Download as pdf or txt
Download as pdf or txt
You are on page 1of 28

Chapter 1-6: E-commerce Security and Payment Systems

Học trực tuyến tại quizlet.com/_2kqxoc

1. 64) Creating multiple variations D) versioning. 6. The address used by a browser to identify B) a uniform
of information goods and the location of content on the Web is resource
selling these to different called: locator.
market segments at different A) a domain name.
prices is called: B) a uniform resource locator.
A) bundling. C) an IP address.
B) customization. D) a file path.
C) dynamic pricing.
7. Advantages of dynamic page generation D) client-side
D) versioning.
include all of the following except: execution of
2. The ability to retain user A) advertising revenue A) lowered menu costs. programming
attention and engagement is an model B) market segmentation.
important attribute for which C) nearly cost-free price discrimination.
revenue model? D) client-side execution of programming
A) advertising revenue model
8. All of the following are basic functionality B) marketing
B) subscription revenue model
provided by e-commerce merchant software.
C) transaction fee revenue
server software except:
model
A) a product catalog.
D) sales revenue model
B) marketing software.
3. Above all, e-commerce is a A) technology-driven C) a shopping cart.
________ phenomenon. D) credit card processing.
A) technology-driven
9. All of the following are basic functionality D) a shopping
B) finance-driven
provided by Web servers except: cart.
C) sociological
A) site management tools.
D) government-driven
B) data capture tools.
4. Accessing data without B) cloud security issue C) security services.
authorization on Dropbox is an D) a shopping cart.
example of which of the
10. All of the following are basic information C) customer ID
following?
requirements for a product database numbers.
A) social network security issue
except:
B) cloud security issue
A) product descriptions.
C) mobile platform security
B) stock numbers.
issue
C) customer ID numbers.
D) sniffing
D) inventory levels.
5. Acquisition rate is a measure of A) percentage of visitors
11. All of the following are business models B) peer-to-peer
the: who indicate an interest in
employed by the music industry except: streaming.
A) percentage of visitors who a site's products by
A) subscription.
indicate an interest in a site's registering or visiting a
B) peer-to-peer streaming.
products by registering or product's pages.
C) download-and-own.
visiting a product's pages.
D) cloud streaming.
B) percentage of visitors who
become customers. 12. All of the following are characteristics of D) support for
C) percentage of existing HTML5 except: digital rights
customers who continue to buy A) a video element that replaces plug-ins management.
on a regular basis. such as Flash, QuickTime, and RealPlayer.
D) percentage of shoppers who B) use of CSS3.
do not return within a year after C) ability to access built-in functionality
their initial purchase. of mobile devices, such as GPS and
swiping.
D) support for digital rights management.
13. All of the following are characteristics of B) they rely 20. All of the following are limitations of B) cost to
Web 2.0 sites and applications except: solely on the existing online credit card payment consumers.
A) they support interactions among users. mobile system except:
B) they rely solely on mobile access to the access to the A) poor security.
Web. Web. B) cost to consumers.
C) they tend to rely on user-generated C) cost to merchant.
content. D) social equity
D) they tend to attract large audiences that
21. All of the following are major social C) the refusal of
provide marketers with extraordinary
trends in e-commerce in 2014-2015 online retailers
opportunities for targeted marketing and
except for: to accept
advertising.
A) the impact of social networks on taxation of
14. All of the following are examples of D) e-tailers. privacy. Internet sales.
business-to-business (B2B) business models B) the continuing conflict over copyright
except: management and control.
A) e-distributors. C) the refusal of online retailers to
B) e-procurement. accept taxation of Internet sales.
C) exchanges. D) the growth of government
D) e-tailers. surveillance of Internet
communications.
15. All of the following are examples of D) sniffers
malicious code except: 22. All of the following are major A) cloud
A) viruses. technology trends in e-commerce in computing
B) bots. 2014-2015 except: enables the
C) worms. A) cloud computing enables the creation of Big
D) sniffers creation of Big Data. Data.
B) firms are turning to Web analytics to
16. All of the following are fixed price D) yield
make sense out of Big Data.
strategies except: management.
C) the mobile computing and
A) bundling.
communications platform creates a new
B) versioning.
platform for online transactions,
C) free pricing.
marketing, advertising, and media
D) yield management.
viewing.
17. All of the following are important factors in D) adhering D) computing and networking
Web site optimization except: to component prices continue to fall
A) selecting keywords and page titles. accessibility dramatically.
B) identifying market niches for your guidelines.
23. All of the following are methods of D) adding Web
services or products.
improving the processing architecture of servers.
C) buying search engine ads.
a Web site except:
D) adhering to accessibility guidelines.
A) separating static content from
18. All of the following are issues facing B) inability to dynamic content.
Pinterest except: retain users. B) optimizing ASP code.
A) copyright infringement. C) optimizing the database schema.
B) inability to retain users. D) adding Web servers.
C) spam.
24. All of the following are methods of D) FTP.
D) scams.
securing channels of communication
19. All of the following are key design C) coding by except:
principles of responsive Web design convention. A) SSL/TLS.
except: B) certificates.
A) flexible grid-based layouts. C) VPN.
B) media queries. D) FTP.
C) coding by convention.
D) flexible images and media.
25. All of the following are online D) targeted 31. All of the following are using a C) Barnes and
communications that are used to support banner ads. subscription revenue model for e-books Noble.
the evaluation of alternatives stage of except:
the consumer decision process except: A) Amazon.
A) search engines. B) Scribd.
B) online catalogs. C) Barnes and Noble.
C) social networks. D) Oyster.
D) targeted banner ads.
32. All of the following are Web site design D) redundant
26. All of the following are simple steps for B) segmenting features that annoy customers except: navigation.
optimizing Web page content that can computer A) slow-loading pages.
reduce response times except: servers to B) pop-under ads.
A) reducing unnecessary HTML perform C) splash pages.
comments. dedicated D) redundant navigation.
B) segmenting computer servers to functions.
33. All of the following can be considered a D) Starbucks.
perform dedicated functions.
direct or indirect competitor of Amazon
C) using more efficient graphics.
except:
D) avoiding unnecessary links to other
A) eBay.
pages on the site.
B) Apple's iTunes Store.
27. All of the following are steps one can C) replacing C) Walmart.
take to right-size a Web site's hardware static pages D) Starbucks.
platform and meet demands for service with
34. All of the following can be considered a A) the
except: dynamically
precursor to e-commerce except: development of
A) scaling hardware vertically. generated
A) the development of the smartphone. the smartphone.
B) scaling hardware horizontally. pages.
B) Baxter Healthcare's PC-based remote
C) replacing static pages with
order entry system.
dynamically generated pages.
C) the French Minitel.
D) improving processing architecture.
D) the development of Electronic Data
28. All of the following are traditional online C) social Interchange standards.
marketing tools except: marketing.
35. All of the following experienced high- C) Sony.
A) affiliate marketing.
profile data breaches in 2013 except:
B) e-mail and permission marketing.
A) Evernote.
C) social marketing.
B) Home Depot.
D) sponsorship marketing.
C) Sony.
29. All of the following are true about B) They are D) Adobe.
iPhone apps except: cross-platform,
36. All of the following may lead to a C) fewer
A) They are distributed through Apple's open-source
competitive advantage except: products.
App Store. applications.
A) less expensive suppliers.
B) They are cross-platform, open-source
B) better employees.
applications.
C) fewer products.
C) Over 75 billion have been
D) superior products.
downloaded.
D) Apple's goal of offering apps is to 37. All of the following might be part of a C) legacy
increase sales of iPhones, iPads, and Web site's middle-tier layer except: corporate
iPods. A) a database server. applications.
B) an ad server.
30. All of the following are used for D) packet filters.
C) legacy corporate applications.
authentication except:
D) a mail server.
A) digital signatures.
B) certificates of authority. 38. All of the following offer Web site D) Apache
C) biometric devices. building tools except:
D) packet filters. A) Weebly
B) Google Sites
C) WordPress
D) Apache
39. All of the following statements A) Apple Pay is 42. All of the following statements about B) public key
about Apple Pay are true except available for both public key cryptography are true cryptography
which of the following? iPhone 5s and iPhone except: ensures
A) Apple Pay is available for both 6s. A) public key cryptography uses two authentication of
iPhone 5s and iPhone 6s. mathematically related digital keys. the sender.
