E-marketing Mid-term

In 2013, the world’s online population was roughly:

A.) 250 billion.

B.) 250 million.

C.) 2.5 billion

D.) 25 billion.

2.5 billion.
Which business application is associated with the technological development of local area networks and client/server computing?

A.) transaction automation (e.g., payroll)

B.) industrial system automation (e.g., supply chain management)

C.) desktop automation (e.g., word processing)

D.) workgroup automation (e.g., document sharing)

workgroup automation (e.g., document sharing)
Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship?

A.) mobile e-commerce

B.) social e-commerce

C.) consumer-to-consumer (C2C)

D.) business-to-business (B2B)

mobile e-commerce
Which of the following is not true about the use of apps?

A.) Google can use Web crawlers to index apps.

B.) Users spend more time using apps than they do using desktops or mobile Web sites.

C.) The average U.S. consumer spends about 2 hours a day using apps.

D.) Apps are easier to control and monetize than Web sites.

Google can use Web crawlers to index apps.
Which of the following statements is not true?

A.) Information systems researchers take a purely technical approach to e-commerce.

B.) There are two primary approaches to e-commerce: behavioral and technical.

C.) Management scientists are interested in e-commerce as an opportunity to study how business firms can exploit the Internet to achieve more efficient business operations.

D.) No one academic perspective dominates research about e-commerce.

Information systems researchers take a purely technical approach to e-commerce.
Above all, e-commerce is a ________ phenomenon.

A.) finance-driven

B.) sociological

C.) technology-driven

D.) government-driven

technology-driven
The early years of e-commerce were driven by all of the following factors except:

A.) a huge infusion of venture capital funds.

B.) an emphasis on quickly achieving a very high market visibility.

C.) visions of profiting from new technology.

D.) an emphasis on exploiting traditional distribution channels.

an emphasis on exploiting traditional distribution channels.
All of the following are issues facing Pinterest except:

A.) spam.

B.) competition.

C.) copyright infringement.

D.) inability to attract users.

inability to attract users
E-commerce can be said to have begun in:

A.) 1985.

B.) 2001.

C.) 1995.

D.) 1983.

1995
Which of the following is not a major business trend in e-commerce in 2013-2014?

A.) Small businesses and entrepreneurs are hampered by the rising cost of market entry caused by increased presence of industry giants.

B.) Social and mobile advertising begins to challenge search engine marketing.

C.) Social e-commerce continues to grow.

D.) Facebook grows to more than 1.1 billion users.

Small businesses and entrepreneurs are hampered by the rising cost of market entry caused by increased presence of industry giants.
Which of the following is one of the three primary societal issues related to e-commerce?

A.) individual privacy

B.) equity

C.) liability

D.) anonymity

individual privacy
Unfair competitive advantages occur when:

A.) market middlemen are displaced.

B .) information is equally distributed and transaction costs are low.

C.) one competitor has an advantage others cannot purchase.

D.) firms are able to gather monopoly profits.

one competitor has an advantage others cannot purchase.
In the B2C arena, ________ was the first truly large-scale digitally enabled transaction system.

A.) the French Minitel

B.) EDI

C.) the Baxter Healthcare system

D.) Telex

the French Minitel
In 2013, there were an estimated ________ Internet hosts.

A.) 100 million

B.) 1 billion

C.) 1 million

D.) 10 million

1 billion
Which of the following is a characteristic of the Consolidation phase of e-commerce?

A.) predominance of pure online strategies

B.) first mover advantages

C.) shift to a business-driven approach

D.) emphasis on revenue growth versus profits

shift to a business-driven approach
Which of the following is a characteristic of the Reinvention phase of e-commerce?

A.) widespread adoption of consumer mobile devices

B.) rapid growth of search engine advertising

C.) widespread adoption of broadband networks

D.) massive proliferation of dot-com start-ups

widespread adoption of consumer mobile devices
Which of the following is the top-selling online retail category?

A.) computers/electronics

B.) mass merchant/department stores

C.) office supplies

D.) apparel/accessories

computers/electronics
Which of the following is not an example of a social network?

