• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/60

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

60 Cards in this Set

  • Front
  • Back
The integration of video, audio, and text marketing messages into a single marketing message and consuming experience is an example of:

a. ubiquity
b. information density
c. richness
d. personalization
c. richness
Network enterprises are related to which of the following features of e-commerce technology?

a. interactivity
b. richness
c. universal standards
d. information density
c. universal standards
Which of the following is the best definition of transaction cost?

a. the cost of changing prices
b. the cost merchants pay to bring their goods to market
c. the cost of participating in markets
d. the cost of finding suitable products
c. the cost of participating in markets
All of the following are current major society-related trends in e-commerce, except for:

a. Facebook becomes ever more popular in all demographic categories
b. Internet security improves with the increase use of cloud-based privacy measures
c. Explosive growth continues in online viewing of video and television programs
d. Taxation of internet sales becomes more widespread
b. Internet security improves with the increase use of cloud-based privacy measures
The early years of e-commerce were driven by all of the following except:

a. a huge infusion of venture capital funds
b. visions of profiting from new technology
c. an emphasis on quickly achieving a very high market visibility
d. an emphasis on exploiting traditional distribution channels
d. an emphasis on exploiting traditional distribution channels
Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship?

a. Peer-to-Peer (P2P)
b. Business-to-Consumer (B2C)
c. Business-to-Business (B2B)
d. Consumer-to-Consumer (C2C)
a. Peer-to-Peer (P2P)
Which of the following is not a limitation on the growth of B2C e-commerce?

a. saturation and ceiling effects
b. the sophisticated skill set required to use the Internet and e-commerce systems
c. the retrenchment and consolidation of e-commerce into the hands of large established firms
d. the persistent global inequality limiting access to telephone service, PCs, and cell phones
c. the retrenchment and consolidation of e-commerce into the hands of large established firms
Which of the following statements is not true?

a. Information asymmetries are continually being introduced by merchants and marketers
b. Overall transaction costs have dropped dramatically
c. Intermediaries have not disappeared
d. Brands remain very important in e-commerce
b. Overall transaction costs have dropped dramatically
In the "bow-tie" analogy of the structure of the Web, "tendrils" are:

a. pages that link to the center, but which are not linked to from the center
b. pages that neither link to or are linked from the center
c. pages that link to one another without passing through the center
d. pages that do not link to the center, but are linked to from the center
b. pages that neither link to or are linked from the center
Which of the following is not a major technology trend in e-commerce?

a. computing and networking component prices increase dramatically
b. real-time advertising becomes a reality as firms gain in computing power
c. mobile computing begins to rival the PC platform
d. the internet broadband foundation becomes stronger in households and businesses
a. computing and networking component prices increase dramatically
A perfect market is one in which:

a. there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production
b. competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage
c. one firm develops an advantage based on a factor of production that other firms cannot purchase
d. one participant in the market has more resources than the others
a. there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production
In general, the key to becoming a successful content provider is to :

a. provide other services as well as online content
b. own the content being provided
c. provide online content for free
d. own the technology by which content is created, presented, and distributed
b. own the content being provided
Which element of the business model examines who else occupies the firm's intended marketspace?

a. market strategy
b. competitive advantage
c. competitive environment
d. value proposition
c. competitive environment
Which of the following is not a variation of the e-tailer business model?

a. virtual merchant
b. manufacturer-direct
c. bricks-and-clicks
d. market creator
d. market creator
On of the competitive advantages of a B2B service provider is that it can spread the cost of an expensive software system over many users, achieving efficiencies referred to as:

a. network externalities
b. scale economies
c. application efficiencies
d. network efficiencies
b. scale economies
An example of a company using the content provider model is:

a. eBay
b. Dell.com
c. Priceline
d. CNN.com
d. CNN.com
The key technologies for m-commerce are:

a. WiFi, TCP/IP, and HTML
b. WLAN, WiFi, and Ultrawideband
c. Cell phone-based 2G, 3G, and 4G
d. Cell phone-based 3G/4G, WiFi, and Bluetooth
d. Cell phone-based 3G/4G, WiFi, and Bluetooth
Which of the following is not an example of the bricks-and-clicks e-tailing business model?

a. Walmart.com
b. Staples.com
c. JCPenney.com
d. Drugstore.com
d. Drugstore.com
Which of the following are Amazon's primary value propositions?

a. personalization and customization
b. management and product delivery
c. selection and convenience
d. reduction of price discovery cost
c. selection and convenience
A firm's _________ describes how a firm will produce a superior return on invested capital.

a. revenue model
b. value proposition
c. competitive advantage
d. market strategy
a. revenue model
The backbone of the Internet is formed by:

a. Internet Exchange Points (IXPs)
b. Network Service Providers (NSPs)
c. Internet Service Providers (ISPs)
d. Metropolitan Area Exchanges (MAEs)
b. Network Service Providers (NSPs)
The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

a. packet switching
b. routing
c. the File Transfer Protocol
d. the Transmission Control Protocol
a. packet switching
Transmission Contorl Protocol is the protocol that provides this internet addressing scheme

a. True
b. False
b. False
Which of the following is a high-speed, medium-range broadband wireless metropolitan area network?

a. ZigBee
b. WiMax
c. Wi-Fi
d. Bluetooth
b. WiMax
The addresses used by browsers to identify the location of content on the Web are called:

a. uniform resource locators
b. domain names
c. Hypertext Transfer Protocol
d. IP addresses
a. uniform resource locators
Google Apps is an example of cloud computing

a. True
b. False
a. True
The Network Interface Layer of TCP/IP is responsible for which of the following?

