Professional Documents
Culture Documents
As economists had envisioned, prices of products sold on the Web are consistently lower than elsewhere, and
the online marketplace is characterized by decreasing price dispersion.
Phng n tr li:
True
False
Question2
Marks: 1
In 2012, roughly ________ million people in the United States accessed the Internet via mobile devices.
Chn mt phng n tr li.
a. 30
b. 65
c. 80
d. 120
Question3
Marks: 1
Question4
Marks: 1
b. Twitter
c. Pinterest
d. Facebook
Question5
Marks: 1
Question6
Marks: 1
Cost transparency refers to the ability of consumers to discover the actual costs merchants pay for products.
Phng n tr li:
True
False
Question7
Marks: 1
The future of e-commerce will include an increase in regulatory activity both in the United States and
worldwide.
Phng n tr li:
True
False
Question8
Marks: 1
b. 1985.
c. 1995.
d. 2001.
Question9
Marks: 1
Customization involves changing a delivered product or service based upon a consumer's preferences or past
purchasing behavior.
Phng n tr li:
True
False
Question10
Marks: 1
b. Small businesses and entrepreneurs are hampered by the rising cost of market
entry caused by increased presence of industry giants.
c. Facebook grows to more than 1 billion users.
d. Social and mobile advertising begins to challenge search engine marketing.
Question11
Marks: 1
Households with incomes of below $75,000 are obtaining Internet access at faster rates than households with
incomes above that level.
Phng n tr li:
True
False
Question12
Marks: 1
The richness made possible by e-commerce technologies does which of the following?
Chn mt phng n tr li.
a. It reduces the cost of delivering marketing messages and receiving feedback from
users.
b. It allows consumers to become co-producers of the goods and services being sold.
c. It allows video, audio, and text to be integrated into a single marketing message and
consuming experience.
d. It enables worldwide customer service and marketing communications.
Question13
Marks: 1
All of the following are online communications that are used to support the evaluation of alternatives stage of
the consumer decision process except:
Chn mt phng n tr li.
a. search engines.
b. online catalogs.
c. social networks.
d. targeted banner ads.
Question14
Marks: 1
b. 68
c. 88
d. 98
Question15
Marks: 1
Which of the following age groups has the highest percentage of Internet access?
Chn mt phng n tr li.
a. 18-29
b. 30-49
c. 50-64
d. 65+
Question16
Marks: 1
Which of the following features of e-commerce technology allows fine-grained, highly detailed information on
consumers' real-time behavior to be gathered and analyzed?
Chn mt phng n tr li.
a. personalization/customization
b. information density
c. social technology
d. interactivity
Question17
Marks: 1
The marketing technique known as ________ involves merchants offering products or services for a very low
price for a short period of time.
Chn mt phng n tr li.
a. search engine marketing
b. flash marketing
c. yield management
d. bait-and-switch
Question18
Marks: 1
b. PHP
c. DBMS
d. JSP
Question19
Marks: 1
b. gender.
c. education.
d. psychological background.
Question20
Marks: 1
b. permission marketing.
c. social marketing.
d. sponsorship marketing.
Question21
Marks: 1
Which of the following is not one of the current trends in Internet advertising?
Chn mt phng n tr li.
a. Spending on search engine advertising is overtaken by video ads.
Question22
Marks: 1
Question23
Marks: 1
b. half-page ad
c. medium rectangle
d. wide skyscraper
Question24
Marks: 1
Question25
Marks: 1
The 2003 CAN-SPAM Act required that the Federal Trade Commission establish a "do not e-mail" registry.
Phng n tr li:
True
False
Question26
Marks: 1
Question27
Marks: 1
Which of the following online advertising formats attracted the least amount of spending in 2012?
Chn mt phng n tr li.
a. search
b. classifieds
c. rich media
d. e-mail
Question28
Marks: 1
Question29
Marks: 1
A Crayola arts-and-crafts column on a parenting Web site is an example of what form of advertising?
Chn mt phng n tr li.
a. sponsorship
b. banner swapping
c. affiliate relationship
d. public relations
Question30
Marks: 1
Research indicates that social network influence may not extend to distant friends.
