auction sites. He uses two different accounts to place a low followed by a very high bid on the desired item. This leads other bidders to drop out of the auction. He then retracts the high bid and wins the item at the low bid. This form of e-auction fraud is known as ________. A) shill bidding B) bid luring C) rafter bidding D) mystery bidding E) bid skimming
answer
A
question
Which of the following types of e-auction fraud is associated with the seller's failure to ship an item after the payment has been received? A) bid luring B) bid shielding C) non-shipment D) shipping fraud E) payment failure
answer
C
question
With respect to consumer-to-business e-commerce, ________ is used in order to have small, well-defined tasks performed by a scalable ad hoc workforce of everyday people. A) nearshoring B) insourcing C) offshoring D) crowdsourcing E) homesourcing
answer
D
question
Provoking bidders to leave a legitimate auction to buy the same item at a lower price outside the auction space, where return policies and buyer protection do not apply, is called ________. A) rafter bidding B) bid skimming C) bid luring D) bid shielding E) shill bidding
answer
C
question
With respect to credit cards and debit cards, ________ is a three-digit code located on the back of the card which is used for authorization by the card-issuing bank, to combat fraud in online purchases. A) competitive fraud detector B) card verification value C) online purchase processor D) card detection value E) purchase processing value
answer
B
question
E-filing is an example of a ________ tool. A) government-to-citizen B) consumer-to-consumer C) government-to-government D) consumer-to-business E) business-to-business
answer
A
question
(T/F) Electronic commerce is limited to transactions between businesses and consumers, which is known as business-to-consumer (B2C) EC.
answer
false
question
(T/F) Electronic commerce can involve the events leading up to the purchase of a product as well as customer service after the sale.
answer
true
question
(T/F) M-commerce is defined as any electronic transaction or information interaction conducted using a wireless, mobile device and mobile networks that leads to the transfer of real or perceived value in exchange for information, services, or goods.
answer
true
question
(T/F) Web technologies allow for integration of information via Web sites that can be linked to corporate databases to provide real-time access to personalized information.
answer
true
question
(T/F) When organizations undergo disintermediation, they have to take on those activities previously performed by the middleman.
answer
true
question
(T/F) Companies pursuing a click-only business strategy approach business activities in a traditional manner by operating physical locations.
answer
false
question
(T/F) Amazon.com is an example of a brick-and-mortar company.
answer
false
question
(T/F) Companies pursuing a click-and-mortar business strategy have no physical store locations, allowing them to focus purely on electronic commerce.
answer
false
question
(T/F) The greatest impact of the Web-based EC revolution has occurred in companies adopting the brick-and-mortar approach.
answer
false
question
(T/F) A click-and-mortar business strategy approach is also referred to as the bricks-and-clicks business strategy.
answer
true
question
(T/F) Click-only companies can often compete more effectively on price since they do not need to support the physical aspects of the click-and-mortar approach.
answer
true
question
(T/F) One of the challenges for brick-and-mortars involve increasing IS complexity.
answer
false
question
(T/F) Two major categories of e-transactions are the online sales of goods and services and financial transactions such as online banking.
answer
true
question
(T/F) The menu-driven pricing scheme transcends the reverse pricing system.
answer
false
question
(T/F) Web sites can offer a virtually unlimited number and variety of products because e-tailing is not limited by physical store and shelf space restrictions.
answer
true
question
(T/F) E-tailers can focus on the Long Tails.
answer
true
question
(T/F) For Web sites to be successful, structural firmness is a must.
answer
true
question
(T/F) One drawback of pay-per-click models is the possibility of abuse by repeatedly clicking on a link to inflate revenue to the host or increase the costs for the advertiser.
answer
true
question
(T/F) Bid luring is also known as shill bidding.
answer
fasle
question
(T/F) Government-to-business (G2B) EC does not involve businesses' relationships with all levels of government.
answer
false
question
Briefly explain with an example the capability of the Web to integrate information.