A.) Wikipedia

B.) Tumblr

C.) Twitter

D.) Pinterest

Wikipedia
Which of the following is a characteristic of e-commerce during the Invention period?

A.) distintermediation

B.) extensive government surveillance

C.) mobile technology

D.) earnings and profit emphasis

distintermediation
Which of the following is the top online retailer ranked by online sales?

A.) Walmart

B.) Staples

C.) Apple

D.) Amazon

Amazon
Which of the following is not true regarding e-commerce today?

A.) The market middlemen disappeared.

B.) There remains considerable persistent price dispersion.

C.) Economists’ visions of a friction-free market have not been realized.

D.) Consumers are less price-sensitive than expected.

The market middlemen disappeared.
The early years of e-commerce were driven by all of the following factors except:

A.) an emphasis on quickly achieving a very high market visibility.

B.) an emphasis on exploiting traditional distribution channels.

C.) visions of profiting from new technology.

D.) a huge infusion of venture capital funds.

an emphasis on exploiting traditional distribution channels.
All of the following are major business trends in e-commerce in 2013-2014 except for:

A.) the expansion of the localization of e-commerce.

B.) the emergence of a new social e-commerce platform.

C.) the growth of a new app-based online economy.

D.) the eclipse of search engine marketing by the mobile advertising platform.

the eclipse of search engine marketing by the mobile advertising platform.
All of the following can be considered a precursor to e-commerce except:

A.) Electronic Data Interchange.

B.) Baxter Healthcare’s remote order entry system.

C.) the French Minitel.

D.) DNS.

DNS.
Interactivity in the context of e-commerce can be described as the:

A.) ability to physically touch and manipulate a product.

B.) enabling of two-way communication between consumer and merchant.

C.) complexity and content of a message.

D.) ability of consumers to create and distribute content.

enabling of two-way communication between consumer and merchant.
Business-to-consumer (B2C) e-commerce in the United States:

A.) constitutes over 30% of the overall U.S. retail market.

B.) is growing more slowly as it confronts its own fundamental limitations.

C.) is expected to account for about $40 billion in total sales in 2013.

D.) has grown at double-digit rates between 2010 and 2013.

has grown at double-digit rates between 2010 and 2013.
All of the following are characteristics of Web 2.0 sites and applications except:

A.) they rely on mobile access to the Web.

B.) they present marketers with extraordinary opportunities for targeted marketing and advertising.

C.) they are inherently highly interactive.

D.) they tend to rely on user-generated content.

they rely on mobile access to the Web.
The size of the B2B market in 2013 is estimated to be around:

A.) $470 billion.

B.) $4.7 billion.

C.) $470 million.

D.) $4.7 trillion.

$4.7 trillion.
The early years of e-commerce are considered:

A.) an economist’s dream come true, where for a brief time consumers had access to all relevant market information and transaction costs plummeted.

B.) a stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year.

C.) a dramatic business success as 85% of dot-coms formed since 1995 became flourishing businesses.

D.) the most promising time in history for the successful implementation of first mover advantages.

a stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year.
Which of the following is a mobile photo-sharing application?

A.) Wikipedia

B.) WordPress

C.) Tumblr

D.) Instagram

Instagram
Which of the following are Amazon’s primary value propositions?

A.) personalization and customization

B.) management of product delivery

C.) selection and convenience

D.) reduction of price discovery cost

selection and convenience
Your startup firm has developed Web-based note-taking software that allows participants to create and share virtual notes attached to existing Web pages. You anticipate marketing your online application to Web development and design companies. Which of the following revenue models is the most appropriate for your new company?

A.) subscription

B.) affiliate

C.) transaction fee

D.) advertising

subscription
Which of the following is an example of the affiliate revenue model?

A.) Gap.com

B.) eBay

C.) MyPoints

D.) Yahoo

MyPoints
________ and ________ are typically the most easily identifiable aspects of a company’s business model.

A.) Value proposition; revenue model

B.) Market strategy; market opportunity

C.) Value proposition; competitive environment

D.) Revenue model; market strategy

Value proposition; revenue model
All of the following use an advertising revenue model except:

A.) Google.

B.) Yahoo.

C.) Facebook.

D.) Amazon.

