Professional Documents
Culture Documents
Principles of Information Systems 13th Edition Stair Test Bank
Principles of Information Systems 13th Edition Stair Test Bank
TRUEFALSE
(A) True
(B) False
Answer : (A)
2. The length of sales process for a typical business-to-business (B2B) e-commerce is shorter than
that for a typical consumer-to-consumer (C2C) e-commerce.
(A) True
(B) False
Answer : (B)
3. An organization uses buy-side e-commerce to purchase goods and services from its suppliers.
(A) True
(B) False
Answer : (A)
4. In 1992, the Supreme Court ruled that online retailers must collect sales taxes even in states
where they lack a physical presence.
(A) True
(B) False
Answer : (B)
5. The Asia-Pacific region has overtaken North America as the region with the largest B2C sales and
now accounts for over one-third of total worldwide B2C sales.
(A) True
(B) False
Answer : (A)
6. The market for m-commerce in North America is maturing much earlier than in Western Europe
and Japan.
(A) True
(B) False
Answer : (B)
(A) True
(B) False
Answer : (A)
8. Lack of trust in online sellers is one of the most frequently cited reasons that some consumers are
not willing to purchase online.
(A) True
(B) False
Answer : (A)
(A) True
(B) False
Answer : (A)
10. In the past, market segmentation has been easy for B2B marketers because firmographic data
was easy to obtain.
(A) True
(B) False
Answer : (B)
11. Consortium-operated exchanges are open to any set of buyers and sellers within a given market.
(A) True
(B) False
Answer : (B)
12. In spite of the recent economic downturn, Website operators have shunned the idea of bartering
for goods and services.
(A) True
(B) False
Answer : (B)
13. Consumers who have enrolled in mobile banking and downloaded the mobile application to their
cell phones can check their credit card balances before making major purchases.
(A) True
(B) False
Answer : (A)
14. Bartering is a technique used by advertisers to recapture shoppers who abandoned a Website
without making a purchase.
(A) True
(B) False
Answer : (B)
15. Implicit personalization techniques capture user-provided information, such as information from
warranties, surveys, user registrations, and contest-entry forms completed online.
(A) True
(B) False
Answer : (B)
16. The three basic components of a successful e-commerce model include content, commerce, and
community.
(A) True
(B) False
Answer : (A)
17. Smart card use is restricted to data associated with financial transactions.
(A) True
(B) False
Answer : (B)
18. PayPal enables any person or business with an e-mail address to securely, easily, and quickly
send and receive payments online.
(A) True
(B) False
Answer : (A)
19. Smart cards are less protected from misuse that conventional credit, charge, and debit cards
because the smart card information is not encrypted.
(A) True
(B) False
Answer : (B)
20. A procurement card is an attachment to an e-mail message or data embedded in a Web site that
verifies the identity of a sender or a Web site.
(A) True
(B) False
Answer : (B)
21. Smart cards can be used for a variety of purposes, including storing a user's financial facts,
health insurance data, credit card numbers, and network identification codes and passwords. They
can also store monetary values for spending.
(A) True
(B) False
Answer : (A)
22. It is safe to assume that personal information will be secure with businesses, because security
breaches of information systems are not common.
(A) True
(B) False
Answer : (B)
23. A mobile advertiser can find how many people clicked on his ad and how many people bought his
product or service.
(A) True
(B) False
Answer : (A)
24. If you abandon an online shopping cart, the seller does not care what you were shopping for.
(A) True
(B) False
Answer : (B)
25. In Kenya and Tanzania, it is not uncommon for citizens to carry out common financial
transactions using mobile phones.
(A) True
(B) False
Answer : (A)
MULTICHOICE
26. Which of the following forms of e-commerce is more likely to offer a more customized product
offering?
Answer : (D)
27. The elimination of organizations that operate between the producer and the consumer is called
_____.
(A) market segmentation
(B) downsizing
(C) disintermediation
(D) personalization
Answer : (C)
28. _____ is a subset of e-commerce that involves electronic transactions between consumers using a
third party to facilitate the process.
Answer : (D)
29. Based on a Supreme Court ruling, an Internet-based merchant needs to charge sales tax only
when _____.
(B) buyers live in a state where the merchant has a physical presence
Answer : (B)
30. A reason for the growth in business-to-consumer (B2C) e-commerce is that online B2C
shoppers have the ability to design a _____ product.