B) Apple Pay is based on Touch ID B) public key cryptography ensures
biometric fingerprint scanning. authentication of the sender.
C) Apple Pay can be used for C) public key cryptography does not
mobile payments at the point of ensure message integrity.
sale at a physical store. D) public key cryptography is based
D) Apple Pay relies on the on the idea of irreversible
consumer having a credit card on mathematical functions.
file with Apple's iTunes.
43. All of the following use an advertising D) Amazon.
40. All of the following statements B) the data typically revenue model except:
about cookies are true except: stored in cookies A) Twitter.
A) cookies can be used with Web includes a unique ID B) Yahoo.
bugs to create cross-site profiles of and e-mail address. C) Google.
users. D) Amazon.
B) the data typically stored in
44. All of the following were visions of e- D) fast follower
cookies includes a unique ID and e-
commerce expressed during the early advantage.
mail address.
years of e-commerce except:
C) cookies make shopping carts
A) a nearly perfect information
possible by allowing a site to keep
marketspace.
track of a user's actions.
B) friction-free commerce.
D) the more cookies are deleted,
C) disintermediation.
the less accurate ad server metrics
D) fast follower advantage.
become.
45. The ________ allows a natural language C) domain name
41. All of the following statements C) PKI guarantees
expression, such as Google.com to system
about PKI are true except: that the verifying
represent a numeric IP address.
A) The term PKI refers to the computer of the
A) uniform resource locator system
certification authorities and digital merchant is secure.
B) Internet protocol addressing
certificate procedures that are
schema
accepted by all parties.
C) domain name system
B) PKI is not effective against
D) assigned numbers and names
insiders who have a legitimate
(ANN) system
access to corporate systems
including customer information. 46. All the following statements about C) symmetric key
C) PKI guarantees that the verifying symmetric key cryptography are true cryptography is
computer of the merchant is except: computationally
secure. A) in symmetric key cryptography, slower.
D) The acronym PKI stands for both the sender and the receiver use
public key infrastructure. the same key to encrypt and decrypt
a message.
B) the Data Encryption Standard is a
symmetric key encryption system.
C) symmetric key cryptography is
computationally slower.
D) symmetric key cryptography is a
key element in digital envelopes.
47. ________ and ________ are typically the most B) Value 52. The basic value proposition of A) they offer a fast,
easily identifiable aspects of a company's proposition; community providers is: convenient one-stop site
business model. revenue A) they offer a fast, where users can focus on
A) Market strategy; market opportunity model convenient one-stop site their most important
B) Value proposition; revenue model where users can focus on concerns and interests.
C) Value proposition; competitive their most important
environment concerns and interests.
D) Revenue model; market strategy B) they offer consumers
valuable, convenient, time-
48. A(n) ________ is a Web application that A) wiki
saving, and low cost
allows users to easily add and edit
alternatives to traditional
content on a Web page.
service providers.
A) wiki
C) they create a digital
B) podcast
electronic environment for
C) blog
buyers and sellers to meet,
D) RSS feed
agree on a price, and
49. ________ are the types of information B) System transact.
systems capabilities needed to meet functionalities D) they increase customers'
business objectives. productivity by helping them
A) Information requirements get things done faster and
B) System functionalities more cheaply.
C) System design specifications
53. Bitcoins are an example of: A) digital cash.
D) Physical design specifications
A) digital cash.
50. Around ________ % of households in the C) 75 B) virtual currency.
United States have broadband access to C) a stored value payment
the Internet. system.
A) 45 D) an EBPP system.
B) 55
54. The business model of e- A) e-distributors.
C) 75
tailers is quite similar to that
D) 85
of:
51. The backbone of the Internet is formed B) Network A) e-distributors.
by: Service B) transaction brokers.
A) Internet Exchange Points (IXPs). Providers C) exchanges.
B) Network Service Providers (NSPs). (NSPs). D) service providers.
C) Internet Service Providers (ISPs).
55. Business-to-consumer (B2C) A) has grown at double-
D) Metropolitan Area Exchanges (MAEs).
e-commerce in the United digit rates between 2010
States: and 2014.
A) has grown at double-digit
rates between 2010 and 2014.
B) has less revenue than C2C
e-commerce.
C) now constitutes over 40%
of the overall U.S. retail
market.
D) is growing more slowly as
it confronts its own
fundamental limitations.
56. The concept behind document formatting D) GML 63. Dove's Real Beauty Sketches A) viral marketing
had its roots in which of the following? video ad is an example of
A) XML which of the following?
B) SGML A) viral marketing
C) HTML B) local marketing
D) GML C) affiliate marketing
D) lead generation marketing
57. Conversion rate is a measure of the: B) percentage
A) percentage of visitors who indicate an of visitors who 64. During which period of time C) 1975-1995
interest in a site's products by registering become did the Institutionalization
or visiting a product's pages. customers. phase of Internet
B) percentage of visitors who become development take place?
customers. A) 1950-1960
C) percentage of existing customers who B) 1961-1974
continue to buy on a regular basis. C) 1975-1995
D) percentage of shoppers who do not D) 1995-through the present
return within a year after their initial
65. During which phase of the B) Institutional phase
purchase.
development of the Internet
58. The cost of hardware, software, and C) decreased was the personal computer
telecommunications services needed to dramatically invented?
build a Web site have ________ over the last A) Commercialization phase
decade. B) Institutional phase
A) increased dramatically C) Innovation phase
B) increased moderately D) Consolidation phase
C) decreased dramatically
66. The early years of e- C) a stunning technological
D) decreased slightly
commerce are considered: success as the Internet and
59. ________ create and sell access to digital C) E- A) the most promising time in the Web increased from a
markets. procurement history for the successful few thousand to billions of
A) E-distributors firms implementation of first mover e-commerce transactions
B) Portals advantages. per year.
C) E-procurement firms B) an economist's dream come
D) Market creators true, where for a brief time
consumers had access to all
60. The Data Encryption Standard uses a(n) B) 56
relevant market information
________-bit key.
and transaction costs
A) 8
plummeted.
B) 56
C) a stunning technological
C) 256
success as the Internet and
D) 512
the Web increased from a few
61. A digital certificate contains all of the A) subject's thousand to billions of e-
following except the: private key. commerce transactions per
A) subject's private key. year.
B) subject's public key. D) a dramatic business
C) digital signature of the certification success as 85% of dot-coms
authority. formed since 1995 became
D) digital certificate serial number. flourishing businesses.
62. Django is based on which of the B) Python
following?
A) PHP
B) Python
C) Perl
D) Ruby on Rails
67. The early years of e-commerce A) an emphasis on 72. An example of an online privacy B) your online
were driven by all of the exploiting traditional violation is: purchasing
following factors except: distribution channels. A) your e-mail being read by a hacker. history being
A) an emphasis on exploiting B) your online purchasing history being sold to other
traditional distribution channels. sold to other merchants without your merchants
B) a huge infusion of venture consent. without your
capital funds. C) your computer being used as part of consent.
C) an emphasis on quickly a botnet.
achieving very high market D) your e-mail being altered by a
visibility. hacker.
D) visions of profiting from new
73. The existence of a large number of B) the market is
technology
competitors in any one market saturated.
68. eBay uses all of the following C) content provider. segment may indicate:
business models except: A) an untapped market niche.
A) B2C market creator. B) the market is saturated.
B) C2C market creator. C) no one firm has differentiated itself
C) content provider. within that market.
D) e-commerce infrastructure D) a market that has already been tried
provider. without success.
69. E-commerce can be defined as: A) the use of the 74. A firm's ________ describes how a firm will B) revenue model
A) the use of the Internet, the Internet, the Web, and produce a superior return on invested
Web, and mobile apps to transact mobile apps to transact capital.
business. business. A) value proposition
B) the use of any Internet B) revenue model
technologies in a firm's daily C) market strategy
activities. D) competitive advantage
C) the digital enablement of
75. The first Web browser to make it B) Mosaic.
transactions and processes within
possible to view documents on the Web
an organization.
with colored background, images, and
D) any digitally enabled
animations was:
transactions among individuals
A) Netscape Navigator.
and organizations.