Phng n tr li:
True
False
Question31
Marks: 1
An ________ provides electronic catalogs that represent the products of thousands of direct manufacturers.
Chn mt phng n tr li.
a. e-distributor
b. e-procurement company
c. exchange
d. industry consortium
Question32
Marks: 1
Question33
Marks: 1
b. fax paper.
c. beef.
d. sugar.
Question34
Marks: 1
An ________ primarily serves businesses that buy indirect goods on a spot purchasing basis.
Chn mt phng n tr li.
a. e-distributor
b. e-procurement company
c. exchange
d. industry consortium
Question35
Marks: 1
Exchanges have proven successful in providing additional value-added services that transform the value chain
for the entire industry.
Phng n tr li:
True
False
Question36
Marks: 1
Question37
Marks: 1
Question38
Marks: 1
Exchanges tend to be biased toward the seller even though they are independently owned and presumably
neutral.
Phng n tr li:
True
False
Question39
Marks: 1
b. one-to-many market.
c. many-to-few market.
d. many-to-many market.
Question40
Marks: 1
Which of the following is not one of the three defining characteristics of a portal?
Chn mt phng n tr li.
a. commerce
b. content
c. auctions
d. navigation of the Web
Question41
Marks: 1
Which of the following involves e-mailing another seller's bidders and offering the same product for less?
Chn mt phng n tr li.
a. transaction interception
b. bid siphoning
c. shill bidding
d. persistent bidding
Question42
Marks: 1
Question43
Marks: 1
The profit a seller makes at auction is a function of all of the following except:
Chn mt phng n tr li.
a. arrival rate.
b. auction length.
c. the number of units for auction.
d. bid increments.
Question44
Marks: 1
b. Utilization
c. Trigger
d. Fixed
Question45
Marks: 1
Priceline.com is an example of a
b. Dutch auction.
c. group buying auction.
d. name your own price auction.
Question46
Marks: 1
iVillage.com is an example of a
b. affinity community.
c. sponsored community.
d. practice network.
Question47
Marks: 1
Which of the following types of auctions offers a neutral marketplace, without buyer or seller bias?
Chn mt phng n tr li.
a. sealed bid market
b. English auction
c. double auction
d. name your own price auction
Question48
Marks: 1
Social network participation is one of the most common usages of the Internet.
Phng n tr li:
True
False
Question49
Marks: 1
Keeping bid increments low increases the number of bidders and the frequency of their bids.
Phng n tr li:
True
False
Question50
Marks: 1
The entertainment industry is generally considered to be composed of five players: television, Hollywood films,
music, radio, and video games.
Phng n tr li:
True
False
Question51
Marks: 1
Question52
Marks: 1
Which of the following type of online content does the highest percentage of Internet users purchase or view
online?
Chn mt phng n tr li.
a. newspapers
b. radio
c. games
d. music
Question53
Marks: 1
By 2015, online video is expected to surpass music as the largest form of online revenue in terms of revenue.
Phng n tr li:
True
False
Question54
Marks: 1
Question55
Marks: 1
Question56
Marks: 1
In 2012, approximately how much were consumers expected to spend on digital music?
Chn mt phng n tr li.
a. $36 million
b. $360 million
c. $3.6 billion
d. $36 billion
Question57
Marks: 1
In the wholesale model of e-book distribution, pricing power is with the retailer.
Phng n tr li:
True
False
Question58
Marks: 1
Which of the following is not one of the factors required to charge for online content?
Chn mt phng n tr li.
a. multiple delivery methods
b. focused market
c. specialized content
d. high perceived net value
Question59
Marks: 1
Which of the following best describes the online newspaper industry's revenue model?
Chn mt phng n tr li.
a. mostly successful implementation of the subscription-fee model
Question60
Marks: 1
All of the following are examples of the challenges that traditional manufacturers experience when using the
Internet to sell directly to the consumer except:
Chn mt phng n tr li.
a. moving to a supply-push model.
Question61
Marks: 1
Question62
Marks: 1
b. clothing.
c. appliances.
d. furniture.
Question63
Marks: 1
All of the following statements about the online insurance industry are true except:
Chn mt phng n tr li.
a. The Internet has dramatically changed the insurance industry's value chain.
b. Web sites of almost all the major firms provide the ability to obtain an online
quote.
c. Internet usage has lead to a decline in term life insurance prices industrywide.
d. The industry has been very successful in attracting visitors searching for
information.