(A) standardized
(B) universal
(C) generic
(D) personalized
Answer : (D)
31. _____ divides the pool of potential customers into subgroups usually defined in terms of
demographic characteristics.
(A) Disintermediation
Answer : (C)
32. Which of the following forms of e-commerce has created an opportunity for many people to make
a living out of selling items on auction Websites?
Answer : (B)
(A) It is targeted at approximately 50% of Website visitors who shop using smartphone applications.
(B) It employs personalized ads to direct shoppers back to a retailer's Website they previously
abandoned.
(C) It attempts to change buying habits of Web shoppers to get them to consider products they have
never considered purchasing before.
(D) It attempts to change buying habits of Web shoppers by getting them to visit Websites they have
not visited before.
Answer : (B)
34. The number of mobile Websites worldwide is expected to grow rapidly because of ______________.
Answer : (D)
35. Which of the following is NOT one of the three basic components of a successful e-commerce
model?
(A) content
(B) capital
(C) community
(D) commerce
Answer : (B)
36. A(n) _____ is an HTML code, not visible on a displayed Web page, that contains keywords
representing the Website's content, which search engines use to build indexes pointing to the
Website.
(A) attribute
(D) identifier
Answer : (B)
37. _____ is an approach used to capture user-provided information, such as information from
warranties, surveys, user registrations, and contest-entry forms completed online.
(D) Phishing
Answer : (C)
38. The ______ is a security technique associated with the use of credit cards at the time of purchase
that checks additional digits printed on the back of the credit cards.
39. _____ is a standard that spells out measures and security procedures to safeguard a card issuer,
a cardholder, and a merchant.
Answer : (D)
40. A _____ is a credit card issued to selected employees to streamline the traditional purchase order
and invoice payment processes.
Answer : (A)
41. Which of the following is NOT one of the key website performance measures commonly used by
online retailers?
Answer : (B)
(C) confirm the uniform resource locator (URL) of their suppliers' Websites
Answer : (A)
(C) depending on which state you are in, you may or may not pay tax
(D) you pay tax on all items, no matter which state you are in
Answer : (C)
(D) any government unit, business or individual can interact with the government
Answer : (D)
Answer : (B)
47. When compared to traditional commerce ________.
Answer : (D)
Answer : (B)
(D) the customers can file a class-action law suit agains the business
Answer : (D)
50. Suppose a retailer who has no technology expertise wishes to set up an online presence for his
business. He ________.
Answer : (D)
Answer : (C)
52. The information necessary for personalizing web pages for individual customers _________.
Answer : (D)
53. Because of ____ commerce sites, anyone can become a merchant online.
(A) B2B
(B) B2C
(C) C2C
(D) G2B
Answer : (C)
54. E-commerce sites are able to keep the amount of data entry errors to a minimum ________.
(D) by using artificial intelligence to correctly "guess" what the users have entered
Answer : (B)
55. Tom's Art Supplies used to sell art supplies through mail order catalogs, but the company's
order takers often had difficulty deciphering their customers' handwriting on the order forms. Since
switching to an online e-commerce site, Tom's has been able to enjoy the advantage of ______.