answer
Web technologies allow for integration of information via Web sites that can be linked to corporate databases to provide real-time access to personalized information. No longer must customers rely on old information from printed catalogs or account statements that arrive in the mail once a month. For example, like nearly every other major airline, US Airways (www.usairways.com) dynamically adjusts fares based on availability, booking time, current and historical demand, forecast demand, and other factors to maximize revenues; the most current fares are disseminated in real-time on the company's Web site. This is particularly important for companies operating in highly competitive environments such as the air transport industry. Furthermore, US Airways offers their valued customers the ability to check the balances of their frequent-flier accounts, linking customers to information stored on the firm's corporate database. Customers do not have to wait for monthly statements to see if they are eligible for travel benefits and awards.
question
Explain the different electronic commerce (EC) business strategies.
answer
There are three different electronic commerce business strategies. • Brick-and-mortar business strategy: Companies following this business strategy choose to operate solely in the traditional physical markets. These companies approach business activities in a traditional manner by operating physical locations such as retail stores, and not offering their products or services online. • Click-only business strategy: Companies following this business strategy (i.e., virtual companies) conduct business electronically in cyberspace. These firms have no physical store locations, allowing them to focus purely on EC. In e-business terminology, click-only companies are sometimes called "pure play companies," focusing on one very distinct way of doing business. • Click-and-mortar business strategy: Firms pursuing this strategy choose to operate in both physical and virtual arenas. This business strategy is also referred to as the bricks-and-clicks business strategy.
question
List and define the stages of business-to-consumer electronic commerce.
answer
The stages of business-to-consumer electronic commerce can be classified as: E-information: providing electronic brochures and other types of information for customers. E-integration: providing customers with the ability to obtain personalized information by querying corporate databases and other information sources. E-transaction: allowing customers to place orders and make payments.
question
Briefly describe the benefits of e-tailing.
answer
E-tailing can provide many benefits over traditional brick-and-mortar retailing in terms of the marketing concepts of product, place, and price. • Product Benefits: Web sites can offer a virtually unlimited number and variety of products because e-tailing is not limited by physical store and shelf space restrictions. For instance, e-tailer Amazon.com offers millions of book titles on the Web, compared to a local brick-and-mortar-- only book retailer, which can offer "only" a few thousand titles in a store because of the restricted physical space. • Place Benefits: As company storefronts can (virtually) exist on every computer that is connected to the Web, e-tailers can compete more effectively for customers, giving e-tailers an advantage. Whereas traditional retailing can be accessed only at physical store locations during open hours, e-tailers can conduct business anywhere at any time. • Price Benefits: E-tailers can also compete on price effectively since they can turn their inventory more often because of the sheer volume of products and customers who purchase them. Companies can sell more products, reducing prices for consumers while at the same time enhancing profits for the company. Further, virtual companies have no need to rent expensive retail space or employ sales clerks, allowing them to further reduce prices.
question
Write a note on social media marketing with an illustration.
answer
One relatively recent trend in Internet marketing is harnessing the power of social media, such as the social networking site Facebook. More and more people rely on social media to stay in contact with their friends or business associates, so including such sites in the interactive marketing mix is a natural move for companies. In addition to placing display ads on such sites, companies increasingly use social networking sites for interactive communication with their customers. For example, the Coca-Cola Company has created a page on Facebook, allowing it to interact with its over 45 million "fans" (i.e., Facebook users who "like" the page) in various ways; Coke's fans can download free virtual goodies, can upload pictures related to everything Coke, or can use interactive applications. By creating this page, Coke can build strong relationships with a large group of its target customers. Similarly, people can follow Coke on Twitter or visit Coke's channel on the video sharing site YouTube. A recent trend for companies is establishing "social media listening centers" to feel the pulse of public opinion across a variety of social media.
question
Distinguish between network click fraud and competitive click fraud.
answer
Network click fraud is where a site hosting an advertisement creates fake clicks in order to get money from the advertiser. Competitive click fraud is when a person—competitor, disgruntled employee, and so on—inflates an organization's online advertising costs by repeatedly clicking on an advertiser's link.
question
Briefly explain location-based m-commerce.
answer
A key driver for m-commerce is location-based services, which are highly personalized mobile services based on a user's location. Location-based services are implemented via the cellular network, Wi-Fi networks, and Global Positioning System (GPS) functionality, now built into most modern cell phones. Location-based services allow the service provider to offer information or services tailored to the consumers' needs, depending on their location. For example, search engines can provide specific information about attractions or restaurants located in the user's vicinity, retail stores can enhance store locators with navigation instructions, or users can receive real-time traffic or public transport information.