Question64
Marks: 1
Question65
Marks: 1
Phng n tr li:
True
False
Question66
Marks: 1
Question67
Marks: 1
The Internet has resulted in lower search costs, increased price comparison, and lower prices to consumers for
which insurance product line?
Chn mt phng n tr li.
a. term life insurance
b. automobile insurance
c. health insurance
d. property and casualty insurance
Question68
Marks: 1
Question69
Marks: 1
b. cash
c. accounts receivable
d. marketable securities
Question70
Marks: 1
Which of the following can be used to record all keyboard activity of a user?
Chn mt phng n tr li.
a. shopping carts
Question71
Marks: 1
Which of the following technologies allows you to send e-mail without a trace?
Chn mt phng n tr li.
a. anonymous surfing
b. P3P
c. anonymous remailers
d. public key encryption
Question72
Marks: 1
Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?
Chn mt phng n tr li.
a. Notice/Awareness
b. Choice/Consent
c. Access/Participation
d. Security
Question73
Marks: 1
The Children's Internet Protection Act (CIPA) requires schools and libraries in the United States to install
technology protection measures in an effort to shield children from pornography.
Phng n tr li:
True
False
Question74
Marks: 1
The principle of responsibility means that individuals, organizations, and societies should be held accountable
to others for the consequences of their actions.
Phng n tr li:
True
False
Question75
Marks: 1
Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?
Chn mt phng n tr li.
a. Notice/Awareness
b. Choice/Consent
c. Access/Participation
d. Security
Question76
Marks: 1
Net neutrality refers to Internet backbone owners treating all Internet traffic equally.
Phng n tr li:
True
False
Question77
Marks: 1
True
False
Question78
Marks: 1
Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?
Chn mt phng n tr li.
a. richness
b. interactivity
c. social technology
d. ubiquity
Question79
Marks: 1
All of the following are types of tiered, or differential, pricing plans except:
Chn mt phng n tr li.
a. time-managed.
b. metered billing.
c. highway pricing.
d. private industry self-regulatory group.
Question80
Marks: 1
A value proposition defines how a company's product or service fulfills the needs of a customer.
Phng n tr li:
True
False
Question81
Marks: 1
Question82
Marks: 1
b. MSN
c. WSJ.com
d. AOL
Question83
Marks: 1
Expedia is an example of a:
Chn mt phng n tr li.
a. community provider.
b. transaction broker.
c. market creator.
d. service provider.
Question84
Marks: 1
Question85
Marks: 1
b. transaction fee
c. advertising
d. subscription
Question86
Marks: 1
The Internet's universal standards decrease the cost of industry and firm operations.
Phng n tr li:
True
False
Question87
Marks: 1
b. Zipcar
c. Orbitz
d. British Airways
Question88
Marks: 1
b. organizational development.
c. information technology strategy.
d. market strategy.
Question89
Marks: 1
b. transaction brokers.
c. exchanges.
d. service providers.
Question90
Marks: 1
Which of the following is a high-speed, medium-range, broadband wireless metropolitan area network?
Chn mt phng n tr li.
a. Wi-Fi
b. WiMAX
c. Bluetooth
d. ZigBee
Question91
Marks: 1
Question92
Marks: 1
Question93
Marks: 1
Which of the following is not an advantage of client/server computing over centralized mainframe computing?
Chn mt phng n tr li.
a. It is easy to expand capacity by adding servers and clients.
b. Each client added to the network increases the network's overall capacity and
transmission speeds.
c. Client/server networks are less vulnerable, in part because the processing load is
balanced over many powerful smaller computers rather than concentrated in a single
huge computer.
d. There is less risk that a system will completely malfunction because backup or
mirror servers can pick up the slack if one server goes down.
Question94
Marks: 1
b. FTP
c. HTTP
d. SSL
Question95
Marks: 1
Question96
Marks: 1
Which of the following is the core communications protocol for the Internet?