Answer : (C)
SHORTANSWER
56. _____ is the conducting of business activities electronically over computer networks.Answer :
Electronic commerce (e-commerce)
Answer : Electronic commerce
Answer : E-commerce
57. _____ is a subset of e-commerce where all the participants are organizations.Answer : Business-
to-business (B2B) e-commerce
Answer : Business-to-business e-commerce
Answer : B2B e-commerce
58. ______ is a form of e-commerce in which customers deal directly with an organization and avoid
intermediaries.Answer : Business-to-consumer (B2C) e-commerce
Answer : Business-to-consumer e-commerce
Answer : B2C e-commerce
59. ______ electronic commerce applications support transactions between governments such as the
federal government and state or local governments.Answer : Government-to-government (G2G)
Answer : Government-to-government
Answer : G2G
60. _____ is the use of information and communications technology to simplify the sharing of
information, speed formerly paper-based processes, and improve the relationship between citizens
and government.Answer : E-government
61. _____ occurs when someone steals a person's personal information and uses it without his or
her permission; often to commit fraud or other crimes.Answer : Identity theft
62. _____ exchanges are owned and operated by a single company.Answer : Private
63. When engaging in e-commerce, consumers typically experience the sales life cycle, the first
stage of which is _____ and identification.Answer : search
64. _____ exchanges are open to any set of buyers and sellers within a given market and provide
services and a common technology platform to their members.Answer : Independent
65. One of the main measures of success of a mobile ad is CTR, which stands for _____.Answer :
click through rate
66. _____ is the process of tailoring Web pages to specifically target individual consumers.Answer :
Personalization
67. _____ exchanges are run by a group of traditionally competing companies with common
procurement needs.Answer : Consortium-operated
68. The identification of specific markets to target them with tailored advertising messages is
referred to as _____.Answer : market segmentation
69. In the most successful e-commerce models, ______ involves consumers and businesses paying to
purchase physical goods, information, or services that are posted or advertised online.Answer :
commerce
70. _____ is an amount of money that is computerized, stored, and used as cash for e-commerce
transactions.Answer : Electronic cash
71. A(n) _____ is a company that acts as an intermediary between a Website and online merchants
who have the products and retail expertise.Answer : storefront broker
72. All credit card customers are protected by law from paying more than _____ for fraudulent
transactions.Answer : $50
73. A(n) _____ is an attachment to an email message or data embedded in a Website that verifies the
identity of a sender or Website.Answer : digital certificate
74. _____ is a Visa-patented process that provides an instantaneous rating of a transaction's potential
for fraud to the financial institution that issued the card.Answer : Advanced Authorization
75. The _____ is a credit card-sized device with an embedded microchip to provide electronic
memory and processing capability.Answer : smart card
76. A(n) _____ is responsible for guaranteeing that the people or organizations who are granted
unique digital certificates are in fact who they claim to be.Answer : certificate authority (CA)
Answer : certificate authority
Answer : CA
77. Mobile commerce destinations, used to place orders and conduct business through mobile
devices, are designated with a domain ending in _____.Answer : .mobi
Answer : mobi
79. If you have classified your customers as 'college-grads', 'young parents', or 'singles,' you used a
technique known as market ____.Answer : segmentation
80. For m-commerce to work effectively, the interface must be so good that it is nearly as easy to
make a purchase on a ____ device as it is on a laptop or desktop computer. A
nswer : mobile
Answer : wireless
ESSAY
Graders Info :
82. Why is mobile commerce (m-commerce) maturing much later in North America than in Western
Europe and Japan?
Graders Info :
The market for m-commerce in North America is maturing much later than in Western Europe and
Japan for several reasons. In North America, responsibility for network infrastructure is fragmented
among many providers, consumer payments are usually made by credit card, and many Americans
are unfamiliar with mobile data services. In most Western European countries, communicating via
wireless devices is common, and consumers are much more willing to use m-commerce. Japanese
consumers are generally enthusiastic about new technology and are much more likely to use mobile
technologies for making purchases.
Graders Info :
Three key challenges include: 1) dealing with consumer privacy concerns, 2, overcoming consumers'
lack of trust, and 3) overcoming global issues. While two-thirds of U.S. Internet users have
purchased an item online and most Internet users say online shopping saves them time, about one-
third of all adult Internet users will not buy anything online because they have privacy concerns or
lack trust in online merchants. Global issues include cultural challenges, language challenges, time
and distance challenges, infrastructure challenges, currency challenges, and state, regional, and
national law challenges.
A p-card (procurement card or purchasing card) is a credit card used to streamline the traditional
purchase order and invoice payment process. The p-card is typically issued to selected employees
who must follow company rules and guidelines that may include a single purchase limit, a monthly
spending limit, or merchant category code restrictions. Due to an increased risk of unauthorized
purchases, each p-card holder's spending activity is reviewed periodically by someone independent
of the cardholder to ensure adherence to the guidelines.
85. A small business owner is sceptical about online transactions. She is worried that information
may be stolen in transmission or that the party on the other end may be a bogus one. Also, she is
worried about the security of financial transactions online. What can be done to allay those fears?
Graders Info :
She could use encryption and digital certificate technologies. The data can be encrypted before transmission. Only
the intended recipient of the transmission will be able to decrypt and use it. In addition, she could sign up to use
digital certification service to ensure the authenticity of the other party. The standards for processing financial
transactions quite strict enough to ensure safeguarding the interests of the card issuer, the carholder and the
merchant.