a. provides a variety of application with the ability to access the services of the lower layers
b. providing communication with the application by acknowledging and sequencing the packets to and from the application
c. placing packets on and receiving them from the network medium
d. addressing, packaging, and routing messages
c. placing packets on and receiving them from the network medium
_____ is one of the original internet services and is used to transfer files form a server computer to a client computer and vice-versa

a. SSL
b. SMTP
c. FTP
d. HTTP
c. FTP
Local area networks that operate a single organization that leases access to the Web directly from regional and national carriers are called

a. campus area networks
b. private exchanges
c. extranets
d. wide area networks
a. campus area networks
Which of the following is not one of the basic technological foundations of the Internet?

a. SMTP protocol
b. TCP/IP communications protocol
c. client-server computing
d. packet-switching hardware
a. SMTP protocol
The larger the bandwidth available to a Web site

a. the fewer visitors can simultaneously access the site
b. the faster the server can process a request
c. the more visitors can simultaneously access the site
d. the more degradation the site may experience
c. the more visitors can simultaneously access the site
A system design has two main components

a. a behavioral design and a technological design
b. a logical design and a physical design
c. front-end systems and back-end systems
d. business objectives and technology requirements
b. a logical design and a physical design
Which of the following is not a type of application server?

a. FTP server
b. ad server
c. mail server
d. proxy server
a. FTP server
All of the following might be part of a Web site's middle-tier layer except:

a. legacy corporate applications
b. a database server
c. a database server
c. an ad server
a. legacy corporate applications
One of the most important challenges in developing a new e-commerce site is understanding that the technology must drive the business.

a. True
b. False
b. False
What are the two most important management challenges in building a successful e-commerce site?

a. building a team with the right skill sets and closely managing the development process
b. developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives
c. identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site
d. having an accurate understanding of your business environment and an achievable business plan
b. developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives
All of the following are basic functionality provided by e-commerce merchant server software except

a. marketing software
b. a product catalog
c. credit card processing
d. a shopping cart
a. marketing software
____ are the types of information system capabilities needed to meet business objectives

a. System functionalities
b. System design specifications
c. Information requirements
d. Physical design specifications
a. System functionalities
Using pre-built templates is typically one of the most cost-effective choices when building a Web site.

a. True
b. False
a. True
The primary amount of time maintaining an e-commerce site is spent on:

a. changes in reports, data files, and links to backend databases
b. general administration and making changes and enhancements to the system
c. debugging code
d. responding to emergency situations
b. general administration and making changes and enhancements to the system
A worm needs to be activated by a user for it to replicate itself

a. True
b. False
b. False
____ refers to the ability to ensure that an e-commerce site continues to function as intended

a. Availability
b. Nonrepudiation
c. Authenticity
d. Integrity
a. Availability
Which of the following is not a key point of vulnerability when dealing with e-commerce?

a. the credit card companies
b. the communications pipeline
c. the server
d. the client computer
a. the credit card companies
A ____ is hardware or software that acts as a filter to prevent unwanted packets from entering a network

a. proxy server
b. firewall
c. PPTP
d. virtual private network
b. firewall
What is the most common type of attack against computer systems?

a. viruses
b. Web site defacement
c. denial of service
d. financial fraud
a. viruses
All of the following statements about symmetric key encryption are true except

a. the Data Encryption Standard is a symmetric key encryption system
b. symmetric key encryption is computationally slower
c. in symmetric key encryption, both the sender and the receiver use the same key to encrypt and decrypt a message
d. symmetric key encryption is a key element in digital envelopes
b. symmetric key encryption is computationally slower
The use of a digital signature helps to ensure integrity, authenticity, and nonrepudiation

a. False
b. True
b. True
Which dimension(s) of security is(are) spoofing a threat to?

a. integrity
b. availability
c. availability and integrity
d. integrity and authenticity
d. integrity and authenticity
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

a. browser parasites
b. spyware
c. adware
d. Trojan horses
b. spyware
Botnets are typically used for all of the following except:

a. stealing information from computers
b. phishing attacks
c. DDoS attacks
d. sending spam
b. phishing attacks
Which of the following is not part of an augmented product's feature set?

a. warranty
b. installation
c. after-sale support
d. packaging
d. packaging
Transaction logs are built into Web server software

a. True
b. False
a. True
E-commerce is a major conduit and generator of offline commerce

a. True
b. False
a. True
Which of the following is not of the tools companies use to provide customer service?

a. intelligent agents
b. transactive content
c. automated response systems
d. FAQs
b. transactive content
Which of the following types of online market segmentation and targeting involves tracking the actions users take on a Web site?

a. technical
b. contextual
c. behavioral
d. psychographic
c. behavioral
The marginal cost of the production of information goods distributed over the Internet is zero or near zero.

a. False
b. True
b. True
Which of the following is not a true statement about brands?

a. brands create micro-monopolies
b. brands reduce consumer risk in a crowded marketplace
c. brands introduce market inefficiencies for consumers
d. brands lower customer acquisition costs and increase customer retention
c. brands introduce market inefficiencies for consumers
Being able to stop at any time of the day is the top motivating factor in consumers shopping online.

a. True
b. False
a. True
A person's profession or occupation is part of their:

a. direct reference group
b. lifestyle group
c. subculture
d. indirect reference group
a. direct reference group
Which of the following is the top concern of Internet users about purchasing online?

a. shipping costs
b. product quality
c. difficulty of returning products
d. security of credit card information
d. security of credit card information