Chn mt phng n tr li.
a. Telnet
b. FTP
c. TCP/IP
d. SSL
Question97
Marks: 1
a. Internet Explorer
b. Netscape
c. Safari
d. Firefox
Question98
Marks: 1
b. widget.
c. gadget.
d. social network.
Question99
Marks: 1
Local area networks that operate within a single organization that leases access to the Web directly from
regional and national carriers are called:
Chn mt phng n tr li.
a. wide area networks.
b. extranets.
c. campus area networks.
d. private exchanges.
Question100
Marks: 1
Which layer of Internet architecture is composed of the telecommunications networks and protocols?
Chn mt phng n tr li.
a. Network Technology Substrate layer
d. Applications layer
Question101
Marks: 1
When talking about the physical elements of the Internet, the term redundancy refers to:
Chn mt phng n tr li.
a. transmitting multiple copies of a single packet to safeguard against data loss.
Question102
Marks: 1
________ is a utility program that allows you to check the connection between your client and a TCP/IP
network.
Chn mt phng n tr li.
a. Ping
b. Telnet
c. Tracert
d. Finger
Question103
Marks: 1
Internet access providers typically provide faster download speeds than upload speeds to consumers.
Phng n tr li:
True
False
Question104
Marks: 1
Question105
Marks: 1
Which of the following is a short-range, low-power, wireless network technology useful for remotely controlling
industrial, medical, and home automation devices?
Chn mt phng n tr li.
a. Wi-Fi
b. WiMAX
c. UWB
d. ZigBee
Question106
Marks: 1
Which of the following occurred during the Commercialization phase of Internet development?
Chn mt phng n tr li.
a. The fundamental building blocks of the Internet were realized in actual
hardware and software.
b. Large mainframes on different college campuses were linked.
c. The Domain Name System was introduced.
d. NSF privatized the operation of the Internet's backbone.
Question107
Marks: 1
WLAN-based Internet access derives from the same technological foundations as telephone-based wireless
Internet access.
Phng n tr li:
True
False
Question108
Marks: 1
During which period of time did the Institutionalization phase of Internet development take place?
Chn mt phng n tr li.
a. 1950-1960
b. 1961-1974
c. 1975-1995
d. 1995-through the present
Question109
Marks: 1
Which of the following is a Web application that enables Internet users to communicate with each other,
although not in real time?
Chn mt phng n tr li.
a. online chat
b. online forum
c. IM
d. VoIP
Question110
Marks: 1
b. the server does not have to maintain an ongoing dedicated interaction with the
client computer.
c. system performance degrades as more simultaneous users require service.
d. Web servers may maintain multiple instances of server software to handle
requests.
Question111
Marks: 1
Accessibility rules help to ensure that low-bandwidth users can access your Web site.
Phng n tr li:
True
False
Question112
Marks: 1
Apache HTTP Web server software is based on Microsoft's Windows operating system.
Phng n tr li:
True
False
Question113
Marks: 1
An e-commerce site that cost $25,000 to develop is likely to require a yearly maintenance budget of
approximately:
Chn mt phng n tr li.
a. $5,000.
b. $10,000.
c. $25,000.
d. $50,000.
Question114
Marks: 1
The annual maintenance cost for a Web site is likely to be as high as its development cost.
Phng n tr li:
True
False
Question115
Marks: 1
Which of the following helps you understand the marketing effectiveness of your e-commerce site?
Chn mt phng n tr li.
a. shopping cart
b. product database
c. site tracking and reporting system
d. inventory management system
Question116
Marks: 1
Which of the following is the least expensive path to creating a mobile Internet presence?
Chn mt phng n tr li.
a. developing a native app
Question117
Marks: 1
All of the following are steps one can take to right-size a Web site's hardware platform and meet demands for
service except:
Chn mt phng n tr li.
a. scaling hardware vertically.
Question118
Marks: 1
A "native" app is one designed to specifically operate using a mobile device's hardware and operating system.
Phng n tr li:
True
False
Question119
Marks: 1
Which of the following is not one of the basic business objectives for an e-commerce site?
Chn mt phng n tr li.
a. display goods
b. execute a transaction
c. provide production and supplier links
d. optimize system architecture
Question120
Marks: 1
b. WordPress
c. Oracle
d. WebTrends Analytics
Question121
Marks: 1
The systems development life cycle methodology is useful when creating an e-commerce Web site.