B) Mosaic.
70. An e-commerce Web site that B) two-tier C) Mozilla.
processes orders requires, at D) Internet Explorer.
minimum, a ________ system
76. For a Web site that has 10 million D) 100 million
architecture.
visitors a month, and where on average,
A) single-tier
a visitor makes 10 page requests per
B) two-tier
visit, there will be ________ entries in the
C) three-tier
transaction log each month.
D) multi-tier
A) 100,000
71. An example of a company using B) Rhapsody B) 1 million
the content provider model is: C) 10 million
A) Priceline. D) 100 million
B) Rhapsody.
77. Google introduced which of the C) Panda
C) Dell.
following changes to its search
D) eBay.
algorithm in 2011 to weed out low
quality sites from search results?
A) Penguin
B) Hummingbird
C) Panda
D) Knowledge Graph
78. The ________ helps define the overall A) IAB 85. In 2014, roughly ________ million people in the C) 147
structure of the Internet. United States accessed the Internet via tablets.
A) IAB A) 47
B) IESG B) 67
C) W3C C) 147
D) ITU D) 167
79. Hits are a measure of the: C) number of http 86. In 2014, there were an estimated ________ D) 1
A) number of times an ad is clicked. requests. Internet hosts. billion
B) number of times an ad is served. A) 1 million
C) number of http requests. B) 10 million
D) number of pages viewed. C) 100 million
D) 1 billion
80. How long does it take for 300,000 X- B) 1 minute
rays to be transmitted on a 100-gbps 87. In 2014, the world's online population was B) 2.8
network? estimated to be around: billion.
A) 10 seconds A) 280 million.
B) 1 minute B) 2.8 billion.
C) 10 minutes C) 28 billion.
D) 1 hour D) 280 billion
81. If you want to determine the size of B) unique visitors. 88. In 2014, what was the approximate Internet C) 75%
your Web site's audience, the metric penetration rate for individuals that have
you will use for the most accurate attained less than a high-school education?
measurement will be: A) 45%
A) page views. B) 60%
B) unique visitors. C) 75%
C) hits. D) 90%
D) reach.
89. The incremental cost of building the next unit C)
82. If you wished to leverage the A) enable of a good is called the: marginal
ubiquitous nature of the Web to individual A) Law of One Price. cost.
differentiate your product, you would: customization of B) variable cost.
A) enable individual customization of the product by C) marginal cost.
the product by consumers. consumers. D) fixed cost.
B) implement a strategy of
90. In general, the key to becoming a successful A) own
commoditization.
content provider is to: the
C) adopt a strategy of cost
A) own the content being provided. content
competition.
B) own the technology by which content is being
D) develop a scope strategy to
created, presented, and distributed. provided.
compete within a narrower market
C) provide online content for free.
segment.
D) provide other services as well as online
83. Impressions are a measure of the: B) number of content.
A) number of times an ad is clicked. times an ad is
91. In May 2014, the U.S. Department of Justice B) China
B) number of times an ad is served. served.
indicted five army members from which of the
C) number of http requests.
following countries for conducting industrial
D) number of pages viewed.
espionage against U.S. Steel and
84. In 2013, the Target retail chain A) a large-scale Westinghouse?
experienced which of the following? data breach A) Russia
A) a large-scale data breach B) China
B) a DDoS attack that shut down its C) Iran
Web site D) Iraq
C) a hacktivist attack to protest its
wage policies
D) a browser parasite
92. In modeling online consumer C) knowledge consumers 95. The Internet Layer of TCP/IP is B) addressing,
behavior, the concept of have about how to conduct responsible for which of the following? packaging,
"consumer skills" refers to online transactions. A) placing packets on and receiving them and routing
the: from the network medium messages
A) education level of the B) addressing, packaging, and routing
consumer. messages
B) communication skills of the C) providing communication with the
consumer. application by acknowledging and
C) knowledge consumers sequencing the packets to and from the
have about how to conduct application
online transactions. D) providing a variety of applications with
D) product evaluation skills the ability to access the services of the
of the consumer lower layers
93. In order from beginning to A) systems 96. Internet traffic is predicted to do which of C) triple
end, the major steps in the analysis/planning; systems the following over the next 5 years?
SDLC are: design; building the system; A) decrease
A) systems analysis/planning; testing; and implementation. B) double
systems design; building the C) triple
system; testing; and D) quadruple
implementation.
97. In the address A) .com
B) systems design; testing;
http://www.company.com/clients.html,
building the system; and
which of the following is the top-level
implementation.
domain?
C) systems analysis/planning;
A) .com
systems design; building the
B) company.com
system; implementation; and
C) www
testing.
D) http
D) systems analysis/planning;
implementation; building the 98. In the first 8 months of 2014, the B) 60
system; and testing. percentage of all e-mail that is spam
averaged around ________ %.
94. Interactivity in the context of D) the enabling of two-way
A) 50
e-commerce provides which communication between
B) 60
of the following consumer and merchant
C) 70
functionalities?
D) 80
A) the ability to physically
touch and manipulate a 99. In the United States, the primary form of A) PayPal.
product online payment is:
B) complexity and content of A) PayPal.
a message B) Bill Me Later.
C) the ability of consumers to C) Amazon Payment.
create and distribute content D) Google Wallet.
D) the enabling of two-way 100. An intrusion detection system can D) blocking
communication between perform all of the following functions suspicious
consumer and merchant except: activity.
A) examining network traffic.
B) setting off an alarm when suspicious
activity is detected.
C) checking network traffic to see if it
matches certain patterns or
preconfigured rules.
D) blocking suspicious activity.
101. ________ involves testing a site program's C) Unit testing 106. A ________ is a networked business ecosystem C) value
modules one at a time. that coordinates a firm's suppliers, distributors, web
A) System testing and delivery firms with its own production
B) Acceptance testing needs using an Internet-based supply chain
C) Unit testing management system.
D) Implementation testing A) value chain
B) value system
102. In which year can e-commerce be said C) 1995
C) value web
to have begun?
D) business strategy
A) 1983
B) 1985 107. ________ is an industry-standard database query A) SQL
C) 1995 and manipulation language.
D) 2001 A) SQL
B) PHP
103. An IPv4 address is expressed as a: D) 32-bit
C) DBMS
A) 32-bit number that appears as a number that
D) JSP
series of four separate numbers appears as a
separated by semicolons. series of four 108. ________ is a programming language invented by D)
B) 64-bit number that appears as a separate Netscape used to control the objects on an JavaScript
series of four separate numbers numbers HTML page and handle interactions with the
separated by semicolons. separated by browser.
C) 64-bit number that appears as a periods. A) VBScript
series of four separate numbers B) ActiveX
separated by periods. C) ColdFusion
D) 32-bit number that appears as a D) JavaScript
series of four separate numbers
109. A ________ is a repository of customer B) CRM
separated by periods.
information that records all of the contacts system
104. The ________ is a consortium of D) Internet that a customer has with a firm and generates
corporations, government agencies, Society (ISOC) a customer profile available to everyone in the
and nonprofit organizations that firm with a need to know the customer.
monitors Internet policies and A) customer service chat system
practices. B) CRM system
A) Internet Engineering Steering Group C) data warehouse
(IESG) D) transactive content system
B) World Wide Web Consortium (W3C)
110. ________ is a utility program that allows you to A) Ping
C) Internet Engineering Task Force
check the connection between your client and
(IETF)
a TCP/IP network.
D) Internet Society (ISOC)
A) Ping
105. ________ is a model of computing in which D) Cloud B) Telnet
firms and individuals obtain computing computing C) Tracert
power and software applications over D) Finger
the Internet, rather than purchasing and
111. A ________ is hardware or software that acts as a A)
installing it on their own computers.
filter to prevent unwanted packets from firewall
A) Client/server computing
entering a network.