Amazon.
All of the following are business models employed by the music industry except:

A.) cloud streaming.

B.) download-and-own.

C.) subscription.

D.) peer-to-peer streaming.

peer-to-peer streaming
An example of a company using the content provider model is:

A.) eBay.

B.) Dell.

C.) Rhapsody.com.

D.) Priceline.

Rhapsody.com.
Which type of investor typically becomes interested in a start-up company after it has begun generating revenue?

A.) venture capital investors

B.) crowdfunders

C.) incubators

D.) angel investors

venture capital investors
Which of the following is an unfair competitive advantage?

A.) superior technology

B.) access to global markets

C.) lower product prices

D.) brand name

brand name
In general, the key to becoming a successful content provider is to:

A.) own the content being provided.

B.) own the technology by which content is created, presented, and distributed.

C.) provide other services as well as online content.

D.) provide online content for free.

own the content being provided.
Which of the following is not a variation of the e-tailer business model?

A.) bricks-and-clicks

B.) market creator

C.) manufacturer-direct

D.) virtual merchant

market creator
The overall retail market in the United States in 2013 was estimated at about:

A.) $390 billion.

B.) $39 trillion.

C.) $3.9 trillion.

D.) $39 billion.

$3.9 trillion.
eBay uses all of the following business models except:

A.) e-commerce infrastructure provider.

B.) content provider.

C.) B2C market creator.

D.) C2C market creator.

content provider.
Which of the following factors is not a significant influence on a company’s competitive environment?

A.) the availability of supportive organizational structures

B.) how competitors price their products

C.) what the market share of each competitor is

D.) how many competitors are active

the availability of supportive organizational structures
Which of the following companies utilizes a transaction fee revenue model?

A.) E*Trade

B.) Twitter

C.) WSJ.com

D.) Sears.com

E*Trade
The existence of a large number of competitors in any one market segment may indicate:

A.) no one firm has differentiated itself within that market.

B.) an untapped market niche.

C.) a market that has already been tried without success.

D.) the market is saturated.

the market is saturated.
Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?

A.) personalization

B.) global reach

C.) interactivity

D.) richness

global reach
Which of the following is an example of the subscription revenue model?

A.) Ancestry.com

B.) Twitter

C.) Amazon

D.) eBay

Ancestry.com
A business document that specifically details how you plan on selling your product and find new customers is called a:

A.) business plan.

B.) sales analysis.

C.) market strategy.

D.) competitive strategy.

market strategy.
Exostar is an example of a(n):

A.) private industrial network.

B.) industry consortium.

C.) e-distributor.

D.) exchange.

industry consortium.
One of the competitive advantages of a B2B service provider is that it can spread the cost of an expensive software system over many users, achieving efficiencies referred to as:

A.) network externalities.

B.) network efficiencies.

C.) application efficiencies.

D.) scale economies.

scale economies.
What is the primary revenue model for an e-distributor?

sales

subscription

advertising

transaction fee

sales
All of the following may lead to a competitive advantage except:

better employees.

fewer products.

superior products.

less expensive supplier

fewer products.
Which of the following is not a primary activity in a firm value chain?

finance/accounting

inbound logistics

operations

sales and marketing

finance/accounting
All of the following can be considered a direct or indirect competitor of Amazon.com except:

Apple’s iTunes Store.

eBay.

Barnesandnoble.com.

Starbucks.

Starbucks.
_______ create and sell access to digital electronic markets.

E-procurement firms

Market creators

E-distributors

Portals

E-procurement firms
Over the past decade, the number of exchanges has:

greatly increased.

stayed about the same.

diminished sharply.

increased slowly but steadily.

diminished sharply.
Which of the following is not a community provider?

Facebook

Pinterest

Priceline

LinkedIn

Priceline
ssume you are analyzing the market opportunity of a distance learning company, Learnmore.com, that creates education courses delivered over the Internet for the Fortune 1000 corporate market. Assume that the overall size of the distance learning market is $25 billion. The overall market can be broken down into three major market segments: Corporate, College, and Elementary/High School, each of which accounts for a third of the market. Within the Corporate market, there are two market niches: Fortune 1000, which accounts for 60% of the market, and all others, which together account for 40% of the market. What is Learnmore.com’s realistic market opportunity, approximately?