Phng n tr li:
True
False
Question122
Marks: 1
Question123
Marks: 1
Mobile Web apps are typically built using HTML5 and Java.
Phng n tr li:
True
False
Question124
Marks: 1
Which of the following types of servers monitors and controls access to a main Web server and implements
firewall protection?
Chn mt phng n tr li.
a. proxy server
b. list server
c. groupware server
d. mail server
Question125
Marks: 1
b. FTP
c. data capture tools
d. site management tools
Question126
Marks: 1
________ verifies that the business objectives of the system as originally conceived are in fact working.
Chn mt phng n tr li.
a. System testing
b. Acceptance testing
c. Unit testing
d. Implementation testing
Question127
Marks: 1
In a two-tier architecture, a Web server is linked to one middle-tier layer that typically includes a series of
application servers, as well as to another back-end layer.
Phng n tr li:
True
False
Question128
Marks: 1
Which of the following is used to process certificates and private/public key information?
Chn mt phng n tr li.
a. HTTP
b. SSL
c. FTP
d. data capture tools
Question129
Marks: 1
Which of the following is not an example of one of the four kinds of e-commerce presence?
Chn mt phng n tr li.
a. e-mail list
Question130
Marks: 1
Which of the following types of sites typically tends to have high to very high page views (hits)?
Chn mt phng n tr li.
a. Web services
b. customer self-service
c. trading
d. publishing/subscription
Question131
Marks: 1
Prior to the development of e-commerce, Web sites primarily delivered static content.
Phng n tr li:
True
False
Question132
Marks: 1
b. certificates.
c. VPN.
d. FTP.
Question133
Marks: 1
________ refers to the ability to ensure that e-commerce participants do not deny their online actions.
Chn mt phng n tr li.
a. Nonrepudiation
b. Authenticity
c. Availability
d. Integrity
Question134
Marks: 1
Which of the following is the primary federal statute used to combat computer crime?
Chn mt phng n tr li.
a. Homeland Security Act
b. CAN-SPAM Act
c. Computer Security Enhancement Act
d. Computer Fraud and Abuse Act
Question135
Marks: 1
The Computer Security Institute reported in its 2011 survey that approximately ________ percent of responding
organizations experienced a computer security incident within the previous 12 months.
Chn mt phng n tr li.
a. 25
b. 45
c. 75
d. 95
Question136
Marks: 1
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
Phng n tr li:
True
False
Question137
Marks: 1
If you used a symmetric key encryption for large documents, with public key encryption to encrypt and send the
symmetric key, you would be using a digital:
Chn mt phng n tr li.
a. envelope.
b. signature.
c. certificate.
d. hash.
Question138
Marks: 1
b. bots.
c. worms.
d. sniffers.
Question139
Marks: 1
Question140
Marks: 1
According to the Computer Security Institute's 2011 Computer Crime and Security Survey, which of the
following was the most commonly reported type of attack?
Chn mt phng n tr li.
a. malware infection
b. laptop theft
c. Web site defacement
d. insider abuse
Question141
Marks: 1
b. It requires no authentication.
c. It is anonymous.
d. It provides float.
Question142
Marks: 1
The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy,
and:
Chn mt phng n tr li.
a. confidentiality.
b. usability.
c. functionality.
d. viability.
Question143
Marks: 1
Question144
Marks: 1
Question145
Marks: 1
________-bit key.
b. 56
c. 256
d. 512
Question146
Marks: 1
b. availability
c. integrity and authenticity
d. availability and integrity
Question147
Marks: 1
Typically, the more security measures added to a Web site, the slower and more difficult it becomes to use.
Phng n tr li:
True
False
Question148
Marks: 1
b. your online purchasing history being sold to other merchants without your
consent.
c. your computer being used as part of a botnet.
d. your e-mail being altered by a hacker.
Question149
Marks: 1
A Trojan horse appears to be benign, but then does something other than expected.
Phng n tr li:
True
False
Question150
Marks: 1
b. certificates of authority.
c. biometric devices.
d. packet filters.
Question151
Marks: 1
b. phishing attacks.
c. storing network traffic for analysis.
d. stealing information from computers.