question
Explain e-auctions and their different categories.
answer
E-auctions provide a place where sellers can post goods and services for sale and buyers can bid on these items or vice versa. E-auctions can be categorized based on the number of sellers (one or many) and the number of buyers (one or many) involved, giving four distinct categories of e-auctions. 1. Forward auction is the most common form of e-auction, where the highest bid wins. 2. A reverse auction is where buyers post a request for quote, which is similar to a request for proposal, in that the sellers respond with bids (and the seller with the lowest bid wins) rather than posting items or services for auction. 3. Bartering takes place on a one-on-one basis, but Web sites such as swap.com bring together many people listing items to swap. 4. Exchanges are typically taking place on a B2B level.
question
List and explain the different types of e-auction fraud.
answer
There are several different types of e-auction fraud: 1. Bid Luring: Luring bidders to leave a legitimate auction to buy the same item at a lower price outside the auction space, where return policies and buyer protection do not apply. 2. Counterfeit items: Selling something that is said to be an original, but it turns out to be a counterfeit item. 3. Bid Shielding: Sometimes called "shill bidding." Using two different accounts to place a low followed by a very high bid on a desired item, leading other bidders to drop out of the auction. The high bid is then retracted, and the item is won at the low bid. 4. Shipping Fraud: Charging excessive shipping and handling fees, far above actual cost. 5. Payment Failure: Buyers not paying for item after auction conclusion. 6. Nonshipment: Sellers failing to ship item after payment has been received.
question
Explain the relationships of e-government.
answer
Government-to-citizen (G2C) EC allows for interactions between federal, state, and local governments and their constituents. The Internal Revenue Service's Internet tax filing, or e-filing, is one of the more recognizable G2C tools, saving resources in terms of time and paper. Another e-government tool in wide use today is grants.gov. Government-to-business (G2B) is similar to G2C, but this form of EC involves businesses' relationships with all levels of government. This includes e-procurement, in which the government streamlines its supply chain by purchasing materials directly from suppliers using its proprietary Internet-enabled procurement system. Government-to-government (G2G) EC is used for electronic interactions that take place between countries or between different levels of government within a country.
question
________ are comprised of members from different geographic areas assembled as needed to collaborate on a certain project. A) Work groups B) Virtual teams C) Non-core teams D) Task forces E) Command groups
answer
B
question
Which of the following is a basic concept associated with Web 2.0? A) shift in users' preference from online sites to encyclopedias as sources of unbiased information B) shift in users' role from the passive consumer of content to its creator C) shift in users' interest from sharing information to finding information D) shift in users' lifestyle due to increased purchasing power E) shift in users' preference to environment-oriented products
answer
B
question
A ________ provides a way for different components of software to interact and exchange data or functionality using common Web communication protocols. A) static Web site B) Web API C) Web X3D D) tag cloud E) Web blog
answer
B
question
A ________ allows accessing remote or local data without having to know the complexities of this access, and thus enable creating unique and dynamic applications quickly and easily. A) tag cloud B) Web API C) Web X3D D) static Web site E) Web blog
answer
B
question
In the context of Web 2.0, Web APIs enable the creation of ________. A) protocols B) mashups C) codecs D) folksonomies E) tag clouds
answer
B
question
Which of the following statements is true about a mashup? A) It is a small interactive tool used for a single purpose. B) It is used to increase brand awareness through the network effect. C) It is the process of allowing companies to use everyday people as a cheap labor force. D) It is used to disseminate information to a narrow audience. E) It is an application or a Web site that uses data from one or more service providers.
answer
E
question
Which of the following is a consequence of the use of social software? A) People are using encyclopedias as sources of unbiased information. B) People are using environmentally-friendly products. C) People have increased purchasing power. D) People are sharing more personal information online. E) People have become passive consumers of content.
