logo image

E-commerce Midterm 1

Which of the following statements about e-commerce in the United States in 2014 is not true?
Growth rates for retail e-commerce are higher in the United States than in China.
In 2014, roughly ________ million people in the United States accessed the Internet via tablets.
147
Which of the following is not a major business trend in e-commerce in 2014-2015?
Small businesses and entrepreneurs are hampered by the rising cost of market entry caused by increased presence of industry giants.
All of the following are major technology trends in e-commerce in 2014-2015 except:
cloud computing enables the creation of Big Data.
Which of the following is not a unique feature of e-commerce technology?
information asymmetry
Which of the following features of e-commerce technology enables merchants to market and sell “complex” goods and services to consumers via marketing messages that can integrate video, audio, and text?
richness
Which of the following features of e-commerce technology allows users to participate in the creation of online content?
social technology
Which of the following is the best definition of transaction cost?
the cost of participating in a market
In 2014, the world’s online population was estimated to be around:
2.8 billion
All of the following are major social trends in e-commerce in 2014-2015 except for:
the refusal of online retailers to accept taxation of Internet sales.
Which of the following features of e-commerce technology is related to the concept of network externalities?
universal standards
Which of the following statements is true about the traditional tradeoff between the richness and reach of a marketing message prior to the development of the Web?
The larger the audience reached, the less rich the message.
Which of the following is not a major business trend in e-commerce in 2014-2015?
the weakening revenues of B2B e-commerce.
Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship?
mobile e-commerce
Which of the following describes the basic Web policy of large firms during the Invention period?
Maintain a basic, static Web site depicting the firm’s brand.
The size of the B2B market in 2014 was estimated to be around:
$5.7 trillion
Interactivity in the context of e-commerce provides which of the following functionalities?
the enabling of two-way communication between consumer and merchant
Which of the following statements about the Web is not true?
The Web is the technology upon which the Internet is based.
In 2014, there were an estimated ________ Internet hosts.
1 billion
All of the following can be considered a precursor to e-commerce except:
the development of the smartphone.
Which of the following was the first truly large-scale digitally enabled transaction system in the B2C arena?
the French Minitel
In which year can e-commerce be said to have begun?
1995
Business-to-consumer (B2C) e-commerce in the United States:
has grown at double-digit rates between 2010 and 2014.
Which of the following is not true about the use of apps?
Users still spend less time using apps than they do using desktops or mobile Web sites.
Which of the following is a characteristic of e-commerce during the Invention period?
disintermediation
All of the following are characteristics of Web 2.0 sites and applications except:
they rely solely on mobile access to the Web.
Which of the following is not a characteristic of a perfect competitive market?
It is highly regulated.
All of the following were visions of e-commerce expressed during the early years of e- commerce except:
fast follower advantage.
Unfair competitive advantages occur when:
one competitor has an advantage others cannot purchase.
The early years of e-commerce were driven by all of the following factors except:
an emphasis on exploiting traditional distribution channels.
The early years of e-commerce are considered:
a stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year.
Which of the following best describes the early years of e-commerce?
They were a technological success but a mixed business success.
Which of the following is a characteristic of the Reinvention phase of e-commerce?
expansion of e-commerce to include services as well as goods
Which of the following is a characteristic of the Consolidation phase of e-commerce?
brand extension and strengthening becomes more important that creating new brands
Which of the following is not true regarding e-commerce today?
The market middlemen disappeared.
Which of the following types of merchants has the highest share of retail online sales?
virtual (Web only)
Retail chains account for around ________ % of online retail firm revenues.
35
One of the predictions for the future of e-commerce is that:
overall revenues from e-commerce will grow at an annualized rate of about 13% a year through 2018.
Which of the following is the top-selling online retail category?
computers/electronics
Which business application is associated with the technological development of local area networks and client/server computing?
workgroup automation (e.g., document sharing)
Which of the following is one of the three primary societal issues related to e-commerce?
intellectual property
________ and ________ are typically the most easily identifiable aspects of a company’s business model.
Value proposition; revenue model
All of the following are using a subscription revenue model for e-books except:
Barnes and Noble.