B) P2P computing
A) firewall
C) Mobile computing
B) virtual private network
D) Cloud computing
C) proxy server
D) PPTP
112. ________ is one of the original Internet services B) FTP 119. Most of the time required to C) general administration
and is used to transfer files from a server maintain an e-commerce site is and making changes and
computer to a client computer and vice spent on: enhancements to the
versa. A) debugging code. system.
A) SMTP B) responding to emergency
B) FTP situations.
C) HTTP C) general administration and
D) SSL making changes and
enhancements to the system.
113. The layer of Internet architecture that ties B)
D) changes in reports, data files,
the applications to the communications Middleware
and links to backend databases.
network and includes such services as Services
security and authentication is called the: layer. 120. Most of the world's malware is C) Trojan horses
A) Network Technology Substrate layer. delivered via which of the
B) Middleware Services layer. following?
C) Transport Services and Representation A) viruses
Standards layer. B) worms
D) Applications layer. C) Trojan horses
D) botnets
114. The leading Web server software is: A) Apache.
A) Apache. 121. MySQL is which of the A) open source database
B) Microsoft Internet Information Server. following? software
C) Sun Solaris A) open source database
D) Google Enterprise Server software
B) a scripting language
115. Linden Dollars, created for use in Second B) virtual
embedded in HTML documents
Life, are an example of: currency.
C) Web server software
A) digital cash.
D) Web site analytics software
B) virtual currency.
C) EBPP. 122. Next generation firewalls C) the ability to
D) peer-to-peer payment systems. provide all of the following automatically update
except: applications with
116. The major technologies used with wireless A) Wi-Fi
A) an application-centric security patches
local area networks are: and
approach to firewall control
A) Wi-Fi and Bluetooth. Bluetooth.
B) the ability to identify
B) Wi-Fi and WiMax.
applications regardless of the
C) Bluetooth and 3G.
port, protocol, or security
D) WiMax and 3G.
evasion tools used
117. Malware that comes with a downloaded file C) drive-by C) the ability to automatically
that a user requests is called a: download. update applications with
A) Trojan horse. security patches
B) backdoor. D) the ability to identify users
C) drive-by download. regardless of the device or IP
D) PUP. address
118. The marketing technique known as ________ B) flash 123. The Nike iD program is an A) customer co-
involves merchants offering products or marketing example of which of the production
services for a very low price for a short following marketing techniques?
period of time. A) customer co-production
A) search engine marketing B) transactive content
B) flash marketing C) price discrimination
C) yield management D) permission marketing
D) bait-and-switch
124. Offline media is typically used for C) conversation. 129. The overall retail market in the B) $4.7 trillion.
all of the following marketing United States in 2017 was
activities except: estimated at about:
A) education. A) $47 trillion.
B) exposure. B) $4.7 trillion.
C) conversation. C) $490 billion.
D) branding. D) $47 billion.
125. One of the predictions for the A) overall revenues 130. Over the past decade, the B) diminished sharply.
future of e-commerce is that: from e-commerce number of exchanges has:
A) overall revenues from e- will grow at an A) greatly increased.
commerce will grow at an annualized rate of B) diminished sharply.
annualized rate of about 13% a year about 13% a year C) stayed about the same.
through 2018. through 2018. D) increased slowly but
B) the first movers from the early steadily.
years of e-commerce will retain or
131. PayPal is an example of what A) online stored value
increase their market share as they
type of payment system? payment system
continue to exploit economies of
A) online stored value
scale and switching costs.
payment system
C) prices will lower enough to
B) digital checking system
encourage more consumers to
C) accumulating balance
engage in online shopping.
system
D) the number of online shoppers
D) digital credit card system
will continue to grow at double-
digit rates. 132. A perfect market is one in A) there are no
which: competitive advantages
126. Online bill payment now accounts C) more than 50%,
A) there are no competitive or asymmetries because
for ________ of all bill payments, less than 25%
advantages or asymmetries all firms have equal
while paper checks account for
because all firms have equal access to all the factors
________.
access to all the factors to to production.
A) less than 10%, less than 25%
production.
B) about 25%, about 10%
B) one firm develops an
C) more than 50%, less than 25%
advantage based on a factor
D) 100%, 0%
of production that other firms
127. Organizations that typically provide C) incubators. cannot purchase.
an array of services to start-up C) one participant in the
companies along with a small market has more resources
amount of funding are referred to than the others.
as: D) competition is at a minimum,
A) angel investors. as each niche market within an
B) crowdfunders. industry is served by the
C) incubators. company with the greatest
D) venture capital investors. competitive advantage
128. The overall rate of online credit A) less than 1 133. Portals primarily generate C) sales of goods.
card fraud is ________ % of all online revenue in all of the following
card transactions. ways except:
A) less than 1 A) charging advertisers for ad
B) around 5 placement.
C) around 10 B) collecting transaction fees.
D) around 15 C) sales of goods.
D) charging subscription fees.
134. Privacy is sometimes confused with: A) confidentiality. 140. Recency refers to the: B) time elapsed
A) confidentiality. A) percentage of customers who do since the last
B) authenticity. not return during the next year after action taken by a
C) integrity. an initial purchase. customer.
D) nonrepudiation. B) time elapsed since the last action
taken by a customer.
135. The process of slicing digital messages C) packet
C) percentage of existing customers
into parcels, sending them along switching.
who continue to buy on a regular
different communication paths as they
basis.
become available, and reassembling
D) percentage of customers who
them at the destination point is called:
return to the site within a year to
A) routing.
make additional purchases.
B) the Transmission Control Protocol.
C) packet switching. 141. ________ refers to the ability to ensure C) Availability
D) the File Transfer Protocol. that an e-commerce site continues to
function as intended.
136. The protocol that enables the A) VoIP.
A) Nonrepudiation
transmission of voice and other forms
B) Authenticity
of audio communication over the
C) Availability
Internet is called:
D) Integrity
A) VoIP.
B) IPTP. 142. ________ refers to the ability to ensure A) Nonrepudiation
C) VTP. that e-commerce participants do not
D) IP. deny their online actions.
A) Nonrepudiation
137. ________ provides a set of standards for A) CGI
B) Authenticity
communicating between a browser
C) Availability
and a program running on a server
D) Integrity
that allows for interaction between
the user and server. 143. ________ refers to the ability to ensure A) Confidentiality
A) CGI that messages and data are only
B) ColdFusion available to those authorized to view
C) JavaScript them.
D) VBScript A) Confidentiality
B) Integrity
138. Proxy servers are also known as: C) dual home
C) Privacy
A) firewalls. systems.
D) Availability
B) application gateways.
C) dual home systems. 144. ________ refers to the ability to identify B) Authenticity
D) packet filters. the person or entity with whom you
are dealing on the Internet.
139. Purchasing an online ad on a CPA basis C) pays only for
A) Nonrepudiation
means that the advertiser: those users who
B) Authenticity
A) pays for impressions in 1,000 unit perform a specific
C) Availability
lots. action, such as
D) Integrity
B) pays a pre-negotiated fee for each registering,
click an ad receives. purchasing, etc. 145. Retail chains account for around B) 35
C) pays only for those users who ________ % of online retail firm
perform a specific action, such as revenues.
registering, purchasing, etc. A) 15
D) exchanges something of equal B) 35
value for the ad space. C) 75
D) 95
146. The richness made possible C) It allows video, audio, 152. Software that is used to obtain private A) spyware.
by e-commerce and text to be integrated user information such as a user's
technologies does which of into a single marketing keystrokes or copies of e-mail is
the following? message and consuming referred to as:
A) It reduces the cost of experience. A) spyware.
delivering marketing B) a backdoor.
messages and receiving C) pupware.
feedback from users. D) adware.
B) It allows consumers to
153. A ________ specifically details how you D) market
become co-producers of the
plan to find customers and to sell your strategy
goods and services being
product.
sold.
A) sales analysis
C) It allows video, audio, and
B) business plan
text to be integrated into a
C) competitive strategy
single marketing message
D) market strategy
and consuming experience.
D) It enables worldwide 154. A strategy designed to compete within D) focus
customer service and a narrow market or product segment is
marketing communications. called a ________ strategy.
A) scope
147. Ruby on Rails is based on B) CoC
B) differentiation
which of the following
C) cost
philosophies?