answer
D
question
A major benefit of social software is the ability to harness the "wisdom of crowds," which is also referred to as ________. A) collaborative filtering B) preference elicitation C) creative commons D) consensus democracy E) collective intelligence
answer
E
question
The concept of ________ is based on the notion that distributed groups of people with a divergent range of information and expertise will be able to outperform the capabilities of individual experts. A) cognitive dissonance B) creative commons C) collective intelligence D) consensus democracy E) preference elicitation
answer
C
question
The ________ Web, originally envisioned by Tim Berners-Lee, one of the founders of the Internet, is a set of design principles that will allow computers to be able to better index Web sites, topics, and subjects. A) semantic B) affiliate C) folksonomy D) collaborative E) phishing
answer
A
question
Which of the following is a reason for the development of the semantic Web? A) Web pages can be understood by people but not by computers. B) Users are able to use any device in any network for any service. C) Users give a lot of unnecessary personal information to social networking sites. D) Widgets cannot be integrated into Web pages. E) Users are skeptical while making purchases online due to the fear of getting cheated.
answer
A
question
Some people see ________ as the "contextual Web," where the immense amounts of content available to users will be filtered by contextual factors such as time, location, social activities, and so on. A) Web 3.0 B) Web 2.0 C) Web 4.0 D) Web 5.0 E) Web 1.0
answer
A
question
The use of ________ within a company's boundaries or between a company and its customers or stakeholders is referred to as Enterprise 2.0. A) Web 1.0 techniques B) extranet C) social media D) extranet and Web 1.0 techniques E) Web 3.0 techniques and extranet
answer
C
question
Which of the following is an example of synchronous communication? A) online reviews B) work flow automation systems C) bulletin board system D) videoconferencing E) e-mail
answer
D
question
Which of the following is an example of asynchronous communication? A) e-mail B) videoconferencing C) online chat D) shared whiteboards E) electronic meeting support system
answer
A
question
Which of following factors differentiates asynchronous communication from synchronous communication? A) language B) network speed C) coordination in time D) expertise E) distance
answer
C
question
The term ________ refers to a class of software that enables people to work together more effectively. A) groupware B) peopleware C) spyware D) malware E) mashup
answer
A
question
Which of the following is a collaboration management tool that is used to facilitate virtual or collocated meetings? A) Internet forums B) video conferencing C) blogs D) fax E) intranets
answer
E
question
In the context of collaborative tools, ________ is an example of an electronic conferencing tool. A) MS Outlook B) Apple FaceTime C) Wikipedia D) Google Docs E) MS SharePoint
answer
B
question
In the context of collaborative tools, ________ is an example of a collaboration management tool. A) MS Outlook B) MS SharePoint C) Google Talk D) Apple FaceTime E) Wikipedia
answer
B
question
) In the context of collaborative tools, ________ is an example of an electronic communication tool. A) MS Outlook B) Google Docs C) Apple FaceTime D) MS SharePoint E) Google Talk
answer
A
question
In the context of collaborative tools, ________ emulate traditional bulletin boards and allow for threaded discussions between participants. A) instant messages B) online document systems C) blogs D) discussion forums E) wikis
answer
D
question
Which of the following statements is true about a discussion forum? A) It started out as a novice's way of expressing themselves using very simple Web pages. B) It is the process of creating an online text diary made up of chronological entries that comment on everything. C) It is a widely used synchronous groupware tool. D) It is dedicated to a specific topic, and users can start new threads. E) It enables a person to voice his/her thoughts through short "status updates."