Which element of the business model addresses the question of why a customer should buy from the firm?
value proposition
Which element of the business model relates to the power of customers and suppliers with respect to a business?
competitive environment
A firm’s ________ describes how a firm will produce a superior return on invested capital.
revenue model
The ability to retain user attention and engagement is an important attribute for which revenue model?
advertising revenue model
Which of the following is an example of the affiliate revenue model?
MyPoints
Which of the following factors is not a significant influence on a company’s competitive environment?
the availability of supportive organizational structures
Which of the following would be considered an indirect competitor of Travelocity?
Expedia
The existence of a large number of competitors in any one market segment may indicate:
the market is saturated.
A perfect market is one in which:
there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.
All of the following use an advertising revenue model except:
Amazon
Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as:
incubators
The overall retail market in the United States in 2017 was estimated at about:
$4.7 trillion.
In general, the key to becoming a successful content provider is to:
own the content being provided.
The basic value proposition of community providers is:
they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.
What is the primary revenue model for an e-distributor?
sales
W.W. Grainger is an example of which of the following business models?
e-distributor
________ create and sell access to digital markets.
E-procurement firms
Which of the following may offer its customers value chain management software?
E-procurement firms
Over the past decade, the number of exchanges has:
diminished sharply.
SupplyOn is an example of a(n):
industry consortium.
Which of the following gives a business model the most credibility with outside investors?
the firm’s management team
Which of the following statements about Foursquare is not true?
Foursquare’s business model faces significant intellectual property concerns.
Which type of investor typically becomes interested in a start-up company after it has begun generating revenue?
venture capital investors
Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?
global reach
Which of the following is not a primary activity in a firm value chain?
finance/accounting
A ________ is a networked business ecosystem that coordinates a firm’s suppliers, distributors, and delivery firms with its own production needs using an Internet-based supply chain management system.
value web
If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:
enable individual customization of the product by consumers.
During which period of time did the Institutionalization phase of Internet development take place?
1975-1995
Which of the following occurred during the Commercialization phase of Internet development?
NSF privatized the operation of the Internet’s backbone.
During which phase of the development of the Internet was the personal computer invented?
Institutional phase
The Transport Layer of TCP/IP is responsible for which of the following?
providing communication with the application by acknowledging and sequencing the packets to and from the application
The Internet Layer of TCP/IP is responsible for which of the following?
addressing, packaging, and routing messages
Which of the following is not a concern about IoT?
the high cost of sensors
The address used by a browser to identify the location of content on the Web is called:
a uniform resource locator.
Which of the following organizations coordinates the Internet’s systems of unique identifiers, such as IP addresses and top-level domain systems?
ICANN
Which of the following is not an advantage of client/server computing over centralized mainframe computing?
Each client added to the network increases the network’s overall capacity and transmission speeds.
Where does TLS operate within TCP/IP?
between the Transport Layer and the Application Layer
How long does it take for 300,000 X-rays to be transmitted on a 100-gbps network?
1 minute
TCP/IP operates in which layer of Internet architecture?
Transport Services and Representation Standards layer
The Web runs in which layer of Internet architecture?
Applications layer
The layer of Internet architecture that ties the applications to the communications network and includes such services as security and authentication is called the:
Middleware Services layer.
The backbone of the Internet is formed by:
Network Service Providers (NSPs)
When talking about the physical elements of the Internet, the term redundancy refers to:
multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.
Which source of e-commerce revenues has grown from nearly zero prior to 2007 to an estimated $84 billion in 2014?
mobile B2C e-commerce
What type of Internet access technology are Google and Facebook hoping to use to provide Internet access to remote parts of the world?
drones
The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.
Internet Society (ISOC)
The ________ helps define the overall structure of the Internet.