D) focus
A) SLDC
B) CoC 155. SupplyOn is an example of a(n): C) industry
C) LAMP A) private industrial network. consortium.
D) Ajax B) exchange.
C) industry consortium.
148. Rustock is an example of B) botnet
D) e-distributor.
which of the following?
A) worm 156. Symmetric key cryptography is also B) secret key
B) botnet known as: cryptography.
C) phishing A) public key cryptography.
D) hacktivism B) secret key cryptography.
C) PGP.
149. "Shoppers" constitute D) 90
D) PKI.
approximately ________ % of
the online Internet audience. 157. A system design has two main A) a logical
A) 60 components: design and a
B) 70 A) a logical design and a physical physical design.
C) 80 design.
D) 90 B) a behavioral design and a
technological design.
150. Siri is a type of: A) intelligent personal
C) business objectives and technology
A) intelligent personal assistant.
requirements.
assistant.
D) front-end systems and back-end
B) widget.
systems.
C) gadget.
D) social network 158. TCP/IP operates in which layer of C) Transport
Internet architecture? Services and
151. The size of the B2B market in D) $5.7 trillion.
A) Network Technology Substrate Representation
2014 was estimated to be
layer Standards layer
around:
B) Middleware Services layer
A) $570 million.
C) Transport Services and
B) $5.7 billion.
Representation Standards layer
C) $570 billion.
D) Applications layer
D) $5.7 trillion.
159. The term stateless refers to the B) the server does not 163. Uber has been criticized for using C) surge pricing
fact that: have to maintain an which of the following?
A) no one government entity ongoing dedicated A) flash marketing
controls the Internet. interaction with the B) bundling
B) the server does not have to client computer. C) surge pricing
maintain an ongoing dedicated D) freemium
interaction with the client
164. Unfair competitive advantages A) one competitor
computer.
occur when: has an advantage
C) system performance
A) one competitor has an advantage others cannot
degrades as more simultaneous
others cannot purchase. purchase.
users require service.
B) market middlemen are displaced.
D) Web servers may maintain
C) information is equally distributed
multiple instances of server
and transaction costs are low.
software to handle requests.
D) firms are able to gather
160. ) The primary way a Web site is B) cookies. monopoly profits.
able to personalize the content
165. ________ verifies that the business B) Acceptance
presented to a visitor is through
objectives of the system as testing
the use of:
originally conceived are in fact
A) privacy policies.
working.
B) cookies.
A) System testing
C) accessibility rules.
B) Acceptance testing
D) site management tools.
C) Unit testing
161. To allow lower-level employees B) an authorization D) Implementation testing
access to the corporate network management system.
166. View-through rate measures the D) 30-day
while preventing them from
________ response rate to an ad.
accessing private human
A) 30-minute
resources documents, you would
B) 24-hour
use:
C) 7-day
A) access controls.
D) 30-day
B) an authorization management
system. 167. A Web beacon is: D) a tiny graphics
C) security tokens. A) a cookie that carries a virus. file embedded in an
D) an authorization policy. B) an executable cookie. e-mail or Web page.
C) an automated applet for
162. The Transport Layer of TCP/IP is C) providing
performing Web searches.
responsible for which of the communication with the
D) a tiny graphics file embedded in
following? application by
an e-mail or Web page.
A) placing packets on and acknowledging and
receiving them from the network sequencing the packets 168. The Web runs in which layer of D) Applications
medium to and from the Internet architecture? layer
B) addressing, packaging, and application A) Network Technology Substrate
routing messages layer
C) providing communication with B) Middleware Services layer
the application by C) Transport Services and
acknowledging and sequencing Representation Standards layer
the packets to and from the D) Applications layer
application
D) providing a variety of
applications with the ability to
access the services of the lower
layers
169. What are the two most A) developing a clear 173. What type of Internet access B) drones
important management understanding of business technology are Google and
challenges in building a objectives and knowing how Facebook hoping to use to
successful e-commerce to choose the right provide Internet access to
presence? technology to achieve those remote parts of the world?
A) developing a clear objectives A) Bluetooth
understanding of business B) drones
objectives and knowing how C) WLANs
to choose the right D) DSL
technology to achieve those
174. When talking about the physical D) multiple duplicate
objectives
elements of the Internet, the devices and paths in a
B) having an accurate
term redundancy refers to: network built so that
understanding of your
A) transmitting multiple copies data can be rerouted if a
business environment and an
of a single packet to safeguard breakdown occurs.
achievable business plan
against data loss.
C) building a team with the
B) the use of tiered high-speed
right skill sets and closely
switching computers to connect
managing the development
the backbone to regional and
process
local networks.
D) identifying the key
C) delays in messages caused by
components of your business
the uneven flow of information
plan and selecting the right
through the network.
software, hardware, and
D) multiple duplicate devices
infrastructure for your site
and paths in a network built so
170. What is the first step in C) Perform a risk that data can be rerouted if a
developing an e-commerce assessment. breakdown occurs.
security plan?
175. Where does TLS operate within B) between the
A) Create a security
TCP/IP? Transport Layer and the
organization.
A) between the Internet Layer Application Layer
B) Develop a security policy.
and the Transport Layer
C) Perform a risk assessment.
B) between the Transport Layer
D) Perform a security audit.
and the Application Layer
171. What is the most frequent B) the hacking and looting C) between the Network
cause of stolen credit cards of corporate servers storing Interface Layer and the
and card information today? credit card information Transport Layer
A) lost cards D) between the Internet Layer
B) the hacking and looting of and the Application Layer
corporate servers storing
176. Which business application is D) workgroup
credit card information
associated with the automation (e.g.,
C) sniffing programs
technological development of document sharing)
D) phishing attacks
local area networks and
172. What is the primary revenue A) sales client/server computing?
model for an e-distributor? A) transaction automation (e.g.,
A) sales payroll)
B) transaction fee B) desktop automation (e.g.,
C) advertising word processing)
D) subscription C) industrial system automation
(e.g., supply chain management )
D) workgroup automation (e.g.,
document sharing)
177. Which dimension(s) of security is C) integrity and 183. Which of the following cannot be D) HTML
spoofing a threat to? authenticity used to retrieve objects from a
A) integrity database?
B) availability A) CGI
C) integrity and authenticity B) ASP
D) availability and integrity C) JSP
D) HTML
178. Which element of the business D) value proposition
model addresses the question of 184. Which of the following companies B) E*Trade
why a customer should buy from the utilizes a transaction fee revenue
firm? model?
A) revenue model A) Yahoo
B) competitive advantage B) E*Trade
C) market strategy C) Twitter
D) value proposition D) Sears
179. Which element of the business B) competitive 185. Which of the following describes D) Maintain a basic,
model relates to the power of environment the basic Web policy of large firms static Web site
customers and suppliers with during the Invention period? depicting the firm's
respect to a business? A) Integrate social networks and brand.
A) value proposition the mobile platform with Web site
B) competitive environment marketing.
C) competitive advantage B) Emphasize the necessity for the
D) market strategy Web to generate profits.
C) Use the Web to sell complex
180. Which of the following are Amazon's B) selection and
goods and services online.
primary value propositions? convenience
D) Maintain a basic, static Web site
A) personalization and
depicting the firm's brand.
customization
B) selection and convenience 186. Which of the following details the D) physical design
C) reduction of price discovery cost actual hardware components to be
D) management of product delivery used in a system?
A) architecture plan
181. Which of the following basic system B) digital catalog
B) system functionalities plan
functionalities is used to display
C) logical design
goods on a Web site?
D) physical design
A) product database
B) digital catalog 187. Which of the following dimensions B) availability
C) shopping cart system of e-commerce security is not
D) customer database system provided for by encryption?
A) confidentiality
182. Which of the following best A) They were a
B) availability
describes the early years of e- technological
C) message integrity
commerce? success but a mixed
D) nonrepudiation
A) They were a technological business success.
success but a mixed business
success.
B) They were a technological
success but a business failure.
C) They were a technological failure
but a business success.
D) They were a mixed technological
and business success.