answer
D
question
Which of the following benefits of groupware enables many people to speak and listen at the same time? A) group memory B) parallelism C) process structuring D) anonymity E) spanning time
answer
B
question
An ________ is essentially a collection of personal computers networked together with sophisticated software tools to help group members solve problems and make decisions through interactive electronic idea generation, evaluation, and voting. A) electronic folksonomy B) electronic fund transfer C) electronic data interchange D) electronic meeting system E) electronic tag cloud
answer
D
question
) ________ is the process of creating an online text diary made up of chronological entries that comment on everything from one's everyday life to wine and food, or even computer problems. A) Crowdsourcing B) Keylogging C) Pharming D) Phishing E) Blogging
answer
E
question
Which of the following Web 2.0 applications has been classified by noted technology journalist Nicholas Carr as the "amateurization" of journalism? A) blogs B) discussion forums C) message boards D) instant messaging E) chat rooms
answer
A
question
Which of the following explains the term "blogosphere?" A) the movement against blogs B) the amateurization of blogs C) the revolution against microblogging D) the community of all blogs E) the movement against discussion forums
answer
D
question
Social presence tools are also known as ________ tools. A) social bookmarking B) instant chatting C) microblogging D) videoconferencing E) geotagging
answer
C
question
Which of the following facilitates real-time written conversations? A) instant messaging B) discussion forums C) status updates D) blogs E) tagging
answer
A
question
________ take(s) the concept of real-time communication a step further by allowing people to communicate using avatars. A) Blogging B) Microblogging C) Instant messaging D) Discussion forums E) Virtual worlds
answer
E
question
The network effect refers to the notion that the value of a network is dependent on ________. A) the speed of the network B) the number of other users C) the knowledge of the users D) the commitment of the users E) the technical expertise of the moderators
answer
B
question
________ is a cooperative social media application making use of the network effect. A) Media sharing B) Rich site summary C) Media tagging D) Instant messaging E) A discussion forum
answer
A
question
________ is the distribution of digital media, such as audio or video files, via syndication feeds for on-demand playback on digital media players. A) Narrowcasting B) Crowdsourcing C) Blogging D) Webcasting E) Phishing
answer
D
question
Podcasting is a misnomer because podcasts ________. A) are concerned with the dissemination of information to a narrow audience B) cannot be played on Apple's iPods C) are not related to distribution of digital media for digital devices D) are concerned with outsourcing tasks to a large group of people or community E) can be played on a variety of devices in addition to Apple's iPods
answer
E
question
Which of the following statements is true about a Real Simple Syndication (RSS) feed? A) It is used to increase brand awareness through the network effect. B) It is used to disseminate information to a narrow audience. C) It is used to market the product without the audience realizing it. D) It is used to enable people to work in more flexible ways on a variety of Internet-related projects. E) It is used to access the most current blogs, podcasts, videos, and news stories.
answer
E
question
Social bookmarking allows users to share Internet bookmarks and to create categorization systems. These categorization systems are referred to as ________. A) tag clouds B) podcasts C) folksonomies D) geospatial metadata E) microblogs
answer
C
question
Which of the following statements is true about social bookmarking? A) It is the distribution of digital media. B) It allows podcasters to publish and push current shows to the watchers/listeners. C) It allows people to communicate using avatars. D) It allows users to create folksonomies. E) It allows users to post short "status updates."
answer
D
question
________ is the creation of a categorization system by users. A) Social cataloging B) Podcasting C) Social blogging D) Webcasting E) Crowdsourcing
answer
A
question
________ refers to manually adding metadata to media or other content. A) Phishing B) Tagging C) Crowdsourcing D) Podcasting E) Netcasting
answer
B
question
Which of the following statements is true about tagging? A) It is the process of creating a categorization system by users. B) It is the process of distributing digital media for playback on digital media players. C) It is the process of adding metadata manually to media or other content. D) It is the process of creating avatars and syndication feeds. E) It is the process of creating an online text diary.
answer
C
question
________ can be used to visualize user generated content on a site. A) Crowdsourcing B) Tag clouds C) Phishing D) Podcasts E) Pharming
answer
B
question
Which of the following is one of the uses of geotagging? A) to use avatars while chatting online B) to create categorization systems for social cataloging C) to know the location of a person sending out a breaking news update on Twitter D) to create folksonomies for social bookmarking E) to use syndicated feeds while sharing media
answer
C
question
Cloud-based collaboration tools ________. A) allow for easy transferability of documents from one person to another B) have well-documented procedures for system complexities C) reduce the risk of exposing sensitive corporate data D) require users to frequently upgrade their software E) are complex and time-consuming to learn
answer
A
question
Which of the following Google Apps is an instant messaging client? A) Google Mail B) Google Calendar C) Google Talk D) Google Play E) Google Maps
answer
C
question
) ________ is an online office suite comprised of a spreadsheet application, a word processor, and a presentation application. A) Google Mail B) Google Talk C) Google Maps D) Google Calendar E) Google Docs
answer
E
question
Which of the following statements is true about Google Sites? A) It is an enterprise-level collaboration tool that allows users to create group Web sites and share team information. B) It allows users to select a custom domain name for an additional fee. C) It allows users to share events, send invitations to events, and subscribe to public calendars for new events. D) It allows users to send large attachments and offers large storage space and superior filing and search capabilities. E) It is an online office suite comprised of a spreadsheet application, a word processor, and a presentation application.