IAB
Which of the following is not a limitation of the current Internet?
Which of the following is not a limitation of the current Internet?
Which of the following statements about fiber-optic cable is not true?
It enables better data security than coaxial cable.
Which of the following organizations involved with Internet governance has the United States recently announced it would transition control of?
IANA
Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture?
client/server networking
The major technologies used with wireless local area networks are:
Wi-Fi and Bluetooth.
Internet traffic is predicted to do which of the following over the next 5 years?
triple
Which of the following is a high-speed, medium-range, broadband wireless metropolitan area network?
WiMAX
You could expect to find all of the following services in a Web server software package except:
an RSS aggregator.
The concept behind document formatting had its roots in which of the following?
GML
All of the following are characteristics of HTML5 except:
support for digital rights management.
All of the following are true about iPhone apps except:
They are cross-platform, open-source applications.
All of the following experienced high-profile data breaches in 2013 except:
Sony.
The overall rate of online credit card fraud is ________ % of all online card transactions.
less than 1
________ refers to the ability to ensure that e-commerce participants do not deny their online actions.
Nonrepudiation
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
________ refers to the ability to ensure that an e-commerce site continues to function as intended.
Availability
An example of an online privacy violation is:
your online purchasing history being sold to other merchants without your consent.
Which of the following is not a key point of vulnerability when dealing with e-commerce?
the credit card companies
Which of the following is a prominent hacktivist group?
Anonymous
Most of the world’s malware is delivered via which of the following?
Trojan horses
Next generation firewalls provide all of the following except:
the ability to automatically update applications with security patches
Which dimension(s) of security is spoofing a threat to?
integrity and authenticity
All the following statements about symmetric key cryptography are true except:
symmetric key cryptography is computationally slower.
The Data Encryption Standard uses a(n) ________-bit key.
56
All of the following statements about public key cryptography are true except:
public key cryptography ensures authentication of the sender.
All of the following statements about PKI are true except:
PKI guarantees that the verifying computer of the merchant is secure.
Which of the following dimensions of e-commerce security is not provided for by encryption?
availability
All of the following are methods of securing channels of communication except:
FTP.
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
firewall
Proxy servers are also known as:
dual home systems
All of the following are used for authentication except:
packet filters
What is the first step in developing an e-commerce security plan?
Perform a risk assessment.
Online bill payment now accounts for ________ of all bill payments, while paper checks account for ________.
more than 50%, less than 25%
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:
an authorization management system.
Zeus is an example of which of the following?
trojan horse
All of the following statements about Apple Pay are true except which of the following?
Apple Pay is available for both iPhone 5s and iPhone 6s.
PayPal is an example of what type of payment system?
online stored value payment system
In May 2014, the U.S. Department of Justice indicted five army members from which of the following countries for conducting industrial espionage against U.S. Steel and Westinghouse?
China
Rustock is an example of which of the following?
botnet
Which of the following is not a major trend in e-commerce payments in 2014-2015?
Mobile retail payment volume decreases.
Malware that comes with a downloaded file that a user requests is called a:
drive-by download.
Which of the following is not an example of a PUP?
drive-by download
All of the following are limitations of the existing online credit card payment system except:
cost to consumers
Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?
NFC
Around ________ % of households in the United States have broadband access to the Internet.
75
Google introduced which of the following changes to its search algorithm in 2011 to weed out low quality sites from search results?
Panda
Which of the following online advertising formats attracted the least amount of spending in 2014?
email
Which of the following would you implement to collect and analyze your company’s Big Data?
Hadoop
Which of the following forms of online advertising is expected to grow the fastest between 2014 and 2018?
rich media
If you want to determine the size of your Web site’s audience, the metric you will use for the most accurate measurement will be:
unique visitors.
In 2014, what was the approximate Internet penetration rate for individuals that have attained less than a high-school education?
75%
Which of the following is not one of the four main methods advertisers use to behaviorally target ads?