$6.6 billion

$25 billion

$165 billion

$5 billion

$5 billion
The element of a business model that is responsible for making the model work is:

the market strategy.

the firm’s key competitive advantage.

the organizational structure.

the management team.

the management team.
________ is a utility program that allows you to check the connection between your client and a TCP/IP network.

Finger

Ping

Tracert

Telnet

Ping
Which of the following is not one of the basic technological foundations of the Internet?

client/server computing

packet-switching hardware

TCP/IP communications protocol

Tracert

Tracert
During which phase of the development of the Internet was ARPANET invented?

Innovation phase

Institutional phase

Consolidation phase

Commercialization phase

Institutional phase
During which period of time did the Institutionalization phase of Internet development take place?

1975-1995

1995-through the present

1950-1960

1961-1974

1975-1995
Where does TSL operate within TCP/IP?

between the Network Interface Layer and the Transport Layer

between the Internet Layer and the Application Layer

between the Internet Layer and the Transport Layer

between the Transport Layer and the Application Layer

between the Transport Layer and the Application Layer
Which of the following is not true about the mobile platform?

The number of cell phones worldwide exceeds the number of PCs.

About a third of the world’s cell phones are smartphones.

Most smartphones use Microsoft’s operating system, Windows Mobile.

Unlike PCs, smartphones do not need fans.

Most smartphones use Microsoft’s operating system, Windows Mobile.
The Internet Layer of TCP/IP is responsible for which of the following?

addressing, packaging, and routing messages

providing a variety of applications with the ability to access the services of the lower layers

providing communication with the application by acknowledging and sequencing the packets to and from the application

placing packets on and receiving them from the network medium

addressing, packaging, and routing messages
Which of the following is the core communications protocol for the Internet?

SSL

FTP

TCP/IP

Telnet

TCP/IP
In the address http://www.company.com/clients.html, which of the following is the top-level domain?

http

company.com

.com

www

.com
The Transport Layer of TCP/IP is responsible for which of the following?

placing packets on and receiving them from the network medium

addressing, packaging, and routing messages

providing a variety of applications with the ability to access the services of the lower layers

providing communication with the application by acknowledging and sequencing the packets to and from the application

providing communication with the application by acknowledging and sequencing the packets to and from the application
________ is a unique virtual laboratory for exploring future internets at scale, to promote innovations in network science and technologies.

Internet2

Internet of Things

GENI

ARPANET

GENI
Which of the following is a Web 2.0 service or application?

e-mail

IM

online forums

wikis

wikis
The backbone of the Internet is formed by:

Network Service Providers (NSPs).

Internet Service Providers (ISPs).

Internet Exchange Points (IXPs).

Metropolitan Area Exchanges (MAEs).

Network Service Providers (NSPs).
The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:
VoIP.

IP.

IPTP.

VTP.

VoIP.
________ is a model of computing in which firms and individuals obtain computing power and software applications over the Internet, rather than purchasing and installing it on their own computers.

Mobile computing

Client/server computing

Cloud computing

P2P computing

Cloud computing
The concept behind document formatting had its roots in which of the following?

GML

XML

HTML

SGML

GML
Siri is a type of:

social network.

gadget.

intelligent personal assistant.

widget.

intelligent personal assistant.
You could expect to find all of the following services in a Web server software package except:

an RSS aggregator.

security services.

data capture.

FTP.

an RSS aggregator.
The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.

Internet Engineering Steering Group (IESG)

Internet Engineering Task Force (IETF)

World Wide Web Consortium (W3C)

Internet Society (ISOC)

Internet Society (ISOC)
Which of the following is not a limitation of the current Internet?

limited bandwidth, which causes congestion and cannot adequately handle video and voice traffic

the continued reliance on cables and wires for connectivity

architectural restrictions, which stipulate that numerous requests for the same file must each be answered individually, slowing network performance

the difficulty in expanding capacity by adding servers and clients

the difficulty in expanding capacity by adding servers and clients
Which of the following is currently the most popular Web browser?

Firefox

Internet Explorer

Chrome

Netscape

Internet Explorer
TCP/IP operates in which layer of Internet architecture?