188. Which of the following examples C) Over 50% of 193. Which of the following features of e- A) richness
illustrates the "Long Tail" phenomenon? Netflix's 100,000 commerce technology enables merchants
A) Rhapsody music streaming service titles are rented to market and sell "complex" goods and
reported that its no play rate had at least once a services to consumers via marketing
increased to over 20%. day by someone. messages that can integrate video, audio,
B) The number of blockbuster "winner and text?
take all" video titles is declining. A) richness
C) Over 50% of Netflix's 100,000 titles B) ubiquity
are rented at least once a day by C) information density
someone. D) personalization
D) The average blog has a readership of
194. Which of the following features of e- D) universal
slightly more than 1.
commerce technology has reduced the cost standards
189. Which of the following factors is not a C) the of delivering marketing messages and
significant influence on a company's availability of receiving feedback from users?
competitive environment? supportive A) ubiquity
A) how many competitors are active organizational B) richness
B) what the market share of each structures C) interactivity
competitor is D) universal standards
C) the availability of supportive
195. Which of the following features of e- C) universal
organizational structures
commerce technology is related to the standards
D) how competitors price their products
concept of network externalities?
190. Which of the following features of e- B) information A) richness
commerce technology allows fine- density B) interactivity
grained, highly detailed information on C) universal standards
consumers' real-time behavior to be D) information density
gathered and analyzed?
196. Which of the following forms of online D) rich
A) personalization/customization
advertising is expected to grow the fastest media
B) information density
between 2014 and 2018?
C) social technology
A) paid search
D) interactivity
B) sponsorships
191. Which of the following features of e- D) social C) search engines
commerce technology allows users to technology D) rich media
participate in the creation of online
197. Which of the following gives a business A) the firm's
content?
model the most credibility with outside management
A) ubiquity
investors? team
B) global reach
A) the firm's management team
C) information density
B) the firm's value proposition
D) social technology
C) the firm's market opportunity
192. Which of the following features of e- A) global reach D) the firm's market strategy
commerce technology changes
198. Which of the following helps you C) site
industry structure by lowering barriers
understand the marketing effectiveness of tracking and
to entry but greatly expands the
your e-commerce site? reporting
market at the same time?
A) shopping cart system
A) global reach
B) product database
B) richness
C) site tracking and reporting system
C) interactivity
D) inventory management system
D) personalization
199. Which of the following involves a C) freemium 205. Which of the following is an B) WordPress
company giving away a certain level strategy example of a CMS?
of product or services without charge, A) Apache
but then charging a fee for premium B) WordPress
levels of the product or service? C) Dreamweaver CC
A) advertising revenue model D) Webtrends Analytics
B) subscription revenue model
206. Which of the following is an D) An unauthorized person
C) freemium strategy
example of an integrity intercepts an online
D) transaction fee revenue model
violation of e-commerce communication and
200. Which of the following is a C) security? changes its contents.
characteristic of e-commerce during disintermediation A) A Web site is not actually
the Invention period? operated by the entity the
A) mobile technology customer believes it to be.
B) earnings and profit emphasis B) A merchant uses customer
C) disintermediation information in a manner not
D) extensive government surveillance intended by the customer.
C) A customer denies that he
201. Which of the following is a C) brand
or she is the person who
characteristic of the Consolidation extension and
placed the order.
phase of e-commerce? strengthening
D) An unauthorized person
A) predominance of pure online becomes more
intercepts an online
strategies important that
communication and changes
B) emphasis on revenue growth versus creating new
its contents.
profits brands
C) brand extension and strengthening 207. Which of the following is an B) Airbnb
becomes more important that creating example of a sharing
new brands economy company?
D) shift to a technology-driven A) YouTube
approach B) Airbnb
C) Tumblr
202. Which of the following is a D) expansion of
D) Facebook
characteristic of the Reinvention phase e-commerce to
of e-commerce? include services 208. Which of the following is an D) MyPoints
A) massive proliferation of dot-com as well as goods example of the affiliate
start-ups revenue model?
B) widespread adoption of broadband A) Oyster
networks B) eBay
C) rapid growth of search engine C) L.L. Bean
advertising D) MyPoints
D) expansion of e-commerce to
209. Which of the following is an A) eHarmony
include services as well as goods
example of the subscription
203. Which of the following is a high-speed, WiMAX revenue model?
medium-range, broadband wireless A) eHarmony
metropolitan area network? B) eBay
A) Wi-Fi C) E*Trade
B) WiMAX D) Twitter
C) Bluetooth
210. Which of the following is an A) brand name
D) ZigBee
unfair competitive
204. Which of the following is a mobile D) Instagram advantage?
photo-sharing application? A) brand name
A) YouTube B) access to global markets
B) Tumblr C) lower product prices
C) Wikipedia D) superior technology
D) Instagram
211. Which of the following is a prominent A) 218. Which of the following is not a concern A) the high cost
hacktivist group? Anonymous about IoT? of sensors
A) Anonymous A) the high cost of sensors
B) Anti-Phishing Working Group B) interoperability
C) IC3 C) security
D) Symantec D) privacy
212. Which of the following is a server-side B) AWD 219. Which of the following is not a feature D) affiliate
technique that detects the attributes of the that is driving the growth of social programs
device making the request, and using marketing and advertising?
predefined templates, loads a version of a A) social sign-on
site that is optimized for the device? B) network notification
A) LAMP C) collaborative shopping
B) AWD D) affiliate programs
C) mobile first design
220. Which of the following is not a key D) the credit
D) RoR
point of vulnerability when dealing with card companies
213. Which of the following is a set of short- B) NFC e-commerce?
range wireless technologies used to share A) the client computer
information among devices within about 2 B) the server
inches of each other? C) the communications pipeline
A) DES D) the credit card companies
B) NFC
221. Which of the following is not a limitation D) the difficulty
C) IM
of the current Internet? in expanding
D) text messaging
A) the continued reliance on cables and capacity by
214. Which of the following is a Web application B) online wires for connectivity adding servers
that enables Internet users to communicate forum B) limited bandwidth, which causes and clients
with each other, although not in real time? congestion and cannot adequately
A) mobile messaging handle video and voice traffic
B) online forum C) architectural restrictions, which
C) SMS messaging stipulate that numerous requests for the
D) VoIP same file must each be answered
individually, slowing network
215. Which of the following is currently the most A) Internet
performance
popular Web browser? Explorer
D) the difficulty in expanding capacity
A) Internet Explorer
by adding servers and clients
B) Safari
C) Chrome 222. Which of the following is not a main A) file sizes of
D) Firefox factor in determining the overall Web pages
demand on an e-commerce site? being served
216. Which of the following is not a characteristic D) It is
A) file sizes of Web pages being served
of a perfect competitive market? highly
B) number of simultaneous users in peak
A) Price, cost, and quality information are regulated.
periods
equally distributed.
C) speed of legacy applications that are
B) A nearly infinite set of suppliers compete
needed to supply data to Web pages
against one another.
D) whether content is dynamic or static
C) Customers have access to all relevant
information worldwide.
D) It is highly regulated.
217. Which of the following is not a community C) Priceline
provider?
A) LinkedIn
B) Facebook
C) Priceline
D) Pinterest
223. Which of the following is not B) Small businesses and 227. Which of the following is not an B) Each client
a major business trend in e- entrepreneurs are hampered advantage of client/server computing added to the
commerce in 2014-2015? by the rising cost of market over centralized mainframe network increases
A) Social e-commerce entry caused by increased computing? the network's
continues to grow. presence of industry giants. A) It is easy to expand capacity by overall capacity
B) Small businesses and adding servers and clients. and transmission
entrepreneurs are hampered B) Each client added to the network speeds.
by the rising cost of market increases the network's overall
entry caused by increased capacity and transmission speeds.
presence of industry giants. C) Client/server networks are less
C) Sharing economy vulnerable, in part because the
companies garner multi- processing load is balanced over
billion dollar valuations. many powerful smaller computers
D) Mobile and social rather than concentrated in a single
advertising platforms begin huge computer.
to challenge search engine D) There is less risk that a system will
marketing. completely malfunction because
backup or mirror servers can pick up
224. Which of the following is not B) the weakening revenues
the slack if one server goes down
a major business trend in e- of B2B e-commerce.
commerce in 2014-2015? 228. Which of the following is not an C) digital
A) the growth of a mobile example of an access control? signatures
app-based online economy. A) firewalls
B) the weakening revenues B) proxy servers
of B2B e-commerce. C) digital signatures
C) the emergence of social D) login passwords
e-commerce.