answer
A
question
A(n) ________ system allows users to publish, edit, version track, and retrieve digital content, such as documents, images, audio files, videos, or anything else that can be digitized. A) social presence B) collective intelligence C) application sharing D) content management E) peer production
answer
D
question
Which of the following statements is true about a content management system? A) It is the creation of goods or services by self-organizing communities. B) The creation of the goods or services is dependent on the incremental contributions of the participants. C) It allows the assignment of different roles for different users. D) Anyone can help in producing or improving the final outcome of the goods and services. E) It is a family of syndication feeds used to publish the most current blogs, podcasts, videos, and news stories.
answer
C
question
________ is the creation of goods or services by self-organizing communities. A) Peer production B) A folksonomy C) Creative commons D) Groupware E) Crowd sourcing
answer
A
question
Which of the following statements is true about peer production? A) The creator is responsible for publishing new information. B) Only editors have the right to develop new content. C) It is also known as enterprise content systems. D) Anyone can help in producing or improving the final outcome. E) The guest is a person who can only view the digital information.
answer
D
question
Which of the following occurs during wiki wars? A) Editors do not agree with the creators of the content. B) Participants debate on a particular topic before creation. C) Administrators refuse to publish a creator's content. D) Guests edit the creator's content without permission. E) Contributors continuously edit or delete each other's posts.
answer
E
question
________ is a phenomenon where companies use everyday people as a cheap labor force. A) Nearshoring B) Phishing C) Crowdsourcing D) Narrowcasting E) Pharming
answer
C
question
) ________ takes the concept of companies having used self-employed consultants to work on individual projects or provide content a step further by enabling people to work in more flexible ways on a variety of Internet-related projects. A) E-filing B) E-auction C) E-tailing D) E-lancing E) E-timing
answer
D
question
) ________ sites create social online communities where individuals with a broad and diverse set of interests meet and collaborate. A) Crowdsourcing B) Social cataloging C) Social networking D) Social bookmarking E) Media sharing
answer
C
question
________ attempts to increase the relevance of search results by including content from blogs and microblogging services. A) Social search B) OpenSearch C) Enterprise search D) Metasearch E) Netsearch
answer
A
question
Which of the following statements is true about viral marketing? A) It uses the network effect to increase brand awareness. B) It uses everyday people as a cheap labor force. C) It is the dissemination of information to a narrow audience. D) It enables people to work in more flexible ways on a variety of Internet-related projects. E) It is used to market a product without the audience realizing it.
answer
A
question
According to Thomas Baekdal, which of the following is a critical factor in the success of a viral marketing campaign? A) restricting access to viral content B) doing what the audience expects C) making sequels D) restricting easy distribution E) distributing products for free
answer
C
question
The term ________ marketing was coined by Harvard business professor Jeffrey Rayport to describe how good marketing techniques can be driven by word-of-mouth or person-to-person communication. A) viral B) buzz C) stealth D) affiliate E) blog
answer
A
question
(T/F) Membership on virtual teams is fluid, with teams forming and disbanding as needed, with team size fluctuating as necessary, and with team members coming and going as they are needed.
answer
true
question
(T/F) Virtual meetings can only be done synchronously by using technologies such as online discussion boards.
answer
fasle
question
(T/F) Virtual teams are commonly used for tasks such as developing systems and software.
answer
true
question
(T/f) In a Web 2.0 application, there is a relatively strict distinction between content creators and content consumers.
answer
false
question
(t/f) Web 1.0 applications allow people to collaborate and share information online.
answer
false
question
(T/F) Many successful Web 2.0 applications rely on Web APIs (application programming interfaces) to function.
answer
true
question
(T/F) The idea of mashups came from popular music where many songs are produced by mixing two or more existing songs together.
answer
true
question
(T/F) A widget could combine geospatial data, photos, reference information, hotel prices, and weather information to provide a comprehensive overview of travel destinations.
answer
false
question
(T/F) Social media is a classification of Web 2.0 applications.
answer
true
question
(T/F) By providing access to useful Web APIs, organizations extend their reach and build and strengthen customer relationships, providing a base for revenue-generating services.
answer
true
question
(T/F) Open source software is an example of the power of collective intelligence.
answer
true
question
(T/F) When Web pages are designed using semantic principles, computers will be able to read the pages, and search engines will be able to give richer and more accurate answers.