Network Technology Substrate layer

Middleware Services layer

Transport Services and Representation Standards layer

Applications layer

Transport Services and Representation Standards layer
Which of the following organizations coordinates the Internet’s systems of unique identifiers, such as IP addresses and top-level domain systems?

ICANN

W3C

IAB

IETF

W3C
The major technologies used with wireless local area networks are:

Bluetooth and 3G.

Wi-Fi and Bluetooth.

Wi-Fi and WiMax.

WiMax and 3G.

Wi-Fi and Bluetooth
Which of the following occurred during the Commercialization phase of Internet development?

NSF privatized the operation of the Internet’s backbone.

The Domain Name System was introduced.

The fundamental building blocks of the Internet were realized in actual hardware and software

Large mainframes on different college campuses were linked.

NSF privatized the operation of the Internet’s backbone.
Which of the following is a Web application that enables Internet users to communicate with each other, although not in real time?

IM

VoIP

online chat

online forum

online forum
Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture?

Wi-Fi

IPv6

client/server networking

fiber optics

client/server networking
A(n) ________ is a Web application that allows users to easily add and edit content on a Web page.

RSS feed

wiki

podcast

blog

wiki
The natural language convention used to represent IP addresses is called the:

Internet protocol addressing schema.

domain name system.

assigned numbers and names (ANN) system.

uniform resource locator system.

domain name system.
The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

routing.

the Transmission Control Protocol.

the File Transfer Protocol.

packet switching.

packet switching.
Which of the following is an example of a CMS?

Oracle

WebTrends Analytics

WordPress

Apache

WordPress
Which of the following would you use to identify orphan files?

data capture tools

HTTP

site management tools

FTP

site management tools
________ involves testing a site program’s modules one at a time.

Unit testing

Implementation testing

System testing

Acceptance testing

Unit testing
Which of the following is an example of dynamic content?

home page graphic

product descriptions

blog posts

product photographs

blog posts
What are the two most important management challenges in building a successful e-commerce presence?

developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

having an accurate understanding of your business environment and an achievable business plan

identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site

building a team with the right skill sets and closely managing the development process

developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives
Which of the following types of sites typically needs a high percentage of secure pages?

publishing/subscription

customer self-service

trading

Web services

trading
The term stateless refers to the fact that:

the server does not have to maintain an ongoing dedicated interaction with the client computer.

no one government entity controls the Internet.

Web servers may maintain multiple instances of server software to handle requests.

system performance degrades as more simultaneous users require service.

the server does not have to maintain an ongoing dedicated interaction with the client computer.
Which of the following types of servers monitors and controls access to a main Web server and implements firewall protection?

list server

mail server

groupware server

proxy server

proxy server
All of the following are basic functionality provided by Web servers except:

data capture tools.

a shopping cart.

security services.

site management tools.

a shopping cart.
The primary way a Web site is able to personalize the content presented to a visitor is through the use of:

privacy policies.

accessibility rules.

cookies.

site management tools.

cookies.
Which system functionality must your Web site have in order to be able to personalize or customize a product for a client?

an ad server

customer on-site tracking

a site tracking and reporting system

an inventory management system

customer on-site tracking
In order from beginning to end, the major steps in the SDLC, are:

systems analysis/planning; systems design; building the system; testing; and implementation.

systems analysis/planning; systems design; building the system; implementation; and testing.

systems design; testing; building the system; and implementation.

systems analysis/planning; implementation; building the system; and testing

systems analysis/planning; systems design; building the system; testing; and implementation.
Which of the following types of sites typically tends to have high to very high page views (hits)?

trading

customer self-service

Web services

publishing/subscription

publishing/subscription
Which of the following is the least expensive path to creating a mobile Internet presence?

building a mobile Web app using Java

resizing an existing Web site for mobile use

developing a native app

building a mobile Web app using HTML

resizing an existing Web site for mobile use
All of the following are important factors in Web site optimization except:

selecting keywords and page titles.

adhering to accessibility guidelines.

buying search engine ads.

identifying market niches for your services or products.

adhering to accessibility guidelines.
Which of the following is not a main factor in determining overall demand for an e-commerce site?

number of items in inventory

type of content

static file sizes

security required

static file sizes
________ are the types of information systems capabilities needed to meet business objectives.