229. Which of the following is not an C) drive-by
D) the growth of the mobile
example of a PUP? download
advertising platform.
A) adware
225. Which of the following is not A) Mobile retail payment B) browser parasite
a major trend in e-commerce volume decreases. C) drive-by download
payments in 2014-2015? D) spyware
A) Mobile retail payment
230. Which of the following is not an A) Uber
volume decreases.
example of a social network?
B) PayPal remains the most
A) Uber
popular alternative payment
B) Twitter
method.
C) Pinterest
C) Apple introduces Apple
D) Tumblr
Pay.
D) Payment by credit and/or 231. Which of the following is not an C) Bluefly
debit card remains the example of the bricks-and-clicks e-
dominant form of online tailing business model?
payment. A) Walmart
B) Sears
226. Which of the following is not D) Cortana
C) Bluefly
a mobile messaging
D) Staples
application?
A) Facebook Messenger 232. Which of the following is not an open A) WebSphere
B) WhatsApp source software tool?
C) Viber A) WebSphere
D) Cortana B) Apache
C) MySQL
D) PHP
233. Which of the following is not a A) social search 239. Which of the following is not one of the D) optimize
practice that degrades the results and basic business objectives for an e- system
usefulness of search engines? commerce site? architecture
A) social search A) display goods
B) link farms B) execute a transaction
C) content farms C) provide production and supplier links
D) click fraud D) optimize system architecture
234. Which of the following is not a B) 240. Which of the following is not one of the B) FTP
primary activity in a firm value chain? finance/accounting basic technological foundations of the
A) outbound logistics Internet?
B) finance/accounting A) client/server computing
C) operations B) FTP
D) after-sales service C) TCP/IP
D) packet switching
235. Which of the following is not a D) native
primary source of ad fraud? advertising that is 241. Which of the following is not one of the A) Nielsen
A) browser extensions that insert ads displayed on a four main methods advertisers use to ratings
into a premium publisher's Web site social media site behaviorally target ads?
and then list the ads as available on a A) Nielsen ratings
programmatic ad exchange B) data collected from social networks
B) ad targeting firms that create bots C) integration of offline data
that imitate the behavior of real D) clickstream data
shoppers and then charge advertisers
242. Which of the following is not one of the D)
C) botnets hired by publishers to click
main stages of the online purchasing conversation
on Web pages to create phony traffic
process?
D) native advertising that is displayed
A) post-purchase service and loyalty
on a social media site
B) awareness
236. Which of the following is not a unique C) information C) evaluation
feature of e-commerce technology? asymmetry D) conversation
A) interactivity
243. Which of the following is not part of the C) Microsoft
B) social technology
LAMP open source Web development IIS
C) information asymmetry
model?
D) richness
A) Linux
237. Which of the following is not a C) market creator B) Apache
variation of the e-tailer business C) Microsoft IIS
model? D) PHP
A) bricks-and-clicks
B) virtual merchant
C) market creator
D) manufacturer-direct
238. Which of the following is not C) Amazon
considered a portal?
A) Yahoo
B) MSN
C) Amazon
D) AOL
244. Which of the following is not D) Search engine 247. Which of the following is not true D) The market
true about search engine advertising is the fastest regarding e-commerce today? middlemen
advertising? growing type of online A) Economists' visions of a friction-free disappeared.
A) Spending on search engine advertising. market have not been realized.
advertising constitutes over B) Consumers are less price-sensitive
40% of all online advertising than expected.
spending. C) There remains considerable
B) The top three search persistent price dispersion.
engine providers supply over D) The market middlemen disappeared.
95% of all online searches.
248. Which of the following is one of the D) intellectual
C) The click-through rate for
three primary societal issues related to property
search engine marketing has
e-commerce?
been fairly steady over the
A) liability
years.
B) anonymity
D) Search engine advertising
C) equity
is the fastest growing type of
D) intellectual property
online advertising.
249. Which of the following is the best B) the cost of
245. Which of the following is not A) Most smartphones use
definition of transaction cost? participating in
true about the mobile Intel chips.
A) the expense of changing national or a market
platform?
regional prices
A) Most smartphones use Intel
B) the cost of participating in a market
chips.
C) the cost of finding suitable products
B) The number of cell phones
in the market
worldwide exceeds the
D) the cost merchants pay to bring their
number of PCs.
goods to market
C) Over a third of the world's
cell phones are smartphones. 250. Which of the following is the core C) TCP/IP
D) Unlike PCs, smartphones communications protocol for the
do not need fans. Internet?
A) Telnet
246. Which of the following is not B) Users still spend less
B) FTP
true about the use of apps? time using apps than they
C) TCP/IP
A) The average U.S. consumer do using desktops or
D) TLS
spends over 2 hours and 45 mobile Web sites.
minutes a day using apps. 251. Which of the following is the current C) WPA2
B) Users still spend less time standard used to protect Wi-Fi
using apps than they do using networks?
desktops or mobile Web sites. A) WEP
C) Apps are easier to control B) TLS
and monetize than Web sites. C) WPA2
D) Over 175 million people in D) WPA3
the United States launch a 252. Which of the following is the leading C) hackers
smartphone app more than 60 cause of data breaches?
times a day. A) theft of a computer
B) accidental disclosures
C) hackers
D) DDoS attacks
253. Which of the following is the most C) PHP
commonly used server-side scripting
language?
A) Ruby on Rails
B) Django
C) PHP
D) Perl
254. Which of the following is the most A) company Web site 261. Which of the following measures the ratio C) browse-to-
important tool in establishing a of items purchased to product views? buy ratio
relationship with the customer? A) conversion rate
A) company Web site B) cart conversion rate
B) company CRM system C) browse-to-buy ratio
C) Facebook D) view-to-cart ratio
D) search engine display ads
262. Which of the following occurred during D) NSF
255. Which of the following is the top B) Amazon the Commercialization phase of Internet privatized the
online retailer ranked by online development? operation of
sales? A) The fundamental building blocks of the Internet's
A) Apple the Internet were realized in actual backbone.
B) Amazon hardware and software.
C) Staples B) Mosaic was invented.
D) Walmart C) The Domain Name System was
introduced.
256. Which of the following is the top C) lower prices
D) NSF privatized the operation of the
reason why consumers choose the
Internet's backbone.
online channel?
A) availability of a wider variety of 263. Which of the following online advertising D) e-mail
products formats attracted the least amount of
B) social media influence spending in 2014?
C) lower prices A) search
D) the ability to shop 24/7 B) classifieds
C) rich media
257. Which of the following is the top- B)
D) e-mail
selling online retail category? computers/electronics
A) apparel/accessories 264. Which of the following organizations D) ICANN
B) computers/electronics coordinates the Internet's systems of
C) mass merchant/department unique identifiers, such as IP addresses
stores and top-level domain systems?
D) office supplies A) IETF
B) IAB
258. Which of the following is used to B) Secure Sockets
C) W3C
process certificates and Layer/Transport Layer
D) ICANN
private/public key information? Security
A) HTTP 265. Which of the following organizations D) IANA
B) Secure Sockets Layer/Transport involved with Internet governance has
Layer Security the United States recently announced it
C) File Transfer Protocol would transition control of?
D) data capture tools A) ICANN
B) IGF
259. Which of the following may offer B) e-procurement
C) NTIA
its customers value chain companies
D) IANA
management software?
A) e-distributors 266. Which of the following protocols is used A) IMAP
B) e-procurement companies to send mail to a server?
C) exchanges A) IMAP
D) community providers B) FTP
C) HTTP
260. Which of the following measures B) stickiness
D) SSL
the average length of stay at a
Web site?
A) loyalty
B) stickiness
C) recency
D) retention rate
267. Which of the following search engine C) Hummingbird 272. Which of the following statements D) Growth rates
algorithm updates enables Google's about e-commerce in the United States for retail e-
search engine to evaluate an entire in 2014 is not true? commerce are
sentence rather than just a key word? A) Mobile e-commerce generates higher in the
A) Panda more revenue than social e-commerce. United States
B) Penguin B) Over 160 million Americans are than in China.