Nielsen ratings
Which of the following search engine algorithm updates enables Google’s search engine to evaluate an entire sentence rather than just a key word?
Hummingbird
Which of the following is not true about search engine advertising?
Search engine advertising is the fastest growing type of online advertising.
Which of the following is not a practice that degrades the results and usefulness of search engines?
social search
“Shoppers” constitute approximately ________ % of the online Internet audience.
90
Which of the following is the top reason why consumers choose the online channel?
lower prices
Which of the following is not a primary source of ad fraud?
native advertising that is displayed on a social media site
In the first 8 months of 2014, the percentage of all e-mail that is spam averaged around ________ %.
60
In modeling online consumer behavior, the concept of “consumer skills” refers to the:
knowledge consumers have about how to conduct online transactions.
Which of the following statements about CAN-SPAM is not true?
CAN-SPAM prohibits unsolicited e-mail (spam).
Which of the following statements about Canada’s anti-spam law is not true?
The law has no impact on companies located within the United States.
Which of the following is the most important tool in establishing a relationship with the customer?
company Web site
Impressions are a measure of the:
number of times an ad is served.
Hits are a measure of the:
number of http requests.
Which of the following statements about the Internet’s impact on marketing is not true?
The Internet has decreased the impact of brands.
Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?
universal standards
Which of the following features of e-commerce technology allows fine-grained, highly detailed information on consumers’ real-time behavior to be gathered and analyzed?
information density
The richness made possible by e-commerce technologies does which of the following?
It allows video, audio, and text to be integrated into a single marketing message and consuming experience.
Purchasing an online ad on a CPA basis means that the advertiser:
pays only for those users who perform a specific action, such as registering, purchasing, etc.
All of the following statements about cookies are true except:
the data typically stored in cookies includes a unique ID and e-mail address.
A Web beacon is:
a tiny graphics file embedded in an e-mail or Web page.
Which of the following examples illustrates the “Long Tail” phenomenon?
Over 50% of Netflix’s 100,000 titles are rented at least once a day by someone.
A ________ is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.
CRM system
Which of the following measures the average length of stay at a Web site?
stickiness
Acquisition rate is a measure of the:
percentage of visitors who indicate an interest in a site’s products by registering or visiting a product’s pages.
Recency refers to the:
time elapsed since the last action taken by a customer.
Which of the following is not a feature that is driving the growth of social marketing and advertising?
affiliate programs
Which of the following measures the ratio of items purchased to product views?
browse-to-buy ratio
The Nike iD program is an example of which of the following marketing techniques?
customer co-production
Which of the following statements about a free pricing strategy is false?
The free pricing strategy was born in the early days of the Web.
All of the following are fixed price strategies except:
yield management.
The second most popular social network in terms of average minutes per visitor is:
Tumblr
Which of the following is the first step in the social marketing process?
fan acquisition
Encouraging users to click a Like button is an example of which step in the social marketing process?
amplification
Which of the following statements about Graph Search is not true?
It relies on Google to supplement its search results.
Which ethical principle tells you that it is wise to assume perfect information markets?
the New York Times test
Which of the following basic ethical concepts plays an important role in defining privacy?
due process
Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge?
the Communications Assistance for Law Enforcement Act
Which of the following is a tiered notice and response system aimed at reducing copyright infringement over P2P networks?
the CAS
Which of the following statements about industry self-regulation regarding privacy is not true?
The NAI’s privacy policies have established the TRUSTe seal.
Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?
Gramm-Leach-Bliley Act
A social consequence of the richness of Internet information is:
very persuasive messages might reduce the need for multiple independent sources of information.
Which of the following is a core Fair Information Practices (FIP) principle?
Choice/Consent
“Do Not Track” falls under which of the following principles in the FTC’s new privacy framework?
Simplified Choice
Which case was instrumental in paving the way for Internet business methods patents?
State Street Bank & Trust Co. v. Signature Financial Group, Inc.

Need essay sample on "E-commerce Midterm 1"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy