Which of the following statements about e-commerce in the United States in 2014 is not true?
Growth rates for retail e-commerce are higher in the United States than in China.
In 2014, roughly ________ million people in the United States accessed the Internet via tablets.
Which of the following is not a major business trend in e-commerce in 2014-2015?
Small businesses and entrepreneurs are hampered by the rising cost of market entry caused by increased presence of industry giants.
All of the following are major technology trends in e-commerce in 2014-2015 except:
cloud computing enables the creation of Big Data.
Which of the following is not a unique feature of e-commerce technology?
Which of the following features of e-commerce technology enables merchants to market and sell “complex” goods and services to consumers via marketing messages that can integrate video, audio, and text?
Which of the following features of e-commerce technology allows users to participate in the creation of online content?
Which of the following is the best definition of transaction cost?
the cost of participating in a market
In 2014, the world’s online population was estimated to be around:
All of the following are major social trends in e-commerce in 2014-2015 except for:
the refusal of online retailers to accept taxation of Internet sales.
Which of the following features of e-commerce technology is related to the concept of network externalities?
Which of the following statements is true about the traditional tradeoff between the richness and reach of a marketing message prior to the development of the Web?
The larger the audience reached, the less rich the message.
Which of the following is not a major business trend in e-commerce in 2014-2015?
the weakening revenues of B2B e-commerce.
Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship?
Which of the following describes the basic Web policy of large firms during the Invention period?
Maintain a basic, static Web site depicting the firm’s brand.
The size of the B2B market in 2014 was estimated to be around:
Interactivity in the context of e-commerce provides which of the following functionalities?
the enabling of two-way communication between consumer and merchant
Which of the following statements about the Web is not true?
The Web is the technology upon which the Internet is based.
In 2014, there were an estimated ________ Internet hosts.
All of the following can be considered a precursor to e-commerce except:
the development of the smartphone.
Which of the following was the first truly large-scale digitally enabled transaction system in the B2C arena?
the French Minitel
In which year can e-commerce be said to have begun?
Business-to-consumer (B2C) e-commerce in the United States:
has grown at double-digit rates between 2010 and 2014.
Which of the following is not true about the use of apps?
Users still spend less time using apps than they do using desktops or mobile Web sites.
Which of the following is a characteristic of e-commerce during the Invention period?
All of the following are characteristics of Web 2.0 sites and applications except:
they rely solely on mobile access to the Web.
Which of the following is not a characteristic of a perfect competitive market?
It is highly regulated.
All of the following were visions of e-commerce expressed during the early years of e- commerce except:
fast follower advantage.
Unfair competitive advantages occur when:
one competitor has an advantage others cannot purchase.
The early years of e-commerce were driven by all of the following factors except:
an emphasis on exploiting traditional distribution channels.
The early years of e-commerce are considered:
a stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year.
Which of the following best describes the early years of e-commerce?
They were a technological success but a mixed business success.
Which of the following is a characteristic of the Reinvention phase of e-commerce?
expansion of e-commerce to include services as well as goods
Which of the following is a characteristic of the Consolidation phase of e-commerce?
brand extension and strengthening becomes more important that creating new brands
Which of the following is not true regarding e-commerce today?
The market middlemen disappeared.
Which of the following types of merchants has the highest share of retail online sales?
virtual (Web only)
Retail chains account for around ________ % of online retail firm revenues.
One of the predictions for the future of e-commerce is that:
overall revenues from e-commerce will grow at an annualized rate of about 13% a year through 2018.
Which of the following is the top-selling online retail category?
Which business application is associated with the technological development of local area networks and client/server computing?
workgroup automation (e.g., document sharing)
Which of the following is one of the three primary societal issues related to e-commerce?
________ and ________ are typically the most easily identifiable aspects of a company’s business model.
Value proposition; revenue model
All of the following are using a subscription revenue model for e-books except:
Barnes and Noble.
Which element of the business model addresses the question of why a customer should buy from the firm?
Which element of the business model relates to the power of customers and suppliers with respect to a business?
A firm’s ________ describes how a firm will produce a superior return on invested capital.
The ability to retain user attention and engagement is an important attribute for which revenue model?
advertising revenue model
Which of the following is an example of the affiliate revenue model?
Which of the following factors is not a significant influence on a company’s competitive environment?
the availability of supportive organizational structures
Which of the following would be considered an indirect competitor of Travelocity?
The existence of a large number of competitors in any one market segment may indicate:
the market is saturated.
A perfect market is one in which:
there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.
All of the following use an advertising revenue model except:
Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as:
The overall retail market in the United States in 2017 was estimated at about:
In general, the key to becoming a successful content provider is to:
own the content being provided.
The basic value proposition of community providers is:
they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.
What is the primary revenue model for an e-distributor?
W.W. Grainger is an example of which of the following business models?