answer
true
question
(T/F) Social sharing and collaboration are some of the core Web 1.0 values.
answer
false
question
(T/F) A work flow automation system is an example of a synchronous groupware tool.
answer
false
question
(T/F) E-mail is an example of synchronous communication.
answer
false
question
(T/F) One of the most popular groupware systems - and arguably the system that put groupware into the mainstream - appeared in 1989 when Lotus Development released its Notes software product.
answer
true
question
(T/F) Desktop videoconferencing has been enabled by the growing power of processors powering personal computers and faster Internet connections.
answer
true
question
(T/F) Enterprise search engines such as Microsoft's Enterprise Search or the Google Search Appliance are designed to retrieve content from various internal data sources, including documents, databases, or applications linked to the company's intranet.
answer
true
question
(T/F) Social presence tools are designed for lengthy posts.
answer
false
question
(T/F) Asynchronous discussion forums emulate real-time written conversations.
answer
false
question
(T/F) Many companies have not been able to realize the full potential of a virtual world environment beyond just providing virtual showcases for their products.
answer
true
question
(T/F) According to the network effect, if some users of a network lack knowledge, the network has little or no value.
answer
false
question
(T/F) Typically, shared content is hosted on media sharing sites; however, the content can also be embedded into other sites.
answer
true
question
(T/F) The size of a word in a tag cloud represents its importance or frequency so that it is easy to spot the most important or frequent words or tags.
answer
true
question
(T/F) Adding geospatial metadata to media is referred to as geotagging.
answer
true
question
(T/F) Cloud-based collaboration tools allow for easy access and easy transferability of documents or other files from one person to another, as the tools can run on any computer with a Web browser and Internet connectivity.
answer
true
question
(T/F) Google Docs is a Web-based e-mail client allowing users to send large attachments and offering large storage space and superior filing and search capabilities.
answer
false
question
(T/F) Google Talk is an enterprise-level collaboration tool that allows users to create group Web sites and share team information.
answer
false
question
(T/F) Content management systems are also known as digital asset management systems.
answer
true
question
(T/F) Changes made to the content on a wiki cannot be reverted.
answer
false
question
(T/F) The term viral marketing describes how good marketing techniques can be driven by sending out massive amounts of spam.
answer
false
question
Explain the concept of collective intelligence along with examples.
answer
One major benefit of social software is the ability to harness the "wisdom of crowds," or collective intelligence. The concept of collective intelligence is based on the notion that distributed groups of people with a divergent range of information and expertise will be able to outperform the capabilities of individual experts, as demonstrated by the online encyclopedia Wikipedia, which is entirely based on its users' contributions. Likewise, open source software is another example of the power of collective intelligence. High-quality software such as the Firefox Web browser, the Linux operating system, or the OpenOffice productivity suite are created by thousands of volunteers located all over the world. For organizations, making effective use of the collective intelligence of their employees, customers, and other stakeholders can prove extremely valuable. In addition to the benefits of harnessing the wisdom of crowds, societal changes (brought about by globalization, increasing wealth and consumerism, as well as the Web) are increasingly changing the way in which organizations interact with internal and external stakeholders.
question
What are the key dimensions along which groupware and other collaboration tools are distinguished?
answer
Groupware and other collaboration technologies are often distinguished along two key dimensions: 1. Whether the system supports groups working together at the same time (synchronous groupware) or at different times (asynchronous groupware). 2. Whether the system supports groups working together face-to-face or distributed.
question
Write a note on electronic meeting systems.
answer
A category of groupware which focuses on helping groups have better meetings is commonly referred to as electronic meeting systems (EMSs). An EMS is essentially a collection of personal computers networked together with sophisticated software tools to help group members solve problems and make decisions through interactive electronic idea generation, evaluation, and voting. EMSs have traditionally been housed within a dedicated meeting facility; increasingly, Web-based implementations support team members around the globe. Page Ref: 192
question
Briefly describe desktop videoconferencing
answer
Desktop videoconferencing has been enabled by the growing power of processors powering personal computers and faster Internet connections. A desktop videoconferencing system usually comprises a fast personal computer, a Web cam (i.e., a small video camera that is connected directly to a PC), a speaker telephone or separate microphone, videoconferencing software (e.g., Skype, Google+, Yahoo! Messenger, or Windows Live Messenger), and a highspeed Internet connection. Similarly, people can now use apps such as FaceTime, FriendCaller, or Skype on their mobile devices, enabling them to make video calls on the go.