Physical design specifications

System functionalities

System design specifications

Information requirements

System functionalities
Which of the following is not an open source software tool?

WebSphere

MySQL

PHP

Apache

WebSphere
Which of the following is used to process certificates and private/public key information?

FTP

data capture tools

SSL

HTTP

SSL
________ verifies that the business objectives of the system as originally conceived are in fact working.

Acceptance testing

Unit testing

Implementation testing

System testing

Acceptance testing
All of the following are steps one can take to right-size a Web site’s hardware platform and meet demands for service except:

scaling hardware horizontally.

replacing static pages with dynamically generated pages.

improving processing architecture.

scaling hardware vertically.

replacing static pages with dynamically generated pages.
An e-commerce site that cost $25,000 to develop is likely to require a yearly maintenance budget of approximately:
You Answered
$10,000.

$50,000.

$25,000.

$5,000.

$25,000
Which of the following technologies could you use to place the content of your Web site in a database so that you can then dynamically generate requests for pages?

Apache web server

CMS

shopping cart

proxy server

CMS
The cost of hardware, software, and telecommunications services needed to build a Web site have ________ over the last decade.

decreased slightly

decreased dramatically

increased moderately

increased dramatically

decreased dramatically
The leading Web server software is:

Apache.

Microsoft Internet Information Server.

Google Enterprise Server.

Linux.

Apache.
All of the following are Web site design features that annoy customers except:

slow-loading pages.

redundant navigation.

pop-under ads.

splash pages.

redundant navigation.
Which of the following is not a type of application server?

mail server

FTP server

ad server

proxy server

FTP server
Advantages of dynamic page generation include all of the following except:

lowered menu costs.

nearly cost-free price discrimination.

market segmentation.

client-side execution of programming.

client-side execution of programming
All of the following are basic functionality provided by e-commerce merchant server software except:

marketing software.

a product catalog.

credit card processing.

a shopping cart.

marketing software.
Which of the following is not one of the basic business objectives for an e-commerce site?

provide production and supplier links

display goods

execute a transaction

optimize system architecture

optimize system architecture
Which of the following dimensions of e-commerce security is not provided for by encryption?

nonrepudiation

confidentiality

availability

message integrity

availability
All of the following are methods of securing channels of communication except:

certificates.

SSL/TLS.

FTP.

VPN.

FTP.
None of the following payment systems offers immediate monetary value except:

accumulating balance.

stored value/debit card.

credit cards.

personal checks.

stored value/debit card.
What is the most frequent cause of stolen credit cards and card information today?

sniffing programs

lost cards

the hacking and looting of corporate servers storing credit card information

phishing attacks

the hacking and looting of corporate servers
________ refers to the ability to ensure that e-commerce participants do not deny their online actions.

Availability

Authenticity

Integrity

Nonrepudiation

Nonrepudiation
Which of the following is not an example of a PUP?
You Answered
adware

drive-by download

browser parasite

spyware

drive-by download
Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?

DES

text messaging

IM

NFC

NFC
All the following statements about symmetric key encryption are true except:

the Data Encryption Standard is a symmetric key encryption system.

in symmetric key encryption, both the sender and the receiver use the same key to encrypt and decrypt a message.

symmetric key encryption is computationally slower.

symmetric key encryption is a key element in digital envelopes.

symmetric key encryption is computationally slower.
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

Nonrepudiation

Availability

Authenticity

Integrity

Authenticity
All of the following statements about PKI are true except:

The term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties.

PKI guarantees that the verifying computer of the merchant is secure.

The acronym PKI stands for public key infrastructure.

PKI is not effective against insiders who have a legitimate access to corporate systems including customer information.

PKI guarantees that the verifying computer of the merchant is secure.
All of the following statements about public key encryption are true except:

public key encryption uses two mathematically related digital keys.

public key encryption is based on the idea of irreversible mathematical functions.

public key encryption ensures authentication of the sender.

public key encryption does not ensure message integrity.

public key encryption ensures authentication of the sender.
Which of the following countries has been found to have engaged in cyberespionage against Google?