________ create and sell access to digital markets.
Which of the following may offer its customers value chain management software?
Over the past decade, the number of exchanges has:
SupplyOn is an example of a(n):
Which of the following gives a business model the most credibility with outside investors?
the firm’s management team
Which of the following statements about Foursquare is not true?
Foursquare’s business model faces significant intellectual property concerns.
Which type of investor typically becomes interested in a start-up company after it has begun generating revenue?
venture capital investors
Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?
Which of the following is not a primary activity in a firm value chain?
A ________ is a networked business ecosystem that coordinates a firm’s suppliers, distributors, and delivery firms with its own production needs using an Internet-based supply chain management system.
If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:
enable individual customization of the product by consumers.
During which period of time did the Institutionalization phase of Internet development take place?
Which of the following occurred during the Commercialization phase of Internet development?
NSF privatized the operation of the Internet’s backbone.
During which phase of the development of the Internet was the personal computer invented?
The Transport Layer of TCP/IP is responsible for which of the following?
providing communication with the application by acknowledging and sequencing the packets to and from the application
The Internet Layer of TCP/IP is responsible for which of the following?
addressing, packaging, and routing messages
Which of the following is not a concern about IoT?
the high cost of sensors
The address used by a browser to identify the location of content on the Web is called:
a uniform resource locator.
Which of the following organizations coordinates the Internet’s systems of unique identifiers, such as IP addresses and top-level domain systems?
Which of the following is not an advantage of client/server computing over centralized mainframe computing?
Each client added to the network increases the network’s overall capacity and transmission speeds.
Where does TLS operate within TCP/IP?
between the Transport Layer and the Application Layer
How long does it take for 300,000 X-rays to be transmitted on a 100-gbps network?
TCP/IP operates in which layer of Internet architecture?
Transport Services and Representation Standards layer
The Web runs in which layer of Internet architecture?
The layer of Internet architecture that ties the applications to the communications network and includes such services as security and authentication is called the:
Middleware Services layer.
The backbone of the Internet is formed by:
Network Service Providers (NSPs)
When talking about the physical elements of the Internet, the term redundancy refers to:
multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.
Which source of e-commerce revenues has grown from nearly zero prior to 2007 to an estimated $84 billion in 2014?
mobile B2C e-commerce
What type of Internet access technology are Google and Facebook hoping to use to provide Internet access to remote parts of the world?
The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.
Internet Society (ISOC)
The ________ helps define the overall structure of the Internet.
Which of the following is not a limitation of the current Internet?
Which of the following is not a limitation of the current Internet?
Which of the following statements about fiber-optic cable is not true?
It enables better data security than coaxial cable.
Which of the following organizations involved with Internet governance has the United States recently announced it would transition control of?
Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture?
The major technologies used with wireless local area networks are:
Wi-Fi and Bluetooth.
Internet traffic is predicted to do which of the following over the next 5 years?
Which of the following is a high-speed, medium-range, broadband wireless metropolitan area network?
You could expect to find all of the following services in a Web server software package except:
an RSS aggregator.
The concept behind document formatting had its roots in which of the following?
All of the following are characteristics of HTML5 except:
support for digital rights management.
All of the following are true about iPhone apps except:
They are cross-platform, open-source applications.
All of the following experienced high-profile data breaches in 2013 except:
The overall rate of online credit card fraud is ________ % of all online card transactions.
less than 1
________ refers to the ability to ensure that e-commerce participants do not deny their online actions.
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
________ refers to the ability to ensure that an e-commerce site continues to function as intended.
An example of an online privacy violation is:
your online purchasing history being sold to other merchants without your consent.
Which of the following is not a key point of vulnerability when dealing with e-commerce?
the credit card companies
Which of the following is a prominent hacktivist group?
Most of the world’s malware is delivered via which of the following?
Next generation firewalls provide all of the following except:
the ability to automatically update applications with security patches
Which dimension(s) of security is spoofing a threat to?
integrity and authenticity
All the following statements about symmetric key cryptography are true except:
symmetric key cryptography is computationally slower.
The Data Encryption Standard uses a(n) ________-bit key.
All of the following statements about public key cryptography are true except:
public key cryptography ensures authentication of the sender.
All of the following statements about PKI are true except:
PKI guarantees that the verifying computer of the merchant is secure.
Which of the following dimensions of e-commerce security is not provided for by encryption?
All of the following are methods of securing channels of communication except:
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
Proxy servers are also known as:
dual home systems
All of the following are used for authentication except:
What is the first step in developing an e-commerce security plan?
Perform a risk assessment.
Online bill payment now accounts for ________ of all bill payments, while paper checks account for ________.
more than 50%, less than 25%
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:
an authorization management system.
Zeus is an example of which of the following?
All of the following statements about Apple Pay are true except which of the following?
Apple Pay is available for both iPhone 5s and iPhone 6s.