question
What are microblogging tools? How are they similar to or different from blogs and instant messaging?
answer
Social presence tools, also called microblogging tools, similar to blogging, enable people to voice their thoughts; however, in contrast to blogs, which often contain lengthy posts, social presence tools are designed for relatively short "status updates." A popular social presence tool is Twitter, which allows users to post short (up to 140 characters of text) "tweets." In contrast to asynchronous status updates, instant messaging (or online chat) emulates real-time written conversations. Using instant messaging, multiple participants can have conversations and enjoy immediate feedback from their conversation partners.
question
Write a note on virtual worlds.
answer
Virtual worlds take the concept of real-time communication a step further by allowing people to communicate using avatars. Popular virtual worlds such as Second Life, Meez, or IMVU consist of 3D environments where people can interact and build, buy, or sell virtual items, all using their personalized avatar. While many companies have not been able to realize the full potential of those environments beyond just providing virtual showcases for their products, dedicated virtual worlds are increasingly used for rich communication; for example, virtual worlds are increasingly being used for education-related activities, employee training, or medical uses.
question
Briefly describe social bookmarking.
answer
For many Web surfers, key challenges are finding information and finding it again at a later time; hence, people often keep long lists of bookmarks to sites they find interesting or visit frequently. Although this is useful for an individual, he or she may miss a plethora of other, related, and potentially interesting Web sites. Social bookmarking helps to address this by allowing users to share Internet bookmarks and to create categorization systems (referred to as folksonomies). As more people participate in social bookmarking, the value for each user grows as the bookmarks become more complete and more relevant to each user. Widely used public social bookmarking tools include Reddit and Delicious. For organizations, social bookmarking can be extremely valuable for knowledge management and harnessing the collective intelligence of employees. Using enterprise-oriented social bookmarking tools, it is easy to map "islands" of knowledge within an organization, thus helping to easily find experts on a given topic.
question
How is the concept of tagging related to social cataloging?
answer
Social cataloging is the creation of a categorization system by users. Contributors build up catalogs regarding specific topics such as academic citations, wireless networks, books and music, and so on. Closely related to social cataloging is tagging, or manually adding metadata to media or other content. Whereas certain metadata about documents or media files is captured automatically, there are various other important pieces of information that are not automatically captured, such as the topic of a document or the names of people in a picture. Tagging is the process of adding such metadata to pieces of information. Tags are commonly added to pictures and videos in Web sites.
question
Define viral marketing. Mention some of the forms that can be taken by viral marketing.
answer
Viral marketing is using the network effect to increase brand awareness. The term viral marketing was coined by Harvard business professor Jeffrey Rayport to describe how good marketing techniques can be driven by word-of-mouth or person-to-person communication, similar to how real viruses are transmitted through offline social networks. Rather than creating traditional banner ads or sending out massive amounts of spam, businesses create advertisements in a way that entices the viewers to share the message with their friends through e-mail or social networks so that the message will spread like a virus. Viral marketing can take many forms, such as video clips, e-books, flash games, and even text messages.
question
Explain the organizational issues associated with implementing an Enterprise 2.0 strategy, strictly from the perspective of organizational hierarchies, technological inertia, and security concerns.
answer
Often, Enterprise 2.0 initiatives are driven by user departments, and small-scale pilot implementations appear to work quite well. However, organization-wide Enterprise 2.0 implementations typically need changes in terms of organizational culture and processes and often the flattening of organizational hierarchies. Therefore, to be successful, Enterprise 2.0 implementations need the support and active involvement of senior management so as to cope with the large magnitude of changes. One factor hindering the adoption of many new technologies is technological inertia. In many cases, people are not willing to switch to new applications unless they see real, tangible benefits. This can be especially a hindrance with social media applications, many of which incorporate a variety of other tools. A final issue is related to security and intellectual property. For organizations, securing their information systems infrastructure is of paramount concern. Any application that allows closer collaboration by increasing data sharing will necessarily incur greater risks of security breaches. Companies thus have to balance their desire for enhancing collaboration with the need to protect intellectual property and comply with rules and regulations such as the Sarbanes-Oxley Act.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New