Russia

China

Iraq

Iran

China
Which of the following left the WikiLeaks Web site effectively inoperable in August 2012?

DDoS attack

botnet

SQL injection attack

browser parasite

DDoS attack
Linden Dollars, created for use in Second Life, are an example of:

virtual currency.

digital cash.

EBPP.

peer-to-peer payment systems.

virtual currency.
Malware that comes with a downloaded file that a user requests is called a:

PUP.

Trojan horse.

backdoor.

drive-by download.

drive-by download.
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:

an authorization management system.

access controls.

security tokens.

an authorization policy.

an authorization management system.
Which of the following is a prominent hacktivist group?

Anti-Phishing Working Group

IC3

Symantec

Anonymous

Anonymous
All of the following are factors in contributing to the increase in cybercrime except:

the ability to remotely access the Internet.

the Internet is an open, vulnerable design.

the ability to anonymously access the Internet.

the Internet’s similarity to telephone networks.

the Internet’s similarity to telephone networks.
Proxy servers are also known as:

application gateways.

firewalls.

packet filters.

dual home systems.

dual home systems.
What is the first step in developing an e-commerce security plan?

Perform a risk assessment.

Perform a security audit.

Develop a security policy.

Create a security organization.

Perform a risk assessment.
The research firm Cybersource estimated that online credit card fraud in the United States amounted to about ________ in 2012.

$3.5 billion

$35 million

$35 billion

$350 million

$3.5 billion
Bitcoins are an example of:

digital cash.

virtual currency.

an EBPP system.

a stored value payment system.

digital cash.
Online bill payments are believed to cost ________ to process compared to ________ for paper bills.

20 to 30 cents, $3 to $7

$10 to $20, $ 1 to $2

3 to $7, 20 to 30 cents

$1 to $2, $10 to $20

20 to 30 cents, $3 to $7
Most of the world’s spam is delivered via which of the following?

botnets

worms

viruses

Trojan horses

botnets
Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?

SSL/TLS

two-factor authentication

anti-virus software

firewall

two-factor authentication
In the United States, the primary form of online payment is:

debit cards.

PayPal.

Google Wallet.

credit cards.

credit cards.
An intrusion detection system can perform all of the following functions except:

setting off an alarm when suspicious activity is detected.

checking network traffic to see if it matches certain patterns or preconfigured rules.

blocking suspicious activity.

examining network traffic.

blocking suspicious activity.
All of the following are examples of malicious code except:

bots.

sniffers.

worms.

viruses.

sniffers.
Which of the following is not an example of an access control?

proxy servers

login passwords

digital signatures

firewalls

digital signatures
Which of the following is an example of an integrity violation of e-commerce security?
A customer denies that he or she is the person who placed the order.

An unauthorized person intercepts an online communication and changes its contents.

A merchant uses customer information in a manner not intended by the customer.

A Web site is not actually operated by the entity the customer believes it to be.

An unauthorized person intercepts an online communication and changes its contents.
Conversion rate is a measure of the:

percentage of visitors who indicate an interest in a site’s products by registering or visiting a product’s pages.

percentage of shoppers who do not return within a year after their initiall

percentage of visitors who become customers.

percentage of existing customers who continue to buy on a regular basis.

percentage of visitors who become customers
Which of the following measures the ratio of items purchased to product views?

conversion rate

browse-to-buy ratio

view-to-cart ratio

cart conversion rate

browse-to-buy ratio
Search engine advertising and marketing expenditures in 2013 were approximately:

$1.95 billion.

$195 million.

$19.5 billion.

$19 million.