PayPal is an example of what type of payment system?
online stored value payment system
In May 2014, the U.S. Department of Justice indicted five army members from which of the following countries for conducting industrial espionage against U.S. Steel and Westinghouse?
Rustock is an example of which of the following?
Which of the following is not a major trend in e-commerce payments in 2014-2015?
Mobile retail payment volume decreases.
Malware that comes with a downloaded file that a user requests is called a:
Which of the following is not an example of a PUP?
All of the following are limitations of the existing online credit card payment system except:
cost to consumers
Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?
Around ________ % of households in the United States have broadband access to the Internet.
Google introduced which of the following changes to its search algorithm in 2011 to weed out low quality sites from search results?
Which of the following online advertising formats attracted the least amount of spending in 2014?
Which of the following would you implement to collect and analyze your company’s Big Data?
Which of the following forms of online advertising is expected to grow the fastest between 2014 and 2018?
If you want to determine the size of your Web site’s audience, the metric you will use for the most accurate measurement will be:
In 2014, what was the approximate Internet penetration rate for individuals that have attained less than a high-school education?
Which of the following is not one of the four main methods advertisers use to behaviorally target ads?
Which of the following search engine algorithm updates enables Google’s search engine to evaluate an entire sentence rather than just a key word?
Which of the following is not true about search engine advertising?
Search engine advertising is the fastest growing type of online advertising.
Which of the following is not a practice that degrades the results and usefulness of search engines?
“Shoppers” constitute approximately ________ % of the online Internet audience.
Which of the following is the top reason why consumers choose the online channel?
Which of the following is not a primary source of ad fraud?
native advertising that is displayed on a social media site
In the first 8 months of 2014, the percentage of all e-mail that is spam averaged around ________ %.
In modeling online consumer behavior, the concept of “consumer skills” refers to the:
knowledge consumers have about how to conduct online transactions.
Which of the following statements about CAN-SPAM is not true?
CAN-SPAM prohibits unsolicited e-mail (spam).
Which of the following statements about Canada’s anti-spam law is not true?
The law has no impact on companies located within the United States.
Which of the following is the most important tool in establishing a relationship with the customer?
company Web site
Impressions are a measure of the:
number of times an ad is served.
Hits are a measure of the:
number of http requests.
Which of the following statements about the Internet’s impact on marketing is not true?
The Internet has decreased the impact of brands.
Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?
Which of the following features of e-commerce technology allows fine-grained, highly detailed information on consumers’ real-time behavior to be gathered and analyzed?
The richness made possible by e-commerce technologies does which of the following?
It allows video, audio, and text to be integrated into a single marketing message and consuming experience.
Purchasing an online ad on a CPA basis means that the advertiser:
pays only for those users who perform a specific action, such as registering, purchasing, etc.
All of the following statements about cookies are true except:
the data typically stored in cookies includes a unique ID and e-mail address.
A Web beacon is:
a tiny graphics file embedded in an e-mail or Web page.
Which of the following examples illustrates the “Long Tail” phenomenon?
Over 50% of Netflix’s 100,000 titles are rented at least once a day by someone.
A ________ is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.
Which of the following measures the average length of stay at a Web site?
Acquisition rate is a measure of the:
percentage of visitors who indicate an interest in a site’s products by registering or visiting a product’s pages.
Recency refers to the:
time elapsed since the last action taken by a customer.
Which of the following is not a feature that is driving the growth of social marketing and advertising?
Which of the following measures the ratio of items purchased to product views?
The Nike iD program is an example of which of the following marketing techniques?
Which of the following statements about a free pricing strategy is false?
The free pricing strategy was born in the early days of the Web.
All of the following are fixed price strategies except:
The second most popular social network in terms of average minutes per visitor is:
Which of the following is the first step in the social marketing process?
Encouraging users to click a Like button is an example of which step in the social marketing process?
Which of the following statements about Graph Search is not true?
It relies on Google to supplement its search results.
Which ethical principle tells you that it is wise to assume perfect information markets?
the New York Times test
Which of the following basic ethical concepts plays an important role in defining privacy?
Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge?
the Communications Assistance for Law Enforcement Act
Which of the following is a tiered notice and response system aimed at reducing copyright infringement over P2P networks?
Which of the following statements about industry self-regulation regarding privacy is not true?
The NAI’s privacy policies have established the TRUSTe seal.
Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?
A social consequence of the richness of Internet information is:
very persuasive messages might reduce the need for multiple independent sources of information.
Which of the following is a core Fair Information Practices (FIP) principle?
“Do Not Track” falls under which of the following principles in the FTC’s new privacy framework?
Which case was instrumental in paving the way for Internet business methods patents?
State Street Bank & Trust Co. v. Signature Financial Group, Inc.
Need essay sample on "E-commerce Midterm 1"? We will write a custom essay sample specifically for you for only $ 13.90/page