C) Hummingbird expected to make at least one
D) Graph Search purchase online.
C) B2B e-commerce is about 10 times
268. Which of the following statements B) The free
the size of B2C e-commerce.
about a free pricing strategy is false? pricing strategy
D) Growth rates for retail e-commerce
A) Free products and services can was born in the
are higher in the United States than in
knock out potential and actual early days of the
China.
competitors. Web.
B) The free pricing strategy was born 273. Which of the following statements C) It enables
in the early days of the Web. about fiber-optic cable is not true? better data
C) It is difficult to convert free A) It transmit more data at faster security than
customers into paying customers. speeds than coaxial or twisted pair coaxial cable.
D) Free products and services can help cable.
build market awareness. B) It is thinner and lighter than coaxial
or twisted pair cable.
269. Which of the following statements B) The law has no
C) It enables better data security than
about Canada's anti-spam law is not impact on
coaxial cable.
true? companies
D) Telecommunications firms have
A) Canada's law is based on an opt-in located within the
made substantial investments in cross-
model. United States.
country fiber optic systems in the last
B) The law has no impact on companies
decade.
located within the United States.
C) The first phase of the law went into 274. Which of the following statements C) Foursquare's
effect in 2014. about Foursquare is not true? business model
D) The law applies to e-mail, texts, and A) Foursquare combines a social faces significant
social media messaging. network business model with location- intellectual
based technology. property
270. Which of the following statements B) CAN-SPAM
B) Foursquare began operating without concerns.
about CAN-SPAM is not true? prohibits
a revenue model.
A) CAN-SPAM went into effect in unsolicited e-mail
C) Foursquare's business model faces
January 2004. (spam).
significant intellectual property
B) CAN-SPAM prohibits unsolicited e-
concerns.
mail (spam).
D) Foursquare has been able to
C) CAN-SPAM prohibits the use of
command a high valuation from venture
deceptive subject lines and false
capital investors despite unimpressive
headers.
revenue and profits.
D) Large spammers are among CAN-
SPAM's biggest supporters. 275. Which of the following statements A) RWD works
about responsive Web design (RWD) is best for sites that
271. Which of the following statements A) A private
not true? have complex
about cloud computing is not true? cloud typically
A) RWD works best for sites that have functionality.
A) A private cloud typically has has multiple
complex functionality.
multiple tenants. tenants.
B) RWD tools include HTML5 and CSS3.
B) Public clouds are the most well-
C) RWD makes it possible to design a
known type of cloud computing
Web site that automatically adjusts its
model.
layout and display according to the
C) Hybrid clouds offer both public and
screen resolution of the device on
private cloud options.
which it is being viewed.
D) A private cloud may be located
D) RWD can be costly.
either on a customer's premises or off
the premises.
276. Which of the following statements about B) The 280. Which of the following statements is true C) The larger
the Internet's impact on marketing is not Internet has about the traditional tradeoff between the the audience
true? decreased the richness and reach of a marketing reached, the
A) The Internet has broadened the scope impact of message prior to the development of the less rich the
of marketing communications. brands. Web? message.
B) The Internet has decreased the impact A) Marketing messages had little richness.
of brands. B) The smaller the audience reached, the
C) The Internet has increased the richness less rich the message.
of marketing communications. C) The larger the audience reached, the
D) The Internet has expanded the less rich the message.
information intensity of the marketplace. D) Richness was unrelated to reach.
277. Which of the following statements about A) The Web is 281. Which of the following technologies could D) CMS
the Web is not true? the you use to place the content of your Web
A) The Web is the technology upon which technology site in a database so that you can then
the Internet is based. upon which dynamically generate requests for pages?
B) The Web was the original "killer app." the Internet is A) Apache web server
C) The Web provides access to pages based. B) proxy server
written in HyperText Markup Language. C) shopping cart
D) The Web is both a communications D) CMS
infrastructure and an information storage
282. Which of the following technologies has D)
system.
enabled the Internet to grow client/server
278. Which of the following statements is not C) Overall exponentially to support millions of users, networking
true? transaction without overloading the network
A) Information asymmetries are costs have architecture?
continually being introduced by dropped A) fiber optics
merchants and marketers. dramatically. B) Wi-Fi
B) Intermediaries have not disappeared. C) IPv6
C) Overall transaction costs have dropped D) client/server networking
dramatically.
283. Which of the following type of application A) proxy
D) Brands remain very important in e-
server monitors and controls access to a server
commerce.
main Web server and implements firewall
279. Which of the following statements is not B) Economists protection?
true? take a purely A) proxy server
A) No one academic perspective technical B) list server
dominates research about e-commerce. approach to C) groupware server
B) Economists take a purely technical e-commerce. D) mail server
approach to e-commerce.
284. Which of the following types of e- C) social
C) There are two primary approaches to e-
commerce presence is best suited for media
commerce: behavioral and technical.
creating an ongoing conversation with
D) Management scientists are interested
one's customers?
in e-commerce as an opportunity to study
A) Web site
how business firms can exploit the
B) e-mail
Internet to achieve more efficient
C) social media
business operations.
D) offline media
285. Which of the following types of merchants A) virtual
has the highest share of retail online (Web only)
sales?
A) virtual (Web only)
B) catalog/call center
C) retail chain
D) consumer brand manufacturer
286. Which of the following types of sites C) trading 293. Which source of e-commerce revenues has B) mobile
typically needs a high percentage of grown from nearly zero prior to 2007 to an B2C e-
secure pages? estimated $84 billion in 2014? commerce
A) Web services A) B2G e-commerce
B) customer self-service B) mobile B2C e-commerce
C) trading C) B2B e-commerce
D) publishing/subscription D) social e-commerce
287. Which of the following typically includes a B) logical 294. Which system functionality must your Web D) customer
data flow diagram to describe the flow of design site have in order to be able to personalize on-site
information for an e-commerce site? or customize a product for a client? tracking
A) physical design A) an ad server
B) logical design B) a site tracking and reporting system
C) testing plan C) an inventory management system
D) co-location plan D) customer on-site tracking
288. Which of the following was not able to D) Ning 295. Which type of e-commerce is distinguished C) mobile
successfully implement a freemium by the type of technology used in the e-
business model? transaction rather than by the nature of the commerce
A) Pandora market relationship?
B) Dropbox A) consumer-to-consumer (C2C)
C) LinkedIn B) social e-commerce
D) Ning C) mobile e-commerce
D) business-to-business (B2B)
289. Which of the following was the first truly C) the
large-scale digitally enabled transaction French 296. Which type of investor typically becomes D) venture
system in the B2C arena? Minitel interested in a start-up company after it has capital
A) Telex begun generating revenue? investors
B) the Baxter Healthcare system A) incubators
C) the French Minitel B) angel investors
D) EDI C) crowdfunders
D) venture capital investors
290. Which of the following would be B) Expedia
considered an indirect competitor of 297. W.W. Grainger is an example of which of the C) e-
Travelocity? following business models? distributor
A) Priceline A) B2B service provider
B) Expedia B) exchange
C) Orbitz C) e-distributor
D) TripAdvisor D) industry consortia
291. Which of the following would you B) Hadoop 298. You could expect to find all of the following D) an RSS
implement to collect and analyze your services in a Web server software package aggregator.
company's Big Data? except:
A) data warehouse A) security services.
B) Hadoop B) FTP.
C) SQL C) search engine.
D) profiling D) an RSS aggregator.
292. Which of the following would you use to D) site 299. Your company has just implemented a new, A) cost
verify that links on Web pages are valid? management more efficient set of business processes competition.
A) HTTP tools that other firms cannot yet obtain. This will
B) FTP enable your firm to adopt a strategy of:
C) data capture tools A) cost competition.
D) site management tools B) scope.
C) scale.
D) focus.
300. Zeus is an example of which of the following? D) Trojan horse
A) SQL injection attack
B) browser parasite
C) DDoS attack
D) Trojan horse

You might also like