$19.5 billion.
Which of the following is not one of the four main methods advertisers use to behaviorally target ads?

integration of offline data

clickstream data

data collected from social networks

Nielsen ratings

Nielsen ratings
Recency refers to the:

percentage of customers who do not return during the next year after an initial purchase.

percentage of existing customers who continue to buy on a regular basis.

time elapsed since the last action taken by a customer.

percentage of customers who return to the site within a year to make additional purchases.

time elapsed since the last action taken by a customer.
If you want to determine the size of your Web site’s audience, the metric you will use for the most accurate measurement will be:

unique visitors.

page views.

hits.

reach.

unique visitors.
All of the following are traditional online marketing tools except:

e-mail and permission marketing.

sponsorship marketing.

affiliate marketing.

social marketing.

social marketing.
Hits are a measure of the:

number of times an ad is served.

number of http requests.

number of pages viewed.

number of times an ad is clicked

number of http requests.
Which of the following is not one of the main stages of the online purchasing process?

browsing

interaction

awareness

post-purchase service and loyalty

browsing
A Crayola arts-and-crafts column on a parenting Web site is an example of what form of advertising?

public relations

affiliate relationship

banner swapping

sponsorship

sponsorship
Acquisition rate is a measure of the:

percentage of visitors who become customers.

percentage of visitors who indicate an interest in a site’s products by registering or visiting a product’s pages.

percentage of existing customers who continue to buy on a regular basis.

percentage of shoppers who do not return within a year after their initial purchase.

percentage of visitors who indicate an interest in a site’s products by registering or visiting a product’s pages.
Which of the following statements about the Internet’s impact on marketing is not true?

The Internet has increased the richness of marketing communications.

The Internet has decreased the impact of brands.

The Internet has expanded the information intensity of the marketplace.

The Internet has broadened the scope of marketing communications.

The Internet has decreased the impact of brands.
Creating multiple variations of information goods and selling these to different market segments at different prices is called:

versioning.

dynamic pricing.

bundling.

customization.

versioning.
Studies of the effects of social “connectedness” on Internet purchases indicate that the more “connected” an individual:

the less purchasing that individual does.

the less that individual is influenced by friends’ purchases.

the more purchasing that individual does.

the more that individual shares purchasing decisions with friends.

the less that individual is influenced by friends’ purchases.
A ________ is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customr

customer service chat system

transactive content system

data warehouse

CRM system

CRM system
The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time.

bait-and-switch

search engine marketing

flash marketing

yield management

flash marketing
The Nike iD program is an example of which of the following marketing techniques?

customer co-production

price discrimination

permission marketing

transactive content

customer co-production
Approximately ________ of annual offline retail sales is influenced by online browsing.

one-quarter

one-half

three-quarters

one-third

one-third
View-through rate measures the ________ response rate to an ad.

30-minute

7-day

24-hour

30-day

30-day
Which of the following online advertising formats attracted the least amount of spending in 2013?

classifieds

search

rich media

e-mail

e-mail
All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except:

search engines.

targeted banner ads.

social networks.

online catalogs.

targeted banner ads.
All of the following are fixed price strategies except:

free pricing.

versioning.

bundling.

yield management.

yield management.
The incremental cost of building the next unit of a good is called the:

fixed cost.

marginal cost.

demand curve.

variable cost

marginal cost.
________ is an industry-standard database query and manipulation language.

JSP

PHP

SQL

DBMS

SQL
Which of the following is the top concern of Internet users about purchasing online?

difficulty of returning products

shipping costs

lack of trust in the purchase process

inability to see and touch before buying

lack of trust in the purchase process
Which of the following is the most important tool in establishing a relationship with the customer?

company Web site

search engine display ads

company CRM system

Facebook

company Web site
Which of the following examples illustrates the “Long Tail” phenomenon?

The number of blockbuster “winner take all” video titles is declining.

Over 50% of Netflix’s 100,000 titles are rented at least once a day by someone.

Rhapsody music streaming service reported that its no play rate had increased to over 20%.

The average blog has a readership of slightly more than 1.

Over 50% of Netflix’s 100,000 titles are rented at least once a day by someone.
Which of the following online advertising formats is the most effective?

banner ads

video ads

rich media ads

e-mail

video ads
Which of the following forms of online advertising is growing the fastest?

rich media

paid search

sponsorships

video

video
All of the following statements about cookies are true except:

the more cookies are deleted, the less accurate ad server metrics become.

cookies make shopping carts possible by allowing a site to keep track of a user’s actions.

cookies can be used with Web bugs to create cross-site profiles of users.

the data typically stored in cookies includes a unique ID and e-mail address.

the data typically stored in cookies includes a unique ID and e-mail address.